skip to main content
article
Free access

Onion routing

Published: 01 February 1999 Publication History
  • Get Citation Alerts
  • First page of PDF

    References

    [1]
    Bleichenbacher, D., Gabber, E., Gibbons, P., Matias, Y., and Mayer, A. On secure and pseudonymous client-relationships with multiple servers. In Proceedings for the Third USENIX Electronic Commerce Workshop (Boston, Sept. 1998) 99-108.
    [2]
    Chaum, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2 (Feb. 1981), 84-88.
    [3]
    Goldschlag, D., Reed, M., and Syverson, P. Hiding routing information. Information Hiding. R. Anderson, (Ed). LNCS, 1996. Springer-Verlag.
    [4]
    Goldberg, I. and Wagner, D. TAZ servers and the Rewebber network: Enabling anonymous publishing on the World Wide Web. First Mon-day3, 4 (April 1998).
    [5]
    Reed, M., Syverson, P., and Goldschlag, D. Anonymous connections and Onion Routing. IEEE J. Selected Areas in Commun. 16, 4 (May 1998), 482-494.
    [6]
    Syverson, P., Reed, M., and Goldschlag, D. Private Web browsing. J. Comput. Sec. 5, 3 (1997) 237-248.

    Cited By

    View all
    • (2024)SNAC: Mitigation of Snoop-Based Attacks with Multi-Tier Security in NoC ArchitecturesProceedings of the Great Lakes Symposium on VLSI 202410.1145/3649476.3658769(560-563)Online publication date: 12-Jun-2024
    • (2024) Prism: Pr ivacy-Preserving and Ver i fiable S et Computation Over M ulti-Owner Secret Shared Outsourced Databases IEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.327935621:3(1355-1371)Online publication date: May-2024
    • (2024)Internet Identifiers: A Survey of History, Challenges, and Future PerspectivesIEEE Access10.1109/ACCESS.2024.338211512(51919-51941)Online publication date: 2024
    • Show More Cited By

    Recommendations

    Comments

    Information & Contributors

    Information

    Published In

    cover image Communications of the ACM
    Communications of the ACM  Volume 42, Issue 2
    Feb. 1999
    83 pages
    ISSN:0001-0782
    EISSN:1557-7317
    DOI:10.1145/293411
    Issue’s Table of Contents
    Permission to make digital or hard copies of all or part of this work for personal or classroom use is granted without fee provided that copies are not made or distributed for profit or commercial advantage and that copies bear this notice and the full citation on the first page. Copyrights for components of this work owned by others than ACM must be honored. Abstracting with credit is permitted. To copy otherwise, or republish, to post on servers or to redistribute to lists, requires prior specific permission and/or a fee. Request permissions from [email protected]

    Publisher

    Association for Computing Machinery

    New York, NY, United States

    Publication History

    Published: 01 February 1999
    Published in CACM Volume 42, Issue 2

    Permissions

    Request permissions for this article.

    Check for updates

    Qualifiers

    • Article

    Contributors

    Other Metrics

    Bibliometrics & Citations

    Bibliometrics

    Article Metrics

    • Downloads (Last 12 months)1,313
    • Downloads (Last 6 weeks)120

    Other Metrics

    Citations

    Cited By

    View all
    • (2024)SNAC: Mitigation of Snoop-Based Attacks with Multi-Tier Security in NoC ArchitecturesProceedings of the Great Lakes Symposium on VLSI 202410.1145/3649476.3658769(560-563)Online publication date: 12-Jun-2024
    • (2024) Prism: Pr ivacy-Preserving and Ver i fiable S et Computation Over M ulti-Owner Secret Shared Outsourced Databases IEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2023.327935621:3(1355-1371)Online publication date: May-2024
    • (2024)Internet Identifiers: A Survey of History, Challenges, and Future PerspectivesIEEE Access10.1109/ACCESS.2024.338211512(51919-51941)Online publication date: 2024
    • (2024)Efficient Non-interactive Anonymous CommunicationICT Systems Security and Privacy Protection10.1007/978-3-031-56326-3_8(102-116)Online publication date: 24-Apr-2024
    • (2023)Securing blockchain-based timed data release against adversarial attacksJournal of Computer Security10.3233/JCS-23000131:6(649-677)Online publication date: 10-Nov-2023
    • (2023)Non-intrusive Balance Tomography Using Reinforcement Learning in the Lightning NetworkACM Transactions on Privacy and Security10.1145/363936627:1(1-32)Online publication date: 29-Dec-2023
    • (2023)Strategic Analysis of Griefing Attack in Lightning NetworkIEEE Transactions on Network and Service Management10.1109/TNSM.2022.323076820:2(1790-1803)Online publication date: 1-Jun-2023
    • (2023)BCMIX: A Blockchain-Based Dynamic Self-Reconfigurable MixnetIEEE/ACM Transactions on Networking10.1109/TNET.2023.324496231:5(2222-2235)Online publication date: Oct-2023
    • (2023)Web Privacy: A Formal Adversarial Model for Query ObfuscationIEEE Transactions on Information Forensics and Security10.1109/TIFS.2023.326212318(2132-2143)Online publication date: 1-Jan-2023
    • (2023)UCoin: An Efficient Privacy Preserving Scheme for CryptocurrenciesIEEE Transactions on Dependable and Secure Computing10.1109/TDSC.2021.313095220:1(242-255)Online publication date: 1-Jan-2023
    • Show More Cited By

    View Options

    View options

    PDF

    View or Download as a PDF file.

    PDF

    eReader

    View online with eReader.

    eReader

    Magazine Site

    View this article on the magazine site (external)

    Magazine Site

    Get Access

    Login options

    Full Access

    Media

    Figures

    Other

    Tables

    Share

    Share

    Share this Publication link

    Share on social media