Login / Signup
Mid-defense: Mitigating protocol-level attacks in TOR using indistinguishability obfuscation.
Mahdi Soltani
Sina Najafi
Rasool Jalili
Published in:
ISCISC (2014)
Keyphrases
</>
cryptographic protocols
security protocols
secure routing
ddos attacks
denial of service attacks
higher level
lightweight
infrared
network security
reverse engineering
security threats
database views
computer virus