-
1
-
-
74049090268
-
Browser-Based Attacks on Tor
-
T. G. Abbott, K. J. Lai, M. R. Lieberman, and E. C. Price. Browser-Based Attacks on Tor. In Borisov and Golle [5], pages 184-199.
-
Borisov and Golle
, vol.5
, pp. 184-199
-
-
Abbott, T.G.1
Lai, K.J.2
Lieberman, M.R.3
Price, E.C.4
-
2
-
-
79959681025
-
Low-Resource Routing Attacks Against Tor
-
New York, NY, USA, ACM
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-Resource Routing Attacks Against Tor. In WPES '07: Proceedings of the 2007 ACM workshop on Privacy in electronic society, pages 11-20, New York, NY, USA, 2007. ACM.
-
(2007)
WPES '07: Proceedings of the 2007 ACM workshop on Privacy in electronic society
, pp. 11-20
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
3
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
New York, NY, USA, Springer-Verlag New York, Inc
-
O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: a system for anonymous and unobservable Internet access. In International workshop on Designing privacy enhancing technologies, pages 115-129, New York, NY, USA, 2001. Springer-Verlag New York, Inc.
-
(2001)
International workshop on Designing privacy enhancing technologies
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
4
-
-
38549152519
-
Privacy Vulnerabilities in Encrypted HTTP Streams
-
May
-
G. Bissias, M. Liberatore, D. Jensen, and B. N. Levine. Privacy Vulnerabilities in Encrypted HTTP Streams. In Proc. Privacy Enhancing Technologies Workshop (PET), pages 1-11, May 2005.
-
(2005)
Proc. Privacy Enhancing Technologies Workshop (PET)
, pp. 1-11
-
-
Bissias, G.1
Liberatore, M.2
Jensen, D.3
Levine, B.N.4
-
5
-
-
74049120573
-
Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa
-
N. Borisov and P. Golle, editors, Canada, June 20-22, Revised Selected Papers, of, Springer
-
N. Borisov and P. Golle, editors. Privacy Enhancing Technologies, 7th International Symposium, PET 2007 Ottawa, Canada, June 20-22, 2007, Revised Selected Papers, volume 4776 of Lecture Notes in Computer Science. Springer, 2007.
-
(2007)
Lecture Notes in Computer Science
, vol.4776
-
-
-
6
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
February
-
D. Chaum. Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms. Communications of the ACM, 4(2), February 1981.
-
(1981)
Communications of the ACM
, vol.4
, Issue.2
-
-
Chaum, D.1
-
8
-
-
84937846451
-
On Web Browsing Privacy in Anonymized NetFlows
-
Boston, MA, August
-
S. Coull, M. Collins, C. Wright, F. Monrose, and M. Reiter. On Web Browsing Privacy in Anonymized NetFlows. In Proceedings of the 16th USENIX Security Symposium, Boston, MA, August 2007.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
-
-
Coull, S.1
Collins, M.2
Wright, C.3
Monrose, F.4
Reiter, M.5
-
9
-
-
3242815149
-
Towards Measuring Anonymity
-
C. Díaz, S. Seys, J. Claessens, and B. Preneel. Towards Measuring Anonymity. In Dingledine and Syverson [11], pages 54-68.
-
Dingledine and Syverson
, vol.11
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
10
-
-
85084161366
-
Tor: The Second-Generation Onion Router
-
Berkeley, CA, USA, USENIX Association
-
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pages 21-21, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
11
-
-
24944524538
-
Privacy Enhancing Technologies, Second International Workshop, PET 2002
-
R. Dingledine and P. F. Syverson, editors, San Francisco, CA, USA, April 14-15, Revised Papers, of, Springer
-
R. Dingledine and P. F. Syverson, editors. Privacy Enhancing Technologies, Second International Workshop, PET 2002, San Francisco, CA, USA, April 14-15, 2002, Revised Papers, volume 2482 of Lecture Notes in Computer Science. Springer, 2003.
-
(2002)
Lecture Notes in Computer Science
, vol.2482
-
-
-
12
-
-
50949098638
-
Internet Traffic Identification using Machine Learning
-
San Francisco, CA, USA, November
-
J. Erman, A. Mahanti, and M. Arlitt. Internet Traffic Identification using Machine Learning. In Proceedings of IEEE Global Telecommunications Conference (GLOBECOM), pages 1-6, San Francisco, CA, USA, November 2006.
-
(2006)
Proceedings of IEEE Global Telecommunications Conference (GLOBECOM)
, pp. 1-6
-
-
Erman, J.1
Mahanti, A.2
Arlitt, M.3
-
13
-
-
0003415244
-
-
RFC 2616
-
R. Fielding, J. Gettys, J. Mogul, H. Frystyk, L. Masinter, P. Leach, and T. Berners-Lee. RFC 2616 Hypertext Transfer Protocol - HTTP/1.1, June 1999.
