-
2
-
-
70449625225
-
Plaintext recovery attacks against SSH
-
doi:10.1109/SP.2009.5
-
Albrecht, M. R., Paterson, K. G., and Watson, G. J. Plaintext Recovery Attacks against SSH. In IEEE Symposium on Security and Privacy (2009), pp. 16-26. doi:10.1109/SP.2009.5.
-
(2009)
IEEE Symposium on Security and Privacy
, pp. 16-26
-
-
Albrecht, M.R.1
Paterson, K.G.2
Watson, G.J.3
-
4
-
-
78650639149
-
Realtime classification for encrypted traffic
-
volume 6049 of Lecture Notes in Computer Science, doi:10.1007/978-3-642- 13193-6-32
-
Bar-Yanai, R., Langberg, M., Peleg, D., and Roditty, L. Realtime Classification for Encrypted Traffic. In Experimental Algorithms (2010), vol. 6049 of Lecture Notes in Computer Science, pp. 373-385. doi:10.1007/978-3-642- 13193-6-32.
-
(2010)
Experimental Algorithms
, pp. 373-385
-
-
Bar-Yanai, R.1
Langberg, M.2
Peleg, D.3
Roditty, L.4
-
5
-
-
64049084995
-
The vulnerability of SSL to chosen plaintext attack
-
Bard, G. V. The Vulnerability of SSL to Chosen Plaintext Attack. Cryptology ePrint Archive, Report 2004/111, 2004. http://eprint.iacr.org/2004/ 111.
-
Cryptology EPrint Archive, Report 2004/111
, pp. 2004
-
-
Bard, G.V.1
-
6
-
-
77954095439
-
A challenging but feasible blockwise-adaptive chosen-plaintext attack on SSL
-
Bard, G. V. A Challenging but Feasible Blockwise-Adaptive Chosen-Plaintext Attack on SSL. Cryptology ePrint Archive, Report 2006/136, 2006. http://eprint.iacr.org/2006/136.
-
(2006)
Cryptology EPrint Archive, Report 2006/136
-
-
Bard, G.V.1
-
7
-
-
51249085821
-
Authenticated encryption: Relations among notions and analysis of the generic composition paradigm
-
doi:10.1007/s00145-008-9026-x
-
Bellare, M., and Namprempre, C. Authenticated Encryption: Relations among Notions and Analysis of the Generic Composition Paradigm. J. Cryptology 21, 4 (2008), 469-491. doi:10.1007/s00145-008-9026-x.
-
(2008)
J. Cryptology
, vol.21
, Issue.4
, pp. 469-491
-
-
Bellare, M.1
Namprempre, C.2
-
8
-
-
33746053876
-
Privacy vulnerabilities in encrypted HTTP streams
-
volume 3856 of Lecture Notes in Computer Science, doi:10.1007/11767831-1
-
Bissias, G. D., Liberatore, M., Jensen, D., and Levine, B. N. Privacy vulnerabilities in encrypted HTTP streams. In Privacy Enhancing Technologies (2006), vol. 3856 of Lecture Notes in Computer Science, pp. 1-11. doi:10.1007/11767831-1.
-
(2006)
Privacy Enhancing Technologies
, pp. 1-11
-
-
Bissias, G.D.1
Liberatore, M.2
Jensen, D.3
Levine, B.N.4
-
9
-
-
85084160254
-
Side-channel attacks on symmetric encryption schemes: The case for authenticated encryption
-
Black, J., and Urtubia, H. Side-Channel Attacks on Symmetric Encryption Schemes: The Case for Authenticated Encryption. In Proceedings of the 11th USENIX Security Symposium (2002), pp. 327-338. http://www.usenix.org/event/ sec02/full-papers/black/black-html/.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 327-338
-
-
Black, J.1
Urtubia, H.2
-
11
-
-
84893208617
-
Chipping away at censorship firewalls with user-generated content
-
Burnett, S., Feamster, N., and Vempala, S. Chipping Away at Censorship Firewalls with User-Generated Content. In Proceedings of the 19th USENIX Security Symposium (2010), pp. 453-468. http://www.usenix.org/events/sec10/tech/ full-papers/Burnett.pdf.
