-
1
-
-
84861617955
-
Mitigating timing based information leakage in shared schedulers
-
March
-
S. Kadloor, N. Kiyavash, and P. Venkitasubramaniam, "Mitigating timing based information leakage in shared schedulers," in INFOCOM, 2012 Proceedings IEEE, pp. 1044 -1052, March 2012.
-
(2012)
INFOCOM, 2012 Proceedings IEEE
, pp. 1044-1052
-
-
Kadloor, S.1
Kiyavash, N.2
Venkitasubramaniam, P.3
-
2
-
-
27544454707
-
Low-cost traffic analysis of tor
-
IEEE Computer Society
-
S. J. Murdoch and G. Danezis, "Low-cost traffic analysis of tor," in Proceedings of the 2005 IEEE Symposium on Security and Privacy, SP '05, pp. 183-195, IEEE Computer Society, 2005.
-
Proceedings of the 2005 IEEE Symposium on Security and Privacy, SP '05
, vol.2005
, pp. 183-195
-
-
Murdoch, S.J.1
Danezis, G.2
-
3
-
-
85076290610
-
A practical congestion attack on tor using long paths
-
Berkeley, CA, USA, USENIX Association
-
N. S. Evans, R. Dingledine, and C. Grothoff, "A practical congestion attack on tor using long paths," in Proceedings of the 18th conference on USENIX security symposium, SSYM'09, (Berkeley, CA, USA), pp. 33-50, USENIX Association, 2009.
-
(2009)
Proceedings of the 18th Conference on USENIX Security Symposium, SSYM'09
, pp. 33-50
-
-
Evans, N.S.1
Dingledine, R.2
Grothoff, C.3
-
4
-
-
84873158704
-
Website detection using remote traffic analysis
-
X. Gong, N. Borisov, N. Kiyavash, and N. Schear, "Website detection using remote traffic analysis," in Privacy Enhancing Technologies, 2012.
-
(2012)
Privacy Enhancing Technologies
-
-
Gong, X.1
Borisov, N.2
Kiyavash, N.3
Schear, N.4
-
5
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
ACM
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: exploring information leakage in third-party compute clouds," in Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, pp. 199-212, ACM, 2009.
-
(2009)
Proceedings of the 16th ACM Conference on Computer and Communications Security, CCS '09
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
6
-
-
79959957319
-
Peeping tom in the neighborhood: Keystroke eavesdropping on multi-user systems
-
K. Zhang and X. Wang, "Peeping Tom in the Neighborhood: Keystroke Eavesdropping on Multi-User Systems," in USENIX Security, 2009.
-
(2009)
USENIX Security
-
-
Zhang, K.1
Wang, X.2
-
7
-
-
50249140706
-
Spot me if you can: Uncovering spoken phrases in encrypted voip conversations
-
IEEE Computer Society
-
C. V. Wright, L. Ballard, S. E. Coull, F. Monrose, and G. M. Masson, "Spot me if you can: Uncovering spoken phrases in encrypted voip conversations," in SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy, pp. 35-49, IEEE Computer Society, 2008.
-
SP '08: Proceedings of the 2008 IEEE Symposium on Security and Privacy
, vol.2008
, pp. 35-49
-
-
Wright, C.V.1
Ballard, L.2
Coull, S.E.3
Monrose, F.4
Masson, G.M.5
-
8
-
-
18844454571
-
Remote timing attacks are practical
-
D. Brumley and D. Boneh, "Remote timing attacks are practical," Computer Networks, vol. 48, no. 5, pp. 701-716, 2005.
-
(2005)
Computer Networks
, vol.48
, Issue.5
, pp. 701-716
-
-
Brumley, D.1
Boneh, D.2
-
9
-
-
84873142358
-
Scheduling with privacy constraints
-
(Lausanne, Switzerland), Sept.
-
S. Kadloor, N. Kiyavash, and P. Venkitasubramaniam, "Scheduling with privacy constraints," in 2012 IEEE Information Theory Workshop (IEEE ITW 2012), an extended version is available at http://www.ifp.illinois.edu/ ~kadloor1/kadloor-itw-extended.pdf , (Lausanne, Switzerland), Sept. 2012.
-
(2012)
2012 IEEE Information Theory Workshop (IEEE ITW 2012)
-
-
Kadloor, S.1
Kiyavash, N.2
Venkitasubramaniam, P.3
-
10
-
-
0026223925
-
Round-robin scheduling for max-min fairness in data networks
-
sep
-
E. Hahne, "Round-robin scheduling for max-min fairness in data networks," Selected Areas in Communications, IEEE Journal on, vol. 9, pp. 1024 -1039, sep 1991.
-
(1991)
Selected Areas in Communications, IEEE Journal on
, vol.9
, pp. 1024-1039
-
-
Hahne, E.1
-
11
-
-
84883123452
-
-
R. G. Gallager, Poisson Processes, class notes, available online at http://ocw.mit.edu/courses/electrical-engineering-and-computer-science/ 6-262-discrete-stochastic-processes-spring-2011/course-notes/MIT6-262S11-chap02. pdf .
-
Poisson Processes, Class Notes
-
-
Gallager, R.G.1
-
13
-
-
77950347409
-
A view of cloud computing
-
Apr.
-
M. Armbrust, A. Fox, R. Griffith, A. D. Joseph, R. Katz, A. Konwinski, G. Lee, D. Patterson, A. Rabkin, I. Stoica, and M. Zaharia, "A view of cloud computing," Commun. ACM, vol. 53, pp. 50-58, Apr. 2010.
-
(2010)
Commun ACM
, vol.53
, pp. 50-58
-
-
Armbrust, M.1
Fox, A.2
Griffith, R.3
Joseph, A.D.4
Katz, R.5
Konwinski, A.6
Lee, G.7
Patterson, D.8
Rabkin, A.9
Stoica, I.10
Zaharia, M.11
-
14
-
-
84883090777
-
A lowcost side channel traffic analysis attack in packet networks
-
S. Kadloor, X. Gong, N. Kiyavash, T. Tezcan, and N. Borisov, "A lowcost side channel traffic analysis attack in packet networks," in IEEE ICC 2010, 2010.
-
(2010)
IEEE ICC 2010
-
-
Kadloor, S.1
Gong, X.2
Kiyavash, N.3
Tezcan, T.4
Borisov, N.5
-
15
-
-
84858309174
-
Designing router scheduling policies: A privacy perspective
-
April
-
S. Kadloor, X. Gong, N. Kiyavash, and P. Venkitasubramaniam, "Designing router scheduling policies: A privacy perspective," Signal Processing, IEEE Transactions on, vol. 60, pp. 2001 -2012, April 2012.
-
(2012)
Signal Processing, IEEE Transactions on
, vol.60
, pp. 2001-2012
-
-
Kadloor, S.1
Gong, X.2
Kiyavash, N.3
Venkitasubramaniam, P.4
|