On Flow Marking Attacks in Wireless Anonymous Communication Networks
暂无分享,去创建一个
Riccardo Bettati | Xinwen Fu | Wei Zhao | Ye Zhu | Bryan Graham | Wei Zhao | R. Bettati | Xinwen Fu | Ye Zhu | B. Graham
[1] Andrew Hintz,et al. Fingerprinting Websites Using Traffic Analysis , 2002, Privacy Enhancing Technologies.
[2] Charles E. Perkins,et al. Highly dynamic Destination-Sequenced Distance-Vector routing (DSDV) for mobile computers , 1994, SIGCOMM.
[3] Peter Palfrader,et al. Mixmaster protocol --- version 2 , 2000 .
[4] Roger Dingledine,et al. From a Trickle to a Flood: Active Attacks on Several Mix Types , 2002, Information Hiding.
[5] Donald F. Towsley,et al. Modeling TCP throughput: a simple model and its empirical validation , 1998, SIGCOMM '98.
[6] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[7] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[8] kc claffy,et al. Longitudinal study of Internet traffic in 1998-2003 , 2004 .
[9] Lili Qiu,et al. Statistical identification of encrypted Web browsing traffic , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[10] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[11] Riccardo Bettati,et al. Empirical and Theoretical Evaluation of Active Probing Attacks and Their Countermeasures , 2004, Information Hiding.
[12] Shigeo Abe DrEng. Pattern Classification , 2001, Springer London.
[13] David G. Stork,et al. Pattern Classification , 1973 .
[14] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[15] Mario Gerla,et al. A zone routing protocol for Bluetooth scatternets , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[16] Riccardo Bettati,et al. On Flow Correlation Attacks and Countermeasures in Mix Networks , 2004, Privacy Enhancing Technologies.
[17] R. Wilder,et al. Wide-area Internet traffic patterns and characteristics , 1997, IEEE Netw..
[18] Charles E. Perkins,et al. Ad-hoc on-demand distance vector routing , 1999, Proceedings WMCSA'99. Second IEEE Workshop on Mobile Computing Systems and Applications.
[19] Mark Carson,et al. NIST Net: a Linux-based network emulation tool , 2003, CCRV.
[20] LiuGeorge,et al. A class of mobile motion prediction algorithms for wireless mobile computing and communication , 1996 .
[21] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[22] Peter Sewell,et al. Passive Attack Analysis for Connection-Based Anonymity Systems , 2003, ESORICS.
[23] Theodore S. Rappaport,et al. Wireless position location: fundamentals, implementation strategies, and sources of error , 1997, 1997 IEEE 47th Vehicular Technology Conference. Technology in Motion.
[24] Stephen A. Dyer,et al. Digital signal processing , 2018, 8th International Multitopic Conference, 2004. Proceedings of INMIC 2004..
[25] Sung-Ju Lee,et al. Wireless Ad Hoc Multicast Routing with Mobility Prediction , 2001, Mob. Networks Appl..
[26] T. Hughes,et al. Signals and systems , 2006, Genome Biology.
[27] Micah Adler,et al. An Analysis of the Degradation of Anonymous Protocols , 2002, NDSS.
[28] Gene Tsudik,et al. Mixing E-mail with Babel , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[29] J. Broch,et al. Dynamic source routing in ad hoc wireless networks , 1998 .
[30] Matthew K. Wright,et al. Timing Attacks in Low-Latency Mix Systems (Extended Abstract) , 2004, Financial Cryptography.
[31] Fouad A. Tobagi,et al. Packet-level traffic measurements from a tier-1 ip backbone , 2001 .
[32] Micah Adler,et al. Defending anonymous communications against passive logging attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[33] Aleksandar Kuzmanovic,et al. Low-rate TCP-targeted denial of service attacks and counter strategies , 2003, IEEE/ACM Transactions on Networking.
[34] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[35] Dawn Xiaodong Song,et al. Timing Analysis of Keystrokes and Timing Attacks on SSH , 2001, USENIX Security Symposium.
[36] U Moeller,et al. Mixmaster Protocol Version 2 , 2004 .
[37] Robert C. Dixon,et al. Spread‐spectrum systems , 1976 .
[38] Anton Stiglic,et al. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.
[39] David A. Maltz,et al. Dynamic Source Routing in Ad Hoc Wireless Networks , 1994, Mobidata.
[40] Susan A. Murphy,et al. Monographs on statistics and applied probability , 1990 .
[41] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[42] Cem U. Saraydar,et al. Paging area optimization based on interval estimation in wireless personal communication networks , 2000, Mob. Networks Appl..
[43] Gerald Q. Maguire,et al. A class of mobile motion prediction algorithms for wireless mobile computing and communications , 1996, Mob. Networks Appl..
[44] Bernard W. Silverman,et al. Density Estimation for Statistics and Data Analysis , 1987 .
[45] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[46] Charles E. Perkins,et al. Highly Dynamic Destination-Sequenced Distance-Vector Routing (DSDV) for mobile computers , 1994, SIGCOMM.
[47] Jean Tourrilhes,et al. Co-link configuration: using wireless diversity for more than just connectivity , 2003, 2003 IEEE Wireless Communications and Networking, 2003. WCNC 2003..
[48] B. Silverman. Density estimation for statistics and data analysis , 1986 .
[49] Walter Willinger,et al. Self-similarity through high-variability: statistical analysis of Ethernet LAN traffic at the source level , 1997, TNET.