-
1
-
-
84937555407
-
Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
-
Designing Privacy Enhancing Technologies
-
J.-F. Raymond, "Traffic analysis: Protocols, attacks, design issues and open problems," in Designing Privacy Enhancing Technologies: Proc. Int. Workshop Design Issues Anonymity and Unobservability, 2001, pp. 10-29. (Pubitemid 33241785)
-
(2001)
Lecture notes in computer science
, Issue.2009
, pp. 10-29
-
-
Raymond, J.-F.1
-
2
-
-
1242287724
-
A framework for classifying denial of service attacks
-
A. Hussain, J. Heidemann, and C. Papadopoulos, "A framework for classifying denial of service attacks," in Proc. 2003 Conf. Applications, Technologies, Architectures, Protocols for Computer Communications, 2003, pp. 99-110.
-
(2003)
Proc. 2003 Conf. Applications, Technologies, Architectures, Protocols for Computer Communications
, pp. 99-110
-
-
Hussain, A.1
Heidemann, J.2
Papadopoulos, C.3
-
3
-
-
33144475784
-
Wormhole attacks in wireless networks
-
Y.-C. Hu, A. Perrig, and D. B. Johnson, "Wormhole attacks in wireless networks," IEEE J. Select. Areas Commun., vol. 24, no. 2, pp. 370-380, 2006.
-
(2006)
IEEE J. Select. Areas Commun.
, vol.24
, Issue.2
, pp. 370-380
-
-
Hu, Y.-C.1
Perrig, A.2
Johnson, D.B.3
-
5
-
-
55349105640
-
Toward an analytical approach to anonymous wireless networking
-
Feb.
-
P. Venkitasubramaniam, T. He, L. Tong, S. Wicker, and C. University, "Toward an analytical approach to anonymous wireless networking," IEEE Commun. Mag., vol. 46, pp. 140-146, Feb. 2008.
-
(2008)
IEEE Commun. Mag.
, vol.46
, pp. 140-146
-
-
Venkitasubramaniam, P.1
He, T.2
Tong, L.3
Wicker, S.4
University, C.5
-
7
-
-
0030107358
-
Network security under siege: The timing attack
-
Mar.
-
E. English and S. Hamilton, "Network security under siege: The timing attack," Computer, vol. 29, pp. 95-97, Mar. 1996.
-
(1996)
Computer
, vol.29
, pp. 95-97
-
-
English, E.1
Hamilton, S.2
-
8
-
-
2442604821
-
Randomness and the Netscape browser
-
I. Goldberg and D. Wagner, "Randomness and the Netscape browser," Dr. Dobb's, vol. 21, no. 1, pp. 66-71, 1996.
-
(1996)
Dr. Dobb's
, vol.21
, Issue.1
, pp. 66-71
-
-
Goldberg, I.1
Wagner, D.2
-
9
-
-
85084161110
-
Timing analysis of keystrokes and timing attacks on SSH
-
D. X. Song, D. Wagner, and X. Tian, "Timing analysis of keystrokes and timing attacks on SSH," in Proc. 10th USENIX Security Symp., 2001, p. 25.
-
(2001)
Proc. 10th USENIX Security Symp.
, pp. 25
-
-
Song, D.X.1
Wagner, D.2
Tian, X.3
-
10
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
London, U.K.
-
A. Back, U. Möller, and A. Stiglic, "Traffic analysis attacks and trade-offs in anonymity providing systems," in Proc. 4th Int. Workshop Information Hiding, (I H W ' 01), London, U.K., pp. 245-257.
-
Proc. 4th Int. Workshop Information Hiding, (I H W ' 01)
, pp. 245-257
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
11
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
DOI 10.1145/358549.358563
-
D. Chaum, "Untraceable electronic mail, return addresses and digital pseudonyms," Commun. ACM, vol. 24, pp. 84-88, Feb. 1981. (Pubitemid 11480996)
-
(1981)
Communications of the ACM
, vol.24
, Issue.2
, pp. 84-88
-
-
Chaum David, L.1
-
12
-
-
33750276494
-
Timing analysis in low-latency mix networks: Attacks and defenses
-
Computer Security - ESORICS 2006 - 11th European Symposium on Research in Computer Security, Proceedings
-
V. Shmatikov and M.-H. Wang, "Timing analysis in low-latency mix networks: Attacks and defenses," in Computer Security ESORICS 2006 (Lecture Notes in Computer Science, vol. 4189), D. Gollmann, J. Meier, and A. Sabelfeld, Eds. Berlin: Springer, 2006, pp. 18-33. (Pubitemid 44609846)
-
(2006)
Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics)
, vol.4189 LNCS
, pp. 18-33
-
-
Shmatikov, V.1
Wang, M.-H.2
-
13
-
-
33846288517
-
Timing attacks in low-latency mix systems (extended abstract)
-
Key West, FL, LNCS 3110
-
B. N. Levine, M. K. Reiter, C. Wang, and M. Wright, "Timing attacks in low-latency mix systems (extended abstract)," in Proc. 8th Int. Financial Cryptography Conf. (FC 2004), Key West, FL, LNCS 3110, pp. 251-265.
-
Proc. 8th Int. Financial Cryptography Conf. (FC 2004)
, pp. 251-265
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.4
-
14
-
-
77955359942
-
Low-cost side channel remote traffic analysis attack in packet networks
-
Cape Town, South Africa
-
S. Kadloor, X. Gong, N. Kiyavash, T. Tezcan, and N. Borisov, "Low-cost side channel remote traffic analysis attack in packet networks," in Proc. IEEE ICC 2010-Communication and Information System Security Symposium, Cape Town, South Africa, pp. 1-5.
