Smart home: Keeping privacy based on Air-Padding
暂无分享,去创建一个
Jianfeng Ma | Yu Zheng | Junwei Zhang | Hui Li | Chao Yang | Quanlong Zhu | Jiajie Shao
[1] Riccardo Bettati,et al. Analytical and empirical analysis of countermeasures to traffic analysis attacks , 2003, 2003 International Conference on Parallel Processing, 2003. Proceedings..
[2] Andrzej Duda,et al. Markov chain fingerprinting to classify encrypted traffic , 2014, IEEE INFOCOM 2014 - IEEE Conference on Computer Communications.
[3] Ran Dubin,et al. I Know What You Saw Last Minute—Encrypted HTTP Adaptive Video Streaming Title Classification , 2016, IEEE Transactions on Information Forensics and Security.
[4] Nick Feamster,et al. Keeping the Smart Home Private with Smart(er) IoT Traffic Shaping , 2018, Proc. Priv. Enhancing Technol..
[5] Karl N. Levitt,et al. Is Anybody Home? Inferring Activity From Smart Home Network Traffic , 2016, 2016 IEEE Security and Privacy Workshops (SPW).
[6] Yong Liao,et al. SAMPLES: Self Adaptive Mining of Persistent LExical Snippets for Classifying Mobile Application Traffic , 2015, MobiCom.
[7] Wei Wang,et al. Dependent link padding algorithms for low latency anonymity systems , 2008, CCS.
[8] Shingo Ata,et al. Identification of communication devices from analysis of traffic patterns , 2017, 2017 13th International Conference on Network and Service Management (CNSM).
[9] Thomas Ristenpart,et al. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail , 2012, 2012 IEEE Symposium on Security and Privacy.
[10] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[11] Narseo Vallina-Rodriguez,et al. An Analysis of the Privacy and Security Risks of Android VPN Permission-enabled Apps , 2016, Internet Measurement Conference.
[12] Richard Chow,et al. The Last Mile for IoT Privacy , 2017, IEEE Security & Privacy.
[13] Jiu-Ru Wang,et al. A research of fine-grained encryption method for IoT , 2012 .
[14] Hwajeong Seo,et al. ZigBee security for Home automation using attribute-based cryptography , 2011, 2011 IEEE International Conference on Consumer Electronics (ICCE).
[15] Sanjay Kumar Jena,et al. WDTF: A Technique for Wireless Device Type Fingerprinting , 2017, Wirel. Pers. Commun..
[16] Ahmad-Reza Sadeghi,et al. IoT SENTINEL: Automated Device-Type Identification for Security Enforcement in IoT , 2016, 2017 IEEE 37th International Conference on Distributed Computing Systems (ICDCS).
[17] Yong Ho Hwang. IoT Security & Privacy: Threats and Challenges , 2015, IoTPTS@AsiaCCS.
[18] Hui Liu,et al. Smart Solution, Poor Protection: An Empirical Study of Security and Privacy Issues in Developing and Deploying Smart Home Devices , 2017, IoT S&P@CCS.
[19] Claudio Soriente,et al. User Profiling in the Time of HTTPS , 2016, Internet Measurement Conference.
[20] Nino Vincenzo Verde,et al. Analyzing Android Encrypted Network Traffic to Identify User Actions , 2016, IEEE Transactions on Information Forensics and Security.
[21] Bernardo A. Huberman,et al. Ensuring Trust and Security in the Industrial IoT , 2016, Ubiquity.
[22] Jasleen Kaur,et al. Can Android Applications Be Identified Using Only TCP/IP Headers of Their Launch Time Traffic? , 2016, WISEC.
[23] Nick Feamster,et al. A Developer-Friendly Library for Smart Home IoT Privacy-Preserving Traffic Obfuscation , 2018, IoT S&P@SIGCOMM.
[24] Marc Joye,et al. Privacy and security: Key requirements for sustainable IoT growth , 2017, 2017 Symposium on VLSI Technology.