-
1
-
-
35248878897
-
On the economics of anonymity
-
R. N. Wright, editor, Financial Cryptography, of, Springer-Verlag
-
A. Acquisti, R. Dingledine, and P. F. Syverson. On the economics of anonymity. In R. N. Wright, editor, Financial Cryptography, volume 2742 of LNCS, pages 84-102. Springer-Verlag, 2003.
-
(2003)
LNCS
, vol.2742
, pp. 84-102
-
-
Acquisti, A.1
Dingledine, R.2
Syverson, P.F.3
-
3
-
-
34547240818
-
-
Anonymizer, Inc
-
Anonymizer, Inc. http://www.anonymizer.com/.
-
-
-
-
4
-
-
34547277411
-
-
A. Back, I. Goldberg, and A. Shostack. Freedom Systems 2.1 security issues and analysis. White paper, Zero Knowledge Systems, Inc., May 2001.
-
A. Back, I. Goldberg, and A. Shostack. Freedom Systems 2.1 security issues and analysis. White paper, Zero Knowledge Systems, Inc., May 2001.
-
-
-
-
5
-
-
34547268888
-
US blogger fired by her airline
-
November
-
BBC News. US blogger fired by her airline, November 2004. http ://news.bbc.co.uk/1/technology/3974081.stm.
-
(2004)
BBC News
-
-
-
6
-
-
0003400251
-
Secure computer systems: Mathematical foundations
-
Technical Report 2547, I, MITRE Corporation, March
-
D. E. Bell and L. J. LaPadula. Secure computer systems: Mathematical foundations. Technical Report 2547, Volume I, MITRE Corporation, March 1973.
-
(1973)
-
-
Bell, D.E.1
LaPadula, L.J.2
-
7
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
H. Federrath, editor, Designing Privacy Enhancing Technologies, of, Springer-Verlag, July
-
O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, Designing Privacy Enhancing Technologies, volume 2009 of LNCS, pages 115-129. Springer-Verlag, July 2000.
-
(2000)
LNCS
, vol.2009
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
8
-
-
34547239349
-
Freedom Systems 2.0 architecture
-
Inc, December
-
P. Boucher, A. Shostack, and I. Goldberg. Freedom Systems 2.0 architecture. White paper, Zero Knowledge Systems, Inc., December 2000.
-
(2000)
White paper, Zero Knowledge Systems
-
-
Boucher, P.1
Shostack, A.2
Goldberg, I.3
-
10
-
-
34547302140
-
-
1.1, November
-
W. Dai. PipeNet 1.1, November 1998. http://www.eskimo.com/~weidai/ pipenet.txt.
-
(1998)
PipeNet
-
-
Dai, W.1
-
12
-
-
77955311141
-
Tor protocol specification
-
Technical report, The Free Haven Project, October 2004
-
R. Dingledine and N. Mathewson. Tor protocol specification. Technical report, The Free Haven Project, October 2004. http://tor.eff.org/cvs/doc/tor- spec.txt.
-
-
-
Dingledine, R.1
Mathewson, N.2
-
13
-
-
77951167318
-
Tor path specification
-
Technical report, The Free Haven Project, April 2006
-
R. Dingledine and N. Mathewson. Tor path specification. Technical report, The Free Haven Project, April 2006. http://tor.eff.org/cvs/doc/path-spec.txt.
-
-
-
Dingledine, R.1
Mathewson, N.2
-
14
-
-
34547284919
-
Tor rendezvous specification
-
Technical report, The Free Haven Project, February 2006
-
R. Dingledine and N. Mathewson. Tor rendezvous specification. Technical report, The Free Haven Project, February 2006. http://tor.eff.org/cvs/doc/rend- spec.txt.
-
-
-
Dingledine, R.1
Mathewson, N.2
-
16
-
-
27944485356
-
On flow marking attacks in wireless anonymous communication networks
-
Columbus, Ohio, USA, June, IEEE CS
-
X. Fu, Y. Zhu, B. Graham, R. Bettati, and W. Zhao. On flow marking attacks in wireless anonymous communication networks. In Proceedings of the 25th IEEE International Conference on Distributed Computing Systems, pages 493-503, Columbus, Ohio, USA, June 2005. IEEE CS.
-
(2005)
Proceedings of the 25th IEEE International Conference on Distributed Computing Systems
, pp. 493-503
-
-
Fu, X.1
Zhu, Y.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
18
-
-
34547241588
-
-
Personal communication
-
H. Grundy. Personal communication.
-
-
-
Grundy, H.1
-
19
-
-
0026156690
-
Reducing timing channels with fuzzy time
-
Oakland, California, May, IEEE CS
-
W.-M. Hu. Reducing timing channels with fuzzy time. In 1991 IEEE Symposium on Security and Privacy, pages 8-20, Oakland, California, May 1991. IEEE CS.
