Alternative digital communication networks (DCN) publications

Alternative digital communication networks (DCN) (1216)
  1. [Tyson2013] Towards an information-centric delay-tolerant network
    Tyson, Gareth, Bigham, John, and Bodanese, Eliane
    2013
  2. [Sathiaseelan2013] Information centric delay tolerant networking: An internet architecture for the challenged
    Sathiaseelan, Arjuna, Trossen, Dirk, Komnios, Ioannis, Ott, Joerg, and Crowcroft, Jon
    2013
  3. [Yi2014] On the role of routing in named data networking
    Yi, Cheng, Abraham, Jerald, Afanasyev, Alexander, Wang, Lan, Zhang, Beichuan, and Zhang, Lixia
    In Proceedings of the 1st international conference on Information-centric networking 2014
  4. [Trossen2015] Ip over icn-the better ip?
    Trossen, Dirk, Reed, Martin J, Riihijärvi, Janne, Georgiades, Michael, Fotiou, Nikos, and Xylomenos, George
    In Networks and Communications (EuCNC), 2015 European Conference on 2015
  5. [Trossen2015a] IP over ICN-the better IP? an unusual take on information-centric networking
    Trossen, Dirk, Reed, Martin J, Riihijärvi, Janne, Georgiades, Michael, Fotiou, Nikos, and Xylomenos, George
    arXiv preprint arXiv:1507.04221 2015
  6. [Hemmati2015] A Comparison of Name-Based Content Routing Protocols
    Hemmati, Ehsan, and Garcia-Luna-Aceves, JJ
    In Mobile Ad Hoc and Sensor Systems (MASS), 2015 IEEE 12th International Conference on 2015
  7. [Kawadia2011] Slinky: An adaptive protocol for content access in disruption-tolerant ad hoc networks
    Kawadia, Vikas, Riga, Niky, Opper, Jeff, and Sampath, Dhananjay
    In Proc. MobiHoc Workshop on Tactical Mobile Ad Hoc Networking 2011
  8. [Clarke2001] Freenet: A distributed anonymous information storage and retrieval system
    Clarke, Ian, Sandberg, Oskar, Wiley, Brandon, and Hong, Theodore W
    In Designing privacy enhancing technologies 2001
  9. [Clarke1999a] Freenet: A distributed anonymous information storage and retrieval system. Freenet White Paper
    Clarke, I, Sandberg, O, Wiley, B, and Hong, TW
    1999
  10. [Clarke2002] Protecting free expression online with freenet
    Clarke, Ian, Miller, Scott G, Hong, Theodore W, Sandberg, Oskar, and Wiley, Brandon
    IEEE Internet Computing 2002
  11. [Chen2011] Copss: An efficient content oriented publish/subscribe system
    Chen, Jiachen, Arumaithurai, Mayutan, Jiao, Lei, Fu, Xiaoming, and Ramakrishnan, KK
    In Architectures for Networking and Communications Systems (ANCS), 2011 Seventh ACM/IEEE Symposium on 2011
  12. [Greifenberg2008] Efficient publish/subscribe-based multicast for opportunistic networking with self-organized resource utilization
    Greifenberg, Janico, and Kutscher, Dirk
    In Advanced Information Networking and Applications-Workshops, 2008. AINAW 2008. 22nd International Conference on 2008
  13. [Haas2006] Gossip-based ad hoc routing
    Haas, Zygmunt J, Halpern, Joseph Y, and Li, Li
    IEEE/ACM Transactions on Networking (ToN) 2006
  14. [Hou2004] Gossip-based sleep protocol (GSP) for energy efficient routing in wireless ad hoc networks
    Hou, Xiaobing, and Tipper, David
    In Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE 2004
  15. [Huang2004] Publish/subscribe in a mobile environment
    Huang, Yongqiang, and Garcia-Molina, Hector
    Wireless Networks 2004
  16. [Huang2001] Publish/subscribe in a mobile enviroment
    Huang, Yongqiang, and Garcia-Molina, Hector
    In Proceedings of the 2nd ACM international workshop on Data engineering for wireless and mobile access 2001
  17. [Hui2007] How small labels create big improvements
    Hui, Pan, and Crowcroft, Jon
    In Pervasive Computing and Communications Workshops, 2007. PerCom Workshops’ 07. Fifth Annual IEEE International Conference on 2007
  18. [Yoneki2007] A socio-aware overlay for publish/subscribe communication in delay tolerant networks
    Yoneki, Eiko, Hui, Pan, Chan, ShuYan, and Crowcroft, Jon
    In Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems 2007
  19. [Sollazzo2007] TACO-DTN: a time-aware content-based dissemination system for delay tolerant networks
    Sollazzo, Giuseppe, Musolesi, Mirco, and Mascolo, Cecilia
    In Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking 2007
  20. [Hui2007a] Bubble rap: Forwarding in small world dtns in ever decreasing circles
    Hui, Pan, and Crowcroft, Jon
    2007
  21. [Grossglauser2006] Locating mobile nodes with ease: learning efficient routes from encounter histories alone
    Grossglauser, Matthias, and Vetterli, Martin
    IEEE/ACM Transactions on Networking (TON) 2006
  22. [Stojmenovic1999] Home agent based location update and destination search schemes in ad hoc wireless networks
    Stojmenovic, Ivan
    Computer Science, SITE, University of Ottawa, TR-99-10 1999
  23. [Finn1987] Routing and Addressing Problems in Large Metropolitan-Scale Internetworks. ISI Research Report.
    Finn, Gregory G
    1987
  24. [DeCouto2001] Location proxies and intermediate node forwarding for practical geographic forwarding
    De Couto, Douglas SJ, and Morris, Robert
    2001
  25. [Mauve2001] A survey on position-based routing in mobile ad hoc networks
    Mauve, Martin, Widmer, Jorg, and Hartenstein, Hannes
    IEEE network 2001
  26. [Blazevic2002] Self organized terminode routing
    Blažević, Ljubica, Giordano, Silvia, and Le Boudec, Jean-Yves
    Cluster Computing 2002
  27. [Hubaux2001] Toward self-organized mobile ad hoc networks: the terminodes project
    Hubaux, J-P, Gross, Thomas, Le Boudec, J-Y, and Vetterli, Martin
    IEEE Communications Magazine 2001
  28. [Blazevic2001] Self organization in mobile ad hoc networks: the approach of Terminodes
    Blazevic, Ljubica, Buttyan, Levente, Capkun, Srdjan, Giordano, Silvia, Hubaux, J-P, and Le Boudec, J-Y
    IEEE Communications Magazine 2001
  29. [Blazevic2001a] Self organized terminode routing simulation
    Blažević, Ljubica, Giordano, Silvia, and Le Boudec, Jean-Yves
    In Proceedings of the 4th ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems 2001
  30. [Lochert2005] Geographic routing in city scenarios
    Lochert, Christian, Mauve, Martin, Füßler, Holger, and Hartenstein, Hannes
    ACM SIGMOBILE mobile computing and communications review 2005
  31. [Blazevic2002a] A scalable routing scheme for self-organized terminode network
    Blazevic, Ljubica, Le Boudec, Jean-Yves, and Giordano, Silvia
    In Communication Networks and Distributed systems modeling and Simulation conference (CNDS) 2002
  32. [Hubaux2000] Towards mobile ad-hoc WANs: Terminodes
    Hubaux, J-P, Le Boudec, J-Y, Giordano, Silvia, Hamdi, Maher, Blazevic, Ljubica, Buttyan, Levente, and Vojnovic, Milan
    In Wireless Communications and Networking Confernce, 2000. WCNC. 2000 IEEE 2000
  33. [Hubaux1999] The terminode project: Towards mobile ad-hoc wans
    Hubaux, J-P, Le Boudec, J-Y, Giordano, Silvia, and Hamdi, Maher
    In Mobile Multimedia Communications, 1999.(MoMuC’99) 1999 IEEE International Workshop on 1999
  34. [Heissenbuettel2004] BLR: beacon-less routing algorithm for mobile ad hoc networks
    Heissenbüttel, Marc, Braun, Torsten, Bernoulli, Thomas, and WäLchli, Markus
    Computer communications 2004
  35. [Blazevic2002b] Anchored path discovery in terminode routing
    Blažević, Ljubica, Giordano, Silvia, and Le Boudec, Jean-Yves
    In International Conference on Research in Networking 2002
  36. [Krendzel2008] VIMLOC: Virtual Home Region multi-hash Location Service in wireless mesh networks
    Krendzel, Andrey, Mangues-Bafalluy, Josep, Requena-Esteso, Manuel, and Nunez, Jose-Martinez
    In Wireless Days, 2008. WD’08. 1st IFIP 2008
  37. [Yang2012] HLLS: a history information based light location service for MANETs
    Yang, Xinyu, Fan, Xiaojing, Yu, Wei, Fu, Xinwen, and Yang, Shusen
    Computer Networks 2012
  38. [Mangues-Bafalluy2010] VIMLOC Location Management in Wireless Meshes: Experimental Performance Evaluation and Comparison
    Mangues-Bafalluy, Josep, Requena-Esteso, Manuel, Núñez-Martı́nez, José, and Krendzel, Andrey
    In Communications (ICC), 2010 IEEE International Conference on 2010
  39. [Terry1995] Managing update conflicts in Bayou, a weakly connected replicated storage system
    Terry, Douglas B, Theimer, Marvin M, Petersen, Karin, Demers, Alan J, Spreitzer, Mike J, and Hauser, Carl H
    In ACM SIGOPS Operating Systems Review 1995
  40. [Lee2000] Operation-based update propagation in a mobile file system
    Lee, Yui-Wah, Leung, Kwong-Sak, and Satyanarayanan, Mahadev
    2000
  41. [Kistler1992] Disconnected operation in the Coda file system
    Kistler, James J, and Satyanarayanan, Mahadev
    ACM Transactions on Computer Systems (TOCS) 1992
  42. [Kistler1991] Disconnected operation in the Coda file system
    Kistler, James J, and Satyanarayanan, Mahadev
    1991
  43. [Muthitacharoen2001] A low-bandwidth network file system
    Muthitacharoen, Athicha, Chen, Benjie, and Mazieres, David
    In ACM SIGOPS Operating Systems Review 2001
  44. [Muthitacharoen2002] Ivy: A read/write peer-to-peer file system
    Muthitacharoen, Athicha, Morris, Robert, Gil, Thomer M, and Chen, Benjie
    ACM SIGOPS Operating Systems Review 2002
  45. [Bindel2000] Oceanstore: An extremely wide-area storage system
    Bindel, David, Chen, Yan, Eaton, Patrick, Geels, Dennis, Gummadi, Ramakrishna, Rhea, Sean, Weatherspoon, Hakim, Weimer, Westley, Wells, Christopher, Zhao, Ben, and others,
    In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems 2000
  46. [Yu2000] Design and evaluation of a continuous consistency model for replicated services
    Yu, Haifeng, and Vahdat, Amin
    In Proceedings of the 4th Conference on Symposium on Operating System Design & Implementation-Volume 4 2000
  47. [Kiely1996] Progressive transmission and compression images
    Kiely, AB
    1996
  48. [Kiely2003] The ICER progressive wavelet image compressor
    Kiely, Aaron, and Klimesh, Matthew
    IPN Progress Report 2003
  49. [Ruiz2001] Image compression for progressive transmission
    Ruiz, VG, Fernández, JJ, and Garcı́a, I
    In APPLIED INFORMATICS-PROCEEDINGS- 2001
  50. [Meyer2012] A study of practical deduplication
    Meyer, Dutch T, and Bolosky, William J
    ACM Transactions on Storage (TOS) 2012
  51. [Stamm2002] PGF: a new progressive file format for lossy and lossless image compression
    Stamm, Christoph
    2002
  52. [Wang2008] An implementation of CCSDS 122.0-B-1 recommended standard
    Wang, Hongqiang, and Wang, Hongqiang
    University of Nebraska-Lincoln 2008
  53. [Standard2014] 41x
    Standard, CCSDS Recommended
    2014
  54. [Whitaker1991] SEU hardened memory cells for a CCSDS Reed-Solomon encoder
    Whitaker, Sterling, Canaris, John, and Liu, Kathy
    IEEE Transactions on Nuclear Science 1991
  55. [Lee2004] Expected file-delivery time of deferred NAK ARQ in CCSDS file-delivery protocol
    Lee, Daniel C, and Baek, Wonseok
    IEEE transactions on communications 2004
  56. [Yeh2002] Implementation of CCSDS lossless data compression for space and data archive applications
    Yeh, Pen-Shu
    In Proc. Space Operations Conf 2002
  57. [CCSDS2002] Reference model for an open archival information system (OAIS)
    CCSDS, January
    2002
  58. [Paaske1990] Improved decoding for a concatenated coding system recommended by CCSDS
    Paaske, Erik
    IEEE Transactions on Communications 1990
  59. [CCSDSBlueBook] 1: RF and Modulation Systems
    CCSDS Blue Book, Part
  60. [Code] Assignment Control Procedures
    Code, CCSDS Global Spacecraft Identification Field
  61. [DeCola2007] Performance analysis of CCSDS File Delivery Protocol and erasure coding techniques in deep space environments
    De Cola, Tomaso, Ernst, Harald, and Marchese, Mario
    Computer Networks 2007
  62. [Yeh2003] The CCSDS lossless data compression recommendation for space applications
    Yeh, Pen-Shu
    Chapter 2003
  63. [Garcia-Vilchez2009] Extending the CCSDS recommendation for image data compression for remote sensing scenarios
    Garcia-Vilchez, Fernando, and Serra-Sagrista, Joan
    IEEE Transactions on Geoscience and Remote Sensing 2009
  64. [Auge2011] Review and implementation of the emerging CCSDS recommended standard for multispectral and hyperspectral lossless image coding
    Auge, Estanislau, Santalo, Josep, Blanes, Ian, Serra-Sagrista, Joan, Kiely, Aaron, and others,
    In Data Compression, Communications and Processing (CCP), 2011 First International Conference on 2011
  65. [Gao2005] Performance evaluation of the CCSDS file delivery protocol-latency and storage requirement
    Gao, Jay L, and SeGuı́, John S
    In Aerospace Conference, 2005 IEEE 2005
  66. [Wang2010] Unreliable CCSDS file delivery protocol (CFDP) over cislunar communication links
    Wang, Ruhai, Shrestha, Bidhya L, Wu, Xuan, Wang, Tiaotiao, Ayyagari, Anil, Tade, Erin, Horan, Stephen, and Hou, Jia
    IEEE Transactions on Aerospace and Electronic Systems 2010
  67. [Jiao2011] Packets interleaving CCSDS file delivery protocol in deep space communication
    Jiao, Jian, Guol, Qing, and Zhang, Qinyu
    IEEE Aerospace and Electronic Systems Magazine 2011
  68. [Back2003] Expected file delivery time of immediate NAK ARQ in CCSDS file delivery protocol
    Back, W, and Lee, Daniel C
    In Aerospace Conference, 2003. Proceedings. 2003 IEEE 2003
  69. [Yeh2002a] CCSDS data compression recommendation- Development and status
    Yeh, Pen-Shu, Moury, GA, Armbruster, Philippe, and others,
    In Proceedings of SPIE 2002
  70. [CCSDS2003] Synchronization and Channel Coding
    CCSDS, TM
    Blue Book 2003
  71. [Weichi2001] CCSDS downlink virtual channel schedule and performance analysis [J]
    Weichi, Gu Yingqi Tan
    Chinese Space Science and Technology 2001
  72. [Yeh2005] The new CCSDS image compression recommendation
    Yeh, Pen-Shu, Armbruster, Philippe, Kiely, Aaron, Masschelein, Bart, Moury, Gilles, Schaefer, Christoph, and Thiebaut, Carole
    In Aerospace Conference, 2005 IEEE 2005
  73. [Eugster2003] The many faces of publish/subscribe
    Eugster, Patrick Th, Felber, Pascal A, Guerraoui, Rachid, and Kermarrec, Anne-Marie
    ACM computing surveys (CSUR) 2003
  74. [Cherkassky2000] Image Compression for Storage and Transmission of Digitized Images
    Cherkassky, Vladimir S, He, Xuhao, and Shao, Jie
    2000
  75. [Cherkassky2000a] Image Compression for Storage and Transmission of Digital Images
    Cherkassky, Vladimir, He, Xuhao, and Shao, Jie
    2000
  76. [Pitkaenen2007] Redundancy and distributed caching in mobile dtns
    Pitkänen, Mikko Juhani, and Ott, Jörg
    In Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture 2007
  77. [Roberson2006] Kleinberg navigation in fractal small-world networks
    Roberson, Mickey R, and Ben-Avraham, Daniel
    Physical Review E 2006
  78. [Zeng2002] Handbook of wireless networks and mobile computing
    Zeng, Qing-An, and Agrawal, Dharma P
    Publishers: John Wiley and Sons 2002
  79. [Kuga2004] Mechanically steerable antennas using dielectric phase shifters
    Kuga, Yasuo, Cha, Junho, and Ritcey, James A
    In Antennas and Propagation Society International Symposium, 2004. IEEE 2004
  80. [Castro2003] Scalable application-level anycast for highly dynamic groups
    Castro, Miguel, Druschel, Peter, Kermarrec, Anne-Marie, and Rowstron, Antony
    Networked Group Communication 2003
  81. [Kyasanur2005] On the efficacy of separating control and data into different frequency bands
    Kyasanur, Pradeep, Padhye, Jitendra, and Bahl, Paramvir
    In Broadband Networks, 2005. BroadNets 2005. 2nd International Conference on 2005
  82. [Ruottu2010] Developing Peer-to-Peer Web Applications
    Ruottu, Toni
    09/2010 2010
  83. [Bernstein2006] Curve25519: new Diffie-Hellman speed records.
    Bernstein, Daniel J.
    02/2006 2006
  84. [Tatara2005] Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet
    Tatara, Kohei, Hori, Y., and Sakurai, Kouichi
    07/2005 2005
  85. [Grothoff2005b] A Quick Introduction to Bloom Filters
    Grothoff, Christian
    08/2005 2005
  86. [Grothoff2005] Reading File Metadata with extract and libextractor
    Grothoff, Christian
    Linux Journal Jun 2005
  87. [Gritzalis2004] Enhancing Web privacy and anonymity in the digital era
    Gritzalis, Stefanos
    2004 2004
  88. [Grothoff2003] An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks
    Grothoff, Christian
    Wirtschaftsinformatik Jun 2003
  89. [Bennett2003] gap - Practical Anonymous Networking
    Bennett, Krista, and Grothoff, Christian
    2003
  90. [Ferreira2003] A Transport Layer Abstraction for Peer-to-Peer Networks
    Ferreira, Ronaldo A., Grothoff, Christian, and Ruth, Paul
    2003
  91. [Bennett2002b] Efficient Sharing of Encrypted Data
    Bennett, Krista, Grothoff, Christian, Horozov, Tzvetan, and Patrascu, Ioana
    2002
  92. [Bennett2002] The GNet Whitepaper
    Bennett, Krista, Stef, Tiberius, Grothoff, Christian, Horozov, Tzvetan, and Patrascu, Ioana
    06/2002 2002
  93. [Dold2016a] Byzantine Set-Union Consensus using Efficient Set Reconciliation
    Dold, Florian, and Grothoff, Christian
    6/2016 2016
  94. [Grothoff2015] El programa MORECOWBELL de la NSA: Doblan las campanas para el DNS
    Grothoff, Christian, Wachs, Matthias, Ermert, Monika, and Appelbaum, Jacob
    01/2015 2015
  95. [Grothoff2015a] Il programma MORECOWBELL della NSA: Campane a morto per il DNS
    Grothoff, Christian, Wachs, Matthias, Ermert, Monika, Appelbaum, Jacob, and Saiu, Luca
    01/2015 2015
  96. [Grothoff2015b] Le programme MORECOWBELL de la NSA Sonne le glas du NSA
    Grothoff, Christian, Wachs, Matthias, Ermert, Monika, Appelbaum, Jacob, and Courtes, Ludovic
    01/2015 2015
  97. [Grothoff2015c] NSA’s MORECOWBELL: Knell for DNS
    Grothoff, Christian, Wachs, Matthias, Ermert, Monika, and Appelbaum, Jacob
    01/2015 2015
  98. [Devet2014] The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency
    Devet, Casey, and Goldberg, Ian
    2014
  99. [Herrmann2014] Censorship-Resistant and Privacy-Preserving Distributed Web Search
    Herrmann, Michael, Zhang, Ren, Ning, Kai-Chun, and Diaz, Claudia
    2014
  100. [Oya2014] Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications
    Oya, Simon, Troncoso, Carmela, and Pérez-González, Fernando
    2014
  101. [Borisov2014] DP5: A Private Presence Service
    Borisov, Nikita, Danezis, George, and Goldberg, Ian
    May 2014
  102. [Chen2014] On the Effectiveness of Obfuscation Techniques in Online Social Networks
    Chen, Terence, Boreli, Roksana, Kaafar, Mohamed-Ali, and Friedman, Arik
    2014
  103. [Lueks2014] Forward-Secure Distributed Encryption
    Lueks, Wouter, Hoepman, Jaap-Henk, and Kursawe, Klaus
    2014
  104. [DBLP:conf/stoc/Ullman13] Answering n^2+o(1) Counting Queries with Differential Privacy is Hard
    Ullman, Jonathan
    2013
  105. [Chatzikokolakis2013] Broadening the Scope of Differential Privacy Using Metrics
    Chatzikokolakis, Konstantinos, Andrés, MiguelE., Bordenabe, NicolásEmilio, and Palamidessi, Catuscia
    2013
  106. [DBLP:conf/netys/BoutetFJKR13] FreeRec: An Anonymous and Distributed Personalization Architecture
    Boutet, Antoine, Frey, Davide, Jegou, Arnaud, Kermarrec, Anne-Marie, and Ribeiro, Heverson B.
    2013
  107. [Al-Ameen2013] Persea: A Sybil-resistant Social DHT
    Al-Ameen, Mahdi N., and Wright, Matthew
    2013
  108. [sep-privacy] Privacy
    DeCew, Judith
    2013
  109. [Toth2013b] Public Key Pinning for TLS Using a Trust on First Use Model
    Toth, Gabor X
    2013
  110. [Uzunov2013] Speeding Up Tor with SPDY
    Uzunov, Andrey
    11/2013 2013
  111. [Kermarrec2013] Towards a Personalized Internet: a Case for a Full Decentralization.
    Kermarrec, Anne-Marie
    Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences Mar 2013
  112. [Biryukov2013] Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
    Biryukov, A., Pustogarov, I., and Weinmann, R.
    2013
  113. [Boutet2013] WhatsUp: A Decentralized Instant News Recommender
    Boutet, Antoine, Frey, Davide, Guerraoui, Rachid, Jegou, Arnaud, and Kermarrec, Anne-Marie
    2013
  114. [knight2012autonetkit] AutoNetkit: simplifying large scale, open-source network experimentation
    Knight, Simon, Jaboldinov, Askar, Maennel, Olaf, Phillips, Iain, and Roughan, Matthew
    SIGCOMM Comput. Commun. Rev. 2012
  115. [Alaggan2012] BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters
    Alaggan, Mohammad, Gambs, Sébastien, and Kermarrec, Anne-Marie
    2012
  116. [congestion-tor12] Congestion-aware Path Selection for Tor
    Wang, Tao, Bauer, Kevin, Forero, Clara, and Goldberg, Ian
    02/2012 2012
  117. [Sadiq2012] CRISP: Collusion-resistant Incentive-compatible Routing and Forwarding in Opportunistic Networks
    Sadiq, Umair, Kumar, Mohan, and Wright, Matthew
    2012
  118. [DBLP:journals/corr/abs-1202-4503] A Critical Look at Decentralized Personal Data Architectures
    Narayanan, Arvind, Toubiana, Vincent, Barocas, Solon, Nissenbaum, Helen, and Boneh, Dan
    CoRR 02/2012 2012
  119. [Dodis2012] Differential Privacy with Imperfect Randomness
    Dodis, Yevgeniy, López-Alt, Adriana, Mironov, Ilya, and Vadhan, Salil
    2012
  120. [gossipico2012] Gossip-based counting in dynamic networks
    Bovenkamp, Ruud, Kuipers, Fernando, and Mieghem, Piet Van
    05/2012 2012
  121. [DBLP:conf/tridentcom/HermenierR12] How to Build a Better Testbed: Lessons from a Decade of Network Experiments on Emulab
    Hermenier, Fabien, and Ricci, Robert
    2012
  122. [Guha2012] Koi: A Location-Privacy Platform for Smartphone Apps
    Guha, Saikat, Jain, Mudit, and Padmanabhan, Venkata
    Apr 2012
  123. [oakland2012-lap] LAP: Lightweight Anonymity and Privacy
    Hsiao, Hsu-Chun, Kim, Tiffany Hyun-Jin, Perrig, Adrian, Yamada, Akira, Nelson, Sam, Gruteser, Marco, and Ming, Wei
    05/2012 2012
  124. [oakland2012-lastor] LASTor: A Low-Latency AS-Aware Tor Client
    Akhoondi, Masoud, Yu, Curtis, and Madhyastha, Harsha V.
    05/2012 2012
  125. [De2012] Lower Bounds in Differential Privacy
    De, Anindya
    2012
  126. [rossi2012modelnet] ModelNet-TE: An emulation tool for the study of P2P and traffic engineering interaction dynamics
    Rossi, D., Veglia, P., Sammarco, M., and Larroca, F.
    Peer-to-Peer Networking and Applications 2012
  127. [Halim2012] Monkey: Automated debugging of deployed distributed systems
    Halim, Safey A.
    07/2012 2012
  128. [Wander2012] NTALG - TCP NAT traversal with application-level gateways
    Wander, M., Holzapfel, S., Wacker, A., and Weis, T.
    2012
  129. [Wang2012] Octopus: A Secure and Anonymous DHT Lookup
    Wang, Qiyan, and Borisov, Nikita
    CoRR 2012
  130. [oakland2012-peekaboo] Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
    Dyer, Kevin P., Coull, Scott, Ristenpart, Thomas, and Shrimpton, Thomas
    05/2012 2012
  131. [Toch2012] Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
    Toch, Eran, Wang, Yang, and Cranor, LorrieFaith
    User Modeling and User-Adapted Interaction 2012
  132. [DBLP:conf/focs/DworkNV12] The Privacy of the Analyst and the Power of the State
    Dwork, Cynthia, Naor, Moni, and Vadhan, Salil P.
    2012
  133. [moin:tel-00724121] Recommendation and Visualization Techniques for Large Scale Data
    Moin, Afshin
    Jul 2012
  134. [handigol2012reproducible] Reproducible network experiments using container based emulation
    Handigol, N., Heller, B., Jeyakumar, V., Lantz, B., and McKeown, N.
    Proc. CoNEXT 2012
  135. [Pitoura2012] Saturn: Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems
    Pitoura, Theoni, Ntarmos, Nikos, and Triantafillou, Peter
    IEEE Transactions on Knowledge and Data Engineering 07/2012 2012
  136. [Zhou2012] The state-of-the-art in personalized recommender systems for social networking
    Zhou, Xujuan, Xu, Yue, Li, Yuefeng, Josang, Audun, and Cox, Clive
    Artificial Intelligence Review 2012
  137. [Browne2012] A Survey of Monte Carlo Tree Search Methods
    Browne, Cameron, Powley, Edward, Whitehouse, Daniel, Lucas, Simon, Cowling, Peter I., Rohlfshagen, Philipp, Tavener, Stephen, Perez, Diego, Samothrakis, Spyridon, and Colton, Simon
    IEEE Transactions on Computational Intelligence and AI in Games 03/2012 2012
  138. [Tarkoma2012] Theory and Practice of Bloom Filters for Distributed Systems
    Tarkoma, S., Rothenberg, C.E., and Lagerspetz, E.
    Communications Surveys Tutorials, IEEE First 2012
  139. [Zeng2012] User Interests Driven Web Personalization Based on Multiple Social Networks
    Zeng, Yi, Zhong, Ning, Ren, Xu, and Wang, Yan
    2012
  140. [pets2011-bagai] An Accurate System-Wide Anonymity Metric for Probabilistic Attacks
    Bagai, Rajiv, Lu, Huabo, Li, Rong, and Tang, Bin
    07/2011 2011
  141. [bnymble11] BNymble: More anonymous blacklisting at almost no cost
    Lofgren, Peter, and Hopper, Nicholas J.
