-
1
-
-
85031236652
-
Operating systems support for planetary-scale network services
-
R. Morris and S. Savage, editors, pages USENIX, Mar
-
A. Bavier, M. Bowman, B. Chun, D. Culler, S. Karlin, S. Muir, L. Peterson, T. Roscoe, T. Spalink, and M. Wawrzoniak. Operating systems support for planetary-scale network services. In R. Morris and S. Savage, editors, Symposium on Networked Systems Design and Implementation, pages 253–266. USENIX, Mar. 2004.
-
(2004)
Symposium on Networked Systems Design and Implementation
, pp. 253-266
-
-
Bavier, A.1
Bowman, M.2
Chun, B.3
Culler, D.4
Karlin, S.5
Muir, S.6
Peterson, L.7
Roscoe, T.8
Spalink, T.9
Wawrzoniak, M.10
-
2
-
-
0030384775
-
Techniques for data hiding
-
(/4)
-
W. Bender, D. Gruhl, N. Morimoto, and A.Lu. Techniques for data hiding. IBM Systems Journal, 35(3/4):313–336, 1996.
-
(1996)
IBM Systems Journal
, vol.35
, Issue.3
, pp. 313-336
-
-
Bender, W.1
Gruhl, D.2
Morimoto, N.3
Lu, A.4
-
3
-
-
35048846490
-
Detection of interactive stepping stones: Algorithms and confidence bounds
-
E. Jonsson, A. Valdes, and M. Almgren, editors, pages Springer, Sept
-
A. Blum, D. X. Song, and S. Venkataraman. Detection of interactive stepping stones: Algorithms and confidence bounds. In E. Jonsson, A. Valdes, and M. Almgren, editors, International Symposium on Recent Advances in Intrusion Detection, volume 3224 of Lecture Notes in Computer Science, pages 258–277. Springer, Sept. 2004.
-
(2004)
International Symposium on Recent Advances in Intrusion Detection, volume 3224 of Lecture Notes in Computer Science
, pp. 258-277
-
-
Blum, A.1
Song, D. X.2
Venkataraman, S.3
-
4
-
-
0035251780
-
Quantization index modulation methods for digital watermarking and information embedding of multimedia
-
B. Chen and G. W. Wornell. Quantization index modulation methods for digital watermarking and information embedding of multimedia. The Journal of VLSI Signal Processing, 27(1–2):7–33, 2001.
-
(2001)
The Journal of VLSI Signal Processing
, vol.27
, Issue.1–2
, pp. 7-33
-
-
Chen, B.1
Wornell, G. W.2
-
5
-
-
0031362116
-
Secure spread spectrum watermarking for multimedia
-
I. Cox, J. Kilian, T. Leighton, and T. Shamoon. Secure spread spectrum watermarking for multimedia. IEEE Transactions on Image Processing, 6(12):1673–1687, 1997.
-
(1997)
IEEE Transactions on Image Processing
, vol.6
, Issue.12
, pp. 1673-1687
-
-
Cox, I.1
Kilian, J.2
Leighton, T.3
Shamoon, T.4
-
6
-
-
24344460554
-
The traffic analysis of continuous-time mixes
-
D. Martin and A. Serjantov, editors, pages Springer, May
-
G. Danezis. The traffic analysis of continuous-time mixes. In D. Martin and A. Serjantov, editors, Workshop on Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science, pages 35–50. Springer, May 2004.
-
(2004)
Workshop on Privacy Enhancing Technologies, volume 3424 of Lecture Notes in Computer Science
, pp. 35-50
-
-
Danezis, G.1
-
7
-
-
85084161366
-
Tor: The second-generation onion router
-
M. Blaze, editor, Berkeley, CA, USA, USENIX Association
-
R. Dingledine, N. Mathewson, and P. Syverson. Tor: The second-generation onion router. In M. Blaze, editor, USENIX Security Symposium, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
USENIX Security Symposium
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
8
-
-
84958977733
-
Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay
-
A. Wespi, G. Vigna, and L. Deri, editors, pages Springer, Oct
-
D. Donoho, A. Flesia, U. Shankar, V. Paxson, J. Coit, and S. Staniford. Multiscale stepping-stone detection: detecting pairs of jittered interactive streams by exploiting maximum tolerable delay. In A. Wespi, G. Vigna, and L. Deri, editors, International Symposium on Recent Advances in Intrusion Detection, volume 2516 of Lecture Notes in Computer Science, pages 16–18. Springer, Oct. 2002.
