-
1
-
-
34249985369
-
Undermining Freedom of Expression in China
-
accessed on 8 May 2012
-
Amnesty International. Undermining Freedom of Expression in China. 2006. Available online: http://www.amnestyusa.org/business/Undermining Freedom of Expression in China.pdf (accessed on 8 May 2012).
-
(2006)
-
-
-
2
-
-
85084161366
-
Tor the Second-Generation Onion Router
-
San Diego, CA, USA, 9-13 August
-
Dingledine, R.; Mathewson, N.; Syverson, P. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium, San Diego, CA, USA, 9-13 August 2004.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
3
-
-
85019269368
-
-
accessed on 8 May 2012.
-
Tor Project Web Site. 2010. Available online: https://www.torproject.org/ (accessed on 8 May 2012).
-
(2010)
-
-
-
5
-
-
70350160452
-
Anonymity on the Internet
-
accessed on 8 May 2012
-
Palme, J.; Berglund, M. Anonymity on the Internet. 2002. Available online: http://people.dsv.su. se/~jpalme/society/anonymity.html (accessed on 8 May 2012).
-
(2002)
-
-
Palme, J.1
Berglund, M.2
-
6
-
-
84911352111
-
Anonymous Networks
-
accessed on 8 May 2012
-
Vitone, D. Anonymous Networks. 2008. Available online: http://blag.cerebralmind.net/ wp-content/uploads/2008/05/tor.pdf (accessed on 8 May 2012).
-
(2008)
-
-
Vitone, D.1
-
7
-
-
84878363071
-
A Case Study on Measuring Statistical Data in the Tor Anonymity Network
-
Canary Islands, Spain, 28-29 January 2010.
-
Loesing, K.; Murdoch, S.J.; Dingledine, R. A Case Study on Measuring Statistical Data in the Tor Anonymity Network. In Proceedings of the Workshop on Ethics in Computer Security Research (WECSR 2010), Canary Islands, Spain, 28-29 January 2010.
-
In Proceedings of the Workshop on Ethics in Computer Security Research (WECSR 2010)
-
-
Loesing, K.1
Murdoch, S.J.2
Dingledine, R.3
-
8
-
-
78649999445
-
Performance Improvements on Tor
-
accessed on 8 May 2012
-
Dingledine, R.; Murdoch, S.J. Performance Improvements on Tor. 2009. Available online: https: //www.torproject.org/press/presskit/2009-03-11-performance.pdf (accessed on 8 May 2012).
-
(2009)
-
-
Dingledine, R.1
Murdoch, S.J.2
-
10
-
-
85019211133
-
-
accessed on 8 May 2012
-
PlanetLab User's Guide. 2011. Available online: http://www.planet-lab.org/doc/guides/user (accessed on 8 May 2012).
-
(2011)
-
-
-
11
-
-
35248817413
-
Security, privacy, and anonymity
-
Wright, T. Security, privacy, and anonymity. ACM 2004, 11, doi:10.1145/1144403.1144408.
-
(2004)
ACM
, vol.11
-
-
Wright, T.1
-
12
-
-
70450257560
-
Security and Usability: The Gap in Real-World Online Banking
-
North Conway, NH, USA, 18-21 September
-
Mannan, M.; van Oorschot, P.C. Security and Usability: The Gap in Real-World Online Banking. In Proceedings of the 2007Workshop on New Security Paradigms, North Conway, NH, USA, 18-21 September 2007; pp. 1-14.
-
(2007)
Proceedings of the 2007Workshop on New Security Paradigms
, pp. 1-14
-
-
Mannan, M.1
van Oorschot, P.C.2
-
13
-
-
35248878897
-
On the Economics of Anonymity
-
Wright, R.N., Ed.; Springer: Berlin, Germany
-
Acquisti, A.; Dingledine, R.; Syverson, P. On the Economics of Anonymity. In Proceedings of the Financial Cryptography (FC '03); Wright, R.N., Ed.; Springer: Berlin, Germany, 2003; pp. 84-102.
-
(2003)
Proceedings of the Financial Cryptography (FC '03)
, pp. 84-102
-
-
Acquisti, A.1
Dingledine, R.2
Syverson, P.3
-
14
-
-
40949164681
-
A Clean-Slate Design for the Next-Generation Secure Internet
-
accessed on 10 May 2012
-
Bellovin, S.M.; Clark, D.D.; Perrig, A. A Clean-Slate Design for the Next-Generation Secure Internet. Available online: http://mars.cs.kent.edu/~peyravi/Net208S/Lec/NextGenInternet.pdf (accessed on 10 May 2012).
-
-
-
Bellovin, S.M.1
Clark, D.D.2
Perrig, A.3
-
15
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 1981, 24, 84-88.
