Fingerprinting Attack on the Tor Anonymity System
暂无分享,去创建一个
[1] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[2] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[3] Andrew Hintz,et al. Fingerprinting Websites Using Traffic Analysis , 2002, Privacy Enhancing Technologies.
[4] G Danezis,et al. Statistical disclosure attacks: Traffic confirmation in open environments , 2003 .
[5] Angelos D. Keromytis,et al. Identifying Proxy Nodes in a Tor Anonymization Circuit , 2008, 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems.
[6] Nick Mathewson,et al. Practical Traffic Analysis: Extending and Resisting Statistical Disclosure , 2004, Privacy Enhancing Technologies.
[7] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[8] Xinwen Fu,et al. A New Replay Attack Against Anonymous Communication Networks , 2008, 2008 IEEE International Conference on Communications.
[9] Bernhard Plattner,et al. Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.
[10] Matthew K. Wright,et al. Timing Attacks in Low-Latency Mix Systems (Extended Abstract) , 2004, Financial Cryptography.
[11] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[12] Gene Tsudik,et al. Mixing E-mail with Babel , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[13] Anton Stiglic,et al. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.
[14] Carmela Troncoso,et al. Two-Sided Statistical Disclosure Attack , 2007, Privacy Enhancing Technologies.
[15] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.