tor

(redirected from Onion routing)
Also found in: Thesaurus, Medical, Acronyms, Encyclopedia, Wikipedia.

tor

 (tôr)
n.
1. A high rock or pile of rocks on the top of a hill.
2. A rocky peak or hill.

[Middle English, from Old English torr, probably of Celtic origin.]

tor

(tɔː)
n
1. (Physical Geography) a high hill, esp a bare rocky one
2. (Physical Geography) chiefly Southwest English a prominent rock or heap of rocks, esp on a hill
[Old English torr, probably of Celtic origin; compare Scottish Gaelic torr pile, Welsh twr]

tor

(tɔr)

n.
a rocky pinnacle; a peak of a rocky mountain or hill.
[before 900; Old English torr < Celtic; compare Irish tor, Welsh twr heap, pile]

-tor

a suffix found in loanwords from Latin, forming personal agent nouns from verbs and, less commonly, from nouns: janitor; orator; victor.
[< Latin -tor (s. -tōr-), c. Greek -tōr (s. -tor-), Skt -tar-]
ThesaurusAntonymsRelated WordsSynonymsLegend:
Noun1.tor - a prominent rock or pile of rocks on a hilltor - a prominent rock or pile of rocks on a hill
rock, stone - a lump or mass of hard consolidated mineral matter; "he threw a rock at me"
2.tor - a high rocky hilltor - a high rocky hill      
hill - a local and well-defined elevation of the land; "they loved to roam the hills of West Virginia"
Translations

tor

[tɔːʳ] Ncolina f abrupta y rocosa, pico m pequeño (esp en el suroeste de Inglaterra)

tor

n (esp in names) → Berg m
References in periodicals archive ?
Several routing protocols aim at providing anonymity to users of wireless networks with an onion routing approach.
In instances where frameworks are applied to networks and databases, for example the inference controls and encryption framework that are implemented on network flow recording and traffic analysis, onion routing, cryptographic approach on DNA forensic databases, homomorphic and commutative encryption, and sensor webs protection framework, the solutions provided are usually effective in tackling situational crisis on data privacy, and users usually do not know such solutions are implemented to protect their data from being exploited.
Anonymized email based on encryption and the layered connection approach of the Tor protocol, and Onion routing, have been used successfully over the last couple of decades.
TOR is quite different from the regular Onion Routing and to protect integrity of a message it uses enumerating packages and labeling streams.