First Page | Document Content | |
---|---|---|
Date: 2014-10-08 09:38:20Internet security Internet Standards Internet protocols Routing Secure communication IP hijacking Border Gateway Protocol Tor Traffic analysis Onion routing HTTPS Computer network | Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACTAdd to Reading ListSource URL: vanbever.euDownload Document from Source WebsiteFile Size: 985,30 KBShare Document on Facebook |
TARANET: Traffic-Analysis Resistant Anonymity at the Network Layer Chen Chen Daniele E. AsoniDocID: 1xVHd - View Document | |
arXiv:1802.08415v1 [cs.CR] 23 FebTARANET: Traffic-Analysis Resistant Anonymity at the NETwork layer Chen ChenDocID: 1xVuF - View Document | |
iTAP: In-network Traffic Analysis Prevention using Software-Defined Networks https://itap.ethz.ch Roland MeierDocID: 1xUBt - View Document | |
iTAP: In-network Traffic Analysis Prevention using Software-Defined Networks https://itap.ethz.ch Roland MeierDocID: 1xTNw - View Document | |
Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures FailDocID: 1xTjP - View Document |