-
3
-
-
33746053876
-
Privacy vulnerabilities in encrypted HTTP streams
-
[Online]. Available
-
G. Bissias, M. Liberatore, D. Jensen, and B. Levine, "Privacy vulnerabilities in encrypted HTTP streams," in Privacy Enhancing Technologies, 2006, pp. 1-11. [Online]. Available: http://dx.doi.org/10.1007/ 11767831\-1
-
(2006)
Privacy Enhancing Technologies
, pp. 1-11
-
-
Bissias, G.1
Liberatore, M.2
Jensen, D.3
Levine, B.4
-
4
-
-
34547350876
-
Inferring the source of encrypted HTTP connections
-
New York, NY, USA: ACM Press, [Online]. Available
-
M. Liberatore and B. N. Levine, "Inferring the source of encrypted HTTP connections," in CCS '06: Proceedings of the 13th ACM conference on Computer and communications security. New York, NY, USA: ACM Press, 2006, pp. 255-263. [Online]. Available: http://dx.doi.org/10.1145/1180405.1180437
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 255-263
-
-
Liberatore, M.1
Levine, B.N.2
-
6
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations
-
Washington, DC, USA: IEEE Computer Society
-
C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson, "Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations," in SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society, 2008, pp. 35-49.
-
(2008)
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 35-49
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
7
-
-
84947242344
-
Traffic analysis attacks and tradeoffs in anonymity providing systems
-
A. Back, U. Moller, and A. Stiglic, "Traffic analysis attacks and tradeoffs in anonymity providing systems," Lecture Notes in Computer Science, vol. 2137, no. 245-257, p. 76, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2137
, Issue.245-257
, pp. 76
-
-
Back, A.1
Moller, U.2
Stiglic, A.3
-
9
-
-
85084161366
-
Tor: The second-generation onion router
-
R. Dingledine, N. Mathewson, and P. Syverson, "Tor: The second-generation onion router," in USENIX Security Symposium, 2004, pp. 303-320.
-
USENIX Security Symposium, 2004
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
11
-
-
60349122307
-
Identifying proxy nodes in a Tor anonymization circuit
-
S. Chakravarty, A. Stavrou, and A. D. Keromytis, "Identifying proxy nodes in a Tor anonymization circuit," in Workshop on Security and Privacy in Telecommunications and Information Systems, Dec. 2008, pp. 633-639.
-
Workshop on Security and Privacy in Telecommunications and Information Systems, Dec. 2008
, pp. 633-639
-
-
Chakravarty, S.1
Stavrou, A.2
Keromytis, A.D.3
-
12
-
-
19544387793
-
A measurement study of available bandwidth estimation tools
-
NewYork, NY, USA: ACM
-
J. Strauss, D. Katabi, and F. Kaashoek, "A measurement study of available bandwidth estimation tools," in IMC '03: Proceedings of the 3rd ACM SIGCOMM conference on Internet measurement. NewYork, NY, USA: ACM, 2003, pp. 39-44.
-
(2003)
IMC '03: Proceedings of the 3rd ACM SIGCOMM Conference on Internet Measurement
, pp. 39-44
-
-
Strauss, J.1
Katabi, D.2
Kaashoek, F.3
|