Knock-Knock: De-Anonymise Hidden Services by Exploiting Service Answer Vulnerability.
Qingfeng ZhangMuqian ChenXuebin WangCan ZhaoQingyun LiuJinqiao ShiPublished in: WCNC (2024)
Keyphrases
- service providers
- service discovery
- web services
- service oriented
- service composition
- service quality
- information services
- mobile services
- service delivery
- service selection
- service oriented architecture
- service platform
- network services
- customer service
- end users
- service description
- web service composition
- service provision
- service offerings
- service provisioning
- service requirements
- communication services
- service integration
- service management
- rapidly in recent years
- resource discovery
- public services
- context aware services
- context aware
- service requests
- cloud computing
- loosely coupled
- online services
- value added services
- lifecycle management
- mashup
- ubiquitous computing
- access points
- electronic business
- ubiquitous computing environments
- service architecture
- grid services
- security services
- network infrastructure
- video on demand
- physical location
- business processes
- computing environments
- service level agreements
- composite services
- search computing
- network resources