-
1
-
-
42549172448
-
-
[Online; accessed April 2012]
-
Boost C++ Libraries. http://www.boost.org/.[Online; accessed April 2012].
-
Boost C++ Libraries
-
-
-
2
-
-
84870640634
-
-
[Online; accessed April 2012]
-
Does Skype use encryption? https://support.skype.com/en/faq/FA31/Does- Skype-use-encryption. [Online; accessed April 2012].
-
Does Skype Use Encryption?
-
-
-
3
-
-
84870650989
-
-
[Online; accessed April 2012]
-
Number of Skype users in 2010. http://about.skype.com/press/2011/05/ microsoft-to-acquire-skype.html. [Online; accessed April 2012].
-
Number of Skype Users in 2010
-
-
-
4
-
-
84870633668
-
-
[Online; accessed April 2012]
-
Skype Software. http://skype.com. [Online; accessed April 2012].
-
-
-
-
5
-
-
84870646788
-
-
[Online; accessed April 2012]
-
SkypeKit. http://developer.skype.com/public/skypekit. [Online; accessed April 2012].
-
-
-
-
6
-
-
84870629277
-
-
[Online; accessed April 2012]
-
Tor BridgeDB. https://gitweb.torproject.org/bridgedb.git/tree.[Online; accessed April 2012].
-
-
-
-
7
-
-
84870636197
-
-
Ethiopian Government Bans Skype. [Online, accessed May 2012]
-
Ethiopian Government Bans Skype, Google Talk And All Other VoIP Services. http://techcrunch.com/2012/06/14/ethiopian-government-bans-skype-google-talk- and-all-other-voip-services/, 2012. [Online, accessed May 2012].
-
(2012)
Google Talk and All Other VoIP Services
-
-
-
8
-
-
84870642932
-
-
Skype ban in the UAE could be lifted, as it is "purely a licensing matter". [Online, accessed May 2012]
-
Skype ban in the UAE could be lifted, as it is "purely a licensing matter". http://thenextweb.com/me/2012/04/21/skype-ban-in-the-uae-could-be- lifted-as-it-is-purely-a-licensing-matter/, 2012. [Online, accessed May 2012].
-
(2012)
-
-
-
11
-
-
35048881331
-
-
March. [Online; accessed April 2012]
-
P. Biondi and F. Desclaux. Silver Needle in the Skype. BlackHat Europe, http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06-biondi/ bh-eu-06-biondi-up.pdf, March 2006. [Online; accessed April 2012].
-
(2006)
Silver Needle in the Skype
-
-
Biondi, P.1
Desclaux, F.2
-
13
-
-
51349155248
-
Tracking down skype traffic
-
D. Bonfiglio, M. Mellia, M. Meo, N. Ritacca, and D. Rossi. Tracking Down Skype Traffic. In INFOCOM 2008. 27th IEEE Conference on Computer Communications., pages 261 -265, 2008.
-
(2008)
INFOCOM 2008. 27th IEEE Conference on Computer Communications
, pp. 261-265
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Ritacca, N.4
Rossi, D.5
-
14
-
-
36949009834
-
Revealing skype traffic: When randomness plays with you
-
D. Bonfiglio, M. Mellia, M. Meo, D. Rossi, and P. Tofanelli. Revealing Skype Traffic: When Randomness Plays with You. In Proceedings of the 2007 conference on Applications, technologies, architectures, and protocols for computer communications, SIGCOMM '07, pages 37-48, 2007.
-
(2007)
Proceedings of the 2007 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications, SIGCOMM '07
, pp. 37-48
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Rossi, D.4
Tofanelli, P.5
-
17
-
-
84870651136
-
-
[Online; accessed April 2012]
-
R. Dingledine. Research problems: Ten ways to discover Tor bridges. https://blog.torproject.org/blog/research-problems-ten-ways-discover-tor- bridges. [Online; accessed April 2012].
-
Research Problems: Ten Ways to Discover
-
-
Dingledine, R.1
-
18
-
-
84870633357
-
-
Sept. [Online; accessed April 2012]
-
R. Dingledine. Iran blocks Tor; Tor releases same-day fix. https://blog.torproject.org/blog/iran-blocks-tor-tor-releases-same-day-fix, Sept. 2011. [Online; accessed April 2012].
