TOR vs I2P: A comparative study
Ali, Afzaal, Khan, Maria, Saddique, Muhammad, Pirzada, Umar, Zohaib, Muhammad, Ahmad, Imran, Debnath, Narayan
Published in 2016 IEEE International Conference on Industrial Technology (ICIT) (01.03.2016)
Published in 2016 IEEE International Conference on Industrial Technology (ICIT) (01.03.2016)
Get full text
Conference Proceeding
The effect of malicious nodes on Tor security
Khan, Maria, Saddique, Muhammad, Pirzada, Umar, Zohaib, Muhammad, Ali, Afzaal, Wadud, Bilal, Ahmad, Imran
Published in 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR) (01.10.2015)
Published in 2015 International Conference on Applied Research in Computer Science and Engineering (ICAR) (01.10.2015)
Get full text
Conference Proceeding