-
2
-
-
33745965912
-
Curve25519: New Diffie-Hellman speed records
-
Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. Springer, Heidelberg
-
Bernstein, D.J.: Curve25519: New Diffie-Hellman speed records. In: Yung, M., Dodis, Y., Kiayias, A., Malkin, T. (eds.) PKC 2006. LNCS, vol. 3958, pp. 207-228. Springer, Heidelberg (2006), http://cr.yp.to/ecdh/curve25519-20060209. pdf
-
(2006)
LNCS
, vol.3958
, pp. 207-228
-
-
Bernstein, D.J.1
-
3
-
-
85084096178
-
One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
-
Le Blond, S., et al.: One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. In: LEET. USENIX (2011), https://www.usenix.org/legacy/events/leet11/tech/ full-papers/LeBlond.pdf
-
(2011)
LEET
-
-
Le Blond, S.1
-
4
-
-
85084096676
-
Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
-
Le Blond, S., et al.: Spying the World from Your Laptop: Identifying and Profiling Content Providers and Big Downloaders in BitTorrent. In: LEET. USENIX (2010), https://www.usenix.org/legacy/event/leet10/tech/ full-papers/LeBlond.pdf
-
(2010)
LEET
-
-
Le Blond, S.1
-
5
-
-
84857297875
-
Detecting Traffic Snooping in Tor Using Decoys
-
Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. Springer, Heidelberg
-
Chakravarty, S., Portokalidis, G., Polychronakis, M., Keromytis, A.D.: Detecting Traffic Snooping in Tor Using Decoys. In: Sommer, R., Balzarotti, D., Maier, G. (eds.) RAID 2011. LNCS, vol. 6961, pp. 222-241. Springer, Heidelberg (2011), http://www.cs.columbia.edu/~mikepo/papers/ tordecoys.raid11.pdf
-
(2011)
LNCS
, vol.6961
, pp. 222-241
-
-
Chakravarty, S.1
Portokalidis, G.2
Polychronakis, M.3
Keromytis, A.D.4
-
6
-
-
84904007386
-
-
Crossbear, http://www.crossbear.org
-
-
-
-
8
-
-
38149068722
-
Anonymity Loves Company: Usability and the Network Effect
-
Dingledine, R., Mathewson, N.: Anonymity Loves Company: Usability and the Network Effect. In: WEIS (2006), http://freehaven.net/doc/wupss04/usability.pdf
-
(2006)
WEIS
-
-
Dingledine, R.1
Mathewson, N.2
-
10
-
-
85084161366
-
Tor: The Second-Generation Onion Router
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router. In: USENIX Security. USENIX (2004), http://static.usenix.org/ event/sec04/tech/full-papers/ dingledine/dingledine.pdf
-
(2004)
USENIX Security
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
11
-
-
84903991836
-
-
Electronic Frontier Foundation. HTTPS Everywhere (2013), https://www.eff.org/https-everywhere
-
(2013)
HTTPS Everywhere
-
-
-
12
-
-
72849147698
-
On the Security of the Tor Authentication Protocol
-
Danezis, G., Golle, P. (eds.) PET 2006. Springer, Heidelberg
-
Goldberg, I.: On the Security of the Tor Authentication Protocol. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 316-331. Springer, Heidelberg (2006), http://freehaven.net/anonbib/cache/tap:pet2006.pdf
-
(2006)
LNCS
, vol.4258
, pp. 316-331
-
-
Goldberg, I.1
-
14
-
-
84867371760
-
-
Hodges, J., Jackson, C., Barth, A.: HTTP Strict Transport Security, HSTS (2012), https://tools.ietf.org/html/rfc6797
-
(2012)
HTTP Strict Transport Security, HSTS
-
-
Hodges, J.1
Jackson, C.2
Barth, A.3
-
15
-
-
84867371760
-
-
Hodges, J., Jackson, C., Barth, A.: RFC 6797: HTTP Strict Transport Security, HSTS (2012), https://tools.ietf.org/html/rfc6797
-
(2012)
RFC 6797: HTTP Strict Transport Security, HSTS
-
-
Hodges, J.1
Jackson, C.2
Barth, A.3
-
16
-
-
77954649872
-
Tor HTTP Usage and Information Leakage
-
De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. Springer, Heidelberg
-
Huber, M., Mulazzani, M.,Weippl, E.: Tor HTTP Usage and Information Leakage. In: De Decker, B., Schaumüller-Bichl, I. (eds.) CMS 2010. LNCS, vol. 6109, pp. 245-255. Springer, Heidelberg (2010), http://freehaven.net/ anonbib/cache/huber2010tor.pdf
-
(2010)
LNCS
, vol.6109
, pp. 245-255
-
-
Huber, M.1
Mulazzani, M.2
Weippl, E.3
-
17
-
-
84904007391
-
-
InformAction. NoScript (2013), http://noscript.net
-
(2013)
InformAction
-
-
-
18
-
-
84904007377
-
-
Known Bad Relays, https://trac.torproject.org/projects/tor/wiki/doc/ badRelays
-
Known Bad Relays
-
-
-
19
-
-
84904007379
-
-
Thoughtcrime Labs. Convergence (2011), http://convergence.io
-
(2011)
Thoughtcrime Labs
-
-
-
24
-
-
50249133191
-
Shining Light in Dark Places: Understanding the Tor Network
-
Borisov, N., Goldberg, I. (eds.) PETS 2008. Springer, Heidelberg
-
McCoy, D., Bauer, K., Grunwald, D., Kohno, T., Sicker, D.C.: Shining Light in Dark Places: Understanding the Tor Network. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 63-76. Springer, Heidelberg (2008), http://homes.cs.washington.edu/~yoshi/papers/ Tor/PETS2008-37.pdf
-
(2008)
LNCS
, vol.5134
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.C.5
-
27
-
-
84904022122
-
-
SkullSecurity. Passwords (2011), https://wiki.skullsecurity.org/Passwords
-
(2011)
Passwords
-
-
-
29
-
-
84903946903
-
-
The Tor Project. ExoneraTor, https://exonerator.torproject.org
-
ExoneraTor
-
-
-
31
-
-
84904007282
-
-
The Tor Project. Snakes on a Tor, https://gitweb.torproject.org/ torflow.git/tree/HEAD:/NetworkScanners/ExitAuthority
-
Snakes on a Tor
-
-
-
32
-
-
84904007283
-
-
The Tor Project. Stem Docs, https://stem.torproject.org
-
Stem Docs
-
-
-
35
-
-
84904007285
-
-
Torscanner, https://code.google.com/p/torscanner/
-
Torscanner
-
-
-
37
-
-
85034040740
-
Perspectives: Improving SSHstyle Host Authentication with Multi-Path Probing
-
Wendlandt, D., Andersen, D.G., Perrig, A.: Perspectives: Improving SSHstyle Host Authentication with Multi-Path Probing. In: ATC. USENIX (2008), http://perspectivessecurity.files.wordpress.com/ 2011/07/perspectives-usenix08. pdf
-
(2008)
ATC
-
-
Wendlandt, D.1
Andersen, D.G.2
Perrig, A.3
|