Zobrazeno 1 - 7
of 7
pro vyhledávání: '"Holland, James K"'
While anonymity networks like Tor aim to protect the privacy of their users, they are vulnerable to traffic analysis attacks such as Website Fingerprinting (WF) and Flow Correlation (FC). Recent implementations of WF and FC attacks, such as Tik-Tok a
Externí odkaz:
http://arxiv.org/abs/2302.02012
Autor:
Holland, James K, Hopper, Nicholas
Website Fingerprinting (WF) attacks are used by local passive attackers to determine the destination of encrypted internet traffic by comparing the sequences of packets sent to and received by the user to a previously recorded data set. As a result,
Externí odkaz:
http://arxiv.org/abs/2012.06609
Akademický článek
Tento výsledek nelze pro nepřihlášené uživatele zobrazit.
K zobrazení výsledku je třeba se přihlásit.
K zobrazení výsledku je třeba se přihlásit.
Autor:
Holland, James K, Hopper, Nicholas
Publikováno v:
Proceedings on Privacy Enhancing Technologies. 2022:344-362
Website Fingerprinting (WF) attacks are used by local passive attackers to determine the destination of encrypted internet traffic by comparing the sequences of packets sent to and received by the user to a previously recorded data set. As a result,
Autor:
Holland, James K.
Publikováno v:
The Southwestern Historical Quarterly, 1926 Jul 01. 30(1), 1-33.
Externí odkaz:
https://www.jstor.org/stable/30237186
Publikováno v:
Journal of the Science of Food & Agriculture; Nov1997, Vol. 75 Issue 3, p391-400, 10p