-
2
-
-
33745802064
-
Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds
-
A. Blum, D. Song, and S. Venkataraman, "Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds," in Conference of Recent Advance in Intrusion Detection (RAID), (Sophia Antipolis, French Riviera, France), September 2004.
-
Conference of Recent Advance in Intrusion Detection (RAID), (Sophia Antipolis, French Riviera, France), September 2004
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
4
-
-
0020762394
-
Security mechanisms in high-level network protocols
-
V. L. Voydock and S. T. Kent, "Security mechanisms in high-level network protocols," ACM Computing Surveys, vol. 15, pp. 135-171, 1983.
-
(1983)
ACM Computing Surveys
, vol.15
, pp. 135-171
-
-
Voydock, V.L.1
Kent, S.T.2
-
5
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (H. Federrath, ed.), Springer-Verlag
-
J.-F. Raymond, "Traffic analysis: Protocols, attacks, design issues and open problems," in Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability (H. Federrath, ed.), vol. 2009 of LNCS, pp. 10-29, Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.-F.1
-
6
-
-
0036086129
-
Statistical identification of encrypted web browsing traffic
-
May
-
Q. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu, "Statistical identification of encrypted web browsing traffic," in Proceedings of the 2002 IEEE Symposium on Security and Privacy, (Berkeley, California), p. 19, May 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy, (Berkeley, California)
, pp. 19
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
7
-
-
34548743797
-
On countermeasures to traffic analysis attacks
-
18-23 June
-
X. Fu, B. Graham, R. Bettati, and W. Zhao, "On countermeasures to traffic analysis attacks," in Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, pp. 188-195, 18-23 June 2003.
-
(2003)
Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society
, pp. 188-195
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
-
9
-
-
85084161110
-
Timing Analysis of Keystrokes and Timing Attacks on SSH
-
D. X. Song, D. Wagner, and X. Tian, "Timing Analysis of Keystrokes and Timing Attacks on SSH," in Proc. 10th USENIX Security Symposium, (Washington, DC), August 2001.
-
Proc. 10th USENIX Security Symposium, (Washington, DC), August 2001
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
11
-
-
0034836392
-
Information-theoretic measures for anomaly detection
-
vol. 00, (Los Alamitos, CA, USA), IEEE Computer Society
-
W. Lee and D. Xiang, "Information-theoretic measures for anomaly detection," in Proceedings of the 2001 IEEE Symposium on Security and Privacy, vol. 00, (Los Alamitos, CA, USA), p. 0130, IEEE Computer Society, 2001.
-
(2001)
Proceedings of the 2001 IEEE Symposium on Security and Privacy
, pp. 0130
-
-
Lee, W.1
Xiang, D.2
-
12
-
-
33846627316
-
Anonymity analysis of mix networks against flow-correlation attacks
-
Y. Zhu, X. Fu, R. Bettati, and W. Zhao, "Anonymity analysis of mix networks against flow-correlation attacks," in Proceedings of IEEE Global Communications Conference, November 2005.
-
Proceedings of IEEE Global Communications Conference, November 2005
-
-
Zhu, Y.1
Fu, X.2
Bettati, R.3
Zhao, W.4
-
13
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
February
-
D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, vol. 24, pp. 84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
15
-
-
0002054934
-
Crowds: Anonymity for Web transactions
-
M. K. Reiter and A. D. Rubin, "Crowds: anonymity for Web transactions," ACM Transactions on Information and System Security, vol. 1, no. 1, pp. 66-92, 1998.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
16
-
-
84954409133
-
Mixminion: Design of a type iii anonymous remailer protocol
-
May
-
G. Danezis, R. Dingledine, and N. Mathewson, "Mixminion: design of a type iii anonymous remailer protocol," in Proceedings of 2003 Symposium on Security and Privacy, pp. 2-15, May 2003.
-
(2003)
Proceedings of 2003 Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
17
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, July
-
O. Berthold, H. Federrath, and S. Kopsell, "Web MIXes: A system for anonymous and unobservable Internet access," in Proceedings of the Workshop on Design Issues in Anonymity and Unobservability, Lecture Notes in Computer Science, vol. 2009, (Berkeley, CA), pp. 115-129, July 2000.
-
(2000)
Lecture Notes in Computer Science
, vol.2009
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Kopsell, S.3
-
18
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. G. Reed, P. F. Syverson, and D. M. Goldschlag, "Anonymous connections and onion routing," IEEE Journal on Selected Areas in Communications, vol. 16, pp. 482-494, May 1998.
