<--- Back to Details
First PageDocument Content
Internet security / Internet Standards / Internet protocols / Routing / Secure communication / IP hijacking / Border Gateway Protocol / Tor / Traffic analysis / Onion routing / HTTPS / Computer network
Date: 2014-10-08 09:38:20
Internet security
Internet Standards
Internet protocols
Routing
Secure communication
IP hijacking
Border Gateway Protocol
Tor
Traffic analysis
Onion routing
HTTPS
Computer network

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: vanbever.eu

Download Document from Source Website

File Size: 985,30 KB

Share Document on Facebook

Similar Documents

guard sets for onion routing Jamie Hayes - joint work with George Danezis University College London

guard sets for onion routing Jamie Hayes - joint work with George Danezis University College London

DocID: 1xTjd - View Document

Intro to Onion Routing Sphinx: A Compact and Provably Secure Mix Format HORNET: High-speed Onion Routing at the Network Layer Forward Secrecy Security Assumptions Future Directions

Intro to Onion Routing Sphinx: A Compact and Provably Secure Mix Format HORNET: High-speed Onion Routing at the Network Layer Forward Secrecy Security Assumptions Future Directions

DocID: 1uRkl - View Document

Anonymous Connections and Onion Routing Paul F. Syverson, David M. Goldschlag, and Michael G. Reed   Naval Research Laboratory

Anonymous Connections and Onion Routing Paul F. Syverson, David M. Goldschlag, and Michael G. Reed  Naval Research Laboratory

DocID: 1tcyz - View Document

Using Sphinx to Improve Onion Routing Circuit Construction∗ Aniket Kate and Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo, ON, Canada {akate,iang}@cs.uwaterloo.ca Abstract

Using Sphinx to Improve Onion Routing Circuit Construction∗ Aniket Kate and Ian Goldberg David R. Cheriton School of Computer Science University of Waterloo, ON, Canada {akate,iang}@cs.uwaterloo.ca Abstract

DocID: 1t5IF - View Document