Turnitin
降AI改写
早检测系统
早降重系统
Turnitin-UK版
万方检测-期刊版
维普编辑部版
Grammarly检测
Paperpass检测
checkpass检测
PaperYY检测
Shedding light on the dark corners of the internet: A survey of tor research
Anonymity services have seen high growth rates with increased usage in the past few years.
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …
Among various services, Tor is one of the most popular peer-to-peer anonymizing service. In …
[HTML][HTML] Tor hidden services: A systematic literature review
Anonymous communications networks were created to protect the privacy of
communications, preventing censorship and traffic analysis. The most famous anonymous …
communications, preventing censorship and traffic analysis. The most famous anonymous …
Enhancing security and privacy of Tor's ecosystem by using trusted execution environments
With Tor being a popular anonymity network, many attacks have been proposed to break its
anonymity or leak information of a private communication on Tor. However, guaranteeing …
anonymity or leak information of a private communication on Tor. However, guaranteeing …
A case study on measuring statistical data in the Tor anonymity network
The Tor network is one of the largest deployed anonymity networks, consisting of 1500+
volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its …
volunteer-run relays and probably hundreds of thousands of clients connecting every day. Its …
Sgx-tor: A secure and practical tor anonymity network with sgx enclaves
With Tor being a popular anonymity network, many attacks have been proposed to break its
anonymity or leak information of a private communication on Tor. However, guaranteeing …
anonymity or leak information of a private communication on Tor. However, guaranteeing …
A survey on solutions and main free tools for privacy enhancing Web communications
Concern for privacy when users are surfing on the Web has increased recently. Nowadays,
many users are aware that when they are accessing Web sites, these Web sites can track …
many users are aware that when they are accessing Web sites, these Web sites can track …
Secure encounter-based mobile social networks: Requirements, designs, and tradeoffs
Encounter-based social networks and encounter-based systems link users who share a
location at the same time, as opposed to the traditional social network paradigm of linking …
location at the same time, as opposed to the traditional social network paradigm of linking …
[PDF][PDF] Measuring the Tor network from public directory information
The Tor network is one of the largest deployed anonymity networks, with more than one
thousand servers, called relays, and probably hundreds of thousands of clients. A few facts …
thousand servers, called relays, and probably hundreds of thousands of clients. A few facts …
[PDF][PDF] Urban sensing through social networks: The tension between participation and privacy
In this paper we elaborate on using social networking mechanisms to create incentives that
increase active participation of users in the process of collecting data for urban sensing …
increase active participation of users in the process of collecting data for urban sensing …
Participatory sensing: the tension between social translucence and privacy
Participatory sensing is a new research area that emerged from the need to complement our
previous efforts in wireless sensor networks. It takes advantage of the emergence of rich …
previous efforts in wireless sensor networks. It takes advantage of the emergence of rich …