The Cost of the Path Not Taken
暂无分享,去创建一个
[1] Harsha V. Madhyastha,et al. LASTor: A Low-Latency AS-Aware Tor Client , 2012, IEEE/ACM Transactions on Networking.
[2] Paul F. Syverson,et al. As-awareness in Tor path selection , 2009, CCS.
[3] Arun Venkataramani,et al. iPlane: an information plane for distributed services , 2006, OSDI '06.
[4] Paul Francis,et al. IDMaps: a global internet host distance estimation service , 2001, TNET.
[5] Harsha V. Madhyastha,et al. LASTor: A Low-Latency AS-Aware Tor Client , 2012, S&P 2012.
[6] Akira Yamada,et al. LAP: Lightweight Anonymity and Privacy , 2012, 2012 IEEE Symposium on Security and Privacy.
[7] Krishna P. Gummadi,et al. King: estimating latency between arbitrary internet end hosts , 2002, IMW '02.
[8] Xintong Wang,et al. Vivaldi : A Decentralized Network Coordinate System , 2016 .
[9] Ian Goldberg,et al. Telex: Anticensorship in the Network Infrastructure , 2011, USENIX Security Symposium.
[10] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[11] Nicholas Hopper,et al. Routing around decoys , 2012, CCS.
[12] W. Timothy Strayer,et al. Decoy Routing: Toward Unblockable Internet Communication , 2011, FOCI.
[13] Nikita Borisov,et al. Cirripede: circumvention infrastructure using router redirection with plausible deniability , 2011, CCS '11.
[14] Hui Zhang,et al. Global network positioning: a new approach to network distance prediction , 2002, CCRV.
[15] Micah Sherr,et al. An Empirical Evaluation of Relay Selection in Tor , 2013, NDSS.
[16] Matthew K. Wright,et al. Dovetail: Stronger Anonymity in Next-Generation Internet Routing , 2014, Privacy Enhancing Technologies.
[17] Dmitri V. Krioukov,et al. AS relationships: inference and validation , 2006, CCRV.
[18] Arun Venkataramani,et al. A structural approach to latency prediction , 2006, IMC '06.
[19] Eric Wustrow,et al. TapDance: End-to-Middle Anticensorship without Flow Blocking , 2014, USENIX Security Symposium.
[20] Gene Tsudik,et al. ANDaNA: Anonymous Named Data Networking Application , 2011, NDSS.
[21] Emin Gün Sirer,et al. Meridian: a lightweight network location service without virtual coordinates , 2005, SIGCOMM '05.
[22] Nick Feamster,et al. Location diversity in anonymity networks , 2004, WPES '04.
[23] Vitaly Shmatikov,et al. No Direction Home: The True Cost of Routing Around Decoys , 2014, NDSS.
[24] Micah Sherr,et al. Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.