Sciweavers

32 search results - page 7 / 7
» Timing Analysis in Low-Latency Mix Networks: Attacks and Def...
Sort
View
CCS
2007
ACM
14 years 1 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
SIGCOMM
2004
ACM
14 years 1 months ago
Building a better NetFlow
Network operators need to determine the composition of the traffic mix on links when looking for dominant applications, users, or estimating traffic matrices. Cisco’s NetFlow ha...
Cristian Estan, Ken Keys, David Moore, George Varg...