TOR vs I2P: A comparative study
暂无分享,去创建一个
Muhammad Zohaib | Imran Ahmad | Narayan Debnath | Afzaal Ali | Maria Khan | Muhammad Saddique | Umar Pirzada | N. Debnath | M. Zohaib | Maria Khan | Muhammad Saddique | U. Pirzada | Afzaal Ali | Imran Ahmad
[1] Eric C. Price,et al. Browser-Based Attacks on Tor , 2007, Privacy Enhancing Technologies.
[2] Hannes Federrath,et al. Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[3] Prateek Mittal,et al. ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies , 2009, CCS.
[4] U Moeller,et al. Mixmaster Protocol Version 2 , 2004 .
[5] Ramzi A. Haraty,et al. A collaborative-based approach for avoiding traffic analysis and assuring data integrity in anonymous systems , 2015, Comput. Hum. Behav..
[6] Ramzi A. Haraty,et al. The TOR data communication system: A survey , 2014, 2014 IEEE Symposium on Computers and Communications (ISCC).
[7] Ramzi A. Haraty,et al. I2P Data Communication System , 2011, ICON 2011.
[8] Philip S. Yu,et al. Finding "Who Is Talking to Whom" in VoIP Networks via Progressive Stream Clustering , 2006, Sixth International Conference on Data Mining (ICDM'06).
[9] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[10] Rahul Desai,et al. MANET with Q Routing Protocol , 2013 .
[11] Paul F. Syverson. A peel of onion , 2011, ACSAC '11.
[12] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[13] Ramzi A. Haraty,et al. The TOR data communication system , 2014, Journal of Communications and Networks.
[14] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..