-
(1999)
Hypertext Transfer Protocol - HTTP/1.1, June
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
14
-
-
6344251217
-
Fingerprinting Websites Using Traffic Analysis
-
A. Hintz. Fingerprinting Websites Using Traffic Analysis. In Dingledine and Syverson [11], pages 171-178.
-
Dingledine and Syverson
, vol.11
, pp. 171-178
-
-
Hintz, A.1
-
15
-
-
3142669383
-
-
RFC 3948
-
A. Huttunen, B. Swander, V. Volpe, L. DiBurro, and M. Stenberg. RFC 3948 UDP Encapsulation of IPsec ESP Packets, January 2005.
-
(2005)
UDP Encapsulation of IPsec ESP Packets, January
-
-
Huttunen, A.1
Swander, B.2
Volpe, V.3
DiBurro, L.4
Stenberg, M.5
-
16
-
-
74049163517
-
-
G. H. John and P. Langley. Estimating Continuous Distributions in Bayesian Classifiers. In P. Besnard and S. Hanks, editors, UAI, pages 338-345. Morgan Kaufmann, 1995.
-
G. H. John and P. Langley. Estimating Continuous Distributions in Bayesian Classifiers. In P. Besnard and S. Hanks, editors, UAI, pages 338-345. Morgan Kaufmann, 1995.
-
-
-
-
17
-
-
74049083069
-
Traffic Flow Confidentiality in IPsec: Protocol and Implementation
-
August
-
C. Kiraly, S. Teofili, G. Bianchi, R. L. Cigno, M. Nardelli, and E. Delzeri. Traffic Flow Confidentiality in IPsec: Protocol and Implementation. In Preproceedings Third IFIP/FIDIS Summer School "The Future of Identity in the Information Society", August 2007.
-
(2007)
Preproceedings Third IFIP/FIDIS Summer School "The Future of Identity in the Information Society"
-
-
Kiraly, C.1
Teofili, S.2
Bianchi, G.3
Cigno, R.L.4
Nardelli, M.5
Delzeri, E.6
-
20
-
-
33845232198
-
On the privacy risks of publishing anonymized ip network traces
-
H. Leitold and E. P. Markatos, editors, Communications and Multimedia Security, of, Springer
-
D. Koukis, S. Antonatos, and K. G. Anagnostakis. On the privacy risks of publishing anonymized ip network traces. In H. Leitold and E. P. Markatos, editors, Communications and Multimedia Security, volume 4237 of Lecture Notes in Computer Science, pages 22-32. Springer, 2006.
-
(2006)
Lecture Notes in Computer Science
, vol.4237
, pp. 22-32
-
-
Koukis, D.1
Antonatos, S.2
Anagnostakis, K.G.3
-
21
-
-
0004001569
-
-
RFC 1928
-
M. Leech, M. Ganis, Y. Lee, R. Kuris, D. Koblas, and L. Jones. RFC 1928 SOCKS Protocol Version 5, March 1996.
-
(1996)
SOCKS Protocol Version 5, March
-
-
Leech, M.1
Ganis, M.2
Lee, Y.3
Kuris, R.4
Koblas, D.5
Jones, L.6
-
22
-
-
34547350876
-
Inferring the Source of Encrypted HTTP Connections
-
New York, NY, USA, ACM Press
-
M. Liberatore and B. N. Levine. Inferring the Source of Encrypted HTTP Connections. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 255-263, New York, NY, USA, 2006. ACM Press.
-
(2006)
CCS '06: Proceedings of the 13th ACM conference on Computer and communications security
, pp. 255-263
-
-
Liberatore, M.1
Levine, B.N.2
-
24
-
-
74049157218
-
-
S. Mistry and B. Raman. Quantifying Traffic Analysis of Encrypted Web-Browsing. http://bmrc.berkeley.edu/people/shailen/Classes/Security Fall98/paper.ps, December 1998.
-
S. Mistry and B. Raman. Quantifying Traffic Analysis of Encrypted Web-Browsing. http://bmrc.berkeley.edu/people/shailen/Classes/Security Fall98/paper.ps, December 1998.
-
-
-
-
25
-
-
14344265818
-
Internet Traffic Classification Using Bayesian Analysis Techniques
-
New York, NY, USA, ACM Press
-
A. W. Moore and D. Zuev. Internet Traffic Classification Using Bayesian Analysis Techniques. In SIGMETRICS '05: Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems, pages 50-60, New York, NY, USA, 2005. ACM Press.
-
(2005)
SIGMETRICS '05: Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
, pp. 50-60
-
-
Moore, A.W.1
Zuev, D.2
-
26
-
-
27544454707
-
Low-Cost Traffic Analysis of Tor
-
Washington, DC, USA, IEEE Computer Society
-
S. J. Murdoch and G. Danezis. Low-Cost Traffic Analysis of Tor. In SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy, pages 183-195, Washington, DC, USA, 2005. IEEE Computer Society.
