Inferring the source of encrypted HTTP connections
- 30 October 2006
- conference paper
- conference paper
- Published by Association for Computing Machinery (ACM)
- p. 255-263
- https://doi.org/10.1145/1180405.1180437
Abstract
No abstract availableKeywords
This publication has 7 references indexed in Scilit:
- Privacy Vulnerabilities in Encrypted HTTP StreamsLecture Notes in Computer Science, 2006
- Network traffic as a source of evidence: tool strengths, weaknesses, and future needsDigital Investigation, 2004
- Timing Attacks in Low-Latency Mix SystemsLecture Notes in Computer Science, 2004
- Tor: The Second-Generation Onion RouterPublished by Defense Technical Information Center (DTIC) ,2004
- Analytical and empirical analysis of countermeasures to traffic analysis attacksPublished by Institute of Electrical and Electronics Engineers (IEEE) ,2003
- Towards an Analysis of Onion Routing SecurityPublished by Springer Science and Business Media LLC ,2001
- The TLS Protocol Version 1.01999