`
`Page 1 of 2
`
`IEEE.org | IEEE Xplore Digital Library | IEEE Standards | IEEE Spectrum | More Sites
`
`For Institutional Users:
`Institutional Sign In
`Athens/Shibboleth
`
`Browse Conference Publications > Computer Security Application ...
`
`Proxies for anonymous routing
`
`Back to Results
`
`Full Text
`Sign-In or Purchase
`
`3
`
`Author(s)
`
`Reed, M.G. ; Center for High Assurance Comput. Syst., Naval Res. Lab., Washington, DC, USA ; Syverson, P.F. ; Goldschlag, D.M.
`
`Abstract
`
`Authors
`
`References
`
`Cited By
`
`Keywords
`
`Metrics
`
`Similar
`
`Using traffic analysis, it is possible to infer who is talking to whom over a public network. This paper
`describes a flexible communications infrastructure, called onion routing, which is resistant to traffic
`analysis. Onion routing lies just beneath the application layer, and is designed to interface with a wide
`variety of unmodified Internet services by means of proxies. Onion routing has been implemented on
`a Sun Solaris 2.4; in addition, proxies for World Wide Web browsing (HTTP), remote logins
`(RLOGIN), e-mail (SMTP) and file transfers (FTP) have been implemented. Onion routing provides
`application-independent, real-time and bi-directional anonymous connections that are resistant to
`both eavesdropping and traffic analysis. Applications making use of onion routing's anonymous
`connections may (and usually should) identify their users over the anonymous connection. User
`anonymity may be layered on top of the anonymous connections by removing identifying information
`from the data stream. Our goal is anonymous connections, not anonymous communication. The use
`of a packet-switched public network should not automatically reveal who is talking to whom; this is the
`traffic analysis that onion routing complicates
`
`Published in:
`Computer Security Applications Conference, 1996., 12th Annual
`
`Date of Conference: 9-13 Dec 1996
`
`0
`
`Like
`Tweet
`Share
`
`Page(s):
`95 - 104
`
`Meeting Date :
`09 Dec 1996-13 Dec 1996
`
`ISSN :
`1063-9527
`
`Print ISBN:
`0-8186-7606-X
`
`INSPEC Accession Number:
`5485478
`
`Conference Location :
`San Diego, CA
`
`Digital Object Identifier :
`10.1109/CSAC.1996.569678
`
`Product Type:
`Conference Publications
`
`IEEE Account
`
`Purchase Details
`
`Profile Information
`
`Need Help?
`
`Change Username/Password
`
`Update Address
`
`Payment Options
`
`Order History
`
`Communications Preferences
`
`US & Canada: +1 800 678 4333
`
`Profession and Education
`
`Worldwide: +1 732 981 0060
`
`Access Purchased Documents
`
`Technical Interests
`
`Contact & Support
`
`Sign In | Create Account
`
`About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies
`
`http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&tp=&arnumber=569678&query...
`
`6/5/2013
`
`Petitioner Apple - Ex. 1042, p. 1
`
`
`
`IEEE Xplore - Proxies for anonymous routing
`
`Page 2 of 2
`
`A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
`© Copyright 2013 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.
`
`http://ieeexplore.ieee.org/xpl/articleDetails.jsp?reload=true&tp=&arnumber=569678&query...
`
`6/5/2013
`
`Petitioner Apple - Ex. 1042, p. 2