`
`Proxies For Anonymous Routing
`
`Authors: M. G. Reed
`P. F. Syverson
`D. M. Goldschlag
`
`Page 1 of 2
`
`SIGN IN SIGN UP
`
`Tools and Resources
`
`1996 Article
`
`Save to Binder
`
`Export Formats:
`BibTeXEndNoteACM Ref
`
`Publisher Site
`
`Share:
`|
`Share Share Share Share Share Share More
`
`Tags: anonymous connections
`anonymous routing application-
`independent real-time bi-
`directional anonymous
`connections more tags
`
`Published in:
`· Proceeding
`ACSAC '96 Proceedings of the 12th Annual Computer Security Applications
`Conference
`Page 95
`IEEE Computer Society Washington, DC, USA ©1996
`table of contents ISBN:0-8186-7606-X
`
`Bibliometrics
`· Downloads (6 Weeks): 0
`· Downloads (12 Months): 0
`· Downloads (cumulative): 0
`· Citation Count: 26
`
`Feedback | Switch to single page view (no tabs)
`
`Abstract
`
`Authors
`
`References
`
`Cited By
`
`Index Terms
`
`Publication
`
`Reviews
`
`Comments
`
`Table of Contents
`
`Using traffic analysis, it is possible to infer who is talking to whom over a public network. This paper describes a flexible communications
`infrastructure, called onion routing, which is resistant to traffic analysis. Onion routing lies just beneath the application layer, and is designed
`to interface with a wide variety of unmodified Internet services by means of proxies. Onion routing has been implemented on a Sun Solaris
`2.4; in addition, proxies for World Wide Web browsing (HTTP), remote logins (RLOGIN), e-mail (SMTP) and file transfers (FTP) have been
`implemented. Onion routing provides application-independent, real-time and bi-directional anonymous connections that are resistant to both
`eavesdropping and traffic analysis. Applications making use of onion routing's anonymous connections may (and usually should) identify their
`users over the anonymous connection. User anonymity may be layered on top of the anonymous connections by removing identifying
`information from the data stream. Our goal is anonymous connections, not anonymous communication. The use of a packet-switched public
`network should not automatically reveal who is talking to whom; this is the traffic analysis that onion routing complicates.
`
`Powered by
`
`The ACM Digital Library is published by the Association for Computing Machinery. Copyright © 2013 ACM, Inc.
`Terms of Usage Privacy Policy Code of Ethics Contact Us
`
`Useful downloads:
`
`Adobe Acrobat
`
`QuickTime
`
`Windows Media Player
`
`Real Player
`
`http://dl.acm.org/citation.cfm?id=784588.784596&coll=DL&dl=GUIDE
`
`6/5/2013
`
`Petitioner Apple - Ex. 1043, p. 1
`
`