-
1
-
-
0019532104
-
Untraceable electronic mail, return addresses and digital pseudonyms
-
February
-
D. Chaum,.Untraceable electronic mail, return addresses and digital pseudonyms,. Communications of the ACM, vol. 24, pp. 84.88, February 1981.
-
(1981)
Communications of the ACM
, vol.24
, pp. 84-88
-
-
Chaum, D.1
-
2
-
-
0036086129
-
Statistical identification of encrypted web browsing traffic
-
Berkeley, California, May
-
Q. Sun, D. R. Simon, Y. Wang, W. Russell, V. N. Padmanabhan, and L. Qiu,.Statistical identification of encrypted web browsing traffic,. in Proceedings of the 2002 IEEE Symposium on Security and Privacy, (Berkeley, California), p. 19, May 2002.
-
(2002)
Proceedings of the 2002 IEEE Symposium on Security and Privacy
, pp. 19
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
4
-
-
84954409133
-
Mixminion: Design of a type III anonymous remailer protocol
-
May
-
G. Danezis, R. Dingledine, and N. Mathewson,.Mixminion: Design of a type iii anonymous remailer protocol,. in Proceedings of 2003 Symposium on Security and Privacy, pp. 2.15, May 2003.
-
(2003)
Proceedings of 2003 Symposium on Security and Privacy
, pp. 2-15
-
-
Danezis, G.1
Dingledine, R.2
Mathewson, N.3
-
5
-
-
0002054934
-
Crowds: Anonymity for Web transactions
-
M. K. Reiter and A. D. Rubin,.Crowds: Anonymity for Web transactions,. ACM Transactions on Information and System Security, vol. 1, no. 1, pp. 66.92, 1998.
-
(1998)
ACM Transactions on Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
6
-
-
84890010554
-
Stop-And-go MIXes providing probabilistic security in an open system
-
Lecture Notes in Computer Science, Portland, Oregon, April
-
D. Kesdogan, J. Egner, and R. Buschkes,.Stop-And-go MIXes providing probabilistic security in an open system,. in Second International Workshop on Information Hiding (IH'98), Lecture Notes in Computer Science, vol. 1525, (Portland, Oregon), pp. 83.98, April 1998.
-
(1998)
Second International Workshop on Information Hiding (IH'98).
, vol.1525
, pp. 83-98
-
-
Kesdogan, D.1
Egner, J.2
Buschkes, R.3
-
7
-
-
33847350601
-
Effective probabilistic approach protecting sensor traffic
-
Atlantic City, NJ, Oct.
-
X. Hong, P. Wang, J. Kong, Q. Zheng, and J. Liu,.Effective Probabilistic Approach Protecting Sensor Traffic,. in Military Communications Conference, 2005, (Atlantic City, NJ), pp. 1.7, Oct. 2005.
-
(2005)
Military Communications Conference
, vol.2005
, pp. 1-7
-
-
Hong, X.1
Wang, P.2
Kong, J.3
Zheng, Q.4
Liu, J.5
-
8
-
-
34250785454
-
On flow correlation attacks and countermeasures in mix networks
-
May 26-28
-
Y. Zhu, X. Fu, B. Graham, R.Bettati, and W. Zhao,.On flow correlation attacks and countermeasures in mix networks,. in Proceedings of Privacy Enhancing Technologies workshop, May 26-28 2004.
-
(2004)
Proceedings of Privacy Enhancing Technologies workshop
-
-
Zhu, Y.1
Fu, X.2
Graham, B.3
Bettati, R.4
Zhao, W.5
-
10
-
-
20344384752
-
A mix route algorithm for mix-net in wireless mobile ad hoc networks
-
October
-
S. Jiang, N. H. Vaidya, and W. Zhao,.A mix route algorithm for mix-net in wireless mobile ad hoc networks,. in Proceedings of IEEE Mobile Sensor and Ad-hoc and Sensor Systems, pp. 406.415, October 2004.
-
(2004)
Proceedings of IEEE Mobile Sensor and Ad-hoc and Sensor Systems
, pp. 406-415
-
-
Jiang, S.1
Vaidya, N.H.2
Zhao, W.3
-
13
-
-
0016562514
-
The wiretap channel
-
A. Wyner,.The wiretap channel,. Bell Syst. Tech. J., vol. 54, pp. 1355. 1387, 1975.
-
(1975)
Bell Syst. Tech. J.
, vol.54
, pp. 1355-1387
-
-
Wyner, A.1
-
14
-
-
33745802064
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
Sophia Antipolis, French Riviera, France, September
-
A. Blum, D. Song, and S. Venkataraman,.Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds,. in Conference of Recent Advance in Intrusion Detection (RAID), (Sophia Antipolis, French Riviera, France), September 2004.
-
(2004)
Conference of Recent Advance in Intrusion Detection (RAID).
-
-
Blum, A.1
Song, D.2
Venkataraman, S.3
-
15
-
-
84940698279
-
Detecting traffic flows in chaff: Fundamental limits and robust algorithms
-
submitted to
-
T. He and L. Tong,.Detecting Traffic Flows in Chaff: Fundamental Limits and Robust Algorithms. submitted to IEEE Trans. on Information Theory, 2006.
-
(2006)
IEEEi Trans. on Information Theory
-
-
He, T.1
Tong, L.2
-
16
-
-
0025536530
-
Pakcet recovery in high-speed networks using coding and buffer management
-
N. Shacham and P. McKenney,.Pakcet Recovery in High-Speed Networks using Coding and Buffer Management,. in Proc. IEEE INFOCOM, pp. 124.131, 1990.
-
(1990)
Proc. IEEE INFOCOM
, pp. 124-131
-
-
Shacham, N.1
McKenney, P.2
-
17
-
-
0031122982
-
Effective erasure codes for reliable computer communication protocols
-
L. Rizzo,.Effective Erasure Codes for Reliable Computer Communication Protocols,. in Proc. ACM SIGCOMM Computer Communication Review, vol. 27, pp. 24.36, 1997.
-
(1997)
Proc. ACM SIGCOMM Computer Communication Review
, vol.27
, pp. 24-36
-
-
Rizzo, L.1
|