Search Results

1 - 10 of 504 items :

  • "fingerprinting" x
Clear All

Security and Privacy, 2002. Proceedings. 2002 IEEE Symposium on , pages 19–30. IEEE, 2002. [6] Xun Gong, Negar Kiyavash, and Nikita Borisov. Fingerprinting websites using remote traffic analysis. In Proceedings of the 17th ACM conference on Computer and communications security , pages 684–686. ACM, 2010. [7] Martino Trevisan, Idilio Drago, Marco Mellia, and Maurizio M Munafo. Towards web service classification using addresses and dns. In Wireless Communications and Mobile Computing Conference (IWCMC), 2016 International , pages 38–43. IEEE, 2016. [8] Brad Miller, Ling

. Elices and F. Pérez-González. The flow fingerprinting game. In 2013 IEEE International Workshop on Information Forensics and Security, WIFS 2013, Guangzhou, China, November 18-21, 2013 , pages 97–102, 2013. [12] J. A. Elices and F. Pérez-González. A highly optimized flow-correlation attack. CoRR , abs/1310.4577, 2013. [13] B. F. U. Filho, R. D. Souza, C. Pimentel, and M. Jar. Convolutional codes under a minimal trellis complexity measure. IEEE Trans. Communications , 57(1):1–5, 2009. [14] G. Garrammone. On decoding complexity of reed-solomon codes on the packet

References [1] HTTP/2 specs. “ https://http2.github.io/ ”, 2015. (accessed: August, 2016). [2] X. Cai, R. Nithyanand, and R. Johnson. CS-BuFLO: A Congestion Sensitive Website Fingerprinting Defense. In Workshop on Privacy in the Electronic Society (WPES) , pages 121–130. ACM, 2014. [3] X. Cai, R. Nithyanand, and R. Johnson. Glove: A Bespoke Website Fingerprinting Defense. In Workshop on Privacy in the Electronic Society (WPES) , pages 131–134. ACM, 2014. [4] X. Cai, R. Nithyanand, T. Wang, R. Johnson, and I. Goldberg. A Systematic Approach to Developing and

never forgets: Persistent tracking mechanisms in the wild. In Proceedings of the 21st ACM SIGSAC Conference on Computer and Communications Security (CCS) , pages 674–689, 2014. [10] Gunes Acar, Marc Juarez, Nick Nikiforakis, Claudia Diaz, Seda Gürses, Frank Piessens, and Bart Preneel. FPDetective: dusting the web for fingerprinters. In Proceedings of the 2013 ACM SIGSAC conference on Computer and Communications Security (CCS) , pages 1129–1140, 2013. [11] Duncan Black, Robert Albert Newing, Iain McLean, Alistair McMillan, and Burt L Monroe. The theory of committees

Computer Science , 249:75–91, 2009. [4] X. Cai, R. Nithyanand, and R. Johnson. Cs-buflo: A congestion sensitive website fingerprinting defense. In Proceedings of the 13th Workshop on Privacy in the Electronic Society, WPES 2014, Scottsdale, AZ, USA, November 3, 2014 , pages 121–130, 2014. [5] X. Cai, R. Nithyanand, T. Wang, R. Johnson, and I. Goldberg. A systematic approach to developing and evaluating website fingerprinting defenses. In Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, Scottsdale, AZ, USA, November 3-7, 2014

conference on Mobile systems, applications, and services, pp. 97-110, ACM, 2013. [8] Apple, “Worldwide Developer’s Conference (WWDC) Keynote 2014.” http://devstreaming.apple.com/videos/wwdc/2014/101xx36lr6smzjo/101/101_hd.mov. [9] P. Eckersley, “How unique is your web browser?,” in Privacy Enhancing Technologies, pp. 1-18, Springer, 2010. [10] N. Nikiforakis, A. Kapravelos, W. Joosen, C. Kruegel, F. Piessens, and G. Vigna, “Cookieless monster: Exploring the ecosystem of web-based device fingerprinting,” in Security and Privacy (SP), 2013 IEEE Symposium on, pp. 541

References [1] C. Abdelberi, T. Chen, M. Cunche, E. D. Cristofaro, A. Friedman, and M. A. Kâafar. Censorship in the wild: Analyzing internet filtering in syria. In IMC , 2014. [2] K. Abe and S. Goto. Fingerprinting attack on Tor anonymity using deep learning. Proceedings of the Asia-Pacific Advanced Network , 42:15–20, 2016. [3] O. Berthold, A. Pfitzmann, and R. Standtke. The disadvantages of free MIX routes and how to overcome them. In International Workshop on Design Issues in Anonymity and Unobservability , 2000. [4] D. Bleichenbacher. Chosen ciphertext

Vanhoucke, Vijay Vasudevan, Fernanda B. Viégas, Oriol Vinyals, Pete Warden, Martin Wattenberg, Martin Wicke, Yuan Yu, and Xiaoqiang Zheng. TensorFlow: Large-Scale Machine Learning on Heterogeneous Systems. arXiv preprint arXiv:1603.04467 , 2015. [3] Kota Abe and Shigeki Goto. Fingerprinting Attack on Tor Anonymity using Deep Learning. In Proceedings of the Asia-Pacific Advanced Network Research Workshop , volume 42, pages 15–20, 2016. [4] George D. Bissias, Marc Liberatore, David Jensen, and Brian N. Levine. Privacy Vulnerabilities in Encrypted HTTP Streams. Privacy

. J Clin Microbiol. 1980;12:732-737. Khakhria R, Lior H. Extended phage typing scheme for C. jejuni and C. coli. Epidemiol Infect. 1992;108:403-414. Owen RJ, Hernandez J. Occurrence of plasmids in Campylobacters, Eur J Epidemiol. 1990;6:111-117. Owen RJ, Hernandez J. Ribotyping and arbitrary-primer PCR fingerprinting of campylobacters. Blackwell Scientific Publ.: Oxford, 1993. Fayos A, Owen RJ, Hernandez J. Ribosomal RNA gene restriction fragment diversity among Lior biotypes and Penner serotypes of C. jejuni and C. coli. FEMS Microbiol Letter. 1992

References [1] Anderson R., Manifavas C., Chameleon - A new kind of stream cipher, Lecture Notes in Computer Science, Fast Software Encryption, E. Biham, ed. Heidelberg, Springer-Verlag, 1997, pp. 107-113. [2] Barcz M., Review and analysis of fingerprinting methods for multicast distribution of video signals, Gdansk University of Technology, Faculty of Electronics, Telecommunications and Informatics, master thesis, 2009. [3] He S., Wu M., Joint Coding and Embedding Techniques for Multimedia Fingerprinting, IEEE Transactions on Information Forensics and Security