-
1
-
-
48049085001
-
Privacy Preserving Communication in MANETs
-
San Diego, CA, June 18-21
-
H. Choi, P. McDaniel, and T. F. L. Porta, "Privacy Preserving Communication in MANETs," in Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) 2007, (San Diego, CA), June 18-21 2007.
-
(2007)
Fourth Annual IEEE Communications Society Conference on Sensor, Mesh and Ad Hoc Communications and Networks (SECON) 2007
-
-
Choi, H.1
McDaniel, P.2
Porta, T.F.L.3
-
2
-
-
18744391788
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
Zurich, Switzerland, Oct
-
D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Stamford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in the 5th International Symposium on Recent Advances in Intrusion Detection (RAID), (Zurich, Switzerland), Oct 2002.
-
(2002)
the 5th International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Donoho, D.1
Flesia, A.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Stamford, S.6
-
3
-
-
49549085794
-
Detection of Information Flows
-
accepted to IEEE Trans. on Information Theory
-
T. He and L. Tong, "Detection of Information Flows." accepted to IEEE Trans. on Information Theory, 2008.
-
(2008)
-
-
He, T.1
Tong, L.2
-
4
-
-
33748622050
-
MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks
-
Sept
-
Y. Zhang, W. Liu, W. Lou, and Y. Fang, "MASK: Anonymous On-Demand Routing in Mobile Ad Hoc Networks," IEEE Transactions on Wireless Communications, vol. 5, pp. 2376-2385, Sept 2006.
-
(2006)
IEEE Transactions on Wireless Communications
, vol.5
, pp. 2376-2385
-
-
Zhang, Y.1
Liu, W.2
Lou, W.3
Fang, Y.4
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
February
-
D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, vol. 24, pp. 84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
7
-
-
45249083605
-
-
P. Venkitasubramaniam, T. He, and L. Tong, Anonymous Networking amidst Eavesdroppers, IEEE Transactions on Information Theory, Special Issue on Information-Thoeretic Security, 54, pp. 2770-2784, June 2008.
-
P. Venkitasubramaniam, T. He, and L. Tong, "Anonymous Networking amidst Eavesdroppers," IEEE Transactions on Information Theory, Special Issue on Information-Thoeretic Security, vol. 54, pp. 2770-2784, June 2008.
-
-
-
-
8
-
-
0029232080
-
Holding intruders accountable on the internet
-
Oakland, CA, pp, May
-
S. Staniford-Chen and L. Heberlein, "Holding intruders accountable on the internet," in Proc. the 1995 IEEE Symposium on Security and Privacy, (Oakland, CA), pp. 39-49, May 1995.
-
(1995)
Proc. the 1995 IEEE Symposium on Security and Privacy
, pp. 39-49
-
-
Staniford-Chen, S.1
Heberlein, L.2
-
9
-
-
50249171389
-
Stepping Stone Attack Attribution in Non-cooperative IP Networks
-
Phoenix, AZ, April
-
L. Zhang, A. Persaud, A. Johson, and Y. Guan, "Stepping Stone Attack Attribution in Non-cooperative IP Networks," in Proc. of the 25th IEEE International Performance Computing and Communications Conference (IPCCC 2006), (Phoenix, AZ), April 2006.
-
(2006)
Proc. of the 25th IEEE International Performance Computing and Communications Conference (IPCCC 2006)
-
-
Zhang, L.1
Persaud, A.2
Johson, A.3
Guan, Y.4
-
10
-
-
44049102446
-
Detecting Information Flows: Improving Chaff Tolerance by Joint Detection
-
Baltimore, MD, March
-
T. He and L. Tong, "Detecting Information Flows: Improving Chaff Tolerance by Joint Detection," in Proc. 2007 Conference on Information Sciences and Systems, (Baltimore, MD), March 2007.
-
(2007)
Proc. 2007 Conference on Information Sciences and Systems
-
-
He, T.1
Tong, L.2
-
11
-
-
17144371860
-
-
V. L. L. Thing and H. C. J. Lee, IP Traceback for Wireless Ad-hoc Networks, in Proc. 60th IEEE Vehicular Technology Conference, 5, (Los Angeles, CA), pp. 3286-3290, September 26-29 2004.
-
V. L. L. Thing and H. C. J. Lee, "IP Traceback for Wireless Ad-hoc Networks," in Proc. 60th IEEE Vehicular Technology Conference, vol. 5, (Los Angeles, CA), pp. 3286-3290, September 26-29 2004.
-
-
-
-
12
-
-
62349089020
-
ASR: Anonymous and Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks
-
H. Choi, W. Enck, J. Shin, P. McDanial, and T. F. L. Porta, "ASR: Anonymous and Secure Reporting of Traffic Forwarding Activity in Mobile Ad Hoc Networks," ACM/Kluwer Wireless Networks (WINET), 2007.
-
(2007)
ACM/Kluwer Wireless Networks (WINET)
-
-
Choi, H.1
Enck, W.2
Shin, J.3
McDanial, P.4
Porta, T.F.L.5
-
13
-
-
33745802064
-
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
-
Sophia Antipolis, France, Sept
-
A. Blum, D. Song, and S. Venkataraman, "Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds," in the 7th International Symposium on Recent Advances in Intrusion Detection (RAID), (Sophia Antipolis, France), Sept 2004.
-
(2004)
the 7th International Symposium on Recent Advances in Intrusion Detection (RAID)
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
14
-
-
51449097677
-
On Security-Aware Transmission Scheduling
-
Las Vegas, NV, March
-
T. He, A. Agaskar, and L. Tong, "On Security-Aware Transmission Scheduling," in Proc. 2008 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'08), (Las Vegas, NV), March 2008.
-
(2008)
Proc. 2008 IEEE International Conference on Acoustics, Speech, and Signal Processing (ICASSP'08)
-
-
He, T.1
Agaskar, A.2
Tong, L.3
|