-
1
-
-
84889066834
-
-
Accessed Feb. 2013
-
iPlane: Data. http://iplane.cs.washington.edu/data/data.html. Accessed Feb. 2013.
-
IPlane: Data
-
-
-
2
-
-
84889047189
-
-
Accessed Feb. 2013
-
Net Index Dataset. http://www.netindex.com/source- data/. Accessed Feb. 2013.
-
Net Index Dataset
-
-
-
3
-
-
84889036566
-
-
Accessed Feb. 2013
-
OpenSwan. https://www.openswan.org/projects/openswan/. Accessed Feb. 2013.
-
-
-
-
4
-
-
84878356050
-
LASTor: A Low-Latency AS-Aware Tor Client
-
Washington, DC, USA, IEEE Computer Society
-
M. Akhoondi, C. Yu, and H. V. Madhyastha. LASTor: A Low-Latency AS-Aware Tor Client. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12, pages 476-490, Washington, DC, USA, 2012. IEEE Computer Society.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy, SP '12
, pp. 476-490
-
-
Akhoondi, M.1
Yu, C.2
Madhyastha, H.V.3
-
5
-
-
84869460839
-
Enhancing Tor's performance using real-time traffic classification
-
ACM
-
M. AlSabah, K. Bauer, and I. Goldberg. Enhancing Tor's performance using real-time traffic classification. In Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, pages 73-84. ACM, 2012.
-
(2012)
Proceedings of the 2012 ACM Conference on Computer and Communications Security, CCS '12
, pp. 73-84
-
-
AlSabah, M.1
Bauer, K.2
Goldberg, I.3
-
6
-
-
79961205200
-
DefenestraTor: Throwing out Windows in Tor
-
July
-
M. AlSabah, K. Bauer, I. Goldberg, D. Grunwald, D. McCoy, S. Savage, and G. M. Voelker. DefenestraTor: Throwing out Windows in Tor. In 11th Privacy Enhancing Technologies Symposium, pages 134-154, July 2011.
-
(2011)
11th Privacy Enhancing Technologies Symposium
, pp. 134-154
-
-
AlSabah, M.1
Bauer, K.2
Goldberg, I.3
Grunwald, D.4
McCoy, D.5
Savage, S.6
Voelker, G.M.7
-
8
-
-
85084164002
-
ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation
-
August
-
K. Bauer, M. Sherr, D. McCoy, and D. Grunwald. ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation. In Proceedings of the 4th USENIX Workshop on Cyber Security Experimentation and Test (CSET), pages 51-59, August 2011.
-
(2011)
Proceedings of the 4th USENIX Workshop on Cyber Security Experimentation and Test (CSET)
, pp. 51-59
-
-
Bauer, K.1
Sherr, M.2
McCoy, D.3
Grunwald, D.4
-
9
-
-
0038684291
-
-
White paper, Zero Knowledge Systems, Inc., December
-
P. Boucher, A. Shostack, and I. Goldberg. Freedom Systems 2.0 Architecture. White paper, Zero Knowledge Systems, Inc., December 2000.
-
(2000)
Freedom Systems 2.0 Architecture
-
-
Boucher, P.1
Shostack, A.2
Goldberg, I.3
-
10
-
-
1642305823
-
-
Technical Report RR-2650, INRIA, Sept.
-
T. Braun, C. Diot, A. Hoglander, and V. Roca. An Experimental User Level Implementation of TCP. Technical Report RR-2650, INRIA, Sept. 1995.
-
(1995)
An Experimental User Level Implementation of TCP
-
-
Braun, T.1
Diot, C.2
Hoglander, A.3
Roca, V.4
-
11
-
-
84888994168
-
-
June Accessed Feb. 2013
-
Z. Brown. Pragmatic IP Anonymity. http://www.cypherspace.org/cebolla/ cebolla.pdf, June 2002. Accessed Feb. 2013.
-
(2002)
Pragmatic IP Anonymity
-
-
Brown, Z.1
-
16
-
-
84969381944
-
Experiences implementing a high performance TCP in user-space
-
ACM
-
A. Edwards and S. Muir. Experiences implementing a high performance TCP in user-space. In Proceedings of the conference on Applications, technologies, architectures, and protocols for computer communication, SIGCOMM '95, pages 196-205. ACM, 1995.
-
(1995)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM '95
, pp. 196-205
-
-
Edwards, A.1
Muir, S.2
-
20
-
-
78650009813
-
Recruiting New Tor Relays with BRAIDS
-
ACM
-
R. Jansen, N. Hopper, and Y. Kim. Recruiting New Tor Relays with BRAIDS. In Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10, pages 319-328. ACM, 2010.
-
(2010)
Proceedings of the 17th ACM Conference on Computer and Communications Security, CCS '10
, pp. 319-328
-
-
Jansen, R.1
Hopper, N.2
Kim, Y.3
-
23
-
-
24344507334
-
Remote Physical Device Fingerprinting
-
Apr.
