메뉴 건너뛰기




Volumn , Issue , 2005, Pages 183-195

Low-cost traffic analysis of Tor

Author keywords

[No Author keywords available]

Indexed keywords

TCP STREAMS; TRAFFIC-ANALYSIS TECHNIQUES;

EID: 27544454707     PISSN: 10816011     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/SP.2005.12     Document Type: Conference Paper
Times cited : (424)

References (42)
  • 1
    • 35248878897 scopus 로고    scopus 로고
    • On the economics of anonymity
    • R. N. Wright, editor, Financial Cryptography, Springer
    • A. Acquisti, R. Dingledine, and P. F. Syverson:. On the economics of anonymity. In R. N. Wright, editor, Financial Cryptography, volume 2742 of Lecture Notes in Computer Science, pages 84-102. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2742 , pp. 84-102
    • Acquisti, A.1    Dingledine, R.2    Syverson, P.F.3
  • 2
    • 0038148419 scopus 로고    scopus 로고
    • Probabilistic treatment of mixes to hamper traffic analysis
    • Berkeley, CA, USA, May IEEE Computer Society
    • D. Agrawal, D. Kesdogan, and S. Penz. Probabilistic treatment of mixes to hamper traffic analysis. In IEEE Symposium on Security and Privacy, pages 16-27, Berkeley, CA, USA, May 2003. IEEE Computer Society.
    • (2003) IEEE Symposium on Security and Privacy , pp. 16-27
    • Agrawal, D.1    Kesdogan, D.2    Penz, S.3
  • 3
    • 23244463535 scopus 로고    scopus 로고
    • Detecting web bugs with bugnosis: Privacy advocacy through education
    • San Francisco, CA, May
    • A. Alsaid and D. Martin. Detecting web bugs with bugnosis: Privacy advocacy through education. In Privacy Enhancing Technologies (PET 2002), San Francisco, CA, May 2002.
    • (2002) Privacy Enhancing Technologies (PET 2002)
    • Alsaid, A.1    Martin, D.2
  • 4
    • 20444458186 scopus 로고    scopus 로고
    • Freedom systems 2.1 security issues and analysis
    • Zero Knowledge Systems, Inc., May
    • A. Back, I. Goldberg, and A. Shostack. Freedom systems 2.1 security issues and analysis. White paper, Zero Knowledge Systems, Inc., May 2001.
    • (2001) White Paper
    • Back, A.1    Goldberg, I.2    Shostack, A.3
  • 5
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • I. S. Moskowitz, editor, Information Hiding workshop (IH 2001), Springer-Verlag, April
    • A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In I. S. Moskowitz, editor, Information Hiding workshop (IH 2001), volume 2137 of LNCS, pages 245-257. Springer-Verlag, April 2001.
    • (2001) LNCS , vol.2137 , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 6
    • 84937578170 scopus 로고    scopus 로고
    • Web MIXes: A system for anonymous and unobservable Internet access
    • H. Federrath, editor, Designing Privacy Enhancing Technologies, Springer-Verlag, July
    • O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, Designing Privacy Enhancing Technologies, volume 2009 of LNCS, pages 115-129. Springer-Verlag, July 2000.
    • (2000) LNCS , vol.2009 , pp. 115-129
    • Berthold, O.1    Federrath, H.2    Köpsell, S.3
  • 9
    • 20444436625 scopus 로고    scopus 로고
    • Freedom systems 2.0 architecture
    • Zero Knowledge Systems, Inc., December
    • P. Boucher, A. Shostack, and I. Goldberg. Freedom systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc., December 2000.
    • (2000) White Paper
    • Boucher, P.1    Shostack, A.2    Goldberg, I.3
  • 10
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, February 1981.
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-88
    • Chaum, D.1
  • 12
    • 84947289387 scopus 로고    scopus 로고
    • Real world patterns of failure in anonymity systems
    • I. S. Moskowitz, editor, Information Hiding, 4th International Workshop, Springer-Verlag, April
    • R. Clayton, G. Danezis, and M. G. Kuhn. Real world patterns of failure in anonymity systems. In I. S. Moskowitz, editor, Information Hiding, 4th International Workshop, volume 2137 of LNCS, pages 230-245. Springer-Verlag, April 2001.
    • (2001) LNCS , vol.2137 , pp. 230-245
    • Clayton, R.1    Danezis, G.2    Kuhn, M.G.3
  • 13
    • 84904332394 scopus 로고    scopus 로고
    • Statistical disclosure attacks
    • Gritzalis, Vimercati, Samarati, and Katsikas, editors. Athens, May IFIPTC11, Kluwer
    • G. Danezis. Statistical disclosure attacks. In Gritzalis, Vimercati, Samarati, and Katsikas, editors. Security and Privacy in the Age of Uncertainty, (SEC2003), pages 421-426, Athens, May 2003. IFIPTC11, Kluwer.
    • (2003) Security and Privacy in the Age of Uncertainty, (SEC2003) , pp. 421-426
    • Danezis, G.1
  • 14
    • 24344460554 scopus 로고    scopus 로고
