Tor HTTP Usage and Information Leakage (Englisch)
Freier Zugriff
- Neue Suche nach: Huber, Markus
- Neue Suche nach: Mulazzani, Martin
- Neue Suche nach: Weippl, Edgar
- Neue Suche nach: Huber, Markus
- Neue Suche nach: Mulazzani, Martin
- Neue Suche nach: Weippl, Edgar
In:
Communications and Multimedia Security
9
;
245-255
;
2010
- Aufsatz/Kapitel (Buch) / Elektronische Ressource
-
Titel:Tor HTTP Usage and Information Leakage
-
Beteiligte:
-
Erschienen in:Communications and Multimedia Security , 9 ; 245-255Lecture Notes in Computer Science ; 6109, 9 ; 245-255
-
Verlag:
- Neue Suche nach: Springer Berlin Heidelberg
-
Erscheinungsort:Berlin, Heidelberg
-
Erscheinungsdatum:01.01.2010
-
Format / Umfang:11 pages
-
ISBN:
-
ISSN:
-
DOI:
-
Medientyp:Aufsatz/Kapitel (Buch)
-
Format:Elektronische Ressource
-
Sprache:Englisch
-
Schlagwörter:
-
Datenquelle:
Inhaltsverzeichnis E-Book
Die Inhaltsverzeichnisse werden automatisch erzeugt und basieren auf den im Index des TIB-Portals verfügbaren Einzelnachweisen der enthaltenen Beiträge. Die Anzeige der Inhaltsverzeichnisse kann daher unvollständig oder lückenhaft sein.
- 1
-
Keynotes| 2010
- 4
-
A Scalable Wireless Routing Protocol Secure against Route Truncation AttacksSaxena, Amitabh / Soh, Ben et al. | 2010
- 16
-
Probabilistic Vehicular Trace Reconstruction Based on RF-Visual Data FusionAl-Kuwari, Saif / Wolthusen, Stephen D. et al. | 2010
- 28
-
Throwing a MonkeyWrench into Web Attackers PlansBüscher, Armin / Meier, Michael / Benzmüller, Ralf et al. | 2010
- 40
-
Security in OpenSocial-Instrumented Social Networking ServicesHäsel, Matthias / Iacono, Luigi Lo et al. | 2010
- 53
-
Security for XML Data BindingGruschka, Nils / Iacono, Luigi Lo et al. | 2010
- 64
-
Watermark Detection for Video Bookmarking Using Mobile Phone CameraMeerwald, Peter / Uhl, Andreas et al. | 2010
- 75
-
Watermark-Based Authentication and Key Exchange in Teleconferencing SystemsRührmair, Ulrich / Katzenbeisser, Stefan / Steinebach, Martin / Zmudzinski, Sascha et al. | 2010
- 81
-
Efficient Format-Compliant Encryption of Regular Languages: Block-Based Cycle-WalkingStütz, Thomas / Uhl, Andreas et al. | 2010
- 93
-
Statistical Detection of Malicious PE-Executables for Fast Offline AnalysisMerkel, Ronny / Hoppe, Tobias / Kraetzer, Christian / Dittmann, Jana et al. | 2010
- 106
-
A Frame of Reference for Research of Integrated Governance, Risk and Compliance (GRC)Racz, Nicolas / Weippl, Edgar / Seufert, Andreas et al. | 2010
- 118
-
Business and IT Continuity BenchmarkingNeudorfer, Wolfgang / Marinos, Louis / Schaumüller-Bichl, Ingrid et al. | 2010
- 130
-
Peer-to-Peer VoIP Communications Using Anonymisation Overlay NetworksZhang, Ge / Fischer-Hübner, Simone et al. | 2010
- 142
-
SIP Proxies: New Reflectors in the InternetZhang, Ge / Pallares, Jordi Jaen / Rebahi, Yacine / Fischer-Hübner, Simone et al. | 2010
- 154
-
Analysis of Token and Ticket Based Mechanisms for Current VoIP Security Issues and Enhancement ProposalBattistello, Patrick / Delétré, Cyril et al. | 2010
- 166
-
Entropy of Graphical Passwords: Towards an Information-Theoretic Analysis of Face-Recognition Based AuthenticationRass, Stefan / Schuller, David / Kollmitzer, Christian et al. | 2010
- 178
-
Handwriting Biometric Hash Attack: A Genetic Algorithm with User Interaction for Raw Data ReconstructionKümmel, Karl / Vielhauer, Claus / Scheidat, Tobias / Franke, Dirk / Dittmann, Jana et al. | 2010
- 191
-
Privacy Preserving Key Generation for Iris BiometricsRathgeb, Christian / Uhl, Andreas et al. | 2010
- 201
-
Generalizations and Extensions of Redactable Signatures with Applications to Electronic HealthcareSlamanig, Daniel / Rass, Stefan et al. | 2010
- 214
-
Chosen-Ciphertext Secure Certificateless Proxy Re-EncryptionSur, Chul / Jung, Chae Duk / Park, Youngho / Rhee, Kyung Hyune et al. | 2010
- 233
-
Detecting Hidden Encrypted VolumesHargreaves, Christopher / Chivers, Howard et al. | 2010
- 245
-
Tor HTTP Usage and Information LeakageHuber, Markus / Mulazzani, Martin / Weippl, Edgar et al. | 2010
- 256
-
Secure Communication Using Identity Based EncryptionRoschke, Sebastian / Ibraimi, Luan / Cheng, Feng / Meinel, Christoph et al. | 2010
- 268
-
Anonymous Client Authentication for Transport Layer SecurityDietrich, Kurt et al. | 2010