-
4
-
-
84870636205
-
-
Sep, 14
-
New blocking activity from iran, Sep, 14, 2011. https://blog.torproject. org/blog/iran-blocks-tor-tor-releases-same-day-fix.
-
(2011)
New Blocking Activity from Iran
-
-
-
5
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
Springer-Verlag
-
A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In Proceedings of the 4th International Workshop on Information Hiding, IHW '01, pages 245-257. Springer-Verlag, 2001.
-
(2001)
Proceedings of the 4th International Workshop on Information Hiding, IHW '01
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
6
-
-
84870637176
-
-
Berkman Center for Internet & Society
-
Berkman Center for Internet & Society. Mapping local internet control. http://cyber.law.harvard.edu/netmaps/geo-map-home.php.
-
Mapping Local Internet Control
-
-
-
8
-
-
77956573382
-
The transport layer security (TLS) protocol version 1.2
-
Aug. Updated by RFCs 5746, 5878, 6176
-
T. Dierks and E. Rescorla. The Transport Layer Security (TLS) Protocol Version 1.2. RFC 5246 (Proposed Standard), Aug. 2008. Updated by RFCs 5746, 5878, 6176.
-
(2008)
RFC 5246 (Proposed Standard)
-
-
Dierks, T.1
Rescorla, E.2
-
10
-
-
84878355718
-
Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail
-
May
-
K. P. Dyer, S. E. Coull, T. Ristenpart, and T. Shrimpton. Peek-a-boo, i still see you: Why efficient traffic analysis countermeasures fail. In Proceedings of the 2012 IEEE Symposium on Security and Privacy, May 2012.
-
(2012)
Proceedings of the 2012 IEEE Symposium on Security and Privacy
-
-
Dyer, K.P.1
Coull, S.E.2
Ristenpart, T.3
Shrimpton, T.4
-
14
-
-
18144416517
-
Quantifying routing asymmetry in the internet at the as level
-
volume 3 of GLOBECOM '04, IEEE
-
Y. He, M. Faloutsos, and S. Krishnamurthy. Quantifying routing asymmetry in the internet at the as level. In Global Telecommunications Conference, 2004, volume 3 of GLOBECOM '04, pages 1474-1479. IEEE, 2004.
-
(2004)
Global Telecommunications Conference, 2004
, pp. 1474-1479
-
-
He, Y.1
Faloutsos, M.2
Krishnamurthy, S.3
-
15
-
-
74049147408
-
Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier
-
New York, NY, USA. ACM
-
D. Herrmann, R. Wendolsky, and H. Federrath. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier. In Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09), pages 31-42, New York, NY, USA, 2009. ACM.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security (CCSW '09)
, pp. 31-42
-
-
Herrmann, D.1
Wendolsky, R.2
Federrath, H.3
-
16
-
-
6344251217
-
Fingerprinting websites using traffic analysis
-
R. Dingledine and P. Syverson, editors. Springer-Verlag, LNCS 2482, April
-
A. Hintz. Fingerprinting websites using traffic analysis. In R. Dingledine and P. Syverson, editors, Proceedings of Privacy Enhancing Technologies workshop (PET 2002). Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
Proceedings of Privacy Enhancing Technologies Workshop (PET 2002)
-
-
Hintz, A.1
-
19
-
-
85084162299
-
Decoy routing: Toward unblockable internet communication
-
J. Karlin, D. Ellard, A. W. Jackson, C. E. Jones, G. Lauer, D. P. Mankins, and W. T. Strayer. Decoy routing: Toward unblockable internet communication. In Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI), 2011.
-
(2011)
Proceedings of the USENIX Workshop on Free and Open Communications on the Internet (FOCI)
-
-
Karlin, J.1
Ellard, D.2
Jackson, A.W.3
Jones, C.E.4
Lauer, G.5
Mankins, D.P.6
Strayer, W.T.7
-
20
-
-
33244474251
-
On as-level path inference
-
ACM
-
Z. Mao, L. Qiu, J. Wang, and Y. Zhang. On as-level path inference. In ACM SIGMETRICS Performance Evaluation Review, volume 33, pages 339-349. ACM, 2005.
-
(2005)
ACM SIGMETRICS Performance Evaluation Review
, vol.33
, pp. 339-349
-
-
Mao, Z.1
Qiu, L.2
Wang, J.3
Zhang, Y.4
-
22
-
-
80955131237
-
Website fingerprinting in onion routing based anonymization networks
-
ACM
-
A. Panchenko, L. Niessen, A. Zinnen, and T. Engel. Website fingerprinting in onion routing based anonymization networks. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11. ACM, 2011.
-
(2011)
Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society, WPES '11
-
-
Panchenko, A.1
Niessen, L.2
Zinnen, A.3
Engel, T.4
-
23
-
-
0003260781
-
Transmission control protocol
-
Sept. Updated by RFCs 1122, 3168, 6093, 6528
-
J. Postel. Transmission Control Protocol. RFC 793 (Standard), Sept. 1981. Updated by RFCs 1122, 3168, 6093, 6528.
-
(1981)
RFC 793 (Standard)
-
-
Postel, J.1
-
24
-
-
50949133387
-
As path inference by exploiting known as paths
-
J. Qiu and L. Gao. As path inference by exploiting known as paths. In IEEE GLOBECOM, 2006.
-
(2006)
IEEE GLOBECOM
-
-
Qiu, J.1
Gao, L.2
-
26
-
-
34247519952
-
BGP/MPLS IP Virtual Private Networks (VPNs)
-
Feb. Updated by RFCs 4577, 4684, 5462
-
E. Rosen and Y. Rekhter. BGP/MPLS IP Virtual Private Networks (VPNs). RFC 4364 (Proposed Standard), Feb. 2006. Updated by RFCs 4577, 4684, 5462.
-
(2006)
RFC 4364 (Proposed Standard)
-
-
Rosen, E.1
Rekhter, Y.2
|