The TOR Data Communication System

Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital informa...

وصف كامل

محفوظ في:
التفاصيل البيبلوغرافية
المؤلف الرئيسي: Haraty, Ramzi A. (author)
مؤلفون آخرون: Zantout, Bassam (author)
التنسيق: article
منشور في: 2014
الوصول للمادة أونلاين:http://hdl.handle.net/10725/6936
http://dx.doi.org/10.1109/JCN.2014.000071
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://ieeexplore.ieee.org/abstract/document/6896565/
الوسوم: إضافة وسم
لا توجد وسوم, كن أول من يضع وسما على هذه التسجيلة!
_version_ 1864513481068249088
author Haraty, Ramzi A.
author2 Zantout, Bassam
author2_role author
author_facet Haraty, Ramzi A.
Zantout, Bassam
author_role author
dc.creator.none.fl_str_mv Haraty, Ramzi A.
Zantout, Bassam
dc.date.none.fl_str_mv 2014
2018-01-23T12:29:29Z
2018-01-23T12:29:29Z
2018-01-23
dc.identifier.none.fl_str_mv 1229-2370
http://hdl.handle.net/10725/6936
http://dx.doi.org/10.1109/JCN.2014.000071
Haraty, R. A., & Zantout, B. (2014). The TOR data communication system. Journal of Communications and Networks, 16(4), 415-420.
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://ieeexplore.ieee.org/abstract/document/6896565/
dc.language.none.fl_str_mv en
dc.relation.none.fl_str_mv Journal of Communications and Networks
dc.rights.*.fl_str_mv info:eu-repo/semantics/openAccess
dc.title.none.fl_str_mv The TOR Data Communication System
dc.type.none.fl_str_mv Article
info:eu-repo/semantics/publishedVersion
info:eu-repo/semantics/article
description Since the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful ¿ one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity ¿ the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.
eu_rights_str_mv openAccess
format article
id LAURepo_5f3ea699ae22179d2e2f9cb8ad09fbbf
identifier_str_mv 1229-2370
Haraty, R. A., & Zantout, B. (2014). The TOR data communication system. Journal of Communications and Networks, 16(4), 415-420.
language_invalid_str_mv en
network_acronym_str LAURepo
network_name_str Lebanese American University repository
oai_identifier_str oai:laur.lau.edu.lb:10725/6936
publishDate 2014
repository.mail.fl_str_mv
repository.name.fl_str_mv
repository_id_str
spelling The TOR Data Communication SystemHaraty, Ramzi A.Zantout, BassamSince the day the Internet became a common and reliable mechanism for communication and data transfer, security officers and enthusiasts rallied to enforce security standards on data transported over the globe. Whenever a user tries communicating with another recipient on the Internet, vital information is sent over different networks until the information is dropped, intercepted, or normally reaches the recipient. Critical information traversing networks is usually encrypted. In order to conceal the sender's identity, different implementations have proven successful ¿ one of which is the invention of anonymous networks. This paper thoroughly investigates one of the most common and existing techniques used during data communication for avoiding traffic analysis as well as assuring data integrity ¿ the onion router (TOR). The paper also scrupulously presents the benefits and drawbacks of TOR.PublishedN/A2018-01-23T12:29:29Z2018-01-23T12:29:29Z20142018-01-23Articleinfo:eu-repo/semantics/publishedVersioninfo:eu-repo/semantics/article1229-2370http://hdl.handle.net/10725/6936http://dx.doi.org/10.1109/JCN.2014.000071Haraty, R. A., & Zantout, B. (2014). The TOR data communication system. Journal of Communications and Networks, 16(4), 415-420.http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.phphttp://ieeexplore.ieee.org/abstract/document/6896565/enJournal of Communications and Networksinfo:eu-repo/semantics/openAccessoai:laur.lau.edu.lb:10725/69362021-03-19T10:43:15Z
spellingShingle The TOR Data Communication System
Haraty, Ramzi A.
status_str publishedVersion
title The TOR Data Communication System
title_full The TOR Data Communication System
title_fullStr The TOR Data Communication System
title_full_unstemmed The TOR Data Communication System
title_short The TOR Data Communication System
title_sort The TOR Data Communication System
url http://hdl.handle.net/10725/6936
http://dx.doi.org/10.1109/JCN.2014.000071
http://libraries.lau.edu.lb/research/laur/terms-of-use/articles.php
http://ieeexplore.ieee.org/abstract/document/6896565/