Network Performance Improvements for Low-Latency Anonymity Networks

作者: Mashael Al-Sabah

DOI:

关键词:

摘要:

参考文章(76)
Roger Dingledine, Nathan S. Evans, Christian Grothoff, A practical congestion attack on tor using long paths usenix security symposium. pp. 33- 50 ,(2009)
Michael Piatek, Tadayoshi Kohno, Arvind Krishnamurthy, None, Challenges and directions for monitoring P2P file sharing networks-or: why my printer received a DMCA takedown notice usenix security symposium. pp. 12- ,(2008)
Robin Snader, Nikita Borisov, A Tune-up for Tor: Improving Security and Performance in the Tor Network. network and distributed system security symposium. ,(2008)
Rob Jansen, Nicholas Hooper, Shadow: Running Tor in a Box for Accurate and Efficient Experimentation network and distributed system security symposium. ,(2011) , 10.21236/ADA559181
Joel Reardon, Ian Goldberg, Improving tor using a TCP-over-DTLS tunnel usenix security symposium. pp. 119- 134 ,(2009)
Andrei Serjantov, Steven J. Murdoch, Message Splitting Against the Partial Adversary Privacy Enhancing Technologies. pp. 26- 39 ,(2006) , 10.1007/11767831_3
Claude Castelluccia, Pere Manils, Arnaud Legout, Mohamed Ali Kaafar, Abdelberi Chaabane, Walid Dabbous, Stevens Le Blond, One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users usenix conference on large scale exploits and emergent threats. pp. 2- 2 ,(2011)
Nick Mathewson, Roger Dingledine, Anonymity Loves Company: Usability and the Network Effect. WEIS. ,(2006)
Lasse Øverlier, Paul Syverson, Improving efficiency and simplicity of Tor circuit establishment and hidden services privacy enhancing technologies. pp. 134- 152 ,(2007) , 10.1007/978-3-540-75551-7_9