Login / Signup

From a Trickle to a Flood: Active Attacks on Several Mix Types.

Andrei SerjantovRoger DingledinePaul F. Syverson
Published in: Information Hiding (2002)
Keyphrases
  • neural network
  • real world
  • data sets
  • website
  • cooperative
  • countermeasures
  • computer security
  • damage assessment