, Cisco Visual Networking Index: Forecast and Trends, pp.2017-2022
PuppetCast: A Secure Peer Sampling Protocol, 2008 European Conference on Computer Network Defense. 3-10, 2008. ,
, Towards Predicting E cient and Anonymous Tor Circuits, 2018.
Brahms: Byzantine Resilient Random Membership Sampling, Computer Networks, vol.53, pp.2340-2359, 2009. ,
CASCADE: Reliable Distributed Session Hando for Continuous Interaction Across Devices, IEEE 38th International Conference on Distributed Computing Systems (ICDCS), pp.244-254, 2018. ,
I Made Steve Bannon's Psychological Warfare Tool': Meet the Data War Whistleblower. The Guardian, 2018. ,
Touching from a Distance: Website Fingerprinting Attacks and Defenses, Proceedings of the 2012 ACM Conference on Computer and Communications Security -CCS '12, p.605, 2012. ,
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Commun. ACM, vol.24, pp.84-90, 1981. ,
HORNET: High-Speed Onion Routing at the Network Layer, 2015. ,
Freenet: A Distributed Anonymous Information Storage and Retrieval System, International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, pp.46-66, 2001. ,
The BitTorrent Protocol Speci cation, 2008. ,
Sphinx: A Compact and Provably Secure Mix Format, 30th IEEE Symposium on Security and Privacy, pp.269-282, 2009. ,
Tor: The Second-Generation Onion Router, 2004. ,
Broadcast Encryption, Advances in Cryptology -CRYPTO' 93, pp.480-491, 1993. ,
Tarzan: A Peer-to-peer Anonymizing Network Layer, Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS '02), 2002. ,
Hiding Routing Information, Information Hiding, Gerhard Goos, Juris Hartmanis, vol.1174, 1996. ,
, , pp.137-150
We Kill People Based on Metadata, pp.53-66, 2017. ,
The GNUnet System, 2017. ,
NEXTLEAP: Decentralizing Identity with Privacy for Secure Messaging, Proceedings of the 12th International Conference on Availability, Reliability and Security -ARES '17, 2017. ,
URL : https://hal.archives-ouvertes.fr/hal-01673292
Side Channels in Cloud Services: Deduplication in Cloud Storage, IEEE Security & Privacy, vol.8, pp.40-47, 2010. ,
The Troubling Truth of Why It's Still So Hard to Share Files Directly, Wired, 2014. ,
An Empirical Study of the I2P Anonymity Network and Its Censorship Resistance, Proceedings of the Internet Measurement Conference 2018 on -IMC '18, pp.379-392, 2018. ,
Gossip-based peer sampling, ACM ToCS, vol.25, 2007. ,
Secure Peer Sampling, Computer Networks, vol.54, pp.2086-2098, 2010. ,
Users Get Routed: Tra c Correlation on Tor by Realistic Adversaries, Proceedings of the 2013 ACM SIGSAC Conference on Computer & Communications Security -CCS '13, pp.337-348, 2013. ,
SGX-Tor: A Secure and Practical Tor Anonymity Network With SGX Enclaves, IEEE/ACM Transactions on Networking, vol.26, pp.2174-2187, 2018. ,
Private Traits and Attributes Are Predictable from Digital Records of Human Behavior, Proceedings of the National Academy of Sciences, vol.110, pp.5802-5805, 2013. ,
Towards E cient Tra c-Analysis Resistant Anonymity Networks, Proceedings of the ACM SIGCOMM 2013 Conference on SIGCOMM -SIGCOMM '13, pp.303-314, 2013. ,
A Selective Repeat ARQ System, 3rd International Conference on Digital Satellite Communications, pp.189-195, 1975. ,
Sprinkler: A Probabilistic Dissemination Protocol to Provide Fluid User Interaction in Multi-Device Ecosystems, 2018 IEEE International Conference on Pervasive Computing and Communications (PerCom). 1-10, 2018. ,
URL : https://hal.archives-ouvertes.fr/hal-01704172
NSA Files Decoded: Edward Snowden's Surveillance Revelations Explained. The Guardian, 2013. ,
Psychological Targeting as an E ective Approach to Digital Mass Persuasion, Proceedings of the National Academy of Sciences, vol.114, pp.12714-12719, 2017. ,
, File Transfer, 2011.
For NSA Chief, Terrorist Threat Drives Passion to 'Collect It All, Washington Post, 2013. ,
Salsa: A Structured Approach to Large-scale Anonymity, Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS '06, pp.17-26, 2006. ,
Compressive Tra c Analysis: A New Paradigm for Scalable Tra c Analysis, Proceedings of the 2017 ACM SIGSAC Conference on Computer and Communications Security -CCS '17, pp.2053-2069, 2017. ,
Death by drone strike, dished out by algorithm. The Guardian, 2016. ,
, Contributions to the Mathematical Theory of Evolution.-II. Skew Variation in Homogeneous Material, Philosophical Transactions of the Royal Society of London. (A.), vol.186, pp.343-414, 1895.
Computer Networks: A Systems Approach, pp.97-110, 2003. ,
The Loopix Anonymity System, 26th USENIX Security Symposium (USENIX Security 17, pp.1199-1216, 2017. ,
LiLAC: Lightweight Low-Latency Anonymous Chat, pp.141-151, 2017. ,
An Introduction to Hidden Markov Models, IEEE ASSP Magazine, vol.3, pp.4-16, 1986. ,
Introducing MorphMix: Peer-to-peer Based Anonymous Internet Usage with Collusion Detection, Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society (WPES '02), 2002. ,
Water lling: Balancing the Tor Network with Maximum Diversity, Proceedings on Privacy Enhancing Technologies 2017, vol.2, pp.4-22, 2017. ,
Dropping on the Edge: Flexibility and Tra c Con rmation in Onion Routing Protocols, Proceedings on Privacy Enhancing, pp.27-46, 2018. ,
Arti cial Intelligence, A Modern Approach, vol.835, 2003. ,
Passive Attack Analysis for Connection-Based Anonymity Systems, Computer Security -ESORICS 2003, pp.116-131, 2003. ,
Cryptography: theory and practice, 2005. ,
Counter-RAPTOR: Safeguarding Tor Against Active Routing Attacks, 2017 IEEE Symposium on Security and Privacy (SP). 977-992, 2017. ,
Vuvuzela: Scalable Private Messaging Resistant to Tra c Analysis, Proceedings of the 25th Symposium on Operating Systems Principles -SOSP '15, pp.137-152, 2015. ,
CY-CLON: Inexpensive Membership Management for Unstructured P2P Overlays, vol.13, pp.197-217 ,
Guard Placement Attacks on Path Selection Algorithms for Tor, Proceedings on Privacy Enhancing Technologies, vol.4, pp.272-291, 2019. ,
An Improved Selective-Repeat ARQ Strategy, IEEE Transactions on Communications, vol.30, issue.3, pp.480-486, 1982. ,
Computer-Based Personality Judgments Are More Accurate than Those Made by Humans, Proceedings of the National Academy of Sciences, vol.112, issue.4, pp.1036-1040, 2015. ,