-
2
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Proc. 4th International Workshop on Information Hiding
-
A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proc. 4th International Workshop on Information Hiding, volume 2137 of LNCS, pages 245-257, 2001.
-
(2001)
LNCS
, vol.2137
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
3
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
Proc. Workshop on Design Issues in Anonymity and Unobservability
-
O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: a system for anonymous and unobservable Internet access. In Proc. Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 115-129, 2000.
-
(2000)
LNCS
, vol.2009
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
4
-
-
84957805506
-
Dummy traffic against long-term intersection attacks
-
Proc. 2nd International Workshop on Privacy-Enhancing Technologies
-
O. Berthold and H. Langos. Dummy traffic against long-term intersection attacks. In Proc. 2nd International Workshop on Privacy-Enhancing Technologies, volume 2482 of LNCS, pages 110-128, 2002.
-
(2002)
LNCS
, vol.2482
, pp. 110-128
-
-
Berthold, O.1
Langos, H.2
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2):84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
7
-
-
84904332394
-
Statistical disclosure attacks
-
Proc. Security and Privacy in the Age of Uncertainty
-
G. Danezis. Statistical disclosure attacks. In Proc. Security and Privacy in the Age of Uncertainty, volume 250 of IFIP Conference Proceedings, pages 421-426, 2003.
-
(2003)
IFIP Conference Proceedings
, vol.250
, pp. 421-426
-
-
Danezis, G.1
-
8
-
-
24344460554
-
The traffic analysis of continuous-time mixes
-
Proc. 4th International Workshop on Privacy-Enhancing Technologies
-
G. Danezis. The traffic analysis of continuous-time mixes. In Proc. 4th International Workshop on Privacy-Enhancing Technologies, volume 3424 of LNCS, pages 35-50, 2004.
-
(2004)
LNCS
, vol.3424
, pp. 35-50
-
-
Danezis, G.1
-
10
-
-
35048895319
-
Statistical disclosure or intersection attacks on anonymity systems
-
Proc. 6th International Workshop on Information Hiding
-
G. Danezis and A. Serjantov. Statistical disclosure or intersection attacks on anonymity systems. In Proc. 6th International Workshop on Information Hiding, volume 3200 of LNCS, pages 293-308, 2004.
-
(2004)
LNCS
, vol.3200
, pp. 293-308
-
-
Danezis, G.1
Serjantov, A.2
-
14
-
-
0037629738
-
On effectiveness of link padding for statistical traffic analysis attacks
-
X. Fu, B. Graham, R. Bettati, and W. Zhao. On effectiveness of link padding for statistical traffic analysis attacks. In Proc. 23rd IEEE Conference on Distributed Computing Systems, pages 340-349, 2003.
-
(2003)
Proc. 23rd IEEE Conference on Distributed Computing Systems
, pp. 340-349
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
-
15
-
-
50249091568
-
Analytical and empirical analysis of countermeasures to traffic analysis attacks
-
X. Fu, B. Graham, R. Bettati, W. Zhao, and D. Xuan. Analytical and empirical analysis of countermeasures to traffic analysis attacks. In Proc. 32nd International Conference on Parallel Processing, pages 483-492, 2003.
-
(2003)
Proc. 32nd International Conference on Parallel Processing
, pp. 483-492
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
Xuan, D.5
-
16
-
-
84941155400
-
-
January
-
Internet Traffic Archive. Two hours of wide-area TCP traffic. http://ita.ee.lbl.gov/html/contrib/LBL-TCP-3.html, January 1994.
-
(1994)
Two Hours of Wide-area TCP Traffic
-
-
-
17
-
-
33846288517
-
Timing attacks in low-latency mix systems
-
Proc. 8th International Conference on Financial Cryptography
-
B. Levine, M. Reiter, C. Wang, and M. Wright. Timing attacks in low-latency mix systems. In Proc. 8th International Conference on Financial Cryptography, volume 3110 of LNCS, pages 251-265, 2004.
-
(2004)
LNCS
, vol.3110
, pp. 251-265
-
-
Levine, B.1
Reiter, M.2
Wang, C.3
Wright, M.4
-
20
-
-
33750271074
-
-
December
-
National Laboratory for Applied Network Research. Auckland-VIII data set. http://pma.nlanr.net/Special/auck8.html, December 2003.
-
(2003)
Auckland-VIII Data Set
-
-
-
21
-
-
84941157635
-
-
National Laboratory for Applied Network Research. PMA special traces archive. http://pma.nlanr.net/Special/, 2005.
-
(2005)
PMA Special Traces Archive
-
-
-
24
-
-
24344470900
-
Analysis of an anonymity network for Web browsing
-
M. Rennhard, S. Rafaeli, L. Mathy, B. Plattner, and D. Hutchison. Analysis of an anonymity network for Web browsing. In Proc. IEEE WETICE, pages 49-54, 2002.
-
(2002)
Proc. IEEE WETICE
, pp. 49-54
-
-
Rennhard, M.1
Rafaeli, S.2
Mathy, L.3
Plattner, B.4
Hutchison, D.5
-
25
-
-
0142250280
-
Passive attack analysis for connection-based anonymity systems
-
Proc. 8th European Symposium on Research in Computer Security
-
A. Serjantov and P. Sewell. Passive attack analysis for connection-based anonymity systems. In Proc. 8th European Symposium on Research in Computer Security, volume 2808 of LNCS, pages 116-131, 2003.
-
(2003)
LNCS
, vol.2808
, pp. 116-131
-
-
Serjantov, A.1
Sewell, P.2
-
26
-
-
3042662497
-
Probabilistic analysis of an anonymity system
-
V. Shmatikov. Probabilistic analysis of an anonymity system. J. Computer Security, 12(3-4):355-377, 2004.
-
(2004)
J. Computer Security
, vol.12
, Issue.3-4
, pp. 355-377
-
-
Shmatikov, V.1
-
28
-
-
84937565289
-
Towards an analysis of onion routing security
-
Proc. Workshop on Design Issues in Anonymity and Unobservability
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an analysis of onion routing security. In Proc. Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 96-114, 2000.
-
(2000)
LNCS
, vol.2009
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
29
-
-
84944785768
-
A security model for dynamic adaptable traffic masking
-
B. Timmerman. A security model for dynamic adaptable traffic masking. In Proc. New Security Paradigms Workshop, pages 107-116, 1997.
-
(1997)
Proc. New Security Paradigms Workshop
, pp. 107-116
-
-
Timmerman, B.1
-
31
-
-
0028713303
-
Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network
-
B. Venkatraman and R. Newman-Wolfe. Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. In Proc. IEEE/ACM 10th Annual Computer Security Applications Conference, pages 288-297, 1994.
-
(1994)
Proc. IEEE/ACM 10th Annual Computer Security Applications Conference
, pp. 288-297
-
-
Venkatraman, B.1
Newman-Wolfe, R.2
-
33
-
-
24344450770
-
On flow correlation attacks and countermeasures in mix networks
-
Proc. 4th International Workshop on Privacy-Enhancing Technologies
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao. On flow correlation attacks and countermeasures in mix networks. In Proc. 4th International Workshop on Privacy-Enhancing Technologies, volume 3424 of LNCS, pages 207-225, 2004.
-
(2004)
LNCS
, vol.3424
, pp. 207-225
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
|