-
1
-
-
79959681025
-
Low-resource routing attacks against Tor
-
Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against Tor. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA (October 2007)
-
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA (October 2007)
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
2
-
-
85158903062
-
ExperimenTor: A testbed for safe and realistic Tor experimentation
-
May
-
Bauer, K., Sherr, M., McCoy, D., Grunwald, D.: ExperimenTor: A testbed for safe and realistic Tor experimentation. Technical Report CACR 2011-12 (May 2011), http://www.cacr.math.uwaterloo.ca/techreports/2011/cacr2011-12.pdf
-
(2011)
Technical Report CACR 2011-12
-
-
Bauer, K.1
Sherr, M.2
McCoy, D.3
Grunwald, D.4
-
3
-
-
85027196839
-
TCP Vegas: New techniques for congestion detection and avoidance
-
ACM, New York
-
Brakmo, L.S., O'Malley, S.W., Peterson, L.L.: TCP Vegas: New techniques for congestion detection and avoidance. In: Proceedings of the Conference on Communications Architectures, Protocols and Applications, SIGCOMM 1994, pp. 24-35. ACM, New York (1994)
-
(1994)
Proceedings of the Conference on Communications Architectures, Protocols and Applications, SIGCOMM 1994
, pp. 24-35
-
-
Brakmo, L.S.1
O'Malley, S.W.2
Peterson, L.L.3
-
4
-
-
79961182885
-
-
July
-
Chen, F., Perry, M.: Improving Tor path selection (July 2008), https://gitweb.torproject.org/torspec.git/blob-plain/HEAD:/proposals/ 151-path-selection-improvements.txt
-
(2008)
Improving Tor Path Selection
-
-
Chen, F.1
Perry, M.2
-
5
-
-
78349258593
-
Waiting for anonymity: Understanding delays in the Tor overlay
-
Dhungel, P., Steiner, M., Rimac, I., Hilt, V., Ross, K.W.: Waiting for anonymity: Understanding delays in the Tor overlay. In: Peer-to-Peer Computin. IEEE, Los Alamitos (2010)
-
Peer-to-Peer Computin. IEEE, Los Alamitos (2010)
-
-
Dhungel, P.1
Steiner, M.2
Rimac, I.3
Hilt, V.4
Ross, K.W.5
-
16
-
-
0004498688
-
Congestion control and traffic management in ATM networks: Recent advances and a survey
-
Jain, R.: Congestion control and traffic management in ATM networks: Recent advances and a survey. Computer Networks and ISDN Systems (1995)
-
(1995)
Computer Networks and ISDN Systems
-
-
Jain, R.1
-
19
-
-
84856138901
-
Credit-based flow control for ATM networks: Credit update protocol, adaptive credit allocation and statistical multiplexing
-
Kung, H.T., Blackwell, T., Chapman, A.: Credit-based flow control for ATM networks: credit update protocol, adaptive credit allocation and statistical multiplexing. SIGCOMM Comput. Commun. Rev. 24, 101-114 (1994)
-
(1994)
SIGCOMM Comput. Commun. Rev.
, vol.24
, pp. 101-114
-
-
Kung, H.T.1
Blackwell, T.2
Chapman, A.3
-
20
-
-
74049083962
-
Measuring the Tor network: Evaluation of client requests to the directories
-
June
-
Loesing, K.: Measuring the Tor network: Evaluation of client requests to the directories. Tor Project Technical Report (June 2009)
-
(2009)
Tor Project Technical Report
-
-
Loesing, K.1
-
21
-
-
70350228716
-
Shining light in dark places: Understanding the Tor network
-
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining light in dark places: Understanding the Tor network. In: Proceedings of the 8th Privacy Enhancing Technologies Symposium (July 2008)
-
Proceedings of the 8th Privacy Enhancing Technologies Symposium (July 2008)
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
26
-
-
51049117550
-
On performance bottleneck of anonymous communication networks
-
Pries, R., Yu, W., Graham, S., Fu, X.: On performance bottleneck of anonymous communication networks. In: Parallel and Distributed Processing (2008)
-
(2008)
Parallel and Distributed Processing
-
-
Pries, R.1
Yu, W.2
Graham, S.3
Fu, X.4
-
30
-
-
0002098559
-
TCP congestion control with a misbehaving receiver
-
Savage, S., Cardwell, N.,Wetherall, D., Anderson, T.: TCP congestion control with a misbehaving receiver. SIGCOMM Comput. Commun. Rev. 29, 71-78 (1999)
-
(1999)
SIGCOMM Comput. Commun. Rev.
, vol.29
, pp. 71-78
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
31
-
-
0142250280
-
Passive attack analysis for connection-based anonymity systems
-
Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. Springer, Heidelberg
-
Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 116-131. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2808
, pp. 116-131
-
-
Serjantov, A.1
Sewell, P.2
-
33
-
-
33750276494
-
Timing analysis in low-latency mix networks: Attacks and defenses
-
Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. Springer, Heidelberg
-
Shmatikov, V., Wang, M.H.: Timing analysis in low-latency mix networks: Attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 18-33. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 18-33
-
-
Shmatikov, V.1
Wang, M.H.2
-
35
-
-
84978397901
-
Scalability and accuracy in a large-scale network emulator
-
Vahdat, A., Yocum, K., Walsh, K., Mahadevan, P., Kostić, D., Chase, J., Becker, D.: Scalability and accuracy in a large-scale network emulator. SIGOPS Oper. Syst. Rev. 36, 271-284 (2002)
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, pp. 271-284
-
-
Vahdat, A.1
Yocum, K.2
Walsh, K.3
Mahadevan, P.4
Kostić, D.5
Chase, J.6
Becker, D.7
-
36
-
-
79961187860
-
UDP-OR: A fair onion transport
-
July
-
Viecco, C.: UDP-OR: A fair onion transport. HotPETS (July 2008)
-
(2008)
HotPETS
-
-
Viecco, C.1
-
37
-
-
0002203520
-
Eliminating periodic packet losses in the 4.3-Tahoe BSD TCP congestion control algorithm
-
Wang, Z., Crowcroft, J.: Eliminating periodic packet losses in the 4.3-Tahoe BSD TCP congestion control algorithm. SIGCOMM Comput. Commun. Rev. 22, 9-16 (1992)
-
(1992)
SIGCOMM Comput. Commun. Rev.
, vol.22
, pp. 9-16
-
-
Wang, Z.1
Crowcroft, J.2
-
38
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
Wright, M.K., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7(4), 489-522 (2004)
-
(2004)
ACM Trans. Inf. Syst. Secur.
, vol.7
, Issue.4
, pp. 489-522
-
-
Wright, M.K.1
Adler, M.2
Levine, B.N.3
Shields, C.4
|