-
2
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
V. L. Voydock and S. T. Kent, "Security mechanisms in high-level network protocols," ACM Comp. Surv., vol. 15, pp. 135-171, 1983.
-
(1983)
ACM Comp. Surv
, vol.15
, pp. 135-171
-
-
Voydock, V.L.1
Kent, S.T.2
-
3
-
-
84937555407
-
-
J.-F. Raymond, Traffic analysis: Protocols, attacks, design issues and open problems, in Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (Lecture Notes in Computer Science), H. Federrath, Ed. Berlin, Germany: Springer-Verlag, 2001, 2009, pp. 10-29.
-
J.-F. Raymond, "Traffic analysis: Protocols, attacks, design issues and open problems," in Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (Lecture Notes in Computer Science), H. Federrath, Ed. Berlin, Germany: Springer-Verlag, 2001, vol. 2009, pp. 10-29.
-
-
-
-
4
-
-
0036086129
-
Statistical identification of encrypted web browsing traffic
-
Berkeley, CA, May
-
Q. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu, "Statistical identification of encrypted web browsing traffic," in Proc. 2002 IEEE Symp. Security and Privacy, Berkeley, CA, May 2002, p. 19.
-
(2002)
Proc. 2002 IEEE Symp. Security and Privacy
, pp. 19
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
5
-
-
27544457394
-
Practical traffic analysis: Extending and resisting statistical disclosure
-
presented at the, Toronto, ON, Canada, May
-
N. Matthewson and R. Dingledine, "Practical traffic analysis: Extending and resisting statistical disclosure," presented at the Privacy Enhancing Technologies: 4th International Workshop, Toronto, ON, Canada, May 2004.
-
(2004)
Privacy Enhancing Technologies: 4th International Workshop
-
-
Matthewson, N.1
Dingledine, R.2
-
6
-
-
0034449227
-
Timing attacks on web privacy
-
Athens, Greece, Nov
-
E. W. Felten and M. A. Schneider, "Timing attacks on web privacy," in Proc. ACM Conf. Computer and Communications Security, Athens, Greece, Nov. 2000, pp. 25-32.
-
(2000)
Proc. ACM Conf. Computer and Communications Security
, pp. 25-32
-
-
Felten, E.W.1
Schneider, M.A.2
-
7
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on SSH
-
Washington, DC, Aug
-
D. X. Song, D. Wagner, and X. Tian, "Timing analysis of keystrokes and timing attacks on SSH," in Proc. 10th USENIX Security Sym., Washington, DC, Aug. 2001, pp. 25-40.
-
(2001)
Proc. 10th USENIX Security Sym
, pp. 25-40
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
8
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon, "Communication theory of secrecy systems," Bell Syst. Tech. J., vol. 28, pp. 656-715, 1949.
-
(1949)
Bell Syst. Tech. J
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
9
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
Feb
-
D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Commun. ACM, vol. 24, pp. 84-88, Feb. 1981.
-
(1981)
Commun. ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
10
-
-
35248882142
-
Generalizing mixes
-
Proc. Privacy Enhancing Technologies Workshop PET 2003, Berlin, Germany: Springer-Verlag, Apr
-
C. Díaz and A. Serjantov, "Generalizing mixes," in Proc. Privacy Enhancing Technologies Workshop (PET 2003) (Lecture Notes in Computer Science). Berlin, Germany: Springer-Verlag, Apr. 2003, vol. 2760.
-
(2003)
Lecture Notes in Computer Science
, vol.2760
-
-
Díaz, C.1
Serjantov, A.2
-
11
-
-
84890010554
-
Stop-and-go MIXes providing probabilistic security in an open system
-
Proc. 2nd Int. Workshop on Information Hiding IH'98, Portland, OR, Apr
-
D. Kesdogan, J. Egner, and R. Buschkes, "Stop-and-go MIXes providing probabilistic security in an open system," in Proc. 2nd Int. Workshop on Information Hiding (IH'98), Portland, OR, Apr. 1998, vol. 1525, Lecture Notes in Computer Science, pp. 83-98.
-
(1998)
Lecture Notes in Computer Science
, vol.1525
, pp. 83-98
-
-
Kesdogan, D.1
Egner, J.2
Buschkes, R.3
-
12
-
-
85031542311
-
Mixing e-mail with Babel
-
San Diego, CA, Feb
-
C. Gulcu and G. Tsudik, "Mixing e-mail with Babel," in Proc. Symp. Network and Distributed System Security, San Diego, CA, Feb. 1996, pp. 2-19.
-
(1996)
Proc. Symp. Network and Distributed System Security
, pp. 2-19
-
-
Gulcu, C.1
Tsudik, G.2
-
13
-
-
84954409133
-
Mixminion: Design of a type III anonymous remailer protocol
-
Oakland, CA, May
-
G. Danezis, R. Dingledine, and N. Mathewson, "Mixminion: Design of a type III anonymous remailer protocol," in Proc. 2003 Symp. Security and Privacy, Oakland, CA, May 2003, pp. 2-15.
-
(2003)
Proc. 2003 Symp. Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
14
-
-
24344450770
-
On flow correlation attacks and countermeasures in mix networks
-
Toronto, ON, Canada, May
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, "On flow correlation attacks and countermeasures in mix networks," in Proc. Privacy Enhancing Technologies Workshop, Toronto, ON, Canada, May 2004, pp. 207-225.
-
(2004)
Proc. Privacy Enhancing Technologies Workshop
, pp. 207-225
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
15
-
-
84964477407
-
Hiding traffic flow in communication networks
-
San Diego, CA
-
B. Radosavljevic and B. Hajek, "Hiding traffic flow in communication networks," in Proc. Military Communications Conf., San Diego, CA, 1992, pp. 1096-1100.
