-
1
-
-
79959681025
-
Low-resource routing attacks against tor
-
ACM Press, New York
-
Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against tor. In: WPES '07: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 11-20. ACM Press, New York (2007)
-
(2007)
WPES '07: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society
, pp. 11-20
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
2
-
-
50249119735
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
ACM Press, New York
-
Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? How attacks on reliability can compromise anonymity. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 92-102. ACM Press, New York (2007)
-
(2007)
CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 92-102
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
3
-
-
85084161366
-
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 303-320 (2004)
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium, August 2004, pp. 303-320 (2004)
-
-
-
-
4
-
-
33846288517
-
-
Levine, B.N., Reiter, M.K., Wang, C., Wright, M.K.: Timing attacks in low-latency mix-based systems. In: Juels, A. (ed.) FC 2004. LNCS, 3110, pp. 251-265. Springer, Heidelberg (2004)
-
Levine, B.N., Reiter, M.K., Wang, C., Wright, M.K.: Timing attacks in low-latency mix-based systems. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 251-265. Springer, Heidelberg (2004)
-
-
-
-
6
-
-
84937565289
-
Towards an analysis of onion routing security
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Syverson, P., Tsudik, G., Reed, M., Landwehr, C.: Towards an analysis of onion routing security. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 96-114. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
7
-
-
85180737609
-
An analysis of the degradation of anonymous protocols
-
Internet Society February
-
Wright, M., Adler, M., Levine, B.N., Shields, C.: An analysis of the degradation of anonymous protocols. In: Proceedings of the Network and Distributed System Security Symposium (NDSS 2002), pp. 38-50. Internet Society (February 2002)
-
(2002)
Proceedings of the Network and Distributed System Security Symposium (NDSS
, pp. 38-50
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
8
-
-
84954435745
-
Defending anonymous communication against passive logging attacks
-
IEEE Computer Society Press, Los Alamitos
-
Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending anonymous communication against passive logging attacks. In: Proceedings of the 2003 Symposium on Security and Privacy, pp. 28-41. IEEE Computer Society Press, Los Alamitos (2003)
-
(2003)
Proceedings of the 2003 Symposium on Security and Privacy
, pp. 28-41
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
|