Network


Latest external collaboration on country level. Dive into details by clicking on the dots.

Hotspot


Dive into the research topics where Karsten Loesing is active.

Publication


Featured researches published by Karsten Loesing.


symposium on applications and the internet | 2008

Performance Measurements and Statistics of Tor Hidden Services

Karsten Loesing; Christian Wilms; Guido Wirtz

Tor (the onion routing) provides a secure mechanism for offering TCP-based services while concealing the hidden servers IP address. In general the acceptance of services strongly relies on its QoS properties. For potential Tor users, provided the anonymity is secured, probably the most important QoS parameter is the time until they finally get response by such a hidden service. Internally, overall response times are constituted by several steps invisible for the user. We provide comprehensive measurements of all relevant latencies and a detailed statistical analysis with special focus on the overall response times. Thereby, we gain valuable insights that enable us to give certain statistical assertions and to suggest improvements in the hidden service protocol and its implementation.


applied cryptography and network security | 2009

Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks

Jörg Lenhard; Karsten Loesing; Guido Wirtz

Being able to access and provide Internet services anonymously is an important mechanism to ensure freedom of speech in vast parts of the world. Offering location-hidden services on the Internet requires complex redirection protocols to obscure the locations and identities of communication partners. The anonymity system Tor supports such a protocol for providing and accessing TCP-based services anonymously. The complexity of the hidden service protocol results in significantly higher response times which is, however, a crucial barrier to user acceptance. This communication overhead becomes even more evident when using limited access networks like cellular phone networks. We provide comprehensive measurements and statistical analysis of the bootstrapping of client processes and different sub-steps of the Tor hidden service protocol under the influence of limited access networks. Thereby, we are able to identify bottlenecks for low-bandwidth access networks and to suggest improvements regarding these networks.


communication system software and middleware | 2007

Implementation of an Instant Messaging System with Focus on Protection of User Presence

Karsten Loesing; Maximilian Röglinger; Christian Wilms; Guido Wirtz

Instant messaging (IM) systems provide its users with the information of which of their contacts are currently online. This presence information supplements text communication of IM systems and is an additional value compared to other synchronous communication media. Unauthorized users could illegally generate online logs of users by exploiting their presence information. Public IM systems lack the reliable means to protect user presence and force the user to trust in the central registry server. In this paper, we propose an IM system, which is explicitly designed to protect user presence without the need of a trusted central registry. We present a Java implementation based on the anonymous communication network Tor [1], the cryptographic suite Bouncy Castle [2], and the distributed hash table OpenDHT [3].


acs ieee international conference on computer systems and applications | 2005

An implementation of reliable group communication based on the peer-to-peer network JXTA

Karsten Loesing; Guido Wirtz

Summary form only given. In this paper we propose a new peer-to-peer protocol for atomic reliable multicast based on view consistency. It is designed for nearly real-time collaborative applications which require consistency of data in a group of participants. A typical example for this is drawing on a shared whiteboard. Collaborations frequently arise in an ad-hoc way in which setting up and operating a dedicated server is not feasible. Thus, our protocol is intended to be used in server-less environments and avoids dependence on central components. We implemented our protocol using the peer-to-peer middleware JXTA for use in TCP/IP-connected networks. This implementation offers its service to other applications via a lean Java API.


financial cryptography | 2010

A case study on measuring statistical data in the tor anonymity network

Karsten Loesing; Steven J. Murdoch; Roger Dingledine


parallel and distributed processing techniques and applications | 2005

Distributed Service Discovery with Guarantees in Peer-to-Peer Networks using Distributed Hashtables.

Sven Kaffille; Karsten Loesing; Guido Wirtz


international parallel and distributed processing symposium | 2006

Privacy-aware presence management in instant messaging systems

Karsten Loesing; Markus Dorsch; Martin Grote; Knut Hildebrandt; Maximilian Röglinger; Matthias Sehr; Christian Wilms; Guido Wirtz


Archive | 2007

Open Chord version 1.0.4 User's Manual

Sven Kalle; Karsten Loesing


usenix security symposium | 2016

Identifying and Characterizing Sybils in the Tor Network

Philipp Winter; Roya Ensafi; Karsten Loesing; Nick Feamster


Archive | 2013

Evaluation of a libutp-based Tor Datagram Implementation

Karsten Loesing; Steven J. Murdoch; Rob Jansen

Collaboration


Dive into the Karsten Loesing's collaboration.

Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Top Co-Authors

Avatar
Researchain Logo
Decentralizing Knowledge