-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb.
-
D. Chaum, "Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms," Comm. ACM, vol.24, no.2, pp. 84-90, Feb. 1981.
-
(1981)
Comm. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
2
-
-
2642543760
-
Towards an information theoretic metric for anonymity
-
R. Dingledine and P. Syverson, eds Apr.
-
A. Serjantov and G. Danezis, "Towards an Information Theoretic Metric for Anonymity," Proc. Privacy Enhancing Technologies Workshop (PET '02), R. Dingledine and P. Syverson, eds., pp. 41- 53, Apr. 2002.
-
(2002)
Proc. Privacy Enhancing Technologies Workshop (PET '02)
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
3
-
-
3242815149
-
Towards measuring anonymity
-
R. Dingledine and P. Syverson, eds, Apr.
-
C. Díaz, S. Seys, J. Claessens, and B. Preneel, "Towards Measuring Anonymity," Proc. Privacy Enhancing Technologies Workshop (PET '02), R. Dingledine and P. Syverson, eds., pp. 54- 68, Apr. 2002.
-
(2002)
Proc. Privacy Enhancing Technologies Workshop (PET '02)
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
6
-
-
0030676973
-
Anonymous connections and onion routing
-
P.F. Syverson, D.M. Goldschlag, and M.G. Reed, "Anonymous Connections and Onion Routing," Proc. IEEE Symp. Security and Privacy, pp. 44-54, 1997.
-
(1997)
Proc. IEEE Symp. Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
8
-
-
85084161366
-
Tor: The Second- Generation onion router
-
Aug.
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The Second- Generation Onion Router," Proc. 13th USENIX Security Symp., pp. 303-320, Aug. 2004.
-
(2004)
Proc. 13th USENIX Security Symp
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
9
-
-
0002054934
-
Crowds: Anonymity for web transactions
-
M.K. Reiter and A.D. Rubin, "Crowds: Anonymity for Web Transactions," ACM Trans. Information and System Security, vol.1, no.1, pp. 66-92, 1998.
-
(1998)
ACM Trans. Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
12
-
-
0036088867
-
P5: A protocol for scalable anonymous communication
-
May
-
R. Sherwood, B. Bhattacharjee, and A. Srinivasan, "p5: A Protocol for Scalable Anonymous Communication," Proc. IEEE Symp. Security and Privacy, pp. 58-70, May 2002.
-
(2002)
Proc. IEEE Symp. Security and Privacy
, pp. 58-70
-
-
Sherwood, R.1
Bhattacharjee, B.2
Srinivasan, A.3
-
13
-
-
0036086129
-
Statistical identification of encrypted web browsing traffic
-
Q. Sun, D.R. Simon, Y.-M. Wang, W. Russell, V.N. Padmanabhan, and L. Qiu, "Statistical Identification of Encrypted Web Browsing Traffic," Proc. IEEE Symp. Security and Privacy, pp. 19-30, 2002.
-
(2002)
Proc. IEEE Symp. Security and Privacy
, pp. 19-30
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.-M.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
15
-
-
0038148416
-
Defending anonymous communications against passive logging attacks
-
May
-
M. Wright, M. Adler, B.N. Levine, and C. Shields, "Defending Anonymous Communications against Passive Logging Attacks," Proc. IEEE Symp. Security and Privacy (SP '03), pp. 28-41, May 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy (SP '03)
, pp. 28-41
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
16
-
-
33846288517
-
Timing attacks in low-latency mix-based systems
-
Feb.
-
B.N. Levine, M.K. Reiter, C. Wang, and M.K. Wright, "Timing Attacks in Low-Latency Mix-Based Systems," Proc. Financial Cryptography Conf. (FC '04), pp. 251-265, Feb. 2004.
-
(2004)
Proc. Financial Cryptography Conf. (FC '04)
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
20
-
-
77049121293
-
Valet services: Improving hidden servers with a personal touch
-
G. Danezis and P. Golle, eds, June
-
L. Øverlier and P. Syverson, "Valet Services: Improving Hidden Servers with a Personal Touch," Proc. Sixth Workshop Privacy Enhancing Technologies (PET '06), G. Danezis and P. Golle, eds., pp. 223-244, June 2006.
-
(2006)
Proc. Sixth Workshop Privacy Enhancing Technologies (PET '06)
, pp. 223-244
-
-
Øverlier, L.1
Syverson, P.2
-
21
-
-
33751039759
-
Fundamental limits on the anonymity provided by the mix technique
-
D. Kesdogan, D. Agrawal, V. Pham, and D. Rautenbach, "Fundamental Limits on the Anonymity Provided by the Mix Technique," Proc. IEEE Symp. Security and Privacy (SP), pp. 86-99, 2006.
