Alternative digital communication networks (DCN) publications

Alternative digital communication networks (DCN) (1216)
  1. [Tyson2013] Towards an information-centric delay-tolerant network
    Tyson, Gareth, Bigham, John, and Bodanese, Eliane
  2. [Sathiaseelan2013] Information centric delay tolerant networking: An internet architecture for the challenged
    Sathiaseelan, Arjuna, Trossen, Dirk, Komnios, Ioannis, Ott, Joerg, and Crowcroft, Jon
  3. [Yi2014] On the role of routing in named data networking
    Yi, Cheng, Abraham, Jerald, Afanasyev, Alexander, Wang, Lan, Zhang, Beichuan, and Zhang, Lixia
    In Proceedings of the 1st international conference on Information-centric networking 2014
  4. [Trossen2015] Ip over icn-the better ip?
    Trossen, Dirk, Reed, Martin J, Riihijärvi, Janne, Georgiades, Michael, Fotiou, Nikos, and Xylomenos, George
    In Networks and Communications (EuCNC), 2015 European Conference on 2015
  5. [Trossen2015a] IP over ICN-the better IP? an unusual take on information-centric networking
    Trossen, Dirk, Reed, Martin J, Riihijärvi, Janne, Georgiades, Michael, Fotiou, Nikos, and Xylomenos, George
    arXiv preprint arXiv:1507.04221 2015
  6. [Hemmati2015] A Comparison of Name-Based Content Routing Protocols
    Hemmati, Ehsan, and Garcia-Luna-Aceves, JJ
    In Mobile Ad Hoc and Sensor Systems (MASS), 2015 IEEE 12th International Conference on 2015
  7. [Kawadia2011] Slinky: An adaptive protocol for content access in disruption-tolerant ad hoc networks
    Kawadia, Vikas, Riga, Niky, Opper, Jeff, and Sampath, Dhananjay
    In Proc. MobiHoc Workshop on Tactical Mobile Ad Hoc Networking 2011
  8. [Clarke2001] Freenet: A distributed anonymous information storage and retrieval system
    Clarke, Ian, Sandberg, Oskar, Wiley, Brandon, and Hong, Theodore W
    In Designing privacy enhancing technologies 2001
  9. [Clarke1999a] Freenet: A distributed anonymous information storage and retrieval system. Freenet White Paper
    Clarke, I, Sandberg, O, Wiley, B, and Hong, TW
  10. [Clarke2002] Protecting free expression online with freenet
    Clarke, Ian, Miller, Scott G, Hong, Theodore W, Sandberg, Oskar, and Wiley, Brandon
    IEEE Internet Computing 2002
  11. [Chen2011] Copss: An efficient content oriented publish/subscribe system
    Chen, Jiachen, Arumaithurai, Mayutan, Jiao, Lei, Fu, Xiaoming, and Ramakrishnan, KK
    In Architectures for Networking and Communications Systems (ANCS), 2011 Seventh ACM/IEEE Symposium on 2011
  12. [Greifenberg2008] Efficient publish/subscribe-based multicast for opportunistic networking with self-organized resource utilization
    Greifenberg, Janico, and Kutscher, Dirk
    In Advanced Information Networking and Applications-Workshops, 2008. AINAW 2008. 22nd International Conference on 2008
  13. [Haas2006] Gossip-based ad hoc routing
    Haas, Zygmunt J, Halpern, Joseph Y, and Li, Li
    IEEE/ACM Transactions on Networking (ToN) 2006
  14. [Hou2004] Gossip-based sleep protocol (GSP) for energy efficient routing in wireless ad hoc networks
    Hou, Xiaobing, and Tipper, David
    In Wireless Communications and Networking Conference, 2004. WCNC. 2004 IEEE 2004
  15. [Huang2004] Publish/subscribe in a mobile environment
    Huang, Yongqiang, and Garcia-Molina, Hector
    Wireless Networks 2004
  16. [Huang2001] Publish/subscribe in a mobile enviroment
    Huang, Yongqiang, and Garcia-Molina, Hector
    In Proceedings of the 2nd ACM international workshop on Data engineering for wireless and mobile access 2001
  17. [Hui2007] How small labels create big improvements
    Hui, Pan, and Crowcroft, Jon
    In Pervasive Computing and Communications Workshops, 2007. PerCom Workshops’ 07. Fifth Annual IEEE International Conference on 2007
  18. [Yoneki2007] A socio-aware overlay for publish/subscribe communication in delay tolerant networks
    Yoneki, Eiko, Hui, Pan, Chan, ShuYan, and Crowcroft, Jon
    In Proceedings of the 10th ACM Symposium on Modeling, analysis, and simulation of wireless and mobile systems 2007
  19. [Sollazzo2007] TACO-DTN: a time-aware content-based dissemination system for delay tolerant networks
    Sollazzo, Giuseppe, Musolesi, Mirco, and Mascolo, Cecilia
    In Proceedings of the 1st international MobiSys workshop on Mobile opportunistic networking 2007
  20. [Hui2007a] Bubble rap: Forwarding in small world dtns in ever decreasing circles
    Hui, Pan, and Crowcroft, Jon
  21. [Grossglauser2006] Locating mobile nodes with ease: learning efficient routes from encounter histories alone
    Grossglauser, Matthias, and Vetterli, Martin
    IEEE/ACM Transactions on Networking (TON) 2006
  22. [Stojmenovic1999] Home agent based location update and destination search schemes in ad hoc wireless networks
    Stojmenovic, Ivan
    Computer Science, SITE, University of Ottawa, TR-99-10 1999
  23. [Finn1987] Routing and Addressing Problems in Large Metropolitan-Scale Internetworks. ISI Research Report.
    Finn, Gregory G
  24. [DeCouto2001] Location proxies and intermediate node forwarding for practical geographic forwarding
    De Couto, Douglas SJ, and Morris, Robert
  25. [Mauve2001] A survey on position-based routing in mobile ad hoc networks
    Mauve, Martin, Widmer, Jorg, and Hartenstein, Hannes
    IEEE network 2001
  26. [Blazevic2002] Self organized terminode routing
    Blažević, Ljubica, Giordano, Silvia, and Le Boudec, Jean-Yves
    Cluster Computing 2002
  27. [Hubaux2001] Toward self-organized mobile ad hoc networks: the terminodes project
    Hubaux, J-P, Gross, Thomas, Le Boudec, J-Y, and Vetterli, Martin
    IEEE Communications Magazine 2001
  28. [Blazevic2001] Self organization in mobile ad hoc networks: the approach of Terminodes
    Blazevic, Ljubica, Buttyan, Levente, Capkun, Srdjan, Giordano, Silvia, Hubaux, J-P, and Le Boudec, J-Y
    IEEE Communications Magazine 2001
  29. [Blazevic2001a] Self organized terminode routing simulation
    Blažević, Ljubica, Giordano, Silvia, and Le Boudec, Jean-Yves
    In Proceedings of the 4th ACM international workshop on Modeling, analysis and simulation of wireless and mobile systems 2001
  30. [Lochert2005] Geographic routing in city scenarios
    Lochert, Christian, Mauve, Martin, Füßler, Holger, and Hartenstein, Hannes
    ACM SIGMOBILE mobile computing and communications review 2005
  31. [Blazevic2002a] A scalable routing scheme for self-organized terminode network
    Blazevic, Ljubica, Le Boudec, Jean-Yves, and Giordano, Silvia
    In Communication Networks and Distributed systems modeling and Simulation conference (CNDS) 2002
  32. [Hubaux2000] Towards mobile ad-hoc WANs: Terminodes
    Hubaux, J-P, Le Boudec, J-Y, Giordano, Silvia, Hamdi, Maher, Blazevic, Ljubica, Buttyan, Levente, and Vojnovic, Milan
    In Wireless Communications and Networking Confernce, 2000. WCNC. 2000 IEEE 2000
  33. [Hubaux1999] The terminode project: Towards mobile ad-hoc wans
    Hubaux, J-P, Le Boudec, J-Y, Giordano, Silvia, and Hamdi, Maher
    In Mobile Multimedia Communications, 1999.(MoMuC’99) 1999 IEEE International Workshop on 1999
  34. [Heissenbuettel2004] BLR: beacon-less routing algorithm for mobile ad hoc networks
    Heissenbüttel, Marc, Braun, Torsten, Bernoulli, Thomas, and WäLchli, Markus
    Computer communications 2004
  35. [Blazevic2002b] Anchored path discovery in terminode routing
    Blažević, Ljubica, Giordano, Silvia, and Le Boudec, Jean-Yves
    In International Conference on Research in Networking 2002
  36. [Krendzel2008] VIMLOC: Virtual Home Region multi-hash Location Service in wireless mesh networks
    Krendzel, Andrey, Mangues-Bafalluy, Josep, Requena-Esteso, Manuel, and Nunez, Jose-Martinez
    In Wireless Days, 2008. WD’08. 1st IFIP 2008
  37. [Yang2012] HLLS: a history information based light location service for MANETs
    Yang, Xinyu, Fan, Xiaojing, Yu, Wei, Fu, Xinwen, and Yang, Shusen
    Computer Networks 2012
