메뉴 건너뛰기




Volumn , Issue , 2009, Pages 380-389

AS-awareness in Tor path selection

Author keywords

Anonymity; Autonomous systems; Privacy; Tor

Indexed keywords

ANONYMITY NETWORKS; ANONYMOUS COMMUNICATION; APRIORI; AUTONOMOUS SYSTEMS; COMPUTATIONAL OVERHEADS; EXPLOSIVE GROWTH; INFERENCE ALGORITHM; INTERNET ROUTING; LIVE NETWORKS; PATH SELECTION; PATH SELECTION ALGORITHMS; SOURCES AND DESTINATIONS;

EID: 74049136866     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1653662.1653708     Document Type: Conference Paper
Times cited : (104)

References (19)
  • 6
    • 0035704351 scopus 로고    scopus 로고
    • On inferring autonomous system relationships in the internet
    • L. Gao. On inferring autonomous system relationships in the internet. IEEE/ACM Transactions on Networking, 9:733-745, 2000.
    • (2000) IEEE/ACM Transactions on Networking , vol.9 , pp. 733-745
    • Gao, L.1
  • 7
    • 84955557456 scopus 로고    scopus 로고
    • Hiding routing information
    • R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, Springer-Verlag, May
    • D. M. Goldschlag, M. G. Reed, and P. F. Syverson. Hiding routing information. In R. Anderson, editor, Proceedings of Information Hiding: First International Workshop, pages 137-150. Springer-Verlag, LNCS 1174, May 1996.
    • (1996) LNCS , vol.1174 , pp. 137-150
    • Goldschlag, D.M.1    Reed, M.G.2    Syverson, P.F.3
  • 8
    • 33846288517 scopus 로고    scopus 로고
    • Timing attacks in low-latency mix-based systems
    • A. Juels, editor, Proceedings of Financial Cryptography FC '04, Springer-Verlag, February
    • B. N. Levine, M. K. Reiter, C. Wang, and M. K. Wright. Timing attacks in low-latency mix-based systems. In A. Juels, editor, Proceedings of Financial Cryptography (FC '04), pages 251-265. Springer-Verlag, LNCS 3110, February 2004.
    • (2004) LNCS , vol.3110 , pp. 251-265
    • Levine, B.N.1    Reiter, M.K.2    Wang, C.3    Wright, M.K.4
  • 13
    • 74049122712 scopus 로고    scopus 로고
    • Increase the diversity of circuits by detecting nodes belonging the same provider
    • June
    • Mfr. Increase the diversity of circuits by detecting nodes belonging the same provider. Tor Project Draft Proposal 144, June 2008.
    • (2008) Tor Project Draft Proposal , vol.144
    • Mfr1
  • 14
    • 74049118625 scopus 로고    scopus 로고
    • U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol, Version 2. IETF Internet Draft, July 2003
    • U. Möller, L. Cottrell, P. Palfrader, and L. Sassaman. Mixmaster Protocol - Version 2. IETF Internet Draft, July 2003.
  • 16
    • 74049091951 scopus 로고    scopus 로고
    • U. of Oregon. RouteViews archive. http://archive.routeviews.org, September 2008.
    • U. of Oregon. RouteViews archive. http://archive.routeviews.org, September 2008.
  • 19
    • 27944452198 scopus 로고    scopus 로고
    • Passive attack analysis for connection-based anonymity systems
    • October
    • A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In Proceedings of ESORICS 2003, October 2003.
    • (2003) Proceedings of ESORICS 2003
    • Serjantov, A.1    Sewell, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.