-
1
-
-
33846272939
-
-
Hostap driver. http://hostap.epitest.fi/.
-
Hostap driver
-
-
-
2
-
-
57349084351
-
-
libgcrypt. http://directory.fsf.org/project/libgcrypt/.
-
libgcrypt. http://directory.fsf.org/project/libgcrypt/.
-
-
-
-
4
-
-
57349193944
-
-
roofnet. http://pdos.csail.mit.edu/roofnet/doku.php.
-
roofnet. http://pdos.csail.mit.edu/roofnet/doku.php.
-
-
-
-
6
-
-
57349100545
-
-
Ieee 802.11i-2004 amendment to ieee std 802.11, 2004. standards.ieee.org/getieee802/download/802.lli-2004.pdf
-
Ieee 802.11i-2004 amendment to ieee std 802.11, 2004. standards.ieee.org/getieee802/download/802.lli-2004.pdf.
-
-
-
-
7
-
-
4043116941
-
-
Abadi, M., and Fournet, C. Private authentication. Theor. Cam-put. Sci. 322, 3 (2004), 427-476.
-
Abadi, M., and Fournet, C. Private authentication. Theor. Cam-put. Sci. 322, 3 (2004), 427-476.
-
-
-
-
8
-
-
34548314470
-
-
Armknecht, F., Girão, J., Matos, A., and AguiAR, R. L. Who said that? privacy at link layer. In INFOCOM (2007), IEEE.
-
Armknecht, F., Girão, J., Matos, A., and AguiAR, R. L. Who said that? privacy at link layer. In INFOCOM (2007), IEEE.
-
-
-
-
9
-
-
57349125375
-
-
Bellare, M., Boldyreva, A., Desai, A., and PoINTCHEVAL, D. Key-privacy in public-key encryption. In ASIA CRYPT (2001).
-
Bellare, M., Boldyreva, A., Desai, A., and PoINTCHEVAL, D. Key-privacy in public-key encryption. In ASIA CRYPT (2001).
-
-
-
-
10
-
-
57349121390
-
Forward-security in private-key cryptography. Topics in Cryptology - CT-RSA'03
-
BELLARE, M., AND Yee, B. Forward-security in private-key cryptography. Topics in Cryptology - CT-RSA'03, LNCS 2612 (2003).
-
(2003)
LNCS
, vol.2612
-
-
BELLARE, M.1
Yee, B.2
-
11
-
-
57349160902
-
-
Chandra, R., Mahajan, R., Padmanabhan, V., and Zhang, M. CRAWDAD data set microsoft/osdi2006 (v. 2007-05-23). http://crawdad.cs.dartmouth.edu.
-
Chandra, R., Mahajan, R., Padmanabhan, V., and Zhang, M. CRAWDAD data set microsoft/osdi2006 (v. 2007-05-23). http://crawdad.cs.dartmouth.edu.
-
-
-
-
12
-
-
57349160900
-
-
Cheng, Y.-C., Bellardo, J., Benko;, P., Snoeren, A. C, Voelker, G. M., and Savage, S. Jigsaw: solving the puzzle of enterprise 802.11 analysis. SIGCOMM CCR (2006).
-
Cheng, Y.-C., Bellardo, J., Benko;, P., Snoeren, A. C, Voelker, G. M., and Savage, S. Jigsaw: solving the puzzle of enterprise 802.11 analysis. SIGCOMM CCR (2006).
-
-
-
-
13
-
-
35448936042
-
-
Cox, L. P., Dalton, A., and Marupadi, V. SmokeScreen: Flexible privacy controls for presence-sharing. In MobiSys (2007).
-
Cox, L. P., Dalton, A., and Marupadi, V. SmokeScreen: Flexible privacy controls for presence-sharing. In MobiSys (2007).
-
-
-
-
14
-
-
85084161366
-
-
Dingledine, R., Mathewson, N., and Syverson, P. Tor: The second-generation onion router. In USENIX Security (2004).
-
Dingledine, R., Mathewson, N., and Syverson, P. Tor: The second-generation onion router. In USENIX Security (2004).
-
-
-
-
15
-
-
85092666359
-
-
Greenstein, B., Gummadi, R., Pang, J.. Chen, M. Y., Kohno, T., Seshan, S., and Wetherall, D. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in an Era of Wireless Devices. In HotOS XI (2007).
-
Greenstein, B., Gummadi, R., Pang, J.. Chen, M. Y., Kohno, T., Seshan, S., and Wetherall, D. Can Ferris Bueller Still Have His Day Off? Protecting Privacy in an Era of Wireless Devices. In HotOS XI (2007).
-
-
-
-
16
-
-
23944520444
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
GRUTESER, M., AND GRUNWALD, D. Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. A CM MONET 10 (2005).
-
(2005)
A CM MONET
, vol.10
-
-
GRUTESER, M.1
GRUNWALD, D.2
-
17
-
-
34247389249
-
A framework for location privacy in wireless networks
-
April
-
Hu, Y.-C, AND WANG, H. J. A framework for location privacy in wireless networks. In SIGCOMM Asia Workshop (April 2005).
-
(2005)
SIGCOMM Asia Workshop
-
-
Hu, Y.-C.1
WANG, H.J.2
-
18
-
-
35449007284
-
-
Jiang, T., Wang, H., and Hu, Y.-C. Preserving location privacy in wireless LANs. In MobiSys (2007).
-
Jiang, T., Wang, H., and Hu, Y.-C. Preserving location privacy in wireless LANs. In MobiSys (2007).
-
-
-
-
20
-
-
0040291388
-
The click modular router
-
August
-
Kohler, E., Morris, R., Chen, B., Jannotti, J., AND KAASHOEK, M. F. The click modular router. ACM Transactions on Computer Systems 18, 3 (August 2000), 263-297.
