updates
This commit is contained in:
@@ -706,7 +706,7 @@ This attack becomes more difficult as the network size grows.
|
||||
<h3>Information Leaks</h3>
|
||||
<p>
|
||||
(Reference:
|
||||
<a href="https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf">In Search of an Anonymouns and Secure Lookup</a> Section 3)
|
||||
<a href="https://netfiles.uiuc.edu/mittal2/www/nisan-torsk-ccs10.pdf">In Search of an Anonymous and Secure Lookup</a> Section 3)
|
||||
</p>
|
||||
<p>
|
||||
This paper addresses weaknesses in the "Finger Table" DHT lookups used by Torsk and NISAN.
|
||||
|
@@ -107,8 +107,11 @@ Adrian Crenshaw. Schmoocon Firetalk, January 2011
|
||||
|
||||
</li><li>
|
||||
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P,
|
||||
Christian Grothoff et al,
|
||||
PET Symposium, Waterloo Canada, July 27-29 2011
|
||||
Michael Hermann.
|
||||
Master's Thesis, TU-Munich, March 28, 2011.
|
||||
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P,
|
||||
Michael Hermann, Christian Grothoff.
|
||||
Presented at PET Symposium, Waterloo Canada, July 27-29 2011.
|
||||
|
||||
</ul></div>
|
||||
{% endblock %}
|
||||
|
Reference in New Issue
Block a user