메뉴 건너뛰기




Volumn 6961 LNCS, Issue , 2011, Pages 222-241

Detecting traffic snooping in tor using decoys

Author keywords

[No Author keywords available]

Indexed keywords

ANONYMOUS COMMUNICATION; END-TO-END ENCRYPTION; PROTOTYPE IMPLEMENTATIONS; USER AUTHENTICATION; USER DATA; USER TRAFFICS;

EID: 84857297875     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-23644-0_12     Document Type: Conference Paper
Times cited : (21)

References (36)
  • 1
    • 84857346968 scopus 로고    scopus 로고
    • Anonymizer, Inc., http://www.anonymizer.com/
  • 2
    • 84857259781 scopus 로고    scopus 로고
    • Anonymouse, http://anonymouse.org/
  • 6
    • 84945898027 scopus 로고    scopus 로고
    • Tor Path Specification, https://gitweb.torproject.org/ torspec.git?a=blob plain;hb=HEAD;f=path-spec.txt
    • Tor Path Specification
  • 7
    • 35248893039 scopus 로고    scopus 로고
    • GAP - Practical anonymous networking
    • Dingledine, R. (ed.) PET 2003. Springer, Heidelberg
    • Bennett, K., Grothoff, C.: GAP - practical anonymous networking. In: Dingledine, R. (ed.) PET 2003. LNCS, vol. 2760, pp. 141-160. Springer, Heidelberg (2003)
    • (2003) LNCS , vol.2760 , pp. 141-160
    • Bennett, K.1    Grothoff, C.2
  • 11
    • 0019532104 scopus 로고
    • Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
    • Chaum, D.L.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM 24(2), 84-90 (1981)
    • (1981) Communications of the ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 13
    • 84957800033 scopus 로고    scopus 로고
    • Towards measuring anonymity
    • Dingledine, R., Syverson, P.F. (eds.) PET 2002. Springer, Heidelberg
    • Díaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 54-68. Springer, Heidelberg (2003), http://portal.acm.org/citation.cfm?id= 1765299.1765304
    • (2003) LNCS , vol.2482 , pp. 54-68
    • Díaz, C.1    Seys, S.2    Claessens, J.3    Preneel, B.4
  • 16
    • 84857338872 scopus 로고    scopus 로고
    • Firesheep, http://codebutler.com/firesheep
    • Firesheep
  • 19
    • 84857335451 scopus 로고    scopus 로고
    • JAP, http://anon.inf.tu-dresden.de/
    • JAP
  • 21
    • 50249133191 scopus 로고    scopus 로고
    • Shining light in dark places: Understanding the tor network
    • Borisov, N., Goldberg, I. (eds.) PETS 2008. Springer, Heidelberg
    • Mccoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.: Shining light in dark places: Understanding the tor network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63-76. Springer, Heidelberg (2008)
    • (2008) LNCS , vol.5134 , pp. 63-76
    • Mccoy, D.1    Bauer, K.2    Grunwald, D.3    Kohno, T.4    Sicker, D.5
  • 22
    • 77954649872 scopus 로고    scopus 로고
    • Tor HTTP usage and information leakage
    • De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. Springer, Heidelberg
    • Mulazzani, M., Huber, M., Weippl, E.R.: Tor HTTP usage and information leakage. In: De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 245-255. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6109 , pp. 245-255
    • Mulazzani, M.1    Huber, M.2    Weippl, E.R.3
  • 23
    • 77955046129 scopus 로고    scopus 로고
    • Hproxy: Client-side detection of ssl stripping attacks
    • Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. Springer, Heidelberg
    • Nikiforakis, N., Younan, Y., Joosen, W.: Hproxy: client-side detection of ssl stripping attacks. In: Kreibich, C., Jahnke, M. (eds.) DIMVA 2010. LNCS, vol. 6201, pp. 200-218. Springer, Heidelberg (2010)
    • (2010) LNCS , vol.6201 , pp. 200-218
    • Nikiforakis, N.1    Younan, Y.2    Joosen, W.3
  • 28
    • 71749099572 scopus 로고    scopus 로고
    • Song, D.: dsniff, http://www.monkey.org/~dugsong/dsniff/
    • dsniff
    • Song, D.1
  • 31
    • 0024011325 scopus 로고
    • Stalking the wily hacker
    • Stoll, C.: Stalking the wily hacker. Communications of the ACM 31(5), 484-497 (1988)
    • (1988) Communications of the ACM , vol.31 , Issue.5 , pp. 484-497
    • Stoll, C.1
  • 33
    • 84857297231 scopus 로고    scopus 로고
    • Team Furry
    • Team Furry: TOR exit-node doing MITM attacks, http://www.teamfurry.com/ wordpress/2007/11/20/tor-exit-node-doing-mitm-attacks/
    • TOR Exit-node Doing MITM Attacks


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.