-
1
-
-
85076499611
-
-
ab: Apache benchmark
-
ab: Apache benchmark. http://httpd.apache.org/docs/2.0/ programipsets/ab.html.
-
-
-
-
2
-
-
85076458489
-
-
Alexa top sites
-
Alexa top sites. http://www.alexa.com/topsites.
-
-
-
-
3
-
-
33745965912
-
Curve25519: New diffie-hellman speed records
-
BERNSTEIN, D. J. Curve25519: New Diffie-Hellman speed records. Public Key Cryptography-PKC 2006 (2006), 207-228.
-
(2006)
Public Key Cryptography-PKC
, vol.2006
, pp. 207-228
-
-
Bernstein, D.J.1
-
4
-
-
84947778144
-
The decision diffie-hellman problem
-
BONEH, D. The decision Diffie-Hellman problem. Algorithmic Number Theory (1998), 48-63.
-
(1998)
Algorithmic Number Theory
, pp. 48-63
-
-
Boneh, D.1
-
5
-
-
35248835575
-
Aggregate and verifiably encrypted signatures from bilinear maps
-
May
-
BONEH, D. J., GENTRY, C., LYNN, B., AND SHACHAM, H. Aggregate and Verifiably Encrypted Signatures from Bilinear Maps. In Proceedings of Advances in Cryptography - Eurocrypt 2003 (May 2003), pp. 416-432.
-
(2003)
Proceedings of Advances in Cryptography - Eurocrypt
, vol.2003
, pp. 416-432
-
-
Boneh, D.J.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
7
-
-
85076482451
-
Survey of anonymous communication channels
-
Mar.
-
DANEZIS, G., AND DIAZ, C. Survey of anonymous communication channels. Computer Communications 33 (Mar. 2010).
-
(2010)
Computer Communications
, vol.33
-
-
Danezis, G.1
DIaz, C.2
-
12
-
-
85076468816
-
-
Dynaweb proxy
-
Dynaweb proxy. http://www.dit-inc.us/dynaweb.
-
-
-
-
13
-
-
85084161295
-
Infranet: Circumventing web censorship and surveillance
-
Aug.
-
FEAMSTER, N., BALAZINSKA, M., HARFST, G., BALAKRISHNAN, H., AND KARGER, D. Infranet: Circumventing web censorship and surveillance. In Proceedings of the 11th USENIX Security Symposium (Aug. 2002).
-
(2002)
Proceedings of the 11th USENIX Security Symposium
-
-
Feamster, N.1
Balazinska, M.2
Harfst, G.3
Balakrishnan, H.4
Karger, D.5
-
14
-
-
35248830377
-
Thwarting web censorship with untrusted messenger discovery
-
Springer
-
FEAMSTER, N., BALAZINSKA, M., WANG, W., BALAKRISHNAN, H., AND KARGER, D. Thwarting web censorship with untrusted messenger discovery. In Privacy Enhancing Technologies (2003), Springer, pp. 125-140.
-
(2003)
Privacy Enhancing Technologies
, pp. 125-140
-
-
Feamster, N.1
Balazinska, M.2
Wang, W.3
Balakrishnan, H.4
Karger, D.5
-
15
-
-
79952953710
-
-
GLOBAL INTERNET FREEDOM CONSORTIUM. The Great Firewall revealed. http://www.internetfreedom.org/files/WhitePaper/ ChinaGreatFirewallRevealed.pdf.
-
The Great Firewall Revealed
-
-
-
17
-
-
35248841071
-
The design and implementation of protocol-based hidden key recovery
-
Oct.
-
GOH, E.-J., BONEH, D., GOLLE, P., AND PINKAS, B. The Design and Implementation of Protocol-based Hidden Key Recovery. In Proceedings of the 6th Information Security Conference (Oct. 2003), pp. 165-179.
-
(2003)
Proceedings of the 6th Information Security Conference
, pp. 165-179
-
-
Goh, E.-J.1
Boneh, D.2
Golle, P.3
Pinkas, B.4
-
18
-
-
84957796461
-
Fingerprinting websites using traffic analysis
-
In Privacy Enhancing Technologies, R. Dingledine and P. Syverson, Eds., Springer Berlin / Heidelberg
-
HINTZ, A. Fingerprinting websites using traffic analysis. In Privacy Enhancing Technologies, R. Dingledine and P. Syverson, Eds., vol. 2482 of Lecture Notes in Computer Science. Springer Berlin / Heidelberg, 2003, pp. 229-233.
