A case study on measuring statistical data in the Tor anonymity network K Loesing, SJ Murdoch, R Dingledine Financial Cryptography and Data Security: FC 2010 Workshops, RLCPS, WECSR …, 2010 | 143 | 2010 |
Identifying and characterizing Sybils in the Tor network P Winter, R Ensafi, K Loesing, N Feamster 25th USENIX Security Symposium (USENIX Security 16), 1169-1185, 2016 | 73 | 2016 |
Performance measurements and statistics of Tor hidden services K Loesing, W Sandmann, C Wilms, G Wirtz 2008 International Symposium on Applications and the Internet, 1-7, 2008 | 53 | 2008 |
Performance measurements of Tor hidden services in low-bandwidth access networks J Lenhard, K Loesing, G Wirtz Applied Cryptography and Network Security: 7th International Conference …, 2009 | 39 | 2009 |
Measuring the Tor network from public directory information K Loesing Proc. HotPETS, Seattle, WA, 2009 | 38 | 2009 |
Privacy-aware presence management in instant messaging systems K Loesing, M Dorsch, M Grote, K Hildebrandt, M Roglinger, M Sehr, ... Proceedings 20th IEEE International Parallel & Distributed Processing …, 2006 | 38 | 2006 |
Measuring the Tor network: Evaluation of client requests to the directories K Loesing Technical report, Tor Project, 2009 | 34 | 2009 |
Extrapolating network totals from hidden-service statistics G Kadianakis, K Loesing Tor Technical Report, 2015 | 23 | 2015 |
Privacy-preserving ways to estimate the number of tor users S Hahn, K Loesing The Tor Project, Technical report, 2010 | 22 | 2010 |
Hidden-service statistics reported by relays D Goulet, A Johnson, G Kadianakis, K Loesing | 18 | 2015 |
Open chord version 1.0. 4 user's manual S Kaffille, K Loesing Otto-Friedrich-Univ. Bamberg, Fak. Wirtschaftsinformatik und Angewandte …, 2007 | 16 | 2007 |
Evaluation of a libutp-based Tor Datagram Implementation K Loesing, SJ Murdoch, R Jansen | 14 | 2013 |
Privacy-enhancing technologies for private services K Loesing University of Bamberg Press, 2009 | 13 | 2009 |
Distributed Service Discovery with Guarantees in Peer-to-Peer Networks using Distributed Hashtables. S Kaffille, K Loesing, G Wirtz PDPTA, 578-584, 2005 | 12 | 2005 |
Bandwidth scanner specification K Loesing, M Perry, A Gibson README. spec. txt, 2011 | 11 | 2011 |
Tor rendezvous specification R Dingledine, N Mathewson, A Lewman, K Loesing, S Hahn, R Ransom, ... Technical report, The Free Haven Project, 2006 | 11 | 2006 |
Implementation of an instant messaging system with focus on protection of user presence K Loesing, M Roglinger, C Wilms, G Wirtz 2007 2nd International Conference on Communication Systems Software and …, 2007 | 10 | 2007 |
An implementation of reliable group communication based on the peer-to-peer network JXTA K Loesing, G Wirtz The 3rd ACS/IEEE International Conference onComputer Systems and …, 2005 | 7 | 2005 |
Open Chord (1.0. 4) User's Manual S Kaffille, K Loesing The University of Bamberg, Germany, 2007 | 5 | 2007 |
Privacy-preserving Ways to Estimate the Number of Tor Users, November 2010 S Hahn, K Loesing | 5 | |