Searched for: subject%3A%22TOR%22
(1 - 15 of 15)
document
Trap, Cyril (author)
Privacy is a human right, yet, people’s behavior on the web is constantly tracked. Tor, an anonymity network, is an effective defence against tracking. However, Tor’s multiplexing of logically independent data streams into a single TCP connection causes issues. Tor with QUIC has been implemented as an alternative with better performance but it...
master thesis 2023
document
van Stam, Just (author)
Begun in 2020, Polkadot is one of the largest blockchains in market capitalization and development. However, privacy on the Polkadot network has yet to be one of the key focus points. Especially unlinkability between the user’s IP address and Polkadot address is essential. Without this unlinkability, users are vulnerable to targeted ads,...
master thesis 2022
document
Heijligers, Jaap (author)
Tor is the most popular tool for anonymous online communication. However, the performance of Tor's volunteer-run network is suboptimal when network congestion occurs. Within Tor, many connections are multiplexed over a single TCP connection between relays, which causes a head-of-line blocking problem, degrading relay performance. In this thesis,...
master thesis 2021
document
Pingle, Anant (author)
Tor is an anonymity network used by a vast number of users in order to protect their privacy on the internet. It should not come as a surprise that this service is also used for abuse such as Denial of service attacks and other malicious activities because of the anonymity it provides. For protecting themselves from this abuse, websites block...
bachelor thesis 2021
document
van der Linden, J.G.M. (author), Mulderij, J. (author), Huisman, B. (author), Den Ouden, Joris W. (author), Van Den Akker, Marjan (author), Hoogeveen, Han (author), de Weerdt, M.M. (author)
When trains are finished with their transportation tasks during the day, they are moved to a shunting yard where they are routed, parked, cleaned, subject to regular maintenance checks and repaired during the night. The resulting Train Unit Shunting and Servicing problem motivates advanced research in planning and scheduling in general since...
conference paper 2021
document
Ren, S. (author), Liu, X. (author), Li, Mingliang (author), Fan, Weiyu (author), Xu, Jian (author), Erkens, S. (author)
It is well known that crumb rubber (CR) and styrene–butadienestyrene (SBS) composite modified asphalt has better rheological and engineering performance. However, it always presents very poor compatibility and storage stability. Meanwhile, Trans-polyoctenamer (TOR) can effectively improve the compatibility and thermal stability of rubber...
journal article 2020
document
Sabée, Wendo (author)
Privacy in the Internet is under attack by governments and companies indiscriminately spying on everyone. The anonymity network Tor is a solution to restore some privacy, however, Tor is slow in both bandwidth and latency. It uses a TCP-based connection to multiplex different circuits between nodes and this causes different independent circuits...
master thesis 2019
document
Geddam, L.G. (author)
For over a decade Darknet has been gaining tremendous popularity proportional to the growing concerns fostered by lack of anonymity and privacy on the World Wide Web. In the recent years, illegitimate use of the Darknet has resulted into investigation in the research community that is analogous to a domino effect further adding to popularity of...
master thesis 2017
document
Stokkink, Q.A. (author)
There are two key components for high throughput distributed anonymizing applications. The first key component is overhead due to message complexity of the utilized algorithms. The second key component is an nonscalable architecture to deal with this high throughput. These issues are compounded by the need for anonymization. Using a state of the...
master thesis 2017
document
Ruigrok, R.J. (author)
The Internet is a large public network of networks and computers. When no countermeasures are taken, all information and activities taking place on the public Internet are subject to traffic analysis, threatening personal freedom and privacy. The first measure to take is securing all transferred information by applying encryption on it, which...
master thesis 2015
document
Plak, R.S. (author)
Throughout the years the Internet became of indispensable value to social, economic and political life. Despite this, the Internet in all its forms and protocols has proven to be extremely sensitive to manipulation by forces in control of the infrastructure of the Internet. Along with the growth of The Internet came the growth of censorship and...
master thesis 2014
document
Tanaskoski, R.J.H. (author)
No scalable privacy-enhancing technologies exists that is capable of anonymous HD video streaming. Our paper discusses the new anonymizer built into Tribler, a social content-sharing client. With anonymous HD-video streaming as the main objective requirements as at least 10 Mbit/s throughput, user bandwidth donations and NAT-traversal are...
master thesis 2014
document
De Vos, M.A. (author), Jagerman, R.M. (author), Versluis, L.F.D. (author)
Tribler is a decentralized peer-to-peer file sharing system. Recently the Tribler development team has introduced anonymous internet communication using a Tor-like protocol in their trial version. The goal of our bachelor project is to port this technology to Android devices. This is a challenging task because cross-compiling the necessary...
bachelor thesis 2014
document
Minter, C. (author)
Many urban and architectural designs bring about a different experience in its visitors than the designer originally intended. Typical architectural qualities such as ‘dynamism’, ‘harmony‘, ‘lightness’ are often guiding themes in the de- sign, but hardly ever experienced in reality when the design has been built. Especially the notorious grand...
master thesis 2013
document
Waluya, S.B. (author), van Horssen, W.T. (author)
report 2002
Searched for: subject%3A%22TOR%22
(1 - 15 of 15)