    02/2011 2011
  142. [wpes11-bridgespa] BridgeSPA: Improving Tor Bridges with Single Packet Authorization
    Smits, Rob, Jain, Divam, Pidcock, Sarah, Goldberg, Ian, and Hengartner, Urs
    10/2011 2011
  143. [ccs2011-cirripede] Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
    Houmansadr, Amir, Nguyen, Giang T. K., Caesar, Matthew, and Borisov, Nikita
    10/2011 2011
  144. [Bai2011] Collaborative Personalized Top-k Processing
    Bai, Xiao, Guerraoui, Rachid, Kermarrec, Anne-Marie, and Leroy, Vincent
    ACM Trans. Database Syst. 2011
  145. [Shapiro2011] A comprehensive study of Convergent and Commutative Replicated Data Types
    Shapiro, Marc, Preguica, Nuno, Baquero, Carlos, and Zawirski, Marek
    01/2011 2011
  146. [Furness2011] Considering Complex Search Techniques in DHTs under Churn
    Furness, Jamie, and Kolberg, Mario
    01/2011 2011
  147. [foci11-decoy] Decoy Routing: Toward Unblockable Internet Communication
    Karlin, Josh, Ellard, Daniel, Jackson, Alden W., Jones, Christine E., Lauer, Greg, Mankins, David P., and Strayer, W. Timothy
    08/2011 2011
  148. [pets2011-defenestrator] DefenestraTor: Throwing out Windows in Tor
    AlSabah, Mashael, Bauer, Kevin, Goldberg, Ian, Grunwald, Dirk, McCoy, Damon, Savage, Stefan, and Voelker, Geoffrey M.
    07/2011 2011
  149. [Beimel2011] Distributed Private Data Analysis: On Simultaneously Solving How and What
    Beimel, Amos, Nissim, Kobbi, and Omri, Eran
    CoRR 2011
  150. [cset11-experimentor] ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation
    Bauer, Kevin, Sherr, Micah, McCoy, Damon, and Grunwald, Dirk
    08/2011 2011
  151. [acsac11-tortoise] Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise
    Moore, W. Brad, Wacek, Chris, and Sherr, Micah
    12/2011 2011
  152. [acsac11-backlit] Exposing Invisible Timing-based Traffic Watermarks with BACKLIT
    Luo, Xiapu, Zhou, Peng, Zhang, Junjie, Perdisci, Roberto, Lee, Wenke, and Chang, Rocky K. C.
    12/2011 2011
  153. [wpes11-faust] FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting
    Lofgren, Peter, and Hopper, Nicholas J.
    10/2011 2011
  154. [Prusty:2011:FIO:2046707.2046731] Forensic investigation of the OneSwarm anonymous filesharing system
    Prusty, Swagatika, Levine, Brian Neil, and Liberatore, Marc
    2011
  155. [oakland11-formalizing] Formalizing Anonymous Blacklisting Systems
    Henry, Ryan, and Goldberg, Ian
    05/2011 2011
  156. [Lee2011] How Much Is Enough? Choosing ε for Differential Privacy
    Lee, Jaewoo, and Clifton, Chris
    2011
  157. [kevin-thesis] Improving Security and Performance in Low Latency Anonymity Networks
    Bauer, Kevin
    05/2011 2011
  158. [wk11-malice-vs-anon] Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection
    Westermann, Benedikt, and Kesdogan, Dogan
    02/2011 2011
  159. [Tariq:2011:MSQ:2063320.2063330] Meeting subscriber-defined QoS constraints in publish/subscribe systems
    Tariq, Muhammad Adnan, Koldehofe, Boris, Koch, Gerald G., Khan, Imran, and Rothermel, Kurt
    Concurr. Comput. : Pract. Exper. 2011
  160. [Das2011] Multi-objective optimization based privacy preserving distributed data mining in Peer-to-Peer networks
    Das, Kamalika, Bhaduri, Kanishka, and Kargupta, Hillol
    Peer-to-Peer Networking and Applications 2011
  161. [LEBLOND:2011:INRIA-00574178:1] One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
    Le Blond, Stevens, Manils, Pere, Abdelberi, Chaabane, Kaafar, Mohamed Ali, Castelluccia, Claude, Legout, Arnaud, and Dabbous, Walid
    Mar 2011
  162. [perea-tissec11] PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
    Au, Man Ho, Tsang, Patrick P., and Kapadia, Apu
    ACM Transactions on Information and System Security (ACM TISSEC) 12/2011 2011
  163. [usenix11-pirtor] PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval
    Mittal, Prateek, Olumofin, Femi, Troncoso, Carmela, Borisov, Nikita, and Goldberg, Ian
    08/2011 2011
  164. [DK11] Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation
    Dreier, Jannik, and Kerschbaum, Florian
    10/2011 2011
  165. [Herrmann2011] Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P
    Herrmann, Michael
    03/2011 2011
  166. [herrmann2010pet] Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P
    Herrmann, Michael, and Grothoff, Christian
    04/2011 2011
  167. [Alaggan2011] Private Similarity Computation in Distributed Systems: From Cryptography to Differential Privacy
    Alaggan, Mohammad, Gambs, Sébastien, and Kermarrec, Anne-Marie
    2011
  168. [proximax11] Proximax: Fighting Censorship With an Adaptive System for Distribution of Open Proxies
    Levchenko, Kirill, and McCoy, Damon
    02/2011 2011
  169. [DBLP:conf/dbsec/Kerschbaum11] Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity
    Kerschbaum, Florian
    2011
  170. [Alvim2011] On the Relation Between Differential Privacy and Quantitative Information Flow
    Alvim, Mário S., and Andrés, Miguel E.
    2011
  171. [cryptoeprint:2011:232] Remote Timing Attacks are Still Practical
    Brumley, Billy Bob, and Tuveri, Nicola
    04/2011 2011
  172. [Murillo:2011:SCT:1938287.1938323] Schedule coordination through egalitarian recurrent multi-unit combinatorial auctions
    Murillo, Javier, Muñoz, Vı́ctor, Busquets, Dı́dac, and López, Beatriz
    Applied Intelligence 04/2009 2011
  173. [Pibernik2011] Secure collaborative supply chain planning and inverse optimization - The JELS model
    Pibernik, Richard, Zhang, Yingying, Kerschbaum, Florian, and Schröpfer, Axel
    European Journal of Operations Research 01/2011 2011
  174. [conf/ndss/BackesMP11] A Security API for Distributed Social Networks.
    Backes, Michael, Maffei, Matteo, and Pecina, Kim
    02/2011 2011
  175. [DBLP:conf/sigecom/GhoshR11] Selling Privacy at Auction
    Ghosh, Arpita, and Roth, Aaron
    2011
  176. [Frey2011] Social Market: Combining Explicit and Implicit Social Networks
    Frey, Davide, Jégou, Arnaud, and Kermarrec, Anne-Marie
    2011
  177. [ccs2011-stealthy] Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting
    Mittal, Prateek, Khurshid, Ahmed, Juen, Joshua, Caesar, Matthew, and Borisov, Nikita
    10/2011 2011
  178. [Houmansadr2011] SWIRL: A Scalable Watermark to Detect Correlated Network Flows
    Houmansadr, Amir, and Borisov, Nikita
    02/2011 2011
  179. [usenix11-telex] Telex: Anticensorship in the Network Infrastructure
    Wustrow, Eric, Wolchok, Scott, Goldberg, Ian, and Halderman, J. Alex
    08/2005 2011
  180. [ccs2011-trust] Trust-based Anonymous Communication: Adversary Models and Routing Algorithms
    Johnson, Aaron, Syverson, Paul, Dingledine, Roger, and Mathewson, Nick
    10/2011 2011
  181. [Yang:2011:USN:2068816.2068841] Uncovering social network sybils in the wild
    Yang, Zhi, Wilson, Christo, Wang, Xiao, Gao, Tingting, Zhao, Ben Y., and Dai, Yafei
    11/2011 2011
  182. [wpes11-panchenko] Website Fingerprinting in Onion Routing Based Anonymization Networks
    Panchenko, Andriy, Niessen, Lukas, Zinnen, Andreas, and Engel, Thomas
    10/2011 2011
  183. [Mittal2011] X-Vine: Secure and Pseudonymous Routing Using Social Networks
    Mittal, Prateek, Caesar, Matthew, and Borisov, Nikita
    Computer Research Repository 9/2011 2011
  184. [Calandrino2011] "You Might Also Like:" Privacy Risks of Collaborative Filtering
    Calandrino, J.A., Kilzer, A., Narayanan, A., Felten, E.W., and Shmatikov, V.
    May 2011
  185. [Kermarrec2010] Application of Random Walks to Decentralized Recommender Systems
    Kermarrec, Anne-Marie, Leroy, Vincent, Moin, Afshin, and Thraves, Christopher
    09/2010 2010
  186. [Huebsch2010] The Ariba Framework for Application Development using Service Overlays
    Hübsch, Christian, Mayer, Christoph P., and Waldhorst, Oliver
    Praxis der Informationsverarbeitung und Kommunikation 2010
  187. [Yeoh:2008:BAB:1402298.1402307] BnB-ADOPT: an asynchronous branch-and-bound DCOP algorithm
    Yeoh, William, Felner, Ariel, and Koenig, Sven
    Journal of Artificial Intelligence Research 2010
  188. [incentives-fc10] Building Incentives into Tor
    Ngan, Tsuen-Wan ‘‘Johnny’’, Dingledine, Roger, and Wallach, Dan S.
    Jan 2010
  189. [1827424] Cordies: expressive event correlation in distributed systems
    Koch, Gerald G., Koldehofe, Boris, and Rothermel, Kurt
    2010
  190. [continual] Differential Privacy Under Continual Observation
    Dwork, Cynthia, Naor, Moni, Pitassi, Toniann, and Rothblum, Guy N.
    Jun 2010
  191. [Dwork2010] On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy
    Dwork, Cynthia, and Naor, Moni
    Journal of Privacy and Confidentiality 2010
  192. [vleroythesis] Distributing social applications
    Leroy, Vincent
    Dec 2010
  193. [Danezis2010] Drac: An Architecture for Anonymous Low-Volume Communications
    Danezis, George, Diaz, Claudia, Troncoso, Carmela, and Laurie, Ben
    2010
  194. [Cholez2010] Efficient DHT attack mitigation through peers’ ID distribution
    Cholez, Thibault, Chrisment, Isabelle, and Festor, Olivier
    04/2010 2010
  195. [Koch:2010:EPL:1827418.1827440] Event processing for large-scale distributed games
    Koch, Gerald G., Tariq, Muhammad Adnan, Koldehofe, Boris, and Rothermel, Kurt
    2010
  196. [DBLP:conf/middleware/BertierFGKL10] The Gossple Anonymous Social Network
    Bertier, Marin, Frey, Davide, Guerraoui, Rachid, Kermarrec, Anne-Marie, and Leroy, Vincent
    2010
  197. [duminuco:hierarchical] Hierarchical codes: A flexible trade-off for erasure codes in peer-to-peer storage systems.
    Duminuco, Alessandro, and Biersack, E W
    Peer-to-Peer Networking and Applications 03/2009 2010
  198. [Wen2010] How Accurately Can One’s Interests Be Inferred from Friends?
    Wen, Zhen, and Lin, Ching-Yung
    2010
  199. [tissec-latency-leak] How Much Anonymity does Network Latency Leak?
    Hopper, Nicholas J., Vasserman, Eugene Y., and Chan-Tin, Eric
    ACM Transactions on Information and System Security Forthcoming 2010
  200. [DBLP:conf/tridentcom/NguyenRKFMB10] How to Build Complex, Large-Scale Emulated Networks
    Nguyen, Hung X., Roughan, Matthew, Knight, Simon, Falkner, Nick, Maennel, Olaf, and Bush, Randy
    2010
  201. [Gamiochipi2010] Incentive-driven QoS in peer-to-peer overlays
    Gamiochipi, Raul Leonardo Landa
    05/2010 2010
  202. [Chan2010] Malugo: A peer-to-peer storage system
    Chan, Yu-Wei, Ho, Tsung-Hsuan, Shih, Po-Chi, and Chung, Yeh-Ching
    2010
  203. [DBLP:conf/tridentcom/AlbrechtH10] Managing Distributed Applications Using Gush
    Albrecht, Jeannie R., and Huang, Danny Yuxing
    2010
  204. [DBLP:conf/tridentcom/PeralaPML10] A Novel Testbed for P2P Networks
    Perälä, Pekka H. J., Paananen, Jori P., Mukhopadhyay, Milton, and Laulajainen, Jukka-Pekka
    2010
  205. [Locher:2010:PKN:2018057.2018085] Poisoning the Kad network
    Locher, Thomas, Mysicka, David, Schmid, Stefan, and Wattenhofer, Roger
    01/2010 2010
  206. [FessiIPTComm2010] Pr2-P2PSIP: Privacy Preserving P2P Signaling for VoIP and IM
    Fessi, Ali, Evans, Nathan S, Niedermayer, Heiko, and Holz, Ralph
    Aug 2010
  207. [Isdal:2010:PPD:1851275.1851198] Privacy-preserving P2P data sharing with OneSwarm
    Isdal, Tomas, Piatek, Michael, Krishnamurthy, Arvind, and Anderson, Thomas
    SIGCOMM Comput. Commun. Rev. 2010
  208. [1667071] Privacy-preserving similarity-based text retrieval
    Pang, Hweehwa, Shen, Jialie, and Krishnan, Ramayya
    ACM Trans. Internet Technol. 2010
  209. [Inan2010] Private Record Matching Using Differential Privacy
    Inan, Ali, Kantarcioglu, Murat, Ghinita, Gabriel, and Bertino, Elisa
    2010
  210. [1827425] Providing basic security mechanisms in broker-less publish/subscribe systems
    Tariq, Muhammad Adnan, Koldehofe, Boris, Altaweel, Ala, and Rothermel, Kurt
    2010
  211. [1672334] Reconnecting the internet with ariba: self-organizing provisioning of end-to-end connectivity in heterogeneous networks
    Hübsch, Christian, Mayer, Christoph P., Mies, Sebastian, Bless, Roland, Waldhorst, Oliver, and Zitterbart, Martina
    SIGCOMM Comput. Commun. Rev. 2010
  212. [Huebsch2010a] On Runtime Adaptation of Application-Layer Multicast Protocol Parameters
    Hübsch, Christian, Mayer, Christoph P., and Waldhorst, Oliver
    2010
  213. [Krause2010] Scalable Application-Layer Multicast Simulations with OverSim
    Krause, Stephan, and Hübsch, Christian
    2010
  214. [Burkhart:2010:SPA:1929820.1929840] SEPIA: privacy-preserving aggregation of multi-domain network events and statistics
    Burkhart, Martin, Strasser, Mario, Many, Dilip, and Dimitropoulos, Xenofontas
    08/2010 2010
  215. [Marks2010a] Unleashing Tor, BitTorrent & Co.: How to Relieve TCP Deficiencies in Overlays
    Marks, Daniel, Tschorsch, Florian, and Scheuermann, Bjoern
    2010
  216. [Huebsch2010b] User-perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups
    Hübsch, Christian, Mayer, Christoph P., and Waldhorst, Oliver
    2010 2010
  217. [Huebsch2010c] Using Legacy Applications in Future Heterogeneous Networks with ariba
    Hübsch, Christian, Mayer, Christoph P., Mies, Sebastian, Bless, Roland, Waldhorst, Oliver, and Zitterbart, Martina
    2010
  218. [DBLP:conf/ccs/EdmanS09] AS-awareness in Tor path selection
    Edman, Matthew, and Syverson, Paul
    2009
  219. [Attrapadung:2009:AES:1696791.1696811] Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
    Attrapadung, Nuttapong, and Imai, Hideki
    12/2009 2009
  220. [DBLP:conf/ccs/TroncosoD09] The bayesian traffic analysis of mix networks
    Troncoso, Carmela, and Danezis, George
    2009
  221. [1659021] Bloom filters and overlays for routing in pocket switched networks
    Mayer, Christoph P.
    2009
  222. [Knoll:2009:BPS:1590968.1591829] Bootstrapping Peer-to-Peer Systems Using IRC
    Knoll, Mirko, Helling, Matthias, Wacker, Arno, Holzapfel, Sebastian, and Weis, Torben
    06/2009 2009
  223. [Bortnikov2009] Brahms: Byzantine Resilient Random Membership Sampling
    Bortnikov, Edward, Gurevich, Maxim, Keidar, Idit, Kliot, Gabriel, and Shraer, Alexander
    Computer Networks Journal (COMNET), Special Issue on Gossiping in Distributed Systems Apr 2009
  224. [DBLP:conf/sss/Kermarrec09] Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLE
    Kermarrec, Anne-Marie
    2009
  225. [Holz2009] CLIO/UNISONO: practical distributed and overlay- wide network measurement
    Holz, Ralph, and Haage, Dirk
    2009
  226. [Melchor2009] A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust
    Melchor, C.A., Ait-Salem, B., and Gaborit, P.
    Jul 2009
  227. [DBLP:journals/tdp/NojimaK09] Cryptographically secure Bloom-filters
    Nojima, Ryo, and Kadobayashi, Youki
    Transactions on Data Privacy 2009
  228. [DBLP:conf/sp/NarayananS09] De-anonymizing Social Networks
    Narayanan, Arvind, and Shmatikov, Vitaly
    2009
  229. [Badishi:2009:DFC:1550962.1551186] Deleting files in the Celeste peer-to-peer storage system
    Badishi, Gal, Caronni, Germano, Keidar, Idit, Rom, Raphael, and Scott, Glenn
    Journal of Parallel and Distributed Computing 07/2009 2009
  230. [McSherry2009] Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders
    McSherry, Frank, and Mironov, Ilya
    2009
  231. [Huebsch2009] Enhancing Application-Layer Multicast Solutions by Wireless Underlay Support
    Hübsch, Christian, and Waldhorst, Oliver
    2009
  232. [Bucher2009] Evaluation of Current P2P-SIP Proposals with Respect to the Igor/SSR API
    Bucher, Markus
    2009
  233. [Cholez:2009:ESA:1574663.1574671] Evaluation of Sybil Attacks Protection Schemes in KAD
    Cholez, Thibault, Chrisment, Isabelle, and Festor, Olivier
    06/2009 2009
  234. [Bogetoft:2009:SMC:1601990.1602018] Financial Cryptography and Data Security
    Bogetoft, Peter, Christensen, Dan Lund, Damgárd, Ivan, Geisler, Martin, Jakobsen, Thomas, Krøigaard, Mikkel, Nielsen, Janus Dam, Nielsen, Jesper Buus, Nielsen, Kurt, Pagter, Jakob, Schwartzbach, Michael, and Toft, Tomas
    2009
  235. [wpes09-dht-attack] Hashing it out in public: Common failure modes of DHT-based anonymity schemes
    Tran, Andrew, Hopper, Nicholas J., and Kim, Yongdae
    Nov 2009
  236. [1656984] Heterogeneous gossip
    Frey, Davide, Guerraoui, Rachid, Kermarrec, Anne-Marie, Koldehofe, Boris, Mogensen, Martin, Monod, Maxime, and Quéma, Vivien
    2009
  237. [EURECOM+2885] Long term study of peer behavior in the KAD DHT
    Steiner, Moritz, En-Najjary, Taoufik, and Biersack, E W
    IEEE/ACM Transactions on Networking 05/2009 2009
  238. [1551621] Maintaining reference graphs of globally accessible objects in fully decentralized distributed systems
    Saballus, Bjoern, and Fuhrmann, Thomas
    2009
  239. [moscibroda:on] On Mechanism Design without Payments for Throughput Maximization.
    Moscibroda, Thomas, and Schmid, Stefan
    04/2009 2009
  240. [DBLP:conf/ccs/VassermanJTHK09] Membership-concealing overlay networks
    Vasserman, Eugene Y., Jansen, Rob, Tyra, James, Hopper, Nicholas J., and Kim, Yongdae
    2009
  241. [Schadd2009] Monte-Carlo Search Techniques in the Modern Board Game Thurn and Taxis
    Schadd, Frederik Christiaan
    12/2009 2009
  242. [SathyaNarayanan2009] Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
    Sathya Narayanan, G., Aishwarya, T., Agrawal, Anugrah, Patra, Arpita, Choudhary, Ashish, and Pandu Rangan, C.
    2009
  243. [nymble-tdsc] Nymble: Blocking Misbehaving Users in Anonymizing Networks
    Tsang, Patrick P., Kapadia, Apu, Cornelius, Cory, and Smith, Sean
    IEEE Transactions on Dependable and Secure Computing (TDSC) Sep 2009
  244. [Moran2009] An Optimally Fair Coin Toss
    Moran, Tal, Naor, Moni, and Segev, Gil
    2009
  245. [2009a] Optimization of distributed services with UNISONO
    2009
  246. [Schimmer2009] Peer Profiling and Selection in the I2P Anonymous Network
    Schimmer, Lars
    03/2009 2009
  247. [p2p09-peersim] PeerSim: A Scalable P2P Simulator
    Montresor, Alberto, Jelasity, Márk, Jesi, Gian Paolo, and Voulgaris, Spyros
    09/2009 2009
  248. [Plank:2009:PEE:1525908.1525927] A performance evaluation and examination of open-source erasure coding libraries for storage
    Plank, James S., Luo, Jianqiang, Schuman, Catherine D., Xu, Lihao, and Wilcox-O’Hearn, Zooko
    02/2009 2009
  249. [5328076] Performance Evaluation of On-Demand Multipath Distance Vector Routing Protocol under Different Traffic Models
    Malarkodi, B., Rakesh, P., and Venkataramani, B.
    Oct 2009
  250. [evans2009tor] A Practical Congestion Attack on Tor Using Long Paths
    Evans, Nathan S, Dingledine, Roger, and Grothoff, Christian
    2009
  251. [Duminuco:2009:PSR:1584339.1584602] A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems
    Duminuco, Alessandro, and Biersack, E W
    06/2009 2009
  252. [McSherry2009a] Privacy Integrated Queries: An Extensible Platform for Privacy-preserving Data Analysis
    McSherry, Frank D.
    2009
  253. [Tariqetal:2009:ProbLatencyBounds] Providing Probabilistic Latency Bounds for Dynamic Publish/Subscribe Systems
    Tariq, Muhammad Adnan, Koldehofe, Boris, Koch, Gerald G., and Rothermel, Kurt
    2009
  254. [conf/infocom/WuLR09] Queuing Network Models for Multi-Channel P2P Live Streaming Systems
    Wu, Di, Liu, Yong, and Ross, Keith W.
    04/2009 2009
  255. [wpes09-bridge-attack] On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking resistance design
    McLachlan, Jon, and Hopper, Nicholas J.
    Nov 2009
  256. [Awerbuch2009] Robust Random Number Generation for Peer-to-Peer Systems
    Awerbuch, Baruch, and Scheideler, Christian
    Theor. Comput. Sci. 2009
  257. [1658999] Scalable landmark flooding: a scalable routing protocol for WSNs
    Di, Pengfei, and Fuhrmann, Thomas
    2009
  258. [ccs09-torsk] Scalable onion routing with Torsk
    McLachlan, Jon, Tran, Andrew, Hopper, Nicholas J., and Kim, Yongdae
    Nov 2009
  259. [Mayer2009] Security and Privacy Challenges in the Internet of Things
    Mayer, Christoph P.
    2009
  260. [Houri2009] Self-organized Data Redundancy Management for Peer-to-Peer Storage Systems
    Houri, Yaser, Jobmann, Manfred, and Fuhrmann, Thomas
    2009
  261. [Mittal2009] ShadowWalker: Peer-to-peer Anonymous Communication Using Redundant Structured Topologies
    Mittal, Prateek, and Borisov, Nikita
    2009
  262. [Acher2009] A Software and Hardware IPTV Architecture for Scalable DVB Distribution
    International Journal of Digital Multimedia Broadcasting 2009
  263. [Harvey2009] Solving very large distributed constraint satisfaction problems
    Harvey, Peter
    12/2009 2009
  264. [DBLP:conf/sp/DanezisG09] Sphinx: A Compact and Provably Secure Mix Format
    Danezis, George, and Goldberg, Ian
    2009
  265. [Briones-Garcia2009] SPINE : Adaptive Publish/Subscribe for Wireless Mesh Networks
    Briones-Garcıa, Jorge Alfonso, Koldehofe, Boris, and Rothermel, Kurt
    2009
  266. [Holz2009a] SpoVNet Security Task Force Report
    Holz, Ralph, Mayer, Christoph P., Mies, Sebastian, Niedermayer, Heiko, and Tariq, Muhammad Adnan
    2009
  267. [DBLP:conf/infocom/LandaGCMR09] A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks
    Gamiochipi, Raul Leonardo Landa, Griffin, David, Clegg, Richard G., Mykoniati, Eleni, and Rio, Miguel
    04/2009 2009
  268. [Resnick:2009:STT:1566374.1566423] Sybilproof Transitive Trust Protocols
    Resnick, Paul, and Sami, Rahul
    07/2009 2009
  269. [Douglas-thesis] A taxonomy for and analysis of anonymous communications networks
    Kelly, Douglas
    Mar 2009
  270. [Mies2009] Towards End-to-End Connectivity for Overlays across Heterogeneous Networks
    Mies, Sebastian, Waldhorst, Oliver, and Wippel, Hans
    2009
  271. [DiPalantino2009] Traffic Engineering vs. Content Distribution: A Game Theoretic Perspective
    DiPalantino, Dominic, and Johari, Ramesh
    04/2009 2009
  272. [morphing09] Traffic Morphing: An efficient defense against statistical traffic analysis
    Wright, Charles, Coull, Scott, and Monrose, Fabian
    Feb 2009
  273. [Elser2009] Tuning Vivaldi: Achieving Increased Accuracy and Stability
    Elser, Benedikt, Förschler, Andreas, and Fuhrmann, Thomas
    2009
  274. [1582481] Using link-layer broadcast to improve scalable source routing
    Di, Pengfei, and Fuhrmann, Thomas
    2009 2009
  275. [ccsw09-fingerprinting] Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier
    Herrmann, Dominik, Wendolsky, Rolf, and Federrath, Hannes
    2009
  276. [1590633] Wireless Sensor Networks: A Survey
    Potdar, Vidyasagar, Sharif, Atif, and Chang, Elizabeth
    2009
  277. [DBLP:conf/esorics/DanezisDKT09] The Wisdom of Crowds: Attacks and Optimal Constructions
    Danezis, George, Diaz, Claudia, Käsper, Emilia, and Troncoso, Carmela
    2009
  278. [wpes09-xpay] XPay: Practical anonymous payments for Tor routing and other networked services
    Chen, Yao, Sion, Radu, and Carbunar, Bogdan
    Nov 2009
  279. [Eickhold2008] AmbiComp: A platform for distributed execution of Java programs on embedded systems by offering a single system image
    Eickhold, Johannes, Fuhrmann, Thomas, Saballus, Bjoern, Schlender, Sven, and Suchy, Thomas
    2008 2008
  280. [Huebsch2008] Analyzing Unreal Tournament 2004 Network Traffic Characteristics
    Hübsch, Christian
    2008
  281. [Zivan:2008:ALS:1402821.1402895] Anytime local search for distributed constraint optimization
    Zivan, Roie
    05/2008 2008
  282. [WongSirer2008ApproximateMatching] Approximate Matching for Peer-to-Peer Overlays with Cubit
    Bernard Wong, Aleksandrs Slivkins, and Sirer, Emin Gün
    2008
  283. [Yang:2008:ABD:1403027.1403032] Auction, but don’t block
    Yang, Xiaowei
    08/2008 2008
  284. [1387603] BFT protocols under fire
    Singh, Atul, Das, Tathagata, Maniatis, Petros, Druschel, Peter, and Roscoe, Timothy
    2008
  285. [bauer:alpaca2008] BitBlender: Light-Weight Anonymity for BitTorrent
    Bauer, Kevin, McCoy, Damon, Grunwald, Dirk, and Sicker, Douglas
    Sep 2008
  286. [Levin:2008:BAA:1402946.1402987] BitTorrent is an Auction: Analyzing and Improving BitTorrent’s Incentives
    Levin, Dave, LaCurts, Katrina, Spring, Neil, and Bhattacharjee, Bobby
    SIGCOMM Computer Communication Review 08/2008 2008
  287. [bootstrap2008gauthierdickey] Bootstrapping of Peer-to-Peer Networks
    GauthierDickey, Chis, and Grothoff, Christian
    Aug 2008
  288. [shimshock-pet2008] Breaking and Provably Fixing Minx
    Shimshock, Eric, Staats, Matt, and Hopper, Nicholas J.
