메뉴 건너뛰기




Volumn , Issue , 2006, Pages 255-263

Inferring the source of encrypted HTTP connections

Author keywords

Low latency anonymity; Network forensics; Traffic analysis

Indexed keywords

ENCRYPTED STREAM; ENCRYPTED TRAFFIC; LOW-LATENCY ANONYMITY; NETWORK FORENSICS;

EID: 34547350876     PISSN: 15437221     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1145/1180405.1180437     Document Type: Conference Paper
Times cited : (347)

References (16)
  • 1
    • 84858095531 scopus 로고    scopus 로고
    • Proceedings of the Privacy Enhancing Technologies workshop (PET 2005)
    • May
    • George Dean Bissias, Marc Liberatore, and Brian Neil Levine. Privacy vulnerabilities in encrypted HTTP streams. In Proceedings of the Privacy Enhancing Technologies workshop (PET 2005), May 2005.
    • (2005)
    • Dean Bissias, G.1    Liberatore, M.2    Neil Levine, B.3
  • 3
    • 3042852281 scopus 로고    scopus 로고
    • Network traffic as a source of evidence: Tool strengths, weaknesses, and future needs
    • Eoghan Casey. Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Journal of Digital Investigation, 1(1):28-43, 2004.
    • (2004) Journal of Digital Investigation , vol.1 , Issue.1 , pp. 28-43
    • Casey, E.1
  • 7
    • 4243186426 scopus 로고    scopus 로고
    • Secure Socket Layer
    • November
    • Alan O. Freier, Philip Karlton, and Paul C. Kocher. Secure Socket Layer. IETF Draft, November 1996. http://home.netscape.com/eng/ss13.
    • (1996) IETF Draft
    • Freier, A.O.1    Karlton, P.2    Kocher, P.C.3
  • 9
    • 84957796461 scopus 로고    scopus 로고
    • Fingerprinting websites using traffic analysis
    • Proceedings of the Privacy Enhancing Technologies workshop PET 2002, Springer-Verlag, April
    • Andrew Hintz. Fingerprinting websites using traffic analysis. In Proceedings of the Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
    • (2002) LNCS , vol.2482
    • Hintz, A.1
  • 10
    • 33846288517 scopus 로고    scopus 로고
    • Timing attacks in low-latency mix-based systems
    • Proceedings of Financial Cryptography FC '04, Springer-Verlag, February
    • Brian N. Levine, Michael K. Reiter, Chenxi Wang, and Matthew K. Wright. Timing attacks in low-latency mix-based systems. In Proceedings of Financial Cryptography (FC '04). Springer-Verlag, LNCS 3110, February 2004.
    • (2004) LNCS , vol.3110
    • Levine, B.N.1    Reiter, M.K.2    Wang, C.3    Wright, M.K.4
  • 11
    • 84937555407 scopus 로고    scopus 로고
    • Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    • H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
    • Jean-François Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS , pp. 10-29
    • Raymond, J.1
  • 13
    • 84937565289 scopus 로고    scopus 로고
    • Towards an analysis of onion routing security
    • Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
    • Paul Syverson, Gene Tsudik, Michael Reed, and Carl Landwehr. Towards an analysis of onion routing security. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 96-114. Springer-Verlag, LNCS 2009, July 2000.
    • (2000) LNCS , pp. 96-114
    • Syverson, P.1    Tsudik, G.2    Reed, M.3    Landwehr, C.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.