-
(2010)
Proceedings of the 19th USENIX Security Symposium
, pp. 453-468
-
-
Burnett, S.1
Feamster, N.2
Vempala, S.3
-
12
-
-
77952403312
-
Polyglot: Automatic extraction of protocol format using dynamic binary analysis
-
doi:10.1145/1315245.1315286
-
Caballero, J., Yin, H., Liang, Z., and Song, D. Polyglot: Automatic extraction of protocol format using dynamic binary analysis. In 14th ACM Conference on Computer and Communications Security (2007), pp. 317-329. doi:10.1145/1315245.1315286.
-
(2007)
14th ACM Conference on Computer and Communications Security
, pp. 317-329
-
-
Caballero, J.1
Yin, H.2
Liang, Z.3
Song, D.4
-
13
-
-
84869471224
-
-
Robert Shea and Robert Anton Wilson, Dell Publishing
-
Celine, H. Quoted in Leviathan, Robert Shea and Robert Anton Wilson, Dell Publishing, 1975.
-
(1975)
Leviathan
-
-
Celine, H.1
-
14
-
-
84862099542
-
-
Chicago, 17 Feb. 2011. Data set
-
claffy, k., Andersen, D., and Hick, P. The CAIDA Anonymized Internet Traces - Equinix, Chicago, 17 Feb 2011. Data set, 2011. http://www.caida.org/ data/passive/passive-2011-dataset.xml.
-
(2011)
The CAIDA Anonymized Internet Traces - Equinix
-
-
Claffy, K.1
Andersen, D.2
Hick, P.3
-
15
-
-
84893143817
-
Discoverer: Automatic protocol reverse engineering from network traces
-
Cui, W., Kannan, J., and Wang, H. J. Discoverer: Automatic protocol reverse engineering from network traces. In Proceedings of the 16th USENIX Security Symposium (2007), pp. 199-212. http://www.usenix.org/events/sec07/tech/ cui.html.
-
(2007)
Proceedings of the 16th USENIX Security Symposium
, pp. 199-212
-
-
Cui, W.1
Kannan, J.2
Wang, H.J.3
-
16
-
-
84870647529
-
-
Deibert, R. J., Palfrey, J., Rohozinski, R., and Zittrain, J. Global Internet Filtering Map and Regional Summaries, 2011. http://map.opennet.net/.
-
(2011)
Global Internet Filtering Map and Regional Summaries
-
-
Deibert, R.J.1
Palfrey, J.2
Rohozinski, R.3
Zittrain, J.4
-
17
-
-
0003286492
-
The TLS protocol version 1.0
-
Dierks, T., and Allen, C. The TLS Protocol, Version 1.0. RFC 2246, 1999. http://tools.ietf.org/html/rfc2246.
-
(1999)
RFC
, vol.2246
-
-
Dierks, T.1
Allen, C.2
-
18
-
-
1542593353
-
Authentication and authenticated key exchanges
-
Diffie, W., Oorschot, P. C., and Wiener, M. J. Authentication and authenticated key exchanges. Designs, Codes and Cryptography 2 (1992), 107-125. http://sites.google.com/site/michaeljameswiener/STS.pdf.
-
(1992)
Designs, Codes and Cryptography
, vol.2
, pp. 107-125
-
-
Diffie, W.1
Oorschot, P.C.2
Wiener, M.J.3
-
22
-
-
77955311141
-
-
The Tor Project
-
Dingledine, R., and Mathewson, N. Tor Protocol Specification. The Tor Project, 2003-2011. https://gitweb.torproject.org/torspec.git/blob/ 84ec5aca5f5735f445840f6f574842b71365bbde:/torspec.txt.
-
(2003)
Tor Protocol Specification
-
-
Dingledine, R.1
Mathewson, N.2
-
23
-
-
80052008741
-
Design of a blocking-resistant anonymity system
-
Dingledine, R., and Mathewson, N. Design of a blocking-resistant anonymity system. Tech. rep., The Tor Project, 2006. https://svn.torproject.org/ svn/projects/designpaper/blocking.pdf.