-
(1991)
1991 IEEE Symposium on Security and Privacy
, pp. 8-20
-
-
Hu, W.-M.1
-
20
-
-
0026851634
-
Lattice scheduling and covert channels
-
Oakland, California, May, IEEE CS
-
W.-M. Hu. Lattice scheduling and covert channels. In 1992 IEEE Symposium on Security and Privacy, pages 52-61, Oakland, California, May 1992. IEEE CS.
-
(1992)
1992 IEEE Symposium on Security and Privacy
, pp. 52-61
-
-
Hu, W.-M.1
-
21
-
-
0003421246
-
TCP extensions for high performance. RFC 1323
-
May
-
V. Jacobson, R-. Braden, and D. Borman. TCP extensions for high performance. RFC 1323, IETF, May 1992.
-
(1992)
IETF
-
-
Jacobson, V.1
Braden, R.2
Borman, D.3
-
22
-
-
34547261797
-
-
V. Jacobson, C. Leres, and S. McCanne. libpcap, March 2004. http://www.tcpdump.org/.
-
V. Jacobson, C. Leres, and S. McCanne. libpcap, March 2004. http://www.tcpdump.org/.
-
-
-
-
23
-
-
0026158295
-
Storage channels in disk arm optimization
-
Oakland, California, May, IEEE CS
-
P. A. Karger and J. C. Wray. Storage channels in disk arm optimization. In 1991 IEEE Symposium on Security and Privacy, pages 52-63, Oakland, California, May 1991. IEEE CS.
-
(1991)
1991 IEEE Symposium on Security and Privacy
, pp. 52-63
-
-
Karger, P.A.1
Wray, J.C.2
-
24
-
-
27544460278
-
Remote physical device fingerprinting
-
Oakland, California, May, IEEE CS
-
T. Kohno, A. Broido, and k. claffy. Remote physical device fingerprinting. In 2005 IEEE Symposium on Security and Privacy, pages 211-225, Oakland, California, May 2005. IEEE CS.
-
(2005)
2005 IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Kohno, T.1
Broido, A.2
claffy, K.3
-
25
-
-
34547271122
-
-
Personal communication
-
M. G. Kuhn. Personal communication.
-
-
-
Kuhn, M.G.1
-
26
-
-
0015672289
-
A note on the confinement problem
-
B. W. Lampson. A note on the confinement problem. Communications of the ACM, 16(10):613-615, 1973.
-
(1973)
Communications of the ACM
, vol.16
, Issue.10
, pp. 613-615
-
-
Lampson, B.W.1
-
28
-
-
0006465765
-
Network time protocol (version 3) specification, implementation and analysis. RFC 1305
-
March
-
D. L. Mills. Network time protocol (version 3) specification, implementation and analysis. RFC 1305, IETF, March 1992.
-
(1992)
IETF
-
-
Mills, D.L.1
-
29
-
-
33244479152
-
Estimation and removal of clock skew from network delay measurements
-
Technical Report 98-43, Department of Computer Science University of Massachusetts at Amherst, October
-
S. B. Moon, P. Skelly, and D. Towsley. Estimation and removal of clock skew from network delay measurements. Technical Report 98-43, Department of Computer Science University of Massachusetts at Amherst, October 1998.
-
(1998)
-
-
Moon, S.B.1
Skelly, P.2
Towsley, D.3
-
30
-
-
1642355346
-
Covert channels and anonymizing networks
-
P. Samarati and P. F. Syverson, editors, Washington, DC, USA, October, ACM Press
-
I. S. Moskowitz, R. E. Newman, D. P. Crepeau, and A. R. Miller. Covert channels and anonymizing networks. In P. Samarati and P. F. Syverson, editors, Workshop on Privacy in the Electronic Society, pages 79-88, Washington, DC, USA, October 2003. ACM Press.
-
(2003)
Workshop on Privacy in the Electronic Society
, pp. 79-88
-
-
Moskowitz, I.S.1
Newman, R.E.2
Crepeau, D.P.3
Miller, A.R.4
-
31
-
-
2642560372
-
Quasi-anonymous channels
-
M. Hamza, editor, New York, USA, December, ACTAPress
-
I. S. Moskowitz, R. E. Newman, and P. F. Syverson. Quasi-anonymous channels. In M. Hamza, editor, IASTED Communication, Network, and Information Security, pages 126-131, New York, USA, December 2003. ACTAPress.
