Tor: the second-generation onion router, Proceedings of the 13th conference on USENIX Security Symposium, SSYM '04, pp.21-21, 2004. ,
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization, 2013 IEEE Symposium on Security and Privacy, pp.80-94, 2013. ,
DOI : 10.1109/SP.2013.15
Tor and the RELAY EARLY traffic confirmation attack ,
Shining Light in Dark Places: Understanding the Tor Network, Proceedings of the 8th Privacy Enhancing Technologies Symposium, PETS '08, 2008. ,
DOI : 10.1007/978-3-540-70630-4_5
Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts, Black Hat DC 2011, 2011. ,
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P, Proceedings of the 11th International Conference on Privacy Enhancing Technologies, pp.155-174, 2011. ,
DOI : 10.1007/978-3-642-22263-4_9
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.53-65, 2002. ,
DOI : 10.1007/3-540-45748-8_5
The Sybil Attack, Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, IPTPS '01, pp.251-260, 2002. ,
How much anonymity does network latency leak?, ACM Trans. Inf. Syst. Secur, vol.1313, issue.2, pp.1-1328, 2010. ,
A Case Study on Measuring Statistical Data in the Tor Anonymity Network, Proceedings of the 14th International Conference on Financial Cryptograpy and Data Security, pp.203-215, 2010. ,
DOI : 10.1007/978-3-642-14992-4_19
Peer proling and selection in the I2P anonymous network, Proceedings of PET-CON 2009, 2009. ,
DDoS attack on Tor directory. bit.ly/1iWOrmC, 2013. ,
Practical Attacks against the I2P Network, Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses, 2013. ,
DOI : 10.1007/978-3-642-41284-4_22
Understanding churn in peer-to-peer networks, Proceedings of the 6th ACM SIGCOMM on Internet measurement , IMC '06, pp.189-202, 2006. ,
DOI : 10.1145/1177080.1177105
A Bird???s Eye View on the I2P Anonymous File-Sharing Environment, Proceedings of the 6th International Conference on Network and System Security, 2012. ,
DOI : 10.1007/978-3-642-34601-9_11
Detection and mitigation of localized attacks in a widely deployed P2P network. Peer-to-Peer Networking and Applications, pp.155-174, 2012. ,
URL : https://hal.archives-ouvertes.fr/hal-00786438
Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, 2007. ,
DOI : 10.1145/1290168.1290176
Attacking the Kad network, Proceedings of the 4th international conference on Security and privacy in communication netowrks, SecureComm '08, pp.1-23, 2008. ,
DOI : 10.1145/1460877.1460907
Actively monitoring peers in KAD, Proceedings of the 6th International Workshop on Peer-to-Peer Systems, 2007. ,
Evaluation of Sybil Attacks Protection Schemes in KAD, 3rd International Conference on Autonomous Infrastructure , Management and Security -AIMS 2009, pp.70-82, 2009. ,
DOI : 10.1145/1151659.1159945
URL : https://hal.archives-ouvertes.fr/inria-00405381
A survey of DHT security techniques, ACM Computing Surveys, vol.43, issue.2, pp.1-8, 2011. ,
DOI : 10.1145/1883612.1883615
A Survey of Solutions to the Sybil Attack, 2006. ,
Sufficiently secure peer-to-peer networks, Workshop on the Economics of Information Security, 2004. ,
Informant: detecting sybils using incentives, Proc. of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security, FC '07/USEC '07, pp.192-207, 2007. ,