-
1
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Ira S. Moskowitz, editor, Information Hiding, 4th International Workshop (IH 2001), Springer-Verlag
-
Adam Back, Ulf Möller, and Anton Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In Ira S. Moskowitz, editor, Information Hiding, 4th International Workshop (IH 2001), pages 245-257. Springer-Verlag, LNCS 2137, 2001.
-
(2001)
LNCS
, vol.2137
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
2
-
-
84957805506
-
Dummy traffic against long term intersection attacks
-
Paul Syverson and Roger Dingledine, editors, Privacy Enhancing Technologies (PET 2002). Springer-Verlag, April
-
O. Berthold and H. Langos. Dummy traffic against long term intersection attacks. In Paul Syverson and Roger Dingledine, editors, Privacy Enhancing Technologies (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
LNCS
, vol.2482
-
-
Berthold, O.1
Langos, H.2
-
3
-
-
84957800033
-
Towards measuring anonymity
-
Paul Syverson and Roger Dingledine, editors, Privacy Enhancing Technologies (PET 2002) Springer-Verlag, April
-
Claudia Diaz, Stefaan Seys, Joris Claessens, and Bart Preneel. Towards measuring anonymity. In Paul Syverson and Roger Dingledine, editors, Privacy Enhancing Technologies (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
LNCS
, vol.2482
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
4
-
-
0030211305
-
Efficient network QoS provisioning based on per node traffic shaping
-
Leonidas Georgiadis, Roch Guérin, Vinod Peris, and Kumar N. Sivarajan. Efficient network QoS provisioning based on per node traffic shaping. IEEE/ACM Transactions on Networking, 4(4):482-501, 1996.
-
(1996)
IEEE/ACM Transactions on Networking
, vol.4
, Issue.4
, pp. 482-501
-
-
Georgiadis, L.1
Guérin, R.2
Peris, V.3
Sivarajan, K.N.4
-
5
-
-
84955557456
-
Hiding routing information
-
Ross Anderson, editor, Information Hiding, First International Workshop, Springer-Verlag, May
-
D. Goldschlag, M. Reed, and P. Syverson. Hiding routing information. In Ross Anderson, editor, Information Hiding, First International Workshop, pages 137-150. Springer-Verlag, LNCS 1174, May 1996.
-
(1996)
LNCS
, vol.1174
, pp. 137-150
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
7
-
-
0000446356
-
A network Pump
-
Myong H. Kang, Ira S. Moskowitz, and Daniel C. Lee. A network Pump. IEEE Transactions on Software Engineering, 22(5):329-328, 1998.
-
(1998)
IEEE Transactions on Software Engineering
, vol.22
, Issue.5
, pp. 329-1328
-
-
Kang, M.H.1
Moskowitz, I.S.2
Lee, D.C.3
-
10
-
-
35248855152
-
-
Onion routing home page
-
Onion routing home page. http://www.onion-router.net.
-
-
-
-
11
-
-
84937564790
-
Anonymity, unobservability and pseudonymity - A proposal for terminology
-
Hannes Federrath, editor, Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Observability, Springer-Verlag, July
-
Andreas Pfitzmann and Marit Köhntopp. Anonymity, unobservability and pseudonymity - a proposal for terminology. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Observability, pages 1-9. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, vol.2009
, pp. 1-9
-
-
Pfitzmann, A.1
Köhntopp, M.2
-
13
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
Hannes Federrath, editor, Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Observability, Springer-Verlag, July
-
J. Raymond. Traffic analysis: Protocols, attacks, design issues, and open problems. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Observability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.1
-
15
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
Paul Syverson and Roger Dingledine, editors, Privacy Enhacing Technologies (PET 2002) Springer-Verlag, April
-
Andrei Serjantov and George Danezis. Towards an information theoretic metric for anonymity. In Paul Syverson and Roger Dingledine, editors, Privacy Enhacing Technologies (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
LNCS
, vol.2482
-
-
Serjantov, A.1
Danezis, G.2
-
16
-
-
84890522850
-
Communication theory of secrecy systems
-
C.E. Shannon. Communication theory of secrecy systems. Bell System Technical Journal, 28:656-715, 1949.
-
(1949)
Bell System Technical Journal
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
18
-
-
84924758404
-
Group principals and the formalization of anonymity
-
J.M. Wing, J. Woodcock, and J. Davies, editors, FM'99 - Formal Methods, Vol. I, Springer-Verlag, March
-
Paul Syverson and Stuart Stubblebine. Group principals and the formalization of anonymity. In J.M. Wing, J. Woodcock, and J. Davies, editors, FM'99 - Formal Methods, Vol. I, pages 814-833. Springer-Verlag, LNCS 1708, March 1999.
-
(1999)
LNCS
, vol.1708
, pp. 814-833
-
-
Syverson, P.1
Stubblebine, S.2
-
19
-
-
84937565289
-
Towards an analysis of onion routing security
-
Hannes Federrath, editor, Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Observability, Springer-Verlag, July
-
Paul F. Syverson, Gene Tsudik, Michael G. Reed, and Carl E. Landwehr. Towards an analysis of onion routing security. In Hannes Federrath, editor, Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Observability, pages 96-114. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, vol.2009
, pp. 96-114
-
-
Syverson, P.F.1
Tsudik, G.2
Reed, M.G.3
Landwehr, C.E.4
-
20
-
-
0028713303
-
Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network
-
Orlando, FL, December 5-9 IEEE CS Press
-
B. R. Venkatraman and R. E. Newman-Wolfe. Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. In Proc. IEEE/ACM Tenth Annual Computer Security Applications Conference, pages 288-297, Orlando, FL, December 5-9 1994. IEEE CS Press.
-
(1994)
Proc. IEEE/ACM Tenth Annual Computer Security Applications Conference
, pp. 288-297
-
-
Venkatraman, B.R.1
Newman-Wolfe, R.E.2
-
21
-
-
0029221690
-
Capacity estimation and auditability of network covert channels
-
Oakland, CA, May 8-10 IEEE CS Press
-
B. R. Venkatraman and R. E. Newman-Wolfe. Capacity estimation and auditability of network covert channels. In Proc. IEEE Symposium on Security and Privacy, pages 186-198, Oakland, CA, May 8-10 1995. IEEE CS Press.
-
(1995)
Proc. IEEE Symposium on Security and Privacy
, pp. 186-198
-
-
Venkatraman, B.R.1
Newman-Wolfe, R.E.2
|