-
1
-
-
84955557456
-
Hiding routing information
-
R. Anderson, Ed. Springer-Verlag, LNCS 1174
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson, “Hiding routing information, ” in Information Hiding: First International Workshop, R. Anderson, Ed. Springer-Verlag, LNCS 1174, 1996, pp. 137-150.
-
(1996)
Information Hiding: First International Workshop
, pp. 137-150
-
-
Goldschlag, D. M.1
Reed, M. G.2
Syverson, P. F.3
-
2
-
-
85084161366
-
Tor: The second-generation onion router
-
USENIX Association, August
-
R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The second-generation onion router, ” in Proceedings of the 13th USENIX Security Symposium. USENIX Association, August 2004, pp. 303-319.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 303-319
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
3
-
-
84870651248
-
-
“The Tor Project, ” https://www.torproject.org/.
-
The Tor Project
-
-
-
5
-
-
0038148416
-
Defending anonymous communication against passive logging attacks
-
May
-
M. Wright, M. Adler, B. N. Levine, and C. Shields, “Defending anonymous communication against passive logging attacks, ” in Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 28-43.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 28-43
-
-
Wright, M.1
Adler, M.2
Levine, B. N.3
Shields, C.4
-
9
-
-
84855656395
-
Exploring the potential benefits of expanded rate limiting in tor: Slow and steady wins the race with tortoise
-
Orlando, FL, USA, December
-
W. B. Moore, C. Wacek, and M. Sherr, “Exploring the potential benefits of expanded rate limiting in tor: Slow and steady wins the race with tortoise, ” in Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11), Orlando, FL, USA, December 2011.
-
(2011)
Proceedings of 2011 Annual Computer Security Applications Conference (ACSAC'11)
-
-
Moore, W. B.1
Wacek, C.2
Sherr, M.3
-
12
-
-
79961205200
-
Defenestrator: Throwing out windows in tor
-
Springer
-
M. AlSabah, K. Bauer, I. Goldberg, D. Grunwald, D. McCoy, S. Savage, and G. Voelker, “Defenestrator: Throwing out windows in tor, ” in Privacy Enhancing Technologies. Springer, 2011, pp. 134-154.
-
(2011)
Privacy Enhancing Technologies
, pp. 134-154
-
-
AlSabah, M.1
Bauer, K.2
Goldberg, I.3
Grunwald, D.4
McCoy, D.5
Savage, S.6
Voelker, G.7
-
13
-
-
84910660558
-
Congestion-aware Path Selection for Tor
-
T. Wang, K. Bauer, C. Forero, and I. Goldberg, “Congestion-aware Path Selection for Tor, ” in 16th International Conference on Financial Cryptography and Data Security (FC), 2012.
-
(2012)
16th International Conference on Financial Cryptography and Data Security (FC)
-
-
Wang, T.1
Bauer, K.2
Forero, C.3
Goldberg, I.4
-
14
-
-
85180418631
-
-
“Torservers.net, ” https://www.torservers.net/.
-
Torservers.net
-
-
-
18
-
-
78650008548
-
Building incentives into Tor
-
R. Sion, Ed., January
-
T.-W. J. Ngan, R. Dingledine, and D. S. Wallach, “Building incentives into Tor, ” in Proceedings of Financial Cryptography (FC'10), R. Sion, Ed., January 2010.
-
(2010)
Proceedings of Financial Cryptography (FC'10)
-
-
Ngan, T.-W. J.1
Dingledine, R.2
Wallach, D. S.3
-
19
-
-
50349083227
-
PAR: Payment for anonymous routing
-
N. Borisov and I. Goldberg, Eds. Leuven, Belgium: Springer-Verlag, LNCS 5134, July
-
E. Androulaki, M. Raykova, S. Srivatsan, A. Stavrou, and S. M. Bellovin, “PAR: Payment for anonymous routing, ” in Privacy Enhancing Technologies: 8th International Symposium, PETS 2008, N. Borisov and I. Goldberg, Eds. Leuven, Belgium: Springer-Verlag, LNCS 5134, July 2008, pp. 219-236.
