Correlation-Based Traffic Analysis Attacks on Anonymity Networks
D. Chaum, “Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms,” Comm. ACM, vol. 24, no. 2, pp. 84-90, Feb.1981.
A. Serjantov and G. Danezis, “Towards an Information Theoretic Metric for Anonymity,” Proc. Privacy Enhancing Technologies Workshop (PET ’02), R. Dingledine and P. Syverson, eds., pp. 41-53, Apr. 2002.
C. Dı´az, S. Seys, J. Claessens, and B. Preneel, “Towards Measuring Anonymity,” Proc. Privacy Enhancing Technologies Workshop (PET ’02), R. Dingledine and P. Syverson, eds., pp. 54-68, Apr. 2002.
Y. Zhu and R. Bettati, “Anonymity vs. Information Leakage in Anonymity Systems,” Proc. 25th IEEE Int’l Conf. Distributed Computing Systems (ICDCS ’05), pp. 514-524, 2005.
O.R.D. Achives, “Link Padding and the Intersection ttack,”http://archives.seul.org/or/dev, 2002.  P.F. Syverson, D.M. Goldschlag, and M.G. Reed, “AnonymousConnections and Onion Routing,” Proc. IEEE Symp. Security and Privacy, pp. 44-54, 1997.
R. Dingledine, N. Mathewson, and P. Syverson, “Tor: The Second-Generation Onion Router,” Proc. 13th USENIX Security Symp, pp. 303-320, Aug. 2004.
M.K. Reiter and A.D. Rubin, “Crowds: Anonymity for Web Transactions,” ACM Trans. Information and System Security, vol. 1, no. 1, pp. 66-92, 1998.
K. Suh, D.R. Figueiredo, J. Kurose, and D. Towsley, “Characterizing and Detecting Skype-Relayed Traffic,” Proc. 25th IEEE INFOCOM ’06, pp. 1-12, Apr. 2006.
Y.J. Pyun, Y.H. Park, X. Wang, D.S. Reeves, and P. Ning, “Tracing Traffic through Intermediate Hosts that Repacketize Flows,” Proc. 26th IEEE INFOCOM ’07, pp. 634-642, May 2007.
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.