Optimizing Packet Scheduling and Path Selection for Anonymous Voice Calls
暂无分享,去创建一个
[1] John C. Mitchell,et al. Evaluating the privacy properties of telephone metadata , 2016, Proceedings of the National Academy of Sciences.
[2] Harsha V. Madhyastha,et al. LASTor: A Low-Latency AS-Aware Tor Client , 2012, IEEE/ACM Transactions on Networking.
[3] Carmela Troncoso,et al. TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer , 2018, 2018 IEEE European Symposium on Security and Privacy (EuroS&P).
[4] Andriy Panchenko,et al. Path Selection Metrics for Performance-Improved Onion Routing , 2009, 2009 Ninth Annual International Symposium on Applications and the Internet.
[5] Peter Druschel,et al. Herd: A Scalable, Traffic Analysis Resistant Anonymity Network for VoIP Systems , 2015, SIGCOMM.
[6] Nicholas Hopper,et al. Secure latency estimation with treeple , 2010, CCS '10.
[7] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[8] Sambuddho Chakravarty,et al. The Road Not Taken: Re-thinking the Feasibility of Voice Calling Over Tor , 2020, Proc. Priv. Enhancing Technol..
[9] Ulrich K. Sorger,et al. Untraceable VoIP Communication based on DC-nets , 2016, ArXiv.
[10] David Schatz,et al. Large-scale Latency Measurements in the Tor Network , 2021 .
[11] Sushil Jajodia,et al. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[12] Micah Sherr,et al. Scalable Link-Based Relay Selection for Anonymous Routing , 2009, Privacy Enhancing Technologies.
[13] Aniket Kate,et al. Anonymity Trilemma: Strong Anonymity, Low Bandwidth Overhead, Low Latency - Choose Two , 2017, 2018 IEEE Symposium on Security and Privacy (SP).
[14] Tao Wang,et al. Congestion-Aware Path Selection for Tor , 2012, Financial Cryptography.
[15] Nicholas Hopper,et al. Accurate and Provably Secure Latency Estimation with Treeple , 2011, NDSS.
[16] Stefan Savage,et al. Herd : A Scalable , Traffic Analysis Resistant Anonymity Network for VoIP Systems , 2015 .
[17] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[18] Martin Schmiedecker,et al. NavigaTor: Finding Faster Paths to Anonymity , 2016, 2016 IEEE European Symposium on Security and Privacy (EuroS&P).
[19] Günter Schäfer,et al. Reducing call blocking rates for anonymous voice over IP communications , 2017, 2017 9th International Congress on Ultra Modern Telecommunications and Control Systems and Workshops (ICUMT).
[20] Aaron Johnson,et al. FlashFlow: A Secure Speed Test for Tor , 2020, 2021 IEEE 41st International Conference on Distributed Computing Systems (ICDCS).
[21] Younchan Jung,et al. Burst packet loss and enhanced packet loss-based quality model for mobile voice-over Internet protocol applications , 2014, IET Commun..
[22] Nickolai Zeldovich,et al. Yodel: strong metadata security for voice calls , 2019, SOSP.
[23] Günter Schäfer,et al. Hydra: Practical Metadata Security for Contact Discovery, Messaging, and Dialing , 2021, International Conference on Information Systems Security and Privacy.
[24] Danny Dolev,et al. On the security of public key protocols , 1981, 22nd Annual Symposium on Foundations of Computer Science (sfcs 1981).