"Super nodes" in Tor: existence and security implication.
Chenglong LiYibo XueYingfei DongDongsheng WangPublished in: ACSAC (2011)
Keyphrases
- information security
- network security
- access control
- security policies
- intrusion detection
- security issues
- security requirements
- directed graph
- shortest path
- security problems
- statistical databases
- computer security
- security mechanisms
- network layer
- security systems
- network management
- information assurance
- inter domain
- security measures
- malicious nodes
- security management
- wireless sensor networks
- secure routing
- security threats
- key management
- mobile nodes
- functional requirements
- sensitive data
- weighted graph
- anomaly detection