-
1
-
-
37749006403
-
-
MobiCom 2007
-
Pang, J., Greenstein, B., Gummadi, R., Seshan, S., Wetherall, D.: 802.11 user fingerprinting. In: MobiCom (2007)
-
802.11 user fingerprinting
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
2
-
-
50249166667
-
-
Aura, T., Lindqvist, J., Roe, M., Mohammed, A.: Chattering laptops. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, 5134, pp. 167-186. Springer, Heidelberg (2008)
-
Aura, T., Lindqvist, J., Roe, M., Mohammed, A.: Chattering laptops. In: Borisov, N., Goldberg, I. (eds.) PETS 2008. LNCS, vol. 5134, pp. 167-186. Springer, Heidelberg (2008)
-
-
-
-
3
-
-
34548314470
-
Who said that? Privacy at link layer
-
Los Alamitos
-
Armknecht, F., Girão, J., Matos, A., Aguiar, R.L.: Who said that? Privacy at link layer. In: INFOCOM. IEEE, Los Alamitos (2007)
-
(2007)
INFOCOM. IEEE
-
-
Armknecht, F.1
Girão, J.2
Matos, A.3
Aguiar, R.L.4
-
4
-
-
69949150825
-
-
Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S., Wetherall, D.: Improving wireless privacy with an identifier-free link layer protocol. In: Mobisys (2008)
-
Greenstein, B., McCoy, D., Pang, J., Kohno, T., Seshan, S., Wetherall, D.: Improving wireless privacy with an identifier-free link layer protocol. In: Mobisys (2008)
-
-
-
-
6
-
-
60149092949
-
-
Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: MobiCom (2008)
-
Brik, V., Banerjee, S., Gruteser, M., Oh, S.: Wireless device identification with radiometric signatures. In: MobiCom (2008)
-
-
-
-
8
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
Saponas, T.S., Lester, J., Hartung, C., Agarwal, S., Kohno, T.: Devices that tell on you: Privacy trends in consumer ubiquitous computing. In: Proc. 16th USENIX Security Symposium (2007)
-
(2007)
Proc. 16th USENIX Security Symposium
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
10
-
-
34547350876
-
-
Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In: CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security. ACM, New York (2006)
-
Liberatore, M., Levine, B.N.: Inferring the source of encrypted HTTP connections. In: CCS 2006: Proceedings of the 13th ACM conference on Computer and communications security. ACM, New York (2006)
-
-
-
-
11
-
-
84864253438
-
Statistical identification of encrypted web browsing traffic
-
Sun, Q., Simon, D.R., Wang, Y.M., Russell, W., Padmanabhan, V.N., Qiu, L.: Statistical identification of encrypted web browsing traffic. In: IEEE Symposium on Security and Privacy (2002)
-
(2002)
IEEE Symposium on Security and Privacy
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.M.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
12
-
-
50249161557
-
Language identification of encrypted VoIP traffic: Alejandra y roberto or Alice and Bob?
