-
2
-
-
36949037928
-
-
BACK, A., GOLDBERG, I., AND SHOSTACK, A. Freedom Systems 2.1 security issues and analysis, http://www.freehaven.net/ anonbib/cache/freedom21-security.pdf, May 2001.
-
BACK, A., GOLDBERG, I., AND SHOSTACK, A. Freedom Systems 2.1 security issues and analysis, http://www.freehaven.net/ anonbib/cache/freedom21-security.pdf, May 2001.
-
-
-
-
3
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Proc. 4th International Workshop on Information Hiding, of
-
BACK, A., MÖLLER, U., AND STIGLIC, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proc. 4th International Workshop on Information Hiding (2001), vol. 2137 of LNCS, pp. 245-257.
-
(2001)
LNCS
, vol.2137
, pp. 245-257
-
-
BACK, A.1
MÖLLER, U.2
STIGLIC, A.3
-
4
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
BERTHOLD, O., FEDERRATH, H., AND KÖPSELL, S. Web MIXes: a system for anonymous and unobservable Internet access. In Proc. Workshop on Design Issues in Anonymity and Unobservability (2000), pp. 115-129.
-
(2000)
Proc. Workshop on Design Issues in Anonymity and Unobservability
, pp. 115-129
-
-
BERTHOLD, O.1
FEDERRATH, H.2
KÖPSELL, S.3
-
5
-
-
85058835823
-
Mapping Internet sensors with probe response attacks
-
BETHENCOURT, J., FRANKLIN, J., AND VERNON, M. Mapping Internet sensors with probe response attacks. In Proc. 14th USENIX Security Symposium (2005), pp. 193-208.
-
(2005)
Proc. 14th USENIX Security Symposium
, pp. 193-208
-
-
BETHENCOURT, J.1
FRANKLIN, J.2
VERNON, M.3
-
6
-
-
33244468835
-
Practical privacy: The SuLQ framework
-
BLUM, A., DWORK, C., MCSHERRY, F., AND NISSIM, K. Practical privacy: the SuLQ framework. In Proc. 24th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS) (2005), pp. 128-138.
-
(2005)
Proc. 24th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS)
, pp. 128-138
-
-
BLUM, A.1
DWORK, C.2
MCSHERRY, F.3
NISSIM, K.4
-
8
-
-
84945135810
-
An efficient system for non-transferable anonymous credentials with optional anonymity revocation
-
CAMENISCH, J., AND LYSYANSKAYA, A. An efficient system for non-transferable anonymous credentials with optional anonymity revocation. In Proc. Advances in Cryptology - EUROCRYPT (2001), pp. 93-118.
-
(2001)
Proc. Advances in Cryptology - EUROCRYPT
, pp. 93-118
-
-
CAMENISCH, J.1
LYSYANSKAYA, A.2
-
9
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
CHAUM, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 2 (1981), 84-88.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
CHAUM, D.1
-
10
-
-
24144487020
-
Towards privacy in public databases
-
CHAWLA, S., DWORK, C., MCSHERRY, F., SMITH, A., AND WEE, H. Towards privacy in public databases. In Proc. 2nd Theory of Cryptography Conference (TCC) (2005), pp. 363-385.
-
(2005)
Proc. 2nd Theory of Cryptography Conference (TCC)
, pp. 363-385
-
-
CHAWLA, S.1
DWORK, C.2
MCSHERRY, F.3
SMITH, A.4
WEE, H.5
-
12
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
Proc. International Workshop on Design Issues in Anonymity and Unobservability, of, Springer-Verlag, pp
-
CLARKE, I., SANDBERG, O., WILEY, B., AND HONG, T. Freenet: A distributed anonymous information storage and retrieval system. In Proc. International Workshop on Design Issues in Anonymity and Unobservability (2001), vol. 2009 of LNCS, Springer-Verlag, pp. 46-66.
-
(2001)
LNCS
, vol.2009
, pp. 46-66
-
-
CLARKE, I.1
SANDBERG, O.2
WILEY, B.3
HONG, T.4
-
15
-
-
85084161366
-
Tor: The second-generation onion router
-
DINGLEDINE, R., MATHEWSON, N., AND SYVERSON, P. Tor: the second-generation onion router. In Proc. 13th USENIX Security Symposium (2004), pp. 303-320.
