-
1
-
-
85165863135
-
-
AS Peering Analysis, http://www.netconfigs.com/general/anoverview.htm
-
AS Peering Analysis
-
-
-
2
-
-
85165847458
-
-
CAIDA Router Measurements
-
CAIDA Router Measurements, http://www.caida.org/tools/taxonomy/routing. xml
-
-
-
-
3
-
-
85165842378
-
-
DETER Network Security Testbed
-
DETER Network Security Testbed, https://www.isi.deterlab.net
-
-
-
-
4
-
-
85165839687
-
-
I2P Anonymous Network
-
I2P Anonymous Network, http://www.i2p2.de/
-
-
-
-
5
-
-
85165851665
-
-
Rocketfuel: An ISP Topology Mapping Engine
-
Rocketfuel: An ISP Topology Mapping Engine, http://www.cs.washington.edu/ research/networking/rocketfuel/
-
-
-
-
6
-
-
85165855458
-
-
Internet Mapping Project
-
The Internet Mapping Project, http://www.cheswick.com/ches/map/
-
-
-
-
7
-
-
3042699909
-
Measuring anonymity: The disclosure attack
-
Agrawal, D., Kesdogan, D.: Measuring Anonymity: The Disclosure Attack. IEEE Security & Privacy 1(6), 27-34 (2003)
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 27-34
-
-
Agrawal, D.1
Kesdogan, D.2
-
8
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Moskowitz, I. S. ed., Springer, Heidelberg
-
Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I. S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245-257. Springer, Heidelberg (2001)
-
(2001)
IH 2001. LNCS
, vol.2137
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
9
-
-
79959681025
-
Low-resource routing attacks against tor
-
Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against tor. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society (WPES), pp. 11-20 (2007)
-
(2007)
Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society (WPES)
, pp. 11-20
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
13
-
-
60349122307
-
Identifying proxy nodes in a tor anonymization circuit
-
December 2008
-
Chakravarty, S., Stavrou, A., Keromytis, A. D.: Identifying Proxy Nodes in a Tor Anonymization Circuit. In: Proceedings of the 2nd Workshop on Security and Privacy in Telecommunications and Information Systems (SePTIS), December 2008, pp. 633-639 (2008)
-
(2008)
Proceedings of the 2nd Workshop on Security and Privacy in Telecommunications and Information Systems (SePTIS)
, pp. 633-639
-
-
Chakravarty, S.1
Stavrou, A.2
Keromytis, A.D.3
-
14
-
-
78049369233
-
-
Computer Science Department Technical Report CUCS Tech Report CUCS-002-08, Columbia University January
-
Chakravarty, S., Stavrou, A., Keromytis, A. D.: LinkWidth: A Method to Measure Link Capacity and Available Bandwidth using Single-End Probes. Computer Science Department Technical Report (CUCS Tech Report) CUCS-002-08, Columbia University (January 2008)
-
(2008)
LinkWidth: A Method to Measure Link Capacity and Available Bandwidth Using Single-end Probes
-
-
Chakravarty, S.1
Stavrou, A.2
Keromytis, A.D.3
-
15
-
-
85084161366
-
Tor: The second-generation onion router
-
August 2004
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: Proceedings of the 13th USENIX Security Symposium (USENIX Security), August 2004, pp. 303-319 (2004)
-
(2004)
Proceedings of the 13th USENIX Security Symposium (USENIX Security)
, pp. 303-319
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
16
-
-
85076290610
-
A practical congestion attack on tor using long paths
-
August 2009
-
Evans, N., Dingledine, R., Grothoff, C.: A practical congestion attack on tor using long paths. In: Proceedings of the 18th USENIX Security Symposium (USENIX Security), August 2009, pp. 33-50 (2009), http://freehaven. net/anonbib/papers/congestion-longpaths.pdf
-
(2009)
Proceedings of the 18th USENIX Security Symposium (USENIX Security)
, pp. 33-50
-
-
Evans, N.1
Dingledine, R.2
Grothoff, C.3
-
18
-
-
0035687803
-
TCP westwood: Congestion window control using bandwidth estimation
-
Gerla, M., Sanadidi, M. Y., Wang, R., Zanella, A.: TCP Westwood: Congestion Window Control Using Bandwidth Estimation. In: Proceedings of IEEE Global Communications Conference (Globecomm), November 2001, vol. 3, pp. 1698-1702 (2001) (Pubitemid 34058901)
-
(2001)
Conference Record / IEEE Global Telecommunications Conference
, vol.3
, pp. 1698-1702
-
-
Gerla, M.1
Sanadidi, M.Y.2
Wang, R.3
Zanella, A.4
Casetti, C.5
Mascolo, S.6
-
19
-
-
84955557456
-
Hiding routing information
-
Anderson, R. ed., Springer, Heidelberg
-
Goldschlag, D. M., Reed, M. G., Syverson, P. F.: Hiding Routing Information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137-150. Springer, Heidelberg (1996)
-
(1996)
IH 1996. LNCS
, vol.1174
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
20
-
-
70349692738
-
How much anonymity does network latency leak?
