-
1
-
-
33746053876
-
Privacy vulnerabilities in encrypted HTTP streams
-
G. Bissias, M. Liberatore, D. Jensen, and B. Levine. Privacy vulnerabilities in encrypted HTTP streams. In Privacy Enhancing Technologies, pages 1-11, 2006.
-
(2006)
Privacy Enhancing Technologies
, pp. 1-11
-
-
Bissias, G.1
Liberatore, M.2
Jensen, D.3
Levine, B.4
-
2
-
-
77955197190
-
Side-channel leaks in web applications: A reality today, a challenge tomorrow
-
S. Chen, R. Wang, X. Wang, and K. Zhang. Side-Channel Leaks in Web Applications: a Reality Today, a Challenge Tomorrow. In Proceedings of IEEE Symposium on Security and Privacy (Oakland), 2010.
-
(2010)
Proceedings of IEEE Symposium on Security and Privacy (Oakland)
-
-
Chen, S.1
Wang, R.2
Wang, X.3
Zhang, K.4
-
4
-
-
34547350876
-
Inferring the source of encrypted HTTP connections
-
New York, NY, USA. ACM Press
-
M. Liberatore and B. N. Levine. Inferring the source of encrypted HTTP connections. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 255-263, New York, NY, USA, 2006. ACM Press.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 255-263
-
-
Liberatore, M.1
Levine, B.N.2
-
5
-
-
0030832833
-
Dummynet: A simple approach to the evaluation of network protocols
-
L. Rizzo. Dummynet: a simple approach to the evaluation of network protocols. ACM SIGCOMM Computer Communication Review, 27(1):31-41, 1997.
-
(1997)
ACM SIGCOMM Computer Communication Review
, vol.27
, Issue.1
, pp. 31-41
-
-
Rizzo, L.1
-
6
-
-
0017930815
-
Dynamic programming algorithm optimization for spoken word recognition
-
H. Sakoe and S. Chiba. Dynamic programming algorithm optimization for spoken word recognition. IEEE Transactions on Acoustics, Speech, and Signal Processing, 26:43-49, 1978.
-
(1978)
IEEE Transactions on Acoustics, Speech, and Signal Processing
, vol.26
, pp. 43-49
-
-
Sakoe, H.1
Chiba, S.2
-
7
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
T. Saponas, J. Lester, C. Hartung, S. Agarwal, T. Kohno, et al. Devices that tell on you: Privacy trends in consumer ubiquitous computing. In Usenix Security, volume 3, page 3, 2007.
-
(2007)
Usenix Security
, vol.3
, pp. 3
-
-
Saponas, T.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
9
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations
-
C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In IEEE Symposium on Security and Privacy, pages 35-49, 2008.
-
(2008)
IEEE Symposium on Security and Privacy
, pp. 35-49
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
10
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations
-
Washington, DC, USA. IEEE Computer Society
-
C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson. Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations. In SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pages 35-49, Washington, DC, USA, 2008. IEEE Computer Society.
-
(2008)
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy
, pp. 35-49
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
11
-
-
79959957319
-
Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems
-
K. Zhang and X. Wang. Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems. In USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Zhang, K.1
Wang, X.2
|