  38. [Mangues-Bafalluy2010] VIMLOC Location Management in Wireless Meshes: Experimental Performance Evaluation and Comparison
    Mangues-Bafalluy, Josep, Requena-Esteso, Manuel, Núñez-Martı́nez, José, and Krendzel, Andrey
    In Communications (ICC), 2010 IEEE International Conference on 2010
  39. [Terry1995] Managing update conflicts in Bayou, a weakly connected replicated storage system
    Terry, Douglas B, Theimer, Marvin M, Petersen, Karin, Demers, Alan J, Spreitzer, Mike J, and Hauser, Carl H
    In ACM SIGOPS Operating Systems Review 1995
  40. [Lee2000] Operation-based update propagation in a mobile file system
    Lee, Yui-Wah, Leung, Kwong-Sak, and Satyanarayanan, Mahadev
  41. [Kistler1992] Disconnected operation in the Coda file system
    Kistler, James J, and Satyanarayanan, Mahadev
    ACM Transactions on Computer Systems (TOCS) 1992
  42. [Kistler1991] Disconnected operation in the Coda file system
    Kistler, James J, and Satyanarayanan, Mahadev
  43. [Muthitacharoen2001] A low-bandwidth network file system
    Muthitacharoen, Athicha, Chen, Benjie, and Mazieres, David
    In ACM SIGOPS Operating Systems Review 2001
  44. [Muthitacharoen2002] Ivy: A read/write peer-to-peer file system
    Muthitacharoen, Athicha, Morris, Robert, Gil, Thomer M, and Chen, Benjie
    ACM SIGOPS Operating Systems Review 2002
  45. [Bindel2000] Oceanstore: An extremely wide-area storage system
    Bindel, David, Chen, Yan, Eaton, Patrick, Geels, Dennis, Gummadi, Ramakrishna, Rhea, Sean, Weatherspoon, Hakim, Weimer, Westley, Wells, Christopher, Zhao, Ben, and others,
    In Proceedings of the 9th International Conference on Architectural Support for Programming Languages and Operating Systems 2000
  46. [Yu2000] Design and evaluation of a continuous consistency model for replicated services
    Yu, Haifeng, and Vahdat, Amin
    In Proceedings of the 4th Conference on Symposium on Operating System Design & Implementation-Volume 4 2000
  47. [Kiely1996] Progressive transmission and compression images
    Kiely, AB
  48. [Kiely2003] The ICER progressive wavelet image compressor
    Kiely, Aaron, and Klimesh, Matthew
    IPN Progress Report 2003
  49. [Ruiz2001] Image compression for progressive transmission
    Ruiz, VG, Fernández, JJ, and Garcı́a, I
  50. [Meyer2012] A study of practical deduplication
    Meyer, Dutch T, and Bolosky, William J
    ACM Transactions on Storage (TOS) 2012
  51. [Stamm2002] PGF: a new progressive file format for lossy and lossless image compression
    Stamm, Christoph
  52. [Wang2008] An implementation of CCSDS 122.0-B-1 recommended standard
    Wang, Hongqiang, and Wang, Hongqiang
    University of Nebraska-Lincoln 2008
  53. [Standard2014] 41x
    Standard, CCSDS Recommended
  54. [Whitaker1991] SEU hardened memory cells for a CCSDS Reed-Solomon encoder
    Whitaker, Sterling, Canaris, John, and Liu, Kathy
    IEEE Transactions on Nuclear Science 1991
  55. [Lee2004] Expected file-delivery time of deferred NAK ARQ in CCSDS file-delivery protocol
    Lee, Daniel C, and Baek, Wonseok
    IEEE transactions on communications 2004
  56. [Yeh2002] Implementation of CCSDS lossless data compression for space and data archive applications
    Yeh, Pen-Shu
    In Proc. Space Operations Conf 2002
  57. [CCSDS2002] Reference model for an open archival information system (OAIS)
    CCSDS, January
  58. [Paaske1990] Improved decoding for a concatenated coding system recommended by CCSDS
    Paaske, Erik
    IEEE Transactions on Communications 1990
  59. [CCSDSBlueBook] 1: RF and Modulation Systems
    CCSDS Blue Book, Part
  60. [Code] Assignment Control Procedures
    Code, CCSDS Global Spacecraft Identification Field
  61. [DeCola2007] Performance analysis of CCSDS File Delivery Protocol and erasure coding techniques in deep space environments
    De Cola, Tomaso, Ernst, Harald, and Marchese, Mario
    Computer Networks 2007
  62. [Yeh2003] The CCSDS lossless data compression recommendation for space applications
    Yeh, Pen-Shu
    Chapter 2003
  63. [Garcia-Vilchez2009] Extending the CCSDS recommendation for image data compression for remote sensing scenarios
    Garcia-Vilchez, Fernando, and Serra-Sagrista, Joan
    IEEE Transactions on Geoscience and Remote Sensing 2009
  64. [Auge2011] Review and implementation of the emerging CCSDS recommended standard for multispectral and hyperspectral lossless image coding
    Auge, Estanislau, Santalo, Josep, Blanes, Ian, Serra-Sagrista, Joan, Kiely, Aaron, and others,
    In Data Compression, Communications and Processing (CCP), 2011 First International Conference on 2011
  65. [Gao2005] Performance evaluation of the CCSDS file delivery protocol-latency and storage requirement
    Gao, Jay L, and SeGuı́, John S
    In Aerospace Conference, 2005 IEEE 2005
  66. [Wang2010] Unreliable CCSDS file delivery protocol (CFDP) over cislunar communication links
    Wang, Ruhai, Shrestha, Bidhya L, Wu, Xuan, Wang, Tiaotiao, Ayyagari, Anil, Tade, Erin, Horan, Stephen, and Hou, Jia
    IEEE Transactions on Aerospace and Electronic Systems 2010
  67. [Jiao2011] Packets interleaving CCSDS file delivery protocol in deep space communication
    Jiao, Jian, Guol, Qing, and Zhang, Qinyu
    IEEE Aerospace and Electronic Systems Magazine 2011
  68. [Back2003] Expected file delivery time of immediate NAK ARQ in CCSDS file delivery protocol
    Back, W, and Lee, Daniel C
    In Aerospace Conference, 2003. Proceedings. 2003 IEEE 2003
  69. [Yeh2002a] CCSDS data compression recommendation- Development and status
    Yeh, Pen-Shu, Moury, GA, Armbruster, Philippe, and others,
    In Proceedings of SPIE 2002
  70. [CCSDS2003] Synchronization and Channel Coding
    Blue Book 2003
  71. [Weichi2001] CCSDS downlink virtual channel schedule and performance analysis [J]
    Weichi, Gu Yingqi Tan
    Chinese Space Science and Technology 2001
  72. [Yeh2005] The new CCSDS image compression recommendation
    Yeh, Pen-Shu, Armbruster, Philippe, Kiely, Aaron, Masschelein, Bart, Moury, Gilles, Schaefer, Christoph, and Thiebaut, Carole
    In Aerospace Conference, 2005 IEEE 2005
  73. [Eugster2003] The many faces of publish/subscribe
    Eugster, Patrick Th, Felber, Pascal A, Guerraoui, Rachid, and Kermarrec, Anne-Marie
    ACM computing surveys (CSUR) 2003
  74. [Cherkassky2000] Image Compression for Storage and Transmission of Digitized Images
    Cherkassky, Vladimir S, He, Xuhao, and Shao, Jie
  75. [Cherkassky2000a] Image Compression for Storage and Transmission of Digital Images
    Cherkassky, Vladimir, He, Xuhao, and Shao, Jie
  76. [Pitkaenen2007] Redundancy and distributed caching in mobile dtns
    Pitkänen, Mikko Juhani, and Ott, Jörg
    In Proceedings of 2nd ACM/IEEE international workshop on Mobility in the evolving internet architecture 2007
  77. [Roberson2006] Kleinberg navigation in fractal small-world networks
    Roberson, Mickey R, and Ben-Avraham, Daniel
    Physical Review E 2006
  78. [Zeng2002] Handbook of wireless networks and mobile computing
    Zeng, Qing-An, and Agrawal, Dharma P
    Publishers: John Wiley and Sons 2002
  79. [Kuga2004] Mechanically steerable antennas using dielectric phase shifters
    Kuga, Yasuo, Cha, Junho, and Ritcey, James A
    In Antennas and Propagation Society International Symposium, 2004. IEEE 2004
  80. [Castro2003] Scalable application-level anycast for highly dynamic groups
    Castro, Miguel, Druschel, Peter, Kermarrec, Anne-Marie, and Rowstron, Antony
    Networked Group Communication 2003
  81. [Kyasanur2005] On the efficacy of separating control and data into different frequency bands
    Kyasanur, Pradeep, Padhye, Jitendra, and Bahl, Paramvir
    In Broadband Networks, 2005. BroadNets 2005. 2nd International Conference on 2005
  82. [Ruottu2010] Developing Peer-to-Peer Web Applications
    Ruottu, Toni
    09/2010 2010
  83. [Bernstein2006] Curve25519: new Diffie-Hellman speed records.
