Browserbased Attacks on Tor, Proc. of PETS'07, 2007. ,
DOI : 10.1007/978-3-540-75551-7_12
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.86.5858
Spying the World from your Laptop -Identifying and Profiling Content Providers and Big Downloaders in BitTorrent, Proc. of LEET, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00470324
Deanonymizing BitTorrent Users on Tor Poster session [4] R. Dingledine. Bittorrent Over Tor isn't a Good Idea, Proc. of NSDI'10, 2010. ,
Tor: the Second-generation Onion Router, Proc. of USENIX, 2004. ,
Practical Onion Hacking: Find the Real Address of Tor Clients, 2006. ,
A Case Study on Measuring Statistical Data in the Tor Anonymity Network, Proc. of Financial Cryptography and Data Security '10, 2010. ,
DOI : 10.1007/978-3-642-14992-4_19
Compromising Tor Anonymity Exploiting P2P Information Leakage, 2010. ,
URL : https://hal.archives-ouvertes.fr/inria-00471556
Shining Light in Dark Places: Understanding the Tor Network, Proc. of PETS'08, 2008. ,
DOI : 10.1007/978-3-540-70630-4_5
Securing the Tor Network, Proc. of Black Hat, 2007. ,
Challenges and Directions for Monitoring P2P File Sharing Networks or Why My Printer Received a DMCA Takedown Notice, Proc. of HotSec, 2008. ,
Anonymous connections and onion routing, IEEE Journal on Selected Areas in Communications, vol.16, issue.4, pp.482-494, 1998. ,
DOI : 10.1109/49.668972
BitTorrent Darknets, 2010 Proceedings IEEE INFOCOM, 2010. ,
DOI : 10.1109/INFCOM.2010.5461962