-
(1981)
Commun. ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
16
-
-
35248866624
-
Mix-Networks with Restricted Routes
-
Dingledine, R., Ed.; Springer: Berlin, Germany
-
Danezis, G. Mix-Networks with Restricted Routes. In Proceedings of the 3rd Privacy Enhancing Technologies Workshop (PET 2003); Dingledine, R., Ed.; Springer: Berlin, Germany, 2003; Volume 2760, pp. 1-17.
-
(2003)
In Proceedings of the 3rd Privacy Enhancing Technologies Workshop (PET 2003)
, vol.2760
, pp. 1-17
-
-
Danezis, G.1
-
17
-
-
85019263144
-
Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks
-
Berlin, Germany, 21-23 July 2010.
-
Diaz, C.; Murdoch, S.J.; Troncoso, C. Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks. In Proceedings of the 10th International Symposium on Privacy Enhancing Technologies (PETS 2010), Berlin, Germany, 21-23 July 2010.
-
In Proceedings of the 10th International Symposium on Privacy Enhancing Technologies (PETS 2010)
-
-
Diaz, C.1
Murdoch, S.J.2
Troncoso, C.3
-
19
-
-
53849107800
-
Performance Measurements and Statistics of Tor Hidden Services
-
IEEE CS Press: Turku, Finland
-
Loesing, K.; Sandmann,W.; Wilms, C.; Wirtz, G. Performance Measurements and Statistics of Tor Hidden Services. In Proceedings of the 2008 International Symposium on Applications and the Internet (SAINT); IEEE CS Press: Turku, Finland, 2008.
-
(2008)
In Proceedings of the 2008 International Symposium on Applications and the Internet (SAINT)
-
-
Loesing, K.1
Sandmann, W.2
Wilms, C.3
Wirtz, G.4
-
20
-
-
68849130156
-
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
-
Paris-Rocquencourt, France, 2-5 June
-
Lenhard, J.; Loesing, K.; Wirtz, G. Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks. In Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 09), Paris-Rocquencourt, France, 2-5 June 2009; Volume 5536.
-
(2009)
In Proceedings of the 7th International Conference on Applied Cryptography and Network Security (ACNS 09)
, pp. 5536
-
-
Lenhard, J.1
Loesing, K.2
Wirtz, G.3
-
21
-
-
85019237573
-
-
(accessed on 8 May 2012).
-
Tor Metrics Portal. 2010. Available online: http://metrics.torproject.org/ (accessed on 8 May 2012).
-
(2010)
-
-
-
22
-
-
84870438015
-
Privately Waiting-A Usability Analysis of the Tor Anonymity Network
-
Springer: Berlin, Germany
-
Fabian, B.; Goertz, F.; Kunz, S.; Müller, S.; Nitzsche, M. Privately Waiting-A Usability Analysis of the Tor Anonymity Network. In Proceedings of the 16th Americas Conference on Information Systems (AMCIS 2010); Springer: Berlin, Germany, 2010; Volume 58.
-
(2010)
Proceedings of the 16th Americas Conference on Information Systems (AMCIS 2010)
, vol.58
-
-
Fabian, B.1
Goertz, F.2
Kunz, S.3
Müller, S.4
Nitzsche, M.5
-
23
-
-
50249133191
-
Shining Light in Dark Places: Understanding the Tor Network
-
Springer: Berlin, Germany
-
McCoy, D.; Bauer, K.; Grunwald, D.; Kohno, T.; Sicker, D. Shining Light in Dark Places: Understanding the Tor Network. In Proceedings of the 8th International Symposium on Privacy Enhancing Technologies (PETS 2008); Springer: Berlin, Germany, 2008; pp. 63-76.
-
(2008)
Proceedings of the 8th International Symposium on Privacy Enhancing Technologies (PETS 2008)
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
24
-
-
77955330802
-
TorFlow: Tor Network Analysis
-
accessed on 10 May
-
Perry, M. TorFlow: Tor Network Analysis. Available online: http://fscked.org/talks/ TorFlow-HotPETS-final.pdf (accessed on 10 May 2012).
-
(2012)
-
-
Perry, M.1
-
25
-
-
78349258593
-
Waiting for Anonymity: Understanding Delays in the Tor Overlay
-
Delft, The Netherlands, 25-27 August 2010.
-
Dhungel, P.; Steiner, M.; Rimac, I.; Hilt, V.; Ross, K.W. Waiting for Anonymity: Understanding Delays in the Tor Overlay. In Proceedings of the IEEE 10th International Conference on Peer-to- Peer Computing (P2P 2010), Delft, The Netherlands, 25-27 August 2010.
-
Proceedings of the IEEE 10th International Conference on Peer-to- Peer Computing (P2P 2010)
-
-
Dhungel, P.1
Steiner, M.2
Rimac, I.3
Hilt, V.4
Ross, K.W.5
-
26
-
-
77949464624
-
How much anonymity does network latency leak ACM Trans
-
Hopper, N.; Vasserman, E.Y.; Chan-Tin, E. How much anonymity does network latency leak ACM Trans. Inf. Syst. Secur. 2010, 13, doi:10.1145/1698750.1698753.
