-
1
-
-
84944727698
-
-
8
-
Onion Routing Development Achives. Link padding and the intersection attack. http://archives.seul.org/or/dev/Aug-2002/msg00004.html, 8 2002.
-
(2002)
Link Padding and the Intersection Attack
-
-
-
4
-
-
23544462875
-
-
June
-
CAIDA. Packet sizes and sequencing. http://www.caida.org/outreach/resources/learn/packetsizes/, June 2002.
-
(2002)
Packet Sizes and Sequencing
-
-
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
Feb.
-
D. L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM, 24(2), Feb. 1981.
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
-
-
Chaum, D.L.1
-
10
-
-
0037629738
-
On effectiveness of link padding for statistical traffic analysis attacks
-
Xinwen Fu, Bryan Graham, Riccardo Bettati, and Wei Zhao. On effectiveness of link padding for statistical traffic analysis attacks. ICDCS, 2003.
-
(2003)
ICDCS
-
-
Fu, X.1
Graham, B.2
Bettati, R.3
Zhao, W.4
-
11
-
-
0035402083
-
Netcamo: Camouflaging network traffic for qos-guaranteed critical allplications
-
of 4, July
-
Y. Guan, X. Fu, D. Xuan, P. U. Shenoy, R. Bettati, and W. Zhao. Netcamo: Camouflaging network traffic for qos-guaranteed critical allplications. In IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, Special Issue on Information Assurance, volume 31 of 4, pages 253-265, July 2001.
-
(2001)
IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, Special Issue on Information Assurance
, vol.31
, pp. 253-265
-
-
Guan, Y.1
Fu, X.2
Xuan, D.3
Shenoy, P.U.4
Bettati, R.5
Zhao, W.6
-
14
-
-
84946138370
-
-
SafeWeb inc. Safeweb. http://www.safewebinc.com/, 2002.
-
(2002)
Safeweb
-
-
-
15
-
-
0033640646
-
Statistical pattern recognition: A review
-
A. K. Jain, R. P. W. Duin, and J. Mao. Statistical pattern recognition: A review. IEEE Transactions on Pattern Analysis and Machine Intelligence, 22(1):4-37, 2000.
-
(2000)
IEEE Transactions on Pattern Analysis and Machine Intelligence
, vol.22
, Issue.1
, pp. 4-37
-
-
Jain, A.K.1
Duin, R.P.W.2
Mao, J.3
-
17
-
-
0024621174
-
On estimation of entropy and mutual information of continuous distributions
-
R. Moddemeijer. On estimation of entropy and mutual information of continuous distributions. Signal Processing, 16(3):233-246, 1989.
-
(1989)
Signal Processing
, vol.16
, Issue.3
, pp. 233-246
-
-
Moddemeijer, R.1
-
18
-
-
84946126845
-
The spread of the sapphire/slammer worm
-
D. Moore, V. Paxson, S. Savage, C. Shannon, S. Staniford, and N. Weaver. The spread of the sapphire/slammer worm. CAIDA, ICSI, Silicon Defense, UC Berkeley EECS and UC San Diego CSE, 2003.
-
CAIDA, ICSI, Silicon Defense, UC Berkeley EECS and UC San Diego CSE, 2003
-
-
Moore, D.1
Paxson, V.2
Savage, S.3
Shannon, C.4
Staniford, S.5
Weaver, N.6
-
22
-
-
0013379958
-
-
NIST/SEMATECH. Handbook of statistical methods. http://www.itl.nist.gov/div898/handbook/eda/section3/boxplot.htm, 2003.
-
(2003)
Handbook of Statistical Methods
-
-
-
24
-
-
84937555407
-
Traffic analysis: Protocols, attacks, design issues and open problems
-
H. Federrath, editor, Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag
-
J. Raymond. Traffic analysis: Protocols, attacks, design issues and open problems. In H. Federrath, editor, Designing Privacy Enhancing Technologies: Proceedings of International Workshop on Design Issues in Anonymity and Unobservability, volume 2009 of LNCS, pages 10-29. Springer-Verlag, 2001.
-
(2001)
LNCS
, vol.2009
, pp. 10-29
-
-
Raymond, J.1
-
25
-
-
84890522850
-
Communication theory of secrecy systems
-
C. E. Shannon. Communication theory of secrecy systems. Bell Sys. Tech. J., 28:656-715, 1949.
-
(1949)
Bell Sys. Tech. J.
, vol.28
, pp. 656-715
-
-
Shannon, C.E.1
-
28
-
-
84864253438
-
Statistical identification of encrypted web browsing traffic
-
Qixiang Sun, Daniel R. Simon, Yimin Wang, Wilf Russell, Venkata N. Padmanabhan, and Lili Qiu. Statistical identification of encrypted web browsing traffic. IEEE Symposium on Security and Privacy, 2002.
-
IEEE Symposium on Security and Privacy, 2002
-
-
Sun, Q.1
Simon, D.R.2
Wang, Y.3
Russell, W.4
Padmanabhan, V.N.5
Qiu, L.6
-
29
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, California, 4-7
-
P. F. Syverson, D. M. Goldschlag, and M. G. Reed. Anonymous connections and onion routing. In IEEE Symposium on Security and Privacy, pages 44-54, Oakland, California, 4-7 1997.
-
(1997)
IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
30
-
-
84944785767
-
-
March
-
Agilent Technologies. Agilent j6841a network analyzer software. http://onenetworks.comms.agilent.com/NetworkAnalyzer/J6841A.asp, March 2002.
-
(2002)
Agilent J6841a Network Analyzer Software
-
-
-
31
-
-
24344490149
-
-
TimeSys. Timesys linux docs. http://www.timesys.com/index.cfm?hdr=home-header.cfm&bdy=home-bdy-library.cfm, 2003.
-
(2003)
Timesys Linux Docs
-
-
-
33
-
-
0028713303
-
Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network
-
B. R. Venkatraman and R. E. Newman-Wolfe. Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. Computer Security Applications Conference, 10th Annual, pages 288-297, 1994.
-
(1994)
Computer Security Applications Conference, 10th Annual
, pp. 288-297
-
-
Venkatraman, B.R.1
Newman-Wolfe, R.E.2
-
34
-
-
0020762394
-
Security mechanisms in highlevel network protocols
-
V. Voydoc and S. Kent. Security mechanisms in highlevel network protocols. ACM Computing Surveys, pages 135-171, 1983.
-
(1983)
ACM Computing Surveys
, pp. 135-171
-
-
Voydoc, V.1
Kent, S.2
|