References
- D. Clark, "Design Philosophy of the DARPA Internet Protocols," In Proc. on Communications architectures and protocols (SIGCOMM '88), New York, USA, August, 1988.
- K. Kim and S. Han "Home Security System Based on IoT," J. of the Korean Institute of Electronic Communication Sciences, vol. 12, no. 1, 2017, pp. 147-154.
- D. Kim, "Implementation Plan and Requirements Analysis of Access Control for Cyber Security of Nuclear Power Plants," J. of the Korean Institute of Electronic Communication Sciences, vol. 11, no. 1, 2016, pp. 1-8. https://doi.org/10.13067/JKIECS.2016.11.1.1
- Y. Tscha, "Concealing Communication Paths in Wireless Sensor Networks," J. of the Korean Institute of Electronic Communication Sciences, vol. 9, no. 12, 2014, pp. 1353-1358. https://doi.org/10.13067/JKIECS.2014.9.12.1353
- D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," ACM Communications, vol. 24, no. 2, 1981, pp. 84-90. https://doi.org/10.1145/358549.358563
- X. Fu and Z. Ling, "One cell is enough to break tor's anonymity," In Proc. Black Hat DC, Arlington, USA, Feburary, 2009.
- Z. Ling, J. Luo, W. Yu, X. Fu, D. Xuan, and W. Jia, "A New Cell-Counting-Based Attack Against Tor," IEEE/ACM Trans. Networking, vol. 20, no. 4, Aug. 2012, pp. 1245-1261. https://doi.org/10.1109/TNET.2011.2178036
- S. Chakravarty, A. Stavrou, and A. D. Keromytis, "Traffic analysis against low-latency anonymity networks using available bandwidth estimation," 15th European Symp. on Research in Computer Security (ESORICS2010), Athens, Greece, September, 2010.
- S. Nepal, S. Dahal, and S. Shin, "Deanonymizing schemes of hidden services in tor network: A survey," 2015 Int. Conf. on Information Networking (ICOIN), Siem Reap, Cambodia, January, 2015.
- S. Dahal, J. Lee, J. Kang, and S. Shin, "Analysis on end-to-end node selection probability in Tor network," 2015 Int. Conf. on Information Networking (ICOIN), Siem Reap, Cambodia, January, 2015.
- T. Abbott, K. Lai, M. Lieberman, and E. Price, "Browser-based attacks on Tor," In Proc. the 7th Int. Conf. on Privacy Enhancing Technologies (PET'07), Ottawa, Canada, June, 2007.
- D. McCoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker, "Shining light in dark places: Understanding the tor network," In Proc. the 8th Int. Symp. on Privacy Enhancing Technologies (PET'08), Leuven, Belgium, July, 2008.
- S. Blond, P. Manils, C. Abdelberi, M. Dali Kaafar, C. Castelluccia, A. Legout, and W. Dabbous, "One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users," In Proc. the 4th USENIX conf. on Large-scale exploits and emergent threats (LEET'11), Boston, USA, March, 2011.
- K. Peng, "Anonymous Communication Networks: Protecting Privacy on the Web," New York, CRC Press, 2014.
- R. Dingledine, N. Mathewson, and P. Syverson, "Tor: the second-generation Onion Router," Proc. of the 13th Conf. on USENIX Security Symp., San Diego, USA, August, 2004.
- P. Manils, C. Abdelberri, S. L. Blond, M. Ali Kaafar, C. Castelluccia, A. Legout, and W. Dabbous, "Compromising tor anonymity exploiting p2p information leakage," In Proc. of the 3rd Hot Topics in Privacy Enhancing Technologies, Berlin, Germany, July, 2010.