Author:
Herrmann Michael,Grothoff Christian
Publisher
Springer Berlin Heidelberg
Reference15 articles.
1. Borisov, N., Danezis, G., Mittal, P., Tabriz, P.: Denial of service or denial of security? How attacks on reliability can compromise anonymity. In: CCS 2007: Proceedings of the 14th ACM Conference on Computer and Communications Security, pp. 92–102. ACM Press, New York (2007)
2. Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
3. Evans, N.S., Dingledine, R., Grothoff, C.: A practical congestion attack on tor using long paths. In: 18th USENIX Security Symposium, pp. 33–50. USENIX (2009)
4. Herrmann, M.: Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P. Master’s thesis, Technische Universität München (2011)
5. Hopper, N., Vasserman, E.Y., Chan-Tin, E.: How much anonymity does network latency leak? ACM Transactions on Information and System Security 13(2) (2010)
Cited by
18 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献