Back to Results
First PageMeta Content
Biometrics / Fingerprints / Computer network security / Information / Traffic flow / Flow network / Audio watermark detection / Public key fingerprint / IBM Intelligent Printer Data Stream / Computing / Identifiers / Security


The Need for Flow Fingerprints to Link Correlated Network Flows Amir Houmansadr1 and Nikita Borisov2 1 2
Add to Reading List

Document Date: 2013-05-06 18:02:18


Open Document

File Size: 597,51 KB

Share Result on Facebook

/

Facility

University of Illinois / The University of Texas / /

IndustryTerm

average network / noisy network / real-world network / above algorithm / anonymity network / anonymity systems / given encoding algorithm / flow watermarking systems / border router / important applications / anonymous network / border routers / /

Organization

University of Illinois / University of Texas at Austin / /

Position

registrar / extractor / Fancy extractor / security officer / Sender Noisy Network Fingerprinter Extractor Receiver IPDs Registrar / fingerprint extractor / IPDs registrar / /

ProvinceOrState

Texas / Illinois / /

Technology

above algorithm / ISP / HTTP / border router / simulation / Tor routers / two border routers / given encoding algorithm / /

SocialTag