You are here

Bibliography

Export 8 results:
Author Title Type [ Year(Asc)]
Filters: Author is Steven J. Murdoch  [Clear All Filters]
2008
Zander S, Murdoch SJ. An Improved Clock-skew Measurement Technique for Revealing Hidden Services. In: Proceedings of the 17th USENIX Security Symposium. Proceedings of the 17th USENIX Security Symposium. San Jose, CA, US: USENIX Association Berkeley, CA, USA; 2008. Available from: http://portal.acm.org/citation.cfm?id=1496726
Murdoch SJ, Watson RNM. Metrics for Security and Performance in Low-Latency Anonymity Networks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 115–132. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428267
2007
Murdoch SJ. Covert channel vulnerabilities in anonymity systems. [Internet]. 2007 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.5142
Murdoch SJ, Zieliński P. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007.
2006
Murdoch SJ. Hot or Not: Revealing Hidden Services by their Clock Skew. In: Proceedings of CCS 2006. Proceedings of CCS 2006. ACM New York, NY, USA; 2006. Available from: http://portal.acm.org/citation.cfm?id=1180410
Clayton R, Murdoch SJ, Watson RNM. Ignoring the Great Firewall of China. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 20–35. Available from: http://www.springerlink.com/content/7224582654260k03/
2005
Murdoch SJ, Danezis G. Low-Cost Traffic Analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy. Proceedings of the 2005 IEEE Symposium on Security and Privacy. IEEE CS; 2005. Available from: http://portal.acm.org/citation.cfm?id=1059390
Serjantov A, Murdoch SJ. Message Splitting Against the Partial Adversary. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Springer Berlin / Heidelberg; 2005. pp. 26–39. Available from: http://www.springerlink.com/content/375x2pv385388h86/