    Bernstein, Daniel J.
    02/2006 2006
  84. [Tatara2005] Query Forwarding Algorithm Supporting Initiator Anonymity in GNUnet
    Tatara, Kohei, Hori, Y., and Sakurai, Kouichi
    07/2005 2005
  85. [Grothoff2005b] A Quick Introduction to Bloom Filters
    Grothoff, Christian
    08/2005 2005
  86. [Grothoff2005] Reading File Metadata with extract and libextractor
    Grothoff, Christian
    Linux Journal Jun 2005
  87. [Gritzalis2004] Enhancing Web privacy and anonymity in the digital era
    Gritzalis, Stefanos
    2004 2004
  88. [Grothoff2003] An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks
    Grothoff, Christian
    Wirtschaftsinformatik Jun 2003
  89. [Bennett2003] gap - Practical Anonymous Networking
    Bennett, Krista, and Grothoff, Christian
  90. [Ferreira2003] A Transport Layer Abstraction for Peer-to-Peer Networks
    Ferreira, Ronaldo A., Grothoff, Christian, and Ruth, Paul
  91. [Bennett2002b] Efficient Sharing of Encrypted Data
    Bennett, Krista, Grothoff, Christian, Horozov, Tzvetan, and Patrascu, Ioana
  92. [Bennett2002] The GNet Whitepaper
    Bennett, Krista, Stef, Tiberius, Grothoff, Christian, Horozov, Tzvetan, and Patrascu, Ioana
    06/2002 2002
  93. [Dold2016a] Byzantine Set-Union Consensus using Efficient Set Reconciliation
    Dold, Florian, and Grothoff, Christian
    6/2016 2016
  94. [Grothoff2015] El programa MORECOWBELL de la NSA: Doblan las campanas para el DNS
    Grothoff, Christian, Wachs, Matthias, Ermert, Monika, and Appelbaum, Jacob
    01/2015 2015
  95. [Grothoff2015a] Il programma MORECOWBELL della NSA: Campane a morto per il DNS
    Grothoff, Christian, Wachs, Matthias, Ermert, Monika, Appelbaum, Jacob, and Saiu, Luca
    01/2015 2015
  96. [Grothoff2015b] Le programme MORECOWBELL de la NSA Sonne le glas du NSA
    Grothoff, Christian, Wachs, Matthias, Ermert, Monika, Appelbaum, Jacob, and Courtes, Ludovic
    01/2015 2015
  97. [Grothoff2015c] NSA’s MORECOWBELL: Knell for DNS
    Grothoff, Christian, Wachs, Matthias, Ermert, Monika, and Appelbaum, Jacob
    01/2015 2015
  98. [Devet2014] The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency
    Devet, Casey, and Goldberg, Ian
  99. [Herrmann2014] Censorship-Resistant and Privacy-Preserving Distributed Web Search
    Herrmann, Michael, Zhang, Ren, Ning, Kai-Chun, and Diaz, Claudia
  100. [Oya2014] Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications
    Oya, Simon, Troncoso, Carmela, and Pérez-González, Fernando
  101. [Borisov2014] DP5: A Private Presence Service
    Borisov, Nikita, Danezis, George, and Goldberg, Ian
    May 2014
  102. [Chen2014] On the Effectiveness of Obfuscation Techniques in Online Social Networks
    Chen, Terence, Boreli, Roksana, Kaafar, Mohamed-Ali, and Friedman, Arik
  103. [Lueks2014] Forward-Secure Distributed Encryption
    Lueks, Wouter, Hoepman, Jaap-Henk, and Kursawe, Klaus
  104. [DBLP:conf/stoc/Ullman13] Answering n^2+o(1) Counting Queries with Differential Privacy is Hard
    Ullman, Jonathan
  105. [Chatzikokolakis2013] Broadening the Scope of Differential Privacy Using Metrics
    Chatzikokolakis, Konstantinos, Andrés, MiguelE., Bordenabe, NicolásEmilio, and Palamidessi, Catuscia
  106. [DBLP:conf/netys/BoutetFJKR13] FreeRec: An Anonymous and Distributed Personalization Architecture
    Boutet, Antoine, Frey, Davide, Jegou, Arnaud, Kermarrec, Anne-Marie, and Ribeiro, Heverson B.
  107. [Al-Ameen2013] Persea: A Sybil-resistant Social DHT
    Al-Ameen, Mahdi N., and Wright, Matthew
  108. [sep-privacy] Privacy
    DeCew, Judith
  109. [Toth2013b] Public Key Pinning for TLS Using a Trust on First Use Model
    Toth, Gabor X
  110. [Uzunov2013] Speeding Up Tor with SPDY
    Uzunov, Andrey
    11/2013 2013
  111. [Kermarrec2013] Towards a Personalized Internet: a Case for a Full Decentralization.
    Kermarrec, Anne-Marie
    Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences Mar 2013
  112. [Biryukov2013] Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization
    Biryukov, A., Pustogarov, I., and Weinmann, R.
  113. [Boutet2013] WhatsUp: A Decentralized Instant News Recommender
    Boutet, Antoine, Frey, Davide, Guerraoui, Rachid, Jegou, Arnaud, and Kermarrec, Anne-Marie
  114. [knight2012autonetkit] AutoNetkit: simplifying large scale, open-source network experimentation
    Knight, Simon, Jaboldinov, Askar, Maennel, Olaf, Phillips, Iain, and Roughan, Matthew
    SIGCOMM Comput. Commun. Rev. 2012
  115. [Alaggan2012] BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters
    Alaggan, Mohammad, Gambs, Sébastien, and Kermarrec, Anne-Marie
  116. [congestion-tor12] Congestion-aware Path Selection for Tor
    Wang, Tao, Bauer, Kevin, Forero, Clara, and Goldberg, Ian
    02/2012 2012
  117. [Sadiq2012] CRISP: Collusion-resistant Incentive-compatible Routing and Forwarding in Opportunistic Networks
    Sadiq, Umair, Kumar, Mohan, and Wright, Matthew
  118. [DBLP:journals/corr/abs-1202-4503] A Critical Look at Decentralized Personal Data Architectures
    Narayanan, Arvind, Toubiana, Vincent, Barocas, Solon, Nissenbaum, Helen, and Boneh, Dan
    CoRR 02/2012 2012
  119. [Dodis2012] Differential Privacy with Imperfect Randomness
    Dodis, Yevgeniy, López-Alt, Adriana, Mironov, Ilya, and Vadhan, Salil
  120. [gossipico2012] Gossip-based counting in dynamic networks
    Bovenkamp, Ruud, Kuipers, Fernando, and Mieghem, Piet Van
    05/2012 2012
  121. [DBLP:conf/tridentcom/HermenierR12] How to Build a Better Testbed: Lessons from a Decade of Network Experiments on Emulab
    Hermenier, Fabien, and Ricci, Robert
  122. [Guha2012] Koi: A Location-Privacy Platform for Smartphone Apps
    Guha, Saikat, Jain, Mudit, and Padmanabhan, Venkata
    Apr 2012
  123. [oakland2012-lap] LAP: Lightweight Anonymity and Privacy
    Hsiao, Hsu-Chun, Kim, Tiffany Hyun-Jin, Perrig, Adrian, Yamada, Akira, Nelson, Sam, Gruteser, Marco, and Ming, Wei
    05/2012 2012
  124. [oakland2012-lastor] LASTor: A Low-Latency AS-Aware Tor Client
    Akhoondi, Masoud, Yu, Curtis, and Madhyastha, Harsha V.
