A Ring Based Onion Circuit for Hidden Services View Full Text


Ontology type: schema:Chapter     


Chapter Info

DATE

2012

AUTHORS

Hakem Beitollahi , Geert Deconinck

ABSTRACT

The capability that a server can hide its location while offering various kinds of services to its clients is called hidden services or location-hiding. Almost previous low-latency anonymous communication systems such as Tor, MorphMix, etc. that can be used to implement hidden services are vulnerable against end-to-end traffic analysis attack. In this paper, we introduce a novel architecture for implementing hidden services which is robust against end-to-end traffic analysis attack. Moreover, our scheme is more robust against various traffic analysis attacks than previous low-latency anonymous communication architectures. More... »

PAGES

13-30

References to SciGraph publications

Book

TITLE

Information Security Technology for Applications

ISBN

978-3-642-29614-7
978-3-642-29615-4

Author Affiliations

Identifiers

URI

http://scigraph.springernature.com/pub.10.1007/978-3-642-29615-4_3

DOI

http://dx.doi.org/10.1007/978-3-642-29615-4_3

DIMENSIONS

https://app.dimensions.ai/details/publication/pub.1008327694


Indexing Status Check whether this publication has been indexed by Scopus and Web Of Science using the SN Indexing Status Tool
Incoming Citations Browse incoming citations for this publication using opencitations.net

JSON-LD is the canonical representation for SciGraph data.

TIP: You can open this SciGraph record using an external JSON-LD service: JSON-LD Playground Google SDTT

[
  {
    "@context": "https://springernature.github.io/scigraph/jsonld/sgcontext.json", 
    "about": [
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/1005", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Communications Technologies", 
        "type": "DefinedTerm"
      }, 
      {
        "id": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/10", 
        "inDefinedTermSet": "http://purl.org/au-research/vocabulary/anzsrc-for/2008/", 
        "name": "Technology", 
        "type": "DefinedTerm"
      }
    ], 
    "author": [
      {
        "affiliation": {
          "alternateName": "KU Leuven", 
          "id": "https://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "Electrical Engineering Department, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Beitollahi", 
        "givenName": "Hakem", 
        "id": "sg:person.014160110027.06", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014160110027.06"
        ], 
        "type": "Person"
      }, 
      {
        "affiliation": {
          "alternateName": "KU Leuven", 
          "id": "https://www.grid.ac/institutes/grid.5596.f", 
          "name": [
            "Electrical Engineering Department, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, Leuven, Belgium"
          ], 
          "type": "Organization"
        }, 
        "familyName": "Deconinck", 
        "givenName": "Geert", 
        "id": "sg:person.01022745130.75", 
        "sameAs": [
          "https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01022745130.75"
        ], 
        "type": "Person"
      }
    ], 
    "citation": [
      {
        "id": "sg:pub.10.1007/3-540-45496-9_18", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1005744446", 
          "https://doi.org/10.1007/3-540-45496-9_18"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/1314333.1314336", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1008975895"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "sg:pub.10.1007/3-540-44702-4_2", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1009453887", 
          "https://doi.org/10.1007/3-540-44702-4_2"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/501983.502002", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1017380707"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/644527.644537", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1021566989"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1145/358549.358563", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1042225009"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/jsac.2003.818807", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1061316513"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.21236/ada465464", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1091751978"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/sp.2005.12", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1094077718"
        ], 
        "type": "CreativeWork"
      }, 
      {
        "id": "https://doi.org/10.1109/sp.2006.24", 
        "sameAs": [
          "https://app.dimensions.ai/details/publication/pub.1095032193"
        ], 
        "type": "CreativeWork"
      }
    ], 
    "datePublished": "2012", 
    "datePublishedReg": "2012-01-01", 
    "description": "The capability that a server can hide its location while offering various kinds of services to its clients is called hidden services or location-hiding. Almost previous low-latency anonymous communication systems such as Tor, MorphMix, etc. that can be used to implement hidden services are vulnerable against end-to-end traffic analysis attack. In this paper, we introduce a novel architecture for implementing hidden services which is robust against end-to-end traffic analysis attack. Moreover, our scheme is more robust against various traffic analysis attacks than previous low-latency anonymous communication architectures.", 
    "editor": [
      {
        "familyName": "Laud", 
        "givenName": "Peeter", 
        "type": "Person"
      }
    ], 
    "genre": "chapter", 
    "id": "sg:pub.10.1007/978-3-642-29615-4_3", 
    "inLanguage": [
      "en"
    ], 
    "isAccessibleForFree": false, 
    "isPartOf": {
      "isbn": [
        "978-3-642-29614-7", 
        "978-3-642-29615-4"
      ], 
      "name": "Information Security Technology for Applications", 
      "type": "Book"
    }, 
    "name": "A Ring Based Onion Circuit for Hidden Services", 
    "pagination": "13-30", 
    "productId": [
      {
        "name": "doi", 
        "type": "PropertyValue", 
        "value": [
          "10.1007/978-3-642-29615-4_3"
        ]
      }, 
      {
        "name": "readcube_id", 
        "type": "PropertyValue", 
        "value": [
          "27ac7b31b594924b2f650b85fbc41304af36b1f62f5a052a488fd5a20c49639c"
        ]
      }, 
      {
        "name": "dimensions_id", 
        "type": "PropertyValue", 
        "value": [
          "pub.1008327694"
        ]
      }
    ], 
    "publisher": {
      "location": "Berlin, Heidelberg", 
      "name": "Springer Berlin Heidelberg", 
      "type": "Organisation"
    }, 
    "sameAs": [
      "https://doi.org/10.1007/978-3-642-29615-4_3", 
      "https://app.dimensions.ai/details/publication/pub.1008327694"
    ], 
    "sdDataset": "chapters", 
    "sdDatePublished": "2019-04-15T20:03", 
    "sdLicense": "https://scigraph.springernature.com/explorer/license/", 
    "sdPublisher": {
      "name": "Springer Nature - SN SciGraph project", 
      "type": "Organization"
    }, 
    "sdSource": "s3://com-uberresearch-data-dimensions-target-20181106-alternative/cleanup/v134/2549eaecd7973599484d7c17b260dba0a4ecb94b/merge/v9/a6c9fde33151104705d4d7ff012ea9563521a3ce/jats-lookup/v90/0000000001_0000000264/records_8687_00000248.jsonl", 
    "type": "Chapter", 
    "url": "http://link.springer.com/10.1007/978-3-642-29615-4_3"
  }
]
 