-
(2004)
Proc. 13th USENIX Security Symposium
, pp. 303-320
-
-
DINGLEDINE, R.1
MATHEWSON, N.2
SYVERSON, P.3
-
17
-
-
36949000629
-
-
DSHIELD. http://www.dshield.org, 2006.
-
DSHIELD. http://www.dshield.org, 2006.
-
-
-
-
18
-
-
1142263341
-
Limiting privacy breaches in privacy-preserving data, mining
-
EVFIMIEVSKI, A., GEHRKE, J., AND SRIKANT, R. Limiting privacy breaches in privacy-preserving data, mining. In Proc. 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS) (2003), pp. 211-222.
-
(2003)
Proc. 22nd ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS)
, pp. 211-222
-
-
EVFIMIEVSKI, A.1
GEHRKE, J.2
SRIKANT, R.3
-
19
-
-
0037629738
-
On effectiveness of link padding for statistical traffic analysis attacks
-
FU, X., GRAHAM, B., BETTATI, R., AND ZHAO, W. On effectiveness of link padding for statistical traffic analysis attacks. In Proc. 23rd IEEE Conference on Distributed Computing Systems (2003), pp. 340-349.
-
(2003)
Proc. 23rd IEEE Conference on Distributed Computing Systems
, pp. 340-349
-
-
FU, X.1
GRAHAM, B.2
BETTATI, R.3
ZHAO, W.4
-
20
-
-
77953296690
-
More Netflow tools: For performance and security
-
GATES, C., COLLINS, M., DUGGAN, M., KOMPANEK, A., AND THOMAS, M. More Netflow tools: For performance and security. In Proc. 18th Conference on Systems Administration (LISA) (2004), pp. 121-132.
-
(2004)
Proc. 18th Conference on Systems Administration (LISA)
, pp. 121-132
-
-
GATES, C.1
COLLINS, M.2
DUGGAN, M.3
KOMPANEK, A.4
THOMAS, M.5
-
21
-
-
33244455692
-
Simulatable auditing
-
KENTHAPADI, K., MISHRA, N., AND NISSIM, K. Simulatable auditing. In Proc. 24th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS) (2005), pp. 118-127.
-
(2005)
Proc. 24th ACM SIGACT-SIGMOD-SIGART Symposium on Principles of Database Systems (PODS)
, pp. 118-127
-
-
KENTHAPADI, K.1
MISHRA, N.2
NISSIM, K.3
-
22
-
-
0037929598
-
Auditing Boolean attributes
-
KLEINBERG, J., PAPADIMITRIOU, C., AND RAGHAVAN, P. Auditing Boolean attributes. J. Comput. Syst. Sci. 66, 1 (2003), 244-253.
-
(2003)
J. Comput. Syst. Sci
, vol.66
, Issue.1
, pp. 244-253
-
-
KLEINBERG, J.1
PAPADIMITRIOU, C.2
RAGHAVAN, P.3
-
23
-
-
27544460278
-
Remote physical device fingerprinting
-
KOHNO, T., BROIDO, A., AND CLAFFY, K. Remote physical device fingerprinting. In Proc. IEEE Symposium on Security and Privacy (2005), pp. 211-225.
-
(2005)
Proc. IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
KOHNO, T.1
BROIDO, A.2
CLAFFY, K.3
-
24
-
-
14944367082
-
Sketch-based change detection: Methods, evaluation, and applications
-
KRISHNAMURTHY, B., SEN, S., ZHANG, Y., AND CHEN, Y. Sketch-based change detection: methods, evaluation, and applications. In Proc. 3rd ACM SIGCOMM Conference on Internet Measurement (2003), pp. 235-247.
-
(2003)
Proc. 3rd ACM SIGCOMM Conference on Internet Measurement
, pp. 235-247
-
-
KRISHNAMURTHY, B.1
SEN, S.2
ZHANG, Y.3
CHEN, Y.4
-
25
-
-
33846288517
-
Timing attacks in low-latency mix systems
-
LEVINE, B., REITER, M., WANG, C., AND WRIGHT, M. Timing attacks in low-latency mix systems. In Proc. 8th International Conference on Financial Cryptography (2004), pp. 251-265.
