Statistical identification of encrypted web browsing traffic (2002)

Cached

Download Links

by Qixiang Sun , Daniel R. Simon , Yi-Min Wang , Wilf Russell , Venkata N. Padmanabhan , Lili Qiu
Venue:IEEE Symposium on Security and Privacy
Citations:95 - 0 self

Active Bibliography

Anonymity in Wireless Broadcast Networks – Matt Blaze, John Ioannidis, Angelos D. Keromytis, Tal Malkin, Avi Rubin
69 Passive Attack Analysis for Connection-Based Anonymity Systems – Andrei Serjantov, Peter Sewell - 2003
43 Network Flow Watermarking Attack on Low-Latency Anonymous Communication Systems – Xinyuan Wang, Shiping Chen, Sushil Jajodia
46 The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems – Matthew K. Wright, Micah Adler, Brian Neil Levine, Clay Shields - 2004
Anonymous Communication in Multi Hop Wireless Networks – Volker Fusenig, Dagmara Spiewak, Thomas Engel
3 A k-Anonymous Communication Protocol for Overlay Networks – Pan Wang - 2007
“IPLess” Stochastic Anonymous Routing Algorithm Using Multi-Agent Systems – Magdy Saeb, Meer Hamza, Ahmed El-Shikh - 2007
17 On anonymity in an electronic society: A survey of anonymous communication systems – Matthew Edman, Bülent Yener
90 An Analysis of the Degradation of Anonymous Protocols – Matthew Wright, Micah Adler, Brian N. Levine, Clay Shields - 2001
19 Traffic Analysis of the HTTP Protocol over TLS – George Danezis
219 Mixminion: Design of a Type III Anonymous Remailer Protocol – George Danezis, Roger Dingledine, David Hopwood, Nick Mathewson - 2003
17 Metrics for Traffic Analysis Prevention – Richard E. Newman, Ira S. Moskowitz, Paul Syverson, Andrei Serjantov - 2003
1 On the effectiveness of low latency anonymous network in the presence of timing attack – Jing Jin, Xinyuan Wang - 2009
1 Embedding Covert Information Flow – Stefano Marano, Vincenzo Matta, Lang Tong
3 Slotted Packet Counting Attacks on Anonymity Protocols – Volker Fusenig, Eugen Staab, Uli Sorger, Thomas Engel
2 Collaborative attack on Internet users ’ anonymity – Rami Puzis, Dana Yagil, Yuval Elovici, Dan Braha - 2008
1 Covert channel vulnerabilities in anonymity systems – Steven J. Murdoch, C Steven J. Murdoch, Steven J. Murdoch - 2007
2 Design, Implementation, and Analysis of an Anonymity Network for Web Browsing – Marc Rennhard, Sandro Rafaeli, Laurent Mathy
Hide and Seek: Provable Anonymity in Computer Networks – Ron Berman - 2003