-
4
-
-
50249102748
-
-
Phex client. http://www.phex.org.
-
Phex client
-
-
-
5
-
-
50249092720
-
-
Skype, the global internet telephone company
-
Skype - the global internet telephone company. http://www.skype.com.
-
-
-
-
6
-
-
50249139613
-
-
Telegeography research
-
Telegeography research. http://www.telegeography.com.
-
-
-
-
9
-
-
33745802064
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
A. Blum, D. Song, and S. Venkataraman. Detection of interactive stepping stones: Algorithms and confidence bounds. In 7th RAID, 2004.
-
(2004)
7th RAID
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
10
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. In Communications of ACM, 24(2): 84-88, 1981.
-
(1981)
Communications of ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
11
-
-
33748618417
-
An exact algorithm for statistical shortest path problem
-
L. Deng and M. D. F. Wong. An exact algorithm for statistical shortest path problem. In Design Automation Conference, 2006.
-
(2006)
Design Automation Conference
-
-
Deng, L.1
Wong, M.D.F.2
-
13
-
-
18744391788
-
Multiscale stepping stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
D. L. Donoho, A. G. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford. Multiscale stepping stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In 5th RAID, 2002.
-
(2002)
5th RAID
-
-
Donoho, D.L.1
Flesia, A.G.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
16
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
M. J. Freedman and R. Morris. Tarzan: A peer-to-peer anonymizing network layer. In 9th ACM CCS, 2002.
-
(2002)
9th ACM CCS
-
-
Freedman, M.J.1
Morris, R.2
-
17
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. In Communications of ACM, Vol 42(2), 1999.
-
(1999)
Communications of ACM
, vol.42
, Issue.2
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
18
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
M. Gruteser and D. Grunwald. Anonymous usage of location-based services through spatial and temporal cloaking. In ACM MobiSys, 2003.
-
(2003)
ACM MobiSys
-
-
Gruteser, M.1
Grunwald, D.2
-
19
-
-
1242308046
-
The impact of DHT routing geometry on resilience and proximity
-
K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica. The impact of DHT routing geometry on resilience and proximity. In ACM SIGCOMM, 2003.
-
(2003)
ACM SIGCOMM
-
-
Gummadi, K.1
Gummadi, R.2
Gribble, S.3
Ratnasamy, S.4
Shenker, S.5
Stoica, I.6
-
20
-
-
50249139612
-
Enhancing source location privacy in sensor network routing
-
P. Kamat, Y. Zhang, W. Trappe, and C. Ozturk. Enhancing source location privacy in sensor network routing. In IEEE ICDCS, 2005.
-
(2005)
IEEE ICDCS
-
-
Kamat, P.1
Zhang, Y.2
Trappe, W.3
Ozturk, C.4
-
21
-
-
0003663467
-
Probability, random variables, and stochastic processes
-
A. Papoulis. Probability, random variables, and stochastic processes. In 3rd ed. McGraw Hill ISBN 0-07-100870-5, pp. 113-114.
-
3rd ed. McGraw Hill ISBN 0-07-100870-5
, pp. 113-114
-
-
Papoulis, A.1
-
22
-
-
50249165346
-
M2: Multicasting mixes for efficient and anonymous communication
-
G. Perng, M. K. Reiter, and C. Wang. M2: Multicasting mixes for efficient and anonymous communication. In IEEE ICDCS, 2006.
-
(2006)
IEEE ICDCS
-
-
Perng, G.1
Reiter, M.K.2
Wang, C.3
-
24
-
-
0023331864
-
Networks without user observability
-
A. Pfitzmann and M. Waidner. Networks without user observability. In Computers and Security, 2(6): 158-166, 1987.
-
(1987)
Computers and Security
, vol.2
, Issue.6
, pp. 158-166
-
-
Pfitzmann, A.1
Waidner, M.2
-
26
-
-
50249130214
-
-
S. M. Ross. Introduction to probability models. Academic Press ISBN: 0125980558, 2002.
-
S. M. Ross. Introduction to probability models. Academic Press ISBN: 0125980558, 2002.
-
-
-
-
27
-
-
0034447260
-
A protocol for anonymous communication over the internet
-
C. Shields and B. N. Levine. A protocol for anonymous communication over the internet. In ACM CCS, 2000.
-
(2000)
ACM CCS
-
-
Shields, C.1
Levine, B.N.2
-
28
-
-
70349301114
-
Timing analysis in low latency mix networks: Attacks and defenses
-
V. Shmatikov and M. H. Wang. Timing analysis in low latency mix networks: Attacks and defenses. In 11th ESORICS, 2006.
-
(2006)
11th ESORICS
-
-
Shmatikov, V.1
Wang, M.H.2
-
29
-
-
50249151390
-
-
G. I. Sound. VoIP: Better than PSTN? http://www.globalipsound.com/demo/ tutorial.php.
-
G. I. Sound. VoIP: Better than PSTN? http://www.globalipsound.com/demo/ tutorial.php.
-
-
-
-
31
-
-
33745773302
-
Tracking anonymous peer-to-peer VoIP calls on the internet
-
X. Wang, S. Chen, and S. Jajodia. Tracking anonymous peer-to-peer VoIP calls on the internet. In 12th ACM CCS, 2005.
-
(2005)
12th ACM CCS
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
32
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
X. Wang and D. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In 10th ACM CCS, 2003.
-
(2003)
10th ACM CCS
-
-
Wang, X.1
Reeves, D.2
-
33
-
-
2442569400
-
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
-
X. Wang, D. Reeves, and S. Wu. Inter-packet delay based correlation for tracing encrypted connections through stepping stones. In 7th ESORICS, 2002.
-
(2002)
7th ESORICS
-
-
Wang, X.1
Reeves, D.2
Wu, S.3
-
34
-
-
34548362125
-
Residual-based measurement of peer and link lifetimes in gnutella networks
-
X. Wang, Z. Yao, and D. Loguinov. Residual-based measurement of peer and link lifetimes in gnutella networks. In IEEE InfoCom, 2007.
-
(2007)
IEEE InfoCom
-
-
Wang, X.1
Yao, Z.2
Loguinov, D.3
-
35
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
X. Y. Wang and D. S. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In ACM CCS, 2003.
-
(2003)
ACM CCS
-
-
Wang, X.Y.1
Reeves, D.S.2
-
36
-
-
2442581931
-
Finding a connection chain for tracing intruders
-
K. Yoda and H. Etoh. Finding a connection chain for tracing intruders. In 6th ESORICS, 2000.
-
(2000)
6th ESORICS
-
-
Yoda, K.1
Etoh, H.2
|