Design Principles for Low Latency Anonymous Network Systems Secure against Timing Attacks
暂无分享,去创建一个
[1] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[2] Bernhard Plattner,et al. Practical Anonymity for the Masses with MorphMix , 2004, Financial Cryptography.
[3] Bernhard Plattner,et al. Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.
[4] George Danezis,et al. The Traffic Analysis of Continuous-Time Mixes , 2004, Privacy Enhancing Technologies.
[5] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[6] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[7] Mor Harchol-Balter,et al. Resource discovery in distributed networks , 1999, PODC '99.
[8] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.