-
4
-
-
84892390419
-
-
I2P anonymous network
-
"I2P anonymous network," http://www.i2p2.de/.
-
-
-
-
5
-
-
0037810717
-
Mixminion: Design of a type iii anonymous remailer protocol
-
May
-
G. Danezis, R. Dingledine, and N. Mathewson, "Mixminion: Design of a Type III Anonymous Remailer Protocol," in Proceedings of the 2003 IEEE Symposium on Security and Privacy, May 2003, pp. 2-15.
-
(2003)
Proceedings of the 2003 IEEE Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
6
-
-
20444447364
-
-
IETF Internet Draft, July
-
U. Moller, L. Cottrell, P. Palfrader, and L. Sassaman, "Mixmaster Protocol-Version 2," IETF Internet Draft, July 2003.
-
(2003)
Mixmaster Protocol-Version 2
-
-
Moller, U.1
Cottrell, L.2
Palfrader, P.3
Sassaman, L.4
-
7
-
-
20444437836
-
Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection
-
Washington, DC, USA, November
-
M. Rennhard and B. Plattner, "Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection," in Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002), Washington, DC, USA, November 2002.
-
(2002)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002)
-
-
Rennhard, M.1
Plattner, B.2
-
8
-
-
35048897629
-
Practical anonymity for the masses with morphmix
-
A. Juels, Ed. Springer-Verlag, LNCS, February 2004
-
-, "Practical anonymity for the masses with morphmix," in Proceedings of Financial Cryptography (FC '04), A. Juels, Ed. Springer-Verlag, LNCS 3110, February 2004, pp. 233-250.
-
(3110)
Proceedings of Financial Cryptography (FC '04)
, pp. 233-250
-
-
Rennhard, M.1
Plattner, B.2
-
9
-
-
84892377449
-
-
"Tor," https://www.torproject.org/.
-
-
-
-
11
-
-
84892430477
-
-
Tor metrics portal
-
"Tor metrics portal," https://metrics.torproject.org/.
-
-
-
-
12
-
-
77949464624
-
How much anonymity does network latency leak
-
February
-
N. Hopper, E. Y. Vasserman, and E. Chan-Tin, "How much anonymity does network latency leak?" ACM Transactions on Information and System Security, vol. 13, no. 2, February 2010.
-
(2010)
ACM Transactions on Information and System Security
, vol.13
, Issue.2
-
-
Hopper, N.1
Vasserman, E.Y.2
Chan-Tin, E.3
-
14
-
-
84947242344
-
Traffic analysis attacks and tradeoffs in anonymity providing systems
-
I. S. Moskowitz, Ed. Springer-Verlag April
-
A. Back, U. Moller, and A. Stiglic, "Traffic analysis attacks and tradeoffs in anonymity providing systems," in Proceedings of Information Hiding Workshop (IH 2001), I. S. Moskowitz, Ed. Springer-Verlag, LNCS 2137, April 2001, pp. 245-257.
-
(2001)
Proceedings of Information Hiding Workshop (IH 2001), , LNCS 2137
, pp. 245-257
-
-
Back, A.1
Moller, U.2
Stiglic, A.3
-
16
-
-
70349301114
-
Timing analysis in low-latency mix networks: Attacks and defenses
-
September
-
V. Shmatikov and M.-H. Wang, "Timing analysis in low-latency mix networks: Attacks and defenses," in Proceedings of ESORICS 2006, September 2006.
-
(2006)
Proceedings of ESORICS 2006
-
-
Shmatikov, V.1
Wang, M.-H.2
-
18
-
-
79959681025
-
Lowresource routing attacks against Tor
-
Washington, DC, USA, October
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker, "Lowresource routing attacks against Tor," in Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007), Washington, DC, USA, October 2007.
-
(2007)
Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007)
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
20
-
-
34548762543
-
Network flow watermarking attack on low-latency anonymous communication systems
-
may
-
X. Wang, S. Chen, and S. Jajodia, "Network flow watermarking attack on low-latency anonymous communication systems," in IEEE Symposium on Security and Privacy, may 2007, pp. 116-130.
-
(2007)
IEEE Symposium on Security and Privacy
, pp. 116-130
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
21
-
-
80755187817
-
Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting
-
October
-
P. Mittal, A. Khurshid, J. Juen, M. Caesar, and N. Borisov, "Stealthy traffic analysis of low-latency anonymous communication using throughput fingerprinting," in Proceedings of the 18th ACM conference on Computer and Communications Security (CCS 2011), October 2011.
-
(2011)
Proceedings of the 18th ACM Conference on Computer and Communications Security (CCS 2011)
-
-
Mittal, P.1
Khurshid, A.2
Juen, J.3
Caesar, M.4
Borisov, N.5
-
23
-
-
84892379242
-
-
"BitTorrent," http://www.bittorrent.com/.
-
-
-
-
24
-
-
84955557456
-
Hiding routing information
-
R. Anderson, Ed. Springer-Verlag, LNCS 1174, May
-
D. M. Goldschlag, M. G. Reed, and P. F. Syverson, "Hiding Routing Information," in Proceedings of Information Hiding: First International Workshop, R. Anderson, Ed. Springer-Verlag, LNCS 1174, May 1996, pp. 137-150.
-
(1996)
Proceedings of Information Hiding: First International Workshop
, pp. 137-150
-
-
Goldschlag, D.M.1
Reed, M.G.2
Syverson, P.F.3
-
26
-
-
33646023117
-
An introduction to roc analysis
-
Jun
-
T. Fawcett, "An introduction to roc analysis," Pattern Recogn. Lett., vol. 27, no. 8, pp. 861-874, Jun. 2006.
-
(2006)
Pattern Recogn. Lett
, vol.27
, Issue.8
, pp. 861-874
-
-
Fawcett, T.1
-
27
-
-
84892419518
-
-
"Amazon EC2," http://aws.amazon.com/ec2/.
-
-
-
|