-
(2010)
Inf. Syst. Secur
, vol.13
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
27
-
-
84870647034
-
Are YouWilling toWait Longer for Internet Privacy
-
Helsinki, Finland, 9-11 June
-
Brecht, F.; Fabian, B.; Kunz, S.; Müller, S. Are YouWilling toWait Longer for Internet Privacy? In Proceedings of the European Conference on Information Systems (ECIS 2011), Helsinki, Finland, 9-11 June 2011.
-
(2011)
In Proceedings of the European Conference on Information Systems (ECIS 2011)
-
-
Brecht, F.1
Fabian, B.2
Kunz, S.3
Müller, S.4
-
28
-
-
85019259273
-
Top Ten Mistakes
-
accessed on 8 May 2012
-
Nielson, J. "Top Ten Mistakes" in Web design-Revisited Three Years Later. Available online: http://www.useit.com/alertbox/990502.html (accessed on 8 May 2012).
-
Web design-Revisited Three Years Later
-
-
Nielson, J.1
-
29
-
-
0002551409
-
Current technological impediments to business-to-consumer electronic commerce
-
Rose, G.; Khoo, H.; Straub, D.W. Current technological impediments to business-to-consumer electronic commerce. Commun. AIS 1999, 1, 1.
-
(1999)
Commun. AIS
, vol.1
, pp. 1
-
-
Rose, G.1
Khoo, H.2
Straub, D.W.3
-
31
-
-
0040481708
-
Boo.com-The path to failure
-
Stockport, G.J.; Kunnath, G.; Sedick, R. Boo.com-The path to failure. J. Interact. Mark. 2001, 15, 56-70.
-
(2001)
J. Interact. Mark
, vol.15
, pp. 56-70
-
-
Stockport, G.J.1
Kunnath, G.2
Sedick, R.3
-
32
-
-
33750084748
-
Quantifying interactive user experience on thin clients
-
Tolia, N.; Andersen, D.; Satyanarayanan, M. Quantifying interactive user experience on thin clients. IEEE Comput. 2006, 39, 46-52.
-
(2006)
IEEE Comput
, vol.39
, pp. 46-52
-
-
Tolia, N.1
Andersen, D.2
Satyanarayanan, M.3
-
33
-
-
2442593911
-
A study on tolerable waiting time: How long are web users willing to wait Behav
-
Nah, F.F. A study on tolerable waiting time: How long are web users willing to wait Behav. Inf. Technol. 2004, 23, 153-163.
-
(2004)
Inf. Technol
, vol.23
, pp. 153-163
-
-
Nah, F.F.1
-
34
-
-
85019259740
-
Is Your Web Site Too Big
-
accessed on 8 May 2012
-
Accounting WEB. Is Your Web Site Too Big 2000. Available online: http://www.accountingweb. com/item/29331 (accessed on 8 May 2012).
-
(2000)
-
-
-
35
-
-
0033705621
-
Integrating user-perceived quality into Web server design
-
Bhatti, N.; Bouch, A.; Kuchinsky, A. Integrating user-perceived quality into Web server design. Comput. Netw. (Amst. Neth. 1999) 2000, 33, 1-16.
-
(2000)
Comput. Netw. (Amst. Neth. 1999)
, vol.33
, pp. 1-16
-
-
Bhatti, N.1
Bouch, A.2
Kuchinsky, A.3
-
36
-
-
85019237930
-
How Long is Too Long to Wait for a Website to Load
-
accessed on 8 May 2012
-
Selvidge, P. How Long is Too Long to Wait for a Website to Load 1999. Available online: http://www.surl.org/usabilitynews/12/time delay.asp (accessed on 8 May 2012).
-
(1999)
-
-
Selvidge, P.1
-
37
-
-
13944270149
-
Web site delays: How tolerant are users
-
Galletta, D.F.; Henry, R.M.; McCoy, S.; Polak, P. Web site delays: How tolerant are users? J. AIS 2004, 5, 1-28.
-
(2004)
J. AIS
, vol.5
, pp. 1-28
-
-
Galletta, D.F.1
Henry, R.M.2
McCoy, S.3
Polak, P.4
-
38
-
-
0032026632
-
A psychological investigation of long retrieval times on the World Wide Web
-
Ramsay, J.; Barbesi, A.; Preece, J. A psychological investigation of long retrieval times on the World Wide Web. Interact. Comput. 1998, 10, 77-86.
