메뉴 건너뛰기




Volumn 6345 LNCS, Issue , 2010, Pages 232-248

On the secrecy of spread-spectrum flow watermarks

Author keywords

[No Author keywords available]

Indexed keywords

NETWORK SECURITY; SPECTROSCOPY; WATERMARKING;

EID: 78049368157     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-642-15497-3_15     Document Type: Conference Paper
Times cited : (22)

References (29)
  • 1
    • 85165843383 scopus 로고    scopus 로고
    • hisao, S. (2009), http://www.okisoft.co.jp/esc/python/proxy
    • (2009)
    • Hisao, S.1
  • 2
    • 0000264695 scopus 로고    scopus 로고
    • A stochastic model for tcp with stationary random losses
    • Altman, E., Avrachenkov, K., Barakat, C.: A stochastic model for tcp with stationary random losses. In: ACM SIGCOMM (2000)
    • (2000) ACM SIGCOMM
    • Altman, E.1    Avrachenkov, K.2    Barakat, C.3
  • 4
    • 85165835735 scopus 로고    scopus 로고
    • Choi, B.: PN code generator (2000), http://www-mobile.ecs.soton. ac.uk/bjc97r/pnseq-1.1/pnseq-1.1.tar.gz
    • (2000) PN Code Generator
    • Choi, B.1
  • 5
    • 85165860458 scopus 로고    scopus 로고
    • Microsoft Corporation
    • Microsoft Corporation. Microsoft security bulletin ms09-048 (2009), http://www.microsoft.com/technet/security/Bulletin/ms09-048.mspx
    • (2009) Microsoft Security Bulletin ms09-048
  • 7
    • 0004196692 scopus 로고
    • 2nd edn. John Wiley & Sons, Chichester
    • Dixon, R.: Spread Spectrum Systems, 2nd edn. John Wiley & Sons, Chichester (1984)
    • (1984) Spread Spectrum. Systems
    • Dixon, R.1
  • 8
    • 84958977733 scopus 로고    scopus 로고
    • Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
    • Wespi, A., Vigna, G., Deri, L. eds., Springer, Heidelberg
    • Donoho, D., Flesia, A., Shankar, U., Paxson, V., Coit, J., Staniford, S.: Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In: Wespi, A., Vigna, G., Deri, L. (eds.) RAID 2002. LNCS, vol. 2516, p. 17. Springer, Heidelberg (2002)
    • (2002) RAID 2002. LNCS , vol.2516 , pp. 17
    • Donoho, D.1    Flesia, A.2    Shankar, U.3    Paxson, V.4    Coit, J.5    Staniford, S.6
  • 9
    • 0007255130 scopus 로고
    • Sequential decision problems for processes with continuous time parameter testing hypotheses
    • Dvoretzky, A., Kiefer, J., Wolfowitz, J.: Sequential decision problems for processes with continuous time parameter testing hypotheses. Annals of Mathematical Statistics 24 (1953)
    • (1953) Annals of Mathematical Statistics , vol.24
    • Dvoretzky, A.1    Kiefer, J.2    Wolfowitz, J.3
  • 12
    • 0004201481 scopus 로고
    • revised edition. Aegean Park Press, Laguna Hills
    • Golomb, S.: Shift Register Sequences (revised edition). Aegean Park Press, Laguna Hills (1982)
    • (1982) Shift Register Sequences
    • Golomb, S.1
  • 13
    • 78049398073 scopus 로고
    • Sequential tests for exponential populations and poisson processes
    • RAND Corporation
    • Haggstrom, G.: Sequential tests for exponential populations and poisson processes. Technical report, RAND Corporation (1979)
    • (1979) Technical Report
    • Haggstrom, G.1
  • 14
    • 85165849217 scopus 로고    scopus 로고
    • Multi-flow attack resistant watermarks for network flows
    • Houmansadr, A., Kiyavash, N., Borisov, N.: Multi-flow attack resistant watermarks for network flows. In: IEEE ICASSP (2009)
    • (2009) IEEE ICASSP
    • Houmansadr, A.1    Kiyavash, N.2    Borisov, N.3
  • 16
    • 80052167664 scopus 로고    scopus 로고
    • Multi-flow attacks against network flow watermarking schemes
    • Kiyavash, N., HoumanSadr, A., Borisov, N.: Multi-flow attacks against network flow watermarking schemes. In: USENIX Security (2008)
    • (2008) USENIX Security
    • Kiyavash, N.1    HoumanSadr, A.2    Borisov, N.3
  • 19
    • 33751040560 scopus 로고    scopus 로고
    • On the secrecy of timing-based active watermarking trace-back techniques
    • Peng, P., Ning, P., Reeves, D.: On the secrecy of timing-based active watermarking trace-back techniques. In: IEEE Symp. on Security and Privacy (2006)
    • (2006) IEEE Symp. on Security and Privacy
    • Peng, P.1    Ning, P.2    Reeves, D.3
  • 20
    • 34548314612 scopus 로고    scopus 로고
    • Tracing traffic through intermediate hosts that repacketize flows
    • Pyun, Y., Park, Y., Wang, X., Reeves, D., Ning, P.: Tracing traffic through intermediate hosts that repacketize flows. In: IEEE INFOCOM (2007)
    • (2007) IEEE INFOCOM
    • Pyun, Y.1    Park, Y.2    Wang, X.3    Reeves, D.4    Ning, P.5
  • 21
    • 56549101103 scopus 로고    scopus 로고
    • A first step towards live botmaster traceback
    • Lippmann, R., Kirda, E., Trachtenberg, A. eds., Springer, Heidelberg
    • Ramsbrock, D., Wang, X., Jiang, X.: A first step towards live botmaster traceback. In: Lippmann, R., Kirda, E., Trachtenberg, A. (eds.) RAID 2008. LNCS, vol. 5230, pp. 59-77. Springer, Heidelberg (2008)
    • (2008) RAID 2008. LNCS , vol.5230 , pp. 59-77
    • Ramsbrock, D.1    Wang, X.2    Jiang, X.3
  • 22
    • 78349298553 scopus 로고    scopus 로고
    • Improving tor using a TCP-over-DTLS tunnel
    • Reardon, J., Goldberg, I.: Improving tor using a TCP-over-DTLS tunnel. In: USENIX Security (2009)
    • (2009) USENIX Security
    • Reardon, J.1    Goldberg, I.2
  • 25
    • 0022796415 scopus 로고
    • New directions in communications (or which way to the information age?)
    • Turner, J.: New directions in communications (or which way to the information age?). In: IEEE Commun. Magazine (1986)
    • (1986) IEEE Commun. Magazine
    • Turner, J.1
  • 26
    • 33745773302 scopus 로고    scopus 로고
    • Tracking anonymous peer-to-peer voip calls on the internet
    • Wang, X., Chen, S., Jajodia, S.: Tracking anonymous peer-to-peer voip calls on the internet. In: ACM CCS (2005)
    • (2005) ACM CCS
    • Wang, X.1    Chen, S.2    Jajodia, S.3
  • 27
    • 34548762543 scopus 로고    scopus 로고
    • Network flow watermarking attack on low-latency anonymous communication systems
    • Wang, X., Chen, S., Jajodia, S.: Network flow watermarking attack on low-latency anonymous communication systems. In: IEEE Symp. on Security and Privacy (2007)
    • (2007) IEEE Symp. on Security and Privacy
    • Wang, X.1    Chen, S.2    Jajodia, S.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.