The TOR Data Communication System
Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital informa...
محفوظ في:
| المؤلف الرئيسي: | |
|---|---|
| مؤلفون آخرون: | |
| التنسيق: | article |
| منشور في: |
2014
|
| الوصول للمادة أونلاين: | http://hdl.handle.net/10725/6936 http://dx.doi.org/10.1109/JCN.2014.000071 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://ieeexplore.ieee.org/abstract/document/6896565/ |
| الوسوم: |
إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
|
| _version_ | 1864513481068249088 |
|---|---|
| author | Haraty, Ramzi A. |
| author2 | Zantout, Bassam |
| author2_role | author |
| author_facet | Haraty, Ramzi A. Zantout, Bassam |
| author_role | author |
| dc.creator.none.fl_str_mv | Haraty, Ramzi A. Zantout, Bassam |
| dc.date.none.fl_str_mv | 2014 2018-01-23T12:29:29Z 2018-01-23T12:29:29Z 2018-01-23 |
| dc.identifier.none.fl_str_mv | 1229-2370 http://hdl.handle.net/10725/6936 http://dx.doi.org/10.1109/JCN.2014.000071 Haraty, R. A., & Zantout, B. (2014). The TOR data communication system. Journal of Communications and Networks, 16(4), 415-420. http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://ieeexplore.ieee.org/abstract/document/6896565/ |
| dc.language.none.fl_str_mv | en |
| dc.relation.none.fl_str_mv | Journal of Communications and Networks |
| dc.rights.*.fl_str_mv | info:eu-repo/semantics/openAccess |
| dc.title.none.fl_str_mv | The TOR Data Communication System |
| dc.type.none.fl_str_mv | Article info:eu-repo/semantics/publishedVersion info:eu-repo/semantics/article |
| description | Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful ¿ one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity ¿ the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR. |
| eu_rights_str_mv | openAccess |
| format | article |
| id | LAURepo_5f3ea699ae22179d2e2f9cb8ad09fbbf |
| identifier_str_mv | 1229-2370 Haraty, R. A., & Zantout, B. (2014). The TOR data communication system. Journal of Communications and Networks, 16(4), 415-420. |
| language_invalid_str_mv | en |
| network_acronym_str | LAURepo |
| network_name_str | Lebanese American University repository |
| oai_identifier_str | oai:laur.lau.edu.lb:10725/6936 |
| publishDate | 2014 |
| repository.mail.fl_str_mv | |
| repository.name.fl_str_mv | |
| repository_id_str | |
| spelling | The TOR Data Communication SystemHaraty, Ramzi A.Zantout, BassamSince the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful ¿ one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity ¿ the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.PublishedN/A2018-01-23T12:29:29Z2018-01-23T12:29:29Z20142018-01-23Articleinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/article1229-2370http://hdl.handle.net/10725/6936http://dx.doi.org/10.1109/JCN.2014.000071Haraty, R. A., & Zantout, B. (2014). The TOR data communication system. Journal of Communications and Networks, 16(4), 415-420.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttp://ieeexplore.ieee.org/abstract/document/6896565/enJournal of Communications and Networksinfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/69362021-03-19T10:43:15Z |
| spellingShingle | The TOR Data Communication System Haraty, Ramzi A. |
| status_str | publishedVersion |
| title | The TOR Data Communication System |
| title_full | The TOR Data Communication System |
| title_fullStr | The TOR Data Communication System |
| title_full_unstemmed | The TOR Data Communication System |
| title_short | The TOR Data Communication System |
| title_sort | The TOR Data Communication System |
| url | http://hdl.handle.net/10725/6936 http://dx.doi.org/10.1109/JCN.2014.000071 http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php http://ieeexplore.ieee.org/abstract/document/6896565/ |