Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks (English)
- New search for: Lenhard, J.
- New search for: Loesing, K.
- New search for: Wirtz, G.
- New search for: Lenhard, J.
- New search for: Loesing, K.
- New search for: Wirtz, G.
- New search for: Abdalla, Michel
In:
Applied cryptography and network security
5536
;
324-341
;
2009
-
ISBN:
-
ISSN:
- Conference paper / Print
-
Title:Performance Measurements of Tor Hidden Services in Low-Bandwidth Access Networks
-
Contributors:
-
Conference:Conference; 7th, Applied cryptography and network security ; 2009 ; Paris-Rocquenfort, France
-
Published in:Applied cryptography and network security , 5536 ; 324-341LECTURE NOTES IN COMPUTER SCIENCE , 5536 ; 324-341
-
Publisher:
- New search for: Springer
-
Place of publication:Berlin
-
Publication date:2009-01-01
-
Size:18 pages
-
Remarks:Includes bibliographical references and index.
-
ISBN:
-
ISSN:
-
Type of media:Conference paper
-
Type of material:Print
-
Language:English
-
Keywords:
-
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents conference proceedings
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 1
-
Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer KeysManulis, M. et al. | 2009
- 20
-
Session-state Reveal Is Stronger Than Ephemeral Key Reveal: Attacking the NAXOS Authenticated Key Exchange ProtocolCremers, C.J.F. et al. | 2009
- 34
-
Secure Pairing of ``Interface-Constrained'' Devices Resistant against Rushing User BehaviorSaxena, N. / Uddin, M.B. et al. | 2009
- 53
-
How to Extract and Expand Randomness: A Summary and Explanation of Existing ResultsCliff, Y. / Boyd, C. / Nieto, J.G. et al. | 2009
- 71
-
Novel Precomputation Schemes for Elliptic Curve CryptosystemsLonga, P. / Gebotys, C. et al. | 2009
- 89
-
Practical Secure Evaluation of Semi-private FunctionsPaus, A. / Sadeghi, A.-R. / Schneider, T. et al. | 2009
- 107
-
Secure Hamming Distance Based Computation and Its ApplicationsJarrous, A. / Pinkas, B. et al. | 2009
- 125
-
Efficient Robust Private Set IntersectionDachman-Soled, D. / Malkin, T. / Raykova, M. / Yung, M. et al. | 2009
- 143
-
A New Variant of the Cramer-Shoup KEM Secure against Chosen Ciphertext AttackBaek, J. / Susilo, W. / Liu, J.K. / Zhou, J. et al. | 2009
- 156
-
An Efficient Identity-Based Online/Offline Encryption SchemeLiu, J.K. / Zhou, J. et al. | 2009
- 168
-
Dual-Policy Attribute Based EncryptionAttrapadung, N. / Imai, H. et al. | 2009
- 186
-
Construction of Threshold Public-Key Encryptions through Tag-Based EncryptionsArita, S. / Tsurudome, K. et al. | 2009
- 201
-
Malyzer: Defeating Anti-detection for Application-Level Malware AnalysisLiu, L. / Chen, S. et al. | 2009
- 219
-
A New Message Recognition Protocol with Self-recoverability for Ad Hoc Pervasive NetworksGoldberg, I. / Mashatan, A. / Stinson, D.R. et al. | 2009
- 238
-
Breaking Two k-Resilient Traitor Tracing Schemes with Sublinear Ciphertext SizeLee, M. / Ma, D. / Seo, M. et al. | 2009
- 253
-
Tracing and Revoking Pirate RebroadcastsKiayias, A. / Pehlivanoglu, S. et al. | 2009
- 272
-
Efficient Deniable Authentication for Signatures: Application to Machine-Readable Travel DocumentMonnerat, J. / Pasini, S. / Vaudenay, S. et al. | 2009
- 292
-
Homomorphic MACs: MAC-Based Integrity for Network CodingAgrawal, S. / Boneh, D. et al. | 2009
- 306
-
Algorithmic Tamper Proof (ATP) Counter Units for Authentication Devices Using PINKomano, Y. / Ohta, K. / Miyake, H. / Shimbo, A. et al. | 2009
- 324
-
Performance Measurements of Tor Hidden Services in Low-Bandwidth Access NetworksLenhard, J. / Loesing, K. / Wirtz, G. et al. | 2009
- 342
-
Cryptanalysis of TwisterMendel, F. / Rechberger, C. / Schlaffer, M. et al. | 2009
- 354
-
Cryptanalysis of CubeHashBrier, E. / Peyrin, T. et al. | 2009
- 369
-
Collision Attack on BooleMendel, F. / Nad, T. / Schlaffer, M. et al. | 2009
- 382
-
Integrity Protection for Revision ControlCachin, C. / Geisler, M. et al. | 2009
- 400
-
Fragility of the Robust Security Network: 802.11 Denial of ServiceEian, M. et al. | 2009
- 417
-
Fast Packet Classification Using Condition FactorizationTongaonkar, A. / Sekar, R. / Vasudevan, S. et al. | 2009
- 437
-
Choosing NTRUEncrypt Parameters in Light of Combined Lattice Reduction and MITM ApproachesHirschhorn, P.S. / Hoffstein, J. / Howgrave-Graham, N. / Whyte, W. et al. | 2009
- 456
-
Broadcast Attacks against Lattice-Based CryptosystemsPlantard, T. / Susilo, W. et al. | 2009
- 473
-
Partial Key Exposure Attack on CRT-RSASarkar, S. / Maitra, S. et al. | 2009
- 485
-
How to Compare Profiled Side-Channel Attacks?Standaert, F.-X. / Koeune, F. / Schindler, W. et al. | 2009
- 499
-
Theoretical and Practical Aspects of Mutual Information Based Side Channel AnalysisProuff, E. / Rivain, M. et al. | 2009
- 519
-
Attacking ECDSA-Enabled RFID DevicesHutter, M. / Medwed, M. / Hein, D. / Wolkerstorfer, J. et al. | 2009