You are here

Bibliography

Export 7 results:
Author Title Type [ Year(Asc)]
Filters: Author is Matthew Wright  [Clear All Filters]
2013
Al-Ameen MN, Wright M. Persea: A Sybil-resistant Social DHT. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. Proceedings of the Third ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM; 2013. Available from: http://doi.acm.org.eaccess.ub.tum.de/10.1145/2435349.2435372
2007
Mallesh N, Wright M. Countering Statistical Disclosure with Receiver-Bound Cover Traffic. In: Biskup J, Lopez J Proceedings of ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings. Vol. 4734. Proceedings of ESORICS 2007, 12th European Symposium On Research In Computer Security, Dresden, Germany, September 24-26, 2007, Proceedings. Springer; 2007. pp. 547–562. Available from: http://www.springerlink.com/content/k2146538700m71v7/
2004
Wright M, Adler M, Levine BN, Shields C. The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems. ACM Transactions on Information and System Security (TISSEC) [Internet]. 2004 ;7(4):489–522. Available from: http://portal.acm.org/citation.cfm?id=1042031.1042032&coll=GUIDE&dl=GUIDE&CFID=76057600&CFTOKEN=15386893
Levine BN, Reiter MK, Wang C, Wright M. Timing Attacks in Low-Latency Mix-Based Systems. In: Juels A Proceedings of Financial Cryptography (FC '04). Proceedings of Financial Cryptography (FC '04). Springer-Verlag, LNCS 3110; 2004. pp. 251–265. Available from: http://www.springerlink.com/content/n4khdtwk7dqvj0u0/
2003
Wright M, Adler M, Levine BN, Shields C. Defending Anonymous Communication Against Passive Logging Attacks. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy. Proceedings of the 2003 IEEE Symposium on Security and Privacy. IEEE Computer Society Washington, DC, USA; 2003. pp. 28–43. Available from: http://portal.acm.org/citation.cfm?id=830556
2002
Wright M, Adler M, Levine BN, Shields C. An Analysis of the Degradation of Anonymous Protocols. In: Proceedings of the Network and Distributed Security Symposium - NDSS '02. Proceedings of the Network and Distributed Security Symposium - NDSS '02. IEEE; 2002. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.9435
2001
Wright M, Adler M, Levine BN, Shields C. An Analysis of the Degradation of Anonymous Protocols. In: Network and Distributed System Security Symposium. Network and Distributed System Security Symposium. San Diego, California; 2001. Available from: http://freehaven.net/anonbib/cache/wright02.pdf