Proceedings of the 31st Annual ACM Symposium on Applied Computing 2016
DOI: 10.1145/2851613.2851798
|View full text |Cite
|
Sign up to set email alerts
|

Out-of-band discovery and evaluation for tor hidden services

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
2
1

Citation Types

0
8
0

Year Published

2018
2018
2023
2023

Publication Types

Select...
5
1
1

Relationship

0
7

Authors

Journals

citations
Cited by 14 publications
(8 citation statements)
references
References 11 publications
0
8
0
Order By: Relevance
“…Research papers N. of papers Content classification [23], [24], [25], [26], [9], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38] 17…”
Section: Research Fieldmentioning
confidence: 99%
See 3 more Smart Citations
“…Research papers N. of papers Content classification [23], [24], [25], [26], [9], [27], [28], [29], [30], [31], [32], [33], [34], [35], [36], [37], [38] 17…”
Section: Research Fieldmentioning
confidence: 99%
“…Performance and deficiencies [65], [66], [67], [68], [69] 5 Changes in the design [69], [70], [71], [61], [72], [73] 6 Discovery and measurement [74], [75], [32], [33], [34], [37], [38], [68], [23], [30], [31], [19] 12…”
Section: Research Fieldmentioning
confidence: 99%
See 2 more Smart Citations
“…However, if you store sensitive data, it is best to encrypt the data because it is transparent to the user. Because any user who has access to the browser can see the web storage data, this may bring security risks [9].…”
Section: -2 Local Storagementioning
confidence: 99%