-
1
-
-
0038345778
-
-
White paper, Zero Knowledge Systems, Inc., May
-
BACK, A., GOLDBERG, I., AND SHOSTACK, A. Freedom systems 2.1 security issues and analysis. White paper, Zero Knowledge Systems, Inc., May 2001.
-
(2001)
Freedom Systems 2.1 Security Issues and Analysis
-
-
Back, A.1
Goldberg, I.2
Shostack, A.3
-
2
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Apr. I. S. Moskowitz, Ed.,. of Lecture Notes in Computer Science, Springer-Verlag
-
BACK, A., MÖLLER, U., AND STIGLIC, A. Traffic analysis attacks and trade-offs in anonymity providing systems. In Information Hiding Workshop (Apr. 2001), I. S. Moskowitz, Ed., vol. 2137 of Lecture Notes in Computer Science, Springer-Verlag, pp. 245–247.
-
(2001)
Information Hiding Workshop
, vol.2137
, pp. 245-247
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
3
-
-
85031236652
-
Operating systems support for planetary-scale network services
-
Mar. R. Morris and S. Savage, Eds., USENIX
-
BAVIER, A., BOWMAN, M., CHUN, B., CULLER, D., KARLIN, S., MUIR, S., PETERSON, L., ROSCOE, T., SPALINK, T., AND WAWRZONIAK, M. Operating systems support for planetary-scale network services. In Symposium on Networked Systems Design and Implementation (Mar. 2004), R. Morris and S. Savage, Eds., USENIX, pp. 253–266.
-
(2004)
Symposium on Networked Systems Design and Implementation
, pp. 253-266
-
-
Bavier, A.1
Bowman, M.2
Chun, B.3
Culler, D.4
Karlin, S.5
Muir, S.6
Peterson, L.7
Roscoe, T.8
Spalink, T.9
Wawrzoniak, M.10
-
4
-
-
0030384775
-
Techniques for data hiding
-
A.LU
-
BENDER, W., GRUHL, D., MORIMOTO, N., AND A.LU. Techniques for data hiding. IBM Systems Journal 35, 3/4 (1996), 313–336.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3-4
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
-
5
-
-
35048846490
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
Sept. E. Jonsson, A. Valdes, and M. Almgren, Eds.,. of Lecture Notes in Computer Science, Springer
-
BLUM, A., SONG, D. X., AND VENKATARAMAN, S. Detection of interactive stepping stones: Algorithms and confidence bounds. In International Symposium on Recent Advances in Intrusion Detection (Sept. 2004), E. Jonsson, A. Valdes, and M. Almgren, Eds., vol. 3224 of Lecture Notes in Computer Science, Springer, pp. 258–277.
-
(2004)
International Symposium on Recent Advances in Intrusion Detection
, vol.3224
, pp. 258-277
-
-
Blum, A.1
Song, D.X.2
Venkataraman, S.3
-
6
-
-
33645586953
-
The anonymizer: Protecting user privacy on the web
-
September
-
BOYAN, J. The anonymizer: Protecting user privacy on the web. Computer-Mediated Communication Magazine 4, 9 (September 1997).
-
(1997)
Computer-Mediated Communication Magazine
, vol.4
, pp. 9
-
-
Boyan, J.1
-
7
-
-
0036482863
-
The time-rescaling theorem and its application to neural spike train data analysis
-
BROWN, E. N., BARBIERI, R., VENTURA, V., KASS, R. E., AND FRANK, L. M. The time-rescaling theorem and its application to neural spike train data analysis. Neural Computation 14, 2 (2002), 325–346.
-
(2002)
Neural Computation
, vol.14
, Issue.2
, pp. 325-346
-
-
Brown, E.N.1
Barbieri, R.2
Ventura, V.3
Kass, R.E.4
Frank, L.M.5
-
8
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
February
-
CHAUM, D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24, 2 (February 1981), 84–90.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.1
-
9
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
COX, I., KILIAN, J., LEIGHTON, T., AND SHAMOON, T. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing 6, 12 (1997), 1673–1687.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
10
-
-
0030388964
-
Secure spread spectrum watermarking for images, audio, and video
-
COX, I. J., KILLIAN, J., LEIGHTON, T., AND SHAMOON, T. Secure spread spectrum watermarking for images, audio, and video. In IEEE International Conference on Image Processing (1996), vol. III, pp. 243–246.
-
(1996)
IEEE International Conference on Image Processing
, vol.3
, pp. 243-246
-
-
Cox, I.J.1
Killian, J.2
Leighton, T.3
Shamoon, T.4
-
11
-
-
85084161366
-
ToR: The second-generation onion router
-
Aug. M. Blaze, Ed., USENIX Association
-
DINGLEDINE, R., MATHEWSON, N., AND SYVERSON, P. Tor: The second-generation onion router. In USENIX Security Symposium (Aug. 2004), M. Blaze, Ed., USENIX Association, pp. 303–320.
-
(2004)
USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
12
-
-
84958977733
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
Oct. A. Wespi, G. Vigna, and L. Deri, Eds.,. of Lecture Notes in Computer Science, Springer
-
DONOHO, D., FLESIA, A., SHANKAR, U., PAXSON, V., COIT, J., AND STANIFORD, S. Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In International Symposium on Recent Advances in Intrusion Detection (Oct. 2002), A. Wespi, G. Vigna, and L. Deri, Eds., vol. 2516 of Lecture Notes in Computer Science, Springer, pp. 16–18.
