-
2
-
-
84864253438
-
Statistical identification of encrypted web browsing traffic
-
Q. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu: Statistical identification of encrypted web browsing traffic. In Proceedings of IEEE Symposium on Security and Privacy, 2002
-
(2002)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
3
-
-
26444454362
-
Empirical and theoretical evaluation of active probing attacks and their countermeasures
-
X. Fu, B. Graham, D. Xuan, R. Bettati, and W. Zhao: Empirical and theoretical evaluation of active probing attacks and their countermeasures. In Proceedings of 6th Information Hiding Workshop (IH), 2004
-
(2004)
Proceedings of 6th Information Hiding Workshop (IH)
-
-
Fu, X.1
Graham, B.2
Xuan, D.3
Bettati, R.4
Zhao, W.5
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 1981, 24(2), 84-90
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
8
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, CA, IEEE CS Press, May
-
P. Syverson, D. Goldschlag, and M. Reed: Anonymous Connections and Onion Routing. Proceedings of the IEEE Symposium on security and privacy, Oakland, CA, IEEE CS Press, pp.44-54, May 1997
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.1
Goldschlag, D.2
Reed, M.3
-
17
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Ira S. Moskowitz, editor, Proceedings of Information Hiding Workshop(IH 2001), Springer-Verlag, April
-
Adam Back, Ulf Moller, and Anton Stiglic: Traffic analysis attacks and trade-offs in anonymity providing systems. In Ira S. Moskowitz, editor, Proceedings of Information Hiding Workshop(IH 2001), pages 245-257. Springer-Verlag, LNCS 2137, April 2001
-
(2001)
LNCS
, vol.2137
, pp. 245-257
-
-
Back, A.1
Moller, U.2
Stiglic, A.3
-
18
-
-
0037974470
-
Dummy traffic against long term intersection attacks
-
Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies workshop(PET 2002). Springer-Verlag, April
-
Oliver Bethold and Heinrich Langos: Dummy traffic against long term intersection attacks. In Roger Dingledine and Paul Syverson, editors, Proceedings of Privacy Enhancing Technologies workshop(PET 2002). Springer-Verlag, LNCS 2482, April 2002
-
(2002)
LNCS
, vol.2482
-
-
Bethold, O.1
Langos, H.2
-
19
-
-
84937549115
-
The disadvantages of free MIX routes and how to overcome them
-
H.Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability Springer- Verlag, July
-
Oliver Berthold, Andreas Pfitzmann, and Ronny Standtke: The disadvantages of free MIX routes and how to overcome them. In H.Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 30-45. Springer- Verlag, LNCS 2009, July 2000
-
(2000)
LNCS
, vol.2009
, pp. 30-45
-
-
Berthold, O.1
Pfitzmann, A.2
Standtke, R.3
-
20
-
-
69549094995
-
Attack for flash MIX
-
Proceedings of ASIACRYPT 2000Springer-Verlag
-
M.Mitomo and K.Kurosawa: Attack for Flash MIX. In Proceedings of ASIACRYPT 2000. Springer-Verlag, LNcs 1976, 2000
-
(2000)
LNcs
, vol.1976
-
-
Mitomo, M.1
Kurosawa, K.2
-
21
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
H.Federrath, editor, Designing Privacy Enhancing Technologies: Proceedings of Internationsl Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag
-
J. Raymond: Traffic analysis: Protocols, attacks, design issues and open problems. In H.Federrath, editor, Designing Privacy Enhancing Technologies: Proceedings of Internationsl Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 10-29. Springer-Verlag, 2001
-
(2001)
LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.1
|