共 50 条
- [1] Breaking Tor's Anonymity by Modifying Cell's Command [J]. 2022 27TH IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (IEEE ISCC 2022), 2022,
- [2] Anonymity and data mining [J]. COMPUTER SYSTEMS SCIENCE AND ENGINEERING, 2005, 20 (05): : 369 - 376
- [3] Integration of Data Mining with Game Theory [J]. Knowledge Enterprise: Intelligent Strategies in Product Design, Manufacturing, and Management, 2006, 207 : 275 - 280
- [4] Anonymity meets game theory: secure data integration with malicious participants [J]. VLDB JOURNAL, 2011, 20 (04): : 567 - 588
- [6] Anonymity meets game theory: secure data integration with malicious participants [J]. The VLDB Journal, 2011, 20 : 567 - 588
- [7] A-Tor: Accountable Anonymity in Tor [J]. SECURITY AND PRIVACY IN COMMUNICATION NETWORKS, SECURECOMM 2017, 2018, 238 : 838 - 851
- [8] An Anonymity Vulnerability in Tor [J]. IEEE-ACM TRANSACTIONS ON NETWORKING, 2022, 30 (06) : 2574 - 2587
- [9] A Case Study on Measuring Statistical Data in the Tor Anonymity Network [J]. FINANCIAL CRYPTOGRAPHY AND DATA SECURITY, 2010, 6054 : 203 - 215