-
October 2007
-
Hopper, N., Vasserman, E. Y., Chan-Tin, E.: How Much Anonymity does Network Latency Leak? In: Proceedings of ACM Conference on Computer and Communications Security (CCS), October 2007, pp. 82-91 (2007)
-
(2007)
Proceedings of ACM Conference on Computer and Communications Security (CCS)
, pp. 82-91
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
22
-
-
85165838381
-
-
JAP
-
JAP, http://anon. inf.tu-dresden. de/
-
-
-
-
23
-
-
84872956076
-
Iplane: An information plane for distributed services
-
November 2006
-
Madhyastha, H. V., Isdal, T., Piatek, M., Dixon, C., Anderson, T. E., Krishnamurthy, A., Venkataramani, A.: iplane: An information plane for distributed services. In: Proceedings of 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI), November 2006, pp. 367-380 (2006)
-
(2006)
Proceedings of 7th USENIX Symposium on Operating Systems Design and Implementation (OSDI)
, pp. 367-380
-
-
Madhyastha, H.V.1
Isdal, T.2
Piatek, M.3
Dixon, C.4
Anderson, T.E.5
Krishnamurthy, A.6
Venkataramani, A.7
-
27
-
-
79960330115
-
-
Dingeldine, R., Edman, M., Lewman, A., Mathewson, N., Murdoch, S., Palfrader, P., Perry, M., Syverson, P.: Tor: anonymity online, https://www.torproject.org/
-
Tor: Anonymity Online
-
-
Dingeldine, R.1
Edman, M.2
Lewman, A.3
Mathewson, N.4
Murdoch, S.5
Palfrader, P.6
Perry, M.7
Syverson, P.8
-
29
-
-
85165847114
-
-
Tirumala, A., Qin, F., Dugan, J., Feguson, J., Gibbs, K.: IPERF (1997), http://dast.nlanr.net/projects/Iperf/
-
(1997)
IPERF
-
-
Tirumala, A.1
Qin, F.2
Dugan, J.3
Feguson, J.4
Gibbs, K.5
-
30
-
-
56649123231
-
Compromising anonymity using packet spinning
-
Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. eds., Springer, Heidelberg
-
Pappas, V., Athanasopoulos, E., Ioannidis, S., Markatos, E. P.: Compromising Anonymity Using Packet Spinning. In: Wu, T.-C., Lei, C.-L., Rijmen, V., Lee, D.-T. (eds.) ISC 2008. LNCS, vol. 5222, pp. 161-174. Springer, Heidelberg (2008)
-
(2008)
ISC 2008. LNCS
, vol.5222
, pp. 161-174
-
-
Pappas, V.1
Athanasopoulos, E.2
Ioannidis, S.3
Markatos, E.P.4
-
31
-
-
34548762543
-
Network flow watermarking attack on low-latency anonymous communication systems
-
Wang, X., Chen, S., Jajodia, S.: Network flow watermarking attack on low-latency anonymous communication systems. In: Proceedings of IEEE Symposium on Security and Privacy (IEEE S and P), pp. 116-130 (2007)
-
(2007)
Proceedings of IEEE Symposium on Security and Privacy (IEEE S and P)
, pp. 116-130
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
33
-
-
35048887932
-
-
Wessels, D., Rousskov, A., Nordstrom, H., Chadd, A., Jeffries, A.: Squid, http://www.squid-cache.org/
-
Squid
-
-
Wessels, D.1
Rousskov, A.2
Nordstrom, H.3
Chadd, A.4
Jeffries, A.5
-
34
-
-
27944460736
-
An analysis of the degradation of anonymous protocols
-
Wright, M. K., Adler, M., Levine, B. N., Shields, C.: An analysis of the degradation of anonymous protocols. In: Proceedings of the Network and Distributed Security Symposium, NDSS (2002)
-
(2002)
Proceedings of the Network and Distributed Security Symposium, NDSS
-
-
Wright, M.K.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
36
-
-
65249165857
-
An improved clock-skew measurement technique for revealing Hidden services
-
San Jose, USA, July 2008
-
Zander, S., Murdoch, S.: An Improved Clock-skew Measurement Technique for Revealing Hidden Services. In: Proceedings of 17th USENIX Security Symposium (USENIX Security), San Jose, USA, July 2008, pp. 211-225 (2008)
-
(2008)
Proceedings of 17th USENIX Security Symposium (USENIX Security)
, pp. 211-225
-
-
Zander, S.1
Murdoch, S.2
|