You are here

Bibliography

Export 27 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is Tor  [Clear All Filters]
2013
Teich M. Monkey - Generating Useful Bug Reports Automatically. Informatics. 2013 ;Bachelor:50.
Uzunov A. Speeding Up Tor with SPDY. Computer Science. 2013 ;Master's in Computer Science:124.
Biryukov A, Pustogarov I, Weinmann R. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. In: Security and Privacy (SP), 2013 IEEE Symposium on. Security and Privacy (SP), 2013 IEEE Symposium on. ; 2013.
2012
Wang T, Bauer K, Forero C, Goldberg I. Congestion-aware Path Selection for Tor. In: FC'12 - Proceedings of the 16th International Conference in Financial Cryptography and Data Security . FC'12 - Proceedings of the 16th International Conference in Financial Cryptography and Data Security . Bonaire; 2012.
Akhoondi M, Yu C, Madhyastha HV. LASTor: A Low-Latency AS-Aware Tor Client. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. Proceedings of the 2012 IEEE Symposium on Security and Privacy. San Francisco, CA, USA: IEEE Computer Society; 2012.
2011
AlSabah M, Bauer K, Goldberg I, Grunwald D, McCoy D, Savage S, Voelker GM. DefenestraTor: Throwing out Windows in Tor. In: PETS'11 - Proceedings of the 11th Privacy Enhancing Technologies Symposium . PETS'11 - Proceedings of the 11th Privacy Enhancing Technologies Symposium . Waterloo, Canada; 2011.
Bauer K, Sherr M, McCoy D, Grunwald D. ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation. In: CSET'11 - Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test. CSET'11 - Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test. San Francisco, CA, USA; 2011.
Moore BW, Wacek C, Sherr M. Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise. In: ACSAC'11 - Proceedings of 2011 Annual Computer Security Applications Conference. ACSAC'11 - Proceedings of 2011 Annual Computer Security Applications Conference. Orlando, FL, USA; 2011.
Evans NS. Methods for Secure Decentralized Routing in Open Networks. Network Architectures and Services, Department of Computer Science. 2011 ;Dr. rer. nat.:234.
Le Blond S, Manils P, Abdelberi C, Kaafar MA, Castelluccia C, Legout A, Dabbous W. One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. In: 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11). 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11). Boston, United States: USENIX; 2011. Available from: http://hal.inria.fr/inria-00574178/PDF/btor.pdf
2010
Ngan T-W ``J'', Dingledine R, Wallach DS. Building Incentives into Tor. In: Sion R Proceedings of Financial Cryptography (FC '10). Proceedings of Financial Cryptography (FC '10). ; 2010.
Hopper NJ, Vasserman EY, Chan-Tin E. How Much Anonymity does Network Latency Leak?. ACM Transactions on Information and System Security [Internet]. 2010 :82 - 91. Available from: http://portal.acm.org/citation.cfm?id=1315245.1315257
2009
Edman M, Syverson P. AS-awareness in Tor path selection. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 380–389. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653708
Evans NS, Dingledine R, Grothoff C. A Practical Congestion Attack on Tor Using Long Paths. In: 18th USENIX Security Symposium. 18th USENIX Security Symposium. USENIX; 2009. pp. 33–50. Available from: http://grothoff.org/christian/tor.pdf
2008
Pappas V, Athanasopoulos E, Ioannidis S, Markatos EP. Compromising Anonymity Using Packet Spinning. In: Proceedings of the 11th Information Security Conference (ISC 2008). Proceedings of the 11th Information Security Conference (ISC 2008). Springer-Verlag Berlin, Heidelberg; 2008. Available from: http://portal.acm.org/citation.cfm?id=1432478.1432493
McLachlan J, Hopper NJ. Don't Clog the Queue: Circuit Clogging and Mitigation in P2P anonymity schemes. In: Proceedings of Financial Cryptography (FC '08). Proceedings of Financial Cryptography (FC '08). Springer-Verlag Berlin, Heidelberg; 2008. Available from: http://portal.acm.org/citation.cfm?id=1428551
Zander S, Murdoch SJ. An Improved Clock-skew Measurement Technique for Revealing Hidden Services. In: Proceedings of the 17th USENIX Security Symposium. Proceedings of the 17th USENIX Security Symposium. San Jose, CA, US: USENIX Association Berkeley, CA, USA; 2008. Available from: http://portal.acm.org/citation.cfm?id=1496726
Murdoch SJ, Watson RNM. Metrics for Security and Performance in Low-Latency Anonymity Networks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 115–132. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428267
Androulaki E, Raykova M, Srivatsan S, Stavrou A, Bellovin SM. PAR: Payment for Anonymous Routing. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 219–236. Available from: http://www.springerlink.com/content/r1h1046823587382/
McCoy D, Bauer K, Grunwald D, Kohno T, Sicker D. Shining Light in Dark Places: Understanding the Tor Network. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 63–76. Available from: http://portal.acm.org/citation.cfm?id=1428264
Snader R, Borisov N. A Tune-up for Tor: Improving Security and Performance in the Tor Network. In: Proceedings of the Network and Distributed Security Symposium - NDSS '08. Proceedings of the Network and Distributed Security Symposium - NDSS '08. Internet Society; 2008. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.7368
2007
Wiangsripanawan R, Susilo W, Safavi-Naini R. Design principles for low latency anonymous network systems secure against timing attacks. In: Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW '07). Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW '07). Darlinghurst, Australia, Australia: Australian Computer Society, Inc; 2007. pp. 183–191. Available from: http://portal.acm.org/citation.cfm?id=1274553
Bauer K, McCoy D, Grunwald D, Kohno T, Sicker D. Low-Resource Routing Attacks Against Tor. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007). Washington, DC, USA: ACM New York, NY, USA; 2007. Available from: http://portal.acm.org/citation.cfm?id=1314336
Clark J, van Oorschot PC, Adams C. Usability of anonymous web browsing: an examination of Tor interfaces and deployability. In: Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07). Proceedings of the 3rd Symposium on Usable Privacy and Security (SOUPS '07). New York, NY, USA: ACM; 2007. pp. 41–51. Available from: http://portal.acm.org/citation.cfm?id=1280680.1280687
2006
Murdoch SJ. Hot or Not: Revealing Hidden Services by their Clock Skew. In: Proceedings of CCS 2006. Proceedings of CCS 2006. ACM New York, NY, USA; 2006. Available from: http://portal.acm.org/citation.cfm?id=1180410

Pages