暂无分享,去创建一个
[1] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[2] It Informatics,et al. Border Gateway Protocol , 2013 .
[3] Brighten Godfrey,et al. Pathlet routing , 2009, SIGCOMM '09.
[4] Dino Farinacci,et al. The Locator/ID Separation Protocol (LISP) , 2009, RFC.
[5] Paul E. Hoffman,et al. Internet Key Exchange Protocol Version 2 (IKEv2) , 2010, RFC.
[6] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[7] Amogh Dhamdhere,et al. Open peering by Internet transit providers: Peer preference or peer pressure? , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[8] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[9] Nikita Borisov,et al. A Tune-up for Tor: Improving Security and Performance in the Tor Network , 2008, NDSS.
[10] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[11] G. G. Stokes. "J." , 1890, The New Yale Book of Quotations.
[12] Xiaowei Yang,et al. NIRA: a new Internet routing architecture , 2003, FDNA '03.
[13] Micah Adler,et al. Passive-Logging Attacks Against Anonymous Communications Systems , 2008, TSEC.
[14] S. M. Bellovin,et al. Security problems in the TCP/IP protocol suite , 1989, CCRV.
[15] Gene Tsudik,et al. ANDaNA: Anonymous Named Data Networking Application , 2011, NDSS.
[16] Steven J. Murdoch,et al. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.
[17] Jürgen Falb,et al. The Internet Protocol , 2005, The Industrial Information Technology Handbook.
[18] Susanne Smit,et al. Locator/ID Separation Protocol , 2015 .
[19] Paul F. Syverson,et al. LIRA: Lightweight Incentivized Routing for Anonymity , 2013, NDSS.
[20] Xin Zhang,et al. SCION: Scalability, Control, and Isolation on Next-Generation Networks , 2011, 2011 IEEE Symposium on Security and Privacy.
[21] Patrick S. Ryan,et al. A Primer on Internet Exchange Points for Policymakers and Non-Engineers , 2012 .
[22] Prateek Mittal,et al. Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting , 2011, CCS '11.
[23] Raj Jain,et al. Architectures for the future networks and the next generation Internet: A survey , 2011, Comput. Commun..
[24] Roger Dingledine,et al. On the Economics of Anonymity , 2003, Financial Cryptography.
[25] Vasileios Giotsas,et al. Valley-free violation in Internet routing — Analysis based on BGP Community data , 2012, 2012 IEEE International Conference on Communications (ICC).
[26] Lixin Gao. On inferring autonomous system relationships in the internet , 2001, TNET.
[27] Leslie Lamport,et al. Password authentication with insecure communication , 1981, CACM.
[28] A. Pfitzmann,et al. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management , 2010 .
[29] Susan Hares,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[30] R. Stephenson. A and V , 1962, The British journal of ophthalmology.
[31] Roger Dingledine,et al. A Practical Congestion Attack on Tor Using Long Paths , 2009, USENIX Security Symposium.
[32] Xiaowei Yang,et al. Source selectable path diversity via routing deflections , 2006, SIGCOMM.
[33] Nicholas Hopper,et al. How much anonymity does network latency leak? , 2007, TSEC.
[34] George Danezis,et al. Denial of service or denial of security? , 2007, CCS '07.
[35] Marcel Dischinger,et al. Characterizing residential broadband networks , 2007, IMC '07.
[36] Vijay Erramilli,et al. Detecting price and search discrimination on the internet , 2012, HotNets-XI.
[37] Paul F. Syverson,et al. Why I'm Not an Entropist , 2009, Security Protocols Workshop.
[38] Matthew K. Wright,et al. Timing Attacks in Low-Latency Mix Systems (Extended Abstract) , 2004, Financial Cryptography.
[39] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[40] Sushil Jajodia,et al. On the anonymity and traceability of peer-to-peer VoIP calls , 2006, IEEE Network.
[41] Ibrahim Matta,et al. BRITE: an approach to universal topology generation , 2001, MASCOTS 2001, Proceedings Ninth International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems.
[42] Nikita Borisov,et al. RAINBOW: A Robust And Invisible Non-Blind Watermark for Network Flows , 2009, NDSS.
[43] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[44] Rui Wang,et al. Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow , 2010, 2010 IEEE Symposium on Security and Privacy.
[45] Andrew Hintz. Fingerprinting Websites Using TraÆ Analysis , 2002 .
[46] Akira Yamada,et al. LAP: Lightweight Anonymity and Privacy , 2012, 2012 IEEE Symposium on Security and Privacy.
[47] Roger Dingledine,et al. Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it , 2009 .
[48] Chris Jay Hoofnagle,et al. Flash Cookies and Privacy , 2009, AAAI Spring Symposium: Intelligent Information Privacy Management.
[49] B. Bhattacharjee,et al. Postmodern Internetwork Architecture , 2006 .
[50] John C. Mitchell,et al. Third-Party Web Tracking: Policy and Technology , 2012, 2012 IEEE Symposium on Security and Privacy.
[51] Andriy Panchenko,et al. Performance Analysis of Anonymous Communication Channels Provided by Tor , 2008, 2008 Third International Conference on Availability, Reliability and Security.