    05/2012 2012
  125. [De2012] Lower Bounds in Differential Privacy
    De, Anindya
  126. [rossi2012modelnet] ModelNet-TE: An emulation tool for the study of P2P and traffic engineering interaction dynamics
    Rossi, D., Veglia, P., Sammarco, M., and Larroca, F.
    Peer-to-Peer Networking and Applications 2012
  127. [Halim2012] Monkey: Automated debugging of deployed distributed systems
    Halim, Safey A.
    07/2012 2012
  128. [Wander2012] NTALG - TCP NAT traversal with application-level gateways
    Wander, M., Holzapfel, S., Wacker, A., and Weis, T.
  129. [Wang2012] Octopus: A Secure and Anonymous DHT Lookup
    Wang, Qiyan, and Borisov, Nikita
    CoRR 2012
  130. [oakland2012-peekaboo] Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail
    Dyer, Kevin P., Coull, Scott, Ristenpart, Thomas, and Shrimpton, Thomas
    05/2012 2012
  131. [Toch2012] Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems
    Toch, Eran, Wang, Yang, and Cranor, LorrieFaith
    User Modeling and User-Adapted Interaction 2012
  132. [DBLP:conf/focs/DworkNV12] The Privacy of the Analyst and the Power of the State
    Dwork, Cynthia, Naor, Moni, and Vadhan, Salil P.
  133. [moin:tel-00724121] Recommendation and Visualization Techniques for Large Scale Data
    Moin, Afshin
    Jul 2012
  134. [handigol2012reproducible] Reproducible network experiments using container based emulation
    Handigol, N., Heller, B., Jeyakumar, V., Lantz, B., and McKeown, N.
    Proc. CoNEXT 2012
  135. [Pitoura2012] Saturn: Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems
    Pitoura, Theoni, Ntarmos, Nikos, and Triantafillou, Peter
    IEEE Transactions on Knowledge and Data Engineering 07/2012 2012
  136. [Zhou2012] The state-of-the-art in personalized recommender systems for social networking
    Zhou, Xujuan, Xu, Yue, Li, Yuefeng, Josang, Audun, and Cox, Clive
    Artificial Intelligence Review 2012
  137. [Browne2012] A Survey of Monte Carlo Tree Search Methods
    Browne, Cameron, Powley, Edward, Whitehouse, Daniel, Lucas, Simon, Cowling, Peter I., Rohlfshagen, Philipp, Tavener, Stephen, Perez, Diego, Samothrakis, Spyridon, and Colton, Simon
    IEEE Transactions on Computational Intelligence and AI in Games 03/2012 2012
  138. [Tarkoma2012] Theory and Practice of Bloom Filters for Distributed Systems
    Tarkoma, S., Rothenberg, C.E., and Lagerspetz, E.
    Communications Surveys Tutorials, IEEE First 2012
  139. [Zeng2012] User Interests Driven Web Personalization Based on Multiple Social Networks
    Zeng, Yi, Zhong, Ning, Ren, Xu, and Wang, Yan
  140. [pets2011-bagai] An Accurate System-Wide Anonymity Metric for Probabilistic Attacks
    Bagai, Rajiv, Lu, Huabo, Li, Rong, and Tang, Bin
    07/2011 2011
  141. [bnymble11] BNymble: More anonymous blacklisting at almost no cost
    Lofgren, Peter, and Hopper, Nicholas J.
    02/2011 2011
  142. [wpes11-bridgespa] BridgeSPA: Improving Tor Bridges with Single Packet Authorization
    Smits, Rob, Jain, Divam, Pidcock, Sarah, Goldberg, Ian, and Hengartner, Urs
    10/2011 2011
  143. [ccs2011-cirripede] Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability
    Houmansadr, Amir, Nguyen, Giang T. K., Caesar, Matthew, and Borisov, Nikita
    10/2011 2011
  144. [Bai2011] Collaborative Personalized Top-k Processing
    Bai, Xiao, Guerraoui, Rachid, Kermarrec, Anne-Marie, and Leroy, Vincent
    ACM Trans. Database Syst. 2011
  145. [Shapiro2011] A comprehensive study of Convergent and Commutative Replicated Data Types
    Shapiro, Marc, Preguica, Nuno, Baquero, Carlos, and Zawirski, Marek
    01/2011 2011
  146. [Furness2011] Considering Complex Search Techniques in DHTs under Churn
    Furness, Jamie, and Kolberg, Mario
    01/2011 2011
  147. [foci11-decoy] Decoy Routing: Toward Unblockable Internet Communication
    Karlin, Josh, Ellard, Daniel, Jackson, Alden W., Jones, Christine E., Lauer, Greg, Mankins, David P., and Strayer, W. Timothy
    08/2011 2011
  148. [pets2011-defenestrator] DefenestraTor: Throwing out Windows in Tor
    AlSabah, Mashael, Bauer, Kevin, Goldberg, Ian, Grunwald, Dirk, McCoy, Damon, Savage, Stefan, and Voelker, Geoffrey M.
    07/2011 2011
  149. [Beimel2011] Distributed Private Data Analysis: On Simultaneously Solving How and What
    Beimel, Amos, Nissim, Kobbi, and Omri, Eran
    CoRR 2011
  150. [cset11-experimentor] ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation
    Bauer, Kevin, Sherr, Micah, McCoy, Damon, and Grunwald, Dirk
    08/2011 2011
  151. [acsac11-tortoise] Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise
    Moore, W. Brad, Wacek, Chris, and Sherr, Micah
    12/2011 2011
  152. [acsac11-backlit] Exposing Invisible Timing-based Traffic Watermarks with BACKLIT
    Luo, Xiapu, Zhou, Peng, Zhang, Junjie, Perdisci, Roberto, Lee, Wenke, and Chang, Rocky K. C.
    12/2011 2011
  153. [wpes11-faust] FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting
    Lofgren, Peter, and Hopper, Nicholas J.
    10/2011 2011
  154. [Prusty:2011:FIO:2046707.2046731] Forensic investigation of the OneSwarm anonymous filesharing system
    Prusty, Swagatika, Levine, Brian Neil, and Liberatore, Marc
  155. [oakland11-formalizing] Formalizing Anonymous Blacklisting Systems
    Henry, Ryan, and Goldberg, Ian
    05/2011 2011
  156. [Lee2011] How Much Is Enough? Choosing ε for Differential Privacy
    Lee, Jaewoo, and Clifton, Chris
  157. [kevin-thesis] Improving Security and Performance in Low Latency Anonymity Networks
    Bauer, Kevin
    05/2011 2011
  158. [wk11-malice-vs-anon] Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection
    Westermann, Benedikt, and Kesdogan, Dogan
    02/2011 2011
  159. [Tariq:2011:MSQ:2063320.2063330] Meeting subscriber-defined QoS constraints in publish/subscribe systems
    Tariq, Muhammad Adnan, Koldehofe, Boris, Koch, Gerald G., Khan, Imran, and Rothermel, Kurt
    Concurr. Comput. : Pract. Exper. 2011
  160. [Das2011] Multi-objective optimization based privacy preserving distributed data mining in Peer-to-Peer networks
    Das, Kamalika, Bhaduri, Kanishka, and Kargupta, Hillol
    Peer-to-Peer Networking and Applications 2011
  161. [LEBLOND:2011:INRIA-00574178:1] One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users
    Le Blond, Stevens, Manils, Pere, Abdelberi, Chaabane, Kaafar, Mohamed Ali, Castelluccia, Claude, Legout, Arnaud, and Dabbous, Walid
    Mar 2011
  162. [perea-tissec11] PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users
    Au, Man Ho, Tsang, Patrick P., and Kapadia, Apu
    ACM Transactions on Information and System Security (ACM TISSEC) 12/2011 2011
  163. [usenix11-pirtor] PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval
    Mittal, Prateek, Olumofin, Femi, Troncoso, Carmela, Borisov, Nikita, and Goldberg, Ian
    08/2011 2011
  164. [DK11] Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation
    Dreier, Jannik, and Kerschbaum, Florian
    10/2011 2011
  165. [Herrmann2011] Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P
    Herrmann, Michael
    03/2011 2011
  166. [herrmann2010pet] Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P
    Herrmann, Michael, and Grothoff, Christian
    04/2011 2011
  167. [Alaggan2011] Private Similarity Computation in Distributed Systems: From Cryptography to Differential Privacy
    Alaggan, Mohammad, Gambs, Sébastien, and Kermarrec, Anne-Marie
  168. [proximax11] Proximax: Fighting Censorship With an Adaptive System for Distribution of Open Proxies
    Levchenko, Kirill, and McCoy, Damon
    02/2011 2011
  169. [DBLP:conf/dbsec/Kerschbaum11] Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity
    Kerschbaum, Florian
  170. [Alvim2011] On the Relation Between Differential Privacy and Quantitative Information Flow
    Alvim, Mário S., and Andrés, Miguel E.