-
(2006)
Tech. Rep. the Tor Project
-
-
Dingledine, R.1
Mathewson, N.2
-
24
-
-
85084161366
-
Tor: The second-generation onion router
-
Dingledine, R., Mathewson, N., and Syverson, P. Tor: The Second-Generation Onion Router. In Proceedings of the 13th USENIX Security Symposium (2004), pp. 303-320. http://www.usenix.org/events/sec04/tech/ dingledine.html.
-
(2004)
Proceedings of the 13th USENIX Security Symposium
, pp. 303-320
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
26
-
-
84870629905
-
-
Proxy service
-
Dynamic Internet Technology Inc. DynaWeb. Proxy service, 2002. http://www.dit-inc.us/dynaweb.
-
(2002)
-
-
-
27
-
-
85084161295
-
Infranet: Circumventing web censorship and surveillance
-
Feamster, N., Balazinska, M., Harfst, G., Balakrishnan, H., and Karger, D. Infranet: Circumventing Web Censorship and Surveillance. In Proceedings of the 11th USENIX Security Symposium (2002), pp. 247-262. http://www.usenix.org/ events/sec02/feamster.html.
-
(2002)
Proceedings of the 11th USENIX Security Symposium
, pp. 247-262
-
-
Feamster, N.1
Balazinska, M.2
Harfst, G.3
Balakrishnan, H.4
Karger, D.5
-
28
-
-
0003355701
-
Hypertext transfer protocol - HTTP/1.1
-
Fielding, R., Gettys, J., Mogul, J., Frystyk, H., Masinter, L., Leach, P., and Berners-Lee, T. Hypertext Transfer Protocol - HTTP/1.1. RFC 2616, 1999. http://tools.ietf.org/html/rfc2616.
-
(1999)
RFC
, vol.2616
-
-
Fielding, R.1
Gettys, J.2
Mogul, J.3
Frystyk, H.4
Masinter, L.5
Leach, P.6
Berners-Lee, T.7
-
29
-
-
84864185968
-
Evading censorship with browser-based proxies
-
volume 7384 of Lecture Notes on Computer Science
-
Fifield, D., Hardison, N., Ellithorpe, J., Stark, E., Dingledine, R., Porras, P., and Boneh, D. Evading Censorship with Browser-Based Proxies. In Privacy Enhancing Technologies (2012), vol. 7384 of Lecture Notes on Computer Science, pp. 239-258. https://crypto.stanford.edu/flashproxy/flashproxy.pdf.
-
Privacy Enhancing Technologies (2012)
, pp. 239-258
-
-
Fifield, D.1
Hardison, N.2
Ellithorpe, J.3
Stark, E.4
Dingledine, R.5
Porras, P.6
Boneh, D.7
-
30
-
-
35248897534
-
Eliminating steganography in internet traffic with active wardens
-
volume 2578 of Lecture Notes in Computer Science
-
Fisk, G., Fisk, M., Papadopoulos, C., and Neil, J. Eliminating Steganography in Internet Traffic with Active Wardens. In Information Hiding (2003), vol. 2578 of Lecture Notes in Computer Science, pp. 18-35. http://www.woozle.org/~mfisk/papers/ih02.pdf.
-
(2003)
Information Hiding
, pp. 18-35
-
-
Fisk, G.1
Fisk, M.2
Papadopoulos, C.3
Neil, J.4
-
31
-
-
84869411206
-
First nation in cyberspace
-
by Philip Elmer-Dewitt, December
-
Gilmore, J. Quoted in "First Nation in Cyberspace" by Philip Elmer-Dewitt. TIME Magazine, December 1993.
-
(1993)
TIME Magazine
-
-
Gilmore, J.1
-
32
-
-
0035402083
-
NetCamo: Camouflaging network traffic for QoS-guaranteed mission critical applications
-
doi:10.1109/3468.935042
-
Guan, Y., Fu, X., Xuan, D., Shenoy, P. U., Bettati, R., and Zhao, W. NetCamo: Camouflaging Network Traffic for QoS-Guaranteed Mission Critical Applications. IEEE Transactions on Systems, Man, and Cybernetics 31, 4 (2001), 253-265. doi:10.1109/3468.935042.
