-
1
-
-
84937565289
-
Towards an analysis of onion routing security
-
H. Federrath, ed., Jul.
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr, "Towards an Analysis of Onion Routing Security," Designing Privacy Enhancing Technologies: Proc. Int'l Workshop Design Issues in Anonymity and Unobservability, H. Federrath, ed., pp. 96-114, Jul. 2000.
-
(2000)
Designing Privacy Enhancing Technologies: Proc. Int'l Workshop Design Issues in Anonymity and Unobservability
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
2
-
-
50249095096
-
Freedom systems 2.1 security issues and analysis
-
Inc., White Paper, May.
-
A. Back, I. Goldberg, and A. Shostack, "Freedom Systems 2.1 Security Issues and Analysis," Zero Knowledge Systems, Inc., White Paper, May. 2001.
-
(2001)
Zero Knowledge Systems
-
-
Back, A.1
Goldberg, I.2
Shostack, A.3
-
5
-
-
74049083962
-
-
K. Loesing, "Measuring the Tor Network," https://git. torproject. org/checkout/metrics/master/report/dirreq/directory-requests-2009- 06-25.pdf. 2009.
-
(2009)
Measuring the Tor Network
-
-
Loesing, K.1
-
6
-
-
70349298073
-
Tor at heart of embassy passwords leak
-
Sept.
-
D. Goodin, "Tor at Heart of Embassy Passwords Leak," The Register, Sept. 2007.
-
(2007)
The Register
-
-
Goodin, D.1
-
8
-
-
54049153176
-
Low-resource routing attacks against anonymous systems
-
Oct.
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, "Low-Resource Routing Attacks Against Anonymous Systems," Proc. ACM Workshop Privacy in the Electronic Soc. (WPES), Oct. 2007.
-
(2007)
Proc. ACM Workshop Privacy in the Electronic Soc. (WPES)
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
10
-
-
85180737609
-
An analysis of the degradation of anonymous protocols
-
Feb.
-
M. Wright, M. Adler, B.N. Levine, and C. Shields, "An Analysis of the Degradation of Anonymous Protocols," Proc. Network and Distributed System Security Symp., Feb. 2002.
-
(2002)
Proc. Network and Distributed System Security Symp.
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
11
-
-
84954435745
-
Defending anonymous communication against passive logging attacks
-
May
-
M. Wright, M. Adler, B.N. Levine, and C. Shields, "Defending Anonymous Communication Against Passive Logging Attacks," Proc. IEEE Symp. Security and Privacy, May 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
12
-
-
79960506789
-
Shining light in dark places: Understanding the tor network
-
Aug.
-
D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker, "Shining Light in Dark Places: Understanding the Tor Network," Proc. Eighth Int'l Symp. Privacy Enhancing Technologies (PETS '08), Aug. 2009.
-
(2009)
Proc. Eighth Int'l Symp. Privacy Enhancing Technologies (PETS '08)
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
13
-
-
79960485334
-
-
mailing list post to or-dev
-
R. Dingledine, "Exit Balancing Patch," http://archives.seul. org/ or/dev/Jul-2007/msg00022.html, mailing list post to or-dev, 2007.
-
(2007)
Exit Balancing Patch
-
-
Dingledine, R.1
-
14
-
-
19544369316
-
An empirical evaluation of wide-area internet bottlenecks
-
A. Akella, S. Seshan, and A. Shaikh, "An Empirical Evaluation of Wide-Area Internet Bottlenecks," Proc. ACM SIGCOMM, 2003.
-
(2003)
Proc. ACM SIGCOMM
-
-
Akella, A.1
Seshan, S.2
Shaikh, A.3
-
17
-
-
79960535467
-
-
Aug.
-
P. Palfrader, "Echolot," http://www.palfrader.org/echolot/, Aug. 2009.
-
(2009)
Echolot
-
-
Palfrader, P.1
-
19
-
-
0037810717
-
Mixminion: Design of a type III anonymous remailer protocol
-
G. Danezis, R. Dingledine, and N. Mathewson, "Mixminion: Design of a Type III Anonymous Remailer Protocol," Proc. IEEE Symp. Security and Privacy, pp. 2-15, 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
20
-
-
79960525245
-
-
Personal Corresponence, Nov.
-
R. Dingledine Personal Corresponence, Nov. 2007.
-
(2007)
-
-
Dingledine, R.1
-
25
-
-
0012057129
-
Measurement of inequality of incomes
-
C. Gini, "Measurement of Inequality of Incomes," The Economic J., vol. 31, no. 121, pp. 124-126, 1921.
-
(1921)
The Economic J.
, vol.31
, Issue.121
, pp. 124-126
-
-
Gini, C.1
-
28
-
-
79960531821
-
Performance comparison of low-latency anonymisation services from a user perspective
-
N. Borisov and P. Golle, eds., June
-
R. Wendolsky, D. Herrmann, and H. Federrath, "Performance Comparison of Low-Latency Anonymisation Services from a User Perspective," Proc. Seventh Int'l Symp. Privacy Enhancing Technologies, N. Borisov and P. Golle, eds., June 2007.
-
(2007)
Proc. Seventh Int'l Symp. Privacy Enhancing Technologies
-
-
Wendolsky, R.1
Herrmann, D.2
Federrath, H.3
-
29
-
-
34547492967
-
Eclipse attacks on overlay networks: Threats and defenses
-
Apr.
-
A. Singh, T.-W. Ngan, P. Druschel, and D.S. Wallach, "Eclipse Attacks on Overlay Networks: Threats and Defenses," Proc. IEEE INFOCOM, Apr. 2006.
-
(2006)
Proc. IEEE INFOCOM
-
-
Singh, A.1
Ngan, T.-W.2
Druschel, P.3
Wallach, D.S.4
-
32
-
-
84870425323
-
Improving efficiency and simplicity of tor circuit establishment and hidden services
-
N. Borisov and P. Golle, eds., June
-
L. Overlier and P. Syverson, "Improving Efficiency and Simplicity of Tor Circuit Establishment and Hidden Services," Proc. Seventh Int'l Symp. Privacy Enhancing Technologies, N. Borisov and P. Golle, eds., June 2007.
-
(2007)
Proc. Seventh Int'l Symp. Privacy Enhancing Technologies
-
-
Overlier, L.1
Syverson, P.2
-
33
-
-
62949212624
-
Pairing-based onion routing
-
N. Borisov and P. Golle, eds., June
-
A. Kate, G. Zaverucha, and I. Goldberg, "Pairing-Based Onion Routing," Proc. Seventh Int'l Symp. Privacy Enhancing Technologies, N. Borisov and P. Golle, eds., June 2007.
-
(2007)
Proc. Seventh Int'l Symp. Privacy Enhancing Technologies
-
-
Kate, A.1
Zaverucha, G.2
Goldberg, I.3
-
36
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
DOI 10.1145/1180405.1180409, 1180409, CCS 2006: Proceedings of the 13th ACM Conference on Computer and Communications Security
-
A. Nambiar and M. Wright, "Salsa: A Structured Approach to Large-scale Anonymity," Proc. 13th ACM Conf. Computer and Comm. Security, pp. 17-26, 2006. (Pubitemid 47131352)
-
(2006)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 17-26
-
-
Nambiar, A.1
Wright, M.2
-
39
-
-
56649105529
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
Oct.
-
N. Borisov, G. Danezis, P. Mittal, and P. Tabriz, "Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity," Proc. 14th ACM Conf. Computer and Comm. Security, Oct. 2007.
-
(2007)
Proc. 14th ACM Conf. Computer and Comm. Security
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
|