  171. [cryptoeprint:2011:232] Remote Timing Attacks are Still Practical
    Brumley, Billy Bob, and Tuveri, Nicola
    04/2011 2011
  172. [Murillo:2011:SCT:1938287.1938323] Schedule coordination through egalitarian recurrent multi-unit combinatorial auctions
    Murillo, Javier, Muñoz, Vı́ctor, Busquets, Dı́dac, and López, Beatriz
    Applied Intelligence 04/2009 2011
  173. [Pibernik2011] Secure collaborative supply chain planning and inverse optimization - The JELS model
    Pibernik, Richard, Zhang, Yingying, Kerschbaum, Florian, and Schröpfer, Axel
    European Journal of Operations Research 01/2011 2011
  174. [conf/ndss/BackesMP11] A Security API for Distributed Social Networks.
    Backes, Michael, Maffei, Matteo, and Pecina, Kim
    02/2011 2011
  175. [DBLP:conf/sigecom/GhoshR11] Selling Privacy at Auction
    Ghosh, Arpita, and Roth, Aaron
  176. [Frey2011] Social Market: Combining Explicit and Implicit Social Networks
    Frey, Davide, Jégou, Arnaud, and Kermarrec, Anne-Marie
  177. [ccs2011-stealthy] Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting
    Mittal, Prateek, Khurshid, Ahmed, Juen, Joshua, Caesar, Matthew, and Borisov, Nikita
    10/2011 2011
  178. [Houmansadr2011] SWIRL: A Scalable Watermark to Detect Correlated Network Flows
    Houmansadr, Amir, and Borisov, Nikita
    02/2011 2011
  179. [usenix11-telex] Telex: Anticensorship in the Network Infrastructure
    Wustrow, Eric, Wolchok, Scott, Goldberg, Ian, and Halderman, J. Alex
    08/2005 2011
  180. [ccs2011-trust] Trust-based Anonymous Communication: Adversary Models and Routing Algorithms
    Johnson, Aaron, Syverson, Paul, Dingledine, Roger, and Mathewson, Nick
    10/2011 2011
  181. [Yang:2011:USN:2068816.2068841] Uncovering social network sybils in the wild
    Yang, Zhi, Wilson, Christo, Wang, Xiao, Gao, Tingting, Zhao, Ben Y., and Dai, Yafei
    11/2011 2011
  182. [wpes11-panchenko] Website Fingerprinting in Onion Routing Based Anonymization Networks
    Panchenko, Andriy, Niessen, Lukas, Zinnen, Andreas, and Engel, Thomas
    10/2011 2011
  183. [Mittal2011] X-Vine: Secure and Pseudonymous Routing Using Social Networks
    Mittal, Prateek, Caesar, Matthew, and Borisov, Nikita
    Computer Research Repository 9/2011 2011
  184. [Calandrino2011] "You Might Also Like:" Privacy Risks of Collaborative Filtering
    Calandrino, J.A., Kilzer, A., Narayanan, A., Felten, E.W., and Shmatikov, V.
    May 2011
  185. [Kermarrec2010] Application of Random Walks to Decentralized Recommender Systems
    Kermarrec, Anne-Marie, Leroy, Vincent, Moin, Afshin, and Thraves, Christopher
    09/2010 2010
  186. [Huebsch2010] The Ariba Framework for Application Development using Service Overlays
    Hübsch, Christian, Mayer, Christoph P., and Waldhorst, Oliver
    Praxis der Informationsverarbeitung und Kommunikation 2010
  187. [Yeoh:2008:BAB:1402298.1402307] BnB-ADOPT: an asynchronous branch-and-bound DCOP algorithm
    Yeoh, William, Felner, Ariel, and Koenig, Sven
    Journal of Artificial Intelligence Research 2010
  188. [incentives-fc10] Building Incentives into Tor
    Ngan, Tsuen-Wan ‘‘Johnny’’, Dingledine, Roger, and Wallach, Dan S.
    Jan 2010
  189. [1827424] Cordies: expressive event correlation in distributed systems
    Koch, Gerald G., Koldehofe, Boris, and Rothermel, Kurt
  190. [continual] Differential Privacy Under Continual Observation
    Dwork, Cynthia, Naor, Moni, Pitassi, Toniann, and Rothblum, Guy N.
    Jun 2010
  191. [Dwork2010] On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy
    Dwork, Cynthia, and Naor, Moni
    Journal of Privacy and Confidentiality 2010
  192. [vleroythesis] Distributing social applications
    Leroy, Vincent
    Dec 2010
  193. [Danezis2010] Drac: An Architecture for Anonymous Low-Volume Communications
    Danezis, George, Diaz, Claudia, Troncoso, Carmela, and Laurie, Ben
  194. [Cholez2010] Efficient DHT attack mitigation through peers’ ID distribution
    Cholez, Thibault, Chrisment, Isabelle, and Festor, Olivier
    04/2010 2010
  195. [Koch:2010:EPL:1827418.1827440] Event processing for large-scale distributed games
    Koch, Gerald G., Tariq, Muhammad Adnan, Koldehofe, Boris, and Rothermel, Kurt
  196. [DBLP:conf/middleware/BertierFGKL10] The Gossple Anonymous Social Network
    Bertier, Marin, Frey, Davide, Guerraoui, Rachid, Kermarrec, Anne-Marie, and Leroy, Vincent
  197. [duminuco:hierarchical] Hierarchical codes: A flexible trade-off for erasure codes in peer-to-peer storage systems.
    Duminuco, Alessandro, and Biersack, E W
    Peer-to-Peer Networking and Applications 03/2009 2010
  198. [Wen2010] How Accurately Can One’s Interests Be Inferred from Friends?
    Wen, Zhen, and Lin, Ching-Yung
  199. [tissec-latency-leak] How Much Anonymity does Network Latency Leak?
    Hopper, Nicholas J., Vasserman, Eugene Y., and Chan-Tin, Eric
    ACM Transactions on Information and System Security Forthcoming 2010
  200. [DBLP:conf/tridentcom/NguyenRKFMB10] How to Build Complex, Large-Scale Emulated Networks
    Nguyen, Hung X., Roughan, Matthew, Knight, Simon, Falkner, Nick, Maennel, Olaf, and Bush, Randy
  201. [Gamiochipi2010] Incentive-driven QoS in peer-to-peer overlays
    Gamiochipi, Raul Leonardo Landa
    05/2010 2010
  202. [Chan2010] Malugo: A peer-to-peer storage system
    Chan, Yu-Wei, Ho, Tsung-Hsuan, Shih, Po-Chi, and Chung, Yeh-Ching
  203. [DBLP:conf/tridentcom/AlbrechtH10] Managing Distributed Applications Using Gush
    Albrecht, Jeannie R., and Huang, Danny Yuxing
  204. [DBLP:conf/tridentcom/PeralaPML10] A Novel Testbed for P2P Networks
    Perälä, Pekka H. J., Paananen, Jori P., Mukhopadhyay, Milton, and Laulajainen, Jukka-Pekka
  205. [Locher:2010:PKN:2018057.2018085] Poisoning the Kad network
    Locher, Thomas, Mysicka, David, Schmid, Stefan, and Wattenhofer, Roger
    01/2010 2010
  206. [FessiIPTComm2010] Pr2-P2PSIP: Privacy Preserving P2P Signaling for VoIP and IM
    Fessi, Ali, Evans, Nathan S, Niedermayer, Heiko, and Holz, Ralph
    Aug 2010
  207. [Isdal:2010:PPD:1851275.1851198] Privacy-preserving P2P data sharing with OneSwarm
    Isdal, Tomas, Piatek, Michael, Krishnamurthy, Arvind, and Anderson, Thomas
    SIGCOMM Comput. Commun. Rev. 2010
  208. [1667071] Privacy-preserving similarity-based text retrieval
    Pang, Hweehwa, Shen, Jialie, and Krishnan, Ramayya
    ACM Trans. Internet Technol. 2010
  209. [Inan2010] Private Record Matching Using Differential Privacy
    Inan, Ali, Kantarcioglu, Murat, Ghinita, Gabriel, and Bertino, Elisa
  210. [1827425] Providing basic security mechanisms in broker-less publish/subscribe systems
    Tariq, Muhammad Adnan, Koldehofe, Boris, Altaweel, Ala, and Rothermel, Kurt
  211. [1672334] Reconnecting the internet with ariba: self-organizing provisioning of end-to-end connectivity in heterogeneous networks
    Hübsch, Christian, Mayer, Christoph P., Mies, Sebastian, Bless, Roland, Waldhorst, Oliver, and Zitterbart, Martina
    SIGCOMM Comput. Commun. Rev. 2010
  212. [Huebsch2010a] On Runtime Adaptation of Application-Layer Multicast Protocol Parameters
    Hübsch, Christian, Mayer, Christoph P., and Waldhorst, Oliver
  213. [Krause2010] Scalable Application-Layer Multicast Simulations with OverSim
    Krause, Stephan, and Hübsch, Christian
  214. [Burkhart:2010:SPA:1929820.1929840] SEPIA: privacy-preserving aggregation of multi-domain network events and statistics
    Burkhart, Martin, Strasser, Mario, Many, Dilip, and Dimitropoulos, Xenofontas
    08/2010 2010
  215. [Marks2010a] Unleashing Tor, BitTorrent & Co.: How to Relieve TCP Deficiencies in Overlays
    Marks, Daniel, Tschorsch, Florian, and Scheuermann, Bjoern
  216. [Huebsch2010b] User-perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups
    Hübsch, Christian, Mayer, Christoph P., and Waldhorst, Oliver
    2010 2010
  217. [Huebsch2010c] Using Legacy Applications in Future Heterogeneous Networks with ariba
    Hübsch, Christian, Mayer, Christoph P., Mies, Sebastian, Bless, Roland, Waldhorst, Oliver, and Zitterbart, Martina
  218. [DBLP:conf/ccs/EdmanS09] AS-awareness in Tor path selection
    Edman, Matthew, and Syverson, Paul
  219. [Attrapadung:2009:AES:1696791.1696811] Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes
    Attrapadung, Nuttapong, and Imai, Hideki
    12/2009 2009
  220. [DBLP:conf/ccs/TroncosoD09] The bayesian traffic analysis of mix networks
    Troncoso, Carmela, and Danezis, George
  221. [1659021] Bloom filters and overlays for routing in pocket switched networks
    Mayer, Christoph P.