    Jul 2008
  289. [danezis-pet2008] Bridging and Fingerprinting: Epistemic Attacks on Route Selection
    Danezis, George, and Syverson, Paul
    Jul 2008
  290. [1373992] Characterizing unstructured overlay topologies in modern P2P file-sharing systems
    Stutzbach, Daniel, Rejaie, Reza, and Sen, Subhabrata
    IEEE/ACM Trans. Netw. 2008
  291. [torspinISC08] Compromising Anonymity Using Packet Spinning
    Pappas, Vasilis, Athanasopoulos, Elias, Ioannidis, Sotiris, and Markatos, Evangelos P.
    Sep 2008
  292. [MarPi08] A Concept of an Anonymous Direct P2P Distribution Overlay System
    Margasinski, Igor, and Pioro, Michal
    Mar 2008
  293. [Schiele2008] Consistency Management for Peer-to-Peer-based Massively Multiuser Virtual Environments
    Schiele, Gregor, Süselbeck, Richard, Wacker, Arno, Triebel, Tonio, and Becker, Christian
    2008
  294. [2008a] The Decentralized File System Igor-FS as an Application for Overlay-Networks
    02/2008 2008
  295. [vrancx:decentralized] Decentralized Learning in Markov Games
    Vrancx, Peter, Verbeeck, Katja, and Nowé, Ann
    IEEE Transactions on Systems, Man, and Cybernetics, Part B 08/2008 2008
  296. [ccs2008:wang] Dependent Link Padding Algorithms for Low Latency Anonymity Systems
    Wang, Wei, Motani, Mehul, and Srinivasan, Vikram
    Oct 2008
  297. [Dischinger:2008:DBB:1452520.1452523] Detecting BitTorrent Blocking
    Dischinger, Marcel, Mislove, Alan, Haeberlen, Andreas, and Gummadi, P. Krishna
    10/2008 2008
  298. [clog-the-queue] Don’t Clog the Queue: Circuit Clogging and Mitigation in P2P anonymity schemes
    McLachlan, Jon, and Hopper, Nicholas J.
    Jan 2008
  299. [DBLP:journals/pvldb/Amer-YahiaBLS08] Efficient network aware search in collaborative tagging sites
    Amer-Yahia, Sihem, Benedikt, Michael, Lakshmanan, Laks V. S., and Stoyanovich, Julia
    PVLDB’08 Aug 2008
  300. [BecchiCrowley2008EfficientRegexEval] Efficient regular expression evaluation: theory to practice
    Becchi, Michela, and Crowley, Patrick
    2008
  301. [1373458] Efficient routing in intermittently connected mobile networks: the single-copy case
    Spyropoulos, Thrasyvoulos, Psounis, Konstantinos, and Raghavendra, Cauligi S.
    IEEE/ACM Trans. Netw. 2008
  302. [CoNext2008] EGOIST: Overlay Routing using Selfish Neighbor Selection
    Smaragdakis, Georgios, Lekakis, Vassilis, Laoutaris, Nikolaos, Bestavros, Azer, Byers, John W., and Roussopoulos, Mema
    Dec 2008
  303. [LOCEntropy2008] Entropy Bounds for Traffic Confirmation
    O’Connor, Luke
    Oct 2008
  304. [Bustos-Jimenez2008] Estimating The Size Of Peer-To-Peer Networks Using Lambert’s W Function
    Bustos-Jiménez, Javier, Bersano, Nicolás, Schaeffer, Satu Elisa, Piquer, José Miguel, Iosup, Alexandru, and Ciuffoletti, Augusto
    2008
  305. [Junges:2008:EPD:1402298.1402308] Evaluating the performance of DCOP algorithms in a real world, dynamic problem
    Junges, Robert, and Bazzan, Ana L. C.
    05/2008 2008
  306. [DBLP:conf/icc/ChenCLNC08] Experimental Analysis of Super-Seeding in BitTorrent
    Chen, Zhijia, Chen, Yang, Lin, Chuang, Nivargi, Vaibhav, and Cao, Pei
    05/2008 2008
  307. [Ben-David:2008:FSS:1455770.1455804] FairplayMP: a system for secure multi-party computation
    Ben-David, Assaf, Nisan, Noam, and Pinkas, Benny
    10/2008 2008
  308. [Bose2008] On the False-positive Rate of Bloom Filters
    Bose, Prosenjit, Guo, Hua, Kranakis, Evangelos, Maheshwari, Anil, Morin, Pat, Morrison, Jason, Smid, Michiel, and Tang, Yihui
    Inf. Process. Lett. 2008
  309. [Wang:2008:GAI:1412757.1412971] A game-theoretic analysis of the implications of overlay network traffic on ISP peering
    Wang, Jessie Hui, Chiu, Dah Ming, and Lui, John C. S.
    Computer Networks 10/2008 2008
  310. [saballus08gaos] Global Accessible Objects (GAOs) in the Ambicomp Distributed Java Virtual Machine
    Saballus, Bjoern, Eickhold, Johannes, and Fuhrmann, Thomas
    2008
  311. [back-hash] Hash cash - a denial of service counter-measure
    Back, Adam
    2008
  312. [Koch2008] Higher Confidence in Event Correlation Using Uncertainty Restrictions
    Koch, Gerald G., Koldehofe, Boris, and Rothermel, Kurt
    2008
  313. [sassaman-pet2008] How to Bypass Two Anonymity Revocation Systems
    Danezis, George, and Sassaman, Len
    Jul 2008
  314. [Boldyreva:2008:IEE:1455770.1455823] Identity-based encryption with efficient revocation
    Boldyreva, Alexandra, Goyal, Vipul, and Kumar, Virendra
    10/2008 2008
  315. [DBLP:conf/p2p/AmannEHF08] IgorFs: A Distributed P2P File System
    Amann, Bernhard, Elser, Benedikt, Houri, Yaser, and Fuhrmann, Thomas
    2008
  316. [diaz-pet2008] On the Impact of Social Network Profiling on Anonymity
    Diaz, Claudia, Troncoso, Carmela, and Serjantov, Andrei
    Jul 2008
  317. [improved-clockskew] An Improved Clock-skew Measurement Technique for Revealing Hidden Services
    Zander, Sebastian, and Murdoch, Steven J.
    Jul 2008
  318. [reardon-thesis] Improving Tor using a TCP-over-DTLS Tunnel
    Reardon, Joel
    Sep 2008
  319. [Aggarwal2008] Improving User and ISP Experience through ISP-aided P2P Locality
    Aggarwal, Vinay, Akonjang, Obi, and Feldmann, Anja
    04/2008 2008
  320. [ccs2008:mittal] Information Leaks in Structured Peer-to-peer Anonymous Communication Systems
    Mittal, Prateek, and Borisov, Nikita
    Oct 2008
  321. [Chen:2008:IRS:1331483.1331515] Insight into redundancy schemes in DHTs
    Chen, Guihai, Qiu, Tongqing, and Wu, Fan
    Journal of Supercomputing 02/2008 2008
  322. [DBLP:conf/usenix/HiblerRSDGSWL08] Large-scale Virtualization in the Emulab Network Testbed
    Hibler, Mike, Ricci, Robert, Stoller, Leigh, Duerig, Jonathon, Guruprasad, Shashi, Stack, Tim, Webb, Kirk, and Lepreau, Jay
    2008
  323. [nussbaum2008p2plab] Lightweight emulation to study peer-to-peer systems
    Nussbaum, Lucas, and Richard, Olivier
    Concurrency and Computation: Practice and Experience 2008
  324. [1390683] Linear-Time Computation of Similarity Measures for Sequential Data
    Rieck, Konrad, and Laskov, Pavel
    J. Mach. Learn. Res. 2008
  325. [1358311] Linyphi: creating IPv6 mesh networks with SSR
    Di, Pengfei, Eickhold, Johannes, and Fuhrmann, Thomas
    Concurr. Comput. : Pract. Exper. 2008
  326. [murdoch-pet2008] Metrics for Security and Performance in Low-Latency Anonymity Networks
    Murdoch, Steven J., and Watson, Robert N. M.
    Jul 2008
  327. [pizzonia2008netkit] Netkit: easy emulation of complex networks on inexpensive hardware
    Pizzonia, Maurizio, and Rimondini, Massimo
    2008
  328. [1341892] ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
    Awerbuch, Baruch, Curtmola, Reza, Holmer, David, Nita-Rotaru, Cristina, and Rubens, Herbert
    ACM Trans. Inf. Syst. Secur. 2008
  329. [Hartline:2008:OMD:1374376.1374390] Optimal mechanism design and money burning
    Hartline, Jason D., and Roughgarden, Tim
    05/2008 2008
  330. [Xie:2008:PPP:1402946.1402999] P4P: Provider Portal for Applications
    Xie, Haiyong, Yang, Y. Richard, Krishnamurthy, Arvind, Liu, Yanbin Grace, and Silberschatz, Abraham
    SIGCOMM Computer Communication Review 08/2008 2008
  331. [raykova-pet2008] PAR: Payment for Anonymous Routing
    Androulaki, Elli, Raykova, Mariana, Srivatsan, Shreyas, Stavrou, Angelos, and Bellovin, Steven M.
    Jul 2008
  332. [ccs2008:tsang] PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication
    Tsang, Patrick P., Au, Man Ho, Kapadia, Apu, and Smith, Sean
    Oct 2008
  333. [troncoso-pet2008] Perfect Matching Statistical Disclosure Attacks
    Troncoso, Carmela, Gierlichs, Benedikt, Preneel, Bart, and Verbauwhede, Ingrid
    Jul 2008
  334. [loesing2008performance] Performance Measurements and Statistics of Tor Hidden Services
    Loesing, Karsten, Sandmann, Werner, Wilms, Christian, and Wirtz, Guido
    Jul 2008
  335. [Shafaat:2008:PAN:1485753.1485763] A Practical Approach to Network Size Estimation for Structured Overlays
    Shafaat, Tallat M., Ghodsi, Ali, and Haridi, Seif
    12/2008 2008
  336. [Faltings2008] Privacy guarantees through distributed constraint satisfaction
    Faltings, Boi, Leaute, Thomas, and Petcu, Adrian
    04/2008 2008
  337. [springerlink:10.1007/978-0-387-70992-5] Privacy-Preserving Data Mining: Models and Algorithms
    2008
  338. [Chaslot2008] Progressive Strategies for Monte-Carlo Tree Search
    Chaslot, Guillaume M. J-B., Winands, Mark H. M., Herik, H. Jaap, Uiterwijk, Jos W. H. M., and Bouzy, Bruno
    New Mathematics and Natural Computation 2008
  339. [di08iptps] Providing KBR Service for Multiple Applications
    Di, Pengfei, Kutzner, Kendy, and Fuhrmann, Thomas
    2008
  340. [quant-adhoc] Quantification of Anonymity for Mobile Ad Hoc Networks
    Moe, Marie Elisabeth Gaup
    Jun 2008
  341. [Goldberg:2008:RTA:1402958.1402989] Rationality and Traffic Attraction: Incentives for Honest Path Announcements in BGP
    Goldberg, Sharon, Halevi, Shai, Jaggard, Aaron D., Ramachandran, Vijay, and Wright, Rebecca N.
    10/2008 2008
  342. [androulaki-pet2008] Reputation Systems for Anonymous Networks
    Androulaki, Elli, Choi, Seung Geol, Bellovin, Steven M., and Malkin, Tal
    Jul 2008
  343. [Narayanan2008] Robust De-anonymization of Large Sparse Datasets
    Narayanan, Arvind, and Shmatikov, Vitaly
    2008
  344. [mccoy-pet2008] Shining Light in Dark Places: Understanding the Tor Network
    McCoy, Damon, Bauer, Kevin, Grunwald, Dirk, Kohno, Tadayoshi, and Sicker, Douglas
    Jul 2008
  345. [1461118] Shortest-path routing in randomized DHT-based Peer-to-Peer systems
    Wang, Chih-Chiang, and Harfoush, Khaled
    Comput. Netw. 2008
  346. [Bless2008] The Spontaneous Virtual Networks Architecture for Supporting Future Internet Services and Applications
    Bless, Roland, Waldhorst, Oliver, and Mayer, Christoph P.
    2008
  347. [conf/infocom/WangLX08] Stable Peers: Existence, Importance, and Application in Peer-to-Peer Live Video Streaming
    Wang, Feng, Liu, Jiangchuan, and Xiong, Yongqiang
    04/2008 2008
  348. [DD08Survey] A Survey of Anonymous Communication Channels
    Danezis, George, and Diaz, Claudia
    Jan 2008
  349. [Infocom2008] Swarming on Optimized Graphs for n-way Broadcast
    Smaragdakis, Georgios, Laoutaris, Nikolaos, Michiardi, Pietro, Bestavros, Azer, Byers, John W., and Roussopoulos, Mema
    Apr 2008
  350. [1456474] Tahoe: the least-authority filesystem
    Wilcox-O’Hearn, Zooko, and Warner, Brian
    2008
  351. [fuhrmann08comparable] Towards Comparable Network Simulations
    Di, Pengfei, Houri, Yaser, Kutzner, Kendy, and Fuhrmann, Thomas
    Aug 2008
  352. [Wang2008a] Towards Empirical Aspects of Secure Scalar Product
    Wang, I-Cheng, Shen, Chih-Hao, Hsu, Tsan-sheng, Liao, Churn-Chung, Wang, Da-Wei, and Zhan, J.
    Apr 2008
  353. [Pouwelse:2008:TSP:1331115.1331119] TRIBLER: a Social-based Peer-to-Peer System
    Pouwelse, Johan, Garbacki, Pawel, Wang, Jun, Bakker, Arno, Yang, Jie, Iosup, Alexandru, Epema, Dick H. J., Reinders, Marcel J. T., Steen, Maarten, and Sips, Henk J.
    Concurrency and Computation: Practice & Experience 02/2008 2008
  354. [1424615] Trust-Rated Authentication for Domain-Structured Distributed Systems
    Holz, Ralph, Niedermayer, Heiko, Hauck, Peter, and Carle, Georg
    2008
  355. [snader08] A Tune-up for Tor: Improving Security and Performance in the Tor Network
    Snader, Robin, and Borisov, Nikita
    Feb 2008
  356. [Bless2008a] The Underlay Abstraction in the Spontaneous Virtual Networks (SpoVNet) Architecture
    Bless, Roland, Hübsch, Christian, Mies, Sebastian, and Waldhorst, Oliver
    2008
  357. [Durner2008] Unerkannt. Anonymisierende Peer-to-Peer-Netze im Überblick
    Durner, Nils, Evans, Nathan S, and Grothoff, Christian
    2008
  358. [Kasiviswanathan2008] What Can We Learn Privately?
    Kasiviswanathan, Shiva Prasad, Lee, Homin K., Nissim, Kobbi, Raskhodnikova, Sofya, and Smith, Adam
    CoRR 2008
  359. [Jian:2008:WSP:1409540.1409546] Why Share in Peer-to-Peer Networks?
    Jian, Lian, and MacKie-Mason, Jeffrey K.
    08/2008 2008
  360. [Garbacki2007] An Amortized Tit-For-Tat Protocol for Exchanging Bandwidth instead of Content in P2P Networks
    Garbacki, Pawel, Epema, Dick H. J., and Steen, Maarten
    07/2007 2007
  361. [Steiner2007] Analyzing Peer Behavior in KAD
    Steiner, Moritz, En-Najjary, Taoufik, and Biersack, E W
    10/2007 2007
  362. [VenHeTon07] Anonymous Networking amidst Eavesdroppers
    Venkitasubramaniam, Parvathinathan, He, Ting, and Tong, Lang
    Oct 2007
  363. [di07mass] Application of DHT-Inspired Routing for Object Tracking
    Di, Pengfei, Houri, Yaser, Wei, Qing, Widmer, Jörg, and Fuhrmann, Thomas
    2007
  364. [Ostrovsky:2007:AEN:1315245.1315270] Attribute-based encryption with non-monotonic access structures
    Ostrovsky, Rafail, Sahai, Amit, and Waters, Brent
    10/2007 2007
  365. [Neumann2007] B.A.T.M.A.N Status Report
    Neumann, Axel, Aichele, Corinna Elektra, and Lindner, Marek
    2007
  366. [ccs07-blac] Blacklistable Anonymous Credentials: Blocking Misbehaving Users without TTPs
    Tsang, Patrick P., Au, Man Ho, Kapadia, Apu, and Smith, Sean
    Oct 2007
  367. [Terpstra:2007:BRP:1282427.1282387] Bubblestorm: resilient, probabilistic, and exhaustive peer-to-peer search
    Terpstra, Wesley W., Kangasharju, Jussi, Leng, Christof, and Buchmann, Alejandro P.
    SIGCOMM Computer Communication Review 08/2007 2007
  368. [cosic-2007-001] The Byzantine Postman Problem: A Trivial Attack Against PIR-based Nym Servers
    Sassaman, Len, and Preneel, Bart
    Feb 2007
  369. [1759877] CFR: a peer-to-peer collaborative file repository system
    Lin, Meng-Ru, Lu, Ssu-Hsuan, Ho, Tsung-Hsuan, Lin, Peter, and Chung, Yeh-Ching
    2007
  370. [1329865] Cheat-proof event ordering for large-scale distributed multiplayer games
    GauthierDickey, Chis
    2007
  371. [Lee2007CISS] CISS: An efficient object clustering framework for DHT-based peer-to-peer applications
    Lee, Jinwon, Lee, Hyonik, Kang, Seungwoo, Kim, Su Myeon, and Song, Junehwa
    Comput. Netw. 2007
  372. [conf/acsac/ADC07] Closed-Circuit Unobservable Voice Over IP
    Melchor, Carlos Aguilar, Deswarte, Yves, and Iguchi-Cartigny, Julien
    2007
  373. [EdmanSY07] A Combinatorial Approach to Measuring Anonymity
    Edman, Matthew, Sivrikaya, Fikret, and Yener, Bülent
    Intelligence and Security Informatics, 2007 IEEE May 2007
  374. [1273450] On compact routing for the internet
    Krioukov, Dmitri, Fall, Kevin, and Brady, Arthur
    SIGCOMM Comput. Commun. Rev. 2007
  375. [Courtes2007] Cooperative Data Backup for Mobile Devices
    Courtes, Ludovic
    03/2008 2007
  376. [fessi-iptcomm2007] A cooperative SIP infrastructure for highly reliable telecommunication services
    Fessi, Ali, Niedermayer, Heiko, Kinkelin, Holger, and Carle, Georg
    2007
  377. [DBLP:conf/esorics/MalleshW07] Countering Statistical Disclosure with Receiver-Bound Cover Traffic
    Mallesh, Nayantara, and Wright, Matthew
    2007
  378. [steven-thesis] Covert channel vulnerabilities in anonymity systems
    Murdoch, Steven J.
    Dec 2007
  379. [ccs07-doa] Denial of Service or Denial of Security? How Attacks on Reliability can Compromise Anonymity
    Borisov, Nikita, Danezis, George, Mittal, Prateek, and Tabriz, Parisa
    Oct 2007
  380. [1345798] Dependability Evaluation of Cooperative Backup Strategies for Mobile Devices
    Courtes, Ludovic, Hamouda, Ossama, Kaaniche, Mohamed, Killijian, Marc-Olivier, and Powell, David
    2007
  381. [wiangsripanawan-acsw07] Design principles for low latency anonymous network systems secure against timing attacks
    Wiangsripanawan, Rungrat, Susilo, Willy, and Safavi-Naini, Rei
    2007
  382. [Piatek2007] Do incentives build robustness in BitTorrent?
    Piatek, Michael, Isdal, Tomas, Anderson, Thomas, Krishnamurthy, Arvind, and Venkataramani, Arun
    04/2007 2007
  383. [diaz-wpes2007] Does additional information always reduce anonymity?
    Diaz, Claudia, Troncoso, Carmela, and Danezis, George
    Oct 2007
  384. [Landsiedel_dynamicmultipath] Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks
    Landsiedel, Olaf, Pimenidis, Alexis, and Wehrle, Klaus
    2007
  385. [Coulom:2006:ESB:1777826.1777833] Efficient selectivity and backup operators in Monte-Carlo tree search
    Coulom, Rémi
    2007
  386. [Machanavajjhala2007] \ell-diversity: Privacy beyond k-anonymity
    Machanavajjhala, Ashwin, Kifer, Daniel, Gehrke, Johannes, and Venkitasubramaniam, Muthuramakrishnan
    ACM Transactions on Knowledge Discovery from Data (TKDD) 2007
  387. [Tang:2007:ESE:1260204.1260647] Empirical Study on the Evolution of PlanetLab
    Tang, Li, Chen, Yin, Li, Fei, Zhang, Hui, and Li, Jun
    04/2007 2007
  388. [Member_enablingadaptive] Enabling Adaptive Video Streaming in P2P Systems
    Jurca, Dan, Chakareski, Jacob, Wagner, Jean-Paul, and Frossard, Pascal
    IEEE Communications Magazine 2007
  389. [Stathopoulos07end-to-endrouting] End-to-end routing for dualradio sensor networks
    Stathopoulos, Thanos, Heidemann, John, Lukac, Martin, Estrin, Deborah, and Kaiser, William J.
    2007
  390. [Binzenhofer:2007:ECS:1769187.1769257] Estimating churn in structured P2P networks
    Binzenhöfer, Andreas, and Leibnitz, Kenji
    06/2007 2007
  391. [10.1109/WOWMOM.2007.4351805] A Game Theoretic Model of a Protocol for Data Possession Verification
    Oualha, Nouha, Michiardi, Pietro, and Roudier, Yves
    A World of Wireless, Mobile and Multimedia Networks, International Symposium on 2007
  392. [AthanRAM07] GAS: Overloading a File Sharing Network as an Anonymizing System
    Athanasopoulos, Elias, Roussopoulos, Mema, Anagnostakis, Kostas G., and Markatos, Evangelos P.
    2007
  393. [Steiner:2007:GVK:1298306.1298323] A global view of KAD
    Steiner, Moritz, En-Najjary, Taoufik, and Biersack, E W
    10/2007 2007
  394. [Jelasity2007] Gossip-based Peer Sampling
    Jelasity, Márk, Voulgaris, Spyros, Guerraoui, Rachid, Kermarrec, Anne-Marie, and Steen, Maarten
    ACM Trans. Comput. Syst. 2007
  395. [Kermarrec2007] Gossiping in Distributed Systems
    Kermarrec, Anne-Marie, and Steen, Maarten
    SIGOPS Oper. Syst. Rev. 2007
  396. [feldman:hidden-action] Hidden-Action in Network Routing
    Feldman, Michal, Chuang, John, Stoica, Ion, and Shenker, S
    IEEE Journal on Selected Areas in Communications 08/2007 2007
  397. [so64132] How robust are gossip-based communication protocols?
    Alvisi, Lorenzo, Doumen, Jeroen, Guerraoui, Rachid, Koldehofe, Boris, Li, Harry, Renesse, Robbert Van, and Tredan, Gilles
    Operating Systems Review Oct 2007
  398. [adida07] How to Shuffle in Public
    Adida, Ben, and Wikström, Douglas
    Feb 2007
  399. [Delerablee:2007:IBE:1781454.1781471] Identity-based broadcast encryption with constant size ciphertexts and private keys
    Delerablée, Cécile
    12/2007 2007
  400. [KongHG07] An Identity-Free and On-Demand Routing Scheme against Anonymity Threats in Mobile Ad Hoc Networks
    Kong, Jiejun, Hong, Xiaoyan, and Gerla, Mario
    IEEE Transactions on Mobile Computing 2007
  401. [Infocom2007-SNS] Implications of Selfish Neighbor Selection in Overlay Networks
    Laoutaris, Nikolaos, Smaragdakis, Georgios, Bestavros, Azer, and Byers, John W.
    May 2007
  402. [overlier-pet2007] Improving Efficiency and Simplicity of Tor circuit establishment and hidden services
    Øverlier, Lasse, and Syverson, Paul
    Jun 2007
  403. [1290327] On improving the efficiency of truthful routing in MANETs with selfish nodes
    Wang, Yongwei, and Singhal, Mukesh
    Pervasive Mob. Comput. 2007
  404. [goldberg-2007] Improving the Robustness of Private Information Retrieval
    Goldberg, Ian
    May 2007
  405. [slicing07] Information Slicing: Anonymity Using Unreliable Overlays
    Katti, Sachin, Cohen, Jeffery, and Katabi, Dina
    Apr 2007
  406. [Kendall2007] The Iterated Prisoner’s Dilemma: 20 Years On
    Kendall, Graham, Yao, Xin, and Ching, Siang Yew
    2007
  407. [Iii_keylessjam] Keyless Jam Resistance
    Baird, Leemon C., Bahn, William L., Collins, Michael D., Carlisle, Martin C., and Butler, Sean C.
    2007
  408. [DBLP:conf/saint/SaitoMSSM07] Local Production, Local Consumption: Peer-to-Peer Architecture for a Dependable and Sustainable Social Infrastructure
    Saito, Kenji, Morino, Eiichi, Suko, Yoshihiko, Suzuki, Takaaki, and Murai, Jun
    01/2007 2007
  409. [bauer:wpes2007] Low-Resource Routing Attacks Against Tor
    Bauer, Kevin, McCoy, Damon, Grunwald, Dirk, Kohno, Tadayoshi, and Sicker, Douglas
    Oct 2007
  410. [King2007] Mapping an Arbitrary Message to an Elliptic Curve when Defined over GF (2n)
    King, Brian
    International Journal of Network Security 03/2009 2007
  411. [DBLP:conf/infocom/ZhangCY07] MARCH: A Distributed Incentive Scheme for Peer-to-Peer Networks
    Zhang, Zhan, Chen, Shigang, and Yoon, MyungKeun
    05/2007 2007
  412. [Magharei07meshor] Mesh or Multiple-Tree: A Comparative Study of Live P2P Streaming Approaches
    Magharei, Nazanin, and Rejaie, Reza
    05/2007 2007
  413. [Nishide2007] Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol
    Nishide, Takashi, and Ohta, Kazuo
    2007
  414. [Banner:2007:MRA:1279660.1279673] Multipath routing algorithms for congestion minimization
    Banner, Ron, and Orda, Ariel
    IEEE/ACM Trans. Netw. 04/2007 2007
  415. [Dimakis:2010:NCD:1861840.1861868] Network coding for distributed storage systems
    Dimakis, Alexandros G., Godfrey, Brighten, Wu, Yunnan, Wainwright, Martin J., and Ramchandran, Kannan
    05/2007 2007
  416. [Amirbekyan2007] A New Efficient Privacy-preserving Scalar Product Protocol
    Amirbekyan, Artak, and Estivill-Castro, Vladimir
    2007
  417. [Harras2007] ParaNets: A Parallel Network Architecture for Challenged Networks
    Harras, Khaled A., Wittie, Mike P., Almeroth, Kevin C., and Belding, Elizabeth M.
    Mar 2007
  418. [Petcu:2007:PNP:1625275.1625301] PC-DPOP: a new partial centralization algorithm for distributed optimization
    Petcu, Adrian, Faltings, Boi, and Mailler, Roger
    01/2007 2007
  419. [fuhrmann07wons] Performance of Scalable Source Routing in Hybrid MANETs
    Fuhrmann, Thomas
    2007
  420. [Garay2007] Practical and Secure Solutions for Integer Comparison
    Garay, Juan, Schoenmakers, Berry, and Villegas, José
    2007
  421. [Dwork2007] The Price of Privacy and the Limits of LP Decoding
    Dwork, Cynthia, McSherry, Frank D., and Talwar, Kunal
    2007
  422. [Magharei:2009:PPR:1618562.1618566] PRIME: Peer-to-Peer Receiver-drIven MEsh-based Streaming
    Magharei, Nazanin, and Rejaie, Reza
    05/2007 2007
  423. [1273222] Privacy protection in personalized search
    Shen, Xuehua, Tan, Bin, and Zhai, ChengXiang
    SIGIR Forum 2007
  424. [Bellovin2007] Privacy-enhanced searches using encrypted Bloom filters
    Bellovin, Steven M., and Cheswick, William R.
