-
1
-
-
3042699909
-
Measuring Anonymity: The Disclosure Attack
-
November/December
-
D. Agrawal and D. Kesdogan. Measuring Anonymity: The Disclosure Attack. IEEE Security & Privacy, 1(6):27-34, November/December 2003.
-
(2003)
IEEE Security & Privacy
, vol.1
, Issue.6
, pp. 27-34
-
-
Agrawal, D.1
Kesdogan, D.2
-
2
-
-
66549094226
-
Available Bandwidth Measurement as Simple as Running wget
-
March
-
D. Antoniades, M. Athanatos, A. Papadogiannakis, E. P. Markatos, and C. Dovrolis. Available Bandwidth Measurement as Simple as Running wget. In Proceedings of Passive and Active Measurements (PAM), March 2006.
-
(2006)
Proceedings of Passive and Active Measurements (PAM)
-
-
Antoniades, D.1
Athanatos, M.2
Papadogiannakis, A.3
Markatos, E.P.4
Dovrolis, C.5
-
3
-
-
14844331039
-
-
th ACM Conference on Computer and Communications Security (CCS), pages 110-120, October 2004.
-
th ACM Conference on Computer and Communications Security (CCS), pages 110-120, October 2004.
-
-
-
-
4
-
-
60349126188
-
-
S. Chakravarty, A. Stavrou, and A. D. Keromytis. Approximating a Global Passive Adversary Against Tor. Computer Science Department Technical Report cucs-038-08, Columbia University, August 2008.
-
S. Chakravarty, A. Stavrou, and A. D. Keromytis. Approximating a Global Passive Adversary Against Tor. Computer Science Department Technical Report cucs-038-08, Columbia University, August 2008.
-
-
-
-
5
-
-
0023861309
-
The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
-
D. Chaum. The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability. Journal of Cryptology, 1(1):65-75, 1988.
-
(1988)
Journal of Cryptology
, vol.1
, Issue.1
, pp. 65-75
-
-
Chaum, D.1
-
6
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
February
-
D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communincations of the ACM, 24(2):84-90, February 1981.
-
(1981)
Communincations of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
7
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Psuedonyms
-
D. L. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Psuedonyms. Communications of the ACM, 1981.
-
(1981)
Communications of the ACM
-
-
Chaum, D.L.1
-
8
-
-
85084161366
-
-
th USENIX Security Symposium, pages 303-319, August 2004.
-
th USENIX Security Symposium, pages 303-319, August 2004.
-
-
-
-
9
-
-
60349124185
-
-
C. Dovrolis and R. Prasad. Pathrate. http: //www.cc.gatech.edu/fac/ Constantinos. Dovrolis/pathrate.tar.gz, 2004.
-
C. Dovrolis and R. Prasad. Pathrate. http: //www.cc.gatech.edu/fac/ Constantinos. Dovrolis/pathrate.tar.gz, 2004.
-
-
-
-
10
-
-
0000655181
-
Using pathchar to Estimate Internet Link Characteristics
-
August
-
A. B. Downey. Using pathchar to Estimate Internet Link Characteristics. In Proceedings of ACM SIGCOMM, August 1999.
-
(1999)
Proceedings of ACM SIGCOMM
-
-
Downey, A.B.1
-
11
-
-
0005063385
-
Onion Routing for Anonymous and Private Internet Connections
-
D. Goldschlag, M. Reed, and P. Syverson. Onion Routing for Anonymous and Private Internet Connections. Communications of the ACM, 43(2):39-41, 1999.
-
(1999)
Communications of the ACM
, vol.43
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
13
-
-
33746568331
-
-
B. Hubert, T. Graf, G. Maxwell, R. Mook, M.Oosterhout, PSchroeder, J. Spaans, and P. Larroy. Linux Advanced Routing and Traffic Control HOWTO. http://lartc.org/howto.
-
Linux Advanced Routing and Traffic Control HOWTO
-
-
Hubert, B.1
Graf, T.2
Maxwell, G.3
Mook, R.4
Oosterhout, M.5
PSchroeder6
Spaans, J.7
Larroy, P.8
-
14
-
-
60349084506
-
-
V. Jacobson. PATHCHAR. http://www.caida.org/ tools/utilities/others/ pathchar/, 1997.
-
V. Jacobson. PATHCHAR. http://www.caida.org/ tools/utilities/others/ pathchar/, 1997.
-
-
-
-
15
-
-
0003729959
-
Congestion Control in Computer Networks
-
TR-654, September 1991
-
S. Keshav. Congestion Control in Computer Networks. UC Berkely Technical Report TR-654, September 1991.
-
UC Berkely Technical Report
-
-
Keshav, S.1
-
18
-
-
34250818849
-
-
PlanetLab. http://www.planet-lab.org/.
-
PlanetLab
-
-
-
19
-
-
0344152271
-
Bandwidth Estimation: Metrics, Measurement Techniques, and Tools
-
August
-
R. Prasad, M.Murray, C. Dovrolis, and K. Claffy. Bandwidth Estimation: Metrics, Measurement Techniques, and Tools. In Proceedings of IEEE Network, August 2003.
-
(2003)
Proceedings of IEEE Network
-
-
Prasad, R.1
Murray, M.2
Dovrolis, C.3
Claffy, K.4
-
20
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, July
-
J.-F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 10-29. Springer-Verlag, LNCS 2009, July 2000.
-
(2000)
LNCS
, pp. 10-29
-
-
Raymond, J.-F.1
-
22
-
-
27944452198
-
Passive Attack Analysis for Connection-Based Anonymity Systems
-
October
-
A. Serjantov and P. Sewell. Passive Attack Analysis for Connection-Based Anonymity Systems. In Proceedings of ESORICS, October 2003.
-
(2003)
Proceedings of ESORICS
-
-
Serjantov, A.1
Sewell, P.2
-
23
-
-
60349116688
-
Sprobe: Another tool for measuring bottleneck bandwidth
-
Stefan, Saroiu, and Krishna. Sprobe: Another tool for measuring bottleneck bandwidth. In Proceedings of InfoComm 2002, 2002.
-
(2002)
Proceedings of InfoComm 2002
-
-
Stefan, S.1
Krishna2
-
25
-
-
60349106288
-
-
A. Tirumala, F. Qin, J. Dugan, J. Feguson, and K. Gibbs. IPERF. http://dast.nlanr.net/projects/Iperf/, 1997.
-
A. Tirumala, F. Qin, J. Dugan, J. Feguson, and K. Gibbs. IPERF. http://dast.nlanr.net/projects/Iperf/, 1997.
-
-
-
-
26
-
-
0011653195
-
Unconditional Sender and Recipient Untraceability in Spite of Active Attacks
-
April
-
M. Waidner. Unconditional Sender and Recipient Untraceability in Spite of Active Attacks. In Proceedings of EUROCRYPT, pages 302-319, April 1989.
-
(1989)
Proceedings of EUROCRYPT
, pp. 302-319
-
-
Waidner, M.1
-
27
-
-
2442556704
-
-
th ACM Conference on Computer and Communications Security (CCS),pages 20-29, October 2003.
-
th ACM Conference on Computer and Communications Security (CCS),pages 20-29, October 2003.
-
-
-
|