Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
A survey of peer-to-peer content distribution technologies
S Androutsellis-Theotokis, D Spinellis - ACM computing surveys (CSUR), 2004 - dl.acm.org
Distributed computer architectures labeled" peer-to-peer" are designed for the sharing of
computer resources (content, storage, CPU cycles) by direct exchange, rather than requiring …
computer resources (content, storage, CPU cycles) by direct exchange, rather than requiring …
On anonymity in an electronic society: A survey of anonymous communication systems
M Edman, B Yener - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
The past two decades have seen a growing interest in methods for anonymous
communication on the Internet, both from the academic community and the general public …
communication on the Internet, both from the academic community and the general public …
[PDF][PDF] Website Fingerprinting at Internet Scale.
The website fingerprinting attack aims to identify the content (ie, a webpage accessed by a
client) of encrypted and anonymized connections by observing patterns of data flows such …
client) of encrypted and anonymized connections by observing patterns of data flows such …
An inquiry into money laundering tools in the Bitcoin ecosystem
We provide a first systematic account of opportunities and limitations of anti-money
laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the …
laundering (AML) in Bitcoin, a decentralized cryptographic currency proliferating on the …
[PDF][PDF] Tor: The second-generation onion router.
R Dingledine, N Mathewson… - USENIX security …, 2004 - css.csail.mit.edu
We present Tor, a circuit-based low-latency anonymous communication service. This
second-generation Onion Routing system addresses limitations in the original design by …
second-generation Onion Routing system addresses limitations in the original design by …
Website fingerprinting in onion routing based anonymization networks
A Panchenko, L Niessen, A Zinnen… - Proceedings of the 10th …, 2011 - dl.acm.org
Low-latency anonymization networks such as Tor and JAP claim to hide the recipient and
the content of communications from a local observer, ie, an entity that can eavesdrop the …
the content of communications from a local observer, ie, an entity that can eavesdrop the …
A privacy threat analysis framework: supporting the elicitation and fulfillment of privacy requirements
Ready or not, the digitalization of information has come, and privacy is standing out there,
possibly at stake. Although digital privacy is an identified priority in our society, few …
possibly at stake. Although digital privacy is an identified priority in our society, few …
Freenet: A distributed anonymous information storage and retrieval system
We describe Freenet, an adaptive peer-to-peer network application that permits the
publication, replication, and retrieval of data while protecting the anonymity of both authors …
publication, replication, and retrieval of data while protecting the anonymity of both authors …
Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier
D Herrmann, R Wendolsky, H Federrath - … of the 2009 ACM workshop on …, 2009 - dl.acm.org
Privacy enhancing technologies like OpenSSL, OpenVPN or Tor establish an encrypted
tunnel that enables users to hide content and addresses of requested websites from external …
tunnel that enables users to hide content and addresses of requested websites from external …
Tarzan: A peer-to-peer anonymizing network layer
Tarzan is a peer-to-peer anonymous IP network overlay. Because it provides IP service,
Tarzan is general-purpose and transparent to applications. Organized as a decentralized …
Tarzan is general-purpose and transparent to applications. Organized as a decentralized …