DOI: 10.17760/d20283799
|View full text |Cite
|
Sign up to set email alerts
|

Abusing privacy infrastructures : case study of Tor

Abstract: I would like to dedicate my thesis to my dear parents, Aliakbar Sanatinia and Zohre Mohimi, and thank them for everything that I have achieved. I am and will always be grateful to them for their unconditional love and believing in me; without them none of this would have been possible.. .

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 88 publications
(94 reference statements)
0
2
0
Order By: Relevance
“…This layered encryption ensures that each router knows the identities only of routers that are directly connected in the circuit. According to [15], to counter traffic correlation attacks, no two routers are chosen from the same family group to create a circuit. Sometimes, a bridge is introduced as a hidden entry router to resist censorship further.…”
Section: Background a Tormentioning
confidence: 99%
See 1 more Smart Citation
“…This layered encryption ensures that each router knows the identities only of routers that are directly connected in the circuit. According to [15], to counter traffic correlation attacks, no two routers are chosen from the same family group to create a circuit. Sometimes, a bridge is introduced as a hidden entry router to resist censorship further.…”
Section: Background a Tormentioning
confidence: 99%
“…Note thatT req andT res in Conditions 7 and are defined in (14) and (15). Conditions 1-6 are the same as those in Problem 1, except that T 1 and T 2 are replaced with T 1 and T 2 , respectively, and IP (client) and IP (middle) do not appear in Condition 3 (because they are in the client's log file).…”
Section: Detection Phasementioning
confidence: 99%