Language Modeling and Encryption on Packet Switched Networks
暂无分享,去创建一个
[1] Richard J. Lipton,et al. On the Importance of Checking Cryptographic Protocols for Faults (Extended Abstract) , 1997, EUROCRYPT.
[2] D. Richard Kuhn,et al. Challenges in securing voice over IP , 2005, IEEE Security & Privacy Magazine.
[3] Oded Goldreich,et al. A uniform-complexity treatment of encryption and zero-knowledge , 1993, Journal of Cryptology.
[4] Silvio Micali,et al. Physically Observable Cryptography (Extended Abstract) , 2004, Theory of Cryptography Conference.
[5] Charles V. Wright,et al. HMM profiles for network traffic classification , 2004, VizSEC/DMSEC '04.
[6] K. Leuven,et al. Introducing Traffic Analysis Attacks , Defences and Public Policy Issues . . . ( Invited Talk ) , 2005 .
[7] Steven M. Bellovin,et al. Probable plaintext cryptanalysis of the IP security protocols , 1997, Proceedings of SNDSS '97: Internet Society 1997 Symposium on Network and Distributed System Security.
[8] Gilles Brassard,et al. Experimental Quantum Cryptography , 1990, EUROCRYPT.
[9] Eyal Kushilevitz,et al. Secret sharing over infinite domains , 1993, Journal of Cryptology.
[10] Sang Joon Kim,et al. A Mathematical Theory of Communication , 2006 .
[11] Silvio Micali,et al. Physically Observable Cryptography (Extended Abstract) , 2004, TCC.
[12] Stephen T. Kent,et al. Security Mechanisms in High-Level Network Protocols , 1983, CSUR.
[13] Paul C. Kocher,et al. Differential Power Analysis , 1999, CRYPTO.
[14] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[15] Yin Zhang,et al. Detecting Stepping Stones , 2000, USENIX Security Symposium.
[16] Eli Biham,et al. Differential Fault Analysis of Secret Key Cryptosystems , 1997, CRYPTO.
[17] Mark E. J. Newman,et al. The Structure and Function of Complex Networks , 2003, SIAM Rev..
[18] Whitfield Diffie,et al. New Directions in Cryptography , 1976, IEEE Trans. Inf. Theory.
[19] George Danezis,et al. Introducing Traffic Analysis , 2007 .
[20] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[21] Silvio Micali,et al. Probabilistic Encryption , 1984, J. Comput. Syst. Sci..
[22] Andrew W. Moore,et al. Internet traffic classification using bayesian analysis techniques , 2005, SIGMETRICS '05.
[23] Eyal Kushilevitz,et al. Secret Sharing Over Infinite Domains (Extended Abstract) , 1989, CRYPTO.
[24] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[25] G. Danezis. Traffic Analysis of the HTTP Protocol over TLS , .