Measuring Tor Relay Popularity
暂无分享,去创建一个
[1] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[2] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[3] Michael Schapira,et al. Measuring and Mitigating AS-level Adversaries Against Tor , 2016, NDSS.
[4] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[5] Micah Sherr,et al. Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.
[6] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.
[7] Weijia Jia,et al. A new cell counter based attack against tor , 2009, CCS.
[8] Steven J. Murdoch,et al. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.
[9] Prateek Mittal,et al. RAPTOR: Routing Attacks on Privacy in Tor , 2015, USENIX Security Symposium.
[10] Ítalo S. Cunha,et al. Investigating Interdomain Routing Policies in the Wild , 2015, Internet Measurement Conference.
[11] Mohsen Imani,et al. Modified Relay Selection and Circuit Selection for Faster Tor , 2016, IET Commun..
[12] Gavin O'Gorman,et al. Large Scale Simulation of Tor: , 2007, ASIAN.
[13] Roger Dingledine,et al. A Practical Congestion Attack on Tor Using Long Paths , 2009, USENIX Security Symposium.
[14] Nick Feamster,et al. Location diversity in anonymity networks , 2004, WPES '04.
[15] Gene Tsudik,et al. Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[16] Roger Dingledine,et al. A Case Study on Measuring Statistical Data in the Tor Anonymity Network , 2010, Financial Cryptography Workshops.