-
1
-
-
0003516333
-
Intrusion detection systems: A taxonomy and survey
-
Chalmers University of Technology, Sweden, March
-
S. Axelsson, "Intrusion detection systems: A taxonomy and survey," tech. rep., Chalmers University of Technology, Sweden, March 2000.
-
(2000)
tech. rep
-
-
Axelsson, S.1
-
2
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
February
-
D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, vol. 24, pp. 84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
4
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Proceedings of Privacy Enhancing Technologies Workshop PET 2002, R. Dingledine and P. Syverson, eds, Springer-Verlag, April
-
A. Serjantov and G. Danezis, "Towards an information theoretic metric for anonymity," in Proceedings of Privacy Enhancing Technologies Workshop (PET 2002) (R. Dingledine and P. Syverson, eds.), Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
LNCS
, vol.2482
-
-
Serjantov, A.1
Danezis, G.2
-
5
-
-
0036086129
-
Statistical identification of encrypted web browsing traffic
-
Berkeley, California, p, May
-
Q. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu, "Statistical identification of encrypted web browsing traffic," in Proceedings of the 2002 IEEE Symposium on Security and Privacy, (Berkeley, California), p. 19, May 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 19
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
7
-
-
84954409133
-
Mixminion: Design of a type iii anonymous remailer protocol
-
May
-
G. Danezis, R. Dingledine, and N. Mathewson, "Mixminion: design of a type iii anonymous remailer protocol," in Proceedings of 2003 Symposium on Security and Privacy, pp. 2-15, May 2003.
-
(2003)
Proceedings of 2003 Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
8
-
-
0002054934
-
Crowds: Anonymity for Web transactions
-
M. K. Reiter and A. D. Rubin, "Crowds: anonymity for Web transactions," ACM Transactions on Information and System Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
9
-
-
34250785454
-
On flow correlation attacks and countermeasures in mix networks
-
May 26-28
-
Y. Zhu, X. Fu, B. Graham, R.Bettati, and W. Zhao, "On flow correlation attacks and countermeasures in mix networks," in Proceedings of Privacy Enhancing Technologies workshop, May 26-28 2004.
-
(2004)
Proceedings of Privacy Enhancing Technologies workshop
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
10
-
-
33847350601
-
Effective Probabilistic Approach Protecting Sensor Traffic
-
Atlantic City, NJ, pp, Oct
-
X. Hong, P. Wang, J. Kong, Q. Zheng, and J. Liu, "Effective Probabilistic Approach Protecting Sensor Traffic," in Military Communications Conference, 2005, (Atlantic City, NJ), pp. 1-7, Oct. 2005.
-
(2005)
Military Communications Conference, 2005
, pp. 1-7
-
-
Hong, X.1
Wang, P.2
Kong, J.3
Zheng, Q.4
Liu, J.5
-
11
-
-
20344384752
-
A mix route algorithm for mix-net in wireless mobile ad hoc networks
-
October
-
S. Jiang, N. H. Vaidya, and W. Zhao, "A mix route algorithm for mix-net in wireless mobile ad hoc networks," in Proceedings of IEEE Mobile Sensor and Ad-hoc and Sensor Systems, pp. 406-415, October 2004.
-
(2004)
Proceedings of IEEE Mobile Sensor and Ad-hoc and Sensor Systems
, pp. 406-415
-
-
Jiang, S.1
Vaidya, N.H.2
Zhao, W.3
-
14
-
-
0016562514
-
The wiretap channel
-
A. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
15
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. on Information Theory, vol. 24, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. on Information Theory
, vol.24
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
16
-
-
33745802064
-
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
-
Sophia Antipolis, French Riviera, France, September
-
A. Blum, D. Song, and S. Venkataraman, "Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds," in Conference of Recent Advance in Intrusion Detection (RAID), (Sophia Antipolis, French Riviera, France), September 2004.
-
(2004)
Conference of Recent Advance in Intrusion Detection (RAID)
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
17
-
-
35148817720
-
Detecting Stepping-Stone Traffic in Chaff: Fundamental Limits and Robust Algorithms
-
Tech. Rep. ACSP-TR-06-06-01, Cornell University, June
-
T. He and L. Tong, "Detecting Stepping-Stone Traffic in Chaff: Fundamental Limits and Robust Algorithms," Tech. Rep. ACSP-TR-06-06-01, Cornell University, June 2006. http://acsp.ece.cornell.edu/pubR.html.
-
(2006)
-
-
He, T.1
Tong, L.2
-
18
-
-
0025536530
-
Pakcet Recovery in High-Speed Networks using Coding and Buffer Management
-
N. Shacham and P. McKenney, "Pakcet Recovery in High-Speed Networks using Coding and Buffer Management," in Proc. IEEE INFOCOM, pp. 124-131, 1990.
-
(1990)
Proc. IEEE INFOCOM
, pp. 124-131
-
-
Shacham, N.1
McKenney, P.2
-
19
-
-
0031122982
-
Effective Erasure Codes for Reliable Computer Communication Protocols
-
L. Rizzo, "Effective Erasure Codes for Reliable Computer Communication Protocols," in Proc. ACM SIGCOMM Computer Communication Review, vol. 27, pp. 24-36, 1997.
-
(1997)
Proc. ACM SIGCOMM Computer Communication Review
, vol.27
, pp. 24-36
-
-
Rizzo, L.1
|