1. [1] R. Archibald and D. Ghosal. A covert timing channel based on fountain codes. In International Conference on Trust, Security and Privacy in Computing and Communications, pages 970–977, 2012.
2. [2] A. Back, U. Möller, and A. Stiglic. Traffic analysis attacks and trade-offs in anonymity providing systems. In Information Hiding, 4th International Workshop, IHW 2001, Pittsburgh, PA, USA, April 25-27, 2001, Proceedings, pages 245–257, 2001.
3. [3] B. A. Bash, D. Goeckel, D. Towsley, and S. Guha. Hiding information in noise: Fundamental limits of covert wireless communication. IEEE Communications Magazine, 53(12):26–31, 2015.
4. [4] A. C. Bavier, M. Bowman, B. N. Chun, D. E. Culler, S. Karlin, S. Muir, L. L. Peterson, T. Roscoe, T. Spalink, and M. Wawrzoniak. Operating systems support for planetary-scale network services. In 1st Symposium on Networked Systems Design and Implementation (NSDI 2004), March 29-31, 2004, San Francisco, California, USA, Proceedings, pages 253–266, 2004.
5. [5] A. Blum, D. X. Song, and S. Venkataraman. Detection of interactive stepping stones: Algorithms and confidence bounds. In Recent Advances in Intrusion Detection: 7th International Symposium, RAID 2004, Sophia Antipolis, France, September 15-17, 2004. Proceedings, pages 258–277, 2004.