Effective Attacks in the Tor Authentication Protocol | IEEE Conference Publication | IEEE Xplore