-
3
-
-
84946415466
-
-
S. inc., "Safeweb," http://www.safewebinc.com/, 2002.
-
(2002)
Safeweb
-
-
-
4
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (H. Federrath, ed.), Springer-Verlag
-
J. Raymond, "Traffic analysis: Protocols, attacks, design issues and open problems," in Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (H. Federrath, ed.), vol. 2009 of LNCS, pp. 10-29, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.1
-
8
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb.
-
D. L. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, Feb. 1981.
-
(1981)
Communications of the ACM
, vol.24
-
-
Chaum, D.L.1
-
9
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Sys. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Sys. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
10
-
-
0012582373
-
-
Memo RM-3765-PR, Rand Corp., Aug.
-
P. Baran, "On distributed communications: Ix security, secrecy, and tamper-free considerations," Memo RM-3765-PR, Rand Corp., Aug. 1964.
-
(1964)
On Distributed Communications: Ix Security, Secrecy, and Tamper-free Considerations
-
-
Baran, P.1
-
11
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
V. Voydoc and S. Kent, "Security mechanisms in high-level network protocols," ACM Computing Surveys, pp. 135-171, 1983.
-
(1983)
ACM Computing Surveys
, pp. 135-171
-
-
Voydoc, V.1
Kent, S.2
-
12
-
-
0030676973
-
Anonymous connections and onion routing
-
4-7
-
P. F. Syverson, D. M. Goldschlag, and M. G. Reed, "Anonymous connections and onion routing," in IEEE Symposium on Security and Privacy, (Oakland, California), pp. 44-54, 4-7 1997.
-
(1997)
IEEE Symposium on Security and Privacy, (Oakland, California)
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
15
-
-
0028713303
-
Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network
-
B. R. Venkatraman and R. E. Newman-Wolfe, "Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network," Computer Security Applications Conference, 10th Annual, pp. 288-297, 1994.
-
(1994)
Computer Security Applications Conference, 10th Annual
, pp. 288-297
-
-
Venkatraman, B.R.1
Newman-Wolfe, R.E.2
-
17
-
-
0035402083
-
Netcamo: Camouflaging network traffic for qos-guaranteed critical allplications
-
4, July
-
Y. Guan, X. Fu, D. Xuan, P. U. Shenoy, R. Bettati, and W. Zhao, "Netcamo: Camouflaging network traffic for qos-guaranteed critical allplications," in IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, Special Issue on Information Assurance, vol. 31 of 4, pp. 253-265, July 2001.
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, Special Issue on Information Assurance
, vol.31
, pp. 253-265
-
-
Guan, Y.1
Fu, X.2
Xuan, D.3
Shenoy, P.U.4
Bettati, R.5
Zhao, W.6
-
19
-
-
0033640646
-
Statistical pattern recognition: A review
-
A. K. Jain, R. P. W. Duin, and J. Mao, "Statistical pattern recognition: A review," IEEE Transactions on Pattern Analysis and Machine Intelligence, vol. 22, no. 1, pp. 4-37, 2000.
-
(2000)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.22
, Issue.1
, pp. 4-37
-
-
Jain, A.K.1
Duin, R.P.W.2
Mao, J.3
-
21
-
-
23544449898
-
-
Technical Report Dept. of Computer Science, Texas A&M University, February
-
X. Fu, B. Graham, R. Bettati, and W. Zhao, "An information assurance testing framework for systems under traffic analysis attacks and its application on systems using traffic padding," Technical Report TR2003-2-1, Dept. of Computer Science, Texas A&M University, February 2003.
-
(2003)
An Information Assurance Testing Framework for Systems under Traffic Analysis Attacks and Its Application on Systems Using Traffic Padding
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
-
22
-
-
24344490149
-
-
TimeSys, "Timesys linux docs," http://www.timesys.com/index.cfm?hdr=home-header.cfm&bdy=home-bdy-library.cfm, 2003.
-
(2003)
Timesys Linux Docs
-
-
-
24
-
-
0024621174
-
On estimation of entropy and mutual information of continuous distributions
-
R. Moddemeijer, "On estimation of entropy and mutual information of continuous distributions," Signal Processing, vol. 16, no. 3, pp. 233-246, 1989.
-
(1989)
Signal Processing
, vol.16
, Issue.3
, pp. 233-246
-
-
Moddemeijer, R.1
|