-
(2002)
International Symposium on Recent Advances in Intrusion Detection
, vol.2516
, pp. 16-18
-
-
Donoho, D.1
Flesia, A.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
14
-
-
33749044955
-
The markov-modulated poisson process (MMPP) cookbook
-
FISCHER, W., AND MEIER-HELLSTERN, K. The Markov-modulated Poisson process (MMPP) cookbook. Performance Evaluation 18, 2 (1993), 149–171.
-
(1993)
Performance Evaluation
, vol.18
, Issue.2
, pp. 149-171
-
-
Fischer, W.1
Meier-Hellstern, K.2
-
17
-
-
84890411878
-
Resistance of digital watermarks to collusive attacks
-
KILIAN, J., LEIGHTON, F., MATHESON, L., SHAMOON, T., TARJAN, R., AND ZANE, F. Resistance of digital watermarks to collusive attacks. In IEEE International Symposium on Information Theory (1998), p. 271.
-
(1998)
IEEE International Symposium on Information Theory
, pp. 271
-
-
Kilian, J.1
Leighton, F.2
Matheson, L.3
Shamoon, T.4
Tarjan, R.5
Zane, F.6
-
19
-
-
0029323403
-
Wide-area traffic: The failure of poisson modeling
-
June
-
PAXSON, V., AND FLOYD, S. Wide-area traffic: The failure of Poisson modeling. IEEE/ACM Transactions on Networking 3, 3 (June 1995), 226–244.
-
(1995)
IEEE/ACM Transactions on Networking
, vol.3
, Issue.3
, pp. 226-244
-
-
Paxson, V.1
Floyd, S.2
-
21
-
-
34548314612
-
Tracing traffic through intermediate hosts that repacketize flows
-
May G. Kesidis, E. Modiano, and R. Srikant, Eds.
-
PYUN, Y., PARK, Y., WANG, X., REEVES, D. S., AND NING, P. Tracing traffic through intermediate hosts that repacketize flows. In IEEE Conference on Computer Communications (INFOCOM) (May 2007), G. Kesidis, E. Modiano, and R. Srikant, Eds., pp. 634–642.
-
(2007)
IEEE Conference on Computer Communications (INFOCOM)
, pp. 634-642
-
-
Pyun, Y.1
Park, Y.2
Wang, X.3
Reeves, D.S.4
Ning, P.5
-
22
-
-
0038311863
-
-
Federrath 13
-
RAYMOND, J.-F. Traffic analysis: Protocols, attacks, design issues, and open problems. In Federrath [13], pp. 10–29.
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
, pp. 10-29
-
-
Raymond, J.-F.1
-
23
-
-
0038311861
-
-
Federrath 13
-
SYVERSON, P., TSUDIK, G., REED, M., AND LANDWEHR, C. Towards an analysis of onion routing security. In Federrath [13], pp. 96–114.
-
Towards An Analysis of Onion Routing Security
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
24
-
-
33745773302
-
Tracking anonymous peer-to-peer VoIP calls on the internet
-
Nov. C. Meadows, Ed., ACM
-
WANG, X., CHEN, S., AND JAJODIA, S. Tracking anonymous peer-to-peer VoIP calls on the Internet. In ACM Conference on Computer and Communications Security (Nov. 2005), C. Meadows, Ed., ACM, pp. 81–91.
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 81-91
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
25
-
-
34548762543
-
-
Pfitzmann and McDaniel 20
-
WANG, X., CHEN, S., AND JAJODIA, S. Network flow watermarking attack on low-latency anonymous communication systems. In Pfitzmann and McDaniel [20], pp. 116–130.
-
Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems
, pp. 116-130
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
26
-
-
84957003012
-
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
-
Oct. D. Gollmann, G. Karjoth, and M. Waidner, Eds.,. of Lecture Notes in Computer Science, Springer
-
WANG, X., REEVES, D., AND WU, S. F. Inter-packet delay based correlation for tracing encrypted connections through stepping stones. In European Symposium on Research in Computer Security (Oct. 2002), D. Gollmann, G. Karjoth, and M. Waidner, Eds., vol. 2502 of Lecture Notes in Computer Science, Springer, pp. 244–263.
-
(2002)
European Symposium on Research in Computer Security
, vol.2502
, pp. 244-263
-
-
Wang, X.1
Reeves, D.2
Wu, S.F.3
-
27
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays
-
Atluri, Ed., ACM
-
WANG, X., AND REEVES, D. S. Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays. In ACM Conference on Computer and Communications Security (2003), V. Atluri, Ed., ACM, pp. 20–29.
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D.S.2
-
28
-
-
34548755641
-
-
Pfitzmann and McDaniel 20
-
YU, W., FU, X., GRAHAM, S., D.XUAN, AND ZHAO, W. DSSS-based flow marking technique for invisible traceback. In Pfitzmann and McDaniel [20], pp. 18–32.
-
DSSS-Based Flow Marking Technique for Invisible Traceback
, pp. 18-32
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
29
-
-
85084161090
-
Detecting stepping stones
-
Aug. S. Bellovin and G. Rose, Eds., USENIX Association
-
ZHANG, Y., AND PAXSON, V. Detecting stepping stones. In USENIX Security Symposium (Aug. 2000), S. Bellovin and G. Rose, Eds., USENIX Association, pp. 171–184.
-
(2000)
USENIX Security Symposium
, pp. 171-184
-
-
Zhang, Y.1
Paxson, V.2
|