-
(1998)
IEEE Journal on Selected Areas in Communications
, vol.16
, pp. 482-494
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
20
-
-
33846288517
-
Timing attacks in low-latency mix systems
-
Springer
-
B. Levine, M. Reiter, C. Wang, and M. Wright, "Timing attacks in low-latency mix systems," in Financial Cryptography: Lecture Notes in Computer Science, vol. 3110, pp. 251-265, Springer, 2004.
-
(2004)
Financial Cryptography: Lecture Notes in Computer Science
, vol.3110
, pp. 251-265
-
-
Levine, B.1
Reiter, M.2
Wang, C.3
Wright, M.4
-
22
-
-
33750276494
-
Timing analysis in low-latency mix networks: Attacks and defenses
-
Springer
-
V. Shmatikov and M. Wang, "Timing analysis in low-latency mix networks: attacks and defenses," in Computer SecurityESORICS 2006: Lecture Notes in Computer Science, vol. 4185, pp. 18-33, Springer, 2006.
-
(2006)
Computer SecurityESORICS 2006: Lecture Notes in Computer Science
, vol.4185
, pp. 18-33
-
-
Shmatikov, V.1
Wang, M.2
-
23
-
-
34250785454
-
On flow correlation attacks and countermeasures in mix networks
-
Y. Zhu, X. Fu, B. Graham, R.Bettati, and W. Zhao, "On flow correlation attacks and countermeasures in mix networks," in Proceedings of Privacy Enhancing Technologies workshop, May 26-28 2004.
-
Proceedings of Privacy Enhancing Technologies Workshop, May 26-28 2004
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
24
-
-
35248841429
-
From a trickle to a flood: Active attacks on several MIX types
-
Proceedings of the Fifth International Workshop on Information Hiding (IH'02), Noordwijkerhout, The Netherlands, October
-
A. Serjantov, R. Dingledine, and P. Syverson, "From a trickle to a flood: Active attacks on several MIX types," in Proceedings of the Fifth International Workshop on Information Hiding (IH'02), Lecture Notes in Computer Science, vol. 2578, (Noordwijkerhout, The Netherlands), pp. 36-52, October 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2578
, pp. 36-52
-
-
Serjantov, A.1
Dingledine, R.2
Syverson, P.3
-
25
-
-
45249083605
-
Anonymous Networking Amidst Eavesdroppers
-
June
-
P. Venkitasubramaniam, T. He, and L. Tong, "Anonymous Networking Amidst Eavesdroppers," IEEE Transactions on Information Theory, vol. 54, pp. 2770-2784, June 2008.
-
(2008)
IEEE Transactions on Information Theory
, vol.54
, pp. 2770-2784
-
-
Venkitasubramaniam, P.1
He, T.2
Tong, L.3
-
27
-
-
51449097677
-
On security-aware transmission scheduling
-
March 31-April 4
-
T. He, A. Agaskar, and L. Tong, "On security-aware transmission scheduling," in Proc. 2008 IEEE Intl. Conference on Acoustics, Speech and Signal Processing, pp. 1681-1684, March 31-April 4 2008.
-
(2008)
Proc. 2008 IEEE Intl. Conference on Acoustics, Speech and Signal Processing
, pp. 1681-1684
-
-
He, T.1
Agaskar, A.2
Tong, L.3
-
28
-
-
77949574715
-
Maximum throughput of clandestine relay
-
Oct
-
T. He, L. Tong, and A. Swami, "Maximum throughput of clandestine relay," in Proc. 47th Ann. Allerton Conf. on Comm., Contr., and Compt., (Allerton, IL), pp. 1082-1089, Oct 2009.
-
(2009)
Proc. 47th Ann. Allerton Conf. on Comm., Contr., and Compt., (Allerton, IL)
, pp. 1082-1089
-
-
He, T.1
Tong, L.2
Swami, A.3
-
30
-
-
84956040127
-
Diffraction by a wave-guide of finite length
-
D. S. Jones, "Diffraction by a wave-guide of finite length," Proc Camb Phil Soc, vol. 48, no. 1, pp. 118-134, 1952.
-
(1952)
Proc Camb Phil Soc
, vol.48
, Issue.1
, pp. 118-134
-
-
Jones, D.S.1
|