# Bibliography

Export 6 results:
Author Title Type [ Year]
Filters: Author is Somesh Jha  [Clear All Filters]
2009
. AS-awareness in Tor path selection. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 380–389. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653708
. The bayesian traffic analysis of mix networks. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 369–379. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653707
. Membership-concealing overlay networks. In: Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 390–399. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653709
2008
. Dependent Link Padding Algorithms for Low Latency Anonymity Systems. In: {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. Alexandria, Virginia, USA: ACM Press; 2008. pp. 323–332. Available from: http://portal.acm.org/citation.cfm?id=1455812
. Information Leaks in Structured Peer-to-peer Anonymous Communication Systems. In: Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Alexandria, Virginia, USA: ACM Press; 2008. pp. 267–278. Available from: http://portal.acm.org/citation.cfm?id=1455805
. PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication. In: {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. Alexandria, Virginia, USA: ACM Press; 2008. pp. 333–345. Available from: http://portal.acm.org/citation.cfm?id=1455813