-
(2000)
ACM Transactions on Computer Systems
, vol.18
, Issue.3
, pp. 263-297
-
-
Kohler, E.1
Morris, R.2
Chen, B.3
Jannotti, J.4
KAASHOEK, M.F.5
-
21
-
-
37749006403
-
-
Pang, J., Greenstein, B., Gummadi, R., Seshan, S., and Wetherall, D. 802.11 user fingerprinting. In MobiCom (Sept. 2007).
-
Pang, J., Greenstein, B., Gummadi, R., Seshan, S., and Wetherall, D. 802.11 user fingerprinting. In MobiCom (Sept. 2007).
-
-
-
-
22
-
-
84866369989
-
Tryst: The case for confidential service discovery
-
Pang, J., Greenstein, B., McCoy, D., Seshan, S., AND WETHERALL, D. Tryst: The case for confidential service discovery. In HotNets (2007).
-
(2007)
HotNets
-
-
Pang, J.1
Greenstein, B.2
McCoy, D.3
Seshan, S.4
WETHERALL, D.5
-
23
-
-
37749047975
-
Robust location distinction using temporal link signatures
-
Patwari, N., AND Kasera, S. K. Robust location distinction using temporal link signatures. In MobiCom (2007).
-
(2007)
MobiCom
-
-
Patwari, N.1
Kasera, S.K.2
-
24
-
-
36849068013
-
Measurement-based models of delivery and interference in static wireless networks
-
Reis, C., Mahajan, R., Rodrig, M., Wetherall, D., AND ZAHORJAN, J. Measurement-based models of delivery and interference in static wireless networks. SIGCOMM CCR 36, 4 (2006).
-
(2006)
SIGCOMM CCR
, vol.36
, pp. 4
-
-
Reis, C.1
Mahajan, R.2
Rodrig, M.3
Wetherall, D.4
ZAHORJAN, J.5
-
25
-
-
57349143038
-
-
Rodrig, M., Reis, C., Mahajan, R., Wetherall, D., Zahorjan, J., and Lazowska, E. CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17). http://crawdad.cs.dartmouth. edu.
-
Rodrig, M., Reis, C., Mahajan, R., Wetherall, D., Zahorjan, J., and Lazowska, E. CRAWDAD data set uw/sigcomm2004 (v. 2006-10-17). http://crawdad.cs.dartmouth. edu.
-
-
-
-
26
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
Saponas, T. S., Lester, J., Hartung, C., AgARWAL, S., AND Kohno, T. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In USENIX Security (2007).
-
(2007)
USENIX Security
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
AgARWAL, S.4
Kohno, T.5
-
27
-
-
34247328638
-
Location privacy in wireless personal area networks
-
SINGELÉE, D., AND Preneel, B. Location privacy in wireless personal area networks. In WiSe (2006).
-
(2006)
WiSe
-
-
SINGELÉE, D.1
Preneel, B.2
-
28
-
-
85084161110
-
-
Song, D. X., Wagner, D., and Tian, X. Timing analysis of keystrokes and timing attacks on ssh. In USENIX Security (2001).
-
Song, D. X., Wagner, D., and Tian, X. Timing analysis of keystrokes and timing attacks on ssh. In USENIX Security (2001).
-
-
-
-
29
-
-
57349149762
-
-
Song, J.. Poovendran, R., Lee, J., and Iwata, T. The AES-CMAC algorithm. RFC 4493, June 2006.
-
Song, J.. Poovendran, R., Lee, J., and Iwata, T. The AES-CMAC algorithm. RFC 4493, June 2006.
-
-
-
-
30
-
-
84864253438
-
-
Sun, Q., Simon, D. R., Wang, Y.-M., Russell, W., Padmanabhan, V. N., and Qiu, L. Statistical identification of encrypted web browsing traffic. In IEEE Security and Privacy (2002).
-
Sun, Q., Simon, D. R., Wang, Y.-M., Russell, W., Padmanabhan, V. N., and Qiu, L. Statistical identification of encrypted web browsing traffic. In IEEE Security and Privacy (2002).
-
-
-
-
31
-
-
38149097247
-
Security associations in personal networks: A comparative analysis
-
Tech. Rep. NRC-TR-2007-004, Nokia Research Center, Jan
-
SUOMALAINEN, J., VALKONEN, J., AND ASOKAN, N. Security associations in personal networks: A comparative analysis. Tech. Rep. NRC-TR-2007-004, Nokia Research Center, Jan. 2007.
-
(2007)
-
-
SUOMALAINEN, J.1
VALKONEN, J.2
ASOKAN, N.3
-
32
-
-
57349183424
-
-
Tao, P., Rudys, A., Ladd, A., and Wallach, D. Wireless LAN location sensing for security application. In WISE (2003).
-
Tao, P., Rudys, A., Ladd, A., and Wallach, D. Wireless LAN location sensing for security application. In WISE (2003).
-
-
-
-
33
-
-
50249161557
-
-
Wright, C, Ballard, L., Monrose, F., and MASSON, G. Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In USENIX Security (Aug. 2007).
-
Wright, C, Ballard, L., Monrose, F., and MASSON, G. Language identification of encrypted VoIP traffic: Alejandra y Roberto or Alice and Bob? In USENIX Security (Aug. 2007).
-
-
-
-
34
-
-
33845735523
-
-
Wright, C., Monrose, F., and Masson, G. On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research (Aug. 2006).
-
Wright, C., Monrose, F., and Masson, G. On inferring application protocol behaviors in encrypted network traffic. Journal of Machine Learning Research (Aug. 2006).
-
-
-
|