-
(2004)
Proc. 8th International Conference on Financial Cryptography
, pp. 251-265
-
-
LEVINE, B.1
REITER, M.2
WANG, C.3
WRIGHT, M.4
-
26
-
-
85084159849
-
Privacy-preserving sharing and correlation of security alerts
-
LINCOLN, P., PORRAS, P., AND SHMATIKOV, V. Privacy-preserving sharing and correlation of security alerts. In Proc. 13th USENIX Security Symposium (2004), pp. 239-254.
-
(2004)
Proc. 13th USENIX Security Symposium
, pp. 239-254
-
-
LINCOLN, P.1
PORRAS, P.2
SHMATIKOV, V.3
-
27
-
-
36949026356
-
-
LIPMAA, H. Group signature schemes. http://www.cs.ut.ee/ lipmaa/crypto/link/signature/group.php, 2006.
-
LIPMAA, H. Group signature schemes. http://www.cs.ut.ee/ "lipmaa/crypto/link/signature/group.php, 2006.
-
-
-
-
28
-
-
33745469273
-
Towards collaborative security and P2P intrusion detection
-
LOCASTO, M., PAREKH, J., KEROMYTIS, A., AND STOLFO, S. Towards collaborative security and P2P intrusion detection. In Proc. IEEE Information Assurance Workshop (2005), pp. 333-339.
-
(2005)
Proc. IEEE Information Assurance Workshop
, pp. 333-339
-
-
LOCASTO, M.1
PAREKH, J.2
KEROMYTIS, A.3
STOLFO, S.4
-
29
-
-
14944358967
-
Structure preserving anonymization of router configuration data
-
MALTZ, D., ZHAN, J., XIE, G., ZHANG, H., HJÁLMTÝSSON, G., GREENBERG, A., AND REXFORD, J. Structure preserving anonymization of router configuration data. In Proc. 4th ACM SIGCOMM Conference on Internet Measurement (2004), pp. 239-244.
-
(2004)
Proc. 4th ACM SIGCOMM Conference on Internet Measurement
, pp. 239-244
-
-
MALTZ, D.1
ZHAN, J.2
XIE, G.3
ZHANG, H.4
HJÁLMTÝSSON, G.5
GREENBERG, A.6
REXFORD, J.7
-
30
-
-
17644414542
-
Locality: A new paradigm for thinking about normal behavior and outsider threat
-
MCHUGH, J., AND GATES, C. Locality: a new paradigm for thinking about normal behavior and outsider threat. In Proc. New Security Paradigms Workshop (2003), pp. 3-10.
-
(2003)
Proc. New Security Paradigms Workshop
, pp. 3-10
-
-
MCHUGH, J.1
GATES, C.2
-
32
-
-
36949027303
-
-
MYNETWATCHMAN. http://www.mynetwatchman.com, 2006.
-
MYNETWATCHMAN. http://www.mynetwatchman.com, 2006.
-
-
-
-
34
-
-
33750332606
-
Paragraph: Thwarting signature learning by training maliciously
-
NEWSOME, J., KARP, B., AND SONG, D. Paragraph: Thwarting signature learning by training maliciously. In Proc. Recent Advances in Intrusion Detection: 9th International Symposium (RAID) (2006), pp. 81-105.
-
(2006)
Proc. Recent Advances in Intrusion Detection: 9th International Symposium (RAID)
, pp. 81-105
-
-
NEWSOME, J.1
KARP, B.2
SONG, D.3
-
36
-
-
33847256529
-
The devil and packet trace anonymization
-
PANG, R., ALLMAN, M., PAXSON, V., AND LEE, J. The devil and packet trace anonymization. ACM SIGCOMM Computer Communication Review 36, 1 (2006), 29-38.
-
(2006)
ACM SIGCOMM Computer Communication Review
, vol.36
, Issue.1
, pp. 29-38
-
-
PANG, R.1
ALLMAN, M.2
PAXSON, V.3
LEE, J.4
-
37
-
-
1242310066
-
A high-level programming environment for packet trace anonymization and transformation
-
PANG, R., AND PAXSON, V. A high-level programming environment for packet trace anonymization and transformation. In Proc. ACM SIGCOMM (2003), pp. 339-351.
