-
1
-
-
19544369316
-
An empirical evaluation of widearea internet bottlenecks
-
M. Crovella, Ed., New York
-
A. Akella, S. Seshan, and A. Shaikh, "An empirical evaluation of widearea internet bottlenecks," in Proc. ACM SIGCOMM Conf. Internet Measure. (IMC), M. Crovella, Ed., New York, 2003, pp. 101-114.
-
(2003)
Proc. ACM SIGCOMM Conf. Internet Measure. (IMC)
, pp. 101-114
-
-
Akella, A.1
Seshan, S.2
Shaikh, A.3
-
3
-
-
33746053876
-
Privacy vulnerabilities in encrypted HTTP streams
-
[Online]. Available
-
G. Bissias, M. Liberatore,D. Jensen, and B. Levine, "Privacy vulnerabilities in encrypted HTTP streams," Privacy Enhancing Technol., pp. 1-11, 2006 [Online]. Available: http://dx.doi.org/10.1007/11767831-1
-
(2006)
Privacy Enhancing Technol.
, pp. 1-11
-
-
Bissias, G.1
Jensen, M.2
Liberatore, D.3
Levine, B.4
-
4
-
-
34547350876
-
Inferring the source of encrypted HTTP connections
-
New York, [Online]. Available:
-
M. Liberatore and B. N. Levine, "Inferring the source of encrypted HTTP connections," in Proc. 13th ACM Conf. Comput. Commun. Secur. (CCS '06), New York, 2006, pp. 255-263 [Online]. Available: http://dx.doi.org/10. 1145/1180405.1180437
-
(2006)
Proc. 13th ACM Conf. Comput. Commun. Secur. (CCS '06)
, pp. 255-263
-
-
Liberatore, M.1
Levine, B.N.2
-
6
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted VOIP conversations
-
Washington, DC, IEEE Computer Soc
-
C. V.Wright, L. Ballard, S. E. Coull, F.Monrose, and G. M. Masson, "Spot me if you can: Uncovering spoken phrases in encrypted VOIP conversations," in Proc. 2008 IEEE Symp. Secur. Privacy( SP '08), Washington, DC, 2008, pp. 35-49, IEEE Computer Soc.
-
(2008)
Proc. 2008 IEEE Symp. Secur. Privacy( SP '08)
, pp. 35-49
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
7
-
-
84947242344
-
Traffic analysis attacks and tradeoffs in anonymity providing systems
-
ser. Lecture Notes in Computer Sci.new York: Springer
-
A. Back, U. Möller, and A. Stiglic, "Traffic analysis attacks and tradeoffs in anonymity providing systems," in Information Hiding, ser. Lecture Notes in Computer Sci.. New York: Springer, 2001, vol. 2137, pp. 245-247.
-
(2001)
Information Hiding
, vol.2137
, pp. 245-247
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
8
-
-
27544454707
-
Low-cost traffic analysis of tor
-
Washington, DC, IEEE Computer Soc
-
S. J. Murdoch and G. Danezis, "Low-cost traffic analysis of tor," in Proc. 2005 IEEE Symp. Secur. Privacy (SP '05), Washington, DC, 2005, pp. 183-195, IEEE Computer Soc.
-
(2005)
Proc. 2005 IEEE Symp. Secur. Privacy (SP '05)
, pp. 183-195
-
-
Murdoch, S.J.1
Danezis, G.2
-
10
-
-
54249091264
-
Don't clog the queue! Circuit clogging andmitigation in P2P anonymity schemes
-
G. Tsudik, Ed. Berlin, Germany: Springer-Verlag, [Online]. Available:
-
J. Mclachlan and N. Hopper, "Don't clog the queue! Circuit clogging andmitigation in P2P anonymity schemes," in Financial Cryptography and Data Security, G. Tsudik, Ed. Berlin, Germany: Springer-Verlag, 2008, pp. 31-46 [Online]. Available: http://dx.doi.org/10.1007/978-3- 540-85230-8-3
-
(2008)
Financial Cryptography and Data Security
, pp. 31-46
-
-
Mclachlan, J.1
Hopper, N.2
-
11
-
-
60349122307
-
Identifying proxy nodes in a tor anonymization circuit
-
Nov. 30-Dec. 3
-
S. Chakravarty, A. Stavrou, and A. Keromytis, "Identifying proxy nodes in a tor anonymization circuit," in Proc. IEEE Int. Conf. Signal Image Technol. Internet Based Syst. (SITIS '08), Nov. 30-Dec. 3, 2008, pp. 633-639.
-
(2008)
Proc. IEEE Int. Conf. Signal Image Technol. Internet Based Syst. (SITIS '08)
, pp. 633-639
-
-
Chakravarty, S.1
Stavrou, A.2
Keromytis, A.3
-
12
-
-
79959957319
-
Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems
-
K. Zhang and X. Wang, "Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems," in USENIX Secur., 2009.
-
(2009)
USENIX Secur.
