Hot or not: revealing hidden services by their clock skew
暂无分享,去创建一个
[1] Roger M. Needham,et al. Denial of service , 1993, CCS '93.
[2] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[3] Riccardo Bettati,et al. On Flow Marking Attacks in Wireless Anonymous Communication Networks , 2005, 25th IEEE International Conference on Distributed Computing Systems (ICDCS'05).
[4] Roger Dingledine,et al. On the Economics of Anonymity , 2003, Financial Cryptography.
[5] Ian Goldberg,et al. A pseudonymous communications infrastructure for the internet , 2000 .
[6] Birgit Pfitzmann,et al. ISDN-MIXes: Untraceable Communication with Small Bandwidth Overhead , 1991, Kommunikation in Verteilten Systemen.
[7] Hannes Federrath,et al. Web MIXes: A System for Anonymous and Unobservable Internet Access , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[8] Wei-Ming Hu,et al. Lattice scheduling and covert channels , 1992, Proceedings 1992 IEEE Computer Society Symposium on Research in Security and Privacy.
[9] Butler W. Lampson,et al. A note on the confinement problem , 1973, CACM.
[10] Van Jacobson,et al. TCP Extensions for High Performance , 1992, RFC.
[11] Roger M. Needham,et al. Denial of service: an example , 1994, CACM.
[12] Paul Syverson,et al. Quasi-Anonymous Channels , 2003 .
[13] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[14] David L. Mills,et al. Network Time Protocol (Version 3) Specification, Implementation , 1992 .
[15] Jim Alves-Foss,et al. A multi-layered approach to security in high assurance systems , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[16] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[17] Adam Stubblefield,et al. Using Client Puzzles to Protect TLS , 2001, USENIX Security Symposium.
[18] T. Kohno,et al. Remote physical device fingerprinting , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[19] Donald F. Towsley,et al. Estimation and removal of clock skew from network delay measurements , 1999, IEEE INFOCOM '99. Conference on Computer Communications. Proceedings. Eighteenth Annual Joint Conference of the IEEE Computer and Communications Societies. The Future is Now (Cat. No.99CH36320).
[20] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[21] P. V. Oorschot,et al. Internet Geolocation and Evasion , 2006 .
[22] L.,et al. SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .
[23] David L. Mills,et al. Network Time Protocol (Version 3) Specification, Implementation and Analysis , 1992, RFC.
[24] Steven J. Murdoch,et al. Embedding Covert Channels into TCP/IP , 2005, Information Hiding.
[25] Wei-Ming Hu. Reducing Timing Channels with Fuzzy Time , 1992, J. Comput. Secur..
[26] Jon Postel,et al. Internet Control Message Protocol , 1981, RFC.
[27] Ira S. Moskowitz,et al. Anonymity and Covert Channels in Simple Timed Mix-Firewalls , 2004, Privacy Enhancing Technologies.
[28] Paul A. Karger,et al. Storage channels in disk arm optimization , 1991, Proceedings. 1991 IEEE Computer Society Symposium on Research in Security and Privacy.
[29] Ira S. Moskowitz,et al. Covert channels and anonymizing networks , 2003, WPES '03.