Stopping Silent Sneaks: Defending against Malicious Mixes with
Topological EngineeringAsia-Pacific Computer Systems Architecture Conference (ACSA), 2022 |
Defending Tor from Network Adversaries: A Case Study of Network Path
PredictionProceedings on Privacy Enhancing Technologies (PoPETs), 2014 |