-
1
-
-
42249109834
-
Legal Issues Surrounding Monitoring during Network Research
-
Oct, San Diego, USA
-
P. Ohm, D. Sicker, D. Grunwald, "Legal Issues Surrounding Monitoring during Network Research", ACM Internet Measurement Conference 2007, Oct. 2007, San Diego, USA.
-
(2007)
ACM Internet Measurement Conference
-
-
Ohm, P.1
Sicker, D.2
Grunwald, D.3
-
2
-
-
84869610552
-
-
Article 29 Data Protection Working Party, / on the concept of personal data, 20 June, available at
-
Article 29 Data Protection Working Party, WP 136, Opinion 4/2007 on the concept of personal data, 20 June, 2007; available at http://ec.europa.eu/ justice-home/fsj/privacy/docs/wpdocs/2007/wp136-en.pdf
-
(2007)
WP 136, Opinion
, vol.4
-
-
-
3
-
-
33847256529
-
The devil and packet trace anonymization
-
Jan
-
R. Pang, M. Allman, V. Paxson, J. Lee, "The devil and packet trace anonymization", ACM SIGCOMM Computer Communication Review archive, Vol. 36, Issue 1, Jan. 2006, pp. 29-38.
-
(2006)
ACM SIGCOMM Computer Communication Review archive
, vol.36
, Issue.1
, pp. 29-38
-
-
Pang, R.1
Allman, M.2
Paxson, V.3
Lee, J.4
-
4
-
-
49049094900
-
Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case
-
Barcelona, March
-
W. Yurcik, C. Woolam, G. Hellings, L. Khan, B. Thuraisingham, "Privacy/Analysis Tradeoffs in Sharing Anonymized Packet Traces: Single-Field Case", Third International Conference on Availability, Reliability and Security, ARES 2008, Barcelona, March 2008.
-
(2008)
Third International Conference on Availability, Reliability and Security, ARES
-
-
Yurcik, W.1
Woolam, C.2
Hellings, G.3
Khan, L.4
Thuraisingham, B.5
-
5
-
-
6344251217
-
Fingerprinting Websites Using Traffic Analysis Privacy Enhancing Technologies
-
April
-
A. Hintz, "Fingerprinting Websites Using Traffic Analysis Privacy Enhancing Technologies", Proc. Privacy Enhancing Technologies (PET) Workshop, April 2002.
-
(2002)
Proc. Privacy Enhancing Technologies (PET) Workshop
-
-
Hintz, A.1
-
6
-
-
38549152519
-
Privacy Vulnerabilities in Encrypted HTTP Streams
-
May
-
G. Bissias, M. Liberatore, D. Jensen, B. Levine, "Privacy Vulnerabilities in Encrypted HTTP Streams", Proc. Privacy Enhancing Technologies (PET) Workshop, May 2005.
-
(2005)
Proc. Privacy Enhancing Technologies (PET) Workshop
-
-
Bissias, G.1
Liberatore, M.2
Jensen, D.3
Levine, B.4
-
7
-
-
42549110598
-
A statistical approach to IP-level classification of network traffic
-
June
-
M. Crotti, F. Gringoli, P. Pelosato, L. Salgarelli, "A statistical approach to IP-level classification of network traffic", IEEE International Conference on Communications, June 2006.
-
(2006)
IEEE International Conference on Communications
-
-
Crotti, M.1
Gringoli, F.2
Pelosato, P.3
Salgarelli, L.4
-
8
-
-
79952950892
-
Analyzing Privacy in Enterprise Packet Trace Anonymization
-
San Diego, USA; Feb
-
B. Ribeiro, G. Miklau, D. Towsley, W. Chen, J. Jay, "Analyzing Privacy in Enterprise Packet Trace Anonymization", 15th Network & Distributed System Security Symp., San Diego, USA; Feb. 2008.
-
(2008)
15th Network & Distributed System Security Symp
-
-
Ribeiro, B.1
Miklau, G.2
Towsley, D.3
Chen, W.4
Jay, J.5
-
9
-
-
70349254496
-
On the Anonymization and Deanonymization of NetFlow Traffic
-
Savannah, USA, Jan
-
M. Foukarakis, D. Antoniades, S. Antonatos, E. P. Markatos, "On the Anonymization and Deanonymization of NetFlow Traffic", Proc. of FloCon 2008. Jan. 2008, Savannah, USA.
