Onion routing

Results: 197



#Item
21Challenges in protecting Tor hidden services from botnet abuse Nicholas Hopper? University of Minnesota, Minneapolis, MN USA

Challenges in protecting Tor hidden services from botnet abuse Nicholas Hopper? University of Minnesota, Minneapolis, MN USA

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2014-04-29 14:13:49
22Scalable Onion Routing with Torsk Jon McLachlan Andrew Tran  Nicholas Hopper

Scalable Onion Routing with Torsk Jon McLachlan Andrew Tran Nicholas Hopper

Add to Reading List

Source URL: syssec.kaist.ac.kr

Language: English - Date: 2012-09-03 21:42:58
    23Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

    Low-Cost Traffic Analysis of Tor Steven J. Murdoch and George Danezis University of Cambridge, Computer Laboratory 15 JJ Thomson Avenue, Cambridge CB3 0FD United Kingdom {Steven.Murdoch,George.Danezis}@cl.cam.ac.uk

    Add to Reading List

    Source URL: www0.cs.ucl.ac.uk

    Language: English - Date: 2013-10-10 06:49:00
    24An Empirical Evaluation of Relay Selection in Tor Chris Wacek Georgetown University Henry Tan Georgetown University

    An Empirical Evaluation of Relay Selection in Tor Chris Wacek Georgetown University Henry Tan Georgetown University

    Add to Reading List

    Source URL: security.cs.georgetown.edu

    Language: English - Date: 2012-12-16 11:56:26
    25

    PDF Document

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2008-05-30 10:39:07
    26Scalable Onion Routing with Torsk Jon McLachlan Andrew Tran  Nicholas Hopper

    Scalable Onion Routing with Torsk Jon McLachlan Andrew Tran Nicholas Hopper

    Add to Reading List

    Source URL: www-users.cs.umn.edu

    Language: English - Date: 2009-08-11 22:18:05
      27Poster: Blindspot: Indistinguishable Anonymous Communications Joseph Gardiner, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA

      Poster: Blindspot: Indistinguishable Anonymous Communications Joseph Gardiner, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA

      Add to Reading List

      Source URL: www.ieee-security.org

      Language: English - Date: 2015-05-11 16:42:33
      28Probabilistic Analysis of Onion Routing in a Black-box Model [Extended Abstract] †  Joan Feigenbaum

      Probabilistic Analysis of Onion Routing in a Black-box Model [Extended Abstract] † Joan Feigenbaum

      Add to Reading List

      Source URL: www.cs.yale.edu

      - Date: 2007-09-02 19:43:46
        29A Formal Treatment of Onion Routing Jan Camenisch Anna Lysyanskaya  IBM Research

        A Formal Treatment of Onion Routing Jan Camenisch Anna Lysyanskaya IBM Research

        Add to Reading List

        Source URL: cs.brown.edu

        - Date: 2006-09-12 19:40:25
          30A Formal Treatment of Onion Routing Jan Camenisch and Anna Lysyanskaya 1 2

          A Formal Treatment of Onion Routing Jan Camenisch and Anna Lysyanskaya 1 2

          Add to Reading List

          Source URL: cs.brown.edu

          Language: English - Date: 2006-09-12 19:40:36