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics
, vol.31
, Issue.4
, pp. 253-265
-
-
Guan, Y.1
Fu, X.2
Xuan, D.3
Shenoy, P.U.4
Bettati, R.5
Zhao, W.6
-
34
-
-
34548073749
-
Network emulation with NetEm
-
Hemminger, S. Network Emulation with NetEm. In linux.conf.au (2005). http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.67.1687&rep= rep1&type=pdf.
-
(2005)
Linux.conf.au
-
-
Hemminger, S.1
-
35
-
-
74049147408
-
Website fingerprinting: Attacking popular privacy enhancing technologies with the multinomial naïve-bayes classifier
-
doi:10.1145/1655008.1655013
-
Herrmann, D., Wendolsky, R., and Federrath, H. Website Fingerprinting: Attacking Popular Privacy Enhancing Technologies with the Multinomial Naïve-Bayes Classifier. In Proceedings of the 2009 ACM workshop on Cloud computing security (2009), pp. 31-42. doi:10.1145/1655008.1655013.
-
(2009)
Proceedings of the 2009 ACM Workshop on Cloud Computing Security
, pp. 31-42
-
-
Herrmann, D.1
Wendolsky, R.2
Federrath, H.3
-
36
-
-
6344251217
-
Fingerprinting websites using traffic analysis
-
volume 2482 of Lecture Notes in Computer Science, doi:10.1007/3-540- 36467-6-13
-
Hintz, A. Fingerprinting websites using traffic analysis. In Privacy Enhancing Technologies (2003), vol. 2482 of Lecture Notes in Computer Science, pp. 229-233. doi:10.1007/3-540-36467-6-13.
-
(2003)
Privacy Enhancing Technologies
, pp. 229-233
-
-
Hintz, A.1
-
37
-
-
28244499079
-
Provably secure steganography
-
volume 2442 of Lecture Notes in Computer Science, doi:10.1007/3-540- 45708-9-6
-
Hopper, N. J., Langford, J., and von Ahn, L. Provably Secure Steganography. In Advances in Cryptology - CRYPTO (2002), vol. 2442 of Lecture Notes in Computer Science, pp. 119-123. doi:10.1007/3-540-45708-9-6.
-
(2002)
Advances in Cryptology - CRYPTO
, pp. 119-123
-
-
Hopper, N.J.1
Langford, J.2
Von Ahn, L.3
-
38
-
-
80755169503
-
Cirripede: Circumvention infrastructure using router redirection with plausible deniability
-
doi:10.1145/2046707.2046730
-
Houmansadr, A., Nguyen, G. T., Caesar, M., and Borisov, N. Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability. In Proceedings of the 18th ACM conference on Computer and communications security (2011), pp. 187-200. doi:10.1145/2046707.2046730.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security
, pp. 187-200
-
-
Houmansadr, A.1
Nguyen, G.T.2
Caesar, M.3
Borisov, N.4
-
39
-
-
33846274013
-
The base16 base32 and base64 data encodings
-
Josefsson, S. The Base16, Base32, and Base64 Data Encodings. RFC 4648, 2006. http://tools.ietf.org/html/rfc4648.
-
(2006)
RFC
, vol.4648
-
-
Josefsson, S.1
-
40
-
-
85084162299
-
Decoy routing: Toward unblockable internet communication
-
Karlin, J., Ellard, D., Jackson, A., Jones, C. E., Lauer, G., Makins, D. P., and Strayer, W. T. Decoy Routing: Toward Unblockable Internet Communication. In USENIX Workshop on Free and Open Communications on the Internet (2011). https://db.usenix.org/events/foci11/tech/final-files/Karlin.pdf.
-
(2011)
USENIX Workshop on Free and Open Communications on the Internet
-
-
Karlin, J.1
Ellard, D.2
Jackson, A.3
Jones, C.E.4
Lauer, G.5
Makins, D.P.6
Strayer, W.T.7
-
41
-
-
20444495394
-
How to achieve blocking resistance for existing systems enabling anonymous web surfing
-
Köpsell, S., and Hillig, U. How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing. In Proceedings of the 2004 ACM workshop on Privacy in the electronic society (2004), pp. 47-58. https://gnunet.org/sites/default/files/koepsell-wpes2004-0.pdf.
