-
1
-
-
84858095531
-
Proceedings of the Privacy Enhancing Technologies workshop (PET 2005)
-
May
-
George Dean Bissias, Marc Liberatore, and Brian Neil Levine. Privacy vulnerabilities in encrypted HTTP streams. In Proceedings of the Privacy Enhancing Technologies workshop (PET 2005), May 2005.
-
(2005)
-
-
Dean Bissias, G.1
Liberatore, M.2
Neil Levine, B.3
-
3
-
-
3042852281
-
Network traffic as a source of evidence: Tool strengths, weaknesses, and future needs
-
Eoghan Casey. Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Journal of Digital Investigation, 1(1):28-43, 2004.
-
(2004)
Journal of Digital Investigation
, vol.1
, Issue.1
, pp. 28-43
-
-
Casey, E.1
-
8
-
-
50249091568
-
Analytical and empirical analysis of countermeasures to traffic analysis attacks
-
Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao. Analytical and empirical analysis of countermeasures to traffic analysis attacks. In Proceedings of the 2003 International Conference on Parallel Processing, pages 483-492, 2003.
-
(2003)
Proceedings of the 2003 International Conference on Parallel Processing
, pp. 483-492
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
-
9
-
-
84957796461
-
Fingerprinting websites using traffic analysis
-
Proceedings of the Privacy Enhancing Technologies workshop PET 2002, Springer-Verlag, April
-
Andrew Hintz. Fingerprinting websites using traffic analysis. In Proceedings of the Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
LNCS
, vol.2482
-
-
Hintz, A.1
-
10
-
-
33846288517
-
Timing attacks in low-latency mix-based systems
-
Proceedings of Financial Cryptography FC '04, Springer-Verlag, February
-
Brian N. Levine, Michael K. Reiter, Chenxi Wang, and Matthew K. Wright. Timing attacks in low-latency mix-based systems. In Proceedings of Financial Cryptography (FC '04). Springer-Verlag, LNCS 3110, February 2004.
-
(2004)
LNCS
, vol.3110
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
11
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
-
Jean-François Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, pp. 10-29
-
-
Raymond, J.1
-
12
-
-
84864253438
-
Statistical identification of encrypted web browsing traffic
-
Berkeley, California, May
-
Qixiang Sun, Daniel R. Simon, Yi-Min Wang, Wilf Russell, Venkata N. Padmanabhan, and Lili Qiu. Statistical identification of encrypted web browsing traffic. In Proceedings of the 2002 IEEE Symposium on Security and Privacy, Berkeley, California, May 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
13
-
-
84937565289
-
Towards an analysis of onion routing security
-
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
-
Paul Syverson, Gene Tsudik, Michael Reed, and Carl Landwehr. Towards an analysis of onion routing security. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 96-114. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
|