Cyber anonymity based on software-defined networking and Onion Routing (SOR)
暂无分享,去创建一个
C. Edward Chow | Amer Aljaedi | Naif Alamri | Abdelhamid Elgzil | Amer Aljaedi | Abdelhamid Elgzil | Naif Alamri | C. Edward Chow
[1] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[2] Angelos Stavrou,et al. PAR: Payment for Anonymous Routing , 2008, Privacy Enhancing Technologies.
[3] Harsha V. Madhyastha,et al. LASTor: A Low-Latency AS-Aware Tor Client , 2012, IEEE/ACM Transactions on Networking.
[4] Radu Sion,et al. XPay: practical anonymous payments for tor routing and other networked services , 2009, WPES '09.
[5] Michael J. Freedman,et al. Hiding Amongst the Clouds: A Proposal for Cloud-based Onion Routing , 2011, FOCI.
[6] Lorrie Faith Cranor,et al. Internet privacy , 1999, CACM.
[7] R Wacks. Privacy and Anonymity , 2000 .
[8] Björn Scheuermann,et al. The Sniper Attack: Anonymously Deanonymizing and Disabling the Tor Network , 2014, NDSS.
[9] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[10] Ghassan O. Karame,et al. Towards a Richer Set of Services in Software-Defined Networks , 2014 .
[11] Kamelia Nikolova,et al. SOFTWARE DEFINED NETWORKS AND OPENFLOW: A SURVEY , 2018, 18th International Multidisciplinary Scientific GeoConference SGEM2018, Nano, Bio and Green � Technologies for a Sustainable Future.
[12] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[13] Roger Dingledine,et al. Methodically Modeling the Tor Network , 2012, CSET.
[14] James H. Burrows,et al. Secure Hash Standard , 1995 .
[15] Quynh H. Dang,et al. Secure Hash Standard | NIST , 2015 .
[16] Adrian Yanes,et al. Privacy and Anonymity , 2014, ArXiv.
[17] Min Zhu,et al. B4: experience with a globally-deployed software defined wan , 2013, SIGCOMM.