<--- Back to Details
First PageDocument Content
Biometrics / Fingerprints / Computer network security / Information / Traffic flow / Flow network / Audio watermark detection / Public key fingerprint / IBM Intelligent Printer Data Stream / Computing / Identifiers / Security
Date: 2013-05-06 18:02:18
Biometrics
Fingerprints
Computer network security
Information
Traffic flow
Flow network
Audio watermark detection
Public key fingerprint
IBM Intelligent Printer Data Stream
Computing
Identifiers
Security

The Need for Flow Fingerprints to Link Correlated Network Flows Amir Houmansadr1 and Nikita Borisov2 1 2

Add to Reading List

Source URL: freehaven.net

Download Document from Source Website

File Size: 597,51 KB

Share Document on Facebook

Similar Documents

Labnote - IPDS 2T Genix CU - Chemical crystallography applications

Labnote - IPDS 2T Genix CU - Chemical crystallography applications

DocID: 1okuc - View Document

Labnote - IPDS 2T Genix CU - High-Throughput Sulphur-SAD

Labnote - IPDS 2T Genix CU - High-Throughput Sulphur-SAD

DocID: 1nWzf - View Document

Labnote - Powder Exposures on IPDS II - 2T

Labnote - Powder Exposures on IPDS II - 2T

DocID: 1nm13 - View Document

Labnote - Electron Density Determination of a boroxine compound

Labnote - Electron Density Determination of a boroxine compound

DocID: 1mA9V - View Document

Call Today!  T2365 HD

Call Today! T2365 HD

DocID: 1gknv - View Document