    2007
  425. [1327188] Private Searching on Streaming Data
    Ostrovsky, Rafail, and Skeith, William E.
    J. Cryptol. 2007
  426. [kostas-thesis] Probabilistic and Information-Theoretic Approaches to Anonymity
    Chatzikokolakis, Konstantinos
    Oct 2007
  427. [ChatziPP07] Probability of Error in Information-Hiding Protocols
    Chatzikokolakis, Konstantinos, Palamidessi, Catuscia, and Panangaden, Prakash
    2007
  428. [DBLP:conf/stoc/2007] Proceedings of the 39th Annual ACM Symposium on Theory of Computing (STOC’07)
    Jun 2007
  429. [kising07proxselectigor] Proximity Neighbor Selection and Proximity Route Selection for the Overlay-Network IGOR
    Kising, Yves Philippe
    06/2007 2007
  430. [1361410] Purely functional system configuration management
    Dolstra, Eelco, and Hemel, Armijn
    2007
  431. [pitchblack] Routing in the Dark: Pitch Black
    Evans, Nathan S, GauthierDickey, Chis, and Grothoff, Christian
    2007
  432. [murdoch-pet2007] Sampled Traffic Analysis by Internet-Exchange-Level Adversaries
    Murdoch, Steven J., and Zieliński, Piotr
    Jun 2007
  433. [Amann2007] Secure asynchronous change notifications for a distributed file system
    Amann, Bernhard
    11/2007 2007
  434. [saballus07secure] Secure Group Communication in Ad-Hoc Networks using Tree Parity Machines
    Saballus, Bjoern, Wallner, Sebastian, and Volkmer, Markus
    Feb 2007
  435. [Kaafar:2007:SIC:1282427.1282388] Securing Internet Coordinate Embedding Systems
    Kaafar, Mohamed Ali, Mathy, Laurent, Barakat, Chadi, Salamatian, Kave, Turletti, Thierry, and Dabbous, Walid
    SIGCOMM Computer Communication Review 08/2007 2007
  436. [Conner:2007:SPM:1377934.1377937] Securing peer-to-peer media streaming systems from selfish and malicious behavior
    Conner, William, and Nahrstedt, Klara
    11/2007 2007
  437. [DBLP:conf/ladc/CourtesKP07] Security Rationale for a Cooperative Backup Service for Mobile Devices
    Courtes, Ludovic, Killijian, Marc-Olivier, and Powell, David
    2007
  438. [1396915] S/Kademlia: A practicable approach towards secure key-based routing
    Baumgart, Ingmar, and Mies, Sebastian
    2007
  439. [1326260] Skype4Games
    Triebel, Tonio, Guthier, Benjamin, and Effelsberg, Wolfgang
    2007
  440. [space-efficient] Space-Efficient Private Search
    Danezis, George, and Diaz, Claudia
    2007
  441. [Mies2007] SpoVNet: An Architecture for Supporting Future Internet Applications
    Mies, Sebastian
    2007
  442. [ringstwice07] Subliminal Channels in the Private Information Retrieval Protocols
    Patterson, Meredith L., and Sassaman, Len
    2007
  443. [Li2007-tcloseness] t-Closeness: Privacy Beyond k-Anonymity and \ell-Diversity
    Li, Ninghui, Li, Tiancheng, and Venkatasubramanian, Suresh
    2007
  444. [saballus07distributed] Towards a Distributed Java VM in Sensor Networks using Scalable Source Routing
    Saballus, Bjoern, Eickhold, Johannes, and Fuhrmann, Thomas
    2007
  445. [Sherr07towardsapplication-aware] Towards application-aware anonymous routing
    Sherr, Micah, Thau, Boon, and Blaze, Matt
    2007
  446. [1270971] Towards Fair Event Dissemination
    Baehni, Sebastien, Guerraoui, Rachid, Koldehofe, Boris, and Monod, Maxime
    2007
  447. [troncoso-ih2007] Traffic Analysis Attacks on a Continuously-Observable Steganographic File System
    Troncoso, Carmela, Diaz, Claudia, Dunkelman, Orr, and Preneel, Bart
    Jun 2007
  448. [danezis-pet2007] Two-Sided Statistical Disclosure Attack
    Danezis, George, Diaz, Claudia, and Troncoso, Carmela
    Jun 2007
  449. [Li2007] An Unconditionally Secure Protocol for Multi-Party Set Intersection
    Li, Ronghua, and Wu, Chuankun
    2007
  450. [tor-soups07] Usability of anonymous web browsing: an examination of Tor interfaces and deployability
    Clark, Jeremy, Oorschot, Paul C., and Adams, Carlisle
    Jul 2007
  451. [kutzner07linearization] Using Linearization for Global Consistency in SSR
    Kutzner, Kendy, and Fuhrmann, Thomas
    2007
  452. [1250746] Valgrind: a framework for heavyweight dynamic binary instrumentation
    Nethercote, Nicholas, and Seward, Julian
    SIGPLAN Not. 2007
  453. [Durner2007] Vielleicht anonym? Die Enttarnung von StealthNet-Nutzern
    Durner, Nils, Evans, Nathan S, and Grothoff, Christian
    2007
  454. [garbacki062fast] 2Fast: Collaborative Downloads in P2P Networks
    Garbacki, Pawel, Iosup, Alexandru, Epema, Dick H. J., and Steen, Maarten
    09/2006 2006
  455. [Kocc2006] Access Control in Peer-to-Peer Storage Systems
    Koç, Erol
    10/2006 2006
  456. [Kumar2006] Algorithms to accelerate multiple regular expressions matching for deep packet inspection
    Kumar, Sailesh, Dharmapurikar, Sarang, Yu, Fang, Crowley, Patrick, and Turner, Jonathan
    SIGCOMM Comput. Commun. Rev. 2006
  457. [usability:weis2006] Anonymity Loves Company: Usability and the Network Effect
    Dingledine, Roger, and Mathewson, Nick
    Jun 2006
  458. [chatzikokolakis2006apn] Anonymity Protocols as Noisy Channels?
    Chatzikokolakis, Konstantinos, Palamidessi, Catuscia, and Panangaden, Prakash
    Proc. 2nd Symposium on Trustworthy Global Computing, LNCS. Springer 2006
  459. [Goyal:2006:AEF:1180405.1180418] Attribute-based encryption for fine-grained access control of encrypted data
    Goyal, Vipul, Pandey, Omkant, Sahai, Amit, and Waters, Brent
    10/2006 2006
  460. [alpha-mixing:pet2006] Blending Different Latency Traffic with Alpha-Mixing
    Dingledine, Roger, Serjantov, Andrei, and Syverson, Paul
    Jun 2006
  461. [cramer06bootstrapping] Bootstrapping Chord in Ad hoc Networks: Not Going Anywhere for a While
    Cramer, Curt, and Fuhrmann, Thomas
    2006
  462. [UREbreak06] Breaking Four Mix-related Schemes Based on Universal Re-encryption
    Danezis, George
    Sep 2006
  463. [morphmix:pet2006] Breaking the Collusion Detection Mechanism of MorphMix
    Tabriz, Parisa, and Borisov, Nikita
    Jun 2006
  464. [1159937] Building an AS-topology model that captures route diversity
    Mühlbauer, Wolfgang, Feldmann, Anja, Maennel, Olaf, Roughan, Matthew, and Uhlig, Steve
    SIGCOMM Comput. Commun. Rev. 2006
  465. [thiele06debruijn] Churn Resistant de Bruijn Networks for Wireless on Demand Systems
    Thiele, Manuel, Kutzner, Kendy, and Fuhrmann, Thomas
    2006
  466. [adams06] A Classification for Privacy Techniques
    Adams, Carlisle
    University of Ottawa Law & Technology Journal 2006
  467. [Zhao2006] Combating Hidden Action in Unstructured Peer-to-Peer Systems
    Zhao, Qi, Zhang, Jianzhong, and Xu, Jingdong
    10/2006 2006
  468. [Cramton2006] Combinatorial Auctions
    Cramton, Peter, Shoham, Yoav, and Steinberg, Richard
    2006
  469. [Fuhrmann2006] Combining Virtual and Physical Structures for Self-organized Routing
    Fuhrmann, Thomas
    2006
  470. [Curt2006] Communication Networks On the fundamental communication abstraction supplied by P2P overlay networks
    Curt, Cramer, and Fuhrmann, Thomas
    2006
  471. [1267366] Compare-by-hash: a reasoned analysis
    Black, John
    2006
  472. [Ardron2006] Complementary currency innovations: Self-guarantee in peer-to-peer currencies
    Ardron, Mitra, and Lietaer, Bernard
    International Journal of Community Currency Research 2006 2006
  473. [ishai2006ca] Cryptography from Anonymity
    Ishai, Yuval, Kushilevitz, Eyal, Ostrovsky, Rafail, and Sahai, Amit
    Proceedings of the 47th Annual IEEE Symposium on Foundations of Computer Science (FOCS’06)-Volume 00 2006
  474. [Grolimund:2006:CFT:1173705.1174355] Cryptree: A Folder Tree Structure for Cryptographic File Systems
    Grolimund, Dominik, Meisser, Luzius, Schmid, Stefan, and Wattenhofer, Roger
    10/2006 2006
  475. [200] Defending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a Proposal for Self-Registration
    Dinger, Jochen, and Hartenstein, Hannes
    Apr 2006
  476. [Hurwicz2006] Designing Economics Mechanisms
    Hurwicz, Leonid, and Reiter, Stanley
    2006
  477. [Golle:sp2006] Deterring Voluntary Trace Disclosure in Re-encryption Mix Networks
    Golle, Philippe, Wang, XiaoFeng, Jakobsson, Markus, and Tsow, Alex
    May 2006
  478. [Dwork2006] Differential Privacy
    Dwork, Cynthia
    2006
  479. [1143821] A distributed data caching framework for mobile ad hoc networks
    Wang, Ying-Hong, Chao, Chih-Feng, Lin, Shih-Wei, and Chen, Wei-Ting
    2006
  480. [Ghodsi2006] Distributed k-ary System: Algorithms for Distributed Hash Tables
    Ghodsi, Ali
    12/2006 2006
  481. [AhmedBoutaba2006DistributedPatternMatching] Distributed Pattern Matching: A Key to Flexible and Efficient P2P Search
    Ahmed, R., and Boutaba, R.
    2006
  482. [sandberg06distrouting] Distributed Routing in Small-World Networks
    Sandberg, Oskar
    2006
  483. [Campo2006] DNS-Based Service Discovery in Ad Hoc Networks: Evaluation and Improvements
    Campo, Celeste, and Garcı́a-Rubio, Carlos
    2006
  484. [Md06e.:anonymous] E.: Anonymous Secure Communication in Wireless Mobile Ad-hoc Networks
    Rahman, Sk. Md. Mizanur, Inomata, Atsuo, Okamoto, Takeshi, and Mambo, Masahiro
    2006
  485. [danezis:weis2006] The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications
    Danezis, George, and Wittneben, Bettina
    Jun 2006
  486. [1151692] Energy-aware lossless data compression
    Barr, Kenneth, and Asanović, Krste
    ACM Trans. Comput. Syst. 2006 2006
  487. [1143660] Estimation based erasure-coding routing in delay tolerant networks
    Liao, Yong, Tan, Kun, Zhang, Zhensheng, and Gao, Lixin
    2006
  488. [Mislove2006] Experiences in building and operating ePOST, a reliable peer-to-peer application
    Mislove, Alan, Post, Ansley, Haeberlen, Andreas, and Druschel, Peter
    SIGOPS Oper. Syst. Rev. 2006
  489. [guha6ess] An Experimental Study of the Skype Peer-to-Peer VoIP System
    Guha, Saikat, Daswani, Neil, and Jain, Ravi
    02/2006 2006
  490. [Saito2006] Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
    Saito, Kenji, Morino, Eiichi, and Murai, Jun
    04/2006 2006
  491. [1217937] Fireflies: scalable support for intrusion-tolerant network overlays
    Johansen, Håvard, Allavena, André, and Renesse, Robbert Van
    SIGOPS Oper. Syst. Rev. 2006
  492. [Locher06freeriding] Free Riding in BitTorrent is Cheap
    Locher, Thomas, Moor, Patrick, Schmid, Stefan, and Wattenhofer, Roger
    2006
  493. [Grolimund06havelaar:a] Havelaar: A Robust and Efficient Reputation System for Active Peer-to-Peer Systems
    Grolimund, Dominik, Meisser, Luzius, Schmid, Stefan, and Wattenhofer, Roger
    06/2006 2006
  494. [HotOrNot] Hot or Not: Revealing Hidden Services by their Clock Skew
    Murdoch, Steven J.
    Oct 2006
  495. [clonewars] How to win the clonewars: efficient periodic n-times anonymous authentication
    Camenisch, Jan, Hohenberger, Susan, Kohlweiss, Markulf, Lysyanskaya, Anna, and Meyerovich, Mira
    2006
  496. [1157518] iDIBS: An Improved Distributed Backup System
    Morcos, Faruck, Chantem, Thidapat, Little, Philip, Gasiba, Tiago, and Thain, Douglas
    2006
  497. [clayton:pet2006] Ignoring the Great Firewall of China
    Clayton, Richard, Murdoch, Steven J., and Watson, Robert N. M.
    Jun 2006
  498. [conf/infocom/StutzbachR06] Improving Lookup Performance Over a Widely-Deployed DHT
    Stutzbach, Daniel, and Rejaie, Reza
    2006
  499. [Pai06improvingrobustness] Improving Robustness of Peer-to-Peer Streaming with Incentives
    Pai, Vinay, and Mohr, Alexander E.
    06/2006 2006
  500. [ciaccio:pet2006] Improving Sender Anonymity in a Structured Overlay with Imprecise Routing
    Ciaccio, Giuseppe
    Jun 2006
  501. [Bindal2006] Improving traffic locality in BitTorrent via biased neighbor selection
    Bindal, Ruchir, Cao, Pei, Chan, William, Medved, Jan, Suwala, George, Bates, Tony, and Zhang, Amy
    2006 2006
  502. [Feigenbaum:2006:IIR:1134707.1134722] Incentive-compatible interdomain routing
    Feigenbaum, Joan, Ramachandran, Vijay, and Schapira, Michael
    06/2006 2006
  503. [DBLP:journals/corr/abs-cs-0611016] Increasing Data Resilience of Mobile Devices with a Collaborative Backup Service
    Martin-Guillerez, Damien, Banâtre, Michel, and Couderc, Paul
    CoRR 2006
  504. [WrightMM06] On Inferring Application Protocol Behaviors in Encrypted Network Traffic
    Wright, Charles, Monrose, Fabian, and Masson, Gerald M.
    Journal of Machine Learning Research 2006
  505. [Liberatore:2006] Inferring the Source of Encrypted HTTP Connections
    Liberatore, Marc, and Levine, Brian Neil
    Oct 2006
  506. [Saito:2004:MTP:968884.969522] i-WAT: The Internet WAT System - An Architecture for Maintaining Trust and Facilitating Peer-to-Peer Barter Relationships
    Saito, Kenji
    01/2006 2006
  507. [Kirsch2006] Less Hashing, Same Performance: Building a Better Bloom Filter
    Kirsch, Adam, and Mitzenmacher, Michael
    2006
  508. [cview:pet2006] Linking Anonymous Transactions: The Consistent View Attack
    Pashalidis, Andreas, and Meyer, Bernd
    Jun 2006
  509. [di06linyphi] Linyphi: An IPv6-Compatible Implementation of SSR
    Di, Pengfei, Marcon, Massimiliano, and Fuhrmann, Thomas
    2006
  510. [hs-attack06] Locating Hidden Servers
    Øverlier, Lasse, and Syverson, Paul
    May 2006
  511. [icdcs2006:m2] M2: Multicasting Mixes for Efficient and Anonymous Communication
    Perng, Ginger, Reiter, Michael K., and Wang, Chenxi
    Jul 2006
  512. [ShWa-Relationship] Measuring Relationship Anonymity in Mix Networks
    Shmatikov, Vitaly, and Wang, Ming-Hsui
    Oct 2006
  513. [Godfrey:2006:MCD:1151659.1159931] Minimizing churn in distributed systems
    Godfrey, Brighten, Shenker, S, and Stoica, Ion
    SIGCOMM Computer Communication Review 08/2006 2006
  514. [Stefansson06myriadstore] MyriadStore: A Peer-to-Peer Backup System
    Stefansson, Birgir, Thodis, Antonios, Ghodsi, Ali, and Haridi, Seif
    2006
  515. [Fragouli:2006:NCI:1111322.1111337] Network Coding: an Instant Primer
    Fragouli, Christina, Boudec, Jean-Yves Le, and Widmer, Jörg
    SIGCOMM Computer Communication Review 01/2006 2006
  516. [wpes06:heydt-benjamin] Nonesuch: a mix network with sender unobservability
    Serjantov, Andrei, and Defend, Benessa
    2006
  517. [Tati06onobject] On Object Maintenance in Peer-to-Peer Systems
    Tati, Kiran, and Voelker, Geoffrey M.
    02/2006 2006
  518. [1128335] OmniStore: A system for ubiquitous personal storage management
    Karypidis, Alexandros, and Lalis, Spyros
    2006
  519. [Fitzi:2006:OEM:1146381.1146407] Optimally efficient multi-valued byzantine agreement
    Fitzi, Matthias, and Hirt, Martin
    2006
  520. [Dwork2006a] Our Data, Ourselves: Privacy via Distributed Noise Generation
    Dwork, Cynthia, Kenthapadi, Krishnaram, McSherry, Frank, Mironov, Ilya, and Naor, Moni
    2006
  521. [Aad06packetcoding] Packet coding for strong anonymity in ad hoc networks
    Aad, Imad, Castelluccia, Claude, and Hubaux, Jean-Pierre
    2006
  522. [Marx:2006:PGS:1140638.1140647] Parameterized graph separation problems
    Marx, Dániel
    Theoretical Computer Science 02/2006 2006
  523. [Aekaterinidis2006PastryStrings] PastryStrings: A Comprehensive Content-Based Publish/Subscribe DHT Network
    Aekaterinidis, Ioannis, and Triantafillou, Peter
    2006
  524. [Massoulie:2006:PCS:1146381.1146402] Peer counting and sampling in overlay networks: random walk methods
    Massoulié, Laurent, Merrer, Erwan Le, Kermarrec, Anne-Marie, and Ganesh, Ayalvadi
    07/2006 2006
  525. [Merrer2006] Peer to peer size estimation in large and dynamic networks: A comparative study
    Merrer, Erwan Le, Kermarrec, Anne-Marie, and Massoulié, Laurent
    06/2006 2006
  526. [1161264] Performance evaluation of chord in mobile ad hoc networks
    Cramer, Curt, and Fuhrmann, Thomas
    2006
  527. [albrecht2006planetlab] PlanetLab application management using Plush
    Albrecht, J., Tuttle, C., Snoeren, A.C., and Vahdat, A.
    ACM SIGOPS Operating Systems Review 2006
  528. [heydt-benjamin:pet2006] Privacy for Public Transportation
    Heydt-Benjamin, Thomas S., Chae, Hee-Jin, Defend, Benessa, and Fu, Kevin
    Jun 2006
  529. [Shaneck2006] Privacy Preserving Nearest Neighbor Search
    Shaneck, M., Kim, Yongdae, and Kumar, V.
    Dec 2006
  530. [pianese:pulse] PULSE, a Flexible P2P Live Streaming System
    Pianese, Fabio, Keller, Joaquı́n, and Biersack, E W
    04/2006 2006
  531. [fuhrmann06pushing-tr] Pushing Chord into the Underlay: Scalable Routing for Hybrid MANETs
    Fuhrmann, Thomas, Di, Pengfei, Kutzner, Kendy, and Cramer, Curt
    2006
  532. [1109601] The rainbow skip graph: a fault-tolerant constant-degree distributed data structure
    Goodrich, Michael T., Nelson, Michael J., and Sun, Jonathan Z.
    2006
  533. [1148681] Raptor codes
    Shokrollahi, M. Amin
    IEEE/ACM Trans. Netw. 2006
  534. [Cramer2006] Reactive Clustering in MANETs
    Cramer, Curt, Stanze, Oliver, Weniger, Kilian, and Zitterbart, Martina
    International Journal of Pervasive Computing and Communications 2006
  535. [regroup2006] Regroup-And-Go mixes to counter the (n-1) attack
    Shi, Jin-Qiao, Fang, Bin-Xing, and Shao, Li-Jie
    2006
  536. [Dellarocas2006] Reputation Mechanisms
    Dellarocas, Chrysanthos
    2006
  537. [Miller06robustcomposition:] Robust Composition: Towards a Unified Approach to Access Control and Concurrency Control
    Miller, Mark Samuel
    2006
  538. [Salsa] Salsa: A Structured Approach to Large-Scale Anonymity
    Nambiar, Arjun
    Oct 2006
  539. [2006a] Scalable Routing in Sensor Actuator Networks with Churn
    09/2006 2006
  540. [Atallah2006] Secure Collaborative Planning, Forecasting, and Replenishment
    Atallah, Mikhail, Blanton, Marina, Deshpand, Vinayak, Frikken, Keith, Li, Jiangtao, and Schwarz, Leroy
    2006
  541. [brands06] Secure User Identification Without Privacy Erosion
    Brands, Stefan
    University of Ottawa Law & Technology Journal 2006
  542. [kutzner06securessr] Securing the Scalable Source Routing Protocol
    Kutzner, Kendy, Wallenta, Christian, and Fuhrmann, Thomas
    2006
  543. [1158641] Security Considerations in Space and Delay Tolerant Networks
    Farrell, Stephen, and Cahill, Vinny
    2006
  544. [tap:pet2006] On the Security of the Tor Authentication Protocol
    Goldberg, Ian
    Jun 2006
  545. [Karnstedt2006SimilarityQueries] Similarity Queries on Structured Data in Structured Overlays
    Karnstedt, Marcel, Sattler, Kai-Uwe, Hauswirth, Manfred, and Schmidt, Roman
    2006
  546. [Fuhrmann2006a] Software Engineering for Ambient Intelligence Systems
    Fuhrmann, Thomas
    2006
  547. [1170307] Storage Tradeoffs in a Collaborative Backup Service for Mobile Devices
    Courtes, Ludovic, Killijian, Marc-Olivier, and Powell, David
    2006
  548. [Levine:2006] A Survey of Solutions to the Sybil Attack
    Levine, Brian Neil, Shields, Clay, and Margolin, N. Boris
    10/2006 2006
  549. [Altman2006] A survey on networking games in telecommunications
    Altman, Eitan, Boulogne, Thomas, El-Azouzi, Rachid, Jiménez, Tania, and Wynter, Laura
    Computers & Operations Research 02/2006 2006
  550. [Yu:2006:SDA:1159913.1159945] SybilGuard: defending against sybil attacks via social networks
    Yu, Haifeng, Kaminsky, Michael, Gibbons, Phillip B., and Flaxman, Abraham
    09/2006 2006
  551. [citeulike:530977] Taxonomy of trust: Categorizing P2P reputation systems
    Marti, Sergio, and Garcia-Molina, Hector
    Management in Peer-to-Peer Systems Mar 2006
  552. [ShWa-Timing06] Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses
    Shmatikov, Vitaly, and Wang, Ming-Hsui
    Sep 2006
  553. [conf/infocom/SunHYL06] A Trust Evaluation Framework in Distributed Networks: Vulnerability Analysis and Defense Against Attacks.
    Sun, Yan L., Han, Zhu, Yu, Wei, and Liu, K. J. Ray
    2006
  554. [Damgard2006] Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation
    Damgárd, Ivan, Fitzi, Matthias, Kiltz, Eike, Nielsen, JesperBuus, and Toft, Tomas
    2006
  555. [Stutzbach:2006:UCP:1177080.1177105] Understanding churn in peer-to-peer networks
    Stutzbach, Daniel, and Rejaie, Reza
    10/2006 2006
  556. [valet:pet2006] Valet Services: Improving Hidden Servers with a Personal Touch
    Øverlier, Lasse, and Syverson, Paul
    Jun 2006
  557. [nguyen2006vsf] Verifiable shuffles: a formal model and a Paillier-based three-round construction with provable security
    Nguyen, Lan, Safavi-Naini, Rei, and Kurosawa, Kaoru
    International Journal of Information Security 2006
  558. [Widmer_abstractnetwork] ABSTRACT Network Coding for Efficient Communication in Extreme Networks
    Widmer, Jörg
    2005
  559. [pet05-borisov] An Analysis of Parallel Mixing with Attacker-Controlled Inputs
    Borisov, Nikita
    May 2005
  560. [DiazThesis05] Anonymity and Privacy in Electronic Services
    Diaz, Claudia
    Dec 2005
  561. [Borisov:CSD-05-1390] Anonymity in Structured Peer-to-Peer Networks
    Borisov, Nikita, and Waddle, Jason
    May 2005
  562. [sofem05-Klonowski] Anonymous Communication with On-line and Off-line Onion Encoding
    Klonowski, Marek, Kutylowski, Miroslaw, and Zagorski, Filip
    Jan 2005
  563. [1080833] Architecture and evaluation of an unplanned 802.11b mesh network
    Bicket, John, Aguayo, Daniel, Biswas, Sanjit, and Morris, Robert
    2005
  564. [1095816] BAR fault tolerance for cooperative services
    Aiyer, Amitanand S., Alvisi, Lorenzo, Clement, Allen, Dahlin, Mike, Martin, Jean-Philippe, and Porth, Carl
    SIGOPS Oper. Syst. Rev. 2005
  565. [Pouwelse05thebittorrent] The BiTtorrent P2P File-sharing System: Measurements and Analysis
    Pouwelse, Johan, Garbacki, Pawel, Epema, Dick H. J., and Sips, Henk J.
    02/2005 2005
  566. [ih05-Luke] On Blending Attacks For Mixes with Memory
    O’Connor, Luke
    Jun 2005
  567. [1108067] Boundary Chord: A Novel Peer-to-Peer Algorithm for Replica Location Mechanism in Grid Environment
    Jin, Hai, Wang, Chengwei, and Chen, Hanhua
    2005
  568. [Pfister05capacity-achievingensembles] Capacity-achieving ensembles for the binary erasure channel with bounded complexity
    Pfister, Henry D., Sason, Igal, and Urbanke, Rüdiger L.
    IEEE TRANS. INFORMATION THEORY 2005
  569. [Zhuang05cashmere:resilient] Cashmere: Resilient anonymous routing
    Zhuang, Li, Zhou, Feng, Zhao, Ben Y., and Rowstron, Antony
    2005
  570. [ih05-csispir] Censorship Resistance Revisited
    Perng, Ginger, Reiter, Michael K., and Wang, Chenxi
    Jun 2005
  571. [Pai2005] Chainsaw: Eliminating Trees from Overlay Multicast
    Pai, Vinay, Kumar, Kapil, Tamilmani, Karthik, Sambamurthy, Vinay, and Mohr, Alexander E.
    11/2005 2005
  572. [guha05characterization] Characterization and measurement of tcp traversal through nats and firewalls
    Guha, Saikat, and Francis, Paul
    2005
  573. [chl05-full:eurocrypt2005] Compact E-Cash
    Camenisch, Jan, Hohenberger, Susan, and Lysyanskaya, Anna
    2005
  574. [ih05-danezisclulow] Compulsion Resistant Anonymous Communications
    Danezis, George, and Clulow, Jolyon
    Jun 2005
  575. [Bolton2005] Cooperation among strangers with limited information about reputation
    Bolton, Gary E., Katok, Elena, and Ockenfels, Axel
    Journal of Public Economics 08/2005 2005
  576. [Allavena2005] Correctness of a gossip based membership protocol
    Allavena, Andre, Demers, Alan, and Hopcroft, John E.
