2008 |
10 | EE | Saar Drimer,
Steven J. Murdoch,
Ross Anderson:
Thinking Inside the Box: System-Level Failures of Tamper Proofing.
IEEE Symposium on Security and Privacy 2008: 281-295 |
9 | EE | Steven J. Murdoch,
Robert N. M. Watson:
Metrics for Security and Performance in Low-Latency Anonymity Systems.
Privacy Enhancing Technologies 2008: 115-132 |
8 | EE | Sebastian Zander,
Steven J. Murdoch:
An Improved Clock-skew Measurement Technique for Revealing Hidden Services.
USENIX Security Symposium 2008: 211-226 |
2007 |
7 | EE | Steven J. Murdoch,
Piotr Zielinski:
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries.
Privacy Enhancing Technologies 2007: 167-183 |
2006 |
6 | EE | Steven J. Murdoch:
Hot or not: revealing hidden services by their clock skew.
ACM Conference on Computer and Communications Security 2006: 27-36 |
5 | EE | Richard Clayton,
Steven J. Murdoch,
Robert N. M. Watson:
Ignoring the Great Firewall of China.
Privacy Enhancing Technologies 2006: 20-35 |
2005 |
4 | EE | Steven J. Murdoch,
George Danezis:
Low-Cost Traffic Analysis of Tor.
IEEE Symposium on Security and Privacy 2005: 183-195 |
3 | EE | Steven J. Murdoch,
Stephen Lewis:
Embedding Covert Channels into TCP/IP.
Information Hiding 2005: 247-261 |
2 | EE | Andrei Serjantov,
Steven J. Murdoch:
Message Splitting Against the Partial Adversary.
Privacy Enhancing Technologies 2005: 26-39 |
2004 |
1 | EE | Steven J. Murdoch,
Piotr Zielinski:
Covert Channels for Collusion in Online Computer Games.
Information Hiding 2004: 355-370 |