Shmatikov, Vitaly; Wang, Ming-Hsiu (18 กันยายน 2006). "Timing analysis in low-latency mix networks: attacks and defenses". Proceedings of the 11th European conference on Research in Computer Security. ESORICS'06: 18–33. doi:10.1007/11863908_2. S2CID3113181.
espacenet.com
worldwide.espacenet.com
US patent 6266704, Reed, Michael G. (Bethesda, MD) ; Syverson, Paul F. (Silver Spring, MD) ; Goldschlag, David M. (Silver Spring, MD), "Onion routing network for securely moving data through communication networks", assigned to The United States of America as represented by the Secretary of the Navy (Washington, DC)
Zantour, Bassam; Haraty, Ramzi A (มกราคม 2011). I2P Data Communication System. Proceedings of ICN 2011, The Tenth International Conference on Networks. IARIA. pp. 401–409. hdl:10725/7119.
Dingledine, Mathewson & Syverson (2004), 4.1 cells: Relay Cells "When an OR later replies to Alice with a relay cell, it encrypts the cell’s relay header and payload with the single key it shares with Alice, and sends the cell back toward Alice along the circuit. Subsequent ORs add further layers of encryption as they relay the cell back to Alice." Dingledine, Roger; Mathewson, Nick; Syverson, Paul (13 สิงหาคม 2004). "Tor: The Second-Generation Onion Router". Proc. 13th USENIX Security Symposium. San Diego, California. สืบค้นเมื่อ 17 พฤศจิกายน 2008. tor-design.pdfPDF (292 KB)
Zantour, Bassam; Haraty, Ramzi A (มกราคม 2011). I2P Data Communication System. Proceedings of ICN 2011, The Tenth International Conference on Networks. IARIA. pp. 401–409. hdl:10725/7119.
semanticscholar.org
api.semanticscholar.org
Shmatikov, Vitaly; Wang, Ming-Hsiu (18 กันยายน 2006). "Timing analysis in low-latency mix networks: attacks and defenses". Proceedings of the 11th European conference on Research in Computer Security. ESORICS'06: 18–33. doi:10.1007/11863908_2. S2CID3113181.
Dingledine, Mathewson & Syverson (2004), 4.1 cells: Relay Cells "When an OR later replies to Alice with a relay cell, it encrypts the cell’s relay header and payload with the single key it shares with Alice, and sends the cell back toward Alice along the circuit. Subsequent ORs add further layers of encryption as they relay the cell back to Alice." Dingledine, Roger; Mathewson, Nick; Syverson, Paul (13 สิงหาคม 2004). "Tor: The Second-Generation Onion Router". Proc. 13th USENIX Security Symposium. San Diego, California. สืบค้นเมื่อ 17 พฤศจิกายน 2008. tor-design.pdfPDF (292 KB)