-
1
-
-
0036086129
-
Statistical identification of encrypted web browsing traffic
-
Q. Sun, D. Simon, Y.-M. Wang, W. Russell, V. Padmanabhan, and L. Qiu, "Statistical identification of encrypted web browsing traffic," in Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on, pp. 19-30, 2002.
-
(2002)
Security and Privacy 2002. Proceedings 2002 IEEE Symposium on
, pp. 19-30
-
-
Sun, Q.1
Simon, D.2
Wang, Y.-M.3
Russell, W.4
Padmanabhan, V.5
Qiu, L.6
-
4
-
-
50249161557
-
Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?
-
(Berkeley, CA, USA) USENIX Association
-
C. V. Wright, L. Ballard, F. Monrose, and G. M. Masson, "Language identification of encrypted voip traffic: Alejandra y roberto or alice and bob?," in Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07, (Berkeley, CA, USA), pp. 4:1-4:12, USENIX Association, 2007.
-
(2007)
Proceedings of 16th USENIX Security Symposium on USENIX Security Symposium, SS'07
, pp. 41-412
-
-
Wright, C.V.1
Ballard, L.2
Monrose, F.3
Masson, G.M.4
-
5
-
-
84947242344
-
Traffic analysis attacks and tradeoffs in anonymity providing systems
-
London, UK, UK, Springer-Verlag
-
A. Back, U. Moller, and A. Stiglic, "Traffic analysis attacks and tradeoffs in anonymity providing systems," in Proc. 4th International Workshop on Information Hiding, IHW '01, (London, UK, UK), pp. 245-257, Springer-Verlag, 2001.
-
(2001)
Proc. 4th International Workshop on Information Hiding, IHW '01
, pp. 245-257
-
-
Back, A.1
Moller, U.2
Stiglic, A.3
-
6
-
-
49549085794
-
Detection of information flows
-
T. He and L. Tong, "Detection of information flows," IEEE Trans. Inf. Theory, vol. 54, no. 11, pp. 4925-4945, 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, Issue.11
, pp. 4925-4945
-
-
He, T.1
Tong, L.2
-
7
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
February
-
D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Communications of the ACM, vol. 24, pp. 84-88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
9
-
-
33846288517
-
Timing attacks in low-latency mix systems
-
(A. Juels, ed.) Lecture Notes in Computer Science, Springer Berlin Heidelberg
-
B. Levine, M. Reiter, C. Wang, and M. Wright, "Timing attacks in low-latency mix systems," in Financial Cryptography (A. Juels, ed.), vol. 3110 of Lecture Notes in Computer Science, pp. 251-265, Springer Berlin Heidelberg.
-
Financial Cryptography
, vol.3110
, pp. 251-265
-
-
Levine, B.1
Reiter, M.2
Wang, C.3
Wright, M.4
-
10
-
-
24344450770
-
On flow correlation attacks and countermeasures in mix networks
-
Berlin, Heidelberg, Springer-Verlag
-
Y. Zhu, X. Fu, B. Graham, R. Bettati, and W. Zhao, "On flow correlation attacks and countermeasures in mix networks," in Proc. 4th international conference on Privacy Enhancing Technologies, PET'04, (Berlin, Heidelberg), pp. 207-225, Springer-Verlag, 2005.
-
(2005)
Proc. 4th International Conference on Privacy Enhancing Technologies, PET'04
, pp. 207-225
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
11
-
-
24344460554
-
The traffic analysis of continuous-time mixes
-
Berlin, Heidelberg, Springer-Verlag
-
G. Danezis, "The traffic analysis of continuous-time mixes," in Proc. 4th international conference on Privacy Enhancing Technologies, PET'04, (Berlin, Heidelberg), pp. 35-50, Springer-Verlag, 2005.
-
(2005)
Proc. 4th International Conference on Privacy Enhancing Technologies, PET'04
, pp. 35-50
-
-
Danezis, G.1
-
12
-
-
0031701310
-
Linear complexity algorithms for maximum throughput in radio networks and input queued switches
-
L. Tassiulas, "Linear complexity algorithms for maximum throughput in radio networks and input queued switches," in IEEE INFOCOM '98, vol. 2, pp. 533-539, 1998.
-
(1998)
IEEE INFOCOM '98
, vol.2
, pp. 533-539
-
-
Tassiulas, L.1
-
13
-
-
84871990686
-
Anonymity of mix networks under light traffic conditions
-
(Monticello, IL) October
-
P. Venkitasubramaniam and V. Anantharam, "Anonymity of Mix Networks under Light Traffic Conditions," in Proc. 36th Allerton Conf. on Communications, Control, and Computing, (Monticello, IL), October 2008.
-
(2008)
Proc. 36th Allerton Conf. on Communications, Control, and Computing
-
-
Venkitasubramaniam, P.1
Anantharam, V.2
-
14
-
-
3242815149
-
Towards measuring anonymity
-
(R. Dingledine and P. Syverson, eds.), Springer-Verlag, LNCS 2482, April
-
C. Diaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Proc. Privacy Enhancing Technologies Workshop (PET 2002) (R. Dingledine and P. Syverson, eds.), Springer-Verlag, LNCS 2482, April 2002.
-
(2002)
Proc. Privacy Enhancing Technologies Workshop (PET 2002)
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
15
-
-
45249083605
-
Anonymous networking amidst eavesdroppers
-
June
-
P. Venkitasubramaniam, T. He, and L. Tong, "Anonymous networking amidst eavesdroppers," IEEE Trans. Inf. Theory, vol. 54, pp. 2770-2784, June 2008.
-
(2008)
IEEE Trans. Inf. Theory
, vol.54
, pp. 2770-2784
-
-
Venkitasubramaniam, P.1
He, T.2
Tong, L.3
-
16
-
-
34548743797
-
On countermeasures to traffic analysis attacks
-
18-23 June
-
X. Fu, B. Graham, R. Bettati, and W. Zhao, "On countermeasures to traffic analysis attacks," in Information Assurance Workshop, 2003. IEEE Systems, Man and Cybernetics Society, pp. 188-195, 18-23 June 2003.
-
(2003)
Information Assurance Workshop 2003 IEEE Systems, Man and Cybernetics Society
, pp. 188-195
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
-
17
-
-
84890010554
-
Stop-and-go MIXes providing probabilistic security in an open system
-
Portland, Oregon, April
-
D. Kesdogan, J. Egner, and R. Buschkes, "Stop-and-go MIXes providing probabilistic security in an open system," in Second International Workshop on Information Hiding (IH'98), Lecture Notes in Computer Science, vol. 1525, (Portland, Oregon), pp. 83-98, April 1998.
-
(1998)
Second International Workshop on Information Hiding (IH'98), Lecture Notes in Computer Science
, vol.1525
, pp. 83-98
-
-
Kesdogan, D.1
Egner, J.2
Buschkes, R.3
-
19
-
-
83655202655
-
Embedding information flows into renewal traffic
-
IEEE, IEEE
-
S. Marano, V. Matta, T. He, and L. Tong, "Embedding information flows into renewal traffic," in Information Theory Workshop (ITW), 2011 IEEE, pp. 50-54, IEEE, 2011.
-
(2011)
Information Theory Workshop (ITW)
, vol.2011
, pp. 50-54
-
-
Marano, S.1
Matta, V.2
He, T.3
Tong, L.4
|