TightRope: Towards Optimal Load-balancing of Paths in Anonymous Networks
暂无分享,去创建一个
Geir E. Dullerud | Nikita Borisov | Sayan Mitra | Hussein Sibai | Hussein Darir | G. Dullerud | N. Borisov | Hussein Sibai | S. Mitra | Hussein Darir
[1] Cynthia Dwork,et al. Differential Privacy , 2006, Encyclopedia of Cryptography and Security.
[2] Ian Goldberg,et al. Performance and Security Improvements for Tor , 2016, IACR Cryptol. ePrint Arch..
[3] Roger Dingledine,et al. Methodically Modeling the Tor Network , 2012, CSET.
[4] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[5] Steven J. Murdoch,et al. Optimising node selection probabilities in multi-hop M/D/1 queuing networks to reduce latency of Tor , 2014 .
[6] Kobbi Nissim,et al. Simultaneous Private Learning of Multiple Concepts , 2015, ITCS.
[7] Ian Goldberg,et al. The Path Less Travelled: Overcoming Tor's Bottlenecks with Traffic Splitting , 2013, Privacy Enhancing Technologies.
[8] Mike Perry,et al. TorFlow: Tor Network Analysis , 2009 .
[9] Christian Decker,et al. Information propagation in the Bitcoin network , 2013, IEEE P2P 2013 Proceedings.
[10] Dimitri P. Bertsekas,et al. Data networks (2nd ed.) , 1992 .
[11] E. L. Hahne,et al. Round-Robin Scheduling for Max-Min Fairness in Data Networks , 1991, IEEE J. Sel. Areas Commun..
[12] Nicholas Hopper,et al. PeerFlow: Secure Load Balancing in Tor , 2017, Proc. Priv. Enhancing Technol..
[13] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[14] Nikita Borisov,et al. EigenSpeed: secure peer-to-peer bandwidth evaluation , 2009, IPTPS.
[15] Tao Wang,et al. Congestion-Aware Path Selection for Tor , 2012, Financial Cryptography.
[16] Gene Tsudik,et al. Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[17] Nikita Borisov,et al. Improving Security and Performance in the Tor Network through Tunable Path Selection , 2011, IEEE Transactions on Dependable and Secure Computing.
[18] Nikita Borisov,et al. A Tune-up for Tor: Improving Security and Performance in the Tor Network , 2008, NDSS.
[19] Rob Jansen,et al. Safely Measuring Tor , 2016, CCS.
[20] Salil P. Vadhan,et al. The Complexity of Differential Privacy , 2017, Tutorials on the Foundations of Cryptography.
[21] Cynthia Dwork,et al. Differential privacy and robust statistics , 2009, STOC '09.