메뉴 건너뛰기




Volumn 5927 LNCS, Issue , 2009, Pages 425-438

Fingerprinting attack on the Tor anonymity system

Author keywords

Anonymity system; Fingerprinting attack; Onion routing; Tor

Indexed keywords

INCOMING TRAFFIC; ONION ROUTING; OTHER APPLICATIONS; SINGLE CONTROLLERS;

EID: 76549110566     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-11145-7_33     Document Type: Conference Paper
Times cited : (30)

References (14)
  • 1
    • 84947242344 scopus 로고    scopus 로고
    • Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, 2137, pp. 245-257. Springer, Heidelberg (2001)
    • Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245-257. Springer, Heidelberg (2001)
  • 3
    • 0023861309 scopus 로고
    • The dining cryptographers problem: Unconditional sender and recipient untraceability
    • Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1, 65-75 (1988)
    • (1988) Journal of Cryptology , vol.1 , pp. 65-75
    • Chaum, D.1
  • 4
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-90 (1981)
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 6
    • 85084161366 scopus 로고    scopus 로고
    • Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
    • Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
  • 9
    • 84957796461 scopus 로고    scopus 로고
    • Hintz, A.: Fingerprinting websites using traffic analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 171-178. Springer, Heidelberg (2003)
    • Hintz, A.: Fingerprinting websites using traffic analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 171-178. Springer, Heidelberg (2003)
  • 10
    • 33846288517 scopus 로고    scopus 로고
    • Levine, B.N., Reiter, M.K., Wang, C., Wright, M.K.: Timing attacks in low-latency mix-based systems. In: Juels, A. (ed.) FC 2004. LNCS, 3110, pp. 251-265. Springer, Heidelberg (2004)
    • Levine, B.N., Reiter, M.K., Wang, C., Wright, M.K.: Timing attacks in low-latency mix-based systems. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 251-265. Springer, Heidelberg (2004)
  • 11
    • 24344478834 scopus 로고    scopus 로고
    • Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, 3424, pp. 17-34. Springer, Heidelberg (2005)
    • Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 17-34. Springer, Heidelberg (2005)
  • 14
    • 20444437836 scopus 로고    scopus 로고
    • Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection
    • Washington, DC, USA November
    • Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Proceedings of the Workshop on Privacy in the Electronic Society, Washington, DC, USA (November 2002)
    • (2002) Proceedings of the Workshop on Privacy in the Electronic Society
    • Rennhard, M.1    Plattner, B.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.