1 |
DINGLEDINE R , MATHEWSON N , SYVERSON P . Tor:the second-generation onion router[A]. Proceedings of the 13th Conference on USENIX Security Symposium[C]. 2004.
|
2 |
Tor metrics portal[EB/OL]. 2013.
|
3 |
DINGLEDINE R , MATHEWSON N . Design of a blocking-resistant anonymity system[R]. The Tor Project, 2006.
|
4 |
高峰, 杨明, 罗军舟 等. Tor匿名通信流量在线识别方法[J]. 软件学报, 2013,24(3):540-556. HE G , YANG M , LUO J Z , et al. Online identification of Tor anonymous communication traffic[J]. Journal of Software, 2013,24(3):540-556.
|
5 |
THE TOR PROJECT.Tor directory protocol,version 3[EB/OL]. , 2013.
|
6 |
FEAMSTER N , DINGLEDINE R . Location diversity in anonymity networks[A]. Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society[C]. 2004.66-76.
|
7 |
STEVEN J , MURDOCH , PIOTR ZIELI?SKI . Sampled traffic analysis by internet-exchange-level adversaries[A]. Proceedings of the 7th International Conference on Privacy Enhancing Technologies[C]. 2007.167-183.
|
8 |
BAUER K , MCCOY D , GRUNWALD D , et al. Low-resource routing attacks against tor[A]. Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society[C]. 2007.11-20.
|
9 |
DINGLEDINE R , MATHEWSON N . Tor path specification[EB/OL]. , 2013.
|
10 |
LING Z , LUO J , YU W , et al. Extensive analysis and large-scale empirical evaluation of Tor bridge discovery[A]. IEEE INFOCOM[C]. 2012.2381-2389.
|
11 |
WANG X , SHI J , FANG B , et al. An empirical analysis of family in the Tor network[A]. IEEE International Conference on Communications[C]. Budapest, 2013.1995-2000.
|
12 |
EDMAN M , SYVERSON P . As-awareness in tor path selection[A]. Proceedings of the 16th ACM conference on Computer and Communications Security[C]. 2009.380-389.
|
13 |
BRUCE SCHNEIER . Attacking Tor:how the NSA targets users' online anonymity[EB/OL]. , 2013.
|
14 |
MCCOY D , BAUER K , GRUNWALD D , et al. Shining light in dark places:understanding the tor network[A]. Proceedings of the 8th International Symposium on Privacy Enhancing Technologies[C]. Berlin, 2008.63-76.
|
15 |
WANG X , SHI J , GUO L . Towards analyzing family misconfiguration in tor network[A]. Computer Science and its Applications,Lecture Notes in Electrical Engineering[C]. 2012.503-514.
|
16 |
VASSERMAN E , JANSEN R , TYRA J , et al. Membership-concealing overlay networks[A]. Proceedings of the 16th ACM Conference on Computer and Communications security[C]. 2009.390-399.
|
17 |
MCLACHLAN J , HOPPER N . On the risks of serving whenever you surf:vulnerabilities in Tor's blocking resistance design[A]. Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society[C]. 2009.31-40.
|
18 |
LI C , XUE Y , DONG Y , et al. Super nodes in Tor:existence and security implication[A]. Proceedings of the 27th Annual Computer Security Applications Conference[C]. 2011.217-226.
|