[PDF][PDF] Tor: The second-generation onion router.
R Dingledine, N Mathewson… - USENIX security …, 2004 - css.csail.mit.edu
We present Tor, a circuit-based low-latency anonymous communication service. This
second-generation Onion Routing system addresses limitations in the original design by …
second-generation Onion Routing system addresses limitations in the original design by …
Characterization of tor traffic using time based features
Traffic classification has been the topic of many research efforts, but the quick evolution of
Internet services and the pervasive use of encryption makes it an open challenge …
Internet services and the pervasive use of encryption makes it an open challenge …
Unraveling Attacks to Machine Learning-Based IoT Systems: A Survey and the Open Libraries Behind Them
The advent of the Internet of Things (IoT) has brought forth an era of unprecedented
connectivity, with an estimated 80 billion smart devices expected to be in operation by the …
connectivity, with an estimated 80 billion smart devices expected to be in operation by the …
On anonymity in an electronic society: A survey of anonymous communication systems
M Edman, B Yener - ACM Computing Surveys (CSUR), 2009 - dl.acm.org
The past two decades have seen a growing interest in methods for anonymous
communication on the Internet, both from the academic community and the general public …
communication on the Internet, both from the academic community and the general public …
Low-cost traffic analysis of Tor
Tor is the second generation onion router supporting the anonymous transport of TCP
streams over the Internet. Its low latency makes it very suitable for common tasks, such as …
streams over the Internet. Its low latency makes it very suitable for common tasks, such as …
Locating hidden servers
L Overlier, P Syverson - 2006 IEEE Symposium on Security and …, 2006 - ieeexplore.ieee.org
Hidden services were deployed on the Tor anonymous communication network in 2004.
Announced properties include server resistance to distributed DoS. Both the EFF and …
Announced properties include server resistance to distributed DoS. Both the EFF and …
Timing analysis in low-latency mix networks: Attacks and defenses
V Shmatikov, MH Wang - … –ESORICS 2006: 11th European Symposium on …, 2006 - Springer
Mix networks are a popular mechanism for anonymous Internet communications. By routing
IP traffic through an overlay chain of mixes, they aim to hide the relationship between its …
IP traffic through an overlay chain of mixes, they aim to hide the relationship between its …
AS-awareness in Tor path selection
M Edman, P Syverson - Proceedings of the 16th ACM conference on …, 2009 - dl.acm.org
Tor is an anonymous communications network with thousands of router nodes worldwide.
An intuition reflected in much of the literature on anonymous communications is that, as an …
An intuition reflected in much of the literature on anonymous communications is that, as an …
HORNET: High-speed onion routing at the network layer
We present HORNET, a system that enables high-speed end-to-end anonymous channels
by leveraging next-generation network architectures. HORNET is designed as a low-latency …
by leveraging next-generation network architectures. HORNET is designed as a low-latency …
How much anonymity does network latency leak?
Low-latency anonymity systems such as Tor, AN. ON, Crowds, and Anonymizer. com aim to
provide anonymous connections that are both untraceable by “local” adversaries who …
provide anonymous connections that are both untraceable by “local” adversaries who …