On the privacy of private browsing - A forensic approach
暂无分享,去创建一个
[1] Paul C. Kocher,et al. Timing Attacks on Implementations of Diffie-Hellman, RSA, DSS, and Other Systems , 1996, CRYPTO.
[2] Edward W. Felten,et al. Timing attacks on Web privacy , 2000, CCS.
[3] Kenneth G. Paterson,et al. Lucky Thirteen: Breaking the TLS and DTLS Record Protocols , 2013, 2013 IEEE Symposium on Security and Privacy.
[4] Dan Boneh,et al. Protecting browser state from web privacy attacks , 2006, WWW '06.
[5] Huwida Said,et al. Forensic analysis of private browsing artifacts , 2011, 2011 International Conference on Innovations in Information Technology.
[6] Sangjin Lee,et al. A recovery method of deleted record for SQLite database , 2011, Personal and Ubiquitous Computing.
[7] Erwin Kreyszig,et al. Introductory Mathematical Statistics. , 1970 .
[8] Pete Forster,et al. Time and date issues in forensic computing - a case study , 2004, Digit. Investig..
[9] Dan Boneh,et al. An Analysis of Private Browsing Modes in Modern Browsers , 2010, USENIX Security Symposium.
[10] Murilo Tito Pereira. Forensic analysis of the Firefox 3 Internet history and recovery of deleted SQLite records , 2009, Digit. Investig..
[11] ToreiniEhsan,et al. On the privacy of private browsing - A forensic approach , 2014, WISA 2014.
[12] Shriram Krishnamurthi,et al. Verifying Web Browser Extensions' Compliance with Private-Browsing Mode , 2013, ESORICS.
[13] Peter Eckersley,et al. How Unique Is Your Web Browser? , 2010, Privacy Enhancing Technologies.
[14] Antonio Ruiz-Martínez,et al. A survey on solutions and main free tools for privacy enhancing Web communications , 2012, J. Netw. Comput. Appl..