-
(2008)
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008
, pp. 219-236
-
-
Androulaki, E.1
Raykova, M.2
Srivatsan, S.3
Stavrou, A.4
Bellovin, S. M.5
-
21
-
-
78650009813
-
Recruiting new Tor relays with BRAIDS
-
Chicago, Illinois, USA, October 4-8, A. D. Keromytis and Shmatikov, Eds. ACM, 2010
-
R. Jansen, N. Hopper, and Y. Kim, “Recruiting new Tor relays with BRAIDS, ” in Proceedings of the 2010 ACM Conference on Computer and Communications Security, CCS 2010, Chicago, Illinois, USA, October 4-8, 2010, A. D. Keromytis and V. Shmatikov, Eds. ACM, 2010.
-
(2010)
Proceedings of the 2010 ACM Conference on Computer and Communications Security, CCS 2010
-
-
Jansen, R.1
Hopper, N.2
Kim, Y.3
-
22
-
-
0033365373
-
A case for relative differentiated services and the proportional differentiation model
-
C. Dovrolis and P. Ramanathan, “A case for relative differentiated services and the proportional differentiation model, ” Network, IEEE, vol. 13, no. 5, pp. 26-34, 1999.
-
(1999)
Network, IEEE
, vol.13
, Issue.5
, pp. 26-34
-
-
Dovrolis, C.1
Ramanathan, P.2
-
24
-
-
0038311861
-
Towards an analysis of onion routing security
-
H. Federrath, Ed. Springer-Verlag, LNCS July 2000
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr, “Towards an analysis of onion routing security, ” in Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability, H. Federrath, Ed. Springer-Verlag, LNCS 2009, July 2000, pp. 96-114.
-
(2009)
Designing Privacy Enhancing Technologies: International Workshop on Design Issues in Anonymity and Unobservability
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
25
-
-
0022145479
-
Security without identification: transaction systems to make big brother obsolete
-
Oct. [Online]. Available
-
D. Chaum, “Security without identification: transaction systems to make big brother obsolete, ” Commun. ACM, vol. 28, no. 10, pp. 1030-1044, Oct. 1985. [Online]. Available: http://doi.acm.org/10.1145/4372.4373
-
(1985)
Commun. ACM
, vol.28
, Issue.10
, pp. 1030-1044
-
-
Chaum, D.1
-
26
-
-
80055013636
-
Eigenspeed: secure peer-to-peer bandwidth evaluation
-
Berkeley, CA, USA: USENIX Association, [Online]. Available
-
R. Snader and N. Borisov, “Eigenspeed: secure peer-to-peer bandwidth evaluation, ” in Proceedings of the 8th international conference on Peer-to-peer systems, ser. IPTPS'09. Berkeley, CA, USA: USENIX Association, 2009, pp. 9-9. [Online]. Available: http://dl.acm.org/citation.cfm?id=1855663.1855672
-
(2009)
Proceedings of the 8th international conference on Peer-to-peer systems, ser. IPTPS'09
, pp. 9-9
-
-
Snader, R.1
Borisov, N.2
-
27
-
-
0023984964
-
How to construct pseudorandom permutations from pseudorandom functions
-
Apr. [Online]. Available
-
M. Luby and C. Rackoff, “How to construct pseudorandom permutations from pseudorandom functions, ” SIAM J. Comput., vol. 17, no. 2, pp. 373-386, Apr. 1988. [Online]. Available: http://dx.doi.org/10.1137/0217022
-
(1988)
SIAM J. Comput
, vol.17
, Issue.2
, pp. 373-386
-
-
Luby, M.1
Rackoff, C.2
-
28
-
-
84878370000
-
Hummingbird: privacy at the time of twitter
-
IEEE
-
E. De Cristofaro, C. Soriente, G. Tsudik, and A. Williams, “Hummingbird: privacy at the time of twitter, ” in 33rd IEEE Symposium on Security and Privacy. IEEE, 2012.
-
(2012)
33rd IEEE Symposium on Security and Privacy
-
-
De Cristofaro, E.1
Soriente, C.2
Tsudik, G.3
Williams, A.4
-
29
-
-
50249133191
-
Shining light in dark places: Understanding the Tor network
-
N. Borisov and I. Goldberg, Eds. Leuven, Belgium: Springer-Verlag, LNCS 5134, July
-
D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker, “Shining light in dark places: Understanding the Tor network, ” in Privacy Enhancing Technologies: 8th International Symposium, PETS 2008, N. Borisov and I. Goldberg, Eds. Leuven, Belgium: Springer-Verlag, LNCS 5134, July 2008, pp. 63-76.
