-
2
-
-
77955220391
-
Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces
-
February
-
S. Coull, C. Wright, F. Monrose, M. Collins, and M. Reiter. Playing Devil's Advocate: Inferring Sensitive Information from Anonymized Network Traces. In Proceedings of the Network and Distributed System Security Symposium, February 2007.
-
(2007)
Proceedings of the Network and Distributed System Security Symposium
-
-
Coull, S.1
Wright, C.2
Monrose, F.3
Collins, M.4
Reiter, M.5
-
3
-
-
84864253438
-
Statistical Identification of Encrypted Web Browsing Traffic
-
Q. Sun, D. R. Simon, Y. Wang, W Russell, V. N. Padmanabhan, and L. Qiu. Statistical Identification of Encrypted Web Browsing Traffic. In Proceedings of the IEEE Symposium on Security and Privacy, 2002.
-
(2002)
Proceedings of the IEEE Symposium on Security and Privacy
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
4
-
-
84937846451
-
On Web Browsing Privacy in Anonymized NetFlows
-
August
-
S. Coull, M.P. Collins, C.V. Wright, F. Monrose, and M. Reiter. On Web Browsing Privacy in Anonymized NetFlows. In Proceedings of the USENIX Security Symposium, August 2007.
-
(2007)
Proceedings of the USENIX Security Symposium
-
-
Coull, S.1
Collins, M.P.2
Wright, C.V.3
Monrose, F.4
Reiter, M.5
-
6
-
-
33847256529
-
The devil and packet trace anonymization
-
Ruoming Pang, Mark Allman, Vern Paxson, and Jason Lee. The devil and packet trace anonymization. ACM SIGCOMM Computer Communications Review, 36(1):29-38, 2006.
-
(2006)
ACM SIGCOMM Computer Communications Review
, vol.36
, Issue.1
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
10
-
-
0024914229
-
Security-control methods for statistical databases: A comparative study
-
Nabil R. Adam and John C. Worthmann. Security-control methods for statistical databases: a comparative study. ACM Computing Surveys, 21(4):515-556,1989.
-
(1989)
ACM Computing Surveys
, vol.21
, Issue.4
, pp. 515-556
-
-
Adam, N.R.1
Worthmann, J.C.2
-
13
-
-
33749607006
-
-
Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrishnan Venkitasubramaniam. l-Diversity: Privacy Beyond k-Anonymity. In Proceedings of the 22nd IEEE International Conference on Data Engineering, 2006.
-
Ashwin Machanavajjhala, Johannes Gehrke, Daniel Kifer, and Muthuramakrishnan Venkitasubramaniam. l-Diversity: Privacy Beyond k-Anonymity. In Proceedings of the 22nd IEEE International Conference on Data Engineering, 2006.
-
-
-
-
14
-
-
70349241019
-
-
MAWI Working Group Traffic Archive
-
MAWI Working Group Traffic Archive. http://tracer.csl.sony.co.jp/mawi/.
-
-
-
-
18
-
-
10444260259
-
A High-level Programming Environment for Packet Trace Anonymization and Transformation
-
Ruoming Pang and Vern Paxson. A High-level Programming Environment for Packet Trace Anonymization and Transformation. In Proceedings of ACM SIGCOMM, 2003.
-
(2003)
Proceedings of ACM SIGCOMM
-
-
Pang, R.1
Paxson, V.2
-
20
-
-
84937697866
-
-
Lobster web page. http : //www. ist-lobster. org/publications/ deliverables/D1.1a.pdf.
-
Lobster web page
-
-
|