    2005
  577. [Moore05counteringhidden-action] Countering Hidden-action Attacks on Networked Systems
    Moore, Tyler
    06/2005 2005
  578. [Massoulie:2005:CRS:1064212.1064215] Coupon replication systems
    Massoulié, Laurent, and Vojnović, Milan
    06/2005 2005
  579. [Kostoulas:2005:DSS:1097873.1098292] Decentralized Schemes for Size Estimation in Large and Dynamic Groups
    Kostoulas, Dionysios, Psaltoulis, Dimitrios, Gupta, Indranil, Birman, Kenneth P., and Demers, Alan
    07/2005 2005
  580. [You05deepstore:] Deep Store: An archival storage system architecture
    You, Lawrence L., Pollack, Kristal T., and Long, Darrell D. E.
    2005
  581. [Electrical04designingincentives] Designing Incentives for Peer-to-Peer Routing
    Blanc, Alberto, Liu, Yi-Kai, and Vahdat, Amin
    03/2005 2005
  582. [1251207] Detecting BGP configuration faults with static analysis
    Feamster, Nick, and Balakrishnan, Hari
    2005
  583. [Khorshadi:2005:DPR:1090948.1091369] Determining the Peer Resource Contributions in a P2P Contract
    Khorshadi, Behrooz, Liu, Xin, and Ghosal, Dipak
    07/2005 2005
  584. [Wehrle2005] Distributed Hash Tables
    Wehrle, Klaus, Götz, Stefan, and Rieche, Simon
    2005
  585. [Yang2005] An empirical study of free-riding behavior in the maze p2p file-sharing system
    Yang, Mao, Zhang, Zheng, Li, Xiaoming, and Dai, Yafei
    2005
  586. [Bickson05theemule] The eMule Protocol Specification
    Kulbak, Yoram, and Bickson, Danny
    01/2005 2005
  587. [Wang05erasure-codingbased] Erasure-coding based routing for opportunistic networks
    Wang, Yong, Jain, Sushant, Martonosi, Margaret, and Fall, Kevin
    2005
  588. [Anagnostakis2005] Exchange-based incentive mechanisms for peer-to-peer file sharing
    Anagnostakis, Kostas G., and Greenwald, Michael B.
    03/2004 2005
  589. [conf/infocom/GollapudiSZ05] Exploiting anarchy in networks: a game-theoretic approach to combining fairness and throughput.
    Gollapudi, Sreenivas, Sivakumar, D., and Zhang, Aidong
    03/2005 2005
  590. [10.1109/MOBIQUITOUS.2005.29] Exploiting co-location history for ef.cient service selection in ubiquitous computing systems
    Karypidis, Alexandros, and Lalis, Spyros
    Mobile and Ubiquitous Systems, Annual International Conference on 2005
  591. [10.1109/MASCOT.2005.73] The Feasibility of DHT-based Streaming Multicast
    Birrer, Stefan, and Bustamante, Fabian E.
    2012 IEEE 20th International Symposium on Modeling, Analysis and Simulation of Computer and Telecommunication Systems 2005
  592. [Wang05findingcollisions] Finding Collisions in the Full SHA-1
    Wang, Xiaoyun, Yin, Yiqun Lisa, and Yu, Hongbo
    2005
  593. [DBLP:conf/p2p/EberspacherS05a] First and Second Generation of Peer-to-Peer Systems
    Eberspächer, Jörg, and Schollmeier, Rüdiger
    2005
  594. [rhea2005fixing] Fixing the embarrassing slowness of OpenDHT on PlanetLab
    Rhea, S., Chun, B.G., Kubiatowicz, J., and Shenker, S
    2005
  595. [Fu::FlowMarking::2005] On Flow Marking Attacks in Wireless Anonymous Communication Networks
    Fu, Xinwen, Zhu, Ye, Graham, Bryan, Bettati, Riccardo, and Zhao, Wei
    Apr 2005
  596. [camlys05] A Formal Treatment of Onion Routing
    Camenisch, Jan, and Lysyanskaya, Anna
    Aug 2005
  597. [10.1109/MDSO.2005.31] Free Riding on Gnutella Revisited: The Bell Tolls?
    Hughes, Daniel, Coulson, Geoff, and Walkerdine, James
    IEEE Distributed Systems Online 06/2005 2005
  598. [Sahai2005] Fuzzy Identity-Based Encryption
    Sahai, Amit, and Waters, Brent
    05/2005 2005
  599. [Jelasity:2005:GAL:1082469.1082470] Gossip-based aggregation in large dynamic networks
    Jelasity, Márk, Montresor, Alberto, and Babaoglu, Ozalp
    ACM Transactions on Computer Systems Aug 2005
  600. [Godfrey05heterogeneityand] Heterogeneity and Load Balance in Distributed Hash Tables
    Godfrey, Brighten, and Stoica, Ion
    2005
  601. [Feldman:2005:HMR:1064009.1064022] Hidden-action in multi-hop routing
    Feldman, Michal, Chuang, John, Stoica, Ion, and Shenker, S
    06/2005 2005
  602. [IPTPS05] High Availability in DHTs: Erasure Coding vs. Replication
    Rodrigues, Rodrigo, and Liskov, Barbara
    02/2005 2005
  603. [1103797] Hydra: a platform for survivable and secure data storage systems
    Xu, Lihao
    2005
  604. [1095944] Impacts of packet scheduling and packet loss distribution on FEC Performances: observations and recommendations
    Neumann, Christoph, Francillon, Aurélien, and Furodet, David
    2005
  605. [1646697] Improving delivery ratios for application layer multicast in mobile ad hoc networks
    Baumung, Peter, Zitterbart, Martina, and Kutzner, Kendy
    Comput. Commun. 2005
  606. [Jun:2005:IBI:1080192.1080199] Incentives in BitTorrent Induce Free Riding
    Jun, Seung, and Ahamad, Mustaque
    08/2005 2005
  607. [Andrade:2005:ICB:1080192.1080198] Influences on cooperation in BitTorrent communities
    Andrade, Nazareno, Mowbray, Miranda, Lima, Aliandro, Wagner, Gustavo, and Ripeanu, Matei
    08/2005 2005
  608. [Liu2005] On the Interaction Between Overlay Routing and Underlay Routing
    Liu, Yong, Zhang, Honggang, Gong, Weibo, and Towsley, Don
    2005
  609. [cramer05isprp] ISPRP: A Message-Efficient Protocol for Initializing Structured P2P Networks
    Cramer, Curt, and Fuhrmann, Thomas
    2005
  610. [1064217] On lifetime-based node failure and stochastic resilience of decentralized peer-to-peer networks
    Leonard, Derek, Rai, Vivek, and Loguinov, Dmitri
    SIGMETRICS Perform. Eval. Rev. 2005
  611. [esorics05-Klonowski] Local View Attack on Anonymous Communication
    Gogolewski, Marcin, Klonowski, Marek, and Kutylowski, Miroslaw
    Sep 2005
  612. [1042380] Location Awareness in Unstructured Peer-to-Peer Systems
    Liu, Yunhao, Xiao, Li, Liu, Xiaomei, Ni, Lionel M., and Zhang, Xiaodong
    IEEE Trans. Parallel Distrib. Syst. 2005
  613. [torta05] Low-Cost Traffic Analysis of Tor
    Murdoch, Steven J., and Danezis, George
    May 2005
  614. [Fiat05makingchord] Making chord robust to byzantine attacks
    Fiat, Amos, Saia, Jared, and Young, Maxwell
    2005
  615. [wang:market-driven] Market-driven bandwidth allocation in selfish overlay networks.
    Wang, Weihong, and Li, Baochun
    03/2005 2005
  616. [Guo:2005:MAM:1251086.1251090] Measurements, analysis, and modeling of BitTorrent-like systems
    Guo, Lei, Chen, Songqing, Xiao, Zhen, Tan, Enhua, Ding, Xiaoning, and Zhang, Xiaodong
    10/2005 2005
  617. [kutzner05overnet] Measuring Large Overlay Networks - The Overnet Example
    Kutzner, Kendy, and Fuhrmann, Thomas
    2005
  618. [pet05-serjantov] Message Splitting Against the Partial Adversary
    Serjantov, Andrei, and Murdoch, Steven J.
    May 2005
  619. [pet05-camenisch] Mix-network with Stronger Security
    Camenisch, Jan, and Mityagin, Anton
    May 2005
  620. [gkantsidis:network] Network coding for large scale content distribution
    Gkantsidis, Christos, and Rodriguez, Pablo
    03/2005 2005
  621. [Sanghavi:2005:NMF:1080192.1080200] A new mechanism for the free-rider problem
    Sanghavi, Sujay, and Hajek, Bruce
    08/2005 2005
  622. [1251532] Non-transitive connectivity and DHTs
    Freedman, Michael J., Lakshminarayanan, Karthik, Rhea, Sean C., and Stoica, Ion
    2005
  623. [cryptoeprint:2005:394] Obfuscated Ciphertext Mixing
    Adida, Ben, and Wikström, Douglas
    Nov 2005
  624. [Garcia05off-linekarma:] Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications
    Garcia, Flavio D., and Hoepman, Jaap-Henk
    06/2005 2005
  625. [2005a] OpenDHT: a public DHT service and its uses
    2005
  626. [Feldman:2005:OFB:1120717.1120723] Overcoming free-riding behavior in peer-to-peer systems
    Feldman, Michal, and Chuang, John
    ACM SIGecom Exchanges 07/2005 2005
  627. [Ghosal2005] P2P Contracts: a Framework for Resource and Service Exchange
    Ghosal, Dipak, Poon, Benjamin K., and Kong, Keith
    FGCS. Future Generations Computer Systems 03/2005 2005
  628. [busca:pastis:] Pastis: A Highly-Scalable Multi-user Peer-to-Peer File System.
    Busca, Jean-Michel, Picconi, Fabio, and Sens, Pierre
    09/2005 2005
  629. [Massachusetts05peer-to-peercommunication] Peer-to-Peer Communication Across Network Address Translators
    Srisuresh, Pyda, Ford, Bryan, and Kegel, Dan
    04/2005 2005
  630. [Fuhrmann_aplatform] A platform for lab exercises in sensor networks
    Fuhrmann, Thomas, and Harbaum, Till
    2005
  631. [Ali:2005:PTA:1082473.1082631] Preprocessing techniques for accelerating the DCOP algorithm ADOPT
    Ali, Syed, Koenig, Sven, and Tambe, Milind
    07/2005 2005
  632. [Jensen2005] Privacy Practices of Internet Users: Self-reports Versus Observed Behavior
    Jensen, Carlos, Potts, Colin, and Jensen, Christian
    Int. J. Hum.-Comput. Stud. 2005
  633. [pet05-bissias] Privacy Vulnerabilities in Encrypted HTTP Streams
    Bissias, George Dean, Liberatore, Marc, and Levine, Brian Neil
    May 2005
  634. [Kissner2005] Privacy-Preserving Set Operations
    Kissner, Lea, and Song, Dawn
    2005
  635. [Goethals2005] On Private Scalar Product Computation for Privacy-Preserving Data Mining
    Goethals, Bart, Laur, Sven, Lipmaa, Helger, and Mielikäinen, Taneli
    2005
  636. [GHPvR05] Provable Anonymity
    Garcia, Flavio D., Hasuo, Ichiro, Pieters, Wolter, and Rossum, Peter
    Nov 2005
  637. [ih05-Klonowski] Provable Anonymity for Networks of Mixes
    Klonowski, Marek, and Kutylowski, Miroslaw
    Jun 2005
  638. [cramer05pns] Proximity Neighbor Selection for a DHT in Wireless Multi-Hop Networks
    Cramer, Curt, and Fuhrmann, Thomas
    2005
  639. [sassaman:wpes2005] The Pynchon Gate: A Secure Method of Pseudonymous Mail Retrieval
    Sassaman, Len, Cohen, Bram, and Mathewson, Nick
    Nov 2005
  640. [HanLLHP05] A Random Walk Based Anonymous Peer-to-Peer Protocol Design
    Han, Jinsong, Liu, Yunhao, Lu, Li, Hu, Lei, and Patil, Abhishek
    2005
  641. [Aspelund05retrivabilityof] Retrivability of data in ad-hoc backup
    Aspelund, Trond
    2005
  642. [1698181] Routing with Byzantine robustness
    Perlman, Radia
    2005
  643. [XuFZBCZ05] SAS: A Scalar Anonymous Communication System
    Xu, Hongyun, Fu, Xinwen, Zhu, Ye, Bettati, Riccardo, Chen, Jianer, and Zhao, Wei
    2005
  644. [Fuhrmann05scalablerouting] Scalable routing for networked sensors and actuators
    Fuhrmann, Thomas
    2005
  645. [1049775] Scalable Service Discovery for MANET
    Sailhan, Francoise, and Issarny, Valerie
    2005
  646. [Sandberg05searchingin] Searching in a Small World
    Sandberg, Oskar
    2005
  647. [conf/p2p/GotzRW05] Selected DHT Algorithms
    Götz, Stefan, Rieche, Simon, and Wehrle, Klaus
    2005
  648. [Gairing:2005:SRI:1073970.1074000] Selfish Routing with Incomplete Information
    Gairing, Martin, Monien, Burkhard, and Tiemann, Karsten
    07/2005 2005
  649. [kutzner05dvdr] A Self-Organizing Job Scheduling Algorithm for a Distributed VDR
    Kutzner, Kendy, Cramer, Curt, and Fuhrmann, Thomas
    2005
  650. [fuhrmann05networking] A Self-Organizing Routing Scheme for Random Networks
    Fuhrmann, Thomas
    2005
  651. [Irwin:2005:SVC:1080192.1080194] Self-recharging virtual currency
    Irwin, David, Chase, Jeff, Grit, Laura, and Yumerefendi, Aydan
    08/2005 2005
  652. [cramer05selfstabilizing] Self-Stabilizing Ring Networks on Connected Graphs
    Cramer, Curt, and Fuhrmann, Thomas
    2005
  653. [10.1109/PERSER.2005.1506410] Service discovery using volunteer nodes for pervasive environments
    Kim, Mijeom, Kumar, Mohan, and Shirazi, Behrooz
    International Conference on Pervasive Services 2005
  654. [Bartolini:2005:SFA:2167504.2167521] A software framework for automated negotiation
    Bartolini, Claudio, Preist, Chris, and Jennings, Nicholas R
    2005
  655. [Bharambe:2005:OBP:1064212.1064273] Some observations on BitTorrent performance
    Bharambe, Ashwin R., Herley, Cormac, and Padmanabhan, Venkata N.
    06/2005 2005
  656. [LuFSG05] Some Remarks on Universal Re-encryption and A Novel Practical Anonymous Tunnel
    Lu, Tianbo, Fang, Bin-Xing, Sun, Yuzhong, and Guo, Li
    2005
  657. [Lua05asurvey] A Survey and Comparison of Peer-to-Peer Overlay Network Schemes
    Lua, Eng Keong, Crowcroft, Jon, Pias, Marcelo, Sharma, Ravi, and Lim, Steven
    IEEE Communications Surveys and Tutorials 2005
  658. [Cheng:2005:SRM:1080192.1080202] Sybilproof reputation mechanisms
    Cheng, Alice, and Friedman, Eric
    08/2005 2005
  659. [Danezis05sybil-resistantdht] Sybil-resistant DHT routing
    Danezis, George, Lesniewski-laas, Chris, Kaashoek, Frans M., and Anderson, Ross
    2005
  660. [Nielson05ataxonomy] A Taxonomy of Rational Attacks
    Nielson, Seth James, and Crosby, Scott A.
    2005
  661. [UCAM-CL-TR-637] The Topology of Covert Conflict
    Nagaraja, Shishir, and Anderson, Ross
    Jul 2005
  662. [kutzner05autonomic] Towards Autonomic Networking using Overlay Routing Techniques
    Kutzner, Kendy, and Fuhrmann, Thomas
    2005
  663. [WangCJ05] Tracking anonymous peer-to-peer VoIP calls on the internet
    Wang, Xinyuan, Chen, Shiping, and Jajodia, Sushil
    Nov 2005
  664. [pet05-zhu] Unmixing Mix Traffic
    Zhu, Ye, and Bettati, Riccardo
    May 2005
  665. [fuhrmann05emnets] The Use of Scalable Source Routing for Networked Sensors
    Fuhrmann, Thomas
    2005
  666. [DBLP:conf/sigcomm/JainDPF05] Using redundancy to cope with failures in a delay tolerant network
    Jain, Sushant, Demmer, Michael J., Patra, Rabin K., and Fall, Kevin
    2005
  667. [Cooley_abs:the] ABS: The Apportioned Backup System
    Cooley, Joe, Taylor, Chris, and Peacock, Alen
    2004
  668. [Baset04ananalysis] An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol
    Baset, Salman A., and Schulzrinne, Henning G.
    04/2006 2004
  669. [newman:pet2004] Anonymity and Covert Channels in Simple Timed Mix-firewalls
    Newman, Richard E., Nalla, Vipan R., and Moskowitz, Ira S.
    May 2004
  670. [halpern-oneill-2003] Anonymity and Information Hiding in Multiagent Systems
    Halpern, Joseph Y., and O’Neil, Kevin R.
    Journal of Computer Security 2004
  671. [andrei-thesis] On the Anonymity of Anonymity Systems
    Serjantov, Andrei
    Jun 2004
  672. [wisa04-Klonowski] Anonymous Communication with On-line and Off-line Onion Encoding
    Gomulkiewicz, Marcin, Klonowski, Marek, and Kutylowski, Miroslaw
    Aug 2004
  673. [Mislove04ap3:cooperative] AP3: Cooperative, decentralized anonymous communication
    2004
  674. [Laurie2004] Apres-a system for anonymous presence
    Laurie, Ben
    2004
  675. [Antoniadis04anasymptotically] An Asymptotically Optimal Scheme for P2P File Sharing
    Antoniadis, Panayotis, Courcoubetis, Costas, and Weber, Richard
    2004 2004
  676. [Levien04attackresistant] Attack Resistant Trust Metrics
    Levien, Raph
    2004
  677. [2004.Pang.imc.dns] Availability, Usage, and Deployment Characteristics of the Domain Name System
    Pang, Jeffrey, Hendricks, James, Akella, Aditya, Maggs, Bruce, Prisco, Roberto De, and Seshan, Srinivasan
    10/2004 2004
  678. [1026492] Basic Concepts and Taxonomy of Dependable and Secure Computing
    Avizienis, Algirdas, Laprie, Jean-Claude, Randell, Brian, and Landwehr, Carl
    IEEE Trans. Dependable Secur. Comput. 2004
  679. [george-thesis] Better Anonymous Communications
    Danezis, George
    Jul 2004
  680. [mixmaster-reliable] Comparison between two practical mix designs
    Diaz, Claudia, Sassaman, Len, and Dewitte, Evelyne
    Sep 2004
  681. [Zhang2004] A construction of locality-aware overlay network: mOverlay and its performance
    Zhang, Xin Yan, Zhang, Qian, Zhang, Zhensheng, Song, Gang, and Zhu, Wenwu
    IEEE Journal on Selected Areas in Communications 01/2004 2004
  682. [1111777] Data durability in peer to peer storage systems
    Utard, Gil, and Vernois, Antoine
    2004
  683. [Garces-Erice2004DataIndexing] Data Indexing in Peer-to-Peer DHT Networks
    Garcés-Erice, L, Felber, P. A., Biersack, E W, Urvoy-Keller, G., and Ross, K. W.
    2004
  684. [Dowling2004] The Decentralised Coordination of Self-Adaptive Components for Autonomic Distributed Systems
    Dowling, Jim
    10/2004 2004
  685. [1133613] Defending against eclipse attacks on overlay networks
    Singh, Atul, Castro, Miguel, Druschel, Peter, and Rowstron, Antony
    2004
  686. [Cramer04DemandDrivenClustering] Demand-Driven Clustering in MANETs
    Cramer, Curt, Stanze, Oliver, Weniger, Kilian, and Zitterbart, Martina
    2004
  687. [Hof04SecureDistributedServiceDirectory] Design of a Secure Distributed Service Directory for Wireless Sensornetworks
    Hof, Hans-Joachim, Blass, Erik-Oliver, Fuhrmann, Thomas, and Zitterbart, Martina
    2004
  688. [Dabek:2004:DDL:1251175.1251182] Designing a DHT for Low Latency and High Throughput
    Dabek, Frank, Li, Jinyang, Sit, Emil, Robertson, James, Kaashoek, Frans M., and Morris, Robert
    03/2004 2004
  689. [Chuang2004] Designing Incentive mechanisms for peer-to-peer systems
    Chuang, John
    04/2004 2004
  690. [_digitalfountains:] Digital Fountains: A Survey and Look Forward Abstract — We
    2004
  691. [golle:eurocrypt2004] Dining Cryptographers Revisited
    Golle, Philippe, and Juels, Ari
    May 2004
  692. [izal:dissecting] Dissecting BitTorrent: Five Months in a Torrent’s Lifetime.
    Izal, Mikel, Urvoy-Keller, Guillaume, Biersack, E W, Felber, Pascal, Hamra, Anwar Al, and Garcés-Erice, L
    04/2004 2004
  693. [Cramer04Scheduling] Distributed Job Scheduling in a Peer-to-Peer Video Recording System
    Cramer, Curt, Kutzner, Kendy, and Fuhrmann, Thomas
    2004
  694. [mmsec04-Klonowski] DUO–Onions and Hydra–Onions – Failure and Adversary Resistant Onion Protocols
    Iwanik, Jan, Klonowski, Marek, and Kutylowski, Miroslaw
    Sep 2004
  695. [Danezis04theeconomics] The Economics of Censorship Resistance
    Danezis, George, and Anderson, Ross
    2004
  696. [Freedman2004] Efficient Private Matching and Set Intersection
    Freedman, MichaelJ., Nissim, Kobbi, and Pinkas, Benny
    2004
  697. [Helmy04efficientresource] Efficient Resource Discovery in Wireless AdHoc Networks: Contacts Do Help
    Helmy, Ahmed
    2004
  698. [mrkoot:sirer04] Eluding carnivores: file sharing with strong anonymity
    Sirer, Emin Gün, Goel, Sharad, Robson, Mark, and Engin, Dogan
    2004
  699. [1013317] Energy-aware demand paging on NAND flash-based embedded storages
    Park, Chanik, Kang, Jeong-Uk, Park, Seon-Yeong, and Kim, Jin-Soo
    2004
  700. [1251279] Energy-efficiency and storage flexibility in the blue file system
    Nightingale, Edmund B., and Flinn, Jason
    2004
  701. [1021938] Erasure Code Replication Revisited
    Lin, W. K., Chiu, Dah Ming, and Lee, Y. B.
    2004
  702. [You04evaluationof] Evaluation of Efficient Archival Storage Techniques
    You, Lawrence L., and Karamanolis, Christos
    2004
  703. [Karp2004/ALGO] Finite length analysis of LT codes
    Karp, Richard, Luby, Michael, and Shokrollahi, M. Amin
    2002 2004
  704. [flow-correlation04] On Flow Correlation Attacks and Countermeasures in Mix Networks
    Zhu, Ye, Fu, Xinwen, Graham, Bryan, Bettati, Riccardo, and Zhao, Wei
    May 2004
  705. [esorics04-mauw] A formalization of anonymity and onion routing
    Mauw, Sjouke, Verschuren, Jan, and Vink, Erik P.
    2004
  706. [reiter:ccs2004] Fragile Mixing
    Reiter, Michael K., and Wang, XiaoFeng
    Oct 2004
  707. [Feldman:2004:FWP:1016527.1016539] Free-riding and whitewashing in peer-to-peer systems
    Feldman, Michal, Papadimitriou, Christos, Chuang, John, and Stoica, Ion
    08/2004 2004
  708. [Awerbuch2004] Group Spreading: A Protocol for Provably Secure Distributed Name Service
    Awerbuch, Baruch, and Scheideler, Christian
    2004
  709. [hitting-set04] The Hitting Set Attack on Anonymity Protocols
    Kesdogan, Dogan, and Pimenidis, Lexi
    May 2004
  710. [koepsell:wpes2004] How to Achieve Blocking Resistance for Existing Systems Enabling Anonymous Web Surfing
    Köpsell, Stefan, and Hilling, Ulf
    Oct 2004
  711. [fairbrother:pet2004] An Improved Construction for Universal Re-encryption
    Fairbrother, Peter
    May 2004
  712. [modular-approach] Information Hiding, Anonymity and Privacy: A Modular Approach
    Hughes, Dominic, and Shmatikov, Vitaly
    Journal of Computer Security 2004
  713. [1096703] Integrating Portable and Distributed Storage
    Tolia, Niraj, Harkes, Jan, Kozuch, Michael, and Satyanarayanan, Mahadev
    2004
  714. [987233] Internet indirection infrastructure
    Stoica, Ion, Adkins, Daniel, Zhuang, Shelley, Shenker, S, and Surana, Sonesh
    IEEE/ACM Trans. Netw. 2004
  715. [Menezes2004] An Introduction to Auction Theory
    Menezes, Flavio M., and Monteiro, Paulo K.
    2004
  716. [Amnefelt04keso-] Keso - a Scalable, Reliable and Secure Read/Write Peer-to-Peer File System
    Amnefelt, Mattias, and Svenningsson, Johanna
    05/2004 2004
  717. [Yu04leopard:a] Leopard: A locality-aware peer-to-peer system with no hot spot
    Yu, Yinzhe, Lee, Sanghwan, and Zhang, Zhi-li
    2004
  718. [feamster:wpes2004] Location Diversity in Anonymity Networks
    Feamster, Nick, and Dingledine, Roger
    Oct 2004
  719. [1251195] MACEDON: methodology for automatically creating, evaluating, and designing overlay networks
    Rodriguez, Adolfo, Killian, Charles, Bhat, Sooraj, Kostić, Dejan, and Vahdat, Amin
    2004
  720. [TH04] Measuring Anonymity in a Non-adaptive, Real-time System
    Tóth, Gergely, and Hornák, Zoltán
    2004
  721. [THV04] Measuring Anonymity Revisited
    Tóth, Gergely, Hornák, Zoltán, and Vajda, Ferenc
    Nov 2004
  722. [1015507] Mercury: supporting scalable multi-attribute range queries
    Bharambe, Ashwin R., Agrawal, Mukesh, and Seshan, Srinivasan
    SIGCOMM Comput. Commun. Rev. 2004
  723. [danezis:wpes2004] Minx: A simple and efficient anonymous packet format
    Danezis, George, and Laurie, Ben
    Oct 2004
  724. [Qiu:2004:MPA:1015467.1015508] Modeling and performance analysis of BitTorrent-like peer-to-peer networks
    Qiu, Dongyu, and Srikant, Rayadurgam
    08/2004 2004
  725. [Aberer04multifacetedsimultaneous] Multifaceted Simultaneous Load Balancing in DHT-based P2P systems: A new game with old balls and bins
    Aberer, Karl, Datta, Anwitaman, and Hauswirth, Manfred
    2004
  726. [DBLP:conf/infocom/ChandraBB04] MultiNet: Connecting to Multiple IEEE 802.11 Networks Using a Single Wireless Card
    Chandra, Ranveer, Bahl, Victor, and Bahl, Pradeep
    2004
  727. [Kleinberg:2004:NFD:982792.982803] Network failure detection and graph connectivity
    Kleinberg, Jon, Sandler, Mark, and Slivkins, Aleksandrs
    01/2004 2004
  728. [Ng:2004:NPS:1247415.1247426] A Network Positioning System for the Internet
    Ng, T. S. Eugene, and Zhang, Hui
    06/2004 2004
  729. [1251194] Operating system support for planetary-scale network services
    Bavier, Andy, Bowman, Mic, Chun, Brent, Culler, David, Karlin, Scott, Muir, Steve, Peterson, Larry, Roscoe, Timothy, Spalink, Tammo, and Wawrzoniak, Mike
    2004
  730. [golle:ccs2004] Parallel Mixing
    Golle, Philippe, and Juels, Ari
    Oct 2004
  731. [Fakult04peerstore:better] PeerStore: Better Performance by Relaxing in Peer-to-Peer Backup
    Landers, Martin, Zhang, Han, and Tan, Kian-Lee
    2004
  732. [Soezer2004] A Peer-to-Peer File Sharing System for Wireless Ad-Hoc Networks
    2004
  733. [Steinmetz2004] Peer-to-Peer Networking & -Computing
    Steinmetz, Ralf, and Wehrle, Klaus
    Informatik Spektrum 02/2004 2004
  734. [Cramer04LifeScience] Peer-to-Peer Overlays and Data Integration in a Life Science Grid
    Cramer, Curt, Schafferhans, Andrea, and Fuhrmann, Thomas
    2004
  735. [Liu2004] Personalized Web search for improving retrieval effectiveness
    Liu, Fang, Yu, C., and Meng, Weiyi
    Knowledge and Data Engineering, IEEE Transactions on Jan 2004
  736. [Group2004] POSIX - Portable Operating System Interface
    Group, The Open, and IEEE,
    2004
  737. [morphmix-fc2004] Practical Anonymity for the Masses with MorphMix
    Rennhard, Marc, and Plattner, Bernhard
    Feb 2004
  738. [Cox:2004:PDN:972374.972394] Practical, distributed network coordinates
    Cox, Russ, Dabek, Frank, Kaashoek, Frans M., Li, Jinyang, and Morris, Robert
    SIGCOMM Computer Communication Review 01/2004 2004
  739. [e2e-traffic] Practical Traffic Analysis: Extending and Resisting Statistical Disclosure
    Mathewson, Nick, and Dingledine, Roger
    May 2004
  740. [Wright:2004] The Predecessor Attack: An Analysis of a Threat to Anonymous Communications Systems
    Wright, Matthew, Adler, Micah, Levine, Brian Neil, and Shields, Clay
    ACM Transactions on Information and System Security (TISSEC) Nov 2004
  741. [Acquisti04privacyin] Privacy in Electronic Commerce and the Economics of Immediate Gratification
    Acquisti, Alessandro
    2004
  742. [Atallah:2004:PCF:1029179.1029204] Private collaborative forecasting and benchmarking
    Atallah, Mikhail, Bykova, Marina, Li, Jiangtao, Frikken, Keith, and Topkara, Mercan
    10/2004 2004
  743. [kissner04private] Private keyword-based push and pull with applications to anonymous communication
    Kissner, Lea, Oprea, Alina, Reiter, Michael K., Song, Dawn Xiaodong, and Yang, Ke
    Applied Cryptography and Network Security 2004
  744. [Despotovic2004] A Probabilistic Approach to Predict Peers’ Performance in P2P Networks
    Despotovic, Zoran, and Aberer, Karl
    09/2004 2004
  745. [crowds-model] Probabilistic Model Checking of an Anonymity System
    Shmatikov, Vitaly
    Journal of Computer Security 2004
  746. [berman-fc2004] Provable Unlinkability Against Traffic Analysis
    Berman, Ron, Fiat, Amos, and Ta-Shma, Amnon
    Feb 2004
  747. [Perng04providingcontent-based] Providing content-based services in a peer-to-peer environment
    Perng, Ginger, Wang, Chenxi, and Reiter, Michael K.
