共 50 条
- [1] Performance analysis on the unicasting relay protocol and relay selection Beijing Youdian Daxue Xuebao/Journal of Beijing University of Posts and Telecommunications, 2010, 33 (04): : 74 - 78
- [2] Study on Protocol Design and Performance Analysis for Cognitive Relay Networks 2014 IEEE 79TH VEHICULAR TECHNOLOGY CONFERENCE (VTC-SPRING), 2014,
- [3] Measuring Tor Relay Popularity SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM, PT I, 2019, 304 : 386 - 405
- [4] Statistical and combinatorial analysis of the TOR routing protocol: structural weaknesses identified in the TOR network Journal of Computer Virology and Hacking Techniques, 2020, 16 : 3 - 18
- [6] Statistical and Combinatorial Analysis of the TOR Routing Protocol Structural Weaknesses Identified in the TOR Network ICISSP: PROCEEDINGS OF THE 4TH INTERNATIONAL CONFERENCE ON INFORMATION SYSTEMS SECURITY AND PRIVACY, 2018, : 507 - 516
- [7] On the security of the Tor authentication protocol Privacy Enhancing Technologies, 2006, 4258 : 316 - 331
- [8] Beyond TOR: The TrueNyms Protocol SECURITY AND INTELLIGENT INFORMATION SYSTEMS, 2012, 7053 : 68 - 84
- [9] A Study on Security Analysis of the Unlinkability in Tor 2021 IEEE MILITARY COMMUNICATIONS CONFERENCE (MILCOM 2021), 2021,
- [10] OPTIMIZATION OF DNA EXTRACTION AND PCR PROTOCOL FOR RAPD ANALYSIS OF TOR PUTITORA JOURNAL OF ANIMAL AND PLANT SCIENCES, 2015, 25 (03): : 536 - 541