-
(2008)
Proc. of FloCon 2008
-
-
Foukarakis, M.1
Antoniades, D.2
Antonatos, S.3
Markatos, E.P.4
-
10
-
-
4544360452
-
New directions in traffic measurements and accounting
-
Pittsburgh, USA, Aug
-
C. Estan, G. Varghese, "New directions in traffic measurements and accounting", ACM SIGCOMM 2002, Pittsburgh, USA, Aug. 2002.
-
(2002)
ACM SIGCOMM
-
-
Estan, C.1
Varghese, G.2
-
11
-
-
24144488819
-
Efficient Implementation of a Statistics Counter Architecture
-
San Diego, USA, June
-
S. Ramabhadran, G. Varghese, "Efficient Implementation of a Statistics Counter Architecture", ACM SIGMETRICS 2003, San Diego, USA, June 2003.
-
(2003)
ACM SIGMETRICS
-
-
Ramabhadran, S.1
Varghese, G.2
-
12
-
-
70450232823
-
Network Applications of Bloom Filters: A Survey
-
A. Broder, M. Mitzenmacher, "Network Applications of Bloom Filters: A Survey", Internet Mathematics, Volume 1, Issue 4, pp. 485-509, 2005.
-
(2005)
Internet Mathematics
, vol.1
, Issue.4
, pp. 485-509
-
-
Broder, A.1
Mitzenmacher, M.2
-
13
-
-
33750733595
-
An Improved Construction for Counting Bloom Filters
-
Algorithms, ESA
-
F. Bonomi, M. Mitzenmacher, R. Panigrahy, S. Singh, G. Varghese, "An Improved Construction for Counting Bloom Filters", Algorithms - ESA 2006, 14th Annual European Symposium, pp. 684-695, 2006.
-
(2006)
14th Annual European Symposium
, pp. 684-695
-
-
Bonomi, F.1
Mitzenmacher, M.2
Panigrahy, R.3
Singh, S.4
Varghese, G.5
-
14
-
-
51349107047
-
MultiLayer Compressed Counting Bloom Filters
-
Phoenix, USA, April
-
D. Ficara, S. Giordano, G. Procissi, F. Vitucci, "MultiLayer Compressed Counting Bloom Filters", 27th Conf. on Computer Commun, IEEE INFOCOM 2008, Phoenix, USA, April 2008.
-
(2008)
27th Conf. on Computer Commun, IEEE INFOCOM
-
-
Ficara, D.1
Giordano, S.2
Procissi, G.3
Vitucci, F.4
-
15
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to share a secret", Communications of the ACM, volume 22, issue 11, pp. 612-613, 1979.
-
(1979)
Communications of the ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
16
-
-
0022793132
-
How to Construct Random Functions
-
O. Goldreich, S. Goldwasser, S. Micali, "How to Construct Random Functions", Journal of the ACM, vol.33, no.4, p.792- 807, 1986.
-
(1986)
Journal of the ACM
, vol.33
, Issue.4
, pp. 792-807
-
-
Goldreich, O.1
Goldwasser, S.2
Micali, S.3
-
17
-
-
70349229794
-
Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec
-
IETF Request for Comments, RFC 4868, May
-
S. Kelly, S. Frankel, "Using HMAC-SHA-256, HMAC-SHA-384, and HMAC-SHA-512 with IPsec", IETF Request for Comments, RFC 4868, May 2007.
-
(2007)
-
-
Kelly, S.1
Frankel, S.2
-
18
-
-
0033705124
-
-
D. Song, D. Wagner, A. Perrig, Practical Techniques for Searches on Encrypted Data, IEEE Symposium on Research in Security and Privacy, May 2000, pp:44-55.
-
D. Song, D. Wagner, A. Perrig, "Practical Techniques for Searches on Encrypted Data", IEEE Symposium on Research in Security and Privacy, May 2000, pp:44-55.
-
-
-
-
19
-
-
0034777649
-
Intercepting Mobile Communications: The Insecurity of 802.11
-
Rome, July
-
N. Borisov, I. Goldberg, D. Wagner, "Intercepting Mobile Communications: The Insecurity of 802.11", ACM SIGMOBILE, 7th international conference on mobile computing and networking, Mobicom'01, Rome, July 2001
-
(2001)
ACM SIGMOBILE, 7th international conference on mobile computing and networking, Mobicom'01
-
-
Borisov, N.1
Goldberg, I.2
Wagner, D.3
|