-
Wright, C., Ballard, L., Monrose, F., Masson, G.: Language identification of encrypted VoIP traffic: Alejandra y roberto or Alice and Bob? In: Proceedings of the 16th USENIX Security Symposium (2007)
-
(2007)
Proceedings of the 16th USENIX Security Symposium
-
-
Wright, C.1
Ballard, L.2
Monrose, F.3
Masson, G.4
-
13
-
-
50249140706
-
-
can: Uncovering spoken phrases in encrypted VoIP conversations
-
Wright, C.V., Ballard, L., Coull, S.E., Monrose, F., Masson, G.M.: Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations (2008)
-
(2008)
Spot me if you
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
15
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
of the ACM February
-
Chaum, D.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM (February 1981)
-
(1981)
Communications
-
-
Chaum, D.1
-
16
-
-
84955557456
-
-
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, 1174, pp. 137-150. Springer, Heidelberg (1996)
-
Goldschlag, D.M., Reed, M.G., Syverson, P.F.: Hiding routing information. In: Anderson, R. (ed.) IH 1996. LNCS, vol. 1174, pp. 137-150. Springer, Heidelberg (1996)
-
-
-
-
17
-
-
23944520444
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
Gruteser, M., Grunwald, D.: Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis. ACM MONET 10 (2005)
-
(2005)
ACM MONET
, vol.10
-
-
Gruteser, M.1
Grunwald, D.2
-
18
-
-
38148998597
-
Enhancing privacy with shared pseudo random sequences
-
Christianson, B, Crispo, B, Malcolm, J.A, Roe, M, eds, Security Protocols 2005, Springer, Heidelberg
-
Arkko, J., Nikander, P., Nslund, M.: Enhancing privacy with shared pseudo random sequences. In: Christianson, B., Crispo, B., Malcolm, J.A., Roe, M. (eds.) Security Protocols 2005. LNCS, vol. 4631, pp. 197-203. Springer, Heidelberg (2007)
-
(2007)
LNCS
, vol.4631
, pp. 197-203
-
-
Arkko, J.1
Nikander, P.2
Nslund, M.3
-
20
-
-
27544460278
-
Remote physical device fingerprinting
-
IEEE Computer Society, Los Alamitos
-
Kohno, T., Broido, A., Claffy, K.: Remote physical device fingerprinting. In: IEEE Symposium on Security and Privacy, pp. 211-225. IEEE Computer Society, Los Alamitos (2005)
-
(2005)
IEEE Symposium on Security and Privacy
, pp. 211-225
-
-
Kohno, T.1
Broido, A.2
Claffy, K.3
-
21
-
-
34547339276
-
Hot or not: Revealing hidden services by their clock skew
-
October
-
Murdoch, S.J.: Hot or not: Revealing hidden services by their clock skew. In: Proceedings of CCS 2006 (October 2006)
-
(2006)
Proceedings of CCS
-
-
Murdoch, S.J.1
-
22
-
-
65249165857
-
An improved clock-skew measurement technique for revealing hidden services
-
San Jose, CA, US July
-
Zander, S., Murdoch, S.J.: An improved clock-skew measurement technique for revealing hidden services. In: Proceedings of the 17th USENIX Security Symposium, San Jose, CA, US (July 2008)
-
(2008)
Proceedings of the 17th USENIX Security Symposium
-
-
Zander, S.1
Murdoch, S.J.2
-
23
-
-
69949153658
-
-
Gerdes, R., Daniels, T., Mina, M., Russell, S.: Device identification via analog signal fingerprinting: A matched filter approach. In: NDSS (2006)
-
Gerdes, R., Daniels, T., Mina, M., Russell, S.: Device identification via analog signal fingerprinting: A matched filter approach. In: NDSS (2006)
-
-
-
-
25
-
-
69949180562
-
-
p0f, http://lcamtuf.coredump.cx/p0f.shtml
-
p0f, http://lcamtuf.coredump.cx/p0f.shtml
-
-
-
-
26
-
-
85018108881
-
Passive data link layer 802.11 wireless device driver fingerprinting
-
Vancouver, Canada, July-August
-
Franklin, J., McCoy, D., Tabriz, P., Neagoe, V., Randwyk, J.V., Sicker, D.: Passive data link layer 802.11 wireless device driver fingerprinting. In: USENIX Security Symposium, Vancouver, Canada, July-August 2006, pp. 167-178 (2006)
