메뉴 건너뛰기




Volumn , Issue , 2009, Pages 33-50

A practical congestion attack on Tor using long paths

Author keywords

[No Author keywords available]

Indexed keywords

BANDWIDTH;

EID: 85076290610     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: None     Document Type: Conference Paper
Times cited : (130)

References (36)
  • 1
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and trade-offs in anonymity providing systems
    • April I. S. Moskowitz, Ed., Springer-Verlag, LNCS
    • BACK, A., MÖLLER, U., AND STIGLIC, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proceedings of Information Hiding Workshop (IH 2001) (April 2001), I. S. Moskowitz, Ed., Springer-Verlag, LNCS 2137, pp. 245–257.
    • (2001) Proceedings of Information Hiding Workshop (IH 2001) , vol.2137 , pp. 245-257
    • Back, A.1    Möller, U.2    Stiglic, A.3
  • 3
    • 0019532104 scopus 로고
    • Untraceable electronic mail, return addresses, and digital pseudonyms
    • February
    • CHAUM, D. L. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24, 2 (February 1981), 84–90.
    • (1981) Commun. ACM , vol.24 , Issue.2 , pp. 84-90
    • Chaum, D.L.1
  • 23
    • 33846288517 scopus 로고    scopus 로고
    • Timing attacks in low-latency mix-based systems
    • February A. Juels, Ed., Springer-Verlag, LNCS
    • LEVINE, B. N., REITER, M. K., WANG, C., AND WRIGHT, M. K. Timing attacks in low-latency mix-based systems. In Proceedings of Financial Cryptography (FC’04) (February 2004), A. Juels, Ed., Springer-Verlag, LNCS 3110, pp. 251–265.
    • (2004) Proceedings of Financial Cryptography (FC’04) , vol.3110 , pp. 251-265
    • Levine, B.N.1    Reiter, M.K.2    Wang, C.3    Wright, M.K.4
  • 24
    • 54249091264 scopus 로고    scopus 로고
    • Don’t clog the queue! Circuit clogging and mitigation in p2p anonymity schemes
    • G. Tsudik, Ed.,. of Lecture Notes in Computer Science, Springer
    • MCLACHLAN, J., AND HOPPER, N. Don’t clog the queue! circuit clogging and mitigation in p2p anonymity schemes. In Financial Cryptography (2008), G. Tsudik, Ed., vol. 5143 of Lecture Notes in Computer Science, Springer, pp. 31–46.
    • (2008) Financial Cryptography , vol.5143 , pp. 31-46
    • McLachlan, J.1    Hopper, N.2
  • 30
    • 56649123231 scopus 로고    scopus 로고
    • Compromising anonymity using packet spinning
    • T.-C. Wu, C.-L. Lei, Rijmen, and D.-T. Lee, Eds.,. of Lecture Notes in Computer Science, Springer
    • PAPPAS, V., ATHANASOPOULOS, E., IOANNIDIS, S., AND MARKATOS, E. P. Compromising anonymity using packet spinning. In Proceedings of the 11th Information Security Conference (ISC 2008) (2008), T.-C. Wu, C.-L. Lei, V. Rijmen, and D.-T. Lee, Eds., vol. 5222 of Lecture Notes in Computer Science, Springer, pp. 161–174.
    • (2008) Proceedings of the 11th Information Security Conference (ISC 2008) , vol.5222 , pp. 161-174
    • Pappas, V.1    Athanasopoulos, E.2    Ioannidis, S.3    Markatos, E.P.4
  • 31
    • 85076315443 scopus 로고    scopus 로고
    • PERRY, M., AND SQUIRES, S. https://www.torproject.org/torbutton/, 2009.
    • (2009)
    • Perry, M.1    Squires, S.2
  • 36
    • 84871199341 scopus 로고    scopus 로고
    • Design principles for low latency anonymous network systems secure against timing attacks
    • Darlinghurst, Australia, Australia, Australian Computer Society, Inc
    • WIANGSRIPANAWAN, R., SUSILO, W., AND SAFAVI-NAINI, R. Design principles for low latency anonymous network systems secure against timing attacks. In Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW’07) (Darlinghurst, Australia, Australia, 2007), Australian Computer Society, Inc, pp. 183–191.
    • (2007) Proceedings of the Fifth Australasian Symposium on ACSW Frontiers (ACSW’07) , pp. 183-191
    • Wiangsripanawan, R.1    Susilo, W.2    Safavi-Naini, R.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.