<--- Back to Details
First PageDocument Content
Internet / Computing / Network architecture / Internet Standards / Internet protocols / Internet security / Routing / Secure communication / Border Gateway Protocol / IP hijacking / Tor / Traffic analysis
Date: 2014-10-08 09:38:20
Internet
Computing
Network architecture
Internet Standards
Internet protocols
Internet security
Routing
Secure communication
Border Gateway Protocol
IP hijacking
Tor
Traffic analysis

Anonymity on QuickSand: Using BGP to Compromise Tor Laurent Vanbever, Oscar Li, Jennifer Rexford, Prateek Mittal Princeton University {vanbever,jrex}@cs.princeton.edu {oli,pmittal}@princeton.edu ABSTRACT

Add to Reading List

Source URL: www.vanbever.eu

Download Document from Source Website

File Size: 985,30 KB

Share Document on Facebook

Similar Documents

Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um e

Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um e

DocID: 1uOJq - View Document

Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um e

Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um e

DocID: 1uyBr - View Document

Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um e

Scalable Verification of Border Gateway Protocol Configurations with an SMT Solver um e

DocID: 1tJRq - View Document

Formal Semantics and Automated Verification for the Border Gateway Protocol Konstantin Weitz Doug Woos

Formal Semantics and Automated Verification for the Border Gateway Protocol Konstantin Weitz Doug Woos

DocID: 1tGFv - View Document

Formal Semantics and Automated Verification for the Border Gateway Protocol Konstantin Doug Weitz

Formal Semantics and Automated Verification for the Border Gateway Protocol Konstantin Doug Weitz

DocID: 1t2Vi - View Document