-
(2006)
USENIX Security Symposium
, pp. 167-178
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.V.5
Sicker, D.6
-
27
-
-
24944591431
-
Place lab: Device positioning using radio beacons in the wild
-
Gellersen, H.-W, Want, R, Schmidt, A, eds, PERVASIVE 2005, Springer, Heidelberg
-
Smith, I., Scott, J., Sohn, T., Howard, J., Hughes, J., Potter, F., Tabert, J., Powledge, P., Borriello, G., Schilit, B.: Place lab: Device positioning using radio beacons in the wild. In: Gellersen, H.-W., Want, R., Schmidt, A. (eds.) PERVASIVE 2005. LNCS, vol. 3468, pp. 116-133. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3468
, pp. 116-133
-
-
Smith, I.1
Scott, J.2
Sohn, T.3
Howard, J.4
Hughes, J.5
Potter, F.6
Tabert, J.7
Powledge, P.8
Borriello, G.9
Schilit, B.10
-
29
-
-
0033872896
-
RADAR: An in-building RF-based user location and tracking system
-
Bahl, P., Padmanabhan, V.N.: RADAR: An in-building RF-based user location and tracking system. In: INFOCOM (2), pp. 775-784 (2000)
-
(2000)
INFOCOM
, vol.2
, pp. 775-784
-
-
Bahl, P.1
Padmanabhan, V.N.2
-
30
-
-
33749041246
-
Practical robust localization over large-scale 802.11 wireless networks
-
Philadelphia, PA September, to appear
-
Haeberlen, A., Flannery, E., Ladd, A.M., Rudys, A., Wallach, D.S., Kavraki, L.E.: Practical robust localization over large-scale 802.11 wireless networks. In: Proceedings of the Tenth ACM International Conference on Mobile Computing and Networking (MOBICOM), Philadelphia, PA (September 2002) (to appear)
-
(2002)
Proceedings of the Tenth ACM International Conference on Mobile Computing and Networking (MOBICOM)
-
-
Haeberlen, A.1
Flannery, E.2
Ladd, A.M.3
Rudys, A.4
Wallach, D.S.5
Kavraki, L.E.6
-
32
-
-
0003574092
-
-
Springer, Heidelberg
-
Hofmann-Wellenhof, B., Lichtenegger, H., Collins, J.: Global Positioning System: Theory and Practice. Springer, Heidelberg (1997)
-
(1997)
Global Positioning System: Theory and Practice
-
-
Hofmann-Wellenhof, B.1
Lichtenegger, H.2
Collins, J.3
-
33
-
-
24944551633
-
-
Yamasaki, R., Ogino, A., Tamaki, T., Uta, T., Matsuzawa, N., Kato, T.: TDOA location system for IEEE 802.11b WLAN. In: IEEE WCNC (2005)
-
Yamasaki, R., Ogino, A., Tamaki, T., Uta, T., Matsuzawa, N., Kato, T.: TDOA location system for IEEE 802.11b WLAN. In: IEEE WCNC (2005)
-
-
-
-
34
-
-
85018204196
-
Anonymous usage of location-based services through spatial and temporal cloaking
-
ACM Press, New York
-
Gruteser, M., Grunwald, D.: Anonymous usage of location-based services through spatial and temporal cloaking. In: MobiSys 2003: Proc. 1st international conference on Mobile systems, applications and services, pp. 31-42. ACM Press, New York (2003)
-
(2003)
MobiSys 2003: Proc. 1st international conference on Mobile systems, applications and services
, pp. 31-42
-
-
Gruteser, M.1
Grunwald, D.2
-
35
-
-
35449007284
-
-
Jiang, T., Wang, H., Hu, Y.C.: Preserving location privacy in wireless LANs. In: MobiSys (2007)
-
Jiang, T., Wang, H., Hu, Y.C.: Preserving location privacy in wireless LANs. In: MobiSys (2007)
-
-
-
-
37
-
-
33750303851
-
Measurement based models of delivery and interference in static wireless networks
-
Reis, C., Mahajan, R., Rodrig, M., Wetherall, D., Zahorjan, J.: Measurement based models of delivery and interference in static wireless networks. SIGCOMM Comput. Commun. Rev. 36(4) (2006)
-
(2006)
SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.4
-
-
Reis, C.1
Mahajan, R.2
Rodrig, M.3
Wetherall, D.4
Zahorjan, J.5
-
38
-
-
0003684449
-
-
Springer, Heidelberg
-
Hastie, T., Tibshirani, R., Friedman, J.H.: The Elements of Statistical Learning. Springer, Heidelberg (2001)
-
(2001)
The Elements of Statistical Learning
