Metrics for Traffic Analysis Prevention
暂无分享,去创建一个
[1] Claude E. Shannon,et al. Communication theory of secrecy systems , 1949, Bell Syst. Tech. J..
[2] William Stallings,et al. Data and Computer Communications , 1985 .
[3] Richard E. Newman,et al. High level prevention of traffic analysis , 1991, Proceedings Seventh Annual Computer Security Applications Conference.
[4] Richard E. Newman,et al. Performance analysis of a method for high level prevention of traffic analysis , 1992, [1992] Proceedings Eighth Annual Computer Security Application Conference.
[5] Daniel R. Simon,et al. Cryptographic defense against traffic analysis , 1993, STOC.
[6] Richard E. Newman,et al. Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network , 1994, Tenth Annual Computer Security Applications Conference.
[7] Richard E. Newman,et al. Capacity estimation and auditability of network covert channels , 1995, Proceedings 1995 IEEE Symposium on Security and Privacy.
[8] Paul F. Syverson,et al. Hiding Routing Information , 1996, Information Hiding.
[9] Fred Halsall,et al. Data communications, computer networks and open systems (3. ed.) , 1995, Electronic-systems engineering series.
[10] Ira S. Moskowitz,et al. A Network Pump , 1996, IEEE Trans. Software Eng..
[11] Roch Guérin,et al. Efficient network QoS provisioning based on per node traffic shaping , 1996, TNET.
[12] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[13] Paul F. Syverson,et al. Group Principals and the Formalization of Anonymity , 1999, World Congress on Formal Methods.
[14] Gene Tsudik,et al. Towards an Analysis of Onion Routing Security , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[15] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[16] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[17] Anton Stiglic,et al. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.
[18] Bart Preneel,et al. Towards Measuring Anonymity , 2002, Privacy Enhancing Technologies.
[19] George Danezis,et al. Towards an Information Theoretic Metric for Anonymity , 2002, Privacy Enhancing Technologies.
[20] Oliver Berthold,et al. Dummy Traffic against Long Term Intersection Attacks , 2002, Privacy Enhancing Technologies.