Affiliation:
1. Institute of Information Engineering; Chinese Academy of Sciences; Minzhuang Road #89, Haidian Beijing China
Funder
Strategic Priority Research Program of the Chinese Academy of Sciences
Subject
Computational Theory and Mathematics,Computer Networks and Communications,Computer Science Applications,Theoretical Computer Science,Software
Reference19 articles.
1. Hjelmvik E John W Breaking and improving protocol obfuscation 2010
2. An overview of network evasion methods;Hernacki;Information Security Technical Report,2005
3. Houmansadr A Riedl T Borisov N Singer A I want my voice to be heard: IP over voice-over-IP for unobservable censorship circumvention Proceedings of the 20th Annual Network & Distributed System Security Symposium (NDSS) San Diego, CA 2013 1 17
4. Brumley BB Valkonen J Attacks on message stream encryption
5. Dyer KP Coull SE Ristenpart T Shrimpton T Protocol misidentification made easy with format-transforming encryption Proceedings of the ACM Conference on Computer and Communications Security ACM, Berlin, Germany 2013 61 72
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献