Abstract | ||
---|---|---|
Network flow fingerprinting can be used to de-anonymize communications on anonymity systems such as Tor by linking the ingress and egress segments of anonymized connections. Assume Alice and Bob have access to the input and the output links of an anonymous network, respectively, and they wish to collaboratively reveal the connections between the input and the output links without being detected by... |
Year | DOI | Venue |
---|---|---|
2018 | 10.1109/TIFS.2019.2919870 | IEEE Transactions on Information Forensics and Security |
Keywords | Field | DocType |
Watermarking,Delays,Computer security,Communication systems,Reliability | Flow network,Alice and Bob,Computer science,Network packet,Queue,Point process,Computer network,Fingerprint,Anonymity,Codebook | Journal |
Volume | Issue | ISSN |
15 | 1 | 1556-6013 |
Citations | PageRank | References |
1 | 0.36 | 23 |
Authors | ||
4 |
Name | Order | Citations | PageRank |
---|---|---|---|
ramin soltani | 1 | 38 | 4.44 |
Dennis Goeckel | 2 | 1060 | 69.96 |
Don Towsley | 3 | 18693 | 1951.05 |
Amir Houmansadr | 4 | 614 | 42.27 |