-
(2008)
Privacy Enhancing Technologies: 8th International Symposium, PETS 2008
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
31
-
-
50649104607
-
Statistics and social network of youtube videos
-
X. Cheng, C. Dale, and J. Liu, “Statistics and social network of youtube videos, ” in In the Proceeding of the 16th IEEE International Workshop on Quality of Service (IWQoS), 2008, pp. 229-238.
-
(2008)
the Proceeding of the 16th IEEE International Workshop on Quality of Service (IWQoS)
, pp. 229-238
-
-
Cheng, X.1
Dale, C.2
Liu, J.3
-
32
-
-
0003872064
-
-
United States
-
S. Blake, D. Black, M. Carlson, E. Davies, Z. Wang, and W. Weiss, “An architecture for differentiated service, ” United States, 1998.
-
(1998)
An architecture for differentiated service
-
-
Blake, S.1
Black, D.2
Carlson, M.3
Davies, E.4
Wang, Z.5
Weiss, W.6
-
33
-
-
0036476131
-
Proportional differentiated services: Delay differentiation and packet scheduling
-
C. Dovrolis, D. Stiliadis, and P. Ramanathan, “Proportional differentiated services: Delay differentiation and packet scheduling, ” IEEE/ACM Transactions on Networking (TON), vol. 10, no. 1, pp. 12-26, 2002.
-
(2002)
IEEE/ACM Transactions on Networking (TON)
, vol.10
, Issue.1
, pp. 12-26
-
-
Dovrolis, C.1
Stiliadis, D.2
Ramanathan, P.3
-
34
-
-
50249115176
-
Probabilistic analysis of onion routing in a black-box model
-
J. Feigenbaum, A. Johnson, and P. Syverson, “Probabilistic analysis of onion routing in a black-box model, ” in Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society (WPES 2007), 2007, pp. 1-10.
-
(2007)
Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society (WPES 2007)
, pp. 1-10
-
-
Feigenbaum, J.1
Johnson, A.2
Syverson, P.3
-
36
-
-
77949464624
-
How much anonymity does network latency leak?
-
February
-
N. Hopper, E. Y. Vasserman, and E. Chan-Tin, “How much anonymity does network latency leak?” ACM Transactions on Information and System Security, vol. 13, no. 2, February 2010.
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.2
-
-
Hopper, N.1
Vasserman, E. Y.2
Chan-Tin, E.3
-
37
-
-
56649105529
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
October
-
N. Borisov, G. Danezis, P. Mittal, and P. Tabriz, “Denial of service or denial of security? How attacks on reliability can compromise anonymity, ” in Proceedings of CCS 2007, October 2007.
-
(2007)
Proceedings of CCS 2007
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
38
-
-
84860665629
-
Do incentives build robustness in BitTorrent?
-
USENIX, Apr. [Online]. Available
-
M. Piatek, T. Isdal, T. Anderson, A. Krishnamurthy, and A. Venkataramani, “Do incentives build robustness in BitTorrent?” in Proceedings of the 4th USENIX Symposium on Networked Systems Design & Implementation (NSDI 2007). USENIX, Apr. 2007. [Online]. Available: http://www.usenix.org/events/nsdi07/tech/piatek/piatek.pdf
-
(2007)
Proceedings of the 4th USENIX Symposium on Networked Systems Design & Implementation (NSDI 2007)
-
-
Piatek, M.1
Isdal, T.2
Anderson, T.3
Krishnamurthy, A.4
Venkataramani, A.5
-
39
-
-
85134026938
-
Free Riding in BitTorrent is Cheap
-
Irvine, California, USA, November
-
T. Locher, P. Moor, S. Schmid, and R. Wattenhofer, “Free Riding in BitTorrent is Cheap, ” in 5th Workshop on Hot Topics in Networks (HotNets), Irvine, California, USA, November 2006.