-
(2004)
Proceedings of the 2004 ACM Workshop on Privacy in the Electronic Society
, pp. 47-58
-
-
Köpsell, S.1
Hillig, U.2
-
42
-
-
84881248822
-
Cryptographic extraction and key derivation: The HKDF scheme
-
Krawczyk, H. Cryptographic Extraction and Key Derivation: The HKDF Scheme. Cryptology ePrint Archive, Report 2010/264, 2010. http://eprint.iacr. org/2010/264.
-
Cryptology EPrint Archive, Report 2010/264
, pp. 2010
-
-
Krawczyk, H.1
-
43
-
-
0004046562
-
SOCKS protocol version 5
-
Leech, M., Ganis, M., Lee, Y.-D., Kuris, R., Koblas, D., and Jones, L. SOCKS Protocol Version 5. RFC 1928, 1996. http://tools.ietf.org/html/rfc1928.
-
(1996)
RFC
, vol.1928
-
-
Leech, M.1
Ganis, M.2
Lee, Y.-D.3
Kuris, R.4
Koblas, D.5
Jones, L.6
-
44
-
-
74049090626
-
Automatic protocol format reverse engineering through context-aware monitored execution
-
Lin, Z., Jiang, X., Xu, D., and Zhang, X. Automatic Protocol Format Reverse Engineering through Context-Aware Monitored Execution. In 15th Symposium on Network and Distributed System Security (2008). http://www.isoc.org/isoc/ conferences/ndss/08/papers/14-automatic-protocol-format.pdf.
-
(2008)
15th Symposium on Network and Distributed System Security
-
-
Lin, Z.1
Jiang, X.2
Xu, D.3
Zhang, X.4
-
45
-
-
85084162137
-
Bootstrapping communications into an anti-censorship system
-
Lincoln, P., Mason, I., Porras, P., Yegneswaran, V., Weinberg, Z., Massar, J., Simpson, W. A., Vixie, P., and Boneh, D. Bootstrapping Communications into an Anti-Censorship System. In 2nd USENIX Workshop on Free and Open Communications on the Internet (2012). https://www.usenix.org/ conference/foci12/bootstrapping-communications-anti-censorship-system.
-
(2012)
2nd USENIX Workshop on Free and Open Communications on the Internet
-
-
Lincoln, P.1
Mason, I.2
Porras, P.3
Yegneswaran, V.4
Weinberg, Z.5
Massar, J.6
Simpson, W.A.7
Vixie, P.8
Boneh, D.9
-
46
-
-
84877785008
-
On dominant characteristics of residential broadband internet traffic
-
Maier, G., Feldmann, A., Paxson, V., and Allman, M. On Dominant Characteristics of Residential Broadband Internet Traffic. In Proceedings of the Ninth Internet Measurement Conference (2009), pp. 90-102. http://www.icir.org/ vern/papers/imc102-maier.pdf.
-
(2009)
Proceedings of the Ninth Internet Measurement Conference
, pp. 90-102
-
-
Maier, G.1
Feldmann, A.2
Paxson, V.3
Allman, M.4
-
47
-
-
80955150901
-
-
Tor Proposal #180
-
Mathewson, N. Pluggable Transports for Circumvention. Tor Proposal #180, 2010-2011. https://gitweb.torproject.org/torspec.git/blob/HEAD:/proposals/180- pluggable-transport.txt.
-
(2010)
Pluggable Transports for Circumvention
-
-
Mathewson, N.1
-
49
-
-
84950656359
-
Variations of box plots
-
McGill, R., Tukey, J. W., and Larsen, W. A. Variations of Box Plots. The American Statistician 32, 1 (1978), 12-16. http://www.jstor.org/pss/2683468.
-
(1978)
The American Statistician
, vol.32
, Issue.1
, pp. 12-16
-
-
McGill, R.1
Tukey, J.W.2
Larsen, W.A.3
-
50
-
-
74049112593
-
On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design
-
doi:10.1145/1655188.1655193
-
McLachlan, J., and Hopper, N. On the risks of serving whenever you surf: vulnerabilities in Tor's blocking resistance design. In Proceedings of the 8th ACM workshop on Privacy in the electronic society (2009), pp. 31-40. doi:10.1145/1655188.1655193.
