-
1
-
-
84947242344
-
-
Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, 2137, pp. 245-257. Springer, Heidelberg (2001)
-
Back, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. In: Moskowitz, I.S. (ed.) IH 2001. LNCS, vol. 2137, pp. 245-257. Springer, Heidelberg (2001)
-
-
-
-
2
-
-
60349122307
-
Identifying proxy nodes in a tor anonymization circuit
-
Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
-
Chakravarty, S., Stavrou, A., Keromytis, A.D.: Identifying proxy nodes in a tor anonymization circuit. In: Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems, Washington, DC, USA, pp. 633-639. IEEE Computer Society, Los Alamitos (2008)
-
(2008)
Proceedings of the 2008 IEEE International Conference on Signal Image Technology and Internet Based Systems
, pp. 633-639
-
-
Chakravarty, S.1
Stavrou, A.2
Keromytis, A.D.3
-
3
-
-
0023861309
-
The dining cryptographers problem: Unconditional sender and recipient untraceability
-
Chaum, D.: The dining cryptographers problem: Unconditional sender and recipient untraceability. Journal of Cryptology 1, 65-75 (1988)
-
(1988)
Journal of Cryptology
, vol.1
, pp. 65-75
-
-
Chaum, D.1
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM 24(2), 84-90 (1981)
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
5
-
-
84904332394
-
Statistical disclosure attacks: Traffic confirmation in open environments
-
Athens, Greece, May 26-28, pp, Kluwer, Dordrecht
-
Danezis, G.: Statistical disclosure attacks: Traffic confirmation in open environments. In: Security and Privacy in the Age of Uncertainty, International Conference on Information Security (SEC 2003), Athens, Greece, May 26-28, pp. 421-426. Kluwer, Dordrecht (2003)
-
(2003)
Security and Privacy in the Age of Uncertainty, International Conference on Information Security (SEC
, pp. 421-426
-
-
Danezis, G.1
-
6
-
-
85084161366
-
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The second-generation onion router. In: Proceedings of the 13th USENIX Security Symposium (August 2004)
-
-
-
-
8
-
-
85031542311
-
Mixing E-mail with Babel
-
IEEE, Los Alamitos
-
Gülcü, C., Tsudik, G.: Mixing E-mail with Babel. In: Proceedings of the Network and Distributed Security Symposium - NDSS 1996, pp. 2-16. IEEE, Los Alamitos (1996)
-
(1996)
Proceedings of the Network and Distributed Security Symposium
, vol.NDSS 1996
, pp. 2-16
-
-
Gülcü, C.1
Tsudik, G.2
-
9
-
-
84957796461
-
-
Hintz, A.: Fingerprinting websites using traffic analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, 2482, pp. 171-178. Springer, Heidelberg (2003)
-
Hintz, A.: Fingerprinting websites using traffic analysis. In: Dingledine, R., Syverson, P.F. (eds.) PET 2002. LNCS, vol. 2482, pp. 171-178. Springer, Heidelberg (2003)
-
-
-
-
10
-
-
33846288517
-
-
Levine, B.N., Reiter, M.K., Wang, C., Wright, M.K.: Timing attacks in low-latency mix-based systems. In: Juels, A. (ed.) FC 2004. LNCS, 3110, pp. 251-265. Springer, Heidelberg (2004)
-
Levine, B.N., Reiter, M.K., Wang, C., Wright, M.K.: Timing attacks in low-latency mix-based systems. In: Juels, A. (ed.) FC 2004. LNCS, vol. 3110, pp. 251-265. Springer, Heidelberg (2004)
-
-
-
-
11
-
-
24344478834
-
-
Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, 3424, pp. 17-34. Springer, Heidelberg (2005)
-
Mathewson, N., Dingledine, R.: Practical traffic analysis: Extending and resisting statistical disclosure. In: Martin, D., Serjantov, A. (eds.) PET 2004. LNCS, vol. 3424, pp. 17-34. Springer, Heidelberg (2005)
-
-
-
-
12
-
-
51249098943
-
A new replay attack against anonymous communication networks
-
May, 2008
-
Pries, R., Yu, W., Fu, X., Zhao, W.: A new replay attack against anonymous communication networks. In: Proceedings of the IEEE International Conference on Communications, ICC 2008, May 2008, pp. 1578-1582 (2008)
-
(2008)
Proceedings of the IEEE International Conference on Communications, ICC
, pp. 1578-1582
-
-
Pries, R.1
Yu, W.2
Fu, X.3
Zhao, W.4
-
14
-
-
20444437836
-
Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection
-
Washington, DC, USA November
-
Rennhard, M., Plattner, B.: Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Proceedings of the Workshop on Privacy in the Electronic Society, Washington, DC, USA (November 2002)
-
(2002)
Proceedings of the Workshop on Privacy in the Electronic Society
-
-
Rennhard, M.1
Plattner, B.2
|