  222. [Knoll:2009:BPS:1590968.1591829] Bootstrapping Peer-to-Peer Systems Using IRC
    Knoll, Mirko, Helling, Matthias, Wacker, Arno, Holzapfel, Sebastian, and Weis, Torben
    06/2009 2009
  223. [Bortnikov2009] Brahms: Byzantine Resilient Random Membership Sampling
    Bortnikov, Edward, Gurevich, Maxim, Keidar, Idit, Kliot, Gabriel, and Shraer, Alexander
    Computer Networks Journal (COMNET), Special Issue on Gossiping in Distributed Systems Apr 2009
  224. [DBLP:conf/sss/Kermarrec09] Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLE
    Kermarrec, Anne-Marie
  225. [Holz2009] CLIO/UNISONO: practical distributed and overlay- wide network measurement
    Holz, Ralph, and Haage, Dirk
  226. [Melchor2009] A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust
    Melchor, C.A., Ait-Salem, B., and Gaborit, P.
    Jul 2009
  227. [DBLP:journals/tdp/NojimaK09] Cryptographically secure Bloom-filters
    Nojima, Ryo, and Kadobayashi, Youki
    Transactions on Data Privacy 2009
  228. [DBLP:conf/sp/NarayananS09] De-anonymizing Social Networks
    Narayanan, Arvind, and Shmatikov, Vitaly
  229. [Badishi:2009:DFC:1550962.1551186] Deleting files in the Celeste peer-to-peer storage system
    Badishi, Gal, Caronni, Germano, Keidar, Idit, Rom, Raphael, and Scott, Glenn
    Journal of Parallel and Distributed Computing 07/2009 2009
  230. [McSherry2009] Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders
    McSherry, Frank, and Mironov, Ilya
  231. [Huebsch2009] Enhancing Application-Layer Multicast Solutions by Wireless Underlay Support
    Hübsch, Christian, and Waldhorst, Oliver
  232. [Bucher2009] Evaluation of Current P2P-SIP Proposals with Respect to the Igor/SSR API
    Bucher, Markus
  233. [Cholez:2009:ESA:1574663.1574671] Evaluation of Sybil Attacks Protection Schemes in KAD
    Cholez, Thibault, Chrisment, Isabelle, and Festor, Olivier
    06/2009 2009
  234. [Bogetoft:2009:SMC:1601990.1602018] Financial Cryptography and Data Security
    Bogetoft, Peter, Christensen, Dan Lund, Damgárd, Ivan, Geisler, Martin, Jakobsen, Thomas, Krøigaard, Mikkel, Nielsen, Janus Dam, Nielsen, Jesper Buus, Nielsen, Kurt, Pagter, Jakob, Schwartzbach, Michael, and Toft, Tomas
  235. [wpes09-dht-attack] Hashing it out in public: Common failure modes of DHT-based anonymity schemes
    Tran, Andrew, Hopper, Nicholas J., and Kim, Yongdae
    Nov 2009
  236. [1656984] Heterogeneous gossip
    Frey, Davide, Guerraoui, Rachid, Kermarrec, Anne-Marie, Koldehofe, Boris, Mogensen, Martin, Monod, Maxime, and Quéma, Vivien
  237. [EURECOM+2885] Long term study of peer behavior in the KAD DHT
    Steiner, Moritz, En-Najjary, Taoufik, and Biersack, E W
    IEEE/ACM Transactions on Networking 05/2009 2009
  238. [1551621] Maintaining reference graphs of globally accessible objects in fully decentralized distributed systems
    Saballus, Bjoern, and Fuhrmann, Thomas
  239. [moscibroda:on] On Mechanism Design without Payments for Throughput Maximization.
    Moscibroda, Thomas, and Schmid, Stefan
    04/2009 2009
  240. [DBLP:conf/ccs/VassermanJTHK09] Membership-concealing overlay networks
    Vasserman, Eugene Y., Jansen, Rob, Tyra, James, Hopper, Nicholas J., and Kim, Yongdae
  241. [Schadd2009] Monte-Carlo Search Techniques in the Modern Board Game Thurn and Taxis
    Schadd, Frederik Christiaan
    12/2009 2009
  242. [SathyaNarayanan2009] Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security
    Sathya Narayanan, G., Aishwarya, T., Agrawal, Anugrah, Patra, Arpita, Choudhary, Ashish, and Pandu Rangan, C.
  243. [nymble-tdsc] Nymble: Blocking Misbehaving Users in Anonymizing Networks
    Tsang, Patrick P., Kapadia, Apu, Cornelius, Cory, and Smith, Sean
    IEEE Transactions on Dependable and Secure Computing (TDSC) Sep 2009
  244. [Moran2009] An Optimally Fair Coin Toss
    Moran, Tal, Naor, Moni, and Segev, Gil
  245. [2009a] Optimization of distributed services with UNISONO
  246. [Schimmer2009] Peer Profiling and Selection in the I2P Anonymous Network
    Schimmer, Lars
    03/2009 2009
  247. [p2p09-peersim] PeerSim: A Scalable P2P Simulator
    Montresor, Alberto, Jelasity, Márk, Jesi, Gian Paolo, and Voulgaris, Spyros
    09/2009 2009
  248. [Plank:2009:PEE:1525908.1525927] A performance evaluation and examination of open-source erasure coding libraries for storage
    Plank, James S., Luo, Jianqiang, Schuman, Catherine D., Xu, Lihao, and Wilcox-O’Hearn, Zooko
    02/2009 2009
  249. [5328076] Performance Evaluation of On-Demand Multipath Distance Vector Routing Protocol under Different Traffic Models
    Malarkodi, B., Rakesh, P., and Venkataramani, B.
    Oct 2009
  250. [evans2009tor] A Practical Congestion Attack on Tor Using Long Paths
    Evans, Nathan S, Dingledine, Roger, and Grothoff, Christian
  251. [Duminuco:2009:PSR:1584339.1584602] A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems
    Duminuco, Alessandro, and Biersack, E W
    06/2009 2009
  252. [McSherry2009a] Privacy Integrated Queries: An Extensible Platform for Privacy-preserving Data Analysis
    McSherry, Frank D.
  253. [Tariqetal:2009:ProbLatencyBounds] Providing Probabilistic Latency Bounds for Dynamic Publish/Subscribe Systems
    Tariq, Muhammad Adnan, Koldehofe, Boris, Koch, Gerald G., and Rothermel, Kurt
  254. [conf/infocom/WuLR09] Queuing Network Models for Multi-Channel P2P Live Streaming Systems
    Wu, Di, Liu, Yong, and Ross, Keith W.
