-
1
-
-
54249148237
-
-
AN.ON: Anonymity online, http://anon.inf.tu-dresden.de/
-
AN.ON: Anonymity online, http://anon.inf.tu-dresden.de/
-
-
-
-
2
-
-
84947242344
-
-
Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, 2137, pp. 245-257. Springer, Heidelberg (2001)
-
Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245-257. Springer, Heidelberg (2001)
-
-
-
-
3
-
-
35048846490
-
-
Blum, A., Song, D., Venkataraman, S.: Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, 3224, pp. 258-277. Springer, Heidelberg (2004)
-
Blum, A., Song, D., Venkataraman, S.: Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds. In: Jonsson, E., Valdes, A., Almgren, M. (eds.) RAID 2004. LNCS, vol. 3224, pp. 258-277. Springer, Heidelberg (2004)
-
-
-
-
4
-
-
10444287344
-
Planetlab: An overlay testbed for broad-coverage services
-
Chun, B., Culler, D., Roscoe, T., Bavier, A., Peterson, L., Wawrzoniak, M., Bowman, M.: Planetlab: an overlay testbed for broad-coverage services. SIGCOMM Comput. Commun. Rev. 33(3), 3-12 (2003)
-
(2003)
SIGCOMM Comput. Commun. Rev
, vol.33
, Issue.3
, pp. 3-12
-
-
Chun, B.1
Culler, D.2
Roscoe, T.3
Bavier, A.4
Peterson, L.5
Wawrzoniak, M.6
Bowman, M.7
-
5
-
-
54249163150
-
-
Dai, W, Two attacks against freedom
-
Dai, W.: Two attacks against freedom
-
-
-
-
6
-
-
84904332394
-
Statistical disclosure attacks: Traffic confirmation in open environments
-
Gritzalis, Vimercati, Samarati, and Katsikas eds, Kluwer, Dordrecht
-
Danezis, G.: Statistical disclosure attacks: Traffic confirmation in open environments. In: Gritzalis, Vimercati, Samarati, and Katsikas (eds.) Proceedings of Security and Privacy in the Age of Uncertainty (SEC 2003), IFIP TC 11, pp. 421-426. Kluwer, Dordrecht (2003)
-
(2003)
Proceedings of Security and Privacy in the Age of Uncertainty (SEC 2003), IFIP
, vol.TC 11
, pp. 421-426
-
-
Danezis, G.1
-
7
-
-
85084161366
-
-
Dingledine, R., Mathewson, N., Syverson, PF.: Tor: The second-generation onion router. In: 13th USENIX Security Symposium (August 2004)
-
Dingledine, R., Mathewson, N., Syverson, PF.: Tor: The second-generation onion router. In: 13th USENIX Security Symposium (August 2004)
-
-
-
-
9
-
-
33646023117
-
An introduction to ROC analysis
-
Fawcett, T.: An introduction to ROC analysis. Pattern Recognition Letters 27(8), 861-874 (2006)
-
(2006)
Pattern Recognition Letters
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
-
11
-
-
84957796461
-
-
Hintz, A.: Fingerprinting websites using traffic analysis. In: Dingledine, R., Syverson. P.F. (eds.) PET 2002. LNCS, 2482, pp. 171-178. Springer, Heidelberg (2003)
-
Hintz, A.: Fingerprinting websites using traffic analysis. In: Dingledine, R., Syverson. P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 171-178. Springer, Heidelberg (2003)
-
-
-
-
13
-
-
27944498596
-
Dissecting BitTorrent: Five Months in a Torrents Lifetime
-
Izal, M., Urvoy-Keller, G., Biersack, E.W., Felber, P., Al Hamra, A., Garces-Erice, L.: Dissecting BitTorrent: Five Months in a Torrents Lifetime. Passive and Active Measurements 2004 (2004)
-
(2004)
Passive and Active Measurements
-
-
Izal, M.1
Urvoy-Keller, G.2
Biersack, E.W.3
Felber, P.4
Al Hamra, A.5
Garces-Erice, L.6
-
14
-
-
33846288517
-
-
Levine, B.N., Reiter, M.K., Wang, C., Wright, M.K.: Timing attacks in low-latency mix-based systems. In: Juels, A. (ed.) FC 2004. LNCS, 3110, pp. 251-265. Springer, Heidelberg (2004)
-
Levine, B.N., Reiter, M.K., Wang, C., Wright, M.K.: Timing attacks in low-latency mix-based systems. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 251-265. Springer, Heidelberg (2004)
-
-
-
-
15
-
-
54249169793
-
-
Mathewson. N., Dingledine. R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, 3424. Springer, Heidelberg (2005)
-
Mathewson. N., Dingledine. R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424. Springer, Heidelberg (2005)
-
-
-
-
18
-
-