-
(2011)
-
-
Dingledine, R.1
-
19
-
-
85084161366
-
Tor: The second-generation onion router
-
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The Second-Generation Onion Router. In Proceedings of the 13th conference on USENIX Security Symposium, SSYM'04, pages 303-320, 2004.
-
(2004)
Proceedings of the 13th Conference on USENIX Security Symposium, SSYM'04
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
20
-
-
56449109261
-
Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting
-
M. Dusi, M. Crotti, F. Gringoli, and L. Salgarelli. Tunnel Hunter: Detecting application-layer tunnels with statistical fingerprinting. Computer Networks, 53(1):81-97, 2009.
-
(2009)
Computer Networks
, vol.53
, Issue.1
, pp. 81-97
-
-
Dusi, M.1
Crotti, M.2
Gringoli, F.3
Salgarelli, L.4
-
21
-
-
80755169467
-
Televisions, video privacy, and powerline electromagnetic interference
-
New York, NY, USA. ACM
-
M. Enev, S. Gupta, T. Kohno, and S. N. Patel. Televisions, video privacy, and powerline electromagnetic interference. In Proceedings of the 18th ACM conference on Computer and Communications Security, CCS '11, pages 537-550, New York, NY, USA, 2011. ACM.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 537-550
-
-
Enev, M.1
Gupta, S.2
Kohno, T.3
Patel, S.N.4
-
22
-
-
65149095168
-
Provably secure steganography
-
N. Hopper, L. von Ahn, and J. Langford. Provably Secure Steganography. IEEE Transactions on Computers, 58(5):662-676, 2009.
-
(2009)
IEEE Transactions on Computers
, vol.58
, Issue.5
, pp. 662-676
-
-
Hopper, N.1
Von Ahn, L.2
Langford, J.3
-
23
-
-
80755169503
-
Cirripede: Circumvention infrastructure using router redirection with plausible deniability
-
A. Houmansadr, G. T. Nguyen, M. Caesar, and N. Borisov. Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability. In Proceedings of the 18th ACM conference on Computer and Communications Security, CCS '11, pages 187-200, 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security, CCS '11
, pp. 187-200
-
-
Houmansadr, A.1
Nguyen, G.T.2
Caesar, M.3
Borisov, N.4
-
25
-
-
85084162299
-
Decoy routing: Toward unblockable internet communication
-
August
-
J. Karlin, D. Ellard, A. W. Jackson, C. E. Jones, G. Lauer, D. P. Mankins, and W. T. Strayer. Decoy Routing: Toward Unblockable Internet Communication. In Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011), August 2011.
-
(2011)
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI 2011)
-
-
Karlin, J.1
Ellard, D.2
Jackson, A.W.3
Jones, C.E.4
Lauer, G.5
Mankins, D.P.6
Strayer, W.T.7
-
26
-
-
19944417112
-
Port knocking: Network authentication across closed ports
-
M. Krzywinski. Port knocking: Network authentication across closed ports. SysAdmin Magazine, 12(6):12-17, 2003.
-
(2003)
SysAdmin Magazine
, vol.12
, Issue.6
, pp. 12-17
-
-
Krzywinski, M.1
-
27
-
-
84870627427
-
-
[Online; accessed April 2012]
-
A. Langley. curve25519-donna.http://code.google.com/p/curve25519-donna/. [Online; accessed April 2012].
-
-
-
Langley, A.1
-
30
-
-
84881249305
-
-
[Online; accessed April 2012]
-
N. Mathewson. The Tor Project, A simple obfuscating proxy. https://gitweb.torproject.org/obfsproxy.git.[Online; accessed April 2012].
-
A Simple Obfuscating Proxy
-
-
Mathewson, N.1
-
33
-
-
84869472234
-
SkypeMorph: Protocol obfuscation for tor bridges
-
H. Mohajeri Moghaddam, B. Li, M. Derakhshani, and I. Goldberg. SkypeMorph: Protocol Obfuscation for Tor Bridges. Technical Report CACR 2012-08, University of Waterloo, 2012.