    • The traffic analysis of continuous-time mixes
    • Proceedings of Privacy Enhancing Technologies workshop (PET2004), May
    • G. Danezis. The traffic analysis of continuous-time mixes. In Proceedings of Privacy Enhancing Technologies workshop (PET2004), volume 3424 of LNCS, May 2004.
    • (2004) LNCS , vol.3424
    • Danezis, G.1
  • 17
    • 27544449504 scopus 로고    scopus 로고
    • Tor spec
    • The Free Haven Project, October 20
    • R. Dingledine and N. Mathewson. Tor spec. Technical report, The Free Haven Project, October 20 2004. http://www.freehaven.net/tor/cvs/doc/tor-spec. txt.
    • (2004) Technical Report
    • Dingledine, R.1    Mathewson, N.2
  • 21
    • 84910595881 scopus 로고    scopus 로고
    • Introducing tarzan, a pecr-to-peer anonymizing network layer
    • P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, International workshop on Peer-to-Peer Systems (IPTPS), Cambridge, MA, March 2002. Springer-Verlag
    • M. J. Freedman, E. Sit, J. Cates, and R. Morris. Introducing tarzan, a pecr-to-peer anonymizing network layer. In P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, International workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of LNCS, pages 121-129, Cambridge, MA, March 2002. Springer-Verlag.
    • LNCS , vol.2429 , pp. 121-129
    • Freedman, M.J.1    Sit, E.2    Cates, J.3    Morris, R.4
  • 27
    • 35248900308 scopus 로고    scopus 로고
    • Limits of anonymity in open environments
    • F. A. P. Petitcolas, editor, Information Hiding workshop (IH 2002), Noordwijkerhout, The Netherlands, 7-9 October Springer-Verlag
    • D. Kesdogan, D. Agrawal, and S. Penz. Limits of anonymity in open environments. In F. A. P. Petitcolas, editor, Information Hiding workshop (IH 2002), volume 2578 of LNCS, pages 53-69, Noordwijkerhout, The Netherlands, 7-9 October 2002. Springer-Verlag.
    • (2002) LNCS , vol.2578 , pp. 53-69
    • Kesdogan, D.1    Agrawal, D.2    Penz, S.3
  • 33
    • 0011702966 scopus 로고
    • ISDN-mixes: Untraceable communication with very small bandwidth overhead
    • W. Effelsberg, H. W. Meuer, and G. Müller, editors, GI/ITG Conference on Communication in Distributed Systems, Springer-Verlag, February
    • A. Pfltzmann, B. Pfitzmann, and M. Waidner. ISDN-mixes: Untraceable communication with very small bandwidth overhead. In W. Effelsberg, H. W. Meuer, and G. Müller, editors, GI/ITG Conference on Communication in Distributed Systems, volume 267 of Informatik-Fachberichte, pages 451-463. Springer-Verlag, February 1991.
    • (1991) Informatik-fachberichte , vol.267 , pp. 451-463
    • Pfltzmann, A.1    Pfitzmann, B.2    Waidner, M.3
  • 34
    • 1842607847 scopus 로고    scopus 로고
    • R Foundation for Statistical Computing, Vienna, Austria, ISBN 3-900051-07-0
    • R Development Core Team. R: A language and environment for statistical computing. R Foundation for Statistical Computing, Vienna, Austria, 2004. ISBN 3-900051-07-0 http://www.R-project.org/.
    • (2004) R: A Language and Environment for Statistical Computing
  • 36
    • 20444437836 scopus 로고    scopus 로고
    • Introducing MorphMix: Peer-to-peer based anonymous Internet usage with collusion detection
    • Washington, DC, USA, November
    • M. Rennhard and B. Plattner. Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In Workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA, November 2002.
    • (2002) Workshop on Privacy in the Electronic Society (WPES 2002)
    • Rennhard, M.1    Plattner, B.2
  • 39
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • H. Federrath, editor, Designing Privacy Enhancing Technologies, Berkeley, CA, USA, 25-26 July Springer-Verlag
    • P. F. Syverson, G. Tsudik, M. G. Reed, and C. E. Landwehr. Towards an analysis of onion routing security. In H. Federrath, editor, Designing Privacy Enhancing Technologies, volume 2009 of LNCS, pages 96-114, Berkeley, CA, USA, 25-26 July 2000. Springer-Verlag.
    • (2000) LNCS , vol.2009 , pp. 96-114
    • Syverson, P.F.1    Tsudik, G.2    Reed, M.G.3    Landwehr, C.E.4
  • 42
    • 24344450770 scopus 로고    scopus 로고
    • On flow correlation attacks and countermeasures in mix networks
    • Proceedings of Privacy Enhancing Technologies workshop (PET 2004), May
    • Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao. On flow correlation attacks and countermeasures in mix networks. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004), volume 3424 of LNCS, May 2004.
    • (2004) LNCS , vol.3424
    • Zhu, Y.1    Fu, X.2    Graham, B.3    Bettati, R.4    Zhao, W.5


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.