Statistical identification of encrypted web browsing traffic (2002)

Cached

Download Links

by Qixiang Sun , Daniel R. Simon , Yi-Min Wang , Wilf Russell , Venkata N. Padmanabhan , Lili Qiu
Venue:IEEE Symposium on Security and Privacy
Citations:94 - 0 self

Documents Related by Co-Citation

72 Fingerprinting websites using traffic analysis – Andrew Hintz - 2002
769 Tor: The Second-Generation Onion Router – Roger Dingledine, Nick Mathewson, Paul Syverson - 2004
125 Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems – Jean-François Raymond - 2001
1191 Untraceable electronic mail, return addresses, and digital pseudonyms – David Chaum, Communications Of The Acm, R. Rivest, David L. Chaum - 1981
299 Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer – Michael J. Freedman, Emil Sit, Josh Cates, Robert Morris - 2002
52 Inferring the source of encrypted HTTP connections – M Liberatore, B N Levine - 2006
147 Low-Cost Traffic Analysis Of Tor – Steven J. Murdoch, George Danezis - 2005
658 Crowds: Anonymity for Web Transactions – Michael K. Reiter, Aviel D. Rubin - 1997
87 Prefix-Preserving IP Address Anonymization: Measurement-based Security Evaluation and a New Cryptography-based Scheme – Jun Xu, Jinliang Fan, Mostafa H. Ammar, Sue B. Moon - 2002
47 On Inferring Application Protocol Behaviors in Encrypted Network Traffic – Charles V. Wright, Fabian Monrose, Gerald M. Masson, Philip Chan - 2006
238 Anonymous connections and onion routing – Paul F. Syverson, David M. Goldschlag, Michael G. Reed - 1997
21 On the Privacy Risks of Publishing Anonymized IP Network Traces – D. Koukis, S. Antonatos, K. G. Anagnostakis - 2006
77 Defending Anonymous Communications Against Passive Logging Attacks – Matthew Wright, Micah Adler, Brian Neil Levine, Clay Shields - 2003
20 Timing Analysis of Keystrokes and SSH Timing Attacks", Paper given at – X D Song, D Wagner, X Tian
8 Improved noise weighting in CELP coding of speech - applying the Vorbis psychoacoustic model to Speex – J-M Valin, C Montgomery - 2006
11 Code-excited linear prediction(CELP): High-quality speech at very low bit rates – M Schroeder, B Atal - 1985
24 The Secure Real-Time Transport Protocol (SRTP) – M. Baugher, D. McGrew, M. Naslund, E. Carrara, K. Norrman - 2004
64 Tracking anonymous peer-to-peer VoIP calls on the internet – X Wang, S Chen, S Jajodia - 2005
81 Timing Analysis of Keystrokes and Timing Attacks on SSH – Dawn Xiaodong Song, David Wagner, Song David, Xuqing Tian - 2001