Tor: The second-generation onion router, USENIX Security Symposium, USENIX, pp.303-320, 2004. ,
Web MIXes: A system for anonymous and unobservable Internet access In: Designing Privacy Enhancing Technologies, Lecture Notes in Computer Science, pp.115-129, 2001. ,
On the Security of the Tor Authentication Protocol, Privacy Enhancing Technologies, pp.316-331, 2006. ,
DOI : 10.1007/11957454_18
Untraceable electronic mail, return addresses, and digital pseudonyms, Communications of the ACM, vol.4, issue.2, pp.84-88, 1981. ,
Vergleich der Verfahren zur Verhinderung von Replay-angriffen der Anonymisierungsdienste AN.ON und Tor, pp.183-187, 2006. ,
Cryptographic Protocol Analysis of AN.ON, Proceedings of the 14th International Conference of Financial Cryptography and Data Security, 2010. ,
DOI : 10.1007/978-3-642-14577-3_11
Low Latency Anonymous Communication ??? How Long Are Users Willing to Wait?, Lecture Notes in Computer Science, vol.3995, 2006. ,
DOI : 10.1007/11766155_16
Tor project infrastructure updates in response to security breach. http://archives.seul.org/or, 2010. ,
Tor protocol specification visited 03.02, 2010. ,
Information technology ? Security techniques ? Encryption algorithms ? Part 2: Asymmetric ciphers, ISO, 2006. ,