Simulation of circuit creation in Tor: Preliminary results
暂无分享,去创建一个
[1] Ali S. Hadi,et al. Finding Groups in Data: An Introduction to Chster Analysis , 1991 .
[2] Joan Feigenbaum,et al. A Model of Onion Routing with Provable Anonymity , 2007, Financial Cryptography.
[3] Lawrence R. Rabiner,et al. A tutorial on hidden Markov models and selected applications in speech recognition , 1989, Proc. IEEE.
[4] George Danezis,et al. Denial of service or denial of security? , 2007, CCS '07.
[5] Rui Xu,et al. Survey of clustering algorithms , 2005, IEEE Transactions on Neural Networks.
[6] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[7] Danny Krizanc,et al. Detecting Denial of Service Attacks in Tor , 2009, Financial Cryptography.
[8] Steven J. Murdoch,et al. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.
[9] Jon M. Kleinberg,et al. An Impossibility Theorem for Clustering , 2002, NIPS.
[10] Facundo Mémoli,et al. Classifying Clustering Schemes , 2010, Foundations of Computational Mathematics.