-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 4, no. 2, February 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
5
-
-
34548755641
-
Dsss-based flow marking technique for invisible traceback
-
May
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, "Dsss-based flow marking technique for invisible traceback," in Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P), May 2007.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P)
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
7
-
-
27944485356
-
On flow marking attacks in wireless anonymous communication networks
-
April
-
X. Fu, Y. Zhu, B. Graham, R. Bettati, and W. Zhao, "On flow marking attacks in wireless anonymous communication networks," in Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), April 2005.
-
(2005)
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS)
-
-
Fu, X.1
Zhu, Y.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
8
-
-
84954435745
-
Defending anonymous communication against passive logging attacks
-
May
-
M. Wright, M. Adler, B. N. Levine, and C. Shields, "Defending anonymous communication against passive logging attacks," in Proceedings of the IEEE Symposium on Security and Privacy (S&P), May 2003.
-
(2003)
Proceedings of the IEEE Symposium on Security and Privacy (S&P)
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
9
-
-
33745798251
-
Timing attacks in low-latency mix-based systems
-
February
-
B. N. Levine, M. K. Reiter, C.Wang, and M. Wright, "Timing attacks in low-latency mix-based systems," in Proceedings of Financial Cryptography (FC), February 2004.
-
(2004)
Proceedings of Financial Cryptography (FC)
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.4
-
13
-
-
50249158667
-
-
University of Colorado at Boulder, Tech. Rep, August
-
D. McCoy, K. Bauer, D. Grunwald, P. Tabriz, and D. Sicker, "Shining light in dark places: A study of anonymous network usage," University of Colorado at Boulder, Tech. Rep., August 2007.
-
(2007)
Shining light in dark places: A study of anonymous network usage
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Tabriz, P.4
Sicker, D.5
-
15
-
-
0032594135
-
Promoting the use of end-to-end congestion control in the Internet
-
S. Floyd and K. Fall, "Promoting the use of end-to-end congestion control in the Internet," IEEE/ACM Transactions on Networking, vol. 7, no. 4, pp. 458-472, 1999.
-
(1999)
IEEE/ACM Transactions on Networking
, vol.7
, Issue.4
, pp. 458-472
-
-
Floyd, S.1
Fall, K.2
-
16
-
-
0002724784
-
Modeling TCP throughput: A simple model and its empirical validation
-
September
-
J. Padhye, V. Firoiu, D. Towsley, and J. Krusoe, "Modeling TCP throughput: A simple model and its empirical validation," in Proceedings of ACM SIGCOMM, September 1998.
-
(1998)
Proceedings of ACM SIGCOMM
-
-
Padhye, J.1
Firoiu, V.2
Towsley, D.3
Krusoe, J.4
-
17
-
-
33846597840
-
Application level relay for high-bandwidth data transport
-
May
-
Y. Liu, Y. Gu, H. Zhang, W. Gong, and D. Towsley, "Application level relay for high-bandwidth data transport," in Proceedings of the 1-th International Workshop on Networks for Grid GridNets, May 2004.
-
(2004)
Proceedings of the 1-th International Workshop on Networks for Grid GridNets
-
-
Liu, Y.1
Gu, Y.2
Zhang, H.3
Gong, W.4
Towsley, D.5
-
20
-
-
38149140661
-
-
University of Colorado at Boulder, Tech. Rep, August
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, "Low-resource routing attacks against anonymous systems," University of Colorado at Boulder, Tech. Rep., August 2007.
-
(2007)
Low-resource routing attacks against anonymous systems
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
21
-
-
27944507665
-
On flow correlation attacks and countermeasures in mix networks
-
May
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, "On flow correlation attacks and countermeasures in mix networks," in Proceedings of Workshop on Privacy Enhancing Technologies (PET), May 2004.
-
(2004)
Proceedings of Workshop on Privacy Enhancing Technologies (PET)
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
22
-
-
0032206931
-
An overview of quality-of-service routing for the next generation high-speed networks: Problems and solutions
-
November
-
S. Chen and K. Nahrstedt, "An overview of quality-of-service routing for the next generation high-speed networks: problems and solutions," IEEE Network, vol. 12, no. 6, pp. 64-79, November 1998.
-
(1998)
IEEE Network
, vol.12
, Issue.6
, pp. 64-79
-
-
Chen, S.1
Nahrstedt, K.2
-
29
-
-
24344470900
-
Analysis of an anonymity network for web browsing
-
June
-
M. Rennhard, S. Rafaeli, L. Mathy, B. Plattnet, and D. Hutchison, "Analysis of an anonymity network for web browsing," in Proceedings of the IEEE the 11-th InternationalWorkshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE), June 2002.
-
(2002)
Proceedings of the IEEE the 11-th InternationalWorkshop on Enabling Technologies: Infrastructure for Collaborative Enterprises (WET ICE)
-
-
Rennhard, M.1
Rafaeli, S.2
Mathy, L.3
Plattnet, B.4
Hutchison, D.5
-
30
-
-
38049095551
-
On tcp performance in flow-based mix networks
-
September
-
X. Fu, S. Jiang, W. Yu, S. Graham, and Y. Guan, "On tcp performance in flow-based mix networks," in Proceedings of the 3th IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC), September 2007.
-
(2007)
Proceedings of the 3th IEEE International Symposium on Dependable, Autonomic and Secure Computing (DASC)
-
-
Fu, X.1
Jiang, S.2
Yu, W.3
Graham, S.4
Guan, Y.5
|