-
5
-
-
84889036160
-
-
De-anonymizing BitTorrent Users on Tor (poster)
-
S. L. Blond, P. Manils, A. Chaabane, M. A. Kaafar, A. Legout, C. Castellucia, and W. Dabbous. De-anonymizing BitTorrent Users on Tor (poster). In USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010.
-
USENIX Symposium on Networked Systems Design and Implementation (NSDI), 2010
-
-
Blond, S.L.1
Manils, P.2
Chaabane, A.3
Kaafar, M.A.4
Legout, A.5
Castellucia, C.6
Dabbous, W.7
-
9
-
-
84888994496
-
-
December
-
CAIDA. IPv4 Routed /24 Topology Dataset. http://www.caida.org/data/ active/ipv4-routed-24-topology-dataset.xml, December 2012.
-
(2012)
IPv4 Routed /24 Topology Dataset
-
-
-
11
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 24(2):84-90, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
16
-
-
84869175529
-
Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor
-
T. Elahi, K. Bauer, M. AlSabah, R. Dingledine, and I. Goldberg. Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor. In ACM Workshop on Privacy in the Electronic Society (WPES), 2012.
-
ACM Workshop on Privacy in the Electronic Society (WPES), 2012
-
-
Elahi, T.1
Bauer, K.2
AlSabah, M.3
Dingledine, R.4
Goldberg, I.5
-
21
-
-
0035704351
-
On Inferring Autonomous System Relationships in the Internet
-
December
-
L. Gao. On Inferring Autonomous System Relationships in the Internet. In IEEE/ACM Transactions on Networking, volume 9, pages 733-745, December 2001.
-
(2001)
IEEE/ACM Transactions on Networking
, vol.9
, pp. 733-745
-
-
Gao, L.1
-
23
-
-
84889027410
-
-
Technical Report 2011-18, Cheriton School of Computer Science, University of Waterloo
-
A. Hamel, J.-C. Grégoire, and I. Goldberg. The Misentropists: New Approaches to Measures in Tor. Technical Report 2011-18, Cheriton School of Computer Science, University of Waterloo, 2011.
-
(2011)
The Misentropists: New Approaches to Measures in Tor
-
-
Hamel, A.1
Grégoire, J.-C.2
Goldberg, I.3
-
24
-
-
77949464624
-
How Much Anonymity Does Network Latency Leak?
-
N. Hopper, E. Y. Vasserman, and E. Chan-Tin. How Much Anonymity Does Network Latency Leak? ACM Transactions on Information and System Security (TISSEC), 13(2): 13, 2010.
-
(2010)
ACM Transactions on Information and System Security (TISSEC)
, vol.13
, Issue.2
, pp. 13
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
27
-
-
80755168359
-
Trust-based anonymous communication: Adversary models and routing algorithms
-
ACM
-
A. Johnson, P. Syverson, R. Dingledine, and N. Mathewson. Trust-based anonymous communication: Adversary models and routing algorithms. In Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011), pages 175-186. ACM, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011)
, pp. 175-186
-
-
Johnson, A.1
Syverson, P.2
Dingledine, R.3
Mathewson, N.4
-
31
-
-
84889074599
-
-
Office of Engineering and Technology and Consumer and Governmental Affairs Bureau. Federal Communications Commission, February
-
Office of Engineering and Technology and Consumer and Governmental Affairs Bureau. A Report on Consumer Wireline Broadband Performance in the U.S. Technical report, Federal Communications Commission, February 2013.
-
(2013)
A Report on Consumer Wireline Broadband Performance in the U.S. Technical Report
-
-
-
36
-
-
80955131241
-
BridgeSPA: Improving Tor Bridges with Single Packet Authorization
-
R. Smits, D. Jain, S. Pidcock, I. Goldberg, and U. Hengartner. BridgeSPA: Improving Tor Bridges with Single Packet Authorization. In ACM Workshop on Privacy in the Electronic Society (WPES), 2011.
-
ACM Workshop on Privacy in the Electronic Society (WPES), 2011
-
-
Smits, R.1
Jain, D.2
Pidcock, S.3
Goldberg, I.4
Hengartner, U.5
-
39
-
-
84889048012
-
-
The Tor Project. Changelog Tor 0.2.4.12-alpha. https://gitweb.torproject. org/tor.git?a=blob-plain;hb=HEAD;f=ChangeLog.
-
Changelog Tor 0.2.4.12-alpha
-
-
-
40
-
-
84885014905
-
-
Tor Project, Inc. Tor Metrics Portal. https://metrics.torproject.org/, 2013.
-
(2013)
Tor Metrics Portal
-
-
-
41
-
-
84870651248
-
-
Tor Project, Inc. The Tor Project. https://www.torproject.org/, 2013.
-
(2013)
The Tor Project
-
-
-
43
-
-
84889012458
-
-
University of Oregon
-
University of Oregon. RouteViews Project. http://www.routeviews.org/, 2013.
-
(2013)
-
-
-
46
-
-
33749242004
-
-
Springer-Verlag New York, Inc., Secaucus, NJ, USA
-
L. Wasserman. All of Nonparametric Statistics (Springer Texts in Statistics). Springer-Verlag New York, Inc., Secaucus, NJ, USA, 2006.
-
(2006)
All of Nonparametric Statistics (Springer Texts in Statistics)
-
-
Wasserman, L.1
-
47
-
-
14544273666
-
The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems
-
November
-
M. Wright, M. Adler, B. N. Levine, and C. Shields. The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems. ACM Transactions on Information and System Security (TISSEC), 4(7):489-522, November 2004.
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.4
, Issue.7
, pp. 489-522
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
|