    2004
  748. [boneh04publickey] Public-key encryption with keyword search
    Boneh, Dan, Crescenzo, Giovanni Di, Ostrovsky, Rafail, and Persiano, Gieseppe
    2004 2004
  749. [pool-dummy04] Reasoning about the Anonymity Provided by Pool Mixes that Generate Dummy Traffic
    Diaz, Claudia, and Preneel, Bart
    May 2004
  750. [1247420] Redundancy elimination within large collections of files
    Kulkarni, Purushottam, Douglis, Fred, Lavoie, Jason, and Tracey, John M.
    2004
  751. [Barreto04areplicated] A Replicated File System for Resource Constrained Mobile Devices
    Barreto, João, and Ferreira, Paulo
    2004
  752. [golle:pet2004] Reputable Mix Networks
    Golle, Philippe
    May 2004
  753. [Gupta:2004:RMF:1018440.1021942] Reputation Management Framework and Its Use as Currency in Large-Scale Peer-to-Peer Networks
    Gupta, Rohit, and Somani, Arun K.
    08/2004 2004
  754. [Awerbuch04robustdistributed] Robust Distributed Name Service
    Awerbuch, Baruch
    2004
  755. [Feldman:2004:RIT:988772.988788] Robust incentive techniques for peer-to-peer networks
    Feldman, Michal, Lai, Kevin, Stoica, Ion, and Chuang, John
    05/2004 2004
  756. [Lewis2004] Scalable byzantine agreement
    Lewis, Scott, and Saia, Jared
    2004
  757. [Goh04secureindexes] Secure Indexes
    Goh, Eu-jin
    2004
  758. [Conrad04SecureServiceSignaling] Secure Service Signaling and fast Authorization in Programmable Networks
    Conrad, Michael, Fuhrmann, Thomas, Schoeller, Marcus, and Zitterbart, Martina
    2004
  759. [Schollmeier2004] Signaling and Networking in Unstructured Peer-to-Peer Networks
    Schollmeier, Rüdiger
    09/2004 2004
  760. [1007919] Simple efficient load balancing algorithms for peer-to-peer systems
    Karger, David, and Ruhl, Matthias
    2004
  761. [Shnayder04simulatingthe] Simulating the power consumption of large-scale sensor network applications
    Shnayder, Victor, Hempstead, Mark, Chen, Bor-rong, Allen, Geoff Werner, and Welsh, Matt
    2004
  762. [DanSer04] Statistical Disclosure or Intersection Attacks on Anonymity Systems
    Danezis, George, and Serjantov, Andrei
    May 2004
  763. [Androutsellis-Theotokis:2004:SPC:1041680.1041681] A survey of peer-to-peer content distribution technologies
    Androutsellis-Theotokis, Stephanos, and Spinellis, Diomidis
    ACM Computing Surveys 12/2004 2004
  764. [Tamilmani04swift:a] SWIFT: A System With Incentives For Trading
    Tamilmani, Karthik, Pai, Vinay, and Mohr, Alexander E.
    06/2004 2004
  765. [sync-batching] Synchronous Batching: From Cascades to Free Routes
    Dingledine, Roger, Shmatikov, Vitaly, and Syverson, Paul
    May 2004
  766. [taxonomy-dummy] Taxonomy of Mixes and Dummy Traffic
    Diaz, Claudia, and Preneel, Bart
    Aug 2004
  767. [timing-fc2004] Timing Attacks in Low-Latency Mix-Based Systems
    Levine, Brian Neil, Reiter, Michael K., Wang, Chenxi, and Wright, Matthew
    Feb 2004
  768. [tor-design] Tor: The Second-Generation Onion Router
    Dingledine, Roger, Mathewson, Nick, and Syverson, Paul
    Aug 2004
  769. [Kiran04totalrecall:] Total Recall: System Support for Automated Availability Management
    Kiran, Ranjita Bhagwan, Tati, Kiran, Cheng, Yu-chung, Savage, Stefan, and Voelker, Geoffrey M.
    2004
  770. [danezis:pet2004] The Traffic Analysis of Continuous-Time Mixes
    Danezis, George
    May 2004
  771. [Jiang_trustand] Trust and Cooperation in Peer-to-Peer Systems
    Jiang, Junjie, Bai, Haihuan, and Wang, Weinong
    2004
  772. [GolleJakobssonJuelsSyverson:universal04] Universal Re-Encryption for Mixnets
    Golle, Philippe, Jakobsson, Markus, Juels, Ari, and Syverson, Paul
    Feb 2004
  773. [warta04-Klonowski] Universal Re-encryption of Signatures and Controlling Anonymous Information Flow
    Klonowski, Marek, Kutylowski, Miroslaw, Lauks, Anna, and Zagorski, Filip
    Jul 2004
  774. [Dabek:2004:VDN:1030194.1015471] Vivaldi: a decentralized network coordinate system
    Dabek, Frank, Cox, Russ, Kaashoek, Frans M., and Morris, Robert
    SIGCOMM Computer Communication Review 10/2004 2004
  775. [1038318] Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
    Srivatsa, Mudhakar, and Liu, Ling
    2004
  776. [Bustamante04wayback:a] Wayback: A User-level Versioning File System for Linux
    Bustamante, Fabian, Cornell, Brian, Cornell, Brian, Dinda, Peter, Dinda, Peter, and Bustamante, Fabian
    2004
  777. [Andrade04whencan] When Can an Autonomous Reputation Scheme Discourage Free-riding in a Peer-to-Peer System?
    Andrade, Nazareno, Mowbray, Miranda, Cirne, Walfredo, and Brasileiro, Francisco
    2004
  778. [fu-active] Active Traffic Analysis Attacks and Countermeasures
    Fu, Xinwen, Graham, Bryan, Bettati, Riccardo, and Zhao, Wei
    2003 2003
  779. [939011] Ad hoc-VCG: a truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents
    Anderegg, Luzi, and Eidenbenz, Stephan
    2003
  780. [1251057] An analysis of compare-by-hash
    Henson, Val
    2003
  781. [fu-analytical] Analytical and Empirical Analysis of Countermeasures to Traffic Analysis Attacks
    Fu, Xinwen, Graham, Bryan, Bettati, Riccardo, and Zhao, Wei
    2003
  782. [SN03] On the Anonymity of Timed Pool Mixes
    Serjantov, Andrei, and Newman, Richard E.
    May 2003
  783. [Hildrum03asymptoticallyefficient] Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-Peer
    Hildrum, Kirsten, and Kubiatowicz, John
    2003
  784. [Hurler_automaticcontext] Automatic Context Integration for Group Aware Environments
    Hurler, Bernhard, Petrak, Leo, Fuhrmann, Thomas, Brand, Oliver, and Zitterbart, Martina
    2003
  785. [Chun2003] Bootstrapping a Distributed Computational Economy with Peer-to-Peer Bartering
    Chun, Brent, Fu, Yun, and Vahdat, Amin
    06/2003 2003
  786. [nguyen:pet2003] Breaking and Mending Resilient Mix-nets
    Nguyen, Lan, and Safavi-Naini, Rei
    Mar 2003
  787. [Prabhakar01buildinglow-diameter] Building Low-Diameter P2P Networks
    Pandurangan, Gopal, Raghavan, Prabhakar, and Upfal, Eli
    IEEE Journal on Selected Areas in Communications Aug 2003
  788. [Kostic:2003:BHB:945445.945473] Bullet: High Bandwidth Data Dissemination Using an Overlay Mesh
    Kostić, Dejan, Rodriguez, Adolfo, Albrecht, Jeannie, and Vahdat, Amin
    10/2003 2003
  789. [buses03] Buses for Anonymous Message Delivery
    Beimel, Amos, and Dolev, Shlomi
    Journal of Cryptology 2003
  790. [778418] A charging and rewarding scheme for packet forwarding in multi-hop cellular networks
    Salem, Naouel Ben, Buttyán, Levente, Hubaux, Jean-Pierre, and Jakobsson, Markus
    2003
  791. [kutzner03connecting] Connecting Vehicle Scatternets by Internet-Connected Gateways
    Kutzner, Kendy, Tchouto, Jean-Jacques, Bechler, Marc, Wolf, Lars, Bochow, Bernd, and Luckenbach, Thomas
    2003
  792. [1247343] A cooperative internet backup scheme
    Lillibridge, Mark, Elnikety, Sameh, Birrell, Andrew D., Burrows, Mike, and Isard, Michael
    2003
  793. [Leibowitz:2003:DKN:832311.837393] Deconstructing the Kazaa Network
    Leibowitz, Nathaniel, Ripeanu, Matei, and Wierzbicki, Adam
    06/2003 2003
  794. [wright03] Defending Anonymous Communication Against Passive Logging Attacks
    Wright, Matthew, Adler, Micah, Levine, Brian Neil, and Shields, Clay
    05/2003 2003
  795. [863960] A delay-tolerant network architecture for challenged internets
    Fall, Kevin
    2003
  796. [roca03design] Design and evaluation of a low density generator matrix
    Roca, Vincent, Khallouf, Zainab, and Laboure, Julien
    2003
  797. [_] A DHT-based Backup System
    Sit, Emil, Cates, Josh, and Cox, Russ
    2003
  798. [Acquisti03onthe] On the Economics of Anonymity
    Acquisti, Alessandro, Dingledine, Roger, and Syverson, Paul
    2003
  799. [Buchegger03theeffect] The Effect of Rumor Spreading in Reputation Systems for Mobile Ad-Hoc Networks
    Buchegger, Sonja, and Boudec, Jean-Yves Le
    2003
  800. [Kwon:2003:EPF:827273.829221] An Efficient Peer-to-Peer File Sharing Exploiting Hierarchy and Asymmetry
    Kwon, Gisik, and Ryu, Kyung D.
    01/2003 2003
  801. [Kamvar:2003:EAR:775152.775242] The EigenTrust algorithm for reputation management in P2P networks
    Kamvar, Sepandar D., Schlosser, Mario T., and Garcia-Molina, Hector
    05/2003 2003
  802. [948119] Establishing pairwise keys in distributed sensor networks
    Liu, Donggang, and Ning, Peng
    2003
  803. [Boyd2003] The evolution of altruistic punishment
    Boyd, Robert, Gintis, Herbert, Bowles, Samuel, and Richerson, Peter J.
    Proceedings of the National Academy of Sciences of the USA 03/2003 2003
  804. [Peterson03ext3cow:the] Ext3cow: The Design, Implementation, and Analysis of Metadata for a Time-Shifting File System
    Peterson, Zachary N. J., and Burns, Randal C.
    2003
  805. [Fuhrmann2003] Extremum Feedback with Partial Knowledge
    Fuhrmann, Thomas, and Widmer, Jörg
    2003
  806. [Buragohain2003] A game theoretic framework for incentives in P2P systems
    Buragohain, Chiranjeeb, Agrawal, Dvyakant, and Suri, Subhash
    09/2003 2003
  807. [diaz:pet2003] Generalising Mixes
    Diaz, Claudia, and Serjantov, Andrei
    Mar 2003
  808. [danezis:wpes2003] Heartbeat Traffic to Counter (n-1) Attacks
    Danezis, George, and Sassaman, Len
    10/2003 2003
  809. [herbivore:tr] Herbivore: A Scalable and Efficient Protocol for Anonymous Communication
    Goel, Sharad, Robson, Mark, Polte, Milo, and Sirer, Emin Gün
    Feb 2003
  810. [10.1109/ICPP.2003.1240580] HIERAS: A DHT Based Hierarchical P2P Routing Algorithm
    Xu, Zhiyong, Min, Rui, and Hu, Yiming
    Parallel Processing, International Conference on 2003
  811. [Blake:2003:HAS:1251054.1251055] High Availability, Scalable Storage, Dynamic Peer Networks: Pick Two
    Blake, Charles, and Rodrigues, Rodrigo
    05/2003 2003
  812. [10.1109/PTP.2003.1231513] Identity Crisis: Anonymity vs. Reputation in P2P Systems
    Marti, Sergio, and Garcia-Molina, Hector
    09/2003 2003
  813. [Gummadi:2003:IDR:863955.863998] The impact of DHT routing geometry on resilience and proximity
    Gummadi, Krishna Phani, Gummadi, Ramakrishna, Gribble, Steven D., Ratnasamy, Sylvia Paul, Shenker, S, and Stoica, Ion
    08/2003 2003
  814. [clayton:pet2003] Improving Onion Notation
    Clayton, Richard
    Mar 2003
  815. [Cohen2003] Incentives build robustness in BitTorrent
    Cohen, Bram
    06/2003 2003
  816. [Lai03incentivesfor] Incentives for Cooperation in Peer-to-Peer Networks
    Lai, Kevin, Feldman, Michal, Stoica, Ion, and Chuang, John
    06/2003 2003
  817. [Ahn03k-anonymousmessage] k-Anonymous Message Transmission
    Ahn, Luis, Bortz, Andrew, and Hopper, Nicholas J.
    2003 2003
  818. [Vishnumurthy2003] KARMA: a Secure Economic Framework for P2P Resource Sharing
    Vishnumurthy, Vivek, Chandrakumar, Sangeeth, and Sirer, Emin Gün
    06/2003 2003
  819. [Gupta03kelips:building] Kelips: Building an efficient and stable P2P DHT through increased memory and background overhead
    Gupta, Indranil, Birman, Kenneth P., Linga, Prakash, Demers, Alan, and Renesse, Robbert Van
    2003
  820. [Kaashoek2003] Koorde: A Simple degree-optimal distributed hash table
    Kaashoek, Frans M., and Karger, David
    2003
  821. [turner03lightweight] A Lightweight Currency Paradigm for the P2P Resource Market
    Turner, David A., and Ross, Keith W.
    2003
  822. [Eugster:2003:LPB:945506.945507] Lightweight probabilistic broadcast
    Eugster, Patrick, Guerraoui, Rachid, Handurukande, Sidath B., Kouznetsov, Petr, and Kermarrec, Anne-Marie
    ACM Trans. Comput. Syst. Nov 2003
  823. [864000] Making gnutella-like P2P systems scalable
    Chawathe, Yatin, Breslau, Lee, Lanham, Nick, and Shenker, S
    2003
  824. [1090700] Metadata Efficiency in Versioning File Systems
    Soules, Craig A. N., Goodson, Garth R., Strunk, John D., and Ganger, Gregory R.
    2003
  825. [newman:pet2003] Metrics for Traffic Analysis Prevention
    Newman, Richard E., Moskowitz, Ira S., Syverson, Paul, and Serjantov, Andrei
    Mar 2003
  826. [mixmaster-spec] Mixmaster Protocol –- Version 2
    Möller, Ulf, Cottrell, Lance, Palfrader, Peter, and Sassaman, Len
    Jul 2003
  827. [Danezis03mixminion:design] Mixminion: Design of a Type III Anonymous Remailer Protocol
    Danezis, George, Dingledine, Roger, and Mathewson, Nick
    2003
  828. [danezis:pet2003] Mix-networks with Restricted Routes
    Danezis, George
    Mar 2003
  829. [steinbrecher:pet2003] Modelling Unlinkability
    Steinbrecher, Sandra, and Köpsell, Stefan
    Mar 2003
  830. [Li:2003:MRQ:958491.958500] Multi-dimensional range queries in sensor networks
    Li, Xin, Kim, Young Jin, Govindan, Ramesh, and Hong, Wei
    2003
  831. [Conrad03multiplelanguage] Multiple language family support for programmable network systems
    Conrad, Michael, Schoeller, Marcus, Fuhrmann, Thomas, Bocksch, Gerhard, and Zitterbart, Martina
    2003
  832. [Gay03thenesc] The nesC language: A holistic approach to networked embedded systems
    Gay, David, Welsh, Matt, Levis, Philip, Brewer, Eric, Behren, Robert Von, and Culler, David
    2003
  833. [Fuhrmann_networkservices] Network Services for the Support of Very-Low-Resource Devices
    Fuhrmann, Thomas, Harbaum, Till, and Zitterbart, Martina
    2003
  834. [Bauer03newcovert] New Covert Channels in HTTP: Adding Unwitting Web Browsers to Anonymity Sets
    Bauer, Matthias
    2003
  835. [Klinedinst_anew] A New Generation of File Sharing Tools
    Klinedinst, Dan
    2003
  836. [Fuhrmann_anode] A Node Evaluation Mechanism for Service Setup in
    Fuhrmann, Thomas, Schoeller, Marcus, Schmidt, Christina, and Zitterbart, Martina
    2003
  837. [Tolia03opportunisticuse] Opportunistic Use of Content Addressable Storage for Distributed File Systems
    Tolia, Niraj, Kozuch, Michael, Satyanarayanan, Mahadev, Karp, Brad, Bressoud, Thomas, and Perrig, Adrian
    2003
  838. [792493] An Overlay-Network Approach for Distributed Access to SRS
    Fuhrmann, Thomas, Schafferhans, Andrea, and Etzold, Thure
    2003
  839. [SS03] Passive Attack Analysis for Connection-Based Anonymity Systems
    Serjantov, Andrei, and Sewell, Peter
    Oct 2003
  840. [Loo03peer-to-peerbackup] Peer-To-Peer Backup for Personal Area Networks
    Loo, Boon Thau, LaMarca, Anthony, Borriello, Gaetano, and Loo, Boon Thau
    2003
  841. [Aberer03p-grid:a] P-Grid: A Self-organizing Structured P2P System
    Aberer, Karl, Cudre-Mauroux, Philippe, Datta, Anwitaman, Despotovic, Zoran, Hauswirth, Manfred, Punceva, Magdalena, and Schmidt, Roman
    2003
  842. [Cuenca-Acuna03planetp:using] PlanetP: Using Gossiping to Build Content Addressable Peer-to-Peer Information Sharing Communities
    Cuenca-Acuna, Francisco Matias, Peery, Christopher, Martin, Richard P., and Nguyen, Thu D.
    2003
  843. [DBLP:conf/ccs/YangG03] PPay: micropayments for peer-to-peer systems
    Yang, Beverly, and Garcia-Molina, Hector
    10/2003 2003
  844. [pt:03:ldpc] On the Practical Use of LDPC Erasure Codes for Distributed Storage Applications
    Plank, James S., and Thomason, Michael G.
    Sep 2003
  845. [camenisch2003pve] Practical Verifiable Encryption and Decryption of Discrete Logarithms
    Camenisch, Jan, and Shoup, Victor
    2003
  846. [agrawal03] Probabilistic Treatment of MIXes to Hamper Traffic Analysis
    Agrawal, Dakshi, Kesdogan, Dogan, and Penz, Stefan
    05/2003 2003
  847. [BM:mixencrypt] Provably Secure Public-Key Encryption for Length-Preserving Chaumian Mixes
    Möller, Bodo
    Apr 2003
  848. [Serjantov03puzzlesin] Puzzles in P2P Systems
    Serjantov, Andrei, and Lewis, Stephen
    10/2003 2003
  849. [Feldman03quantifyingdisincentives] Quantifying Disincentives in Peer-to-Peer Networks
    Feldman, Michal, Lai, Kevin, Chuang, John, and Stoica, Ion
    06/2003 2003
  850. [Huebsch:2003:QIP:1315451.1315480] Querying the internet with PIER
    Huebsch, Ryan, Hellerstein, Joseph M., Lanham, Nick, Loo, Boon Thau, Shenker, S, and Stoica, Ion
    2003
  851. [RatnasamyHellersteinShenker2003RangeQueries] Range Queries over DHTs
    Ratnasamy, Sylvia, Hellerstein, Joseph M., and Shenker, S
    2003
  852. [GKK03] Rapid Mixing and Security of Chaum’s Visual Electronic Voting
    Gomulkiewicz, Marcin, Klonowski, Marek, and Kutylowski, Miroslaw
    Oct 2003
  853. [maymounkov:rateless] Rateless Codes and Big Downloads.
    Maymounkov, Petar, and Mazières, David
    02/2003 2003
  854. [incomparable-pkeys] Receiver Anonymity via Incomparable Public Keys
    Waters, Brent, Felten, Edward W., and Sahai, Amit
    Oct 2003
  855. [rep-anon] Reputation in P2P Anonymity Systems
    Dingledine, Roger, Mathewson, Nick, and Syverson, Paul
    Jun 2003
  856. [Padmanabhan:2003:RPS:951950.952204] Resilient Peer-to-Peer Streaming
    Padmanabhan, Venkata N., Wang, Helen J., and Chou, Philip A.
    11/2003 2003
  857. [Fuhrmann03resultson] Results on the practical feasibility of programmable network services
    Fuhrmann, Thomas, Harbaum, Till, Kassianidis, Panos, Schoeller, Marcus, and Zitterbart, Martina
    2003
  858. [reusable-channels:wpes2003] Reusable Anonymous Return Channels
    Golle, Philippe, and Jakobsson, Markus
    10/2003 2003
  859. [Dinur2003] Revealing Information While Preserving Privacy
    Dinur, Irit, and Nissim, Kobbi
    2003
  860. [Lpcox03samsara:honor] Samsara: Honor Among Thieves in Peer-to-Peer Storage
    Cox, Landon P., and Noble, Brian D.
    10/2003 2003
  861. [Castro2003a] Scalable Application-level Anycast for Highly Dynamic Groups
    Castro, Miguel, Druschel, Peter, Kermarrec, Anne-Marie, and Rowstron, Antony
    09/2003 2003
  862. [776703] Security Performance
    Menascé, Daniel
    IEEE Internet Computing 2003
  863. [Qiu:2003:SRI:863955.863974] On selfish routing in internet-like environments
    Qiu, Lili, Yang, Yang Richard, Zhang, Yin, and Shenker, S
    08/2003 2003
  864. [766661] Self-Organized Public-Key Management for Mobile Ad Hoc Networks
    IEEE Transactions on Mobile Computing 2003
  865. [Naor03asimple] A Simple Fault Tolerant Distributed Hash Table
    Naor, Moni, and Wieder, Udi
    2003
  866. [Harvey:2003:SSO:1251460.1251469] SkipNet: a scalable overlay network with practical locality properties
    Harvey, Nicholas J. A., Jones, Michael B., Saroiu, Stefan, Theimer, Marvin, and Wolman, Alec
    2003
  867. [Freedman03sloppyhashing] Sloppy Hashing and Self-Organizing Clusters
    Freedman, Michael J., and Mazières, David
    2003
  868. [Klemm03aspecial-purpose] A Special-Purpose Peer-to-Peer File Sharing System for Mobile Ad Hoc Networks
    Klemm, Alexander, Klemm, Er, Lindemann, Christoph, and Waldhorst, Oliver
    2003
  869. [Castro:2003:SHM:1165389.945474] SplitStream: high-bandwidth multicast in cooperative environments
    Castro, Miguel, Druschel, Peter, Kermarrec, Anne-Marie, Nandi, Animesh, Rowstron, Antony, and Singh, Atul
    SIGOPS’03 Operating Systems Review 10/2003 2003
  870. [statistical-disclosure] Statistical Disclosure Attacks: Traffic Confirmation in Open Environments
    Danezis, George
    May 2003
  871. [942421] Stimulating cooperation in self-organizing mobile ad hoc networks
    Buttyán, Levente, and Hubaux, Jean-Pierre
    Mob. Netw. Appl. 2003
  872. [_onthe] On the Strategic Importance of Programmable Middleboxes
    Fuhrmann, Thomas
    2003
  873. [792432] Supporting Peer-to-Peer Computing with FlexiNet
    Fuhrmann, Thomas
    2003
  874. [1251470] Symphony: distributed hashing in a small world
    Manku, Gurmeet Singh, Bawa, Mayank, and Raghavan, Prabhakar
    2003
  875. [958494] Taming the underlying challenges of reliable multihop routing in sensor networks
    Woo, Alec, Tong, Terence, and Culler, David
    2003
  876. [feamster:pet2003] Thwarding Web Censorship with Untrusted Messenger Delivery
    Feamster, Nick, Balazinska, Magdalena, Wang, Winston, Balakrishnan, Hari, and Karger, David
    Mar 2003
  877. [Fuhrmann2003a] On the Topology of Overlay-Networks
    Fuhrmann, Thomas
    2003
  878. [DBLP:conf/iptps/DabekZDKS03] Towards a Common API for Structured Peer-to-Peer Overlays
    Dabek, Frank, Zhao, Ben Y., Druschel, Peter, Kubiatowicz, John, and Stoica, Ion
    02/2003 2003
  879. [642636] Usability and privacy: a study of Kazaa P2P file-sharing
    Good, Nathaniel S., and Krekelberg, Aaron
    2003
  880. [Fuhrmann_usingbluetooth] Using Bluetooth for Informationally Enhanced Environments Abstract
    Fuhrmann, Thomas, and Harbaum, Till
    2003
  881. [shsm03] Using Caching for Browsing Anonymity
    Shubina, Anna, and Smith, Sean
    ACM SIGEcom Exchanges Sep 2003
  882. [939859] Wireless Community Networks
    Jain, Saurabh, and Agrawal, Dharma P.
