This commit is contained in:
zzz
2011-04-15 17:11:04 +00:00
parent b00c2eb4e2
commit e21d371702
2 changed files with 6 additions and 3 deletions

View File

@@ -706,7 +706,7 @@ This attack becomes more difficult as the network size grows.
<h3>Information Leaks</h3> <h3>Information Leaks</h3>
<p> <p>
(Reference: (Reference:
<a href="https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf">In Search of an Anonymouns and Secure Lookup</a> Section 3) <a href="https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf">In Search of an Anonymous and Secure Lookup</a> Section 3)
</p> </p>
<p> <p>
This paper addresses weaknesses in the "Finger Table" DHT lookups used by Torsk and NISAN. This paper addresses weaknesses in the "Finger Table" DHT lookups used by Torsk and NISAN.

View File

@@ -107,8 +107,11 @@ Adrian Crenshaw. Schmoocon Firetalk, January 2011
</li><li> </li><li>
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P, Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P,
Christian Grothoff et al, Michael Hermann.
PET Symposium, Waterloo Canada, July 27-29 2011 Master's Thesis, TU-Munich, March 28, 2011.
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P,
Michael Hermann, Christian Grothoff.
Presented at PET Symposium, Waterloo Canada, July 27-29 2011.
</ul></div> </ul></div>
{% endblock %} {% endblock %}