-
(2002)
International Symposium on Recent Advances in Intrusion Detection, volume 2516 of Lecture Notes in Computer Science
, pp. 16-18
-
-
Donoho, D.1
Flesia, A.2
Shankar, U.3
Paxson, V.4
Coit, J.5
Staniford, S.6
-
9
-
-
77952331178
-
Detecting covert timing channels: an entropy-based approach
-
P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors, pages ACM
-
S. Gianvecchio and H. Wang. Detecting covert timing channels: an entropy-based approach. In P. Ning, S. D. C. di Vimercati, and P. F. Syverson, editors, ACM Conference on Computer and Communications Security, pages 307–316. ACM, 2007.
-
(2007)
ACM Conference on Computer and Communications Security
, pp. 307-316
-
-
Gianvecchio, S.1
Wang, H.2
-
10
-
-
34247844336
-
Detecting encrypted stepping-stone connections
-
May
-
T. He and L. Tong. Detecting encrypted stepping-stone connections. IEEE Transactions on Signal Processing, 55(5):1612–1623, May 2007.
-
(2007)
IEEE Transactions on Signal Processing
, vol.55
, Issue.5
, pp. 1612-1623
-
-
He, T.1
Tong, L.2
-
11
-
-
80052167664
-
Multiflow attacks against network flow watermarking schemes
-
P. van Oorschot, editor, Berkeley, CA, USA, USENIX Association
-
N. Kiyavash, A. Houmansadr, and N. Borisov. Multiflow attacks against network flow watermarking schemes. In P. van Oorschot, editor, USENIX Security Symposium, Berkeley, CA, USA, 2008. USENIX Association.
-
(2008)
USENIX Security Symposium
-
-
Kiyavash, N.1
Houmansadr, A.2
Borisov, N.3
-
12
-
-
33846288517
-
Timing attacks in low-latency mix systems
-
A. Juels, editor, pages Springer, Feb
-
B. N. Levine, M. K. Reiter, C. Wang, and M. Wright. Timing attacks in low-latency mix systems. In A. Juels, editor, Financial Cryptography, volume 3110 of Lecture Notes in Computer Science, pages 251–265. Springer, Feb. 2004.
-
(2004)
Financial Cryptography, volume 3110 of Lecture Notes in Computer Science
, pp. 251-265
-
-
Levine, B. N.1
Reiter, M. K.2
Wang, C.3
Wright, M.4
-
13
-
-
33751040560
-
On the secrecy of timing-based active watermarking trace-back techniques
-
Paxson and B. Pfitzmann, editors, pages IEEE Computer Society Press, May
-
P. Peng, P. Ning, and D. S. Reeves. On the secrecy of timing-based active watermarking trace-back techniques. In V. Paxson and B. Pfitzmann, editors, IEEE Symposium on Security and Privacy, pages 334–349. IEEE Computer Society Press, May 2006.
-
(2006)
IEEE Symposium on Security and Privacy
, pp. 334-349
-
-
Peng, P.1
Ning, P.2
Reeves, D. S.3
-
16
-
-
34548314612
-
Tracing traffic through intermediate hosts that repacketize flows
-
G. Kesidis, E. Modiano, and R. Srikant, editors, pages May
-
Y. Pyun, Y. Park, X. Wang, D. S. Reeves, and P. Ning. Tracing traffic through intermediate hosts that repacketize flows. In G. Kesidis, E. Modiano, and R. Srikant, editors, IEEE Conference on Computer Communications (INFOCOM), pages 634–642, May 2007.
