-
1
-
-
85084161366
-
Tor: The second-generation onion router
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: 13th USENIX Security Symposium, San Diego, CA, USA (August 2004)
-
13th USENIX Security Symposium, San Diego, CA, USA (August 2004)
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
2
-
-
38049076478
-
-
Tor: anonymity, https://www.torproject.org/
-
Tor: Anonymity
-
-
-
3
-
-
50249133191
-
Shining Light in Dark Places: Understanding the Tor Network
-
Borisov, N., Goldberg, I. (eds.) PETS 2008. Springer, Heidelberg
-
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining Light in Dark Places: Understanding the Tor Network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63-76. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5134
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
4
-
-
77954649396
-
-
Tor Project. Measuring Tor and Iran (2009), https://blog.torproject.org/ blog/measuring-tor-and-iran
-
(2009)
Measuring Tor and Iran
-
-
-
7
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
Springer, Heidelberg
-
Raymond, J.F.: Traffic analysis: Protocols, attacks, design issues, and open problems. LNCS, pp. 10-29. Springer, Heidelberg (2001)
-
(2001)
LNCS
, pp. 10-29
-
-
Raymond, J.F.1
-
8
-
-
24344478834
-
Practical traffic analysis: Extending and resisting statistical disclosure
-
Martin, D., Serjantov, A. (eds.) PET 2004. Springer, Heidelberg
-
Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 17-34. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3424
, pp. 17-34
-
-
Mathewson, N.1
Dingledine, R.2
-
9
-
-
70349692738
-
How much anonymity does net work latency leak?
-
ACM, New York
-
Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does net work latency leak? In: Proceedings of the 14th ACM conference on Computer and communications security, p. 91. ACM, New York (2007)
-
(2007)
Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 91
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
10
-
-
27544454707
-
Low-Cost Traffic Analysis of Tor
-
IEEE Computer Society, Los Alamitos
-
Murdoch, S.J., Danezis, G.: Low-Cost Traffic Analysis of Tor. In: SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, Washington, DC, USA, pp. 183-195. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, Washington, DC, USA
, pp. 183-195
-
-
Murdoch, S.J.1
Danezis, G.2
-
11
-
-
79959681025
-
Low-resource routing attacks against Tor
-
Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against Tor. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA (October 2007)
-
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA (October 2007)
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
14
-
-
77954625603
-
-
dsniff, http://www.monkey.org/~dugsong/dsniff/
-
-
-
-
15
-
-
77954630371
-
-
apachelog, http://code.google.com/p/apachelog/
-
-
-
-
17
-
-
34250017239
-
A face is exposed for AOL searcher no. 4417749
-
Barbaro, M., Zeller, T.: A face is exposed for AOL searcher no. 4417749. New York Times, 9:2008 (2006)
-
(2006)
New York Times
, vol.9
, pp. 2008
-
-
Barbaro, M.1
Zeller, T.2
-
19
-
-
38149139318
-
Browser-Based Attacks on Tor
-
Borisov, N., Golle, P. (eds.) PET 2007. Springer, Heidelberg
-
Abbott, T.G., Lai, K.J., Lieberman, M.R., Price, E.C.: Browser-Based Attacks on Tor. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 184-199. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4776
, pp. 184-199
-
-
Abbott, T.G.1
Lai, K.J.2
Lieberman, M.R.3
Price, E.C.4
|