Related references
Note: Only part of the references are listed.Modified relay selection and circuit selection for faster Tor
Mohsen Imani et al.
IET COMMUNICATIONS (2019)
Analysis of Multi-path Onion Routing-Based Anonymization Networks
Wladimir De la Cadena et al.
DATA AND APPLICATIONS SECURITY AND PRIVACY XXXIII (2019)
HORNET: High-speed Onion Routing at the Network Layer
Chen Chen et al.
CCS'15: PROCEEDINGS OF THE 22ND ACM SIGSAC CONFERENCE ON COMPUTER AND COMMUNICATIONS SECURITY (2015)
LASTor: A Low-Latency AS-Aware Tor Client
Masoud Akhoondi et al.
IEEE-ACM TRANSACTIONS ON NETWORKING (2014)
Towards Efficient Traffic-analysis Resistant Anonymity Networks
Stevens Le Blond et al.
ACM SIGCOMM COMPUTER COMMUNICATION REVIEW (2013)
Onion routing circuit construction via latency graphs
Sergio Castillo-Perez et al.
COMPUTERS & SECURITY (2013)
LAP: Lightweight Anonymity and Privacy
Hsu-Chun Hsiao et al.
2012 IEEE SYMPOSIUM ON SECURITY AND PRIVACY (SP) (2012)
How Much Anonymity does Network Latency Leak?
Nicholas Hopper et al.
ACM TRANSACTIONS ON INFORMATION AND SYSTEM SECURITY (2010)