-
(2012)
Technical Report CACR 2012-08, University of Waterloo
-
-
Mohajeri Moghaddam, H.1
Li, B.2
Derakhshani, M.3
Goldberg, I.4
-
35
-
-
0013379958
-
-
[Online; accessed April 2012]
-
NIST/SEMATECH. e-Handbook of Statistical Methods. http://www.itl.nist. gov/div898/handbook/index.htm. [Online; accessed April 2012].
-
E-Handbook of Statistical Methods
-
-
-
36
-
-
0032680807
-
Information hiding - A survey
-
F. Petitcolas, R. Anderson, and M. Kuhn. Information Hiding - A Survey. Proceedings of the IEEE, special issue on protection of multimedia content, pages 1062 -1078, 1999.
-
(1999)
Proceedings of the IEEE, Special Issue on Protection of Multimedia Content
, pp. 1062-1078
-
-
Petitcolas, F.1
Anderson, R.2
Kuhn, M.3
-
38
-
-
78650117270
-
Devices that tell on you: Privacy trends in consumer ubiquitous computing
-
Berkeley, CA, USA. USENIX Association
-
T. S. Saponas, J. Lester, C. Hartung, S. Agarwal, and T. Kohno. Devices that tell on you: privacy trends in consumer ubiquitous computing. In Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07, pages 5:1-5:16, Berkeley, CA, USA, 2007. USENIX Association.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07
, pp. 51-516
-
-
Saponas, T.S.1
Lester, J.2
Hartung, C.3
Agarwal, S.4
Kohno, T.5
-
39
-
-
0001217738
-
The prisoners problem and the subliminal channel
-
Springer
-
G. J. Simmons. The Prisoners Problem and the Subliminal Channel. In Advances in Cryptology: CRYPTO 1983, pages 51-67. Springer, 1984.
-
(1983)
Advances in Cryptology: CRYPTO
, pp. 51-67
-
-
Simmons, G.J.1
-
40
-
-
80955131241
-
BridgeSPA: Improving Tor bridges with single packet authorization
-
R. Smits, D. Jain, S. Pidcock, I. Goldberg, and U. Hengartner. BridgeSPA: Improving Tor bridges with Single Packet Authorization. In Proceedings of the 10th annual ACM workshop on Privacy in the Electronic Society, WPES '11, pages 93-102, 2011.
-
(2011)
Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES '11
, pp. 93-102
-
-
Smits, R.1
Jain, D.2
Pidcock, S.3
Goldberg, I.4
Hengartner, U.5
-
42
-
-
84869385204
-
-
[Online, accessed July 2012]
-
The Tor Project. Tor Metrics Portal: Users. https://metrics.torproject. org/users.html, 2012. [Online, accessed July 2012].
-
(2012)
Tor Metrics Portal: Users
-
-
-
43
-
-
80051967189
-
Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks
-
A. White, A. Matthews, K. Snow, and F. Monrose. Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on fon-iks. In IEEE Symposium on Security and Privacy (SP), pages 3 -18, 2011.
-
(2011)
IEEE Symposium on Security and Privacy (SP)
, pp. 3-18
-
-
White, A.1
Matthews, A.2
Snow, K.3
Monrose, F.4
-
44
-
-
84864245019
-
-
Jan. [Online; accessed April 2012]
-
T. Wilde. Knock Knock Knockin' on Bridges' Doors. https://blog. torproject.org/blog/knock-knock-knockin-bridges-doors, Jan. 2012. [Online; accessed April 2012].
-
(2012)
Knock Knock Knockin' on Bridges' Doors
-
-
Wilde, T.1
-
46
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted VoIP conversations
-
C. Wright, L. Ballard, S. Coull, F. Monrose, and G. Masson. Spot Me if You Can: Uncovering Spoken Phrases in Encrypted VoIP Conversations. In IEEE Symposium on Security and Privacy (SP), pages 35 -49, 2008.
-
(2008)
IEEE Symposium on Security and Privacy (SP)
, pp. 35-49
-
-
Wright, C.1
Ballard, L.2
Coull, S.3
Monrose, F.4
Masson, G.5
|