메뉴 건너뛰기




Volumn , Issue , 2007, Pages 634-642

Tracing traffic through intermediate hosts that repacketize flows

Author keywords

[No Author keywords available]

Indexed keywords

PACKET NETWORKS; PERTURBATION TECHNIQUES; STATISTICAL METHODS;

EID: 34548314612     PISSN: 0743166X     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/INFCOM.2007.80     Document Type: Conference Paper
Times cited : (110)

References (27)
  • 4
    • 0005063385 scopus 로고    scopus 로고
    • D. Goldschlag, M. Reed, and P. Syverson, Onion Routing for Anonymous and Private Internet Connections, Communications of the ACM, 42, no. 3, pp. 39-4-1, Feb. 1999.
    • D. Goldschlag, M. Reed, and P. Syverson, "Onion Routing for Anonymous and Private Internet Connections," Communications of the ACM, vol. 42, no. 3, pp. 39-4-1, Feb. 1999.
  • 5
    • 33749461359 scopus 로고    scopus 로고
    • The Secure Shell (SSH) Protocol Architecture
    • IETF RFC:4251, Jan, Online, Available
    • T. Ylonen, "The Secure Shell (SSH) Protocol Architecture," IETF RFC:4251, Jan. 2006. [Online]. Available: http://www.ietf.org/rfc/rfc4251.txt
    • (2006)
    • Ylonen, T.1
  • 13
    • 0003418321 scopus 로고
    • Transmission Control Protocol
    • IETF RFC:793, Sep, Online, Available
    • J. Postel, "Transmission Control Protocol," IETF RFC:793, Sep. 1981. [Online], Available: http://www.ietf.org/rfc/rfc793.txt
    • (1981)
    • Postel, J.1
  • 19
    • 4544285485 scopus 로고    scopus 로고
    • Techniques and Applications of Digital Watermarking and Content Protection
    • Boston: Artech House
    • M. Arnold, M. Schmucker, and S. D. Wolthusen, Techniques and Applications of Digital Watermarking and Content Protection, ser. Computer Security. Boston: Artech House, 2003.
    • (2003) ser. Computer Security
    • Arnold, M.1    Schmucker, M.2    Wolthusen, S.D.3
  • 20
    • 0035333687 scopus 로고    scopus 로고
    • Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding
    • May
    • B. Chen and G. W. Wornell, "Quantization Index Modulation: A Class of Provably Good Methods for Digital Watermarking and Information Embedding," IEEE Transaction on Information Theory, vol. 47, no. 4, pp. 1423-1443, May 2001.
    • (2001) IEEE Transaction on Information Theory , vol.47 , Issue.4 , pp. 1423-1443
    • Chen, B.1    Wornell, G.W.2
  • 23
    • 0029323403 scopus 로고
    • Wide-Area Traffic: The Failure of Poisson Modeling
    • Jun
    • V. Paxson and S. Floyd, "Wide-Area Traffic: The Failure of Poisson Modeling," IEEE/ACM Transactions on Networking, vol. 3, no. 3, pp. 226-244, Jun. 1995.
    • (1995) IEEE/ACM Transactions on Networking , vol.3 , Issue.3 , pp. 226-244
    • Paxson, V.1    Floyd, S.2
  • 27
    • 84874820018 scopus 로고    scopus 로고
    • Online, Available
    • Netfilter iptables. [Online]. Available: http://www.netfilter.org
    • Netfilter iptables


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.