Measuring Tor Relay Popularity

[1]  George Danezis,et al.  Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).

[2]  Nick Mathewson,et al.  Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.

[3]  Michael Schapira,et al.  Measuring and Mitigating AS-level Adversaries Against Tor , 2016, NDSS.

[4]  Paul F. Syverson,et al.  Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).

[5]  Micah Sherr,et al.  Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.

[6]  Dirk Grunwald,et al.  Low-resource routing attacks against tor , 2007, WPES '07.

[7]  Weijia Jia,et al.  A new cell counter based attack against tor , 2009, CCS.

[8]  Steven J. Murdoch,et al.  Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.

[9]  Prateek Mittal,et al.  RAPTOR: Routing Attacks on Privacy in Tor , 2015, USENIX Security Symposium.

[10]  Ítalo S. Cunha,et al.  Investigating Interdomain Routing Policies in the Wild , 2015, Internet Measurement Conference.

[11]  Mohsen Imani,et al.  Modified Relay Selection and Circuit Selection for Faster Tor , 2016, IET Commun..

[12]  Gavin O'Gorman,et al.  Large Scale Simulation of Tor: , 2007, ASIAN.

[13]  Roger Dingledine,et al.  A Practical Congestion Attack on Tor Using Long Paths , 2009, USENIX Security Symposium.

[14]  Nick Feamster,et al.  Location diversity in anonymity networks , 2004, WPES '04.

[15]  Gene Tsudik,et al.  Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.

[16]  Roger Dingledine,et al.  A Case Study on Measuring Statistical Data in the Tor Anonymity Network , 2010, Financial Cryptography Workshops.