Download the RDF metadata as:  json-ld nt turtle xml License info

HOW TO GET THIS DATA PROGRAMMATICALLY:

JSON-LD is a popular format for linked data which is fully compatible with JSON.

curl -H 'Accept: application/ld+json' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29615-4_3'

N-Triples is a line-based linked data format ideal for batch operations.

curl -H 'Accept: application/n-triples' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29615-4_3'

Turtle is a human-readable linked data format.

curl -H 'Accept: text/turtle' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29615-4_3'

RDF/XML is a standard XML format for linked data.

curl -H 'Accept: application/rdf+xml' 'https://scigraph.springernature.com/pub.10.1007/978-3-642-29615-4_3'


 

This table displays all metadata directly associated to this object as RDF triples.

104 TRIPLES      23 PREDICATES      37 URIs      20 LITERALS      8 BLANK NODES

Subject Predicate Object
1 sg:pub.10.1007/978-3-642-29615-4_3 schema:about anzsrc-for:10
2 anzsrc-for:1005
3 schema:author N1dd960286a124dce9e01391a57e63ffd
4 schema:citation sg:pub.10.1007/3-540-44702-4_2
5 sg:pub.10.1007/3-540-45496-9_18
6 https://doi.org/10.1109/jsac.2003.818807
7 https://doi.org/10.1109/sp.2005.12
8 https://doi.org/10.1109/sp.2006.24
9 https://doi.org/10.1145/1314333.1314336
10 https://doi.org/10.1145/358549.358563
11 https://doi.org/10.1145/501983.502002
12 https://doi.org/10.1145/644527.644537
13 https://doi.org/10.21236/ada465464
14 schema:datePublished 2012
15 schema:datePublishedReg 2012-01-01
16 schema:description The capability that a server can hide its location while offering various kinds of services to its clients is called hidden services or location-hiding. Almost previous low-latency anonymous communication systems such as Tor, MorphMix, etc. that can be used to implement hidden services are vulnerable against end-to-end traffic analysis attack. In this paper, we introduce a novel architecture for implementing hidden services which is robust against end-to-end traffic analysis attack. Moreover, our scheme is more robust against various traffic analysis attacks than previous low-latency anonymous communication architectures.
17 schema:editor N04432790143f48958169116241e8a6fd
18 schema:genre chapter
19 schema:inLanguage en
20 schema:isAccessibleForFree false
21 schema:isPartOf Nb1fc6cf5f98a42058f537b09ac67af7d
22 schema:name A Ring Based Onion Circuit for Hidden Services
23 schema:pagination 13-30
24 schema:productId N27d10fd74ced425c9fedc2d8184334f8
25 N9958cb5a7bad4c63b56c44fc94cd6228
26 Nae64d355528e4966b928fe12db034b18
27 schema:publisher Nd5e4cf536ab34860b8679d15af232ed0
28 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008327694
29 https://doi.org/10.1007/978-3-642-29615-4_3
30 schema:sdDatePublished 2019-04-15T20:03
31 schema:sdLicense https://scigraph.springernature.com/explorer/license/
32 schema:sdPublisher Nf5ae2144193c4bb599303ba159ee70b4
33 schema:url http://link.springer.com/10.1007/978-3-642-29615-4_3
34 sgo:license sg:explorer/license/
35 sgo:sdDataset chapters
36 rdf:type schema:Chapter
37 N04432790143f48958169116241e8a6fd rdf:first N8e731eada2d049258d08fa7a3578116e
38 rdf:rest rdf:nil
39 N1dd960286a124dce9e01391a57e63ffd rdf:first sg:person.014160110027.06
40 rdf:rest N82f6205a8d854d69b188d71363d84604
41 N27d10fd74ced425c9fedc2d8184334f8 schema:name dimensions_id
42 schema:value pub.1008327694
43 rdf:type schema:PropertyValue
44 N82f6205a8d854d69b188d71363d84604 rdf:first sg:person.01022745130.75
