1. George Dean Bissias, Marc Liberatore, and Brian Neil Levine. Privacy vulnerabilities in encrypted HTTP streams. In Proceedings of the Privacy Enhancing Technologies workshop (PET 2005), May 2005.]]
2. Eoghan Casey. Digital Evidence and Computer Crime: Forensic Science, Computers and the Internet. Elsevier, 2nd edition, 2004.]]
3. Eoghan Casey. Network traffic as a source of evidence: tool strengths, weaknesses, and future needs. Journal of Digital Investigation, 1(1):28--43, 2004.]]
4. T. Dierks and C. Allen. RFC 2246: The TLS protocol version 1, January 1999.]]
5. Roger Dingledine, Nick Mathewson, and Paul Syverson. Challenges in deploying low-latency anonymity. http://tor.eff.org/cvs/tor/doc/design-paper/challenges.pdf.]]