-
(2006)
Proc. IEEE Symp. Security and Privacy (SP)
, pp. 86-99
-
-
Kesdogan, D.1
Agrawal, D.2
Pham, V.3
Rautenbach, D.4
-
22
-
-
33745174191
-
A formal treatment of onion routing
-
V. Shoup, ed. Aug.
-
J. Camenisch and A. Lysyanskaya, "A Formal Treatment of Onion Routing," Proc. Ann. Int'l Cryptology Conf. (CRYPTO '05), V. Shoup, ed., pp. 169-187, Aug. 2005.
-
(2005)
Proc. Ann. Int'l Cryptology Conf. (CRYPTO '05)
, pp. 169-187
-
-
Camenisch, J.1
Lysyanskaya, A.2
-
24
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
X. Wang and D.S. Reeves, "Robust Correlation of Encrypted Attack Traffic through Stepping Stones by Manipulation of Interpacket Delays," Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03), pp. 20-29, 2003.
-
(2003)
Proc. 10th ACM Conf. Computer and Comm. Security (CCS '03)
, pp. 20-29
-
-
Wang, X.1
Reeves, D.S.2
-
25
-
-
34548314612
-
Tracing traffic through intermediate hosts that repacketize flows
-
May
-
Y.J. Pyun, Y.H. Park, X. Wang, D.S. Reeves, and P. Ning, "Tracing Traffic through Intermediate Hosts that Repacketize Flows," Proc. 26th IEEE INFOCOM '07, pp. 634-642, May 2007.
-
(2007)
Proc. 26th IEEE INFOCOM '07
, pp. 634-642
-
-
Pyun, Y.J.1
Park, Y.H.2
Wang, X.3
Reeves, D.S.4
Ning, P.5
-
26
-
-
39049168726
-
Characterizing and detecting skype-relayed traffic
-
Apr.
-
K. Suh, D.R. Figueiredo, J. Kurose, and D. Towsley, "Characterizing and Detecting Skype-Relayed Traffic," Proc. 25th IEEE INFOCOM '06, pp. 1-12, Apr. 2006.
-
(2006)
Proc. 25th IEEE INFOCOM '06
, pp. 1-12
-
-
Suh, K.1
Figueiredo, D.R.2
Kurose, J.3
Towsley, D.4
-
27
-
-
33846334648
-
-
Technical Report TR2005- 2-6, Texas A&M Univ. Computer Science
-
Y. Zhu, X. Fu, and R. Bettati, "On the Effectiveness of Continuous- Time Mixes under Flow Correlation Attacks," Technical Report TR2005-2-6, Texas A&M Univ. Computer Science, 2005.
-
(2005)
On the Effectiveness of Continuous- Time Mixes under Flow Correlation Attacks
-
-
Zhu, Y.1
Fu, X.2
Bettati, R.3
-
28
-
-
33846627316
-
Anonymity analysis of mix networks against flow-correlation attacks
-
Y. Zhu, X. Fu, R. Bettati, and W. Zhao, "Anonymity Analysis of Mix Networks against Flow-Correlation Attacks," Proc. IEEE GLOBECOM '05, vol.3, pp. 1801-1805, 2005.
-
(2005)
Proc. IEEE GLOBECOM '05
, vol.3
, pp. 1801-1805
-
-
Zhu, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
29
-
-
0037810717
-
Mixminion: Design of a type iii anonymous remailer protocol
-
May
-
G. Danezis, R. Dingledine, and N. Mathewson, "Mixminion: Design of a Type III Anonymous Remailer Protocol," Proc. 2003 IEEE Symp. Security and Privacy, pp. 2-15, May 2003.
-
(2003)
Proc. 2003 IEEE Symp. Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
30
-
-
35248841429
-
From a trickle to a flood: Active attacks on several mix types
-
F. Petitcolas, ed. Oct.
-
A. Serjantov, R. Dingledine, and P. Syverson, "From a Trickle to a Flood: Active Attacks on Several Mix Types," Proc. Information Hiding Workshop (IH '02), F. Petitcolas, ed., pp. 36-52, Oct. 2002.
-
(2002)
Proc. Information Hiding Workshop (IH '02)
, pp. 36-52
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
31
-
-
50249091568
-
Analytical and empirical analysis of countermeasures to traffic analysis attacks
-
Oct.
-
X. Fu, B. Graham, R. Bettati, W. Zhao, and D. Xuan, "Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks," Proc. 32nd Int'l Conf. Parallel Processing (ICPP '03), pp. 483-492, Oct. 2003.