-
-
Hastie, T.1
Tibshirani, R.2
Friedman, J.H.3
-
40
-
-
0001820920
-
X-means: Extending k-means with efficient estimation of the number of clusters
-
Morgan Kaufmann, San Francisco
-
Dan Pelleg, A.M.: X-means: Extending k-means with efficient estimation of the number of clusters. In: Proceedings of the Seventeenth International Conference on Machine Learning, pp. 727-734. Morgan Kaufmann, San Francisco (2000)
-
(2000)
Proceedings of the Seventeenth International Conference on Machine Learning
, pp. 727-734
-
-
Dan Pelleg, A.M.1
-
41
-
-
0003414440
-
Estimating the number of clusters in a dataset via the gap statistic
-
Technical report
-
Tibshirani, R., Walther, G., Hastie, T.: Estimating the number of clusters in a dataset via the gap statistic. Technical report (2000)
-
(2000)
-
-
Tibshirani, R.1
Walther, G.2
Hastie, T.3
-
43
-
-
0004217877
-
-
2nd edn. Dept. of Computer Science, University of Glasgow
-
Van Rijsbergen, C.J.: Information Retrieval, 2nd edn. Dept. of Computer Science, University of Glasgow (1979)
-
(1979)
Information Retrieval
-
-
Van Rijsbergen, C.J.1
-
45
-
-
42149133072
-
Understanding the limitations of transmit power control for indoor WLANs
-
ACM, New York
-
Shrivastava, V., Agrawal, D., Mishra, A., Banerjee, S., Nadeem, T.: Understanding the limitations of transmit power control for indoor WLANs. In: IMC 2007: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement, pp. 351-364. ACM, New York (2007)
-
(2007)
IMC 2007: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
, pp. 351-364
-
-
Shrivastava, V.1
Agrawal, D.2
Mishra, A.3
Banerjee, S.4
Nadeem, T.5
-
46
-
-
43949097904
-
-
Blanco, M., Kokku, R., Ramachandran, K., Rangarajan, S., Sundaresan, K.: On the effectiveness of switched beam antennas in indoor environments. In: Claypool, M., Uhlig, S. (eds.) PAM 2008. LNCS, 4979, pp. 122-131. Springer, Heidelberg (2008)
-
Blanco, M., Kokku, R., Ramachandran, K., Rangarajan, S., Sundaresan, K.: On the effectiveness of switched beam antennas in indoor environments. In: Claypool, M., Uhlig, S. (eds.) PAM 2008. LNCS, vol. 4979, pp. 122-131. Springer, Heidelberg (2008)
-
-
-
-
47
-
-
38149068722
-
Anonymity loves company: Usability and the network effect
-
Anderson, R, ed, Cambridge, UK June
-
Dingledine, R., Mathewson, N.: Anonymity loves company: Usability and the network effect. In: Anderson, R. (ed.) Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006), Cambridge, UK (June 2006)
-
(2006)
Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS
-
-
Dingledine, R.1
Mathewson, N.2
-
48
-
-
51849084704
-
Securing wireless data networks against eavesdropping using smart antennas
-
Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
-
Lakshmanan, S., Tsao, C.L., Sivakumar, R., Sundaresan, K.: Securing wireless data networks against eavesdropping using smart antennas. In: ICDCS 2006: Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems, Washington, DC, USA, pp. 19-27. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
ICDCS 2006: Proceedings of the 2008 The 28th International Conference on Distributed Computing Systems
, pp. 19-27
-
-
Lakshmanan, S.1
Tsao, C.L.2
Sivakumar, R.3
Sundaresan, K.4
-
51
-
-
11244260535
-
Channel surfing and spatial retreats: Defenses against wireless denial of service
-
ACM, New York
-
Xu, W., Wood, T., Trappe, W., Zhang, Y.: Channel surfing and spatial retreats: defenses against wireless denial of service. In: WiSe 2004: Proceedings of the 3rd ACM workshop on Wireless security, pp. 80-89. ACM, New York (2004)
-
(2004)
WiSe 2004: Proceedings of the 3rd ACM workshop on Wireless security
, pp. 80-89
-
-
Xu, W.1
Wood, T.2
Trappe, W.3
Zhang, Y.4
|