-
T. Kohno, A. Broido, and K. C. Claffy. Remote Physical Device Fingerprinting. IEEE Trans. Dependable Secur. Comput., 2(2):93-108, Apr. 2005.
-
(2005)
IEEE Trans. Dependable Secur. Comput.
, vol.2
, Issue.2
, pp. 93-108
-
-
Kohno, T.1
Broido, A.2
Claffy, K.C.3
-
24
-
-
50249133191
-
Shining Light in Dark Places: Understanding the Tor Network
-
July
-
D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker. Shining Light in Dark Places: Understanding the Tor Network. In Proceedings of the 8th Privacy Enhancing Technologies Symposium, pages 63-76, July 2008.
-
(2008)
Proceedings of the 8th Privacy Enhancing Technologies Symposium
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
25
-
-
74049096125
-
Scalable Onion Routing with Torsk
-
ACM
-
J. McLachlan, A. Tran, N. Hopper, and Y. Kim. Scalable Onion Routing with Torsk. In Proceedings of the 16th ACM conference on Computer and Communications Security, CCS '09, pages 590-599. ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 590-599
-
-
McLachlan, J.1
Tran, A.2
Hopper, N.3
Kim, Y.4
-
26
-
-
84962047384
-
PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval
-
P. Mittal, F. Olumofin, C. Troncoso, N. Borisov, and I. Goldberg. PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. In Proceedings of the 20th USENIX Security Symposium, August 2011.
-
Proceedings of the 20th USENIX Security Symposium, August 2011
-
-
Mittal, P.1
Olumofin, F.2
Troncoso, C.3
Borisov, N.4
Goldberg, I.5
-
30
-
-
0032178265
-
Modeling TCP throughput: A simple model and its empirical validation
-
ACM
-
J. Padhye, V. Firoiu, D. Towsley, and J. Kurose. Modeling TCP throughput: a simple model and its empirical validation. In Proceedings of the ACM SIGCOMM '98 conference on Applications, technologies, architectures, and protocols for computer communication, SIGCOMM '98, pages 303-314. ACM, 1998.
-
(1998)
Proceedings of the ACM SIGCOMM '98 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, SIGCOMM '98
, pp. 303-314
-
-
Padhye, J.1
Firoiu, V.2
Towsley, D.3
Kurose, J.4
-
33
-
-
69949183651
-
Scalable Link-Based Relay Selection for Anonymous Routing
-
Berlin, Heidelberg, Springer-Verlag
-
M. Sherr, M. Blaze, and B. T. Loo. Scalable Link-Based Relay Selection for Anonymous Routing. In PETS '09: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies, pages 73-93, Berlin, Heidelberg, 2009. Springer-Verlag.
-
(2009)
PETS '09: Proceedings of the 9th International Symposium on Privacy Enhancing Technologies
, pp. 73-93
-
-
Sherr, M.1
Blaze, M.2
Loo, B.T.3
-
34
-
-
33749071849
-
Analysis of IPSec overheads for VPN servers
-
Washington, DC, USA, IEEE Computer Society
-
C. Shue, Y. Shin, M. Gupta, and J. Y. Choi. Analysis of IPSec overheads for VPN servers. In Proceedings of the First international conference on Secure network protocols, NPSEC'05, pages 25-30, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
Proceedings of the First International Conference on Secure Network Protocols, NPSEC'05
, pp. 25-30
-
-
Shue, C.1
Shin, Y.2
Gupta, M.3
Choi, J.Y.4
-
38
-
-
84870633783
-
-
Accessed Feb. 2013
-
The Tor Project. Tor Metrics Portal: Data. https://metrics.torproject. org/data.html#performance. Accessed Feb. 2013.
-
Tor Metrics Portal: Data
-
-
-
39
-
-
84870633783
-
-
Accessed Feb. 2013
-
The Tor Project. Tor Metrics Portal: Network. http://metrics.torproject. org/network.html. Accessed Feb. 2013.
-
Tor Metrics Portal: Network
-
-
-
41
-
-
84978397901
-
Scalability and Accuracy in a Large-scale Network Emulator
-
Dec.
-
A. Vahdat, K. Yocum, K. Walsh, P. Mahadevan, D. Kostić, J. Chase, and D. Becker. Scalability and Accuracy in a Large-scale Network Emulator. SIGOPS Oper. Syst. Rev., 36(SI):271-284, Dec. 2002.
-
(2002)
SIGOPS Oper. Syst. Rev.
, vol.36
, Issue.SI
, pp. 271-284
-
-
Vahdat, A.1
Yocum, K.2
Walsh, K.3
Mahadevan, P.4
Kostić, D.5
Chase, J.6
Becker, D.7
|