-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 24, no. 2, pp. 84-88, 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum, D.1
-
3
-
-
33745773302
-
Tracking anonymous peer-to-peer VoIP calls on the internet
-
X. Wang. S. Chen, and S. Jajodia, "Tracking anonymous peer-to-peer VoIP calls on the internet," in Proceedings of ACM CCS, 2005.
-
(2005)
Proceedings of ACM CCS
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
4
-
-
77949478065
-
IETF draft: Mixmastcr protocol version 2
-
U. Moeller, L. Cottrell, P. Palfrader. and L. Sassaman, "IETF draft: Mixmastcr protocol version 2," http://www.ictf.org/internet-drafts/draft- sassaman-mixmaster-03.txt, 2004.
-
(2004)
-
-
Moeller, U.1
Cottrell, L.2
Palfrader, P.3
Sassaman, L.4
-
5
-
-
0032074579
-
Anonymous connections and onion routing
-
M. Reed, P. Syverson, and D. Goldschlag, "Anonymous connections and onion routing," IEEE Journal on Selected Areas in Communications, vol. 16, no. 4, pp. 482-494, 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
9
-
-
0029732709
-
Bits through queues
-
V. Anantharam and S. Verdu, "Bits through queues," IEEE Trans, on Information Theory, vol. 42, no. 1, pp. 4-18, 1996.
-
(1996)
IEEE Trans, on Information Theory
, vol.42
, Issue.1
, pp. 4-18
-
-
Anantharam, V.1
Verdu, S.2
-
11
-
-
84940658470
-
Relay secrecy in wireless networks with eavesdroppers
-
P. Venkitasubramaniam, T. He, and L. Tong, "Relay secrecy in wireless networks with eavesdroppers," in Proceedings of Allerton Gonference on Communication, Control and Computing, 2006.
-
(2006)
Proceedings of Allerton Gonference on Communication, Control and Computing
-
-
Venkitasubramaniam, P.1
He, T.2
Tong, L.3
-
14
-
-
34547239349
-
Freedom systems 2.0 architecture
-
Inc, December
-
P. Boucher. A. Shostack, and I. Goldberg, "Freedom systems 2.0 architecture," White paper, Zero Knowledge Systems. Inc., December 2000.
-
(2000)
White paper, Zero Knowledge Systems
-
-
Boucher, P.1
Shostack, A.2
Goldberg, I.3
-
18
-
-
0037629738
-
On effectiveness of link padding for statistical traffic analysis attacks
-
X. Fu, B. Graham, R. Bcttati, and W. Zhao, "On effectiveness of link padding for statistical traffic analysis attacks," in Proceedings of IEEE ICDCS, 2003.
-
(2003)
Proceedings of IEEE ICDCS
-
-
Fu, X.1
Graham, B.2
Bcttati, R.3
Zhao, W.4
-
19
-
-
70349301114
-
Timing analysis in low-latency mix networks: Attacks and defenses?
-
V. Shniatikov and M. Wang. "Timing analysis in low-latency mix networks: attacks and defenses?" in Proceedings of ESORICS, 2006.
-
(2006)
Proceedings of ESORICS
-
-
Shniatikov, V.1
Wang, M.2
-
25
-
-
0019552967
-
Expected Length of the Longest Probe Sequence in Hash Code Searching
-
G. H. Gonnet, "Expected Length of the Longest Probe Sequence in Hash Code Searching," Journal of the ACM. vol. 28, no. 2, pp. 289-304, 1981.
-
(1981)
Journal of the ACM
, vol.28
, Issue.2
, pp. 289-304
-
-
Gonnet, G.H.1
-
26
-
-
0004155132
-
The power of two choices in randomized load balancing,
-
PhD Thesis, University of Califonia at Berkeley
-
M. D. Mitzenmacher, "The power of two choices in randomized load balancing," PhD Thesis, University of Califonia at Berkeley 1996.
-
(1996)
-
-
Mitzenmacher, M.D.1
-
28
-
-
45249083605
-
Anonymous networking amidst eavesdroppers
-
P. Venkitasubramaniam. T. He, and L. Tong, "Anonymous networking amidst eavesdroppers," IEEE Transactions on Information Theory, vol. 54, no. 6, pp. 2770-2784, 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, Issue.6
, pp. 2770-2784
-
-
Venkitasubramaniam, P.1
He, T.2
Tong, L.3
-
30
-
-
0031383380
-
Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes
-
M. E. Crovella and A. Bestavros, "Self-Similarity in World Wide Web Traffic: Evidence and Possible Causes," IEEE/ACM Transactions on Networking, vol. 5. no. 6, pp. 835-846, 1997.
-
(1997)
IEEE/ACM Transactions on Networking
, vol.5
, Issue.6
, pp. 835-846
-
-
Crovella, M.E.1
Bestavros, A.2
-
31
-
-
70349265700
-
-
N. L. for Applied Network Research., Auckland-viii data set, http://pma.nlanr.net/Spccial/auck8.html, 2003.
-
N. L. for Applied Network Research., "Auckland-viii data set," http://pma.nlanr.net/Spccial/auck8.html, 2003.
-
-
-
|