Author:
Sherr Micah,Gill Harjot,Saeed Taher Aquil,Mao Andrew,Marczak William R.,Soundararajan Saravana,Zhou Wenchao,Loo Boon Thau,Blaze Matt
Subject
Computer Networks and Communications
Reference78 articles.
1. M. Akhoondi, C. Yu, H.V. Madhyastha, LASTor: a low-latency AS-aware Tor client, in: IEEE Symposium on Security and Privacy (Oakland), 2012.
2. K. Bauer, D. McCoy, D. Grunwald, T. Kohno, D. Sicker, Low-resource routing attacks against Tor, in: ACM Workshop on Privacy in the Electronic Society (WPES), 2007.
3. K. Bauer, M. Sherr, D. McCoy, D. Grunwald, ExperimenTor: a testbed for safe and realistic Tor experimentation, in: USENIX Workshop on Cyber Security Experimentation and Test (CSET), 2011.
4. S. Becker, J. Seibert, C. Nita-Rotaru, R. State, Securing application-level topology estimation networks: facing the frog-boiling attack, in: International Symposium on Recent Advances in Intrusion Detection (RAID), 2011.
5. O. Berthold, H. Federrath, M. Köhntopp, Project “Anonymity and Unobservability in the Internet”, in: Workshop on Freedom and Privacy by Design (CFP), 2000.
Cited by
2 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献