How much anonymity does network latency leak?
暂无分享,去创建一个
Nicholas Hopper | Eugene Y. Vasserman | Eric Chan-Tin | N. Hopper | E. Chan-Tin | Nicholas Hopper | Eric Chan-Tin
[1] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[2] Jarkko Oikarinen,et al. Internet Relay Chat Protocol , 1993, RFC.
[3] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[4] Dogan Kesdogan,et al. Stop-and-Go-MIXes Providing Probabilistic Anonymity in an Open System , 1998, Information Hiding.
[5] M. Handley,et al. SIP: Session Initiation Protocol , 1999, RFC.
[6] Gene Tsudik,et al. Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[7] Anton Stiglic,et al. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.
[8] Andrew Hintz,et al. Fingerprinting Websites Using Traffic Analysis , 2002, Privacy Enhancing Technologies.
[9] Krishna P. Gummadi,et al. King: estimating latency between arbitrary internet end hosts , 2002, IMW '02.
[10] Bernhard Plattner,et al. Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.
[11] David Wetherall,et al. Scriptroute: A Public Internet Measurement Facility , 2003, USENIX Symposium on Internet Technologies and Systems.
[12] G Danezis,et al. Statistical disclosure attacks: Traffic confirmation in open environments , 2003 .
[13] Micah Adler,et al. Defending anonymous communications against passive logging attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[14] Claudia Díaz,et al. Generalising Mixes , 2003, International Symposium on Privacy Enhancing Technologies.
[15] Peter Sewell,et al. Passive Attack Analysis for Connection-Based Anonymity Systems , 2003, ESORICS.
[16] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[17] David E. Culler,et al. PlanetLab: an overlay testbed for broad-coverage services , 2003, CCRV.
[18] Kevin Jeffay,et al. Variability in TCP round-trip times , 2003, IMC '03.
[19] Hui Zhang,et al. A Network Positioning System for the Internet , 2004, USENIX Annual Technical Conference, General Track.
[20] Miguel Castro,et al. PIC: practical Internet coordinates for distance estimation , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[21] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[22] Robert Tappan Morris,et al. Vivaldi: a decentralized network coordinate system , 2004, SIGCOMM '04.
[23] Nick Mathewson,et al. Practical Traffic Analysis: Extending and Resisting Statistical Disclosure , 2004, Privacy Enhancing Technologies.
[24] Dawn Xiaodong Song,et al. Detection of Interactive Stepping Stones: Algorithms and Confidence Bounds , 2004, RAID.
[25] George Danezis,et al. Low-cost traffic analysis of Tor , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[26] Ravi Sandhu,et al. ACM Transactions on Information and System Security: Editorial , 2005 .
[27] Emin Gün Sirer,et al. Geolocalization on the Internet through Constraint Satisfaction , 2006, WORLDS.
[28] Paul F. Syverson,et al. Locating hidden servers , 2006, 2006 IEEE Symposium on Security and Privacy (S&P'06).
[29] Steven J. Murdoch,et al. Hot or not: revealing hidden services by their clock skew , 2006, CCS '06.
[30] Tom Fawcett,et al. An introduction to ROC analysis , 2006, Pattern Recognit. Lett..
[31] Serge Fdida,et al. Constraint-Based Geolocation of Internet Hosts , 2004, IEEE/ACM Transactions on Networking.
[32] Margo I. Seltzer,et al. Network Coordinates in the Wild , 2007, NSDI.