-
Proc. IEEE ICC 2010-Communication and Information System Security Symposium
, pp. 1-5
-
-
Kadloor, S.1
Gong, X.2
Kiyavash, N.3
Tezcan, T.4
Borisov, N.5
-
15
-
-
84947242344
-
Traffic analysis attacks and trade-offs in anonymity providing systems
-
New York: Springer-Verlag
-
A. Back, U. Möller, and A. Stiglic, "Traffic analysis attacks and trade-offs in anonymity providing systems," in Information Hiding (Lecture Notes in Computer Science, vol. 2137). New York: Springer-Verlag, 2001, pp. 245-247.
-
(2001)
Information Hiding (Lecture Notes in Computer Science, 2137
, pp. 245-247
-
-
Back, A.1
Möller, U.2
Stiglic, A.3
-
17
-
-
0029732709
-
Bits through queues
-
PII S0018944896004397
-
V. Anantharam and S. Verdu, "Bits through queues," IEEE Trans. Inform. Theory, vol. 42, pp. 4-18, Jan. 1996. (Pubitemid 126775652)
-
(1996)
IEEE Transactions on Information Theory
, vol.42
, Issue.1
, pp. 4-18
-
-
Anantharam, V.1
Verdu, S.2
-
18
-
-
0036715113
-
An information-theoretic and game-theoretic study of timing channels
-
DOI 10.1109/TIT.2002.801405, PII 1011092002801405
-
J. Giles and B. Hajek, "An information-theoretic and game-theoretic study of timing channels," IEEE Trans. Inform. Theory, vol. 48, pp. 2455-2477, Sept. 2002. (Pubitemid 35032673)
-
(2002)
IEEE Transactions on Information Theory
, vol.48
, Issue.9
, pp. 2455-2477
-
-
Giles, J.1
Hajek, B.2
-
19
-
-
0020915882
-
Blind signatures for untraceable payments
-
Crypto, New York: Plenum
-
D. Chaum, "Blind signatures for untraceable payments," in Advances in Cryp-tology: Proc. Crypto, New York: Plenum, 1983, vol. 82, pp. 199-203.
-
(1983)
Advances in Cryp-tology: Proc
, vol.82
, pp. 199-203
-
-
Chaum, D.1
-
20
-
-
33747336635
-
The channel capacity of a certain noisy timing channel
-
July
-
I. S. Moskowitz and A. R. Miller, "The channel capacity of a certain noisy timing channel," IEEE Trans. Inform. Theory, vol. 38, pp. 1339-1344, July 1992.
-
(1992)
IEEE Trans. Inform. Theory
, vol.38
, pp. 1339-1344
-
-
Moskowitz, I.S.1
Miller, A.R.2
-
21
-
-
84957800033
-
Towards measuring anonymity
-
C. Díaz, S. Seys, J. Claessens, and B. Preneel, "Towards measuring anonymity," in Proc. Privacy Enhancing Technologies Workshop (PET 2002), LNCS 2482, pp. 54-68.
-
Proc. Privacy Enhancing Technologies Workshop (PET 2002), LNCS 2482
, pp. 54-68
-
-
Díaz, C.1
Seys, S.2
Claessens, J.3
Preneel, B.4
-
22
-
-
80051753305
-
BIT-TRAPS: Building information-theoretic traffic privacy into packet streams
-
S. Mathur and W. Trappe, "BIT-TRAPS: Building information-theoretic traffic privacy into packet streams," IEEE Trans. Inform. Forensics Sec., vol. 6, no. 3, pp. 752-762, 2011.
-
(2011)
IEEE Trans. Inform. Forensics Sec.
, vol.6
, Issue.3
, pp. 752-762
-
-
Mathur, S.1
Trappe, W.2
-
23
-
-
84864200547
-
Website detection using remote traffic analysis
-
Berlin: Springer
-
X. Gong, N. Borisov, N. Kiyavash, and N. Schear, "Website detection using remote traffic analysis," in Privacy Enhancing Technologies (Lecture Notes in Computer Science, vol. 7384). Berlin: Springer, 2012, pp. 58-78.
-
(2012)
Privacy Enhancing Technologies (Lecture Notes in Computer Science, 7384
, pp. 58-78
-
-
Gong, X.1
Borisov, N.2
Kiyavash, N.3
Schear, N.4
-
24
-
-
74049152260
-
Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds
-
New York
-
T. Ristenpart, E. Tromer, H. Shacham, and S. Savage, "Hey, you, get off of my cloud: Exploring information leakage in third-party compute clouds," in Proc. 16th ACM Conf. Computer Communications Security (CCS '09), New York, pp. 199-212.
-
Proc. 16th ACM Conf. Computer Communications Security (CCS '09)
, pp. 199-212
-
-
Ristenpart, T.1
Tromer, E.2
Shacham, H.3
Savage, S.4
-
28
-
-
85032777244
-
Admissible length study in anonymous networking: A detection theoretic perspective
-
to be published
-
A. Mishra and P. Venkitasubramaniam, "Admissible length study in anonymous networking: A detection theoretic perspective," IEEE J. Select. Areas Commun., to be published.
-
IEEE J. Select. Areas Commun
-
-
Mishra, A.1
Venkitasubramaniam, P.2
-
29
-
-
85032778133
-
Mitigating timing based information leakage in shared schedulers
-
submitted for publication. Available
-
S. Kadloor, N. Kiyavash, and P. Venkitasubramaniam. Mitigating timing based information leakage in shared schedulers. IEEE Trans. Networking [Online]. submitted for publication. Available: http://www.ifp.illinois. edu/~kadloor1/kadloor2013ton.pdf [SP]
-
IEEE Trans. Networking [Online]
-
-
Kadloor, S.1
Kiyavash, N.2
Venkitasubramaniam, P.3
|