-
(2006)
5th Workshop on Hot Topics in Networks (HotNets)
-
-
Locher, T.1
Moor, P.2
Schmid, S.3
Wattenhofer, R.4
-
41
-
-
85180401152
-
-
“Shadow Code, ” http://github.com/shadow/.
-
Shadow Code
-
-
-
42
-
-
85084163714
-
Methodically Modeling the Tor Network
-
August
-
R. Jansen, K. Bauer, N. Hopper, and R. Dingledine, “Methodically Modeling the Tor Network, ” in Proceedings of the 5th Workshop on Cyber Security Experimentation and Test, August 2012.
-
(2012)
Proceedings of the 5th Workshop on Cyber Security Experimentation and Test
-
-
Jansen, R.1
Bauer, K.2
Hopper, N.3
Dingledine, R.4
-
43
-
-
84887028845
-
-
“MaxMind GeoIP, ” http://www.maxmind.com/.
-
MaxMind GeoIP
-
-
-
44
-
-
84872956076
-
iPlane: An Information Plane for Distributed Services
-
H. Madhyastha, T. Isdal, M. Piatek, C. Dixon, T. Anderson, A. Krishnamurthy, and A. Venkataramani, “iPlane: An Information Plane for Distributed Services, ” in Proc. of USENIX OSDI, 2006, pp. 367-380.
-
(2006)
Proc. of USENIX OSDI
, pp. 367-380
-
-
Madhyastha, H.1
Isdal, T.2
Piatek, M.3
Dixon, C.4
Anderson, T.5
Krishnamurthy, A.6
Venkataramani, A.7
-
45
-
-
84878349287
-
-
“iPlane: Datasets, ” http://iplane.cs.washington.edu/data/data.html.
-
iPlane: Datasets
-
-
-
46
-
-
84889047189
-
-
“Net Index Dataset, ” http://www.netindex.com/source-data/.
-
Net Index Dataset
-
-
-
47
-
-
78650349115
-
Digging into anonymous traffic: A deep analysis of the tor anonymizing network
-
IEEE
-
A. Chaabane, P. Manils, and M. Kaafar, “Digging into anonymous traffic: A deep analysis of the tor anonymizing network, ” in Network and System Security (NSS), 2010 4th International Conference on. IEEE, 2010, pp. 167-174.
-
(2010)
Network and System Security (NSS), 2010 4th International Conference on
, pp. 167-174
-
-
Chaabane, A.1
Manils, P.2
Kaafar, M.3
-
49
-
-
26444594281
-
A payment scheme for mixes providing anonymity
-
E. Franz, A. Jerichow, and G. Wicke, “A payment scheme for mixes providing anonymity, ” Trends in Distributed Systems for Electronic Commerce, pp. 94-108, 1998.
-
(1998)
Trends in Distributed Systems for Electronic Commerce
, pp. 94-108
-
-
Franz, E.1
Jerichow, A.2
Wicke, G.3
-
51
-
-
34547340306
-
Building reliable mix networks with fair exchange
-
Springer
-
M. Reiter, X. Wang, and M. Wright, “Building reliable mix networks with fair exchange, ” in Applied Cryptography and Network Security. Springer, 2005, pp. 159-173.
-
(2005)
Applied Cryptography and Network Security
, pp. 159-173
-
-
Reiter, M.1
Wang, X.2
Wright, M.3
-
52
-
-
35248878897
-
On the economics of anonymity
-
Springer-Verlag, LNCS 2742
-
A. Acquisti, R. Dingledine, and P. Syverson, “On the economics of anonymity, ” in Financial Cryptography. Springer-Verlag, LNCS 2742, 2003, pp. 84-102.
-
(2003)
Financial Cryptography
, pp. 84-102
-
-
Acquisti, A.1
Dingledine, R.2
Syverson, P.3
-
53
-
-
84856110928
-
One-to-n scrip systems for cooperative privacy-enhancing technologies
-
M. Humbert, M. Manshaei, and J.-P. Hubaux, “One-to-n scrip systems for cooperative privacy-enhancing technologies, ” in Proceedings of the 49th Annual Allerton Conference on Communication, Control, and Computing, 2011.
-
(2011)
Proceedings of the 49th Annual Allerton Conference on Communication, Control, and Computing
-
-
Humbert, M.1
Manshaei, M.2
Hubaux, J.-P.3
|