![]() Storm Water Plan Review reviews storm water development plans to ensure future construction projects do not adversely impact current drainage systems.įind out more about storm water plan review. Read more about purchasing City owned properties. Requests to purchase City of San Antonio properties that are declared as surplus to the needs of the City and utility agencies should be submitted in writing. Railroad Quiet Zones are established through a nine-step process.įind out more about railroad quiet zones. Residents can also obtain temporary permits for activities like block parties.įind out more about right-of-way permits. Right-of-Way Permits regulate construction activity in the City’s right-of-way, like streets. To request plans for viewing or copies, please submit a request via email.įind out more about requesting plans for viewing or copies. 186–198.The Public Works Department (PWD) offers services to residents and businesses. IEEE Symposium on Security and Privacy, Oakland, CA, May 8-10, pp. Venkatraman, B.R., Newman-Wolfe, R.E.: Capacity estimation and auditability of network covert channels. IEEE/ACM Tenth Annual Computer Security Applications Conference, Orlando, FL, December 5-9, pp. ![]() Venkatraman, B.R., Newman-Wolfe, R.E.: Performance analysis of a method for high level prevention of traffic analysis using measurements from a campus network. (ed.) Designing Privacy Enhancing Technologies. Syverson, P.F., Tsudik, G., Reed, M.G., Landwehr, C.E.: Towards an analysis of onion routing security. In: Wing, J.M., Woodcock, J.C.P., Davies, J. Syverson, P., Stubblebine, S.: Group principals and the formalization of anonymity. Stallings, W.: Data and Computer Communications, 6th edn. Shannon, C.E.: Communication theory of secrecy systems. Serjantov, A., Danezis, G.: Towards an information theoretic metric for anonymity. ACM Transactions on Information and System Security 1(1), 66–92 (1998) Reiter, M.K., Rubin, A.D.: Crowds: anonymity for web transactions. Raymond, J.: Traffic analysis: Protocols, attacks, design issues, and open problems. In: ACM Symposium on Theory of Computing, pp. Rackoff, C., Simon, D.R.: Cryptographic defense against traffic analysis. Pfitzmann, A., Köhntopp, M.: Anonymity, unobservability and pseudonymity - a proposal for terminology. IEEE/ACM Eighth Annual Computer Security Applications Conference, San Antonio, TX, Nov 30-Dec 4, pp. Newman-Wolfe, R.E., Venkatraman, B.R.: Performance analysis of a method for high level prevention of traffic analysis. IEEE/ACM Seventh Annual Computer Security Applications Conference, San Antonio, TX, Dec 2-6, pp. Newman-Wolfe, R.E., Venkatraman, B.R.: High level prevention of traffic analysis. Kang, M.H., Moskowitz, I.S., Lee, D.C.: A network Pump. Halsall, F.: Data Communications, Computer Networks, and Open Systems. Goldschlag, D., Reed, M., Syverson, P.: Hiding routing information. Georgiadis, L., Guérin, R., Peris, V., Sivarajan, K.N.: Efficient network QoS provisioning based on per node traffic shaping. Springer, Heidelberg (2003)ĭiaz, C., Seys, S., Claessens, J., Preneel, B.: Towards measuring anonymity. Springer, Heidelberg (2001)īerthold, O., Langos, H.: Dummy traffic against long term intersection attacks. This process is experimental and the keywords may be updated as the learning algorithm improves.īack, A., Möller, U., Stiglic, A.: Traffic analysis attacks and trade-offs in anonymity providing systems. These keywords were added by machine and not by the authors. ![]() Unlike previous work, the focus is on determining the overall amount of anonymity a TAP system can provide, or the amount it can provide for a given cost in padding and rerouting, rather than on the amount of protection afforded particular communications. ![]() The paper introduces an entropy-based approach to the amount of uncertainty a global passive adversary has in determining the actual TM, or alternatively, the probability that the actual TM has a property of interest. It considers TAP based on padding and rerouting of messages and describes the effects each has on the difference between the actual and the observed traffic matrix (TM). This paper considers systems for Traffic Analysis Prevention (TAP) in a theoretical model. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |