Funder
Japan Society for the Promotion of Science
Reference55 articles.
1. Pervasive monitoring is an attack, rfc 7258;Farrell,2014
2. R. Dingledine, N. Mathewson, P.F. Syverson, et al., Tor: The Second-Generation Onion Router, in: Proceedings of USENIX Security Symposium, 2004, pp. 303–320.
3. R. Jansen, A. Johnson, On the accuracy of Tor bandwidth estimation, in: Proceedings of International Conference on Passive and Active Network Measurement, 2021, pp. 481–498.
4. N. Borisov, G. Danezis, P. Mittal, P. Tabriz, Denial of service or denial of security?, in: Proceedings of ACM Conference on Computer and Communications Security, 2007, pp. 92–102.
5. . Tor Project, Introducing proof-of-work defense for onion services, https://blog.torproject.org/introducing-proof-of-work-defense-for-onion-services/.