Browser-Based Attacks on Tor.
Timothy G. AbbottKatherine J. LaiMichael R. LiebermanEric C. PricePublished in: Privacy Enhancing Technologies (2007)
Keyphrases
- countermeasures
- security protocols
- user experience
- web browser
- watermarking scheme
- watermarking algorithm
- traffic analysis
- chosen plaintext
- malicious users
- terrorist attacks
- malicious attacks
- security mechanisms
- attack detection
- information systems
- data publishing
- security risks
- signal processing
- cooperative
- data corruption
- social networks