![Computing / Internet / Internet security / Secure communication / Free software / Transmission Control Protocol / Tor / Support vector machine Computing / Internet / Internet security / Secure communication / Free software / Transmission Control Protocol / Tor / Support vector machine](https://www.pdfsearch.io/img/ad199d750b8c20e4f55d00430bbfee6c.jpg) Date: 2016-02-20 08:19:38Computing Internet Internet security Secure communication Free software Transmission Control Protocol Tor Support vector machine | | Effective Attacks and Provable Defenses for Website Fingerprinting Tao Wang, University of Waterloo; Xiang Cai, Rishab Nithyanand, and Rob Johnson, Stony Brook University; Ian Goldberg, University of Waterloo https://wwwAdd to Reading ListSource URL: www.usenix.orgDownload Document from Source Website File Size: 300,46 KBShare Document on Facebook
|