-
1
-
-
84855707156
-
-
Top Sites. Retrieved May 13, 2011
-
Alexa: The Web Information Company. Top Sites. http://www.alexa.com/ topsites. Retrieved May 13, 2011.
-
-
-
-
2
-
-
74049147572
-
PAR: Payment for anonymous routing
-
E. Androulaki, M. Raykova, S. Srivatsan, A. Stavrou, and S. Bellovin. PAR: Payment for Anonymous Routing. In Privacy Enhancing Technologies Symposium (PETS), 2008.
-
(2008)
Privacy Enhancing Technologies Symposium (PETS)
-
-
Androulaki, E.1
Raykova, M.2
Srivatsan, S.3
Stavrou, A.4
Bellovin, S.5
-
4
-
-
84855707157
-
De-anonymizing BitTorrent users on Tor (poster)
-
S. L. Blond, P. Manils, A. Chaabane, M. A. Kaafar, A. Legout, C. Castellucia, and W. Dabbous. De-anonymizing BitTorrent Users on Tor (poster). In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010.
-
(2010)
USENIX Symposium on Networked Systems Design and Implementation (NSDI)
-
-
Blond, S.L.1
Manils, P.2
Chaabane, A.3
Kaafar, M.A.4
Legout, A.5
Castellucia, C.6
Dabbous, W.7
-
16
-
-
84855711802
-
-
September. Listserv posting
-
N. Mathewson. Evaluating SCTP for Tor. http://archives.seul.org/or/dev/ Sep-2004/msg00002.html, September 2004. Listserv posting.
-
(2004)
Evaluating SCTP for Tor
-
-
Mathewson, N.1
-
17
-
-
70350228716
-
Shining light in dark places: Understanding the Tor network
-
D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker. Shining Light in Dark Places: Understanding the Tor Network. In Privacy Enhancing Technologies Symposium (PETS), 2008.
-
(2008)
Privacy Enhancing Technologies Symposium (PETS)
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
18
-
-
0017959977
-
Secure communications over insecure channels
-
April
-
R. C. Merkle. Secure Communications over Insecure Channels. Communications of the ACM, 21:294-299, April 1978.
-
(1978)
Communications of the ACM
, vol.21
, pp. 294-299
-
-
Merkle, R.C.1
-
21
-
-
84855711805
-
-
Retrieved May 26, 2011
-
NetIndex Source Data. http://netindex.com/source-data/. Retrieved May 26, 2011.
-
-
-
-
24
-
-
84855711806
-
Computing bandwidth adjustments
-
Tor Project
-
M. Perry. Computing Bandwidth Adjustments. Proposal 161, Tor Project, 2009.
-
(2009)
Proposal
, vol.161
-
-
Perry, M.1
-
27
-
-
85180538667
-
A3: An extensible platform for application-aware anonymity
-
M. Sherr, A. Mao, W. R. Marczak, W. Zhou, B. T. Loo, and M. Blaze. A3: An Extensible Platform for Application-Aware Anonymity. In Network and Distributed System Security Symposium (NDSS), 2010.
-
(2010)
Network and Distributed System Security Symposium (NDSS)
-
-
Sherr, M.1
Mao, A.2
Marczak, W.R.3
Zhou, W.4
Loo, B.T.5
Blaze, M.6
-
30
-
-
84861620013
-
-
Tor Project, Inc. Tor Directory Protocol, Version 3, 2010. https://git.torproject.org/checkout/tor/master/doc/spec/dir-spec.txt.
-
(2010)
Tor Directory Protocol, Version 3
-
-
-
31
-
-
84978397901
-
Scalability and accuracy in a large-scale network emulator
-
December
-
A. Vahdat, K. Yocum, K. Walsh, P. Mahadevan, D. Kostić, J. Chase, and D. Becker. Scalability and Accuracy in a Large-scale Network Emulator. SIGOPS Oper. Syst. Rev., 36:271-284, December 2002.
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, pp. 271-284
-
-
Vahdat, A.1
Yocum, K.2
Walsh, K.3
Mahadevan, P.4
Kostić, D.5
Chase, J.6
Becker, D.7
-
32
-
-
65249165857
-
An improved clock-skew measurement technique for revealing hidden services
-
S. Zander and S. J. Murdoch. An Improved Clock-Skew Measurement Technique for Revealing Hidden Services. In USENIX Security Symposium (USENIX), 2008.
-
(2008)
USENIX Security Symposium (USENIX)
-
-
Zander, S.1
Murdoch, S.J.2
-
33
-
-
2442633407
-
The need for speed II
-
Zona Publishing, April
-
Zona Publishing. The Need for Speed II. Zona Market Bulletin, 5, April 2001.
-
(2001)
Zona Market Bulletin
, vol.5
-
-
|