暂无分享,去创建一个
[1] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[2] Matthew K. Wright,et al. Salsa: a structured approach to large-scale anonymity , 2006, CCS '06.
[3] George Danezis,et al. Denial of service or denial of security? , 2007, CCS '07.
[4] Micah Adler,et al. Defending anonymous communications against passive logging attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[5] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.
[6] Nitesh Saxena,et al. On the Privacy of Web Search Based on Query Obfuscation: A Case Study of TrackMeNot , 2010, Privacy Enhancing Technologies.
[7] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[8] Danny Krizanc,et al. Detecting Denial of Service Attacks in Tor , 2009, Financial Cryptography.
[9] Danny Krizanc,et al. Simulation of circuit creation in Tor: Preliminary results , 2011, PETS 2011.
[10] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[11] Gene Tsudik,et al. Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[12] Riccardo Bettati,et al. On Flow Correlation Attacks and Countermeasures in Mix Networks , 2004, Privacy Enhancing Technologies.
[13] Matthew K. Wright,et al. Timing Attacks in Low-Latency Mix Systems (Extended Abstract) , 2004, Financial Cryptography.
[14] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[15] Antony I. T. Rowstron,et al. Cashmere: resilient anonymous routing , 2005, NSDI.
[16] Micah Adler,et al. An Analysis of the Degradation of Anonymous Protocols , 2002, NDSS.
[17] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.