The SCEAS System
Navigation Menu

Search the dblp DataBase

Title:
Author:

Steven J. Murdoch: [Publications] [Author Rank by year] [Co-authors] [Prefers] [Cites] [Cited by]

Publications of Author

  1. Steven J. Murdoch
    Hot or not: revealing hidden services by their clock skew. [Citation Graph (0, 0)][DBLP]
    ACM Conference on Computer and Communications Security, 2006, pp:27-36 [Conf]
  2. Steven J. Murdoch, Stephen Lewis
    Embedding Covert Channels into TCP/IP. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2005, pp:247-261 [Conf]
  3. Steven J. Murdoch, Piotr Zielinski
    Covert Channels for Collusion in Online Computer Games. [Citation Graph (0, 0)][DBLP]
    Information Hiding, 2004, pp:355-370 [Conf]
  4. Andrei Serjantov, Steven J. Murdoch
    Message Splitting Against the Partial Adversary. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2005, pp:26-39 [Conf]
  5. Richard Clayton, Steven J. Murdoch, Robert N. M. Watson
    Ignoring the Great Firewall of China. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2006, pp:20-35 [Conf]
  6. Steven J. Murdoch, George Danezis
    Low-Cost Traffic Analysis of Tor. [Citation Graph (0, 0)][DBLP]
    IEEE Symposium on Security and Privacy, 2005, pp:183-195 [Conf]
  7. Steven J. Murdoch, Piotr Zielinski
    Sampled Traffic Analysis by Internet-Exchange-Level Adversaries. [Citation Graph (0, 0)][DBLP]
    Privacy Enhancing Technologies, 2007, pp:167-183 [Conf]

  8. Optimised to Fail: Card Readers for Online Banking. [Citation Graph (, )][DBLP]


  9. Verified by Visa and MasterCard SecureCode: Or, How Not to Design Authentication. [Citation Graph (, )][DBLP]


  10. A Case Study on Measuring Statistical Data in the Tor Anonymity Network. [Citation Graph (, )][DBLP]


  11. Metrics for Security and Performance in Low-Latency Anonymity Systems. [Citation Graph (, )][DBLP]


  12. Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks. [Citation Graph (, )][DBLP]


  13. Chip and PIN is Broken. [Citation Graph (, )][DBLP]


  14. Thinking Inside the Box: System-Level Failures of Tamper Proofing. [Citation Graph (, )][DBLP]


  15. Phish and Chips. [Citation Graph (, )][DBLP]


  16. An Improved Clock-skew Measurement Technique for Revealing Hidden Services. [Citation Graph (, )][DBLP]


Search in 0.001secs, Finished in 0.002secs
NOTICE1
System may not be available sometimes or not working properly, since it is still in development with continuous upgrades
NOTICE2
The rankings that are presented on this page should NOT be considered as formal since the citation info is incomplete in DBLP
 
System created by asidirop@csd.auth.gr [http://users.auth.gr/~asidirop/] © 2002
for Data Engineering Laboratory, Department of Informatics, Aristotle University © 2002