-
1
-
-
79960852562
-
-
Anonymizer, Inc., http://www.anonymizer.com/.2010.
-
-
-
-
3
-
-
34548755641
-
Dsss-based flow marking technique for invisible traceback
-
May
-
W. Yu, X. Fu, S. Graham, D. Xuan, and W. Zhao, "Dsss-based flow marking technique for invisible traceback," in Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P), May 2007.
-
(2007)
Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P)
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
4
-
-
70349666876
-
Blind detection of spread spectrum flow watermarks
-
Rio de Janeiro, Brazil, April
-
W. Jia, F. TSO, Z. Ling, X. Fu, D. Xuan, and W. Yu, "Blind detection of spread spectrum flow watermarks," in Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM), Rio de Janeiro, Brazil, April 2009.
-
(2009)
Proceedings of the 28th IEEE International Conference on Computer Communications (INFOCOM)
-
-
Jia, W.1
Tso, F.2
Ling, Z.3
Fu, X.4
Xuan, D.5
Yu, W.6
-
6
-
-
34250785454
-
On flow correlation attacks and countermeasures in mix networks
-
May
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, "On flow correlation attacks and countermeasures in mix networks," in Proceedings of Workshop on Privacy EnhanCing Technologies (PET), May 2004.
-
(2004)
Proceedings of Workshop on Privacy EnhanCing Technologies (PET)
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
7
-
-
33745798251
-
Timing attacks in low-latency mix-based systems
-
February
-
B. N. Levine, M. K. Reiter, C. Wang, and M. Wright, "Timing attacks in low-latency mix-based systems," in Proceedings of Financial Cryptography (FC), February 2004.
-
(2004)
Proceedings of Financial Cryptography (FC)
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.4
-
9
-
-
27944485356
-
On flow marking attacks in wireless anonymous communication networks
-
April
-
X. Fu, Y. Zhu, B. Graham, R. Bettati, and W. Zhao, "On flow marking attacks in wireless anonymous communication networks," in Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), April 2005.
-
(2005)
Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS)
-
-
Fu, X.1
Zhu, Y.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
11
-
-
84904261405
-
Sleepy watermark tracing: An active network-based intrusion response framework
-
June
-
X. Wang, D. S. Reeves, S. F. Wu, and J. Yuill, "Sleepy watermark tracing: An active network-based intrusion response framework," in Proceedings of 16th International Coriference on lriformation Security (IFlP/Sec), June 2001.
-
(2001)
Proceedings of 16th International Coriference on Lriformation Security (IFlP/Sec)
-
-
Wang, X.1
Reeves, D.S.2
Wu, S.F.3
Yuill, J.4
-
16
-
-
34548314612
-
Tracing traffic through intermediate hosts that repacketize flows
-
May
-
Y. J. Pyun, Y. H. Park, X. Wang, D. S. Reeves, and P. Ning, "Tracing traffic through intermediate hosts that repacketize flows," in Proceedings of IEEE INFOCOM, May 2007.
-
(2007)
Proceedings of IEEE INFOCOM
-
-
Pyun, Y.J.1
Park, Y.H.2
Wang, X.3
Reeves, D.S.4
Ning, P.5
-
18
-
-
78049368157
-
On the secrecy of spreadspectrum flow watermarks
-
X. Luo, J. Zhang, R. Perdisci, and W. Lee, "On the secrecy of spreadspectrum flow watermarks," in Proceedings of European Symposium on Research in Computer Security ESORICS, 2010.
-
(2010)
Proceedings of European Symposium on Research in Computer Security ESORICS
-
-
Luo, X.1
Zhang, J.2
Perdisci, R.3
Lee, W.4
-
21
-
-
0004199580
-
-
2nd ed,Upper Saddle River, NJ 07458, USA: Prentice-Hall
-
A. V. Oppenheim, A. S. Willsky, and S. H. Nawab, Signals and systems, 2nd ed. Upper Saddle River, NJ 07458, USA: Prentice-Hall, 1997.
-
(1997)
Signals and Systems
-
-
Oppenheim, A.V.1
Willsky, A.S.2
Nawab, S.H.3
|