-
1
-
-
79959681025
-
Low-resource routing attacks against Tor
-
Washington, DC, USA, October
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-resource routing attacks against Tor. In Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA, October 2007.
-
(2007)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
2
-
-
84876393159
-
As relationships: Inference and validation
-
X. Dimitropoulos, D. Krioukov, M. Fomenkov, B. Huffaker, Y. Hyun, kc claffy, and G. Riley. As relationships: Inference and validation. ACM SIGCOMM Computer Communication Review, 37:29, 2007.
-
(2007)
ACM SIGCOMM Computer Communication Review
, vol.37
, pp. 29
-
-
Dimitropoulos, X.1
Krioukov, D.2
Fomenkov, M.3
Huffaker, B.4
Hyun, Y.5
kc claffy6
Riley, G.7
-
6
-
-
0035704351
-
On inferring autonomous system relationships in the internet
-
L. Gao. On inferring autonomous system relationships in the internet. IEEE/ACM Transactions on Networking, 9:733-745, 2000.
-
(2000)
IEEE/ACM Transactions on Networking
, vol.9
, pp. 733-745
-
-
Gao, L.1
-
7
-
-
84955557456
-
Hiding routing information
-
R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, Springer-Verlag, May
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Hiding routing information. In R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, pages 137-150. Springer-Verlag, LNCS 1174, May 1996.
-
(1996)
LNCS
, vol.1174
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
8
-
-
33846288517
-
Timing attacks in low-latency mix-based systems
-
A. Juels, editor, Proceedings of Financial Cryptography FC '04, Springer-Verlag, February
-
B. N. Levine, M. K. Reiter, C. Wang, and M. K. Wright. Timing attacks in low-latency mix-based systems. In A. Juels, editor, Proceedings of Financial Cryptography (FC '04), pages 251-265. Springer-Verlag, LNCS 3110, February 2004.
-
(2004)
LNCS
, vol.3110
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
9
-
-
33244474251
-
On as-level path inference
-
New York, NY, USA
-
Z. M. Mao, L. Qiu, J. Wang, and Y. Zhang. On as-level path inference. In SIGMETRICS '05: Proceedings of the 2005 ACM SIGMETRICS International conference on Measurement and Modeling of Computer Systems, pages 339-349, New York, NY, USA, 2005.
-
(2005)
SIGMETRICS '05: Proceedings of the 2005 ACM SIGMETRICS International conference on Measurement and Modeling of Computer Systems
, pp. 339-349
-
-
Mao, Z.M.1
Qiu, L.2
Wang, J.3
Zhang, Y.4
-
10
-
-
1242287695
-
Towards an accurate as-level traceroute tool
-
Z. M. Mao, J. Rexford, J. Wang, and R. H. Katz. Towards an accurate as-level traceroute tool. In SIGCOMM '03: Proceedings of the 2003 conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, pages 365-378, 2003.
-
(2003)
SIGCOMM '03: Proceedings of the 2003 conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 365-378
-
-
Mao, Z.M.1
Rexford, J.2
Wang, J.3
Katz, R.H.4
-
12
-
-
50249133191
-
Shining light in dark places: Understanding the Tor network
-
N. Borisov and I. Goldberg, editors, Leuven, Belgium, July, Springer
-
D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker. Shining light in dark places: Understanding the Tor network. In N. Borisov and I. Goldberg, editors, Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), pages 63-76, Leuven, Belgium, July 2008. Springer.
-
(2008)
Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
13
-
-
74049122712
-
Increase the diversity of circuits by detecting nodes belonging the same provider
-
June
-
Mfr. Increase the diversity of circuits by detecting nodes belonging the same provider. Tor Project Draft Proposal 144, June 2008.
-
(2008)
Tor Project Draft Proposal
, vol.144
-
-
Mfr1
-
14
-
-
74049118625
-
-
U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol, Version 2. IETF Internet Draft, July 2003
-
U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol - Version 2. IETF Internet Draft, July 2003.
-
-
-
-
15
-
-
50249160688
-
Sampled traffic analysis by internet-exchange-level adversaries
-
N. Borisov and P. Golle, editors, Ottawa, Canada, June, Springer
-
S. J. Murdoch and P. Zieliński. Sampled traffic analysis by internet-exchange-level adversaries. In N. Borisov and P. Golle, editors, Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007), Ottawa, Canada, June 2007. Springer.
-
(2007)
Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007)
-
-
Murdoch, S.J.1
Zieliński, P.2
-
16
-
-
74049091951
-
-
U. of Oregon. RouteViews archive. http://archive.routeviews.org, September 2008.
-
U. of Oregon. RouteViews archive. http://archive.routeviews.org, September 2008.
-
-
-
-
19
-
-
27944452198
-
Passive attack analysis for connection-based anonymity systems
-
October
-
A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In Proceedings of ESORICS 2003, October 2003.
-
(2003)
Proceedings of ESORICS 2003
-
-
Serjantov, A.1
Sewell, P.2
|