Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
On anonymity in an electronic society: A survey of anonymous communication systems
M Edman, B Yener - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
The past two decades have seen a growing interest in methods for anonymous
communication on the Internet, both from the academic community and the general public …
communication on the Internet, both from the academic community and the general public …
A survey on routing in anonymous communication protocols
The Internet has undergone dramatic changes in the past 2 decades and now forms a global
communication platform that billions of users rely on for their daily activities. While this …
communication platform that billions of users rely on for their daily activities. While this …
Deepcorr: Strong flow correlation attacks on tor using deep learning
Flow correlation is the core technique used in a multitude of deanonymization attacks on
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …
Tor. Despite the importance of flow correlation attacks on Tor, existing flow correlation …
Low-cost traffic analysis of Tor
Tor is the second generation onion router supporting the anonymous transport of TCP
streams over the Internet. Its low latency makes it very suitable for common tasks, such as …
streams over the Internet. Its low latency makes it very suitable for common tasks, such as …
Unobservable communication over fully untrusted infrastructure
Kee** communication private has become increasingly important in an era of mass
surveillance and state-sponsored attacks. While hiding the contents of a conversation has …
surveillance and state-sponsored attacks. While hiding the contents of a conversation has …
[PDF][PDF] Compromising electromagnetic emanations of wired and wireless keyboards.
Computer keyboards are often used to transmit confidential data such as passwords. Since
they contain electronic components, keyboards eventually emit electromagnetic waves …
they contain electronic components, keyboards eventually emit electromagnetic waves …
Low-resource routing attacks against Tor
Tor has become one of the most popular overlay networks for anonymizing TCP traffic. Its
popularity is due in part to its perceived strong anonymity properties and its relatively low …
popularity is due in part to its perceived strong anonymity properties and its relatively low …
Riffle: An efficient communication system with strong anonymity
Existing anonymity systems sacrifice anonymity for efficient communication or vice-versa.
Onion-routing achieves low latency, high bandwidth, and scalable anonymous …
Onion-routing achieves low latency, high bandwidth, and scalable anonymous …
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN. ON, Crowds, and Anonymizer. com aim to
provide anonymous connections that are both untraceable by “local” adversaries who …
provide anonymous connections that are both untraceable by “local” adversaries who …
The predecessor attack: An analysis of a threat to anonymous communications systems
There have been a number of protocols proposed for anonymous network communication.
In this paper, we investigate attacks by corrupt group members that degrade the anonymity …
In this paper, we investigate attacks by corrupt group members that degrade the anonymity …