Browsing by Subject "Adversary modeling"
Now showing items 1-1 of 1
-
Traffic Analysis Attacks on Tor: A Survey
( Institute of Electrical and Electronics Engineers Inc. , 2020 , Conference Paper)The Tor anonymity network is one of the most popular and widely used tools to protect the privacy of online users. Tor provides defenses against multiple adversarial activities aiming to identify or trace the users. Traffic ...