-
1
-
-
4043116941
-
Private authentication
-
Sept
-
M. Abadi and C. Fournet. Private authentication. Theor. Comput. Sci., 322(3):427-476, Sept. 2004.
-
(2004)
Theor. Comput. Sci
, vol.322
, Issue.3
, pp. 427-476
-
-
Abadi, M.1
Fournet, C.2
-
2
-
-
3142632089
-
Just fast keying: Key agreement in a hostile internet
-
May
-
W. Aiello, S. M. Bellovin, M. Blaze, R. Canetti, J. Ioannidis, A. D. Keromytis, and O. Reingold. Just fast keying: Key agreement in a hostile internet. ACM Transactions on Information and System Security (TISSEC), 7, May 2004.
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
, vol.7
-
-
Aiello, W.1
Bellovin, S.M.2
Blaze, M.3
Canetti, R.4
Ioannidis, J.5
Keromytis, A.D.6
Reingold, O.7
-
7
-
-
38149021673
-
Xen and the Art of Virtualization
-
Oct
-
P. Barham, B. Dragovic, K. Fraser, S. Hand, T. Harris, A. Ho, R. Neugebauer, I. Pratt, and A. Warfield. Xen and the Art of Virtualization. In SOSP, Oct. 2003.
-
(2003)
SOSP
-
-
Barham, P.1
Dragovic, B.2
Fraser, K.3
Hand, S.4
Harris, T.5
Ho, A.6
Neugebauer, R.7
Pratt, I.8
Warfield, A.9
-
8
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb
-
D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84-90, Feb. 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
12
-
-
85018108881
-
Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting
-
July/August
-
J. Franklin, D. McCoy, P. Tabriz, V. Neagoe, J. V. Randwyk, and D. Sicker. Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting. In 15th USENIX Security Symposium, July/August 2006.
-
(2006)
15th USENIX Security Symposium
-
-
Franklin, J.1
McCoy, D.2
Tabriz, P.3
Neagoe, V.4
Randwyk, J.V.5
Sicker, D.6
-
13
-
-
4444318660
-
Terra: A virtual machine-based platform for trusted computing
-
Oct
-
T. Garfinkel, B. Pfaff, J. Chow, M. Rosenblum, and D. Boneh. Terra: a virtual machine-based platform for trusted computing. In SOSP, Oct. 2003.
-
(2003)
SOSP
-
-
Garfinkel, T.1
Pfaff, B.2
Chow, J.3
Rosenblum, M.4
Boneh, D.5
-
15
-
-
85084160565
-
Transient addressing for related processes: Improved firewalling by using IPV6 and multiple addresses per host
-
Aug
-
P. M. Gleitz and S. M. Bellovin. Transient addressing for related processes: improved firewalling by using IPV6 and multiple addresses per host. In 10th USENIX Security Symposium, Aug. 2001.
-
(2001)
10th USENIX Security Symposium
-
-
Gleitz, P.M.1
Bellovin, S.M.2
-
18
-
-
23944520444
-
Enhancing location privacy in wireless LAN through disposable interface identifiers: A quantitative analysis
-
M. Gruteser and D. Grunwald. Enhancing location privacy in wireless LAN through disposable interface identifiers: a quantitative analysis. Mob. Netw. Appl., 10(3):315-325, 2005.
-
(2005)
Mob. Netw. Appl
, vol.10
, Issue.3
, pp. 315-325
-
-
Gruteser, M.1
Grunwald, D.2
-
20
-
-
85084160972
-
Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics
-
Aug
-
M. Handley, V. Paxson, and C. Kreibich. Network intrusion detection: Evasion, traffic normalization, and end-to-end protocol semantics. In 10th USENIX Security Symposium, Aug. 2001.
