Juan A. Elices

According to our database1, Juan A. Elices authored at least 6 papers between 2011 and 2013.

Collaborative distances:
  • Dijkstra number2 of five.
  • Erdős number3 of four.

Timeline

Legend:

Book 
In proceedings 
Article 
PhD thesis 
Dataset
Other 

Links

On csauthors.net:

Bibliography

2013
A highly optimized flow-correlation attack.
CoRR, 2013

Linking Correlated Network Flows through Packet Timing: a Game-Theoretic Approach.
CoRR, 2013

The flow fingerprinting game.
Proceedings of the 2013 IEEE International Workshop on Information Forensics and Security, 2013

Locating Tor hidden services through an interval-based traffic-correlation attack.
Proceedings of the IEEE Conference on Communications and Network Security, 2013

2012
Fingerprinting a flow of messages to an anonymous server.
Proceedings of the 2012 IEEE International Workshop on Information Forensics and Security, 2012

2011
Fingerprinting Tor's hidden service log files using a timing channel.
Proceedings of the 2011 IEEE International Workshop on Information Forensics and Security, 2011


  Loading...