Congestion-Aware Path Selection for Tor
暂无分享,去创建一个
[1] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[2] Keith W. Ross,et al. Waiting for Anonymity: Understanding Delays in the Tor Overlay , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).
[3] Micah Adler,et al. The predecessor attack: An analysis of a threat to anonymous communications systems , 2004, TSEC.
[4] Micah Sherr,et al. Scalable Link-Based Relay Selection for Anonymous Routing , 2009, Privacy Enhancing Technologies.
[5] Roger Dingledine,et al. Performance Improvements on Tor or, Why Tor is slow and what we're going to do about it , 2009 .
[6] Mike Perry,et al. TorFlow: Tor Network Analysis , 2009 .
[7] Nicholas Hopper,et al. How much anonymity does network latency leak? , 2010, ACM Trans. Inf. Syst. Secur..
[8] Micah Sherr,et al. ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation , 2011, CSET.
[9] Nikita Borisov,et al. A Tune-up for Tor: Improving Security and Performance in the Tor Network , 2008, NDSS.
[10] Nick Mathewson,et al. Anonymity Loves Company: Usability and the Network Effect , 2006, WEIS.
[11] Fiona Fui-Hoon Nah,et al. A study on tolerable waiting time: how long are Web users willing to wait? , 2004, AMCIS.
[12] Roger Dingledine,et al. Reliable MIX Cascade Networks through Reputation , 2002, Financial Cryptography.
[13] Micah Sherr,et al. A3: An Extensible Platform for Application-Aware Anonymity , 2010, NDSS.
[14] Krishna P. Gummadi,et al. King: estimating latency between arbitrary internet end hosts , 2002, IMW '02.
[15] Ian Goldberg,et al. DefenestraTor: Throwing Out Windows in Tor , 2011, PETS.
[16] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[17] Nikita Borisov,et al. EigenSpeed: secure peer-to-peer bandwidth evaluation , 2009, IPTPS.
[18] Dirk Grunwald,et al. Shining Light in Dark Places: Understanding the Tor Network , 2008, Privacy Enhancing Technologies.
[19] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[20] Sajal K. Das,et al. gPath: A Game-Theoretic Path Selection Algorithm to Protect Tor's Anonymity , 2010, GameSec.
[21] Krishna P. Gummadi,et al. King: estimating latency between arbitrary internet end hosts , 2002, IMW '02.
[22] Paul F. Syverson,et al. As-awareness in Tor path selection , 2009, CCS.
[23] Roger Dingledine,et al. A Practical Congestion Attack on Tor Using Long Paths , 2009, USENIX Security Symposium.
[24] Andriy Panchenko,et al. Path Selection Metrics for Performance-Improved Onion Routing , 2009, 2009 Ninth Annual International Symposium on Applications and the Internet.
[25] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.
[26] Ian Goldberg,et al. Improving Tor using a TCP-over-DTLS Tunnel , 2009, USENIX Security Symposium.