<--- Back to Details
First PageDocument Content
Internet / Computing / Network architecture / Internet Standards / Internet protocols / Internet security / Routing / Secure communication / Border Gateway Protocol / IP hijacking / Tor / Traffic analysis
Date: 2014-10-08 09:38:20
Internet
Computing
Network architecture
Internet Standards
Internet protocols
Internet security
Routing
Secure communication
Border Gateway Protocol
IP hijacking
Tor
Traffic analysis

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: www.vanbever.eu

Download Document from Source Website

File Size: 985,30 KB

Share Document on Facebook

Similar Documents

Obstacles to the Adoption of Secure Communication Tools Ruba Abu-Salma M. Angela Sasse

Obstacles to the Adoption of Secure Communication Tools Ruba Abu-Salma M. Angela Sasse

DocID: 1xVGP - View Document

Best of Both Worlds in Secure Computation, with Low Communication Overhead

Best of Both Worlds in Secure Computation, with Low Communication Overhead

DocID: 1xUqM - View Document

mySedgwick mySedgwick, our self-service tool, offers clients and consumers convenient, secure online access to real-time claims information, along with configurable features and communication options to meet their needs.

mySedgwick mySedgwick, our self-service tool, offers clients and consumers convenient, secure online access to real-time claims information, along with configurable features and communication options to meet their needs.

DocID: 1uXXm - View Document

Secure Communication with Tls

Secure Communication with Tls

DocID: 1uthL - View Document