![Internet security / Internet Standards / Internet protocols / Routing / Secure communication / IP hijacking / Border Gateway Protocol / Tor / Traffic analysis / Onion routing / HTTPS / Computer network Internet security / Internet Standards / Internet protocols / Routing / Secure communication / IP hijacking / Border Gateway Protocol / Tor / Traffic analysis / Onion routing / HTTPS / Computer network](https://www.pdfsearch.io/img/1c95a097efbf2b7642c14c7c10a91b4d.jpg) Date: 2014-10-08 09:38:20Internet security Internet Standards Internet protocols Routing Secure communication IP hijacking Border Gateway Protocol Tor Traffic analysis Onion routing HTTPS Computer network | | Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACTAdd to Reading ListSource URL: vanbever.euDownload Document from Source Website File Size: 985,30 KBShare Document on Facebook
|