Author:
Gong Xun,Borisov Nikita,Kiyavash Negar,Schear Nabil
Publisher
Springer Berlin Heidelberg
Reference35 articles.
1. Akella, A., Seshan, S., Shaikh, A.: An empirical evaluation of wide-area Internet bottlenecks. In: Crovella, M. (ed.) 3rd ACM SIGCOMM Conference on Internet Measurement, pp. 101–114. ACM, New York (2003),
http://dl.acm.org/citation.cfm?id=948205.948219
2. Lecture Notes in Computer Science;G.D. Bissias,2006
3. Chakravarty, S., Stavrou, A., Keromytis, A.D.: Identifying proxy nodes in a Tor anonymization circuit. In: Dipanda, A., Chbeir, R., Yetongnon, K. (eds.) IEEE International Conference on Signal Image Technology and Internet Based Systems, pp. 633–639. IEEE Computer Society, Los Alamitos (2008)
4. Chen, S., Wang, R., Wang, X., Zhang, K.: Side-Channel Leaks in Web Applications: A Reality Today, a Challenge Tomorrow. In: Evans, D., Vigna, G. (eds.) IEEE Symposium on Security and Privacy, pp. 191–206. IEEE Computer Society (May 2010),
http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=5504714
5. Cheng, H., Avnur, R.: Traffic Analysis of SSL Encrypted Web Browsing (1998),
http://www.cs.berkeley.edu/~daw/teaching/cs261-f98/projects/final-reports/ronathan-heyning.ps
Cited by
28 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献
1. WebTracker: Real Webbrowsing Behaviors;2023 Silicon Valley Cybersecurity Conference (SVCC);2023-05-17
2. There's always a bigger fish;Proceedings of the 49th Annual International Symposium on Computer Architecture;2022-06-11
3. On Fingerprinting Attacks and Length-Hiding Encryption;Topics in Cryptology – CT-RSA 2022;2022
4. On Account Association with Assistance from Mobile Networks;IEEE Transactions on Dependable and Secure Computing;2022
5. snWF: Website Fingerprinting Attack by Ensembling the Snapshot of Deep Learning;IEEE Transactions on Information Forensics and Security;2022