User identification in encrypted network communications | IEEE Conference Publication | IEEE Xplore