메뉴 건너뛰기




Volumn 6794 LNCS, Issue , 2011, Pages 134-154

DefenestraTor: Throwing out windows in Tor

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; RESPONSE TIME (COMPUTER SYSTEMS); WEBSITES;

EID: 79961205200     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-22263-4_8     Document Type: Conference Paper
Times cited : (41)

References (38)
  • 2
    • 85158903062 scopus 로고    scopus 로고
    • ExperimenTor: A testbed for safe and realistic Tor experimentation
    • May
    • Bauer, K., Sherr, M., McCoy, D., Grunwald, D.: ExperimenTor: A testbed for safe and realistic Tor experimentation. Technical Report CACR 2011-12 (May 2011), http://www.cacr.math.uwaterloo.ca/techreports/2011/cacr2011-12.pdf
    • (2011) Technical Report CACR 2011-12
    • Bauer, K.1    Sherr, M.2    McCoy, D.3    Grunwald, D.4
  • 4
    • 79961182885 scopus 로고    scopus 로고
    • July
    • Chen, F., Perry, M.: Improving Tor path selection (July 2008), https://gitweb.torproject.org/torspec.git/blob-plain/HEAD:/proposals/ 151-path-selection-improvements.txt
    • (2008) Improving Tor Path Selection
    • Chen, F.1    Perry, M.2
  • 16
    • 0004498688 scopus 로고
    • Congestion control and traffic management in ATM networks: Recent advances and a survey
    • Jain, R.: Congestion control and traffic management in ATM networks: Recent advances and a survey. Computer Networks and ISDN Systems (1995)
    • (1995) Computer Networks and ISDN Systems
    • Jain, R.1
  • 19
    • 84856138901 scopus 로고
    • Credit-based flow control for ATM networks: Credit update protocol, adaptive credit allocation and statistical multiplexing
    • Kung, H.T., Blackwell, T., Chapman, A.: Credit-based flow control for ATM networks: credit update protocol, adaptive credit allocation and statistical multiplexing. SIGCOMM Comput. Commun. Rev. 24, 101-114 (1994)
    • (1994) SIGCOMM Comput. Commun. Rev. , vol.24 , pp. 101-114
    • Kung, H.T.1    Blackwell, T.2    Chapman, A.3
  • 20
    • 74049083962 scopus 로고    scopus 로고
    • Measuring the Tor network: Evaluation of client requests to the directories
    • June
    • Loesing, K.: Measuring the Tor network: Evaluation of client requests to the directories. Tor Project Technical Report (June 2009)
    • (2009) Tor Project Technical Report
    • Loesing, K.1
  • 31
    • 0142250280 scopus 로고    scopus 로고
    • Passive attack analysis for connection-based anonymity systems
    • Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. Springer, Heidelberg
    • Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 116-131. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2808 , pp. 116-131
    • Serjantov, A.1    Sewell, P.2
  • 33
    • 33750276494 scopus 로고    scopus 로고
    • Timing analysis in low-latency mix networks: Attacks and defenses
    • Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. Springer, Heidelberg
    • Shmatikov, V., Wang, M.H.: Timing analysis in low-latency mix networks: Attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 18-33. Springer, Heidelberg (2006)
    • (2006) LNCS , vol.4189 , pp. 18-33
    • Shmatikov, V.1    Wang, M.H.2
  • 36
    • 79961187860 scopus 로고    scopus 로고
    • UDP-OR: A fair onion transport
    • July
    • Viecco, C.: UDP-OR: A fair onion transport. HotPETS (July 2008)
    • (2008) HotPETS
    • Viecco, C.1
  • 37
    • 0002203520 scopus 로고
    • Eliminating periodic packet losses in the 4.3-Tahoe BSD TCP congestion control algorithm
    • Wang, Z., Crowcroft, J.: Eliminating periodic packet losses in the 4.3-Tahoe BSD TCP congestion control algorithm. SIGCOMM Comput. Commun. Rev. 22, 9-16 (1992)
    • (1992) SIGCOMM Comput. Commun. Rev. , vol.22 , pp. 9-16
    • Wang, Z.1    Crowcroft, J.2
  • 38
    • 14544273666 scopus 로고    scopus 로고
    • The predecessor attack: An analysis of a threat to anonymous communications systems
    • Wright, M.K., Adler, M., Levine, B.N., Shields, C.: The predecessor attack: An analysis of a threat to anonymous communications systems. ACM Trans. Inf. Syst. Secur. 7(4), 489-522 (2004)
    • (2004) ACM Trans. Inf. Syst. Secur. , vol.7 , Issue.4 , pp. 489-522
    • Wright, M.K.1    Adler, M.2    Levine, B.N.3    Shields, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.