Challenges in Protecting Tor Hidden Services from Botnet Abuse.
Nicholas HopperPublished in: Financial Cryptography (2014)
Keyphrases
- service oriented
- key issues
- web services
- service providers
- end users
- service discovery
- service composition
- lessons learned
- business opportunities
- peer to peer
- real world
- mobile services
- mobile networks
- ubiquitous computing
- context aware
- constantly evolving
- software as a service
- protection mechanisms
- information resources
- open issues
- technical challenges
- network traffic
- e government
- information systems