45 rdf:rest rdf:nil
46 N8e731eada2d049258d08fa7a3578116e schema:familyName Laud
47 schema:givenName Peeter
48 rdf:type schema:Person
49 N9958cb5a7bad4c63b56c44fc94cd6228 schema:name readcube_id
50 schema:value 27ac7b31b594924b2f650b85fbc41304af36b1f62f5a052a488fd5a20c49639c
51 rdf:type schema:PropertyValue
52 Nae64d355528e4966b928fe12db034b18 schema:name doi
53 schema:value 10.1007/978-3-642-29615-4_3
54 rdf:type schema:PropertyValue
55 Nb1fc6cf5f98a42058f537b09ac67af7d schema:isbn 978-3-642-29614-7
56 978-3-642-29615-4
57 schema:name Information Security Technology for Applications
58 rdf:type schema:Book
59 Nd5e4cf536ab34860b8679d15af232ed0 schema:location Berlin, Heidelberg
60 schema:name Springer Berlin Heidelberg
61 rdf:type schema:Organisation
62 Nf5ae2144193c4bb599303ba159ee70b4 schema:name Springer Nature - SN SciGraph project
63 rdf:type schema:Organization
64 anzsrc-for:10 schema:inDefinedTermSet anzsrc-for:
65 schema:name Technology
66 rdf:type schema:DefinedTerm
67 anzsrc-for:1005 schema:inDefinedTermSet anzsrc-for:
68 schema:name Communications Technologies
69 rdf:type schema:DefinedTerm
70 sg:person.01022745130.75 schema:affiliation https://www.grid.ac/institutes/grid.5596.f
71 schema:familyName Deconinck
72 schema:givenName Geert
73 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.01022745130.75
74 rdf:type schema:Person
75 sg:person.014160110027.06 schema:affiliation https://www.grid.ac/institutes/grid.5596.f
76 schema:familyName Beitollahi
77 schema:givenName Hakem
78 schema:sameAs https://app.dimensions.ai/discover/publication?and_facet_researcher=ur.014160110027.06
79 rdf:type schema:Person
80 sg:pub.10.1007/3-540-44702-4_2 schema:sameAs https://app.dimensions.ai/details/publication/pub.1009453887
81 https://doi.org/10.1007/3-540-44702-4_2
82 rdf:type schema:CreativeWork
83 sg:pub.10.1007/3-540-45496-9_18 schema:sameAs https://app.dimensions.ai/details/publication/pub.1005744446
84 https://doi.org/10.1007/3-540-45496-9_18
85 rdf:type schema:CreativeWork
86 https://doi.org/10.1109/jsac.2003.818807 schema:sameAs https://app.dimensions.ai/details/publication/pub.1061316513
87 rdf:type schema:CreativeWork
88 https://doi.org/10.1109/sp.2005.12 schema:sameAs https://app.dimensions.ai/details/publication/pub.1094077718
89 rdf:type schema:CreativeWork
90 https://doi.org/10.1109/sp.2006.24 schema:sameAs https://app.dimensions.ai/details/publication/pub.1095032193
91 rdf:type schema:CreativeWork
92 https://doi.org/10.1145/1314333.1314336 schema:sameAs https://app.dimensions.ai/details/publication/pub.1008975895
93 rdf:type schema:CreativeWork
94 https://doi.org/10.1145/358549.358563 schema:sameAs https://app.dimensions.ai/details/publication/pub.1042225009
95 rdf:type schema:CreativeWork
96 https://doi.org/10.1145/501983.502002 schema:sameAs https://app.dimensions.ai/details/publication/pub.1017380707
97 rdf:type schema:CreativeWork
98 https://doi.org/10.1145/644527.644537 schema:sameAs https://app.dimensions.ai/details/publication/pub.1021566989
99 rdf:type schema:CreativeWork
100 https://doi.org/10.21236/ada465464 schema:sameAs https://app.dimensions.ai/details/publication/pub.1091751978
101 rdf:type schema:CreativeWork
102 https://www.grid.ac/institutes/grid.5596.f schema:alternateName KU Leuven
103 schema:name Electrical Engineering Department, Katholieke Universiteit Leuven, Kasteelpark Arenberg 10, Leuven, Belgium
104 rdf:type schema:Organization
 




Preview window. Press ESC to close (or click here)


...