The Road Not Taken: Re-thinking the Feasibility of Voice Calling Over Tor
暂无分享,去创建一个
Sambuddho Chakravarty | Mukulika Maity | Piyush Kumar Sharma | Shashwat Chaudhary | Nikhil Hassija | Sambuddho Chakravarty | Mukulika Maity | P. Sharma | Shashwat Chaudhary | Nikhil Hassija
[1] Nicholas Hopper,et al. Shadow: Running Tor in a Box for Accurate and Efficient Experimentation , 2011, NDSS.
[2] Nikita Borisov,et al. EigenSpeed: secure peer-to-peer bandwidth evaluation , 2009, IPTPS.
[3] Ahmad-Reza Sadeghi,et al. Phonion: Practical Protection of Metadata in Telephony Networks , 2017, Proc. Priv. Enhancing Technol..
[4] Mark Handley,et al. SDP: Session Description Protocol , 1998, RFC.
[5] H. Schulzrinne,et al. A Transport Protocol for Real-time Applications , 2010 .
[6] Antony William Rix,et al. Perceptual evaluation of speech quality (PESQ): The new ITU standard for end-to-end speech quality a , 2002 .
[7] Roger Dingledine,et al. Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it , 2009 .
[8] Glenn Van Wallendael,et al. Interpreting MOS scores, when can users see a difference? Understanding user experience differences for photo quality , 2018 .
[9] Andriy Panchenko,et al. Performance Analysis of Anonymous Communication Channels Provided by Tor , 2008, 2008 Third International Conference on Availability, Reliability and Security.
[10] Maimun Rizal. A Study of VoIP Performance in Anonymous Network - The Onion Routing (TOR) , 2014 .
[11] Birgit Pfitzmann,et al. ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.
[12] Henning Schulzrinne,et al. RTP: A Transport Protocol for Real-Time Applications , 1996, RFC.
[13] Micah Sherr,et al. Point Break: A Study of Bandwidth Denial-of-Service Attacks against Tor , 2019, USENIX Security Symposium.
[14] Nikita Borisov,et al. Improving Security and Performance in the Tor Network through Tunable Path Selection , 2011, IEEE Transactions on Dependable and Secure Computing.
[15] Mike Perry,et al. TorFlow: Tor Network Analysis , 2009 .
[16] Lingfen Sun,et al. Speech quality prediction for voice over Internet protocol networks , 2004 .
[17] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[18] Andries P. Hekstra,et al. Perceptual evaluation of speech quality (PESQ)-a new method for speech quality assessment of telephone networks and codecs , 2001, 2001 IEEE International Conference on Acoustics, Speech, and Signal Processing. Proceedings (Cat. No.01CH37221).
[19] Stefan Savage,et al. Herd : A Scalable , Traffic Analysis Resistant Anonymity Network for VoIP Systems , 2015 .
[20] Micah Sherr,et al. Understanding Tor Usage with Privacy-Preserving Measurement , 2018, Internet Measurement Conference.
[21] Irma Syarlina Hj Che Ilias,et al. Performance analysis of audio video codecs over Wi-Fi/WiMAX network , 2014, ICUIMC '14.
[22] Dave Levin,et al. Ting: Measuring and Exploiting Latencies Between All Tor Nodes , 2015, Internet Measurement Conference.
[23] Mark Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[24] Nicholas Hopper,et al. PeerFlow: Secure Load Balancing in Tor , 2017, Proc. Priv. Enhancing Technol..
[25] Nick Feamster,et al. Identifying and Characterizing Sybils in the Tor Network , 2016, USENIX Security Symposium.
[26] Carmela Troncoso,et al. Drac: An Architecture for Anonymous Low-Volume Communications , 2010, Privacy Enhancing Technologies.
[27] Günter Schäfer,et al. Reducing call blocking rates for anonymous voice over IP communications , 2017, 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).