![Internet / Computing / Network architecture / Internet Standards / Internet protocols / Internet security / Routing / Secure communication / Border Gateway Protocol / IP hijacking / Tor / Traffic analysis Internet / Computing / Network architecture / Internet Standards / Internet protocols / Internet security / Routing / Secure communication / Border Gateway Protocol / IP hijacking / Tor / Traffic analysis](https://www.pdfsearch.io/img/f8246951932b79468e7072f52c3b5a28.jpg) Date: 2014-10-08 09:38:20Internet Computing Network architecture Internet Standards Internet protocols Internet security Routing Secure communication Border Gateway Protocol IP hijacking Tor Traffic analysis | | Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACTAdd to Reading ListSource URL: www.vanbever.euDownload Document from Source Website File Size: 985,30 KBShare Document on Facebook
|