-
(2003)
IASTED Communication, Network, and Information Security
, pp. 126-131
-
-
Moskowitz, I.S.1
Newman, R.E.2
Syverson, P.F.3
-
32
-
-
34547324304
-
Internet geolocation and evasion
-
Technical Report TR-06-05, Carleton University, School of Computer Science, April
-
J. A. Muir and P. C. van Oorschot. Internet geolocation and evasion. Technical Report TR-06-05, Carleton University - School of Computer Science, April 2006.
-
(2006)
-
-
Muir, J.A.1
van Oorschot, P.C.2
-
34
-
-
33746584368
-
Embedding covert channels into TCP/IP
-
M. Barni, J. Herrera-Joancomarti, S. Katzenbeisser, and F. Pérez- González, editors, Information Hiding: 7th International Workshop, of, Barcelona, Catalonia Spain, June, Springer-Verlag
-
S.J. Murdoch and S. Lewis. Embedding covert channels into TCP/IP. In M. Barni, J. Herrera-Joancomarti, S. Katzenbeisser, and F. Pérez- González, editors, Information Hiding: 7th International Workshop, volume 3727 of LNCS, pages 247-261, Barcelona, Catalonia (Spain), June 2005. Springer-Verlag.
-
(2005)
LNCS
, vol.3727
, pp. 247-261
-
-
Murdoch, S.J.1
Lewis, S.2
-
35
-
-
0027711242
-
Denial of service
-
New York, NY, USA, ACM Press
-
R. M. Needham. Denial of service. In CCS '93: Proceedings of the 1st ACM conference on Computer and communications security, pages 151-153, New York, NY, USA, 1993. ACM Press.
-
(1993)
CCS '93: Proceedings of the 1st ACM conference on Computer and communications security
, pp. 151-153
-
-
Needham, R.M.1
-
36
-
-
0028532812
-
Denial of service: An example
-
R. M. Needham. Denial of service: an example. Commun. ACM, 37(11):42-46, 1994.
-
(1994)
Commun. ACM
, vol.37
, Issue.11
, pp. 42-46
-
-
Needham, R.M.1
-
37
-
-
24344438956
-
Anonymity and covert channels in simple timed mix-firewalls
-
Proceedings of Privacy Enhancing Technologies workshop PET 2004, of, Springer-Verlag, May
-
R. E. Newman, V. R. Nalla, and I. S. Moskowitz. Anonymity and covert channels in simple timed mix-firewalls. In Proceedings of Privacy Enhancing Technologies workshop (PET 2004), volume 3424 of LNCS. Springer-Verlag, May 2004.
-
(2004)
LNCS
, vol.3424
-
-
Newman, R.E.1
Nalla, V.R.2
Moskowitz, I.S.3
-
39
-
-
34547335804
-
-
A. Pfitzmann, B. Pfitzmann, and M. Waidner. ISDN-mixes: Untraceable communication with very small bandwidth overhead. In W. Effelsberg, H. W. Meuer, and G. Müller, editors, GI/ITG Conference on Communication in Distributed Systems, 267 of Informatik-Fachberichte, pages 451-463. Springer-Verlag, February 1991.
-
A. Pfitzmann, B. Pfitzmann, and M. Waidner. ISDN-mixes: Untraceable communication with very small bandwidth overhead. In W. Effelsberg, H. W. Meuer, and G. Müller, editors, GI/ITG Conference on Communication in Distributed Systems, volume 267 of Informatik-Fachberichte, pages 451-463. Springer-Verlag, February 1991.
-
-
-
-
40
-
-
0003232377
-
Internet control message protocol. RFC 792
-
September
-
J. Postel. Internet control message protocol. RFC 792, IETF, September 1981.
-
(1981)
IETF
-
-
Postel, J.1
-
41
-
-
33745509512
-
-
June
-
R. Redelmeier. CPUBurn, June 2001. http://pages.sbcglobal.net/redelm/.
-
(2001)
CPUBurn
-
-
Redelmeier, R.1
-
42
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag. Anonymous connections and onion routing. IEEE Journal on Selected Areas in Communications, 16(4):482-494, May 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
44
-
-
34547321983
-
MILS middleware for secure distributed systems
-
June
-
G. Uchenick. MILS middleware for secure distributed systems. RTC magazine, 15, June 2006 2006. http://www.rtcmagazine.com/home/article.php? id=100685.
-
(2006)
RTC magazine
, vol.15
-
-
Uchenick, G.1
|