WEKO3
アイテム
Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models
https://ipsj.ixsq.nii.ac.jp/records/145064
https://ipsj.ixsq.nii.ac.jp/records/1450645abcc11f-056a-415b-8dc9-3be577144159
| 名前 / ファイル | ライセンス | アクション |
|---|---|---|
|
|
Copyright (c) 2015 by the Information Processing Society of Japan
|
|
| オープンアクセス | ||
| Item type | Journal(1) | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|
| 公開日 | 2015-09-15 | |||||||||
| タイトル | ||||||||||
| タイトル | Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models | |||||||||
| タイトル | ||||||||||
| 言語 | en | |||||||||
| タイトル | Stronger Bridge Mechanisms of Tor which Take into Consideration Exhaustive Adversarial Models | |||||||||
| 言語 | ||||||||||
| 言語 | eng | |||||||||
| キーワード | ||||||||||
| 主題Scheme | Other | |||||||||
| 主題 | [特集:社会に浸透していくコンピュータセキュリティ技術(推薦論文)] anonymous communication, Tor, bridge | |||||||||
| 資源タイプ | ||||||||||
| 資源タイプ識別子 | http://purl.org/coar/resource_type/c_6501 | |||||||||
| 資源タイプ | journal article | |||||||||
| 著者所属 | ||||||||||
| Institute of Industrial Science, The University of Tokyo | ||||||||||
| 著者所属 | ||||||||||
| Institute of Industrial Science, The University of Tokyo | ||||||||||
| 著者所属(英) | ||||||||||
| en | ||||||||||
| Institute of Industrial Science, The University of Tokyo | ||||||||||
| 著者所属(英) | ||||||||||
| en | ||||||||||
| Institute of Industrial Science, The University of Tokyo | ||||||||||
| 著者名 |
Fei, Feng
× Fei, Feng
× Kanta, Matsuura
|
|||||||||
| 著者名(英) |
Fei, Feng
× Fei, Feng
× Kanta, Matsuura
|
|||||||||
| 論文抄録 | ||||||||||
| 内容記述タイプ | Other | |||||||||
| 内容記述 | Tor is the most popular anonymous communication tool in the world. Its anonymity, however, has not been thoroughly evaluated. For example, it is possible for an adversary to restrict access to the Tor network by blocking all the publicly listed relays. In response, Tor utilizes bridges, which are unlisted relays, as alternative entry points. However, the vulnerabilities of the current bridge mechanism have not been thoroughly investigated yet. We first investigate the vulnerabilities of the current bridge mechanism under different adversarial models. Then we compare the current bridge mechanism with our two proposals and discuss their effects on the security and performance of Tor. \n------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.23(2015) No.5 (online) DOI http://dx.doi.org/10.2197/ipsjjip.23.646 ------------------------------ |
|||||||||
| 論文抄録(英) | ||||||||||
| 内容記述タイプ | Other | |||||||||
| 内容記述 | Tor is the most popular anonymous communication tool in the world. Its anonymity, however, has not been thoroughly evaluated. For example, it is possible for an adversary to restrict access to the Tor network by blocking all the publicly listed relays. In response, Tor utilizes bridges, which are unlisted relays, as alternative entry points. However, the vulnerabilities of the current bridge mechanism have not been thoroughly investigated yet. We first investigate the vulnerabilities of the current bridge mechanism under different adversarial models. Then we compare the current bridge mechanism with our two proposals and discuss their effects on the security and performance of Tor. \n------------------------------ This is a preprint of an article intended for publication Journal of Information Processing(JIP). This preprint should not be cited. This article should be cited as: Journal of Information Processing Vol.23(2015) No.5 (online) DOI http://dx.doi.org/10.2197/ipsjjip.23.646 ------------------------------ |
|||||||||
| 書誌レコードID | ||||||||||
| 収録物識別子タイプ | NCID | |||||||||
| 収録物識別子 | AN00116647 | |||||||||
| 書誌情報 |
情報処理学会論文誌 巻 56, 号 9, 発行日 2015-09-15 |
|||||||||
| ISSN | ||||||||||
| 収録物識別子タイプ | ISSN | |||||||||
| 収録物識別子 | 1882-7764 | |||||||||