SEARCH

SEARCH BY CITATION

REFERENCES

  • 1
    Ling Z, Luo J, Yu W, Fu X, Xuan D, Jia W. A new cell counter based attack against tor. In Proceedings of 16th ACM Conference on Computer and Communications Security (CCS), 2009.
  • 2
    Wang X, Chen S, Jajodia S. Network flow watermarking attack on low-latency anonymous communication systems. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P), May 2007.
  • 3
    Hopper N, Vasserman E, Chan-Tin D. How much anonymity does network latency leak?. In Proceedings of the 14th ACM Conference on Computer and Communications Security (CCS), 2007.
  • 4
    Murdoch SJ, Danezis G. Low-cost traffic analysis of tor. In Proceedings of the IEEE Security and Privacy Symposium (S&P), May 2006.
  • 5
    Overlier L, Syverson P. Locating hidden servers. In Proceedings of the IEEE Security and Privacy Symposium (S&P), May 2006.
  • 6
    Murdoch SJ. Hot or not: revealing hidden services by their clock skew. In Proceedings of the 13th ACM Conference on Computer and Communications Security (CCS), 2006.
  • 7
    Yu W, Fu X, Graham S, Xuan D, Zhao W. DSSS-based flow marking technique for invisible traceback. In Proceedings of the 2007 IEEE Symposium on Security and Privacy (S&P), May 2007.
  • 8
    Kiyavash N, Houmansadr A, Borisov N. Multi-flow attacks against network flow watermarking schemes. In Proceedings of USENIX Security, 2008.
  • 9
    Chaum D. Untraceable electronic mail, return addresses, and digital pseudonyms. Communications of the ACM 1981; 4(2).
  • 10
    Dingledine R, Mathewson N, Syverson P. Tor: the second-generation onion router. In Proceedings of the 13th USENIX Security Symposium, August 2004.
  • 11
    Danezis G, Dingledine R, Mathewson N. Mixminion: design of a type III anonymous remailer protocol. In Proceedings of the 2003 IEEE Symposium on Security and Privacy (S&P), May 2003.
  • 12
    Zhu Y, Fu X, Graham B, Bettati R, Zhao W. On flow correlation attacks and countermeasures in mix networks. In Proceedings of Workshop on Privacy Enhancing Technologies (PET), May 2004.
  • 13
    Levine BN, Reiter MK, Wang C, Wright M. Timing attacks in low-latency mix-based systems. In Proceedings of Financial Cryptography (FC), February 2004.
  • 14
    Fu X, Zhu Y, Graham B, Bettati R, Zhao W. On flow marking attacks in wireless anonymous communication networks. In Proceedings of the IEEE International Conference on Distributed Computing Systems (ICDCS), April 2005.
  • 15
    Wang X, Reeves DS, Wu SF, Yuill J. Sleepy watermark tracing: an active network-based intrusion response framework. In Proceedings of 16th International Conference on Information Security (IFIP/Sec), June 2001.
  • 16
    Wang X, Reeves DS. Robust correlation of encrypted attack traffic through stepping stones by manipulation of inter-packet delays. In Proceedings of the 2003 ACM Conference on Computer and Communications Security (CCS), November 2003.
  • 17
    Wang X, Chen S, Jajodia S. Tracking anonymous peer-to-peer voip calls on the internet. In Proceedings of the 12th ACM Conference on Computer Communications Security (CCS), November 2005.
  • 18
    Peng P, Ning P, Reeves DS. On the secrecy of timing-based active watermarking trace-back techniques. In Proceedings of the IEEE Security and Privacy Symposium (S&P), May 2006.
  • 19
    June Pyun Y, Hee Park Y, Wang X, Reeves DS, Ning P. Tracing traffic through intermediate hosts that repacketize flows. In Proceedings of IEEE INFOCOM, May 2007.
  • 20
    Wong TF. Spread spectrum and code division multiple access. http://wireless.ece.ufl.edu/twong/notes1.html, August 2000.
  • 21
    ir. Meel J. Spread spectrum (SS)—introduction, http://www.sss-mag.com/pdf/Ss_jme_denayer_intro_print.pdf, 1999.
  • 22
    Oppenheim AV, Willsky AS, Nawab SH. Signals and systems, Prentice-Hall, Upper Saddle River, NJ 07458, USA, second edition, 1997.
  • 23
    Fu X, Yu W, Jiang S, Graham S, Guan Y. Tcp performance in flow-based mix networks: modeling and analysis. IEEE Transactions on Parallel and Distributed Systems (TPDS) 2009; 20(5).