    Computer 2003
  883. [Boulkenafed02adhocfs:sharing] AdHocFS: Sharing Files in WLANs
    Boulkenafed, Malika, and Issarny, Valerie
    2002
  884. [BonehGolle:psp2002] Almost Entirely Correct Mixing With Application to Voting
    Boneh, Dan, and Golle, Philippe
    Nov 2002
  885. [664025] AMnet 2.0: An Improved Architecture for Programmable Networks
    Fuhrmann, Thomas, Harbaum, Till, Schoeller, Marcus, and Zitterbart, Martina
    2002
  886. [RRMPH02-1] Analysis of an Anonymity Network for Web Browsing
    Rennhard, Marc, Rafaeli, Sandro, Mathy, Laurent, Plattner, Bernhard, and Hutchison, David
    Jun 2002
  887. [wright02] An Analysis of the Degradation of Anonymous Protocols
    Wright, Matthew, Adler, Micah, Levine, Brian Neil, and Shields, Clay
    Feb 2002
  888. [Serjantov02anonymizingcensorship] Anonymizing Censorship Resistant Systems
    Serjantov, Andrei
    2002
  889. [Serj02-iptps] Anonymizing censorship resistant systems
    Serjantov, Andrei
    03/2002 2002
  890. [714768] Aspects of AMnet Signaling
    Speer, Anke, Schoeller, Marcus, Fuhrmann, Thomas, and Zitterbart, Martina
    2002
  891. [beimel-barrier] Breaking the O(n^1/(2k-1)) Barrier for Information-Theoretic Private Information Retrieval
    Beimel, Amos, Ishai, Yuval, Kushilevitz, Eyal, and Raymond, Jean-François
    2002
  892. [Mazieres:2002:BSF:571825.571840] Building secure file systems out of Byzantine storage
    Mazières, David, and Shasha, Dennis
    07/2002 2002
  893. [Oswald02capacity-achievingsequences] Capacity-achieving sequences for the erasure channel
    Oswald, Peter, and Shokrollahi, M. Amin
    IEEE Trans. Information Theory 12/2002 2002
  894. [cebolla] Cebolla: Pragmatic IP Anonymity
    Brown, Zach
    Jun 2002
  895. [Fiat02censorshipresistant] Censorship Resistant Peer-to-Peer Content Addressable Networks
    Fiat, Amos, and Saia, Jared
    2002
  896. [chaffinch] Chaffinch: Confidentiality in the Face of Legal Threats
    Clayton, Richard, and Danezis, George
    Oct 2002
  897. [511496] Choosing reputable servents in a P2P network
    Cornelli, Fabrizio, Damiani, Ernesto, Vimercati, Sabrina De Capitani, Paraboschi, Stefano, and Samarati, Pierangela
    2002
  898. [571638] COCA: A secure distributed online certification authority
    Zhou, Lidong, Schneider, Fred B., and Renesse, Robbert Van
    ACM Trans. Comput. Syst. 2002
  899. [Harren:2002:CQD:646334.687945] Complex Queries in DHT-based Peer-to-Peer Networks
    Harren, Matthew, Hellerstein, Joseph M., Huebsch, Ryan, Loo, Boon Thau, Shenker, S, and Stoica, Ion
    03/2002 2002
  900. [Mui:2002:CMT:820745.821158] A Computational Model of Trust and Reputation
    Mui, Lik, Mohtashemi, Mojdeh, and Halberstadt, Ari
    01/2002 2002
  901. [Elnikety2002] Cooperative Backup System
    Elnikety, Sameh, Lillibridge, Mark, Burrows, Mike, and Zwaenepoel, Willy
    2002
  902. [715916] CPCMS: A Configuration Management System Based on Cryptographic Names
    Shapiro, Jonathan S., and Vanderburgh, John
    2002
  903. [idemix] Design and implementation of the idemix anonymous credential system
    Camenisch, Jan, and Herreweghen, Els Van
    2002
  904. [713855] Design Evolution of the EROS Single-Level Store
    Shapiro, Jonathan S., and Adams, Jonathan
    2002
  905. [Rubenstein:2000:DSC:345063.339410] Detecting shared congestion of flows via end-to-end measurement
    Rubenstein, Dan, Kurose, Jim, and Towsley, Don
    IEEE/ACM Transactions on Networking 06/2002 2002
  906. [Feigenbaum:2002:DAM:570810.570812] Distributed algorithmic mechanism design: recent results and future directions
    Feigenbaum, Joan, and Shenker, S
    09/2002 2002
  907. [Hildrum:CSD-02-1178] Distributed Data Location in a Dynamic Network
    Hildrum, Kirsten, Kubiatowicz, John, Rao, Satish, and Zhao, Ben Y.
    Apr 2002
  908. [wagner] Don’t Shoot the Messenger: Limiting the Liability of Anonymous Remailers
    Wagner, Robyn
    New Mexico Law Review 2002
  909. [langos02] Dummy Traffic Against Long Term Intersection Attacks
    Berthold, Oliver, and Langos, Heinrich
    Apr 2002
  910. [camenisch2002da] Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials
    Camenisch, Jan, and Lysyanskaya, Anna
    2002
  911. [Saia02dynamicallyfault-tolerant] Dynamically Fault-Tolerant Content Addressable Networks
    Saia, Jared, Fiat, Amos, Gribble, Steven D., Karlin, Anna R., and Saroiu, Stefan
    2002
  912. [605408] Energy-efficient computing for wildlife tracking: design tradeoffs and early experiences with ZebraNet
    Juang, Philo, Oki, Hidekazu, Wang, Yong, Martonosi, Margaret, Peh, Li Shiuan, and Rubenstein, Daniel
    SIGARCH Comput. Archit. News 2002
  913. [687814] Erasure Coding Vs. Replication: A Quantitative Comparison
    Weatherspoon, Hakim, and Kubiatowicz, John
    2002
  914. [citeulike:1360149] Experiences Deploying a Large-Scale Emergent Network
    O’Hearn, Bryce W.
    2002
  915. [Castro2002] Exploiting network proximity in distributed hash tables
    Castro, Miguel, Druschel, Peter, and Hu, Y. Charlie
    2002
  916. [Castro2002a] Exploiting network proximity in peer-to-peer overlay networks
    Castro, Miguel, Druschel, Peter, Hu, Y. Charlie, and Rowstron, Antony
    2002
  917. [Adya:2002:FFA:844128.844130] FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment
    Adya, Atul, Bolosky, William J., Castro, Miguel, Cermak, Gerald, Chaiken, Ronnie, Douceur, John R., Howell, Jon, Lorch, Jacob R., Theimer, Marvin, and Wattenhofer, Roger
    ACM SIGOPS Operating Systems Review 12/2002 2002
  918. [Fu:2002:FSD:505452.505453] Fast and secure distributed read-only file system
    Fu, Kevin, Kaashoek, Frans M., and Mazières, David
    10/2000 2002
  919. [hintz02] Fingerprinting Websites Using Traffic Analysis
    Hintz, Andrew
    Apr 2002
  920. [Di2002] Finite-length analysis of low-density parity-check codes on the binary erasure channel
    Di, Changyan, Proietti, David, Telatar, I. Emre, Richardson, Thomas J., and Urbanke, Rüdiger L.
    01/2002 2002
  921. [Dan:SFMix03] Forward Secure Mixes
    Danezis, George
    Nov 2002
  922. [trickle02] From a Trickle to a Flood: Active Attacks on Several Mix Types
    Serjantov, Andrei, Dingledine, Roger, and Syverson, Paul
    Oct 2002
  923. [Levine:2002] Hordes –- A Multicast Based Protocol for Anonymity
    Levine, Brian Neil, and Shields, Clay
    Journal of Computer Security 2002
  924. [DBLP:conf/eurocrypt/RussellW02] How to Fool an Unbounded Adversary with a Short Key
    Russell, Alexander, and Wang, Hong
    2002
  925. [873217] Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities
    Ranganathan, Kavitha, Iamnitchi, Adriana, and Foster, Ian
    2002
  926. [Feamster02infranet:circumventing] Infranet: Circumventing Web Censorship and Surveillance
    Feamster, Nick, Balazinska, Magdalena, Harfst, Greg, Balakrishnan, Hari, and Karger, David
    2002
  927. [Cao:2002:IPG:508325.508330] Internet pricing with a game theoretical approach: concepts and examples
    Cao, Xi-Ren, Shen, Hong-Xia, Milito, Rodolfo, and Wirth, Patrica
    IEEE/ACM Trans. Netw. 04/2002 2002
  928. [stepping-stones] Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones
    Wang, Xinyuan, Reeves, Douglas S., and Wu, S. Felix
    Oct 2002
  929. [morphmix:wpes2002] Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection
    Rennhard, Marc, and Plattner, Bernhard
    Nov 2002
  930. [Freedman02introducingtarzan] Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer
    Freedman, Michael J., Sit, Emil, Cates, Josh, and Morris, Robert
    2002
  931. [646334] IPTPS ’01: Revised Papers from the First International Workshop on Peer-to-Peer Systems
    2002
  932. [Muthitacharoen02ivy:a] Ivy: A Read/Write Peer-to-Peer File System
    Muthitacharoen, Athicha, Morris, Robert, Gil, Thomer M., and Chen, Bengie
    2002
  933. [Maymounkov02kademlia:a] Kademlia: A Peer-to-peer Information System Based on the XOR Metric
    Maymounkov, Petar, and Mazières, David
    03/2001 2002
  934. [DBLP:journals/ijufks/Sweene02] k-Anonymity: A Model for Protecting Privacy
    Sweeney, Latanya
    International Journal of Uncertainty, Fuzziness and Knowledge-Based Systems 2002
  935. [Eschenauer02akey-management] A Key-Management Scheme for Distributed Sensor Networks
    Eschenauer, Laurent, and Gligor, Virgil D.
    2002
  936. [limits-open] Limits of Anonymity in Open Environments
    Kesdogan, Dogan, Agrawal, Dakshi, and Penz, Stefan
    Oct 2002
  937. [Halevy:2002:LBE:646767.704291] The LSD Broadcast Encryption Scheme
    Halevy, Dani, and Shamir, Adi
    08/2002 2002
  938. [10.1109/SFCS.2002.1181950] LT Codes
    Luby, Michael
    Foundations of Computer Science, Annual IEEE Symposium on 2002
  939. [randomized-checking] Making mix nets robust for electronic voting by randomized partial checking
    Jakobsson, Markus, Juels, Ari, and Rivest, Ron
    Aug 2002
  940. [Thomas:2002:MAO:767821.769444] A Market-Based Approach to Optimal Resource Allocation in Integrated-Services Connection-Oriented Networks
    Thomas, Panagiotis, Teneketzis, Demosthenis, and MacKie-Mason, Jeffrey K.
    Operations Research 07/2002 2002
  941. [Saroiu02ameasurement] A Measurement Study of Peer-to-Peer File Sharing Systems
    Saroiu, Stefan, Gummadi, P. Krishna, and Gribble, Steven D.
    Jan 2002
  942. [dwork02memorybound] On memory-bound functions for fighting spam
    Dwork, Cynthia, Goldberg, Andrew, and Naor, Moni
    2002
  943. [Hand2002] Mnemosyne: Peer-to-Peer Steganographic Storage
    Hand, Steven, and Roscoe, Timothy
    2002
  944. [Maymounkov02onlinecodes] Online codes (Extended Abstract)
    Maymounkov, Petar
    2002
  945. [Sherwood_p5:a] P5: A Protocol for Scalable Anonymous Communication
    Sherwood, Rob, Bhattacharjee, Bobby, and Srinivasan, Aravind
    Journal of Computer Security Dec 2002
  946. [Cox02pastiche:making] Pastiche: Making Backup Cheap and Easy
    Cox, Landon P., Murray, Christopher D., and Noble, Brian D.
    2002
  947. [513828] Performance analysis of the CONFIDANT protocol
    Buchegger, Sonja, and Boudec, Jean-Yves Le
    2002
  948. [Minsky02practicalset] Practical Set Reconciliation
    Minsky, Yaron, and Trachtenberg, Ari
    2002
  949. [fiveyearslater] Privacy-enhancing technologies for the Internet, II: Five years later
    Goldberg, Ian
    Apr 2002
  950. [c.rhea:probabilistic] Probabilistic Location and Routing
    Rhea, Sean C., and Kubiatowicz, John
    06/2002 2002
  951. [586136] Query-flood DoS attacks in gnutella
    Daswani, Neil, and Garcia-Molina, Hector
    2002
  952. [Douceur:2002:RSD:850928.851884] Reclaiming Space from Duplicate Files in a Serverless Distributed File System
    Douceur, John R., Adya, Atul, Bolosky, William J., Simon, Dan, and Theimer, Marvin
    07/2002 2002
  953. [Dingledine02reliablemix] Reliable MIX Cascade Networks through Reputation
    Dingledine, Roger, and Syverson, Paul
    2002
  954. [Cohen02replicationstrategies] Replication Strategies in Unstructured Peer-to-Peer Networks
    Cohen, Edith, and Shenker, S
    Oct 2002
  955. [Damiani2002] A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks
    Damiani, Ernesto, Vimercati, Sabrina De Capitani, Paraboschi, Stefano, Samarati, Pierangela, and Violante, Fabio
    2002
  956. [beimel-robust] Robust information-theoretic private information retrieval
    Beimel, Amos, and Stahl, Yoav
    2002
  957. [633045] Scalable application layer multicast
    Banerjee, Suman, Bhattacharjee, Bobby, and Kommareddy, Christopher
    2002
  958. [937250] A scalable content-addressable network
    Ratnasamy, Sylvia Paul
    2002
  959. [Castro02scribe:a] SCRIBE: A large-scale and decentralized application-level multicast infrastructure
    Castro, Miguel, Druschel, Peter, Kermarrec, Anne-Marie, and Rowstron, Antony
    IEEE Journal on Selected Areas in Communications (JSAC 2002
  960. [Douceur:2002:SDS:784592.784803] A Secure Directory Service based on Exclusive Encryption
    Douceur, John R., Adya, Atul, Benaloh, Josh, Bolosky, William J., and Yuval, Gideon
    12/2003 2002
  961. [844156] Secure routing for structured peer-to-peer overlay networks
    Castro, Miguel, Druschel, Peter, Ganesh, Ayalvadi, Rowstron, Antony, and Wallach, Dan S.
    SIGOPS Oper. Syst. Rev. 2002
  962. [Karlof02securerouting] Secure Routing in Wireless Sensor Networks: Attacks and Countermeasures
    Karlof, Chris, and Wagner, David
    2002
  963. [687810] Security Considerations for Peer-to-Peer Distributed Hash Tables
    Sit, Emil, and Morris, Robert
    2002
  964. [camenisch2002ssep] A Signature Scheme with Efficient Protocols
    Camenisch, Jan, and Lysyanskaya, Anna
    2002
  965. [Byers02simpleload] Simple Load Balancing for Distributed Hash Tables
    Byers, John W., Considine, Jeffrey, and Mitzenmacher, Michael
    2002
  966. [Capkun02smallworlds] Small Worlds in Security Systems: an Analysis of the PGP Certificate Graph
    Capkun, Srdan, Buttyán, Levente, and Hubaux, Jean-Pierre
    2002
  967. [567178] A State-of-the-Art Survey on Software Merging
    Mens, Tom
    IEEE Trans. Softw. Eng. 2002
  968. [TrafHTTP] Statistical Identification of Encrypted Web Browsing Traffic
    Sun, Qixiang, Simon, Daniel R., Wang, Yi-Min, Russell, Wilf, Padmanabhan, Venkata N., and Qiu, Lili
    May 2002
  969. [Montenegro02statisticallyunique] Statistically Unique and Cryptographically Verifiable (SUCV) Identifiers and Addresses
    Montenegro, Gabriel
    2002
  970. [wallach02p2psecurity] A Survey of Peer-to-Peer Security Issues
    Wallach, Dan S.
    2002
  971. [568525] A survey of rollback-recovery protocols in message-passing systems
    Elnozahy, Mootaz, Alvisi, Lorenzo, Wang, Yi-Min, and Johnson, David B.
    ACM Comput. Surv. 2002
  972. [Douceur:2002:SA:646334.687813] The Sybil Attack
    Douceur, John R.
    03/2002 2002
  973. [tarzan:ccs02] Tarzan: A Peer-to-Peer Anonymizing Network Layer
    Freedman, Michael J., and Morris, Robert
    Nov 2002
  974. [Clifton:2002:TPP:772862.772867] Tools for privacy preserving distributed data mining
    Clifton, Chris, Kantarcioglu, Murat, Vaidya, Jaideep, Lin, Xiaodong, and Zhu, Michael Y.
    SIGKDD Explorations Newsletter 12/2002 2002
  975. [Serjantov02towardsan] Towards an Information Theoretic Metric for Anonymity
    Serjantov, Andrei, and Danezis, George
    2002
  976. [Serj02] Towards an Information Theoretic Metric for Anonymity
    Serjantov, Andrei, and Danezis, George
    04/2003 2002
  977. [Diaz02towardsmeasuring] Towards Measuring Anonymity
    Diaz, Claudia, Seys, Stefaan, Claessens, Joris, and Preneel, Bart
    2002
  978. [Diaz02] Towards measuring anonymity
    Diaz, Claudia, Seys, Stefaan, Claessens, Joris, and Preneel, Bart
    04/2003 2002
  979. [633027] Understanding BGP misconfiguration
    Mahajan, Ratul, Wetherall, David, and Anderson, Thomas
    2002
  980. [kesdogan:pet2002] Unobservable Surfing on the World Wide Web: Is Private Information Retrieval an alternative to the MIX based Approach?
    Kesdogan, Dogan, Borning, Mark, and Schmeink, Michael
    Apr 2002
  981. [651321] Venti: A New Approach to Archival Storage
    Quinlan, Sean, and Dorward, Sean
    2002
  982. [571857] Viceroy: a scalable and dynamic emulation of the butterfly
    Malkhi, Dahlia, Naor, Moni, and Ratajczak, David
    2002
  983. [Hall01onalgorithms] On Algorithms for Efficient Data Migration
    Hall, Joseph, Hartline, Jason D., Karlin, Anna R., Saia, Jared, and Wilkes, John
    2001
  984. [747491] Application-Level Multicast Using Content-Addressable Networks
    Ratnasamy, Sylvia Paul, Handley, Mark, Karp, Richard, and Shenker, S
    2001
  985. [gup] Authentic Attributes with Fine-Grained Anonymity Protection
    Stubblebine, Stuart, and Syverson, Paul
    2001
  986. [Jennings2001] Automated Negotiation: Prospects, Methods and Challenges
    Jennings, Nicholas R, Faratin, Peyman, Lomuscio, Alessio R., Parsons, Simon, Sierra, Carles, and Wooldridge, Michael
    Group Decision and Negociation 03/2001 2001
  987. [378347] Bayeux: an architecture for scalable and fault-tolerant wide-area data dissemination
    Zhuang, Shelley, Zhao, Ben Y., Joseph, Anthony D., Katz, Randy H., and Kubiatowicz, John
    2001
  988. [Stoica01chord:a] Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
    Stoica, Ion, Morris, Robert, Karger, David, Kaashoek, Frans M., and Balakrishnan, Hari
    2001 2001
  989. [Sirer_cliquenet:a] CliqueNet: A Self-Organizing, Scalable, Peer-to-Peer Anonymous Communication Substrate
    Sirer, Emin Gün, Polte, Milo, and Robson, Mark
    2001
  990. [Douceur01competitivehill-climbing] Competitive Hill-Climbing Strategies for Replica Placement in a Distributed File System
    Douceur, John R., and Wattenhofer, Roger
    2001
  991. [Michiardi01core:a] CORE: A Collaborative Reputation Mechanism to enforce node cooperation in Mobile Ad hoc Networks
    Michiardi, Pietro, and Molva, Refik
    2001
  992. [Cattaneo:2001:DIT:647054.715628] The Design and Implementation of a Transparent Cryptographic File System for UNIX
    Cattaneo, Giuseppe, Catuogno, Luigi, Sorbo, Aniello Del, and Persiano, Pino
    06/2001 2001
  993. [2001a] DVD COPY CONTROL ASSOCIATION vs. ANDREW BUNNER
    2001
  994. [Luby01efficienterasure] Efficient erasure correcting codes
    Luby, Michael, Mitzenmacher, Michael, Shokrollahi, M. Amin, and Spielman, Daniel A.
    IEEE Transactions on Information Theory 2001
  995. [PShuffle] An Efficient Scheme for Proving a Shuffle
    Furukawa, Jun, and Sako, Kazue
    2001
  996. [cl01a] An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation
    Camenisch, Jan, and Lysyanskaya, Anna
    2001
  997. [747489] Extremum Feedback for Very Large Multicast Groups
    Widmer, Jörg, and Fuhrmann, Thomas
    2001
  998. [freedom21-security] Freedom Systems 2.1 Security Issues and Analysis
    Back, Adam, Goldberg, Ian, and Shostack, Adam
    May 2001
  999. [Damgard2001] A Generalisation, a Simplification and Some Applications of Paillier’s Probabilistic Public-Key System
    Damg\aard, Ivan, and Jurik, Mats
    2001
  1000. [9999] The Gnutella Protocol Specification v0.4
    2001
  1001. [Cabrera01herald:achieving] Herald: Achieving a Global Event Notification Service
    Cabrera, Luis Felipe, Jones, Michael B., and Theimer, Marvin
    2001
  1002. [Luby01improvedlow-density] Improved low-density parity-check codes using irregular graphs
    Luby, Michael, Mitzenmacher, Michael, Shokrollahi, M. Amin, and Spielman, Daniel A.
    IEEE Trans. Inform. Theory 2001
  1003. [Golle01incentivesfor] Incentives for Sharing in Peer-to-Peer Networks
    Golle, Philippe, Leyton-Brown, Kevin, Mironov, Ilya, and Lillibridge, Mark
    2001
  1004. [beimel01informationtheoretic] Information-Theoretic Private Information Retrieval: A Unified Construction
    Beimel, Amos, and Ishai, Yuval
    Lecture Notes in Computer Science 2001
  1005. [Department01instrumentingthe] Instrumenting The World With Wireless Sensor Networks
    Estrin, Deborah, Pottie, Gregory J., Girod, L., and Srivastava, Mani
    2001
  1006. [Feeney2001] Investigating the energy consumption of a wireless network interface in an ad hoc networking environment
    Feeney, Laura Marie, and Nilsson, Martin
    04/2001 2001
  1007. [502052] A low-bandwidth network file system
    Muthitacharoen, Athicha, Chen, Benjie, and Mazières, David
    2001
  1008. [Cramer2001] Multiparty Computation from Threshold Homomorphic Encryption
    Cramer, Ronald, Damgárd, Ivan, and Nielsen, JesperB.
    2001
  1009. [jakobsson-optimally] An Optimally Robust Hybrid Mix Network (Extended Abstract)
    Jakobsson, Markus, and Juels, Ari
    2001
  1010. [Druschel01past:a] PAST: A large-scale, persistent peer-to-peer storage utility
    Druschel, Peter, and Rowstron, Antony
    2001
  1011. [697650] Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
    Rowstron, Antony, and Druschel, Peter
    2001
  1012. [558412] Peer-to-Peer: Harnessing the Power of Disruptive Technologies
    2001
  1013. [Dingledine2001] Peer-To-Peer: Harnessing the Power of Disruptive Technologies – Chapter 12: Free Haven
    Dingledine, Roger, Freedman, Michael J., and Molnar, David
    2001
  1014. [Chen01poblano:a] Poblano: A distributed trust model for peer-to-peer networks
    Chen, Rita, and Yeager, William
    2001
  1015. [Batten01pstore:a] pStore: A Secure Peer-to-Peer Backup System
    Batten, Christopher, Barr, Kenneth, Saraf, Arvind, and Trepetin, Stanley
    2001
  1016. [Hubaux01thequest] The Quest for Security in Mobile Ad Hoc Networks
    Hubaux, Jean-Pierre, Buttyán, Levente, and Capkun, Srdan
    2001
  1017. [501437] The quest for security in mobile ad hoc networks
    Hubaux, Jean-Pierre, Buttyán, Levente, and Capkun, Srdan
    2001
  1018. [patterns-failure] Real World Patterns of Failure in Anonymity Systems
    Clayton, Richard, Danezis, George, and Kuhn, Markus G.
    Apr 2001
  1019. [Dingledine01areputation] A Reputation System to Increase MIX-net Reliability
    Dingledine, Roger, Freedman, Michael J., Hopwood, David, and Molnar, David
    2001
  1020. [mix-acc] A Reputation System to Increase MIX-net Reliability
    Dingledine, Roger, Freedman, Michael J., Hopwood, David, and Molnar, David
    Apr 2001
  1021. [502048] Resilient overlay networks
    Andersen, David, Balakrishnan, Hari, Kaashoek, Frans M., and Morris, Robert
    SIGOPS Oper. Syst. Rev. 2001
  1022. [Scarlata01responderanonymity] Responder Anonymity and Anonymous Peer-to-Peer File Sharing
    Scarlata, Vincent, Levine, Brian Neil, and Shields, Clay
    11-14 nov. 2001 2001
  1023. [383072] A scalable content-addressable network
    Ratnasamy, Sylvia Paul, Francis, Paul, Handley, Mark, Karp, Richard, and Shenker, S
    2001
  1024. [10.1109/P2P.2001.990421] Search in JXTA and Other Distributed Networks
    Botros, Sherif, and Waterhouse, Steve
    Peer-to-Peer Computing, IEEE International Conference on 2001
  1025. [cheap-pseudonyms] The social cost of cheap pseudonyms
    Friedman, Eric, and Resnick, Paul
    Journal of Economics and Management Strategy 2001
  1026. [strong-eternity] The Strong Eternity Service
    Benes, Tonda
    Apr 2001
  1027. [Waldman01tangler:a] Tangler: A Censorship-Resistant Publishing System Based On Document Entanglements
    Waldman, Marc, and Mazières, David
    2001
  1028. [Zhao01tapestry:an] Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing
    Zhao, Ben Y., Zhao, Ben Y., Kubiatowicz, John, Kubiatowicz, John, Joseph, Anthony D., and Joseph, Anthony D.
    2001
  1029. [Laffont2001] The Theory of Incentives: The Principal-Agent Model
    Laffont, Jean-Jacques, and Martimort, David
    2001
  1030. [back01] Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems
    Back, Adam, Möller, Ulf, and Stiglic, Anton
    Apr 2001
  1031. [shuffle:ccs01] A Verifiable Secret Shuffle and its Application to E-Voting
    Neff, Andrew C.
    Nov 2001
  1032. [Heydon01thevesta] The Vesta Approach to Software Configuration Management
    Heydon, Allan, Levin, Roy, Mann, Timothy, and Yu, Yuan
    2001
  1033. [502054] Wide-area cooperative storage with CFS
    Dabek, Frank, Kaashoek, Frans M., Karger, David, Morris, Robert, and Stoica, Ion
    2001
  1034. [Heimbigner00adaptingpublish/subscribe] Adapting Publish/Subscribe Middleware to Achieve Gnutella-like Functionality
    Heimbigner, Dennis
    2000
  1035. [terminology] Anonymity, Unobservability, and Pseudonymity: A Consolidated Proposal for Terminology
    Pfitzmann, Andreas, and Hansen, Marit
    Jul 2000
  1036. [DBLP:conf/diau/PfitzmannK00] Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology
    Pfitzmann, Andreas, and Köhntopp, Marit
    2000
  1037. [mitkuro] Attack for Flash MIX
    Mitomo, Masashi, and Kurosawa, Kaoru
    2000
  1038. [rao-pseudonymity] Can Pseudonymity Really Guarantee Privacy?
    Rao, Josyula R., and Rohatgi, Pankaj
    Aug 2000
  1039. [339337] A case for end system multicast (keynote address)
    Chu, Yang-hua, Rao, Sanjay G., and Zhang, Hui
    06/2000 2000
  1040. [disad-free-routes] The disadvantages of free MIX routes and how to overcome them
    Berthold, Oliver, Pfitzmann, Andreas, and Standtke, Ronny
    Jul 2000
  1041. [820485] Energy-Efficient Communication Protocol for Wireless Microsensor Networks
    Heinzelman, Wendi Rabiner, Chandrakasan, Anantha, and Balakrishnan, Hari
    2000
  1042. [514164] Enforcing service availability in mobile ad-hoc WANs
    Buttyán, Levente, and Hubaux, Jean-Pierre
    2000
  1043. [339345] Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
    Bolosky, William J., Douceur, John R., Ely, David, and Theimer, Marvin
    SIGMETRICS Performance Evaluation Review 2000
  1044. [Pei00fisheyestate] Fisheye State Routing in Mobile Ad Hoc Networks
    Pei, Guangyu, Gerla, Mario, and Chen, Tsu-Wei
    2000
  1045. [freehaven-berk] The Free Haven Project: Distributed Anonymous Storage Service
    Dingledine, Roger, Freedman, Michael J., and Molnar, David
    Jul 2000
  1046. [freedom2-arch] Freedom Systems 2.0 Architecture
    Boucher, Philippe, Shostack, Adam, and Goldberg, Ian
    Dec 2000
  1047. [Clarke2000] Freenet: A Distributed Anonymous Information Storage and Retrieval System
    Clarke, Ian, Sandberg, Oskar, Wiley, Brandon, and Hong, Theodore W.
