-
6
-
-
34548755641
-
Dsss-based flow marking technique for invisible traceback
-
May
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, "Dsss-based flow marking technique for invisible traceback," in Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P), May 2007.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P)
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
8
-
-
70349703511
-
Blind detection of spread spectrum flow watermarks,
-
Tech. Rep, University of Massachusetts Lowell, August
-
Weijia Jia, Fung Po Tso, Zhen Ling, Xinwen Fu, and Dong Xuan, "Blind detection of spread spectrum flow watermarks," Tech. Rep., University of Massachusetts Lowell, August 2008.
-
(2008)
-
-
Jia, W.1
Fung, P.2
Ling, Z.3
Fu, X.4
Xuan, D.5
-
11
-
-
0004199580
-
-
Prentice-Hall, Upper Saddle River, NJ 07458, USA, second edition
-
A. V. Oppenheim, A. S. Willsky, and S. H. Nawab, Signals and systems, Prentice-Hall, Upper Saddle River, NJ 07458, USA, second edition, 1997.
-
(1997)
Signals and systems
-
-
Oppenheim, A.V.1
Willsky, A.S.2
Nawab, S.H.3
-
12
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms," Communications of the ACM, vol. 4, no. 2, February 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
13
-
-
70349714329
-
-
Xinwen Fu, Wei Yu, Shu Jiang, Steve Graham, and Yong Guan, Tcp performance in flow-based mix networks: Modeling and analysis, IEEE Transactions on Parallel and Distributed Systems (TPDS), TBD, no. TBD, Accepted 2008.
-
Xinwen Fu, Wei Yu, Shu Jiang, Steve Graham, and Yong Guan, "Tcp performance in flow-based mix networks: Modeling and analysis," IEEE Transactions on Parallel and Distributed Systems (TPDS), vol. TBD, no. TBD, Accepted 2008.
-
-
-
-
14
-
-
34548314612
-
Tracing traffic through intermediate hosts that repacketize flows
-
May
-
Young June Pyun, Young Hee Park, Xinyuan Wang, Douglas S. Reeves, and Peng Ning, "Tracing traffic through intermediate hosts that repacketize flows," in Proceedings of IEEE INFOCOM, May 2007.
-
(2007)
Proceedings of IEEE INFOCOM
-
-
Young, J.1
Young, H.2
Wang, X.3
Reeves, D.S.4
Ning, P.5
-
17
-
-
27944507665
-
On flow correlation attacks and countermeasures in mix networks
-
May
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, "On flow correlation attacks and countermeasures in mix networks," in Proceedings of Workshop on Privacy Enhancing Technologies (PET), May 2004.
-
(2004)
Proceedings of Workshop on Privacy Enhancing Technologies (PET)
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
18
-
-
33745798251
-
Timing attacks in low-latency mix-based systems
-
February
-
B. N. Levine, M. K. Reiter, C. Wang, and M. Wright, "Timing attacks in low-latency mix-based systems," in Proceedings of Financial Cryptography (FC), February 2004.
-
(2004)
Proceedings of Financial Cryptography (FC)
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.4
-
19
-
-
27944485356
-
On flow marking attacks in wireless anonymous communication networks
-
April
-
X. Fu, Y. Zhu, B. Graham, R. Bettati, and W. Zhao, "On flow marking attacks in wireless anonymous communication networks," in Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), April 2005.
-
(2005)
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS)
-
-
Fu, X.1
Zhu, Y.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
20
-
-
84904261405
-
Sleepy watermark tracing: An active network-based intrusion response framework
-
June
-
X. Wang, D. S. Reeves, S. F. Wu, and J. Yuill, "Sleepy watermark tracing: An active network-based intrusion response framework," in Proceedings of 16th International Conference on Information Security (IFIP/Sec), June 2001.
-
(2001)
Proceedings of 16th International Conference on Information Security (IFIP/Sec)
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
Yuill, J.4
|