The Onion Name System: Tor-powered distributed DNS for tor hidden services

作者: Jesse Victors

DOI:

关键词:

摘要:

参考文章(17)
Matthias Wachs, Martin Schanzenbach, Christian Grothoff, A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System cryptology and network security. pp. 127- 142 ,(2014) , 10.1007/978-3-319-12280-9_9
Brad Miller, Ling Huang, A. D. Joseph, J. D. Tygar, I Know Why You Went to the Clinic: Risks and Realization of HTTPS Traffic Analysis privacy enhancing technologies. pp. 143- 163 ,(2014) , 10.1007/978-3-319-08506-7_8
R.S. Plak, Anonymous Internet: Anonymizing peer-to-peer traffic using applied cryptography TU Delft, Delft University of Technology. ,(2014)
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Susan Landau, Highlights from Making Sense of Snowden, Part II: What's Significant in the NSA Revelations ieee symposium on security and privacy. ,vol. 12, pp. 62- 64 ,(2014) , 10.1109/MSP.2013.161
Matthew Edman, Bülent Yener, On anonymity in an electronic society ACM Computing Surveys. ,vol. 42, pp. 1- 35 ,(2009) , 10.1145/1592451.1592456
M.G. Reed, P.F. Syverson, D.M. Goldschlag, Anonymous connections and onion routing IEEE Journal on Selected Areas in Communications. ,vol. 16, pp. 482- 494 ,(1998) , 10.1109/49.668972
Paul Syverson, A peel of onion annual computer security applications conference. pp. 123- 137 ,(2011) , 10.1145/2076732.2076750
Makoto Matsumoto, Takuji Nishimura, Mersenne twister: a 623-dimensionally equidistributed uniform pseudo-random number generator ACM Transactions on Modeling and Computer Simulation. ,vol. 8, pp. 3- 30 ,(1998) , 10.1145/272991.272995
David L. Chaum, Untraceable electronic mail, return addresses, and digital pseudonyms Communications of The ACM. ,vol. 24, pp. 84- 90 ,(1981) , 10.1145/358549.358563