-
(1998)
Interact. Comput
, vol.10
, pp. 77-86
-
-
Ramsay, J.1
Barbesi, A.2
Preece, J.3
-
39
-
-
77954649872
-
Tor HTTP Usage and Information Leakage
-
Springer: Berlin, Germany
-
Huber, M.; Mulazzani, M.; Weippl, E. Tor HTTP Usage and Information Leakage. In Proceedings of the Communications and Multimedia Security; Springer: Berlin, Germany, 2010; Volume 6109, pp. 245-255.
-
(2010)
Proceedings of the Communications and Multimedia Security
, vol.6109
, pp. 245-255
-
-
Huber, M.1
Mulazzani, M.2
Weippl, E.3
-
40
-
-
85019217562
-
The 500 Most Important Websites on the Internet
-
accessed on 8 May 2012.
-
SEOmoz: The 500 Most Important Websites on the Internet. 2011. Available online: http://www. seomoz.org/top500 (accessed on 8 May 2012).
-
(2011)
-
-
-
41
-
-
85019197198
-
-
accessed on 8 May 2012
-
Wikipedia. Goodput. 2011. Available online: https://secure.wikimedia.org/wikipedia/en/wiki/ Goodput (accessed on 8 May 2012).
-
(2011)
-
-
-
42
-
-
36048963887
-
Experience-driven experimental systems research
-
Peterson, L.; Pai, V.S. Experience-driven experimental systems research. Commun. ACM 2007, 50, 38-44.
-
(2007)
Commun. ACM
, vol.50
, pp. 38-44
-
-
Peterson, L.1
Pai, V.S.2
-
43
-
-
85019267354
-
-
accessed on 8 May 2012
-
Tor partially blocked in China. 2009. Available online: https://blog.torproject.org/blog/ tor-partially-blocked-china/ (accessed on 8 May 2012).
-
(2009)
-
-
-
44
-
-
85019267797
-
China Cracks Down on Tor Anonymity Network
-
accessed on 8 May 2012
-
Talbot, D. China Cracks Down on Tor Anonymity Network. Technology Review. 2009. Available online: http://www.technologyreview.com/web/23736/ (accessed on 8 May 2012).
-
(2009)
Technology Review
-
-
Talbot, D.1
-
45
-
-
85019194653
-
Tor Nodes Statistics
-
accessed on 8 May 2012.
-
Berger, M. Tor Nodes Statistics. 2011. Available online: http://www.dianacht.de/torstat/ (accessed on 8 May 2012).
-
(2011)
-
-
Berger, M.1
-
46
-
-
70350508199
-
Path Selection Metrics for Performance-Improved Onion Routing
-
IEEE Computer Society: Washington, DC, USA
-
Panchenko, A.; Renner, J. Path Selection Metrics for Performance-Improved Onion Routing. In Proceedings of the 2009 9th Annual International Symposium on Applications and the Internet; IEEE Computer Society: Washington, DC, USA, 2009; pp. 114-120.
-
(2009)
Proceedings of the 2009 9th Annual International Symposium on Applications and the Internet
, pp. 114-120
-
-
Panchenko, A.1
Renner, J.2
-
47
-
-
85019173237
-
Pingdom Blog
-
accessed on 8 May 2012.
-
Map of all Google data center locations. Pingdom Blog. 2008. Available online: http://royal. pingdom.com/2008/04/11/map-of-all-google-data-center-locations/ (accessed on 8 May 2012).
-
(2008)
-
-
-
48
-
-
85019268941
-
-
accessed on 8 May 2012
-
CDN performance. 2010. Available online: http://royal.pingdom.com/2010/05/11/ cdn-performance-downloading-jquery-from-google-microsoft-and-edgecast-cdns/ (accessed on 8 May 2012).
-
(2010)
-
-
-
49
-
-
85019253706
-
-
accessed on 8 May 2012.
-
Utrace-Locate IP Addresses and Domain Names. 2011. Available online: http://www.utrace.de/ (accessed on 8 May 2012).
-
(2011)
-
-
-
50
-
-
85019191423
-
-
accessed on 8 May 2012.
-
New Cisco Study Reveals Peak Internet Traffic Increases Due to Social Networking and Broadband Video Usage. 2009. Available online: http://newsroom.cisco.com/dlls/2009/prod 102109.html (accessed on 8 May 2012).
-
(2009)
-
-
-
51
-
-
85019218684
-
-
accessed on 8 May 2012.
-
Cisco Visual Networking Index: Usage Study. 2010. Available online: http://www.cisco.com/ en/US/solutions/collateral/ns341/ns525/ns537/ns705/Cisco VNI Usage WP.html (accessed on 8 May 2012).
-
(2010)
-
-
-
52
-
-
85019214482
-
-
accessed on 8 May 2012.
-
Roger Dingledine and Nick Mathewson. 2011. Available online: https://git.torproject.org/ checkout/tor/master/doc/spec/path-spec.txt (accessed on 8 May 2012).
-
(2011)
-
-
|