Journal of Engineering and Applied Sciences

Year: 2017
Volume: 12
Issue: 13
Page No. 3338 - 3344

Bandwidth Optimization in Tor Nodes through Frame Configuration in Hidden Services

Authors : P. Salcedo, Octavio J., Forero R. Julian A. and E. Vera-Parra Nelson

References

Atafar, A., M.A. Shahrabi and M.J. Esfahani, 2013. Evaluation of university performance using BSC and ANP. Decis. Sci. Lett., 2: 305-311.
Direct Link  |  

Backes, M., A. Kate and E. Mohammadi, 2012. Ace: An efficient key-exchange protocol for onion routing. Proceedings of the 2012 ACM Workshop on Privacy in the Electronic Society, October 15-15, 2012, ACM, Raleigh, North Carolina, USA., ISBN:978-1-4503-1663-7, pp: 55-64.

Backes, M., A. Kate, S. Meiser and E. Mohammadi, 2014. Monitoring the anonymity of tor’s path selection. Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, November 03-07, 2014, ACM, Scottsdale, Arizona, USA., ISBN:978-1-4503-2957-6, pp: 513-524.

Cangialosi, F., D. Levin and N. Spring, 2015. Ting: Measuring and exploiting latencies between all tor nodes. Proceedings of the 2015 ACM Conference on Internet Measurement Conference, October 28-30, 2015, ACM, Tokyo, Japan, ISBN:978-1-4503-3848-6, pp: 289-302.

Chen, C., D.E. Asoni, D. Barrera, G. Danezis and A. Perrig, 2015. HORNET: High-speed onion routing at the network layer. Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security, October 12-16, 2015, ACM, Denver, Colorado, USA., ISBN:978-1-4503-3832-5, pp: 1441-1454.

Danner, N., K.S. Defabbia, D. Krizanc and M. Liberatore, 2012. Effectiveness and detection of denial-of-service attacks in Tor. ACM. Trans. Inf. Syst. Secur. (TISSEC), 15: 1-25.
CrossRef  |  Direct Link  |  

Dingledine, R., N. Mathewson and P. Syverson, 2004. Tor: The second-generation onion router. U.S. Naval Research Laboratory, Washington, USA., http://www.dtic.mil/docs/citations/ADA465464

Hatamian, M., H. Barati, A. Movaghar and A. Naghizadeh, 2016. CGC: Centralized genetic-based clustering protocol for wireless sensor networks using onion approach. Telecommunication Syst., 62: 657-674.
Direct Link  |  

Khan, M.A.Y. and D. Veitch, 2008. Peeling the 802.11 onion: Separating congestion from physical per. Proceedings of the 3rd ACM International Workshop on Wireless Network Testbeds, Experimental Evaluation and Characterization, September 19-19, 2008, ACM, San Francisco, California, USA., ISBN:978-1-60558-187-3, pp: 33-40.

Lachlan, M.J., A. Tran, N. Hopper and Y. Kim, 2009. Scalable onion routing with torsk. Proceedings of the 16th ACM Conference on Computer and Communications Security, November 09-13, 2009, ACM, Chicago, Illinois, USA., ISBN:978-1-60558-894-0, pp: 590-599.

Li, C., Y. Xue, Y. Dong and D. Wang, 2011. Super nodes in tor: Existence and security implication. Proceedings of the 27th Annual Conference on Computer Security Applications, December 05 - 09, 2011 ACM, Orlando, Florida, USA., ISBN:978-1-4503-0672-0, pp: 217-226.

Ling, Z., J. Luo, W. Yu, X. Fu and D. Xuan et al., 2012. A new cell-counting-based attack against Tor. IEEE-ACM. Trans. Networking (ToN), 20: 1245-1261.
CrossRef  |  Direct Link  |  

Moore, W.B., C. Wacek and M. Sherr, 2011. Exploring the potential benefits of expanded rate limiting in tor: Slow and steady wins the race with tortoise. Proceedings of the 27th Annual Conference on Computer Security Applications, December 05-09, 2011, ACM, New York, USA., ISBN:978-1-4503-0672-0, pp: 207-216.

Tahmassebpour, M. and A.M. Otaghvari, 2016. Increase efficiency big data in intelligent transportation system with using IoT integration cloud. J. Fundam. Appl. Sci., 8: 2443-2461.
Direct Link  |  

Tahmassebpour, M., 2017. A new method for time-series big data effective storage. IEEE Access, 2007: 10694-10699.
CrossRef  |  Direct Link  |  

Tang, C. and I. Goldberg, 2010. An improved algorithm for Tor circuit scheduling. Proceedings of the 17th ACM Conference on Computer and Communications Security, October 04-08, 2010, ACM, Chicago, Illinois, USA., ISBN:978-1-4503-0245-6, pp: 329-339.

Thomas, M. and A. Mohaisen, 2014. Measuring the leakage of onion at the root: A measurement of tor’s onion pseudo-TLD in the global domain name system. Proceedings of the 13th Workshop on Privacy in the Electronic Society, November 03-03, 2014, ACM, Scottsdale, Arizona, USA., ISBN:978-1-4503-3148-7, pp: 173-180.

Wang, C., D. Shi and X. Xu, 2015. AIB-OR: Improving onion routing circuit construction using anonymous identity-based cryptosystems. PloS One, Vol.10,

Wang, T. and I. Goldberg, 2013. Improved website fingerprinting on tor. Proceedings of the 12th ACM Workshop on Workshop on Privacy in the Electronic Society, November 04-04, 2013, ACM, Berlin, Germany, ISBN:978-1-4503-2485-4, pp: 201-212.

Design and power by Medwell Web Development Team. © Medwell Publishing 2024 All Rights Reserved