-
(2009)
Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society
, pp. 31-40
-
-
McLachlan, J.1
Hopper, N.2
-
51
-
-
84870638163
-
SkypeMorph: Protocol obfuscation for Tor bridges
-
Moghaddam, H. M., Li, B., Derakhshani, M., and Goldberg, I. SkypeMorph: Protocol Obfuscation for Tor Bridges. Tech. rep., University of Waterloo, 2012. http://cacr.uwaterloo.ca/techreports/2012/cacr2012-08.pdf.
-
(2012)
Tech. Rep., University of Waterloo
-
-
Moghaddam, H.M.1
Li, B.2
Derakhshani, M.3
Goldberg, I.4
-
52
-
-
35048902569
-
A public-key encryption scheme with pseudo- random ciphertexts
-
volume 3193 of Lecture Notes in Computer Science
-
Möller, B. A Public-Key Encryption Scheme with Pseudo-random Ciphertexts. In Computer Security - ESORICS (2004), vol. 3193 of Lecture Notes in Computer Science, pp. 335-351. http://www.bmoeller.de/pdf/pke-pseudo- esorics2004.pdf.
-
(2004)
Computer Security - ESORICS
, pp. 335-351
-
-
Möller, B.1
-
54
-
-
0003508562
-
-
FIPS 186-2
-
NIST. Digital Signature Standard. FIPS 186-2, 2000. http://csrc.nist.gov/ publications/fips/archive/fips186-2/fips186-2.pdf.
-
(2000)
Digital Signature Standard
-
-
-
56
-
-
84870637624
-
How to bypass internet censorship
-
Ohling, F., Schoen, S., adam or aco, et al. How to Bypass Internet Censorship. FLOSS Manuals, 2011. http://en.flossmanuals.net/bypassing- censorship/.
-
(2011)
FLOSS Manuals
-
-
Ohling, F.1
Schoen, S.2
Adam, A.3
-
57
-
-
80955131237
-
Website fingerprinting in onion routing based anonymization networks
-
doi:10.1145/2046556.2046570
-
Panchenko, A., Niessen, L., Zinnen, A., and Engel, T. Website Fingerprinting in Onion Routing Based Anonymization Networks. In Proceedings of the 10th annual ACM workshop on Privacy in the electronic society (2011), pp. 103-114. doi:10.1145/2046556.2046570.
-
(2011)
Proceedings of the 10th Annual ACM Workshop on Privacy in the Electronic Society
, pp. 103-114
-
-
Panchenko, A.1
Niessen, L.2
Zinnen, A.3
Engel, T.4
-
59
-
-
78649989557
-
-
v0.34
-
Pfitzmann, A., and Hansen, M. A terminology for talking about privacy by data minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management, 2010. v0.34. http://dud.inf.tu-dresden. de/literatur/Anon-Terminology-v0.34.pdf.
-
(2010)
A Terminology for Talking about Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
-
Pfitzmann, A.1
Hansen, M.2
-
60
-
-
84870639003
-
Persian cyberspace report: Internet blackouts across Iran
-
Price, M., Enayat, M., et al. Persian cyberspace report: internet blackouts across Iran. Iran Media Program news bulletin, 2012. http://iranmediaresearch.com/en/blog/101/12/02/09/840.
-
(2012)
Iran Media Program News Bulletin
-
-
Price, M.1
Enayat, M.2
-
61
-
-
79961135005
-
-
R Foundation for Statistical Computing, Vienna, Austria
-
R Development Core Team. R: A Language and Environment for Statistical Computing. R Foundation for Statistical Computing, Vienna, Austria, 2011. http://www.R-project.org/.
-
(2011)
R: A Language and Environment for Statistical Computing
-
-
-
62
-
-
35048855085
-
Nonce-based symmetric encryption
-
volume 3017 of Lecture Notes in Computer Science
-
Rogaway, P. Nonce-Based Symmetric Encryption. In Fast Software Encryption (2004), vol. 3017 of Lecture Notes in Computer Science, pp. 348-359. http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.76.2964&rep= rep1&type=pdf.