-
(2003)
Proc. 32nd Int'l Conf. Parallel Processing (ICPP '03)
, pp. 483-492
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
Xuan, D.5
-
32
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on SSH
-
D.X. Song, D. Wagner, and X. Tian, "Timing Analysis of Keystrokes and Timing Attacks on SSH," Proc. 10th USENIX Security Symp., pp. 337-352, 2001.
-
(2001)
Proc. 10th USENIX Security Symp.
, pp. 337-352
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
34
-
-
24344471201
-
-
F.B.I, "Carnivore Diagnostic Tool," http://www.fbi.gov/hq/lab/ carnivore/carnivore2.htm, 2003.
-
(2003)
Carnivore Diagnostic Tool
-
-
-
35
-
-
77953119740
-
-
tcpdump.org
-
tcpdump.org, "tcpdump," http://www.tcpdump.org/, 2003.
-
(2003)
-
-
-
36
-
-
24344496450
-
-
cisco.inc.
-
cisco.inc., "Netflow Services Solutions Guide," http://www.cisco. com/univercd/cc/td/doc/cisintwk/intsolns/netflsol/nfwhite. htm, 2003.
-
(2003)
Netflow Services Solutions Guide
-
-
-
37
-
-
0024621174
-
On estimation of entropy and mutual information of continuous distributions
-
R. Moddemeijer, "On Estimation of Entropy and Mutual Information of Continuous Distributions," Signal Processing, vol.16, no.3, pp. 233-246, 1989.
-
(1989)
Signal Processing
, vol.16
, Issue.3
, pp. 233-246
-
-
Moddemeijer, R.1
-
38
-
-
0031164639
-
The linearity of low frequency traffic flow: An intrinsic i/o property in queueing systems
-
June
-
S.-q. Li and J.D. Pruneski, "The Linearity of Low Frequency Traffic Flow: An Intrinsic I/O Property in Queueing Systems," IEEE/ ACM Trans. Networking, vol.5, no.3, pp. 429-443, June 1997.
-
(1997)
IEEE/ ACM Trans. Networking
, vol.5
, Issue.3
, pp. 429-443
-
-
Li, S.-Q.1
Pruneski, J.D.2
-
39
-
-
77953119878
-
-
[39] netfilter.org, "Netfilter," http://netfilter.samba.org/, 2003.
-
(2003)
Netfilter
-
-
-
40
-
-
24344490149
-
-
TimeSys, "Timesys Linux Docs," http://www.timesys.com/, 2003.
-
(2003)
Timesys Linux Docs
-
-
-
41
-
-
17444412778
-
Nist Net: A linux-based network emulation tool
-
July
-
M. Carson and D. Santay, "Nist Net: A Linux-Based Network Emulation Tool," ACM SIGCOMM Computer Comm. Rev., vol.33, no.3, http://portal.acm. org/citation.cfm?id=956993.957007, pp. 111-126, July 2003.
-
(2003)
ACM SIGCOMM Computer Comm. Rev.
, vol.33
, Issue.3
, pp. 111-126
-
-
Carson, M.1
Santay, D.2
-
44
-
-
0032594135
-
Promoting the use of end-to-end congestion control in the internet
-
Aug.
-
S. Floyd and K. Fall, "Promoting the Use of End-to-End Congestion Control in the Internet," IEEE/ACM Trans. Networking, vol.7, no.4, pp. 458-472, Aug. 1999.
-
(1999)
IEEE/ACM Trans. Networking
, vol.7
, Issue.4
, pp. 458-472
-
-
Floyd, S.1
Fall, K.2
-
45
-
-
0032178265
-
Modeling TCP Throughput: A simple model and its empirical validation
-
J. Padhye, V. Firoiu, D.F. Towsley, and J.F. Kurose, "Modeling TCP Throughput: A Simple Model and its Empirical Validation," Proc. ACM SIGCOMM '98, pp. 303-314, 1998.
-
(1998)
Proc. ACM SIGCOMM '98
, pp. 303-314
-
-
Padhye, J.1
Firoiu, V.2
Towsley, D.F.3
Kurose, J.F.4
-
46
-
-
0030189675
-
Simulation-Based comparisons of tahoe, reno and sack TCP
-
Aug.
-
K. Fall and S. Floyd, "Simulation-Based Comparisons of Tahoe, Reno and SACK TCP," SIGCOMM Computer Comm. Rev., vol.26, no.3, pp. 5-21, Aug. 1996.
-
(1996)
SIGCOMM Computer Comm. Rev.
, vol.26
, Issue.3
, pp. 5-21
-
-
Fall, K.1
Floyd, S.2
|