Monitoring the Bittorrent Monitors: A Bird???s Eye View, Proceedings of the 10th International Conference on Passive and Active Network Measurement, PAM '09, 2009. ,
DOI : 10.1007/11599593_1
A global view of kad, Proceedings of the 7th ACM SIGCOMM conference on Internet measurement , IMC '07, 2007. ,
DOI : 10.1145/1298306.1298323
The P2P War: Someone Is Monitoring Your Activities, Proceedings of the 6th International IFIP-TC6 Networking Conference, Networking '07, 2007. ,
Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network, 2010 Fourth International Conference on Network and System Security, 2010. ,
DOI : 10.1109/NSS.2010.47
URL : https://hal.archives-ouvertes.fr/hal-00748233
Shining Light in Dark Places: Understanding the Tor Network, Proceedings of the 8th Privacy Enhancing Technologies Symposium, PETS '08, 2008. ,
DOI : 10.1007/978-3-540-70630-4_5
Hiding Routing information, Proceedings of the 1st International Workshop on Information Hiding, IH '96, 1996. ,
DOI : 10.1007/3-540-61996-8_37
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, IPTPS '02, 2002. ,
DOI : 10.1007/3-540-45748-8_5
When KAD Meets BitTorrent - Building a Stronger P2P Network, 2011 IEEE International Symposium on Parallel and Distributed Processing Workshops and Phd Forum, 2011. ,
DOI : 10.1109/IPDPS.2011.318
URL : https://hal.archives-ouvertes.fr/inria-00595086
Arnaud Legout, and Walid Dabbous. One bad apple spoils the bunch: exploiting P2P applications to trace and profile Tor users, Proceedings of the 4th USENIX conference on Large-scale exploits and emergent threats, 2011. ,
A Case Study on Measuring Statistical Data in the Tor Anonymity Network, Proceedings of the 14th Financial Cryptography and Data Security, 2010. ,
DOI : 10.1007/978-3-642-14992-4_19
Measuring the Tor network from public directory information, Proceedings of the 4th Hot Topics in Privacy Enhancing Technologies, 2009. ,
I2P???s Usage Characterization, Proceedings of the 4th International Workshop on Traffic Monitoring and Analysis, 2012. ,
DOI : 10.1007/978-3-642-14992-4_19
Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts, 2011. ,
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P, Proceedings of the 11th Privacy Enhancing Technologies Symposium, PETS '11, 2011. ,
DOI : 10.1007/978-3-642-22263-4_9