-
(2005)
SP '05: Proceedings of the 2005 IEEE Symposium on Security and Privacy
, pp. 183-195
-
-
Murdoch, S.J.1
Danezis, G.2
-
27
-
-
15844394231
-
What's New on the web? The Evolution of the Web from a Search Engine Perspective
-
New York, NY, USA, ACM
-
A. Ntoulas, J. Cho, and C. Olston. What's New on the web? The Evolution of the Web from a Search Engine Perspective. In WWW '04: Proceedings of the 13th international conference on World Wide Web, pages 1-12, New York, NY, USA, 2004. ACM.
-
(2004)
WWW '04: Proceedings of the 13th international conference on World Wide Web
, pp. 1-12
-
-
Ntoulas, A.1
Cho, J.2
Olston, C.3
-
28
-
-
33845212639
-
-
A. Panchenko and L. Pimenidis. Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. In Proceedings of Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, 4237 of Lecture Notes in Computer Science, pages 240-251, 2006.
-
A. Panchenko and L. Pimenidis. Towards Practical Attacker Classification for Risk Analysis in Anonymous Communication. In Proceedings of Communications and Multimedia Security, 10th IFIP TC-6 TC-11 International Conference, CMS 2006, Heraklion, Crete, Greece, October 19-21, 2006, Proceedings, volume 4237 of Lecture Notes in Computer Science, pages 240-251, 2006.
-
-
-
-
29
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
New York, NY, USA, Springer-Verlag New York, Inc
-
J.-F. Raymond. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems. In International workshop on Designing privacy enhancing technologies, pages 10-29, New York, NY, USA, 2001. Springer-Verlag New York, Inc.
-
(2001)
International workshop on Designing privacy enhancing technologies
, pp. 10-29
-
-
Raymond, J.-F.1
-
30
-
-
0036086129
-
Statistical Identification of Encrypted Web Browsing Traffic
-
Washington, DC, USA, IEEE Computer Society
-
Q. Sun, D. R. Simon, Y.-M. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu. Statistical Identification of Encrypted Web Browsing Traffic. In SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy, page 19, Washington, DC, USA, 2002. IEEE Computer Society.
-
(2002)
SP '02: Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 19
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.-M.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
32
-
-
84886400136
-
The Evolution of Websites
-
Washington, DC, USA, IEEE Computer Society
-
P. Warren, C. Boldyreff, and M. Munro. The Evolution of Websites. In IWPC '99: Proceedings of the 7th International Workshop on Program Comprehension, page 178, Washington, DC, USA, 1999. IEEE Computer Society.
-
(1999)
IWPC '99: Proceedings of the 7th International Workshop on Program Comprehension
, pp. 178
-
-
Warren, P.1
Boldyreff, C.2
Munro, M.3
-
33
-
-
74049126249
-
Performance Comparison of Low-Latency Anonymisation Services from a User Perspective
-
R. Wendolsky, D. Herrmann, and H. Federrath. Performance Comparison of Low-Latency Anonymisation Services from a User Perspective. In Borisov and Golle [5], pages 233-253.
-
Borisov and Golle
, vol.5
, pp. 233-253
-
-
Wendolsky, R.1
Herrmann, D.2
Federrath, H.3
-
34
-
-
33750283653
-
A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification
-
N. Williams, S. Zander, and G. Armitage. A Preliminary Performance Comparison of Five Machine Learning Algorithms for Practical IP Traffic Flow Classification. SIGCOMM Comput. Commun. Rev., 36(5):5-16, 2006.
-
(2006)
SIGCOMM Comput. Commun. Rev
, vol.36
, Issue.5
, pp. 5-16
-
-
Williams, N.1
Zander, S.2
Armitage, G.3
-
35
-
-
0003957032
-
Data Mining: Practical Machine Learning Tools and Techniques
-
Second Edition , Morgan Kaufmann, June
-
I. H. Witten and E. Frank. Data Mining: Practical Machine Learning Tools and Techniques, Second Edition (Morgan Kaufmann Series in Data Management Systems). Morgan Kaufmann, June 2005.
-
(2005)
Morgan Kaufmann Series in Data Management Systems
-
-
Witten, I.H.1
Frank, E.2
-
38
-
-
24344461274
-
-
D. Zuev and A. W. Moore. Traffic Classification Using a Statistical Approach. In C. Dovrolis, editor, PAM, 3431 of Lecture Notes in Computer Science, pages 321-324. Springer, 2005.
-
D. Zuev and A. W. Moore. Traffic Classification Using a Statistical Approach. In C. Dovrolis, editor, PAM, volume 3431 of Lecture Notes in Computer Science, pages 321-324. Springer, 2005.
-
-
-
|