First Page | Document Content | |
---|---|---|
Date: 2016-02-20 08:19:38Computing Internet Internet security Secure communication Free software Transmission Control Protocol Tor Support vector machine | Effective Attacks and Provable Defenses for Website Fingerprinting Tao Wang, University of Waterloo; Xiang Cai, Rishab Nithyanand, and Rob Johnson, Stony Brook University; Ian Goldberg, University of Waterloo https://wwwAdd to Reading ListSource URL: www.usenix.orgDownload Document from Source WebsiteFile Size: 300,46 KBShare Document on Facebook |