Title
Fundamental Limits of Invisible Flow Fingerprinting.
Abstract
Network flow fingerprinting can be used to de-anonymize communications on anonymity systems such as Tor by linking the ingress and egress segments of anonymized connections. Assume Alice and Bob have access to the input and the output links of an anonymous network, respectively, and they wish to collaboratively reveal the connections between the input and the output links without being detected by...
Year
DOI
Venue
2018
10.1109/TIFS.2019.2919870
IEEE Transactions on Information Forensics and Security
Keywords
Field
DocType
Watermarking,Delays,Computer security,Communication systems,Reliability
Flow network,Alice and Bob,Computer science,Network packet,Queue,Point process,Computer network,Fingerprint,Anonymity,Codebook
Journal
Volume
Issue
ISSN
15
1
1556-6013
Citations 
PageRank 
References 
1
0.36
23
Authors
4
Name
Order
Citations
PageRank
ramin soltani1384.44
Dennis Goeckel2106069.96
Don Towsley3186931951.05
Amir Houmansadr461442.27