Dependent link padding algorithms for low latency anonymity systems
暂无分享,去创建一个
[1] Sergio Verdú,et al. Bits through queues , 1994, Proceedings of 1994 IEEE International Symposium on Information Theory.
[2] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[3] Vitaly Shmatikov,et al. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses , 2006, ESORICS.
[4] Birgit Pfitzmann,et al. ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.
[5] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[6] Vincent Hodgson,et al. The Single Server Queue. , 1972 .
[7] Nicholas Hopper,et al. How much anonymity does network latency leak? , 2007, TSEC.
[8] Lang Tong,et al. Anonymous Networking with Minimum Latency in Multihop Networks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[9] Peter Sewell,et al. Passive-attack analysis for connection-based anonymity systems , 2004, International Journal of Information Security.
[10] Sushil Jajodia,et al. Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.
[11] Lang Tong,et al. Anonymous Networking Amidst Eavesdroppers , 2008, IEEE Transactions on Information Theory.
[12] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[13] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[14] Gaston H. Gonnet,et al. Expected Length of the Longest Probe Sequence in Hash Code Searching , 1981, JACM.
[15] Riccardo Bettati,et al. On effectiveness of link padding for statistical traffic analysis attacks , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[16] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[17] Steven J. Murdoch,et al. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.
[18] I. Miller. Probability, Random Variables, and Stochastic Processes , 1966 .
[19] George Danezis,et al. The Traffic Analysis of Continuous-Time Mixes , 2004, Privacy Enhancing Technologies.
[20] Béla Bollobás,et al. Modern Graph Theory , 2002, Graduate Texts in Mathematics.
[21] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[22] Sushil Jajodia,et al. Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[23] Lang Tong,et al. Detecting Information Flows: Improving Chaff Tolerance by Joint Detection , 2007, 2007 41st Annual Conference on Information Sciences and Systems.
[24] Michael Mitzenmacher,et al. The Power of Two Choices in Randomized Load Balancing , 2001, IEEE Trans. Parallel Distributed Syst..
[25] Lang Tong,et al. Relay Secrecy in Wireless Networks with Eavesdroppers , 2006 .
[26] Azer Bestavros,et al. Self-similarity in World Wide Web traffic: evidence and possible causes , 1996, SIGMETRICS '96.
[27] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[28] Athanasios Papoulis,et al. Probability, Random Variables and Stochastic Processes , 1965 .
[29] Dawn Xiaodong Song,et al. Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds , 2004, RAID.
[30] Bruno O. Shubert,et al. Random variables and stochastic processes , 1979 .