Back to Results
First PageMeta Content
Internet / Tor / Onion routing / Proxy server / .onion / Router / Computer network / Traffic analysis / X Window System / Internet privacy / Computing / Software


Protocol-level Hidden Server Discovery Zhen Ling∗† , Junzhou Luo∗, Kui Wu† and Xinwen Fu‡ University, Email: {zhenling, jluo}@seu.edu.cn
Add to Reading List

Document Date: 2013-02-13 09:48:34


Open Document

File Size: 265,53 KB

Share Result on Facebook

Company

Jiangsu Provincial Key Laboratory / Distributed Computing Systems / Positive False Positive V. E VALUATION Hong Kong / Wireless Anonymous Communication Networks / Anonymous Communication Networks / AES / Brown / Privacy Enhancing Technologies / Hot or Not / The Tor Project Inc. / /

Continent

Europe / /

Country

Canada / China / United States / /

/

Event

FDA Phase / /

Facility

Xinwen Fu‡ University / University of Massachusetts Lowell / University of Victoria / Jiangsu Provincial Key Laboratory of Network / Key Laboratory of Computer Network / /

IndustryTerm

suspect entry router / botnet and illegal web contents / circuit selection algorithm / middle router / ith entry router / hidden service protocol / entry router / Internet traffic dynamics / injected routers / detection tools / entry routers routers / appropriate exit onion routers / controlled entry routers / Internet censorship / web client / directory server / hidden services / proper entry onion router / malicious hidden services / exit onion router / entry onion router / ith entry onion router / identified entry router / controlled entry router / anonymous web service / onion routers / injected onion router / web server / controlled entry onion router / law enforcement / entry server / circuit creator / controlled onion routers / pure exit onion routers / Apache server / online entry guards / server protocol / circuit creation protocol / notorious hidden services / hidden server / onion router selection algorithm / authoritative directory server / anonymous networks / exit router / trusted entry routers / injected onion routers / controlled entry onion routers / web service / controlled middle router / pure entry onion routers / local software / exit routers / knowns routers / entry onion routers / middle onion router / i-th entry router / remote server / onion router / pure entry routers / pure exit routers / path selection algorithm / realistic network / entry routers / handshake protocol / communication network / controlled middle onion router / Voice over IP / hidden onion routers / web services / /

NaturalFeature

Relay Recognized Stream / /

Organization

China Specialized Research Fund for the Doctoral Program / Electronic Society / National Natural Science Foundation of China / Relay Recognized Stream_id Intergrity Command / University of Victoria / Hidden Server Discovery Zhen Ling∗† / Junzhou Luo∗ / Kui Wu† and Xinwen Fu‡ University / Natural Sciences and Engineering Research Council of Canada / Ministry of Education / Key Laboratory / University of Massachusetts Lowell / Circ_id Command / Resilient Botnet Command / National Science Foundation / id Intergrity Command / Dutch police / BM2003201 / International Criminal Court / /

Person

Bob / Tor Relay Cell Format Fig / Alice / Dennis Brown / /

Position

Prime Minister / guard / entry guard for the hidden server / entry guard / Major / hb / /

Product

K1 / INTRODUCE1 / Rendezvous1 / C1 / /

ProgrammingLanguage

php / /

ProvinceOrState

Oregon / /

Technology

EE routers / middle onion router / SecondGeneration Onion Router / Server Onion Routers / Entry IPO Exit Middle Onion Routers / controlled onion routers / onion router selection algorithm / detailed path selection algorithm / exit router / entry onion router / pure entry onion routers / 814 pure entry routers / middle router / 450 entry routers / injected onion routers / 10 entry onion routers / pure exit onion routers / controlled entry onion routers / controlled middle onion router / 30 entry routers / entry onion routers / entry router / proper entry onion router / trusted entry routers / ith entry router / circuit selection algorithm / encryption / controlled entry onion router / related Entry Receive Create/Relay Cell Modify Begin Cell Entry Middle Exit Onion Routers / 1238 N-EE routers / 776 pure exit routers / injected onion router / TLS protocol / 273 EE routers / onion router / presumably identified entry router / appropriate exit onion routers / N-EE routers / entry routers routers / controlled entry routers / controlled middle router / pure entry routers / hidden onion routers / controlled entry router / php / Peer-to-Peer / server protocol / suspect entry router / RSA encryption / onion routers / pure exit routers / hidden service protocol / circuit creation protocol / newly injected routers / exit routers / i-th entry router / public key / NEE routers / 776 pure entry routers / ith entry onion router / HTTP / exit onion router / EE onion routers / 3101 onion routers / injected router / North Amercia Europe Entry Router / entry routers / VOIP / handshake protocol / web server / knowns routers / /

URL

http /

SocialTag