Extensive analysis and large-scale empirical evaluation of tor bridge discovery
暂无分享,去创建一个
Ming Yang | Zhen Ling | Xinwen Fu | Wei Yu | Junzhou Luo
[1] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.
[2] R. Dingledine,et al. Design of a blocking-resistant anonymity system , 2006 .
[3] Nicholas Hopper,et al. Hashing it out in public: common failure modes of DHT-based anonymity schemes , 2009, WPES '09.
[4] Matthew K. Wright,et al. Salsa: a structured approach to large-scale anonymity , 2006, CCS '06.
[5] Thomas Sauerwald,et al. The Weighted Coupon Collector's Problem and Applications , 2009, COCOON.
[6] Nicholas Hopper,et al. On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design , 2009, WPES '09.
[7] Nicholas Hopper,et al. Membership-concealing overlay networks , 2009, CCS.
[8] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[9] Nicholas Hopper,et al. Scalable onion routing with torsk , 2009, CCS.
[10] Paul F. Syverson,et al. As-awareness in Tor path selection , 2009, CCS.
[11] Prateek Mittal,et al. Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems , 2012, TSEC.
[12] G. Danezis,et al. Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity , 2007 .