1 |
S. Syverson, D. Goldschlog, and M. Reeds, "Anonymous connections and onion routing," in Proc. IEEE SP, Oakland, USA, 1997, pp. 482-494.
|
2 |
(2014, June 20) TOR - Onion routing online documentation [Online]. Available: https://www.torproject.org/
|
3 |
B. Choi, D. Xuan, C. Li, R. Bettati, and W. Zhao, "Efficient traffic camouflaging in mission-critical QoS guaranteed networks," in Proc. IEEE Information Assurance and Security Workshop, West Point, Virginia, USA, 2000, pp. 143-149.
|
4 |
R. Dingeldine, "TOR: the second-generation onion router," in Proc. Usenix Security Symposium, San Diego, USA, 2004.
|
5 |
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," ACM Commun., 24(2), pp. 84-88, 1981.
DOI
|
6 |
(2014, Apr. 30) How anonymizers work [Online]. Available: http://www.livinginternet.com/i/is anon work.htm
|
7 |
(2014, Apr. 30) JAP anonymity and privacy [Online]. Available: http://jap.inf.tu-dresden.de/index en.html
|
8 |
G. Danezis, R. Dingeldine, and N. Mathewson, "Mixminion: design of a type III anonymous remailer protocol," in Proc. IEEE Symposium on Security and Privacy, Berkeley, USA, 2003, pp. 2-13.
|
9 |
M. Freedman, S. Sit, J. Cates and R. Morris, "Introducing Tarzan, a peer-to-peer anonymizing network layer," in Proc. First Int. Workshop on Peer-to-Peer Syst., Cambridge, 2002.
|
10 |
M. Rennhard and B. Plattner, "Introducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection," in Proc. ACM Workshop on Privacy in the Electronic Society, Washington, USA, 2002, pp. 91-102.
|
11 |
P. Syvneron, G. Tsudik, M. Reed, and C. Landwehr, "Towards Analysis of Onion Routing Security," in Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability, Springer-Verlag, LNCS, 2009, pp. 96-114.
|
12 |
B. Zantout and Ramzi A. Haraty. Avoiding Traffic Analysis and Assuring Data Integrity using a Quorum-based Approach. The Fifth International Workshop on Advanced Computations for Engineering Applications. Taif, Saudi Arabia. Mar. 2010.
|
13 |
B. Zantout and R. Haraty, "A comparative study of Bittorrent and Net-Camo data communication systems," International Journal of Computational Intelligence and Information Security, volume 1, number 2, March 2010.
|
14 |
S. Chakravarty, "Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication," Ph.D. dissertation, Columbia Univ. 2014.
|
15 |
S. J.Murdoch and G. Danezis, "Low-cost traffic analysis of TOR," in Proc. IEEE Security and Privacy Symp., May 2006.
|
16 |
K. Bauer, D. McCoy, D. Grunwald, S. Douglas, and K. Tadayoshi, "Low resource, routing attacks against anonymous systems," Tech. Rep. CU-CS-1025-07, University of Colorado, USA, 2007.
|
17 |
A. Hints, "Fingerprinting websites using traffic analysis," in Privacy Enhancing Technologies. Springer-Verlag, LNCS 2482, 2002, pp. 171-178.
|
18 |
B. Zantout and R. Haraty, "I2P data communication system," in Proc. 10th Int. Conf. Netw., 2011, pp. 401-409.
|