Author:
Gelernter Nethanel,Herzberg Amir,Leibowitz Hemi
Publisher
Springer International Publishing
Reference53 articles.
1. Dingledine, R., Mathewson, N., Syverson, P.F.: Tor: the second-generation onion router. In: USENIX Security Symposium, USENIX, pp. 303–320 (2004)
2. Lecture Notes in Computer Science;Y Gilad,2012
3. Bauer, K., McCoy, D., Grunwald, D., Kohno, T., Sicker, D.: Low-resource routing attacks against tor. In: Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, pp. 11–20. ACM (2007)
4. Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? In: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 92–102. ACM (2007)
5. Dingledine, R., Mathewson, N.: Anonymity loves company: usability and the network effect. In: WEIS (2006)
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. AntCom: An effective and efficient anti-tracking system with dynamic and asymmetric communication channel;Journal of Network and Computer Applications;2023-09
2. Mitigating Intersection Attacks in Anonymous Microblogging;Proceedings of the 18th International Conference on Availability, Reliability and Security;2023-08-29
3. ACS: An Efficient Messaging System with Strong Tracking-Resistance;Lecture Notes of the Institute for Computer Sciences, Social Informatics and Telecommunications Engineering;2022