-
(2004)
Fast Software Encryption
, pp. 348-359
-
-
Rogaway, P.1
-
63
-
-
84870630935
-
Hillary Clinton adviser compares Internet to Che Guevara
-
by Josh Halliday, June
-
Ross, A. Quoted in "Hillary Clinton adviser compares Internet to Che Guevara" by Josh Halliday. The Guardian, June 2011. http://www.guardian. co.uk/media/2011/jun/22/hillaryclinton-adviser-alec-ross.
-
(2011)
The Guardian
-
-
Ross, A.1
-
64
-
-
0036086129
-
Statistical identification of encrypted Web browsing traffic
-
doi:10.1109/SECPRI.2002.1004359
-
Sun, Q., Simon, D. R., Wang, Y.-M., Russell, W., Padmanabhan, V. N., and Qiu, L. Statistical identification of encrypted Web browsing traffic. In Proceedings of the 2002 IEEE Symposium on Security and Privacy (2002), pp. 19-30. doi:10.1109/SECPRI.2002.1004359.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 19-30
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.-M.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
65
-
-
84870642214
-
-
Proxy service
-
UltraReach Internet Corp. Ultrasurf. Proxy service, 2001. http://www.ultrasurf.us/.
-
(2001)
Ultrasurf
-
-
-
66
-
-
33750401431
-
Public-key steganography
-
volume 3027 of Lecture Notes in Computer Science, doi:10.1007/978-3-540- 24676-3-20
-
von Ahn, L., and Hopper, N. J. Public-Key Steganography. In Advances in Cryptology - EUROCRYPT (2004), vol. 3027 of Lecture Notes in Computer Science, pp. 323-341. doi:10.1007/978-3-540-24676-3-20.
-
(2004)
Advances in Cryptology - EUROCRYPT
, pp. 323-341
-
-
Von Ahn, L.1
Hopper, N.J.2
-
67
-
-
77957891095
-
A potential HTTP-based application-level attack against Tor
-
doi:10.1016/j.future.2010.04.007
-
Wang, X., Luo, J., Yang, M., and Ling, Z. A potential HTTP-based application-level attack against Tor. Future Generation Computer Systems 27 (2011), 67-77. doi:10.1016/j.future.2010.04.007.
-
(2011)
Future Generation Computer Systems
, vol.27
, pp. 67-77
-
-
Wang, X.1
Luo, J.2
Yang, M.3
Ling, Z.4
-
68
-
-
80051967189
-
Phonotactic reconstruction of encrypted VoIP conversations: Hookt on fon-iks
-
White, A. M., Matthews, A. R., Snow, K. Z., and Monrose, F. Phonotactic Reconstruction of Encrypted VoIP Conversations: Hookt on Fon-iks. In IEEE Symposium on Security and Privacy (2011), pp. 3-18. https://www.cs.unc.edu/~amw/ resources/hooktonfoniks.pdf.
-
(2011)
IEEE Symposium on Security and Privacy
, pp. 3-18
-
-
White, A.M.1
Matthews, A.R.2
Snow, K.Z.3
Monrose, F.4
-
70
-
-
84864245019
-
-
Tor Project official blog
-
Wilde, T. Knock Knock Knockin' on Bridges' Doors. Tor Project official blog, 2012. https://blog.torproject.org/blog/knock-knock-knockin-bridges-doors.
-
(2012)
Knock Knock Knockin' on Bridges' Doors
-
-
Wilde, T.1
-
72
-
-
85075948939
-
Telex: Anticensorship in the network infrastructure
-
Wustrow, E., Wolchok, S., Goldberg, I., and Halderman, J. A. Telex: Anticensorship in the Network Infrastructure. In Proceedings of the 20th USENIX Security Symposium (2011), pp. 459-473. http://www.usenix.org/events/sec11/tech/ full-papers/Wustrow.pdf.
-
(2011)
Proceedings of the 20th USENIX Security Symposium
, pp. 459-473
-
-
Wustrow, E.1
Wolchok, S.2
Goldberg, I.3
Halderman, J.A.4
-
73
-
-
84870639528
-
Green Dam enforcement watered down
-
October
-
Yeo, V. Green Dam enforcement watered down. ZDNet Asia (October 2009). http://www.zdnetasia.com/green-dam-enforcementwatered-down-62058509.htm.
-
(2009)
ZDNet Asia
-
-
Yeo, V.1
|