You are here

Bibliography

Export 7 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is latency  [Clear All Filters]
2010
Hopper NJ, Vasserman EY, Chan-Tin E. How Much Anonymity does Network Latency Leak?. ACM Transactions on Information and System Security [Internet]. 2010 :82 - 91. Available from: http://portal.acm.org/citation.cfm?id=1315245.1315257
2009
Herrmann D, Wendolsky R, Federrath H. Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier. In: Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09). Proceedings of the 2009 ACM workshop on Cloud computing security (CCSW '09). New York, NY, USA: ACM; 2009. pp. 31–42. Available from: http://portal.acm.org/citation.cfm?id=1655013&dl=GUIDE&coll=GUIDE&CFID=83763210&CFTOKEN=75697565
2007
Aguilar Melchor C, Deswarte Y, Iguchi-Cartigny J. Closed-Circuit Unobservable Voice Over IP. In: Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FL, USA. Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FL, USA. IEEE Computer Society Press; 2007. Available from: http://www.computer.org/portal/web/csdl/doi/10.1109/ACSAC.2007.34
Wiangsripanawan R, Susilo W, Safavi-Naini R. Design principles for low latency anonymous network systems secure against timing attacks. In: Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW '07). Proceedings of the fifth Australasian symposium on ACSW frontiers (ACSW '07). Darlinghurst, Australia, Australia: Australian Computer Society, Inc; 2007. pp. 183–191. Available from: http://portal.acm.org/citation.cfm?id=1274553
2006
Liberatore M, Levine BN. Inferring the Source of Encrypted HTTP Connections. In: Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006). Proceedings of the 13th ACM conference on Computer and Communications Security (CCS 2006). ACM New York, NY, USA; 2006. pp. 255–263. Available from: http://portal.acm.org/citation.cfm?id=1180437
2004
Dabek F, Li J, Sit E, Robertson J, Kaashoek FM, Morris R. Designing a DHT for Low Latency and High Throughput. In: NSDI'04 - Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation . NSDI'04 - Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation . San Francisco, CA, USA: USENIX Association; 2004. pp. 7–7. Available from: http://dl.acm.org/citation.cfm?id=1251175.1251182
2001
Back A, Möller U, Stiglic A. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems. In: Moskowitz IS Proceedings of Information Hiding Workshop (IH 2001). Proceedings of Information Hiding Workshop (IH 2001). Springer-Verlag, LNCS 2137; 2001. pp. 245–257. Available from: http://www.springerlink.com/content/4gpwtejkkvadcdcm/