References
- S. Syverson, D. Goldschlog, and M. Reeds, "Anonymous connections and onion routing," in Proc. IEEE SP, Oakland, USA, 1997, pp. 482-494.
- (2014, June 20) TOR - Onion routing online documentation [Online]. Available: https://www.torproject.org/
- B. Choi, D. Xuan, C. Li, R. Bettati, and W. Zhao, "Efficient traffic camouflaging in mission-critical QoS guaranteed networks," in Proc. IEEE Information Assurance and Security Workshop, West Point, Virginia, USA, 2000, pp. 143-149.
- R. Dingeldine, "TOR: the second-generation onion router," in Proc. Usenix Security Symposium, San Diego, USA, 2004.
- D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," ACM Commun., 24(2), pp. 84-88, 1981. https://doi.org/10.1145/358549.358563
- (2014, Apr. 30) How anonymizers work [Online]. Available: http://www.livinginternet.com/i/is anon work.htm
- (2014, Apr. 30) JAP anonymity and privacy [Online]. Available: http://jap.inf.tu-dresden.de/index en.html
- G. Danezis, R. Dingeldine, and N. Mathewson, "Mixminion: design of a type III anonymous remailer protocol," in Proc. IEEE Symposium on Security and Privacy, Berkeley, USA, 2003, pp. 2-13.
- M. Freedman, S. Sit, J. Cates and R. Morris, "Introducing Tarzan, a peer-to-peer anonymizing network layer," in Proc. First Int. Workshop on Peer-to-Peer Syst., Cambridge, 2002.
- M. Rennhard and B. Plattner, "Introducing MorphMix: peer-to-peer based anonymous internet usage with collusion detection," in Proc. ACM Workshop on Privacy in the Electronic Society, Washington, USA, 2002, pp. 91-102.
- P. Syvneron, G. Tsudik, M. Reed, and C. Landwehr, "Towards Analysis of Onion Routing Security," in Designing Privacy Enhancing Technologies: Workshop on Design Issue in Anonymity and Unobservability, Springer-Verlag, LNCS, 2009, pp. 96-114.
- B. Zantout and Ramzi A. Haraty. Avoiding Traffic Analysis and Assuring Data Integrity using a Quorum-based Approach. The Fifth International Workshop on Advanced Computations for Engineering Applications. Taif, Saudi Arabia. Mar. 2010.
- B. Zantout and R. Haraty, "A comparative study of Bittorrent and Net-Camo data communication systems," International Journal of Computational Intelligence and Information Security, volume 1, number 2, March 2010.
- S. Chakravarty, "Traffic Analysis Attacks and Defenses in Low Latency Anonymous Communication," Ph.D. dissertation, Columbia Univ. 2014.
- S. J.Murdoch and G. Danezis, "Low-cost traffic analysis of TOR," in Proc. IEEE Security and Privacy Symp., May 2006.
- K. Bauer, D. McCoy, D. Grunwald, S. Douglas, and K. Tadayoshi, "Low resource, routing attacks against anonymous systems," Tech. Rep. CU-CS-1025-07, University of Colorado, USA, 2007.
- A. Hints, "Fingerprinting websites using traffic analysis," in Privacy Enhancing Technologies. Springer-Verlag, LNCS 2482, 2002, pp. 171-178.
- B. Zantout and R. Haraty, "I2P data communication system," in Proc. 10th Int. Conf. Netw., 2011, pp. 401-409.