-
(1992)
Proc. Military Communications Conf
, pp. 1096-1100
-
-
Radosavljevic, B.1
Hajek, B.2
-
16
-
-
0016562514
-
The wiretap channel
-
A. Wyner, "The wiretap channel," Bell Syst. Tech. J., vol. 54, pp. 1355-1387, 1975.
-
(1975)
Bell Syst. Tech. J
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
17
-
-
0017973511
-
Broadcast channels with confidential messages
-
May
-
I. Csiszár and J. Körner, "Broadcast channels with confidential messages," IEEE Trans. Inf. Theory, vol. IT-24, no. 3, pp. 339-348, May 1978.
-
(1978)
IEEE Trans. Inf. Theory
, vol.IT-24
, Issue.3
, pp. 339-348
-
-
Csiszár, I.1
Körner, J.2
-
19
-
-
49549085794
-
Detection of information flows
-
submitted for publication
-
T. He and L. Tong, "Detection of information flows," IEEE Trans. Inf. Theory, submitted for publication.
-
IEEE Trans. Inf. Theory
-
-
He, T.1
Tong, L.2
-
21
-
-
45249102424
-
-
A. Serjantov and G. Danezis, Towards an information theoretic metric for anonymity, in Proc. Privacy Enhancing Technologies Workshop (PET 2002) (Lecture Notes in Computer Science), R. Dingledine and P. Syverson, Eds. Berlin, Germany: Springer-Verlag, Apr. 2002, 2482.
-
A. Serjantov and G. Danezis, "Towards an information theoretic metric for anonymity," in Proc. Privacy Enhancing Technologies Workshop (PET 2002) (Lecture Notes in Computer Science), R. Dingledine and P. Syverson, Eds. Berlin, Germany: Springer-Verlag, Apr. 2002, vol. 2482.
-
-
-
-
22
-
-
35048846490
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
Sophia-Antipolis, France, Sep
-
A. Blum, D. Song, and S. Venkataraman, "Detection of interactive stepping stones: Algorithms and confidence bounds," in Conference on Recent Advance in Intrusion Detection (RAID), Sophia-Antipolis, France, Sep. 2004, pp. 258-277.
-
(2004)
Conference on Recent Advance in Intrusion Detection (RAID)
, pp. 258-277
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
23
-
-
0033891241
-
About priority encoding transmission
-
Mar
-
S. Boucheron and M. R. Salamatian, "About priority encoding transmission," IEEE Trans. Inf. Theory, vol. 46, no. 2, pp. 699-705, Mar. 2000.
-
(2000)
IEEE Trans. Inf. Theory
, vol.46
, Issue.2
, pp. 699-705
-
-
Boucheron, S.1
Salamatian, M.R.2
-
24
-
-
0025536530
-
Pakcet recovery in high-speed networks using coding and buffer management
-
San Francisco, CA
-
N. Shacham and P. McKenney, "Pakcet recovery in high-speed networks using coding and buffer management," in Proc. IEEE INFOCOM, San Francisco, CA, 1990, pp. 124-131.
-
(1990)
Proc. IEEE INFOCOM
, pp. 124-131
-
-
Shacham, N.1
McKenney, P.2
-
25
-
-
0031122982
-
Effective erasure codes for reliable computer communication protocols
-
Jun
-
L. Rizzo, "Effective erasure codes for reliable computer communication protocols," Proc. ACM SIGCOMM Computer Communication Rev., vol. 27, pp. 24-36, Jun. 1997.
-
(1997)
Proc. ACM SIGCOMM Computer Communication Rev
, vol.27
, pp. 24-36
-
-
Rizzo, L.1
-
26
-
-
35148885145
-
Packet scheduling against stepping-stone attacks with chaff
-
Washington, DC, Oct
-
T. He, P. Venkitasubramaniam, and L. Tong, "Packet scheduling against stepping-stone attacks with chaff," in Proc. IEEE Military Communications Conf., Washington, DC, Oct. 2006.
-
(2006)
Proc. IEEE Military Communications Conf
-
-
He, T.1
Venkitasubramaniam, P.2
Tong, L.3
-
27
-
-
0015376113
-
Computation of channel capacity and rate-distortion functions
-
Jul
-
R. Blahut, "Computation of channel capacity and rate-distortion functions," IEEE Trans. Inf. Theory, vol. IT-18, no. 4, pp. 460-473, Jul. 1972.
-
(1972)
IEEE Trans. Inf. Theory
, vol.IT-18
, Issue.4
, pp. 460-473
-
-
Blahut, R.1
-
28
-
-
0020180462
-
Causal source codes
-
Sep
-
D. Neuhoff and L. Gilbert, "Causal source codes," IEEE Trans. Inf. Theory, vol. IT-28, no. 5, pp. 701-713, Sep. 1982.
-
(1982)
IEEE Trans. Inf. Theory
, vol.IT-28
, Issue.5
, pp. 701-713
-
-
Neuhoff, D.1
Gilbert, L.2
-
29
-
-
45249093836
-
Throughput-anonymity tradeoff in wireless networks under latency constraints
-
Phoenix, AZ, Apr
-
P. Venkitasubramaniam and L. Tong, "Throughput-anonymity tradeoff in wireless networks under latency constraints," in Proc. 2008 IEEE INFOCOM, Phoenix, AZ, Apr. 2008, pp. 807-815.
-
(2008)
Proc. 2008 IEEE INFOCOM
, pp. 807-815
-
-
Venkitasubramaniam, P.1
Tong, L.2
|