Back to Results
First PageMeta Content
Data / Online chat / Data transmission / Videotelephony / Packet loss / Wavelet / Network packet / Communications protocol / Instant messaging / Computing / Network performance / Information


Who are You Talking to? Breaching Privacy in Encrypted IM Networks Muhammad U. Ilyas Department of EE, SEECS National University of Sciences & Technology Islamabad – 44000, Pakistan
Add to Reading List

Document Date: 2013-08-27 17:43:00


Open Document

File Size: 302,15 KB

Share Result on Facebook

City

New York / New York City / East Lansing / /

Company

Cisco systems / Skype / Twitter / Facebook / Yahoo! Labs / MySpace / EURASIP Journal / Yahoo! / /

Country

Pakistan / United States / /

Currency

USD / /

/

Event

FDA Phase / /

Facility

ECE Michigan State University / SEECS National University of Sciences / Michigan State University / /

IndustryTerm

friendship networks / anonymity networks / low-latency mix networks / search discrimination / online social networks / organizational network / attack algorithm / user-server / signal processing / border gateway routers / instant messaging network / user re-identification algorithm / i.e. user-to-server / communication services / gateway routers / e-commerce portals / relay server / Entropy-based algorithms / mix network / Web Search / border gateway router / e - commerce / social networks / social network / web personalization / targeted advertising / pre-processing / post-processing coefficients / /

MarketIndex

set 70 / /

Movie

W. V / /

Organization

Paper Organization / Michigan State University / National Science Foundation / Alex X. Liu∗ Hayder Radha Department of CSE Department of ECE Michigan State University Michigan State University East Lansing / U.S. Securities and Exchange Commission / National ICT R&D Fund of Pakistan / Encrypted IM Networks Muhammad U. Ilyas Department of EE / National Natural Science Foundation of China / SEECS National University of Sciences & Technology Islamabad / /

Person

Kim Capps-Tanaka / L. Gyarmati / V / Andrew Large / Muhammad U. Ilyas / Donald McGillen / Alex X. Liu / Joy Ghosh / M. Zubair Sha / Alex X. Liu∗ Hayder Radha / /

Position

postdoctoral researcher / Messenger / corresponding author / Colonel / corresponding author of this paper / /

Product

v1 / Wickerhauser / Coifman / Haar / NetFlow / /

ProvinceOrState

Hawaii / New York / Michigan / /

PublishedMedium

IEEE Transactions on Information Theory / Communications of the ACM / /

Technology

border gateway router / user re-identification algorithm / server farm / instant messaging / MTU / maximum transmission unit / gateway routers / encryption / Knowledge Management / Entropy-based algorithms / Data Mining / COLD attack algorithm / border gateway routers / /

SocialTag