Privacy Preservation in the Presence of Advanced Threats

作者: William Bradley Moore

DOI:

关键词:

摘要:

参考文章(39)
Alfonso Iacovazzi, Andrea Baiocchi, Padding and fragmentation for masking packet length statistics traffic monitoring and analysis. pp. 85- 88 ,(2012) , 10.1007/978-3-642-28534-9_9
Robin Snader, Nikita Borisov, A Tune-up for Tor: Improving Security and Performance in the Tor Network. network and distributed system security symposium. ,(2008)
Joel Reardon, Ian Goldberg, Improving tor using a TCP-over-DTLS tunnel usenix security symposium. pp. 119- 134 ,(2009)
John R. Douceur, The Sybil Attack international workshop on peer to peer systems. pp. 251- 260 ,(2002) , 10.1007/3-540-45748-8_24
Steven J Murdoch, Robert NM Watson, None, Metrics for Security and Performance in Low-Latency Anonymity Systems Privacy Enhancing Technologies. pp. 115- 132 ,(2008) , 10.1007/978-3-540-70630-4_8
Micah Sherr, Matt Blaze, Boon Thau Loo, Scalable Link-Based Relay Selection for Anonymous Routing privacy enhancing technologies. pp. 73- 93 ,(2009) , 10.1007/978-3-642-03168-7_5
Tao Wang, Ian Goldberg, Improved website fingerprinting on Tor workshop on privacy in the electronic society. pp. 201- 212 ,(2013) , 10.1145/2517840.2517851
Steven J. Murdoch, Hot or not: Revealing hidden services by their clock skew Proceedings of the 13th ACM conference on Computer and communications security - CCS '06. pp. 27- 36 ,(2006) , 10.1145/1180405.1180410
W. Brad Moore, Chris Wacek, Micah Sherr, Exploring the potential benefits of expanded rate limiting in Tor: slow and steady wins the race with Tortoise annual computer security applications conference. pp. 207- 216 ,(2011) , 10.1145/2076732.2076762
Rob Jansen, Nicholas Hopper, Yongdae Kim, Recruiting new tor relays with BRAIDS computer and communications security. pp. 319- 328 ,(2010) , 10.1145/1866307.1866344