Author:
Fu Xinwen,Graham Bryan,Xuan Dong,Bettati Riccardo,Zhao Wei
Publisher
Springer Berlin Heidelberg
Reference26 articles.
1. Chaum, D.L.: Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 24 (1981)
2. Serjantov, A., Sewell, P.: Passive attack analysis for connection-based anonymity systems. In: European Symposium on Research in Computer Security, ESORICS (2003)
3. Guan, Y., Fu, X., Xuan, D., Shenoy, P.U., Bettati, R., Zhao, W.: Netcamo: Camouflaging network traffic for qos-guaranteed critical allplications. IEEE Transactions on Systems, Man, and Cybernetics Part A: Systems and Humans, Special Issue on Information Assurance 31(4), 253–265 (2001)
4. Fu, X., Graham, B., Bettati, R., Zhao, W.: On effectiveness of link padding for statistical traffic analysis attacks. ICDCS (2003)
5. Dai, W.: Freedom attacks (1998), http://www.eskimo.com/weidai/freedom-attacks.txt
Cited by
3 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献