메뉴 건너뛰기




Volumn , Issue , 2010, Pages

Low-cost side channel remote traffic analysis attack in packet networks

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTATIONAL POWER; INDIVIDUAL TRAFFIC; PACKET-BASED NETWORKS; REAL-WORLD ATTACK; ROUND ROBIN; ROUND-TRIP TIME; ROUTER SCHEDULING; ROUTING RESOURCES; SCHEDULING POLICIES; SIDE-CHANNEL; TRAFFIC ANALYSIS; TRAFFIC PATTERN;

EID: 77955359942     PISSN: 05361486     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICC.2010.5501972     Document Type: Conference Paper
Times cited : (34)

References (12)
  • 3
    • 33746053876 scopus 로고    scopus 로고
    • Privacy vulnerabilities in encrypted HTTP streams
    • [Online]. Available
    • G. Bissias, M. Liberatore, D. Jensen, and B. Levine, "Privacy vulnerabilities in encrypted HTTP streams," in Privacy Enhancing Technologies, 2006, pp. 1-11. [Online]. Available: http://dx.doi.org/10.1007/ 11767831\-1
    • (2006) Privacy Enhancing Technologies , pp. 1-11
    • Bissias, G.1    Liberatore, M.2    Jensen, D.3    Levine, B.4
  • 7
    • 84947242344 scopus 로고    scopus 로고
    • Traffic analysis attacks and tradeoffs in anonymity providing systems
    • A. Back, U. Moller, and A. Stiglic, "Traffic analysis attacks and tradeoffs in anonymity providing systems," Lecture Notes in Computer Science, vol. 2137, no. 245-257, p. 76, 2001.
    • (2001) Lecture Notes in Computer Science , vol.2137 , Issue.245-257 , pp. 76
    • Back, A.1    Moller, U.2    Stiglic, A.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.