    04/2009 2009
  255. [wpes09-bridge-attack] On the risks of serving whenever you surf: Vulnerabilities in Tor’s blocking resistance design
    McLachlan, Jon, and Hopper, Nicholas J.
    Nov 2009
  256. [Awerbuch2009] Robust Random Number Generation for Peer-to-Peer Systems
    Awerbuch, Baruch, and Scheideler, Christian
    Theor. Comput. Sci. 2009
  257. [1658999] Scalable landmark flooding: a scalable routing protocol for WSNs
    Di, Pengfei, and Fuhrmann, Thomas
  258. [ccs09-torsk] Scalable onion routing with Torsk
    McLachlan, Jon, Tran, Andrew, Hopper, Nicholas J., and Kim, Yongdae
    Nov 2009
  259. [Mayer2009] Security and Privacy Challenges in the Internet of Things
    Mayer, Christoph P.
  260. [Houri2009] Self-organized Data Redundancy Management for Peer-to-Peer Storage Systems
    Houri, Yaser, Jobmann, Manfred, and Fuhrmann, Thomas
  261. [Mittal2009] ShadowWalker: Peer-to-peer Anonymous Communication Using Redundant Structured Topologies
    Mittal, Prateek, and Borisov, Nikita
  262. [Acher2009] A Software and Hardware IPTV Architecture for Scalable DVB Distribution
    International Journal of Digital Multimedia Broadcasting 2009
  263. [Harvey2009] Solving very large distributed constraint satisfaction problems
    Harvey, Peter
    12/2009 2009
  264. [DBLP:conf/sp/DanezisG09] Sphinx: A Compact and Provably Secure Mix Format
    Danezis, George, and Goldberg, Ian
  265. [Briones-Garcia2009] SPINE : Adaptive Publish/Subscribe for Wireless Mesh Networks
    Briones-Garcıa, Jorge Alfonso, Koldehofe, Boris, and Rothermel, Kurt
  266. [Holz2009a] SpoVNet Security Task Force Report
    Holz, Ralph, Mayer, Christoph P., Mies, Sebastian, Niedermayer, Heiko, and Tariq, Muhammad Adnan
  267. [DBLP:conf/infocom/LandaGCMR09] A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks
    Gamiochipi, Raul Leonardo Landa, Griffin, David, Clegg, Richard G., Mykoniati, Eleni, and Rio, Miguel
    04/2009 2009
  268. [Resnick:2009:STT:1566374.1566423] Sybilproof Transitive Trust Protocols
    Resnick, Paul, and Sami, Rahul
    07/2009 2009
  269. [Douglas-thesis] A taxonomy for and analysis of anonymous communications networks
    Kelly, Douglas
    Mar 2009
  270. [Mies2009] Towards End-to-End Connectivity for Overlays across Heterogeneous Networks
    Mies, Sebastian, Waldhorst, Oliver, and Wippel, Hans
  271. [DiPalantino2009] Traffic Engineering vs. Content Distribution: A Game Theoretic Perspective
    DiPalantino, Dominic, and Johari, Ramesh
    04/2009 2009
  272. [morphing09] Traffic Morphing: An efficient defense against statistical traffic analysis
    Wright, Charles, Coull, Scott, and Monrose, Fabian
    Feb 2009
  273. [Elser2009] Tuning Vivaldi: Achieving Increased Accuracy and Stability
    Elser, Benedikt, Förschler, Andreas, and Fuhrmann, Thomas
  274. [1582481] Using link-layer broadcast to improve scalable source routing
    Di, Pengfei, and Fuhrmann, Thomas
    2009 2009
  275. [ccsw09-fingerprinting] Website fingerprinting: attacking popular privacy enhancing technologies with the multinomial naive-bayes classifier
    Herrmann, Dominik, Wendolsky, Rolf, and Federrath, Hannes
  276. [1590633] Wireless Sensor Networks: A Survey
    Potdar, Vidyasagar, Sharif, Atif, and Chang, Elizabeth
  277. [DBLP:conf/esorics/DanezisDKT09] The Wisdom of Crowds: Attacks and Optimal Constructions
    Danezis, George, Diaz, Claudia, Käsper, Emilia, and Troncoso, Carmela
  278. [wpes09-xpay] XPay: Practical anonymous payments for Tor routing and other networked services
    Chen, Yao, Sion, Radu, and Carbunar, Bogdan
    Nov 2009
  279. [Eickhold2008] AmbiComp: A platform for distributed execution of Java programs on embedded systems by offering a single system image
    Eickhold, Johannes, Fuhrmann, Thomas, Saballus, Bjoern, Schlender, Sven, and Suchy, Thomas
    2008 2008
  280. [Huebsch2008] Analyzing Unreal Tournament 2004 Network Traffic Characteristics
    Hübsch, Christian
  281. [Zivan:2008:ALS:1402821.1402895] Anytime local search for distributed constraint optimization
    Zivan, Roie
    05/2008 2008
  282. [WongSirer2008ApproximateMatching] Approximate Matching for Peer-to-Peer Overlays with Cubit
    Bernard Wong, Aleksandrs Slivkins, and Sirer, Emin Gün
  283. [Yang:2008:ABD:1403027.1403032] Auction, but don’t block
    Yang, Xiaowei
    08/2008 2008
  284. [1387603] BFT protocols under fire
    Singh, Atul, Das, Tathagata, Maniatis, Petros, Druschel, Peter, and Roscoe, Timothy
  285. [bauer:alpaca2008] BitBlender: Light-Weight Anonymity for BitTorrent
    Bauer, Kevin, McCoy, Damon, Grunwald, Dirk, and Sicker, Douglas
    Sep 2008
  286. [Levin:2008:BAA:1402946.1402987] BitTorrent is an Auction: Analyzing and Improving BitTorrent’s Incentives
    Levin, Dave, LaCurts, Katrina, Spring, Neil, and Bhattacharjee, Bobby
    SIGCOMM Computer Communication Review 08/2008 2008
  287. [bootstrap2008gauthierdickey] Bootstrapping of Peer-to-Peer Networks
    GauthierDickey, Chis, and Grothoff, Christian
    Aug 2008
  288. [shimshock-pet2008] Breaking and Provably Fixing Minx
    Shimshock, Eric, Staats, Matt, and Hopper, Nicholas J.
    Jul 2008
  289. [danezis-pet2008] Bridging and Fingerprinting: Epistemic Attacks on Route Selection
    Danezis, George, and Syverson, Paul
    Jul 2008
  290. [1373992] Characterizing unstructured overlay topologies in modern P2P file-sharing systems
    Stutzbach, Daniel, Rejaie, Reza, and Sen, Subhabrata
    IEEE/ACM Trans. Netw. 2008
  291. [torspinISC08] Compromising Anonymity Using Packet Spinning
    Pappas, Vasilis, Athanasopoulos, Elias, Ioannidis, Sotiris, and Markatos, Evangelos P.
    Sep 2008
  292. [MarPi08] A Concept of an Anonymous Direct P2P Distribution Overlay System
    Margasinski, Igor, and Pioro, Michal
    Mar 2008
  293. [Schiele2008] Consistency Management for Peer-to-Peer-based Massively Multiuser Virtual Environments
    Schiele, Gregor, Süselbeck, Richard, Wacker, Arno, Triebel, Tonio, and Becker, Christian
  294. [2008a] The Decentralized File System Igor-FS as an Application for Overlay-Networks
    02/2008 2008
  295. [vrancx:decentralized] Decentralized Learning in Markov Games
    Vrancx, Peter, Verbeeck, Katja, and Nowé, Ann
    IEEE Transactions on Systems, Man, and Cybernetics, Part B 08/2008 2008
  296. [ccs2008:wang] Dependent Link Padding Algorithms for Low Latency Anonymity Systems
    Wang, Wei, Motani, Mehul, and Srinivasan, Vikram
    Oct 2008
  297. [Dischinger:2008:DBB:1452520.1452523] Detecting BitTorrent Blocking
    Dischinger, Marcel, Mislove, Alan, Haeberlen, Andreas, and Gummadi, P. Krishna
    10/2008 2008
  298. [clog-the-queue] Don’t Clog the Queue: Circuit Clogging and Mitigation in P2P anonymity schemes
    McLachlan, Jon, and Hopper, Nicholas J.