-
(2003)
Lecture Notes in Computer Science
, vol.2482
, pp. 229-233
-
-
Hintz, A.1
-
19
-
-
85076499195
-
-
IP sets
-
IP sets. http://ipset.netfilter.org/.
-
-
-
-
21
-
-
70350218435
-
-
Nmap Project, ch. Chapter 8: Remote OS Detection.
-
LYON, G. Nmap Network Scanning. Nmap Project, 2009, ch. Chapter 8: Remote OS Detection.
-
(2009)
Nmap Network Scanning
-
-
Lyon, G.1
-
23
-
-
0033295259
-
Bro: A system for detecting network intruders in real time
-
PAXSON, V. Bro: A system for detecting network intruders in real time. Computer Networks 31 (1999), 2435-2463.
-
(1999)
Computer Networks
, vol.31
, pp. 2435-2463
-
-
Paxson, V.1
-
24
-
-
12144291755
-
A blueprint for introducing disruptive technology into the internet
-
Princeton, New Jersey, October
-
PETERSON, L., ANDERSON, T., CULLER, D., AND ROSCOE, T. A Blueprint for Introducing Disruptive Technology into the Internet. In Proceedings of HotNets-I (Princeton, New Jersey, October 2002).
-
(2002)
Proceedings of HotNets-I
-
-
Peterson, L.1
Anderson, T.2
Culler, D.3
Roscoe, T.4
-
25
-
-
85076488693
-
-
Squid HTTP proxy
-
Squid HTTP proxy. http://www.squid-cache.org/.
-
-
-
-
26
-
-
33746667652
-
Sage: System for algebra and geometry experimentation
-
STEIN, W., AND JOYNER, D. Sage: System for algebra and geometry experimentation. ACM SIGSAM Bulletin 39, 2 (2005), 61-64.
-
(2005)
ACM SIGSAM Bulletin
, vol.39
, Issue.2
, pp. 61-64
-
-
Stein, W.1
Joyner, D.2
-
27
-
-
85076478657
-
-
THE TOR PROJECT. Tor: Bridges
-
THE TOR PROJECT. Tor: Bridges. https://www.torproject.org/ docs/bridges.
-
-
-
-
28
-
-
84870636205
-
-
THE TOR PROJECT, Jan
-
THE TOR PROJECT. New blocking activity from Iran. https:// blog.torproject.org/blog/new-blocking-activity-iran, Jan. 2011.
-
(2011)
New Blocking Activity from Iran
-
-
-
30
-
-
85076489684
-
-
UltraSurf proxy
-
UltraSurf proxy. http://www.ultrareach.com/.
-
-
-
-
31
-
-
38149024764
-
The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware
-
Sept.
-
VALLENTIN, M., SOMMER, R., LEE, J., LERES, C., PAXON, V., AND TIERNEY, B. The NIDS cluster: Scalable, stateful network intrusion detection on commodity hardware. In Proc. 10th International Conference on Recent Advances in Intrusion Detection (RAID '07) (Sept. 2007), pp. 107-126.
-
(2007)
Proc. 10th International Conference on Recent Advances in Intrusion Detection (RAID '07)
, pp. 107-126
-
-
Vallentin, M.1
Sommer, R.2
Lee, J.3
Leres, C.4
Paxon, V.5
Tierney, B.6
-
32
-
-
14844300104
-
New client puzzle outsourcing techniques for DoS resistance
-
Oct.
-
WATERS, B., JUELS, A., HALDERMAN, J. A., AND FELTEN, E. W. New client puzzle outsourcing techniques for DoS resistance. In Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004) (Oct. 2004).
-
(2004)
Proceedings of the 11th ACM Conference on Computer and Communications Security (CCS 2004)
-
-
Waters, B.1
Juels, A.2
Halderman, J.A.3
Felten, E.W.4
-
33
-
-
85076457621
-
Analysis of the green dam censorware system
-
WOLCHOK, S., YAO., R., AND HALDERMAN, J. A. Analysis of the Green Dam Censorware System. Computer Science and Engineering Division, University of Michigan 18 (2009).
-
(2009)
Computer Science and Engineering Division, University of Michigan
, vol.18
-
-
Wolchok, S.1
Yao, R.2
Halderman, J.A.3
|