-
-
Zhang, K.1
Wang, X.2
-
13
-
-
2442569400
-
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
-
ser. Lecture Notes in Computer Sci., Springer. Oct
-
X. Wang, D. Reeves, and S. F. Wu, "Inter-packet delay based correlation for tracing encrypted connections through stepping stones," in Proc. 7th Eur. Symp. Res. Comput. Secur., Oct. 2002, vol. 2502, ser. Lecture Notes in Computer Sci., Springer.
-
(2002)
Proc. 7th Eur. Symp. Res. Comput. Secur.
, vol.2502
-
-
Wang, X.1
Reeves, D.2
Wu, S.F.3
-
14
-
-
27944440026
-
The traffic analysis of continuous-time mixes
-
D. Martin andA. Serjantov, Eds., Berlin/Heidelberg/New York, May, ser. Lecture Notes in Computer Sci., Springer
-
G. Danezis, "The traffic analysis of continuous-time mixes," in Workshop on Privacy Enhancing Technologies, D. Martin andA. Serjantov, Eds., Berlin/Heidelberg/New York, May 2004, vol. 3424, ser. Lecture Notes in Computer Sci., pp. 35-50, Springer.
-
(2004)
Workshop on Privacy Enhancing Technologies
, vol.3424
, pp. 35-50
-
-
Danezis, G.1
-
15
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues, and open problems
-
H. Federrath, Ed. New York: Springer, Jul
-
J.-F. Raymond, "Traffic analysis: Protocols, attacks, design issues, and open problems," in Designing Privacy Enhancing Technologies, ser. Lecture Notes in Computer Sci., H. Federrath, Ed. New York: Springer, Jul. 2000, vol. 2009, pp. 10-29.
-
(2000)
Designing Privacy Enhancing Technologies, ser. Lecture Notes in Computer Sci.
, vol.2009
, pp. 10-29
-
-
Raymond, J.-F.1
-
16
-
-
77955359942
-
A low-cost side channel traffic analysis attack in packet networks
-
Cape Town, South Africa, [Online]. Available
-
S. Kadloor, X. Gong, N. Kiyavash, T. Tezcan, and N. Borisov, "A low-cost side channel traffic analysis attack in packet networks," in Proc. IEEE ICC 2010-Communi. Inf. Syst. Secur. Symp., Cape Town, South Africa, 2010 [Online]. Available: http://www.ifp.illinois. edu/~kadloor1/kadloorICC2010.pdf
-
(2010)
Proc. IEEE ICC 2010-Communi. Inf. Syst. Secur. Symp.
-
-
Kadloor, S.1
Gong, X.2
Kiyavash, N.3
Tezcan, T.4
Borisov, N.5
-
18
-
-
84958977733
-
Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
Springer
-
D. L. Donoho, A. G. Flesia, U. Shankar, V. P. J. Coit, S. Staniford, J. Coit, and S. Staniford, "Multiscale stepping-stone detection: Detecting pairs of jittered interactive streams by exploiting maximum tolerable delay," in Proc. 5th Int. Symp. Recent Advances in Intrusion Detection (RAID), 2002, pp. 17-35, Springer.
-
(2002)
Proc. 5th Int. Symp. Recent Advances in Intrusion Detection (RAID)
, pp. 17-35
-
-
Donoho, D.L.1
Flesia, A.G.2
Shankar, U.3
Coit, V.P.J.4
Staniford, S.5
Coit, J.6
Staniford, S.7
-
21
-
-
0026000660
-
A calculus for network delay. I. Network elements in isolation
-
Jan. [Online]. Available
-
R. L. Cruz, "A calculus for network delay. I. Network elements in isolation," IEEE Trans. Inf. Theory vol. 37, no. 1, pp. 114-131, Jan. 1991 [Online]. Available: http://dx.doi.org/10.1109/18.61109
-
(1991)
IEEE Trans. Inf. Theory
, vol.37
, Issue.1
, pp. 114-131
-
-
Cruz, R.L.1
-
22
-
-
84858322405
-
-
Linux Advanced Routing & Traffic Control HOWTO Online publication Linux Advanced Routing & Traffic Control Apr. 2004 [Online]. Available
-
B. Hubert, T. Graf, G. Maxwell, R. Van Mook, M. Van Oosterhout, P. B. Schroeder, J. Spaans, and P. Larroy, Linux Advanced Routing & Traffic Control HOWTO, Online publication, Linux Advanced Routing & Traffic Control, Apr. 2004 [Online]. Available: http://lartc.org/lartc.pdf
-
-
-
Hubert, B.1
Graf, T.2
Maxwell, G.3
Van Mook, R.4
Van Oosterhout, M.5
Schroeder, P.B.6
Spaans, J.7
Larroy, P.8
-
23
-
-
0031191180
-
Traffic models in broadband networks
-
Jul
-
A. Adas, "Traffic models in broadband networks," IEEE Commun. Mag., vol. 35, no. 7, pp. 82-89, Jul. 1997.
-
(1997)
IEEE Commun. Mag.
, vol.35
, Issue.7
, pp. 82-89
-
-
Adas, A.1
|