暂无分享,去创建一个
Nick Feamster | Philipp Winter | Laura M. Roberts | Marshini Chetty | Anne Edmundson | Agnieszka Dutkowska-Zuk | Philipp Winter | N. Feamster | A. Edmundson | M. Chetty | Agnieszka Dutkowska-Zuk | Laura M. Roberts
[1] I. Seidman. Interviewing as qualitative research : a guide for researchersin education and the social sciences , 1991 .
[2] Aziz Mohaisen,et al. Measuring the Leakage of Onion at the Root: A measurement of Tor's .onion pseudo-TLD in the global domain name system , 2014, WPES.
[3] Adam J. Berinsky,et al. Separating the Shirkers from the Workers? Making Sure Respondents Pay Attention on Self‐Administered Surveys , 2014 .
[4] Rachel Greenstadt,et al. Privacy, Anonymity, and Perceived Risk in Open Collaboration: A Study of Tor Users and Wikipedians , 2017, CSCW.
[5] Christian Grothoff,et al. The GNU Name System , 2020 .
[6] L. Jean Camp,et al. Why Johnny Can't Blow the Whistle: Identifying and Reducing Usability Issues in Anonymity Systems , 2014 .
[7] W. Keith Edwards,et al. More than meets the eye: transforming the user experience of home network management , 2008, DIS '08.
[8] Juan Caballero,et al. CARONTE: Detecting Location Leaks for Deanonymizing Tor Hidden Services , 2015, CCS.
[9] Nasir D. Memon,et al. New Me: Understanding Expert and Non-Expert Perceptions and Usage of the Tor Anonymity Network , 2017, SOUPS.
[10] Akira Yamada,et al. Self-Confidence Trumps Knowledge: A Cross-Cultural Study of Security Behavior , 2017, CHI.
[11] Ganesh Iyer,et al. A Usability Evaluation of Tor Launcher , 2017, Proc. Priv. Enhancing Technol..
[12] Sunny Consolvo,et al. Rethinking Connection Security Indicators , 2016, SOUPS.
[13] Jeremy Clark,et al. Usability of anonymous web browsing: an examination of Tor interfaces and deployability , 2007, SOUPS '07.
[14] D. Collins. Pretesting survey instruments: An overview of cognitive methods , 2003, Quality of Life Research.
[15] Aziz Mohaisen,et al. Leakage of .onion at the DNS Root: Measurements, Causes, and Countermeasures , 2017, IEEE/ACM Transactions on Networking.
[16] Nick Feamster,et al. Identifying and Characterizing Sybils in the Tor Network , 2016, USENIX Security Symposium.
[17] Ming Li,et al. The Onion Name System , 2017, Proc. Priv. Enhancing Technol..
[18] Paul F. Syverson,et al. Genuine onion: Simple, Fast, Flexible, and Cheap Website Authentication , 2015, ArXiv.