38149130456
-
-
Murdoch, S.J., Zieliński, P.: Sampled traffic analysis by internet-exchange-level adversaries. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, 4776, pp. 167-183. Springer, Heidelberg (2007)
-
Murdoch, S.J., Zieliński, P.: Sampled traffic analysis by internet-exchange-level adversaries. In: Borisov, N., Golle, P. (eds.) PET 2007. LNCS, vol. 4776, pp. 167-183. Springer, Heidelberg (2007)
-
-
-
-
20
-
-
33646046492
-
The bittorrent p2p file-sharing system: Measurements and analysis
-
Castro, M, van Renesse, R, eds, IPTPS 2005, Springer, Heidelberg
-
Pouwelse, J.A., Garbacki, P., Epema, D.H.J., Sips, H.J.: The bittorrent p2p file-sharing system: Measurements and analysis. In: Castro, M., van Renesse, R. (eds.) IPTPS 2005. LNCS, vol. 3640, pp. 205-216. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3640
, pp. 205-216
-
-
Pouwelse, J.A.1
Garbacki, P.2
Epema, D.H.J.3
Sips, H.J.4
-
21
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks. Design Issues, and Open Problems
-
Federrath, H, ed, Designing Privacy Enhancing Technologies, Springer, Heidelberg
-
Raymond, J.-E: Traffic Analysis: Protocols, Attacks. Design Issues, and Open Problems. In: Federrath, H. (ed.) Designing Privacy Enhancing Technologies. LNCS, vol. 2009, pp. 10-29. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.-E.1
-
24
-
-
35248841429
-
-
Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, 2578, pp. 36-52. Springer, Heidelberg (2003)
-
Serjantov, A., Dingledine, R., Syverson, P.: From a trickle to a flood: Active attacks on several mix types. In: Petitcolas, F.A.P. (ed.) IH 2002. LNCS, vol. 2578, pp. 36-52. Springer, Heidelberg (2003)
-
-
-
-
25
-
-
0142250280
-
Passive attack analysis for connection-based anonymity systems
-
Snekkenes, E, Gollmann, D, eds, ESORICS 2003, Springer, Heidelberg
-
Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: Snekkenes, E., Gollmann, D. (eds.) ESORICS 2003. LNCS, vol. 2808, pp. 116-131. Springer, Heidelberg (2003)
-
(2003)
LNCS
, vol.2808
, pp. 116-131
-
-
Serjantov, A.1
Sewell, P.2
-
26
-
-
33750276494
-
Timing analysis in low-latency mix networks: Attacks and defenses
-
Gollmann, D, Meier, J, Sabelfeld, A, eds, ESORICS 2006, Springer, Heidelberg
-
Shmatikov, V., Wang, M.-H.: Timing analysis in low-latency mix networks: Attacks and defenses. In: Gollmann, D., Meier, J., Sabelfeld, A. (eds.) ESORICS 2006. LNCS, vol. 4189, pp. 18-33. Springer, Heidelberg (2006)
-
(2006)
LNCS
, vol.4189
, pp. 18-33
-
-
Shmatikov, V.1
Wang, M.-H.2
-
27
-
-
77049097177
-
-
Tabriz, P., Borisov, N.: Breaking the collusion detection mechanism of morphmix. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, 4258, pp. 368-383. Springer, Heidelberg (2006)
-
Tabriz, P., Borisov, N.: Breaking the collusion detection mechanism of morphmix. In: Danezis, G., Golle, P. (eds.) PET 2006. LNCS, vol. 4258, pp. 368-383. Springer, Heidelberg (2006)
-
-
-
-
28
-
-
84871199341
-
-
Wiangsripanawan, R., Susilo, W., Safavi-Naini, R.: Design principles for low latency anonymous network systems secure against timing attacks. In: Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW 2007), pp. 183-191. Australian Computer Society, Inc., Darlinghurst (2007)
-
Wiangsripanawan, R., Susilo, W., Safavi-Naini, R.: Design principles for low latency anonymous network systems secure against timing attacks. In: Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW 2007), pp. 183-191. Australian Computer Society, Inc., Darlinghurst (2007)
-
-
-
-
29
-
-
84954435745
-
-
Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending anonymous communication against passive logging attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003)
-
Wright, M., Adler, M., Levine, B.N., Shields, C.: Defending anonymous communication against passive logging attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy (May 2003)
-
-
-
|