Login / Signup
On the Effectiveness of Continuous-Time Mixes under Flow-Correlation Based Anonymity Attacks.
Ye Zhu
Xinwen Fu
Riccardo Bettati
Published in:
Int. J. Netw. Secur. (2008)
Keyphrases
</>
optimal control
countermeasures
flow patterns
cross correlation
social networks
digital images
flow field
watermarking scheme
malicious attacks