Changing of the guards: a framework for understanding and improving entry guard selection in tor
暂无分享,去创建一个
Ian Goldberg | Roger Dingledine | Kevin S. Bauer | Mashael AlSabah | Tariq Elahi | I. Goldberg | Mashael AlSabah | T. Elahi | Roger Dingledine | Mashael Alsabah
[1] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[2] George Danezis,et al. Bridging and Fingerprinting: Epistemic Attacks on Route Selection , 2008, Privacy Enhancing Technologies.
[3] George Danezis,et al. Denial of service or denial of security? , 2007, CCS '07.
[4] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[5] Paul F. Syverson,et al. As-awareness in Tor path selection , 2009, CCS.
[6] Micah Adler,et al. The predecessor attack: An analysis of a threat to anonymous communications systems , 2004, TSEC.
[7] Micah Adler,et al. Defending anonymous communications against passive logging attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[8] Robert N. M. Watson,et al. Metrics for Security and Performance in Low-Latency Anonymity Systems , 2008, Privacy Enhancing Technologies.
[9] Steven J. Murdoch,et al. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.
[10] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.
[11] Mike Perry,et al. TorFlow: Tor Network Analysis , 2009 .
[12] Eric C. Price,et al. Browser-Based Attacks on Tor , 2007, Privacy Enhancing Technologies.
[13] George Danezis,et al. The Traffic Analysis of Continuous-Time Mixes , 2004, Privacy Enhancing Technologies.