-
(2007)
IEEE Conference on Computer Communications (INFOCOM)
, pp. 634-642
-
-
Pyun, Y.1
Park, Y.2
Wang, X.3
Reeves, D. S.4
Ning, P.5
-
17
-
-
0029232080
-
Holding intruders accountable on the Internet
-
C. Meadows and J. McHugh, editors, pages IEEE Computer Society Press, May
-
S. Staniford-Chen and L. T. Heberlein. Holding intruders accountable on the Internet. In C. Meadows and J. McHugh, editors, IEEE Symposium on Security and Privacy, pages 39–49. IEEE Computer Society Press, May 1995.
-
(1995)
IEEE Symposium on Security and Privacy
, pp. 39-49
-
-
Staniford-Chen, S.1
Heberlein, L. T.2
-
18
-
-
33745773302
-
Tracking anonymous peer-to-peer VoIP calls on the Internet
-
C. Meadows, editor, pages New York, NY, USA, Nov. ACM
-
X. Wang, S. Chen, and S. Jajodia. Tracking anonymous peer-to-peer VoIP calls on the Internet. In C. Meadows, editor, ACM Conference on Computer and Communications Security, pages 81–91, New York, NY, USA, Nov. 2005. ACM.
-
(2005)
ACM Conference on Computer and Communications Security
, pp. 81-91
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
19
-
-
34548762543
-
Network flow watermarking attack on low-latency anonymous communication systems
-
X. Wang, S. Chen, and S. Jajodia. Network flow watermarking attack on low-latency anonymous communication systems. In Pfitzmann and McDaniel [14], pages 116–130.
-
Pfitzmann and McDaniel [14]
, pp. 116-130
-
-
Wang, X.1
Chen, S.2
Jajodia, S.3
-
20
-
-
84957003012
-
Inter-packet delay based correlation for tracing encrypted connections through stepping stones
-
D. Gollmann, G. Karjoth, and M. Waidner, editors, pages Springer, Oct
-
X. Wang, D. Reeves, and S. F. Wu. Inter-packet delay based correlation for tracing encrypted connections through stepping stones. In D. Gollmann, G. Karjoth, and M. Waidner, editors, European Symposium on Research in Computer Security, volume 2502 of Lecture Notes in Computer Science, pages 244–263. Springer, Oct. 2002.
-
(2002)
European Symposium on Research in Computer Security, volume 2502 of Lecture Notes in Computer Science
, pp. 244-263
-
-
Wang, X.1
Reeves, D.2
Wu, S. F.3
-
21
-
-
2442556704
-
Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays
-
Atluri, editor, pages New York, NY, USA, ACM
-
X. Wang and D. S. Reeves. Robust correlation of encrypted attack traffic through stepping stones by manipulation of interpacket delays. In V. Atluri, editor, ACM Conference on Computer and Communications Security, pages 20–29, New York, NY, USA, 2003. ACM.
-
(2003)
ACM Conference on Computer and Communications Security
, pp. 20-29
-
-
Wang, X.1
Reeves, D. S.2
-
22
-
-
33749461359
-
The secure shell (SSH) protocol architecture
-
Jan
-
T. Ylonen and C. Lonvick. The secure shell (SSH) protocol architecture. RFC 4251, Jan. 2006.
-
(2006)
RFC 4251
-
-
Ylonen, T.1
Lonvick, C.2
-
23
-
-
34548755641
-
DSSSbased flow marking technique for invisible traceback
-
W. Yu, X. Fu, S. Graham, D.Xuan, and W. Zhao. DSSSbased flow marking technique for invisible traceback. In Pfitzmann and McDaniel [14], pages 18–32.
-
Pfitzmann and McDaniel
, vol.14
, pp. 18-32
-
-
Yu, W.1
Fu, X.2
Graham, S.3
Xuan, D.4
Zhao, W.5
-
24
-
-
85084161090
-
Detecting stepping stones
-
S. Bellovin and G. Rose, editors, pages Berkeley, CA, USA, Aug. USENIX Association
-
Y. Zhang and V. Paxson. Detecting stepping stones. In S. Bellovin and G. Rose, editors, USENIX Security Symposium, pages 171–184, Berkeley, CA, USA, Aug. 2000. USENIX Association.
-
(2000)
USENIX Security Symposium
, pp. 171-184
-
-
Zhang, Y.1
Paxson, V.2
|