-
(2001)
10th USENIX Security Symposium
-
-
Handley, M.1
Paxson, V.2
Kreibich, C.3
-
22
-
-
70350229705
-
Location privacy in wireless networks
-
June
-
T. Jiang, H. J. Wang, and Y.-C. Hu. Location privacy in wireless networks. In MobiSys, June 2007.
-
(2007)
MobiSys
-
-
Jiang, T.1
Wang, H.J.2
Hu, Y.-C.3
-
23
-
-
85094322146
-
Information Slicing: Anonymity Using Unreliable Overlays
-
Apr
-
S. Katti, J. Cohen, and D. Katabi. Information Slicing: Anonymity Using Unreliable Overlays. In NSDI, Apr. 2007.
-
(2007)
NSDI
-
-
Katti, S.1
Cohen, J.2
Katabi, D.3
-
27
-
-
34547339276
-
-
S. J. Murdoch. Hot or Not: Revealing Hidden Services by their Clock Skew. In CCS, October/November 2006.
-
S. J. Murdoch. Hot or Not: Revealing Hidden Services by their Clock Skew. In CCS, October/November 2006.
-
-
-
-
28
-
-
0001048139
-
Protecting privacy using the decentralized label model
-
A. C. Myers and B. Liskov. Protecting privacy using the decentralized label model. ACM Trans. Softw. Eng. Methodol., 9(4):410-442, 2000.
-
(2000)
ACM Trans. Softw. Eng. Methodol
, vol.9
, Issue.4
, pp. 410-442
-
-
Myers, A.C.1
Liskov, B.2
-
29
-
-
70349245820
-
RFC 4941: Privacy Extensions for Stateless Address Autoconfiguration in IPv6
-
Sept
-
T. Narten, R. Draves, and S. Krishnan. RFC 4941: Privacy Extensions for Stateless Address Autoconfiguration in IPv6, Sept. 2007. Status: Draft Standard.
-
(2007)
Status: Draft Standard
-
-
Narten, T.1
Draves, R.2
Krishnan, S.3
-
30
-
-
70349230269
-
-
Nmap. http://www.insecure.org/nmap/.
-
Nmap
-
-
-
31
-
-
37749006403
-
802.11 user fingerprinting
-
Sept
-
J. Pang, B. Greenstein, R. Gummadi, S. Seshan, and D. Wetherall. 802.11 user fingerprinting. In MobiCom'07, Sept. 2007.
-
(2007)
MobiCom'07
-
-
Pang, J.1
Greenstein, B.2
Gummadi, R.3
Seshan, S.4
Wetherall, D.5
-
33
-
-
34250818849
-
-
Planetlab. https://www.planet-lab.org/.
-
Planetlab
-
-
-
35
-
-
0037984544
-
-
RFC 3261
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler. RFC 3261: SIP: Session Initiation Protocol, June 2002.
-
(2002)
SIP: Session Initiation Protocol, June
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
36
-
-
34547367533
-
-
U. Shankar and C. Karlof. Doppelganger: Better browser privacy without the bother. In CCS, October/November 2006.
-
U. Shankar and C. Karlof. Doppelganger: Better browser privacy without the bother. In CCS, October/November 2006.
-
-
-
-
37
-
-
70349253450
-
-
P. Srisuresh and K. Egevang. RFC 3022: Traditional IP Network Address Translator (Traditional NAT), Jan. 2001. Status: Informational.
-
P. Srisuresh and K. Egevang. RFC 3022: Traditional IP Network Address Translator (Traditional NAT), Jan. 2001. Status: Informational.
-
-
-
-
40
-
-
70349253454
-
-
VMware. http://www.vmware.com.
-
VMware
-
-
-
41
-
-
2442501519
-
Protocol scrubbing: Network security through transparent flow modification
-
Apr
-
D. Watson, M. Smart, G. R. Malan, and F. Jahanian. Protocol scrubbing: Network security through transparent flow modification. IEEE/ACM Transactions on Networking, 12(2), Apr. 2004.
-
(2004)
IEEE/ACM Transactions on Networking
, vol.12
, Issue.2
-
-
Watson, D.1
Smart, M.2
Malan, G.R.3
Jahanian, F.4
-
42
-
-
84991934426
-
TightLip: Keeping Applications from Spilling the Beans
-
Apr
-
A. R. Yumerefendi, B. Mickle, and L. P. Cox. TightLip: Keeping Applications from Spilling the Beans. In NSDI, Apr. 2007.
-
(2007)
NSDI
-
-
Yumerefendi, A.R.1
Mickle, B.2
Cox, L.P.3
-
43
-
-
70349253457
-
Rogue nodes turn tor anonymizer into eavesdropper's paradise
-
Sept
-
K. Zetter. Rogue nodes turn tor anonymizer into eavesdropper's paradise. Wired, Sept. 2007.
-
(2007)
Wired
-
-
Zetter, K.1
|