Tor: The second-generation onion router, 13th USENIX Security Symposium, 2004. ,
Shining Light in Dark Places: Understanding the Tor Network, Proceedings of the 8th Privacy Enhancing Technologies Symposium, 2008. ,
DOI : 10.1007/978-3-540-70630-4_5
Measuring Tor and Iran, 2009. ,
Web tools help protect human rights activists, 2009. ,
DEranged gives you 100 passwords to Governments & Embassies. online, 2007. ,
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems, Lecture Notes in Computer Science, pp.10-29, 2001. ,
DOI : 10.1007/3-540-44702-4_2
Practical Traffic Analysis: Extending and Resisting Statistical Disclosure, Lecture Notes in Computer Science, vol.3424, pp.17-34, 2005. ,
DOI : 10.1007/11423409_2
How much anonymity does network latency leak?, Proceedings of the 14th ACM conference on Computer and communications security, p.91, 2007. ,
Low-Cost Traffic Analysis of Tor, SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pp.183-195, 2005. ,
Low-resource routing attacks against tor, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, 2007. ,
DOI : 10.1145/1314333.1314336
Hot or not, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, p.36, 2006. ,
DOI : 10.1145/1180405.1180410
Locating hidden servers, 2006 IEEE Symposium on Security and Privacy (S&P'06), 2006. ,
DOI : 10.1109/SP.2006.24
A face is exposed for AOL searcher no. 4417749, New York Times, vol.9, 2006. ,
Practical Onion Hacking: finding the real address of Tor clients, 2006. ,
Browser-Based Attacks on Tor, Lecture Notes in Computer Science, vol.4776, p.184, 2007. ,
DOI : 10.1007/978-3-540-75551-7_12
Torflow: Tor network analysis, HotPETs 2009: 9th Privacy Enhancing Technologies Symposium, p.14, 2009. ,