    Jul 2000
  1048. [desmedt] How To Break a Practical MIX and Design a New One
    Desmedt, Yvo, and Kurosawa, Kaoru
    2000
  1049. [hybrid-mix] A Length-Invariant Hybrid MIX
    Ohkubo, Miyako, and Abe, Masayuki
    2000
  1050. [379239] OceanStore: an architecture for global-scale persistent storage
    Kubiatowicz, John, Bindel, David, Chen, Yan, Czerwinski, Steven, Eaton, Patrick, Geels, Dennis, Gummadi, Ramakrishna, Rhea, Sean C., Weatherspoon, Hakim, Wells, Chris, and Zhao, Ben Y.
    2000
  1051. [onion-discex00] Onion Routing Access Configurations
    Syverson, Paul, Reed, Michael, and Goldschlag, David
    2000
  1052. [Jannotti:2000:ORM:1251229.1251243] Overcast: reliable multicasting with on overlay network
    Jannotti, John, Gifford, David K., Johnson, Kirk L., Kaashoek, Frans M., and O’Toole Jr., James W.
    10/2000 2000
  1053. [Song00practicaltechniques] Practical Techniques for Searches on Encrypted Data
    Song, Dawn Xiaodong, Wagner, David, and Perrig, Adrian
    2000 2000
  1054. [Shields00aprotocol] A Protocol for Anonymous Communication Over the Internet
    Shields, Clay, and Levine, Brian Neil
    2000
  1055. [ian-thesis] A Pseudonymous Communications Infrastructure for the Internet
    Goldberg, Ian
    Dec 2000
  1056. [publius] Publius: A robust, tamper-evident, censorship-resistant and source-anonymous web publishing system
    Waldman, Marc, Rubin, Aviel D., and Cranor, Lorrie
    Aug 2000
  1057. [Resnick:2000:RS:355112.355122] Reputation systems
    Resnick, Paul, Kuwabara, Ko, Zeckhauser, Richard, and Friedman, Eric
    Communications of the ACM 12/2000 2000
  1058. [896561] On the Scaling of Feedback Algorithms for Very Large Multicast Groups
    Fuhrmann, Thomas
    2000
  1059. [Minsky00setreconciliation] Set Reconciliation with Nearly Optimal Communication Complexity
    Minsky, Yaron, Trachtenberg, Ari, and Zippel, Richard
    2000
  1060. [Papadopouli00sevendegrees] Seven Degrees of Separation in Mobile Ad Hoc Networks
    Papadopouli, Maria, and Schulzrinne, Henning G.
    2000
  1061. [335325] The small-world phenomenon: an algorithm perspective
    Kleinberg, Jon
    2000
  1062. [onion-routing:pet2000] Towards an Analysis of Onion Routing Security
    Syverson, Paul, Tsudik, Gene, Reed, Michael, and Landwehr, Carl
    Jul 2000
  1063. [raymond00] Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems
    Raymond, Jean-François
    Jul 2000
  1064. [Rivest00trusteconomies] Trust Economies in The Free Haven Project
    Rivest, Ron, Smith, Arthur C., and Sniffen, Brian T.
    2000
  1065. [2000] Trust-region methods
    Conn, Andrew R., Gould, Nicholas I. M., and Toint, Philippe L.
    2000
  1066. [web-mix:pet2000] Web MIXes: A system for anonymous and unobservable Internet access
    Berthold, Oliver, Federrath, Hannes, and Köpsell, Stefan
    Jul 2000
  1067. [335405] XMill: an efficient compressor for XML data
    Liefke, Hartmut, and Suciu, Dan
    SIGMOD Rec. 2000
  1068. [xor-trees] Xor-trees for efficient anonymous multicast and reception
    Dolev, Shlomi, and Ostrovsky, Rafail
    ACM Trans. Inf. Syst. Secur 2000
  1069. [Nisan:1999:AMD:301250.301287] Algorithmic Mechanism Design
    Nisan, Noam, and Ronen, Amir
    05/1999 1999
  1070. [Nisan:1999:ASA:1764891.1764893] Algorithms for Selfish Agents
    Nisan, Noam
    03/1999 1999
  1071. [338955] Ant algorithms for discrete optimization
    Dorigo, Marco, Di Caro, Gianni, and Gambardella, Luca M.
    Artif. Life 1999
  1072. [1039861] Burt: The Backup and Recovery Tool
    Melski, Eric
    1999
  1073. [319159] Deciding when to forget in the Elephant file system
    Santry, Douglas S., Feeley, Michael J., Hutchinson, Norman C., Veitch, Alistair C., Carton, Ross W., and Ofir, Jacob
    SIGOPS Oper. Syst. Rev. 1999
  1074. [Clarke1999] A Distributed Decentralized Information Storage and Retrieval System
    Clarke, Ian
    1999
  1075. [301333] Flash mixing
    Jakobsson, Markus
    1999
  1076. [syverson99] Group Principals and the Formalization of Anonymity
    Syverson, Paul, and Stubblebine, Stuart
    1999 1999
  1077. [758535] New Sequences of Linear Time Erasure Codes Approaching the Channel Capacity
    Shokrollahi, M. Amin
    1999
  1078. [313556] Next century challenges: scalable coordination in sensor networks
    Estrin, Deborah, Govindan, Ramesh, Heidemann, John, and Kumar, Satish
    1999
  1079. [Goldschlag99onionrouting] Onion Routing for Anonymous and Private Internet Connections
    Goldschlag, David, Reed, Michael, and Syverson, Paul
    Communications of the ACM 1999
  1080. [1268712] Operation-based update propagation in a mobile file system
    Lee, Yui-Wah, Leung, Kwong-Sak, and Satyanarayanan, Mahadev
    1999
  1081. [Paillier1999] Public-key Cryptosystems Based on Composite Degree Residuosity Classes
    Paillier, Pascal
    1999
  1082. [RePEc:bla:restud:v:66:y:1999:i:1:p:3-21] The Theory of Moral Hazard and Unobservable Behaviour: Part I
    Mirrlees, James A.
    Review of Economic Studies 01/1999 1999
  1083. [314722] Analysis of random processes via And-Or tree evaluation
    Luby, Michael, Mitzenmacher, Michael, and Shokrollahi, M. Amin
    1998
  1084. [Reed98anonymousconnections] Anonymous Connections and Onion Routing
    Reed, Michael, Syverson, Paul, and Goldschlag, David
    IEEE Journal on Selected Areas in Communications 1998
  1085. [Reiter98crowds:anonymity] Crowds: Anonymity for web transactions
    Reiter, Michael K., and Rubin, Aviel D.
    ACM Transactions on Information and System Security 1998
  1086. [nym-alias-net] The Design, Implementation and Operation of an Email Pseudonym Server
    Mazières, David, and Kaashoek, Frans M.
    Nov 1998
  1087. [285258] A digital fountain approach to reliable distribution of bulk data
    Byers, John W., Luby, Michael, Mitzenmacher, Michael, and Rege, Ashutosh
    09/1998 1998
  1088. [Xu98lowdensity] Low Density MDS Codes and Factors of Complete Graphs
    Xu, Lihao, Bohossian, Vasken, Bruck, Jehoshua, and Wagner, David
    IEEE Trans. on Information Theory 1998
  1089. [581193] Modelling with Generalized Stochastic Petri Nets
    Marsan, Marco Ajmone, Balbo, Gianfranco, Conte, Gianni, Donatelli, Susanna, and Franceschinis, Giuliana
    SIGMETRICS Perform. Eval. Rev. 1998
  1090. [pipenet10] PipeNet 1.0
    Dai, Wei
    Jan 1998
  1091. [citeulike:2549551] PipeNet 1.1
    Dai, Wei
    1998
  1092. [tau-indy] A Random Server Model for Private Information Retrieval or How to Achieve Information Theoretic PIR Avoiding Database Replication
    Gertner, Yael, Goldwasser, Shafi, and Malkin, Tal
    1998
  1093. [realtime-mix] Real-Time MIXes: A Bandwidth-Efficient Anonymity Protocol
    Jerichow, Anja, Müller, Jan, Pfitzmann, Andreas, Pfitzmann, Birgit, and Waidner, Michael
    IEEE Journal on Selected Areas in Communications 1998
  1094. [Goldreich98securemulti-party] Secure Multi-Party Computation
    Goldreich, Oded
    1998
  1095. [stop-and-go] Stop-and-Go MIXes: Providing Probabilistic Anonymity in an Open System
    Kesdogan, Dogan, Egner, Jan, and Büschkes, Roland
    1998
  1096. [abe] Universally Verifiable mix-net With Verification Work Independent of The Number of mix Servers
    Abe, Masayuki
    1998
  1097. [CPIR] Computationally private information retrieval (extended abstract)
    Chor, Benny, and Gilboa, Niv
    1997
  1098. [Ogata97faulttolerant] Fault Tolerant Anonymous Channel
    Ogata, Wakaha, Kurosawa, Kaoru, Sako, Kazue, and Takatani, Kazunori
    1997
  1099. [Luby:1997:PLC:258533.258573] Practical Loss-Resilient Codes
    Luby, Michael, Mitzenmacher, Michael, Shokrollahi, M. Amin, Spielman, Daniel A., and Stemann, Volker
    05/1997 1997
  1100. [Goldberg1997] Privacy-enhancing Technologies for the Internet
    Goldberg, Ian, Wagner, David, and Brewer, Eric
    02/1997 1997
  1101. [Floyd1997] A Reliable Multicast Framework for Light-weight Sessions and Application Level Framing
    Floyd, Sally, Jacobson, Van, Liu, Ching-Gung, McCanne, Steven, and Zhang, Lixia
    IEEE/ACM Trans. Netw. 1997
  1102. [rewebber] TAZ servers and the rewebber network: Enabling anonymous publishing on the world wide web
    Goldberg, Ian, and Wagner, David
    First Monday Aug 1997
  1103. [Hunt1996] An Empirical Study of Delta Algorithms
    Hunt, James J., Vo, Kiem-Phong, and Tichy, Walter F.
    1996
  1104. [1267576] Establishing identity without certification authorities
    Ellison, Carl M.
    1996
  1105. [Anderson96theeternity] The Eternity Service
    Anderson, Ross
    09/1996 1996
  1106. [onion-routing:ih96] Hiding Routing Information
    Goldschlag, David, Reed, Michael, and Syverson, Paul
    May 1996
  1107. [Fargier:1996:MCS:1892875.1892901] Mixed constraint satisfaction: a framework for decision problems under incomplete knowledge
    Fargier, Hélène, Lang, Jérôme, and Schiex, Thomas
    08/1996 1996
  1108. [Gulcu96mixingemail] Mixing email with babel
    Gulcu, Ceki, and Tsudik, Gene
    1996
  1109. [remailer-history] Prospects for Remailers
    Parekh, Sameer
    First Monday Aug 1996
  1110. [Stemm96reducingpower] Reducing Power Consumption of Network Interfaces in Hand-Held Devices (Extended Abstract)
    Stemm, Mark, Gauthier, Paul, Harada, Daishi, and Katz, Randy H.
    1996
  1111. [672869] Balanced Distributed Search Trees Do Not Exist
    Kröll, Brigitte, and Widmayer, Peter
    1995
  1112. [224068] Exploiting weak connectivity for mobile file access
    Mummert, Lily B., Ebling, Maria, and Satyanarayanan, Mahadev
    SIGOPS Oper. Syst. Rev. 1995
  1113. [Ramanathan95thefinal] The final frontier: Embedding networked sensors in the soil
    Ramanathan, Nithya, Schoellhammer, Tom, Estrin, Deborah, Hansen, Mark, Harmon, Tom, Kohler, Eddie, and Srivastava, Mani
    1995
  1114. [cooper] Preserving Privacy in a Network of Mobile Computers
    Cooper, David A., and Birman, Kenneth P.
    05/1995 1995
  1115. [pir] Private Information Retrieval
    Chor, Benny, Goldreich, Oded, Kushilevitz, Eyal, and Sudan, Madhu
    1995
  1116. [SK] Receipt-Free MIX-Type Voting Scheme - A Practical Solution to the Implementation of a Voting Booth
    Kilian, Joe, and Sako, Kazue
    1995
  1117. [Demers94thebayou] The Bayou Architecture: Support for Data Sharing among Mobile Users
    Demers, Alan, Petersen, Karin, Spreitzer, Mike, Terry, Douglas, Theimer, Marvin, and Welch, Brent
    1994
  1118. [1267093] File system design for an NFS file server appliance
    Hitz, Dave, Lau, James, and Malcolm, Michael
    1994
  1119. [Manber94findingsimilar] Finding Similar Files in a Large File System
    Manber, Udi
    1994
  1120. [898770] Libckpt: Transparent Checkpointing under Unix
    Plank, James S., Beck, Micah, Kingsley, Gerry, and Li, Kai
    1994
  1121. [Gode1993] Allocative Efficiency of Markets with Zero-Intelligence Traders: Market as a Partial Substitute for Individual Rationality
    Gode, Dhananjay K., and Sunder, Shyam
    Journal of Political Economy 02/1993 1993
  1122. [rackoff93cryptographic] Cryptographic Defense Against Traffic Analysis
    Rackoff, Charles, and Simon, Daniel R.
    1993
  1123. [PIK] Efficient anonymous channel and all/nothing election scheme
    Park, Choonsik, Itoh, Kazutomo, and Kurosawa, Kaoru
    1993
  1124. [Menezes1993] Elliptic Curve Public Key Cryptosystems
    Menezes, Alfred J.
    1993
  1125. [Liedtke93apersistent] A Persistent System in Real Use - Experiences of the First 13 Years
    Liedtke, Jochen
    1993
  1126. [1993] SURF-2: A program for dependability evaluation of complex hardware and software systems
    1993
  1127. [DBLP:conf/eurocrypt/ChaumP92] Transferred Cash Grows in Size
    Chaum, David, and Pedersen, Torben P.
    05/1992 1992
  1128. [Yokoo91distributedconstraint] Distributed Constraint Optimization as a Formal Model of Partially Adversarial Cooperation
    Yokoo, Makoto, and Durfee, Edmund H.
    1991
  1129. [Deswarte91intrusiontolerance] Intrusion Tolerance in Distributed Computing Systems
    Deswarte, Yves, Blain, Laurent, and Fabre, Jean-charles
    1991
  1130. [ISDN-mixes] ISDN-mixes: Untraceable communication with very small bandwidth overhead
    Pfitzmann, Andreas, Pfitzmann, Birgit, and Waidner, Michael
    02/1991 1991
  1131. [Waidner:1990:DCD:111563.111630] The dining cryptographers in the disco: unconditional sender and recipient untraceability with computationally secure serviceability
    Waidner, Michael, and Pfitzmann, Birgit
    04/1989 1990
  1132. [78977] Skip lists: a probabilistic alternative to balanced trees
    Pugh, William
    Commun. ACM 1990
  1133. [Ben-Or1988] Completeness Theorems for Non-cryptographic Fault-tolerant Distributed Computation
    Ben-Or, Michael, Goldwasser, Shafi, and Wigderson, Avi
    1988
  1134. [chaum-dc] The Dining Cryptographers Problem: Unconditional Sender and Recipient Untraceability
    Chaum, David
    Journal of Cryptology 1988
  1135. [Kilian1988] Founding Crytpography on Oblivious Transfer
    Kilian, Joe
    1988
  1136. [1987] How to Play ANY Mental Game or A Completeness Theorem for Protocols with Honest Majority
    Goldreich, O., Micali, S., and Wigderson, A.
    1987
  1137. [37517] A simple and efficient implementation of a small database
    Birrell, Andrew D., Jones, Michael B., and Wobber, Edward P.
    SIGOPS Oper. Syst. Rev. 1987
  1138. [Stumm:1987:SDR:55482.55508] Strategies for decentralized resource management
    Stumm, Michael
    08/1987 1987
  1139. [1986] Networks Without User Observability — Design Options
    Pfitzmann, Andreas, and Waidner, Michael
    1986
  1140. [15043] Revised report on the algorithmic language scheme
    Rees, Jonathan, Clinger, William, and Kelsey, Richard
    SIGPLAN Not. 1986
  1141. [Tanenbaum86usingsparse] Using Sparse Capabilities in a Distributed Operating System
    Tanenbaum, Andrew, Mullender, Sape J., and Renesse, Robbert Van
    1986
  1142. [214121] Impossibility of distributed consensus with one faulty process
    Fischer, Michael J., Lynch, Nancy A., and Paterson, Michael S.
    J. ACM 1985
  1143. [pfitzmann85] Networks Without User Observability – Design Options
    Pfitzmann, Andreas, and Waidner, Michael
    04/1985 1985
  1144. [ElGamal:1985:PKC:19478.19480] A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms
    El Gamal, Taher
    1985 1985
  1145. [4202] RCS–-a system for version control
    Tichy, Walter F.
    Softw. Pract. Exper. 1985
  1146. [chaum85] Security without Identification: Transaction Systems to Make Big Brother Obsolete
    Chaum, David
    Communications of the ACM 10/1985 1985
  1147. [538134] Capability-Based Computer Systems
    Levy, Henry M.
    1984
  1148. [357176] The Byzantine Generals Problem
    Lamport, Leslie, Shostak, Robert, and Pease, Marshall
    ACM Trans. Program. Lang. Syst. 1982
  1149. [1982] Protocols for Secure Computations
    Yao, Andrew C.
    1982
  1150. [chaum-mix] Untraceable electronic mail, return addresses, and digital pseudonyms
    Chaum, David
    Communications of the ACM 02/1981 1981
  1151. [10.1109/SP.1980.10006] Protocols for Public Key Cryptosystems
    Merkle, Ralph C.
    Security and Privacy, IEEE Symposium on 1980
  1152. [1979] Compact Encodings of List Structure
    Bobrow, Daniel G., and Clark, Douglas W.
    1979
  1153. [padlipky78] Limitations of End-to-End Encryption in Secure Computer Networks
    Padlipsky, Michael A., Snow, David W., and Karger, Paul A.
    08/1978 1978
  1154. [karger77] Non-Discretionary Access Control for Decentralized Computing Systems
    Karger, Paul A.
    May 1977
  1155. [1977] Towards a methodology for statistical disclosure control
    Dalenius, T.
    Statistik Tidskrift 1977
  1156. [1076] New directions in cryptography
    Diffie, Whitfield, and Hellman, Martin E.
    IEEE Transactions on Information Theory 11/1976 1976
  1157. [1971] The Evolution of Reciprocal Altruism
    Trivers, Robert L.
    The Quarterly Review of Biology 03/1971 1971
  1158. [Kernighan1970] An Efficient Heuristic Procedure for Partitioning Graphs
    Kernighan, Brian W., and Lin, S.
    The Bell System Technical Journal 1970 1970
  1159. [Akerlof1970] The market for "lemons": Quality uncertainty and the market mechanism
    Akerlof, George A.
    The Quarterly Journal of Economics 08/1970 1970
  1160. [Bloom70space/timetrade-offs] Space/Time Trade-offs in Hash Coding with Allowable Errors
    Bloom, Burton H.
    Communications of the ACM 1970
  1161. [1968] The Tragedy of the Commons
    Hardin, Garrett
    Science 1968
  1162. [1962] Low-density parity-check codes
    Gallager, Robert G.
    Information Theory, IRE Transactions on 1962
  1163. [reed60polynomial] Polynomial codes over certain finite fields
    Reed, Irving, and Solomon, Golomb
    Journal of the Society of Industrial and Applied Mathematics 06/1960 1960
  1164. [1959] On Random Graphs I.
    Erdős, Paul, and Rényi, Alfréd
    Publicationes Mathematicae (Debrecen) 1959 1959
  1165. [368907] On programming of arithmetic operations
    Ershov, Andrey Petrovych
    Commun. ACM 1958
  1166. [1950] Equilibrium points in n-person games
    Jr., John F. Nash
    PNAS. Proceedings of the National Academy of Sciences of the USA 01/1950 1950
  1167. [1944] The Theory of Games and Economic Behavior
    Neumann, John, and Morgenstern, Oskar
    1944
  1168. [Teich2017] Implementing Privacy Preserving Auction Protocols
    Teich, Markus
    02/2017 2017
  1169. [Ulrich2017] Improving Voice over GNUnet
    Ulrich, Christian
    07/2017 2017
  1170. [Burdges2016] Enabling Secure Web Payments with GNU Taler
    Burdges, Jeffrey, Dold, Florian, Grothoff, Christian, and Stanisci, Marcello
    12/2016 2016
  1171. [Kuehne2016] GNUnet und Informationsmacht: Analyse einer P2P-Technologie und ihrer sozialen Wirkung
    Kühne, Christian Ricardo
    04/2016 2016
  1172. [Schanzenbach2016] Managing and Presenting User Attributes over a Decentralized Secure Name System
    Schanzenbach, Martin, and Banse, Christian
    09/2016 2016
  1173. [Garcia-Recuero2016] Privacy-Preserving Abuse Detection in Future Decentralised Online Social Networks
    Garcı́a-Recuero, , Burdges, Jeffrey, and Grothoff, Christian
    09/2016 2016
  1174. [Kuehne2016a] Zur Idee herrschaftsfreier kooperativer Internetdienste
    Kühne, Christian Ricardo
    FIfF-Kommunikation 2016
  1175. [Dold2015] Byzantine Fault Tolerant Set Consensus with Efficient Set Reconciliation
    Dold, Florian
    12/2015 2015
  1176. [Wachs2015] A Secure and Resilient Communication Infrastructure for Decentralized Networking Applications
    Wachs, Matthias
    02/2015 2015
  1177. [Benevs2014] An Approach for Home Routers to Securely Erase Sensitive Data
    Beneš, Nicolas
    10/2014 2014
  1178. [Wachs2014] Automatic Transport Selection and Resource Allocation for Resilient Communication in Decentralised Networks
    Wachs, Matthias, Oehlmann, Fabian, and Grothoff, Christian
    10/2014 2014
  1179. [Polot2014] CADET: Confidential Ad-hoc Decentralized End-to-End Transport
    Polot, Bartlomiej, and Grothoff, Christian
    2014 2014
  1180. [Wachs2014a] A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System
    Wachs, Matthias, Schanzenbach, Martin, and Grothoff, Christian
    2014
  1181. [Scheibner2014] Control Flow Analysis for Event-Driven Programs
    Scheibner, Florian
    07/2014 2014
  1182. [Morales2014] Cryogenic: Enabling Power-Aware Applications on Linux
    Morales, Alejandra
    02/2014 2014
  1183. [Dold2014] Cryptographically Secure, Distributed Electronic Voting
    Dold, Florian
    08/2014 2014
  1184. [Tarabai2014] A Decentralized and Autonomous Anomaly Detection Infrastructure for Decentralized Peer-to-Peer Networks
    Tarabai, Omar
    10/2014 2014
  1185. [Singh2014] Experimental comparison of Byzantine fault tolerant distributed hash tables
    Singh, Supriti
    09/2014 2014
  1186. [Kirsch2014] Improved Kernel-Based Port-Knocking in Linux
    Kirsch, Julian
    08/2014 2014
  1187. [Grothoff2014] The Internet is Broken: Idealistic Ideas for Building a GNU Network
    Grothoff, Christian, Polot, Bartlomiej, and Loesch, Carlo
    Feb 2014
  1188. [Oehlmann2014] Machine Learning for Bandwidth Management in Decentralized Networks
    Oehlmann, Fabian
    02/2014 2014
  1189. [Arias2014] Numerical Stability and Scalability of Secure Private Linear Programming
    Arias, Raphael
    02/2014 2014
  1190. [Toth2013] Design of a Social Messaging System Using Stateful Multicast
    Toth, Gabor X
    2013
  1191. [Wachs2013] On the Feasibility of a Censorship Resistant Decentralized Name System
    Wachs, Matthias, Schanzenbach, Martin, and Grothoff, Christian
    10/2013 2013
  1192. [Totakura2013] Large Scale Distributed Evaluation of Peer-to-Peer Protocols
    Totakura, Sree Harsha
    06/2013 2013
  1193. [Teich2013] Monkey - Generating Useful Bug Reports Automatically
    Teich, Markus
    07/2013 2013
  1194. [Szengel2012] Decentralized Evaluation of Regular Expressions for Capability Discovery in Peer-to-Peer Networks
    Szengel, Maximilian
    11/2012 2012
  1195. [Schanzenbach2012] Design and Implementation of a Censorship Resistant and Fully Decentralized Name System
    Schanzenbach, Martin
    09/2012 2012
  1196. [Evans2012] Efficient and Secure Decentralized Network Size Estimation
    Evans, Nathan S, Polot, Bartlomiej, and Grothoff, Christian
    05/2012 2012
  1197. [Evans2012a] Efficient and Secure Decentralized Network Size Estimation
    Evans, Nathan S, Polot, Bartlomiej, and Grothoff, Christian
    05/2012 2012
  1198. [Evans2011d] Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols
    Evans, Nathan S, and Grothoff, Christian
    2011
  1199. [Grothoff2011] The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond
    Grothoff, Christian
    2011
  1200. [Bernstein2011] High-speed high-security signatures
    Bernstein, Daniel J., Duif, Niels, Lange, Tanja, Schwabe, Peter, and Hang, Bo-Yin
    Journal of Cryptographic Engineering 09/2011 2011
  1201. [Evans2011] Methods for Secure Decentralized Routing in Open Networks
    Evans, Nathan S
    08/2011 2011
  1202. [Polot2011] Performance Regression Monitoring with Gauger
    Polot, Bartlomiej, and Grothoff, Christian
    LinuxJournal Sep 2011
  1203. [Evans2011a] R5N : Randomized Recursive Routing for Restricted-Route Networks
    Evans, Nathan S, and Grothoff, Christian
    09/2011 2011
  1204. [Loesch2011] Scalability & Paranoia in a Decentralized Social Network
    Loesch, Carlo, Toth, Gabor X, and Baumann, Mathias
    06/2011 2011
  1205. [Eppstein2011] What’s the difference?: efficient set reconciliation without prior context
    Eppstein, David, Goodrich, Michael T., Uyeda, Frank, and Varghese, George
    2011
  1206. [Polot2010] Adapting Blackhat Approaches to Increase the Resilience of Whitehat Application Scenarios
    Polot, Bartlomiej
    2010
  1207. [Mueller2010] Autonomous NAT Traversal
    Müller, Andreas, Evans, Nathan S, Grothoff, Christian, and Kamkar, Samy
    2010
  1208. [Krawczyk2010] Cryptographic Extraction and Key Derivation: The HKDF Scheme
    Krawczyk, Hugo
    2010
  1209. [Ma1992] Designing a universal name service
    Ma, Chaoying
    1992
  1210. [Joung2007] Keyword search in dht-based peer-to-peer networks
    Joung, Yuh-Jzer, Yang, Li-Wei, and Fang, Chien-Tse
    IEEE Journal on Selected Areas in Communications 2007
  1211. [Haeberlen2005] Glacier: Highly durable, decentralized storage despite massive correlated failures
    Haeberlen, Andreas, Mislove, Alan, and Druschel, Peter
    In Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation-Volume 2 2005
  1212. [Mislove2003] POST: a secure, resilient, cooperative messaging system
    Mislove, Alan
    Notes 2003
  1213. [Mislove2004] POST: A decentralized platform for reliable collaborative applications
    Mislove, Alan
    Master of Science Thesis 2004
  1214. [A.Neumann2008] Better Approach To Mobile Ad-hoc Networking (B.A.T.M.A.N.)
    A. Neumann, M. Lindner, and Wunderlich, S.
    2008
  1215. [A.Lindgren2012] Probabilistic Routing Protocol for Intermittently Connected Networks
    A. Lindgren, E. Davies, and Grasic, S.
    2012
  1216. [C.Perkins2003] Ad hoc On-Demand Distance Vector (AODV) Routing
    C. Perkins, E. Belding-Royer, and Das, S.
    2003