-
1
-
-
50249140706
-
Spot me if you can: Recovering spoken phrases in encrypted voip conversations
-
C. Wright, L. Ballard, S. Coulls, F. Monrose, and G. Masson, "Spot me if you can: Recovering spoken phrases in encrypted voip conversations", in Proc. IEEE Symp. Security and Privacy, 2008.
-
(2008)
Proc. IEEE Symp. Security and Privacy
-
-
Wright, C.1
Ballard, L.2
Coulls, S.3
Monrose, F.4
Masson, G.5
-
2
-
-
50249161557
-
Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?
-
Boston, MA
-
C. Wright, L. Ballard, F. Monrose, and G. Masson, "Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?", in Proc. 16th USENIX Security Symp., Boston, MA, 2007.
-
(2007)
Proc. 16th USENIX Security Symp.
-
-
Wright, C.1
Ballard, L.2
Monrose, F.3
Masson, G.4
-
3
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
Berkeley, CA, USENIX Association
-
T. S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno, "Devices that tell on you: Privacy trends in consumer ubiquitous computing", in Proc. 16th USENIX Security Symp. USENIX Security Symp. (SS'07), Berkeley, CA, 2007, pp. 1-16, USENIX Association.
-
(2007)
Proc. 16th USENIX Security Symp. USENIX Security Symp. (SS'07)
, pp. 1-16
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
4
-
-
34249340846
-
Analysis and protection of dynamic membership information for group key distribution schemes
-
DOI 10.1109/TIFS.2007.897274
-
Y. Sun and K. Liu, "Analysis and protection of dynamic membership information for group key distribution schemes", IEEE Trans. Inf. Forensics Security, vol. 2, no. 2, pp. 213-226, Jun. 2007. (Pubitemid 46808689)
-
(2007)
IEEE Transactions on Information Forensics and Security
, vol.2
, Issue.2
, pp. 213-226
-
-
Sun, Y.L.1
Liu, K.J.R.2
-
5
-
-
34848852681
-
Temporal privacy in wireless sensor networks
-
P. Kamat, W. Xu, W. Trappe, and Y. Zhang, "Temporal privacy in wireless sensor networks", in Proc. 27th IEEE Int. Conf. Distributed Computing Systems (ICDCS'07), 2007, pp. 23-31.
-
(2007)
Proc. 27th IEEE Int. Conf. Distributed Computing Systems (ICDCS'07)
, pp. 23-31
-
-
Kamat, P.1
Xu, W.2
Trappe, W.3
Zhang, Y.4
-
6
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
DOI 10.1145/358549.358563
-
D. Chaum, "Untraceable electronic mail, return addresses, and digital pseudonyms", Commun. ACM, vol. 24, pp. 84-88, 1981. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum David, L.1
-
8
-
-
0032074579
-
Anonymous connections and onion routing
-
May
-
M. Reed, P. Syverson, and D. Goldschlag, "Anonymous connections and onion routing", IEEE J. Sel. Areas Commun., vol. 16, no. 4, pp. 482-494, May 1998.
-
(1998)
IEEE J. Sel. Areas Commun.
, vol.16
, Issue.4
, pp. 482-494
-
-
Reed, M.1
Syverson, P.2
Goldschlag, D.3
-
10
-
-
84890010554
-
Stop-and-go-mixes providing probabilistic anonymity in an open system
-
London, U. K., Springer-Verlag
-
D. Kesdogan, J. Egner, and R. Buschkes, "Stop-and-go-mixes providing probabilistic anonymity in an open system", in Proc. Second Int. Workshop on Information Hiding, London, U. K., 1998, pp. 83-98, Springer-Verlag.
-
(1998)
Proc. Second Int. Workshop on Information Hiding
, pp. 83-98
-
-
Kesdogan, D.1
Egner, J.2
Buschkes, R.3
-
11
-
-
27944440026
-
The traffic analysis of continuous-time mixes
-
D. Martin and A. Serjantov, Eds., May
-
G. Danezis, "The traffic analysis of continuous-time mixes", in Proc. Privacy Enhancing Technologies (PET 2004), D. Martin and A. Serjantov, Eds., May 2004.
-
(2004)
Proc. Privacy Enhancing Technologies (PET 2004)
-
-
Danezis, G.1
-
12
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on ssh
-
Berkeley, CA, USENIX Association
-
D. X. Song, D. Wagner, and X. Tian, "Timing analysis of keystrokes and timing attacks on ssh", in Proc. 10th Conf. USENIX Security Symp. (SSYM'01), Berkeley, CA, 2001, pp. 25-25, USENIX Association.
-
(2001)
Proc. 10th Conf. USENIX Security Symp. (SSYM'01)
, pp. 25-25
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
13
-
-
0029732709
-
Bits through queues
-
PII S0018944896004397
-
V. Anantharam and S. Verdu, "Bits through queues", IEEE Trans. Inf. Theory, vol. 42, no. 1, pp. 4-18, Jan. 1996. (Pubitemid 126775652)
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.1
, pp. 4-18
-
-
Anantharam, V.1
Verdu, S.2
-
14
-
-
5444260163
-
Mutual information: A measure of dependency for nonlinear time series
-
R. M. A. Dionisioa and D. A. Mendesb, "Mutual information: A measure of dependency for nonlinear time series", Physica A, Statist. Mechanics and Its Applicat., Applicat. Phys. Financial Anal. 4 (APFA4), vol. 344, pp. 326-329, 2004.
-
(2004)
Physica A, Statist. Mechanics and its Applicat., Applicat. Phys. Financial Anal. 4 (APFA4)
, vol.344
, pp. 326-329
-
-
Dionisioa, R.M.A.1
Mendesb, D.A.2
-
16
-
-
0029179490
-
Rate distortion functions and effective bandwidth of queueing processes
-
Piscataway, NJ
-
C. Chang and J. Thomas, "Rate distortion functions and effective bandwidth of queueing processes", in Proc. 1995 IEEE Int. Symp. Information Theory, Piscataway, NJ, 1995, pp. 103-103.
-
(1995)
Proc. 1995 IEEE Int. Symp. Information Theory
, pp. 103-103
-
-
Chang, C.1
Thomas, J.2
|