1. Correlation-Based Traffic Analysis Attacks on Anonymity Networks
2. DSSS-based flow marking technique for invisible traceback;Yu,2007
3. Delay normalization method of defending against timing-based attacks on anonymous communication systems;Fu;J. Southeast Univ., Nat. Sci. Ed,2009
4. Network Flow Watermarking: A Survey
5. Long PN code based DSSS watermarking;Huang,2011