A Novel Protocol-Feature Attack against Tor's Hidden Service.
Rui WangQiaoyan WenHua ZhangXuelei LiPublished in: IEICE Trans. Inf. Syst. (2016)
Keyphrases
- protocol specification
- authentication protocol
- key exchange protocol
- web services
- service providers
- service oriented
- denial of service attacks
- lightweight
- management system
- application layer
- mobile services
- client server architecture
- image features
- feature vectors
- network resources
- ddos attacks
- service composition
- encryption algorithm
- feature set
- end users