This commit is contained in:
zzz
2011-04-15 17:11:04 +00:00
parent b00c2eb4e2
commit e21d371702
2 changed files with 6 additions and 3 deletions

View File

@@ -706,7 +706,7 @@ This attack becomes more difficult as the network size grows.
<h3>Information Leaks</h3>
<p>
(Reference:
<a href="https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf">In Search of an Anonymouns and Secure Lookup</a> Section 3)
<a href="https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf">In Search of an Anonymous and Secure Lookup</a> Section 3)
</p>
<p>
This paper addresses weaknesses in the "Finger Table" DHT lookups used by Torsk and NISAN.

View File

@@ -107,8 +107,11 @@ Adrian Crenshaw. Schmoocon Firetalk, January 2011
</li><li>
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P,
Christian Grothoff et al,
PET Symposium, Waterloo Canada, July 27-29 2011
Michael Hermann.
Master's Thesis, TU-Munich, March 28, 2011.
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P,
Michael Hermann, Christian Grothoff.
Presented at PET Symposium, Waterloo Canada, July 27-29 2011.
</ul></div>
{% endblock %}