-
(2003)
Proc. ACM SIGCOMM
, pp. 339-351
-
-
PANG, R.1
PAXSON, V.2
-
38
-
-
33751051489
-
Misleading worm signature generators using deliberate noise injection
-
PERDISCI, R., DAGON, D., LEE, W., FOGLA, P., AND SHARIF, M. Misleading worm signature generators using deliberate noise injection. In Proc. IEEE Symposium on Security and Privacy (2006), pp. 17-31.
-
(2006)
Proc. IEEE Symposium on Security and Privacy
, pp. 17-31
-
-
PERDISCI, R.1
DAGON, D.2
LEE, W.3
FOGLA, P.4
SHARIF, M.5
-
39
-
-
35248841429
-
From a trickle to flood: Active attacks on several mix types
-
SERJANTOV, A., DINGLEDINE, R., AND SYVERSON, P. From a trickle to flood: active attacks on several mix types. In Proc. 5th International Workshop on Information Hiding (2002), pp. 36-52.
-
(2002)
Proc. 5th International Workshop on Information Hiding
, pp. 36-52
-
-
SERJANTOV, A.1
DINGLEDINE, R.2
SYVERSON, P.3
-
40
-
-
0142250280
-
Passive attack analysis for connect ion-based anonymity systems
-
Proc. 8th European Symposium on Research in Computer Security, of
-
SERJANTOV, A., AND SEWELL, P. Passive attack analysis for connect ion-based anonymity systems. In Proc. 8th European Symposium on Research in Computer Security (2003), vol. 2808 of LNCS, pp. 116-131.
-
(2003)
LNCS
, vol.2808
, pp. 116-131
-
-
SERJANTOV, A.1
SEWELL, P.2
-
44
-
-
84937565289
-
Towards an analysis of onion routing security
-
Proc. Workshop on Design Issues in Anonymity and Unobservabitity, of
-
SYVERSON, P., TSUDIK, G., REED, M., AND LANDWEHR, C. Towards an analysis of onion routing security. In Proc. Workshop on Design Issues in Anonymity and Unobservabitity (2000), vol. 2009 of LNCS, pp. 96-114.
-
(2000)
LNCS
, vol.2009
, pp. 96-114
-
-
SYVERSON, P.1
TSUDIK, G.2
REED, M.3
LANDWEHR, C.4
-
52
-
-
1242308060
-
On the design and performance of prefix-preserving IP traffic trace anonymization
-
XU, J., FAN, J., AMMAR, M., AND MOON, S. On the design and performance of prefix-preserving IP traffic trace anonymization. In Proc. 1st ACM SIGCOMM Workshop on Internet Measurement (2001), pp. 263-266.
-
(2001)
Proc. 1st ACM SIGCOMM Workshop on Internet Measurement
, pp. 263-266
-
-
XU, J.1
FAN, J.2
AMMAR, M.3
MOON, S.4
-
53
-
-
35048867316
-
On the design and use of Internet sinks for network abuse monitoring
-
YEGNESWARAN, V., BARFORD, P., AND PLONKA, D. On the design and use of Internet sinks for network abuse monitoring. In Proc. Recent Advances in Intrusion Detection: 7th International Symposium (RAID) (2004), pp. 146-165.
-
(2004)
Proc. Recent Advances in Intrusion Detection: 7th International Symposium (RAID)
, pp. 146-165
-
-
YEGNESWARAN, V.1
BARFORD, P.2
PLONKA, D.3
-
54
-
-
33646179175
-
Internet intrusions: Global characteristics and prevalence
-
YEGNESWARAN, V., BARFORD, P., AND ULLRICH, J. Internet intrusions: global characteristics and prevalence. In Proc. ACM SIGMETRICS (2003), pp. 138-147.
-
(2003)
Proc. ACM SIGMETRICS
, pp. 138-147
-
-
YEGNESWARAN, V.1
BARFORD, P.2
ULLRICH, J.3
|