You are here

Bibliography

Export 43 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is traffic analysis  [Clear All Filters]
2011
Houmansadr A, Borisov N. SWIRL: A Scalable Watermark to Detect Correlated Network Flows. In: NDSS'11 - Proceedings of the Network and Distributed Security Symposium. NDSS'11 - Proceedings of the Network and Distributed Security Symposium. San Diego, CA, USA; 2011.
Panchenko A, Niessen L, Zinnen A, Engel T. Website Fingerprinting in Onion Routing Based Anonymization Networks. In: WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society. WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society. Chicago, IL, United States: ACM; 2011.
2009
Troncoso C, Danezis G. The bayesian traffic analysis of mix networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 369–379. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653707
Wright C, Coull SE, Monrose F. Traffic Morphing: An efficient defense against statistical traffic analysis. In: Proceedings of the Network and Distributed Security Symposium - {NDSS} '09. Proceedings of the Network and Distributed Security Symposium - {NDSS} '09. IEEE; 2009.
Herrmann D, Wendolsky R, Federrath H. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier. In: Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09). Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09). New York, NY, USA: ACM; 2009. pp. 31–42. Available from: http://portal.acm.org/citation.cfm?id=1655013&dl=GUIDE&coll=GUIDE&CFID=83763210&CFTOKEN=75697565
Danezis G, Diaz C, Käsper E, Troncoso C. The Wisdom of Crowds: Attacks and Optimal Constructions. In: Backes M, Ning P Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 21-23. Vol. 5789. Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 21-23. Springer; 2009. pp. 406–423. Available from: http://www.springerlink.com/content/t6q86u137t4762k8/
2008
Wang W, Motani M, Srinivasan V. Dependent Link Padding Algorithms for Low Latency Anonymity Systems. In: Syverson P, Jha S, Zhang X {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. {Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)}. Alexandria, Virginia, USA: ACM Press; 2008. pp. 323–332. Available from: http://portal.acm.org/citation.cfm?id=1455812
Troncoso C, Gierlichs B, Preneel B, Verbauwhede I. Perfect Matching Statistical Disclosure Attacks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 2–23. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.4953
2007
Venkitasubramaniam P, He T, Tong L. Anonymous Networking amidst Eavesdroppers. [Internet]. 2007 . Available from: http://cat.inist.fr/?aModele=afficheN&cpsidt=20411836
Bauer K, McCoy D, Grunwald D, Kohno T, Sicker D. Low-Resource Routing Attacks Against Tor. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007). Washington, DC, USA: ACM New York, NY, USA; 2007. Available from: http://portal.acm.org/citation.cfm?id=1314336
Murdoch SJ, Zieliński P. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007.
Troncoso C, Diaz C, Dunkelman O, Preneel B. Traffic Analysis Attacks on a Continuously-Observable Steganographic File System. In: Proceedings of Information Hiding Workshop (IH 2007). Vol. 4567. Proceedings of Information Hiding Workshop (IH 2007). Saint-Malo,FR: Springer-Verlag; 2007. pp. 220–236. Available from: http://www.springerlink.com/content/h5r4j539833k1k78/
Danezis G, Diaz C, Troncoso C. Two-Sided Statistical Disclosure Attack. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.7347
2006
Cramer C, Fuhrmann T. Bootstrapping Chord in Ad hoc Networks: Not Going Anywhere for a While. In: Proceedings of the 3rd IEEE International Workshop on Mobile Peer-to-Peer Computing. Proceedings of the 3rd IEEE International Workshop on Mobile Peer-to-Peer Computing. Pisa, Italy; 2006. Available from: http://i30www.ira.uka.de/research/publications/p2p/
Danezis G. Breaking Four Mix-related Schemes Based on Universal Re-encryption. In: Proceedings of Information Security Conference 2006. Proceedings of Information Security Conference 2006. Springer-Verlag; 2006. Available from: http://www.springerlink.com/content/x038u85171776236/
Liberatore M, Levine BN. Inferring the Source of Encrypted HTTP Connections. In: Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006). Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006). ACM New York, NY, USA; 2006. pp. 255–263. Available from: http://portal.acm.org/citation.cfm?id=1180437
2005
O'Connor L. On Blending Attacks For Mixes with Memory. In: Proceedings of Information Hiding Workshop (IH 2005). Proceedings of Information Hiding Workshop (IH 2005). Springer Berlin / Heidelberg; 2005. pp. 39–52. Available from: http://www.springerlink.com/index/y78350424h77u578.pdf
Murdoch SJ, Danezis G. Low-Cost Traffic Analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy. Proceedings of the 2005 IEEE Symposium on Security and Privacy. IEEE CS; 2005. Available from: http://portal.acm.org/citation.cfm?id=1059390
Serjantov A, Murdoch SJ. Message Splitting Against the Partial Adversary. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Springer Berlin / Heidelberg; 2005. pp. 26–39. Available from: http://www.springerlink.com/content/375x2pv385388h86/
Bissias GD, Liberatore M, Levine BN. Privacy Vulnerabilities in Encrypted HTTP Streams. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Springer Berlin / Heidelberg; 2005. pp. 1–11. Available from: http://www.springerlink.com/content/1062w684754754h4/
2004
Kesdogan D, Pimenidis L. The Hitting Set Attack on Anonymity Protocols. In: Proceedings of 6th Information Hiding Workshop (IH 2004). Proceedings of 6th Information Hiding Workshop (IH 2004). Toronto; 2004. Available from: http://www.springerlink.com/content/t6bkk4tyjvr71m55/
Mathewson N, Dingledine R. Practical Traffic Analysis: Extending and Resisting Statistical Disclosure. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Vol. 3424. Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Springer Berlin / Heidelberg; 2004. pp. 17–34. Available from: http://www.springerlink.com/content/v6m6cat1lxvbd4yd/
Danezis G. The Traffic Analysis of Continuous-Time Mixes. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Vol. 3424. Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Springer Berlin / Heidelberg; 2004. pp. 35–50. Available from: http://www.springerlink.com/content/kgenxdaxkyey4ed2/
2003
Fu X, Graham B, Bettati R, Zhao W. Active Traffic Analysis Attacks and Countermeasures. In: Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing. Proceedings of the 2003 International Conference on Computer Networks and Mobile Computing. IEEE Computer Society Washington, DC, USA; 2003. pp. 31–39. Available from: http://portal.acm.org/citation.cfm?id=950964
Fu X, Graham B, Bettati R, Zhao W. Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks. In: Proceedings of the 2003 International Conference on Parallel Processing. Proceedings of the 2003 International Conference on Parallel Processing. ; 2003. pp. 483–492. Available from: http://www.computer.org/portal/web/csdl/doi?doc=doi/10.1109/ICPP.2003.1240613

Pages