    Jan 2008
  299. [DBLP:journals/pvldb/Amer-YahiaBLS08] Efficient network aware search in collaborative tagging sites
    Amer-Yahia, Sihem, Benedikt, Michael, Lakshmanan, Laks V. S., and Stoyanovich, Julia
    PVLDB’08 Aug 2008
  300. [BecchiCrowley2008EfficientRegexEval] Efficient regular expression evaluation: theory to practice
    Becchi, Michela, and Crowley, Patrick
  301. [1373458] Efficient routing in intermittently connected mobile networks: the single-copy case
    Spyropoulos, Thrasyvoulos, Psounis, Konstantinos, and Raghavendra, Cauligi S.
    IEEE/ACM Trans. Netw. 2008
  302. [CoNext2008] EGOIST: Overlay Routing using Selfish Neighbor Selection
    Smaragdakis, Georgios, Lekakis, Vassilis, Laoutaris, Nikolaos, Bestavros, Azer, Byers, John W., and Roussopoulos, Mema
    Dec 2008
  303. [LOCEntropy2008] Entropy Bounds for Traffic Confirmation
    O’Connor, Luke
    Oct 2008
  304. [Bustos-Jimenez2008] Estimating The Size Of Peer-To-Peer Networks Using Lambert’s W Function
    Bustos-Jiménez, Javier, Bersano, Nicolás, Schaeffer, Satu Elisa, Piquer, José Miguel, Iosup, Alexandru, and Ciuffoletti, Augusto
  305. [Junges:2008:EPD:1402298.1402308] Evaluating the performance of DCOP algorithms in a real world, dynamic problem
    Junges, Robert, and Bazzan, Ana L. C.
    05/2008 2008
  306. [DBLP:conf/icc/ChenCLNC08] Experimental Analysis of Super-Seeding in BitTorrent
    Chen, Zhijia, Chen, Yang, Lin, Chuang, Nivargi, Vaibhav, and Cao, Pei
    05/2008 2008
  307. [Ben-David:2008:FSS:1455770.1455804] FairplayMP: a system for secure multi-party computation
    Ben-David, Assaf, Nisan, Noam, and Pinkas, Benny
    10/2008 2008
  308. [Bose2008] On the False-positive Rate of Bloom Filters
    Bose, Prosenjit, Guo, Hua, Kranakis, Evangelos, Maheshwari, Anil, Morin, Pat, Morrison, Jason, Smid, Michiel, and Tang, Yihui
    Inf. Process. Lett. 2008
  309. [Wang:2008:GAI:1412757.1412971] A game-theoretic analysis of the implications of overlay network traffic on ISP peering
    Wang, Jessie Hui, Chiu, Dah Ming, and Lui, John C. S.
    Computer Networks 10/2008 2008
  310. [saballus08gaos] Global Accessible Objects (GAOs) in the Ambicomp Distributed Java Virtual Machine
    Saballus, Bjoern, Eickhold, Johannes, and Fuhrmann, Thomas
  311. [back-hash] Hash cash - a denial of service counter-measure
    Back, Adam
  312. [Koch2008] Higher Confidence in Event Correlation Using Uncertainty Restrictions
    Koch, Gerald G., Koldehofe, Boris, and Rothermel, Kurt
  313. [sassaman-pet2008] How to Bypass Two Anonymity Revocation Systems
    Danezis, George, and Sassaman, Len
    Jul 2008
  314. [Boldyreva:2008:IEE:1455770.1455823] Identity-based encryption with efficient revocation
    Boldyreva, Alexandra, Goyal, Vipul, and Kumar, Virendra
    10/2008 2008
  315. [DBLP:conf/p2p/AmannEHF08] IgorFs: A Distributed P2P File System
    Amann, Bernhard, Elser, Benedikt, Houri, Yaser, and Fuhrmann, Thomas
  316. [diaz-pet2008] On the Impact of Social Network Profiling on Anonymity
    Diaz, Claudia, Troncoso, Carmela, and Serjantov, Andrei
    Jul 2008
  317. [improved-clockskew] An Improved Clock-skew Measurement Technique for Revealing Hidden Services
    Zander, Sebastian, and Murdoch, Steven J.
    Jul 2008
  318. [reardon-thesis] Improving Tor using a TCP-over-DTLS Tunnel
    Reardon, Joel
    Sep 2008
  319. [Aggarwal2008] Improving User and ISP Experience through ISP-aided P2P Locality
    Aggarwal, Vinay, Akonjang, Obi, and Feldmann, Anja
    04/2008 2008
  320. [ccs2008:mittal] Information Leaks in Structured Peer-to-peer Anonymous Communication Systems
    Mittal, Prateek, and Borisov, Nikita
    Oct 2008
  321. [Chen:2008:IRS:1331483.1331515] Insight into redundancy schemes in DHTs
    Chen, Guihai, Qiu, Tongqing, and Wu, Fan
    Journal of Supercomputing 02/2008 2008
  322. [DBLP:conf/usenix/HiblerRSDGSWL08] Large-scale Virtualization in the Emulab Network Testbed
    Hibler, Mike, Ricci, Robert, Stoller, Leigh, Duerig, Jonathon, Guruprasad, Shashi, Stack, Tim, Webb, Kirk, and Lepreau, Jay
  323. [nussbaum2008p2plab] Lightweight emulation to study peer-to-peer systems
    Nussbaum, Lucas, and Richard, Olivier
    Concurrency and Computation: Practice and Experience 2008
  324. [1390683] Linear-Time Computation of Similarity Measures for Sequential Data
    Rieck, Konrad, and Laskov, Pavel
    J. Mach. Learn. Res. 2008
  325. [1358311] Linyphi: creating IPv6 mesh networks with SSR
    Di, Pengfei, Eickhold, Johannes, and Fuhrmann, Thomas
    Concurr. Comput. : Pract. Exper. 2008
  326. [murdoch-pet2008] Metrics for Security and Performance in Low-Latency Anonymity Networks
    Murdoch, Steven J., and Watson, Robert N. M.
    Jul 2008
  327. [pizzonia2008netkit] Netkit: easy emulation of complex networks on inexpensive hardware
    Pizzonia, Maurizio, and Rimondini, Massimo
  328. [1341892] ODSBR: An on-demand secure Byzantine resilient routing protocol for wireless ad hoc networks
    Awerbuch, Baruch, Curtmola, Reza, Holmer, David, Nita-Rotaru, Cristina, and Rubens, Herbert
    ACM Trans. Inf. Syst. Secur. 2008
  329. [Hartline:2008:OMD:1374376.1374390] Optimal mechanism design and money burning
    Hartline, Jason D., and Roughgarden, Tim
    05/2008 2008
  330. [Xie:2008:PPP:1402946.1402999] P4P: Provider Portal for Applications
    Xie, Haiyong, Yang, Y. Richard, Krishnamurthy, Arvind, Liu, Yanbin Grace, and Silberschatz, Abraham
    SIGCOMM Computer Communication Review 08/2008 2008
  331. [raykova-pet2008] PAR: Payment for Anonymous Routing
    Androulaki, Elli, Raykova, Mariana, Srivatsan, Shreyas, Stavrou, Angelos, and Bellovin, Steven M.
    Jul 2008
  332. [ccs2008:tsang] PEREA: Towards Practical TTP-Free Revocation in Anonymous Authentication
    Tsang, Patrick P., Au, Man Ho, Kapadia, Apu, and Smith, Sean
    Oct 2008
  333. [troncoso-pet2008] Perfect Matching Statistical Disclosure Attacks
    Troncoso, Carmela, Gierlichs, Benedikt, Preneel, Bart, and Verbauwhede, Ingrid
    Jul 2008
  334. [loesing2008performance] Performance Measurements and Statistics of Tor Hidden Services
    Loesing, Karsten, Sandmann, Werner, Wilms, Christian, and Wirtz, Guido
    Jul 2008
  335. [Shafaat:2008:PAN:1485753.1485763] A Practical Approach to Network Size Estimation for Structured Overlays
    Shafaat, Tallat M., Ghodsi, Ali, and Haridi, Seif
    12/2008 2008
  336. [Faltings2008] Privacy guarantees through distributed constraint satisfaction
    Faltings, Boi, Leaute, Thomas, and Petcu, Adrian
    04/2008 2008
  337. [springerlink:10.1007/978-0-387-70992-5] Privacy-Preserving Data Mining: Models and Algorithms
  338. [Chaslot2008] Progressive Strategies for Monte-Carlo Tree Search
    Chaslot, Guillaume M. J-B., Winands, Mark H. M., Herik, H. Jaap, Uiterwijk, Jos W. H. M., and Bouzy, Bruno
    New Mathematics and Natural Computation 2008
  339. [di08iptps] Providing KBR Service for Multiple Applications
    Di, Pengfei, Kutzner, Kendy, and Fuhrmann, Thomas