Achieving Dynamic Communication Path for Anti-Tracking Network
暂无分享,去创建一个
[1] Torsten Braun,et al. A flow trace generator using graph-based traffic classification techniques , 2010, IWCMC.
[2] Aniket Kate,et al. Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two , 2017, 2018 IEEE Symposium on Security and Privacy (SP).
[3] David Wolinsky,et al. Dissent in Numbers: Making Strong Anonymity Scale , 2012, OSDI.
[4] Prateek Mittal,et al. BotGrep: Finding P2P Bots with Structured Graph Analysis , 2010, USENIX Security Symposium.
[5] Mohammad Sadeq Dousti,et al. An Efficient DC-Net Based Anonymous Message Transmission Protocol , 2009 .
[6] A. Perrig,et al. The Sybil attack in sensor networks: analysis & defenses , 2004, Third International Symposium on Information Processing in Sensor Networks, 2004. IPSN 2004.
[7] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[8] Nick Feamster,et al. Identifying and Characterizing Sybils in the Tor Network , 2016, USENIX Security Symposium.
[9] Radu State,et al. BotTrack: Tracking Botnets Using NetFlow and PageRank , 2011, Networking.
[10] Nasir D. Memon,et al. Friends of an enemy: identifying local members of peer-to-peer botnets using mutual contacts , 2010, ACSAC '10.
[11] Rafail Ostrovsky,et al. Near-Linear Unconditionally-Secure Multiparty Computation with a Dishonest Minority , 2012, CRYPTO.
[12] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[13] Björn Scheuermann,et al. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network , 2014, NDSS.
[14] Ming Yang,et al. De-anonymizing and countermeasures in anonymous communication networks , 2015, IEEE Communications Magazine.
[15] Michael Backes,et al. A Survey on Routing in Anonymous Communication Protocols , 2016, ACM Comput. Surv..
[16] Bryan Ford,et al. Dissent: accountable anonymous group messaging , 2010, CCS '10.
[17] Micah Sherr,et al. Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.
[18] Prateek Mittal,et al. RAPTOR: Routing Attacks on Privacy in Tor , 2015, USENIX Security Symposium.
[19] George Danezis,et al. PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks , 2014, CCS.
[20] Andriy Panchenko,et al. Practical anonymous communication on the mobile internet using Tor , 2007, 2007 Third International Conference on Security and Privacy in Communications Networks and the Workshops - SecureComm 2007.
[21] Srinivas Devadas,et al. Riffle: An Efficient Communication System With Strong Anonymity , 2016, Proc. Priv. Enhancing Technol..
[22] Yongzheng Zhang,et al. AppBot: A Novel P2P Botnet Architecture Resistant to Graph-Based Tracking , 2016, 2016 IEEE Trustcom/BigDataSE/ISPA.
[23] Amir Herzberg,et al. Spying in the Dark: TCP and Tor Traffic Analysis , 2012, Privacy Enhancing Technologies.