-
1
-
-
0019532104
-
Untraceable electronic mail return addresses, and digital pseudonyms
-
D. Chaum, "Untraceable electronic mail return addresses, and digital pseudonyms", Communications of the ACM, 1981.
-
(1981)
Communications of the ACM
-
-
Chaum, D.1
-
3
-
-
0032670943
-
Web caching and Zipf-like distributions: Evidence and implications
-
L. Breslau, P. Cao, L. Fan, G. Phillips, and S. Shenker, "Web caching and Zipf-like distributions: evidence and implications", In Proceedings of IEEE INFOCOM, 1999.
-
(1999)
Proceedings of IEEE INFOCOM
-
-
Breslau, L.1
Cao, P.2
Fan, L.3
Phillips, G.4
Shenker, S.5
-
5
-
-
0034836055
-
BRITE: An approach to universal topology generation
-
A. Medina, A. Lakhina, I. Malta, and J. Byers, "BRITE: an approach to universal topology generation", In Proceedings of the International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems (MASCOTS), 2001.
-
(2001)
Proceedings of the International Workshop on Modeling, Analysis and Simulation of Computer and Telecommunications Systems (MASCOTS)
-
-
Medina, A.1
Lakhina, A.2
Malta, I.3
Byers, J.4
-
12
-
-
84954435745
-
Defending anonymous communications against passive logging attacks
-
M. Wright, M. Adler, B. N. Levine, and C. Shields, "Defending anonymous communications against passive logging attacks", In Proceedings of IEEE Symposium on Security and Privacy, 2003.
-
(2003)
Proceedings of IEEE Symposium on Security and Privacy
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
15
-
-
33745798251
-
Timing attacks in low-latency Mix systems
-
B. N. Levine, M. K. Reiter, C. Wang, and M. Wright, "Timing attacks in low-latency Mix systems", In Proceedings of the International Conference on Financial Cryptography, 2004.
-
(2004)
Proceedings of the International Conference on Financial Cryptography
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.4
-
16
-
-
8344229910
-
Location-aware topology matching in P2P systems
-
Y. Liu, X. Liu, L. Xiao, L. M. Ni, and X. Zhang, "Location-aware topology matching in P2P systems", In Proceedings of IEEE INFOCOM, 2004.
-
(2004)
Proceedings of IEEE INFOCOM
-
-
Liu, Y.1
Liu, X.2
Xiao, L.3
Ni, L.M.4
Zhang, X.5
-
17
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
M. K. Wright, M. Adler, B. N. Levine, and C. Shields, "The predecessor attack: an analysis of a threat to anonymous communications systems", ACM Transactions on Information and System Security (TISSEC), 2004.
-
(2004)
ACM Transactions on Information and System Security (TISSEC)
-
-
Wright, M.K.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
18
-
-
0742286693
-
A construction of locality-aware overlay network: MOverlay and its performance
-
X. Zhang, Q. Zhang, Z. Zhang, G. Song, and W. Zhu, "A construction of locality-aware overlay network: mOverlay and its performance", IEEE JSAC Special Issue on Recent Advances on Service Overlay Networks, 2004.
-
(2004)
IEEE JSAC Special Issue on Recent Advances on Service Overlay Networks
-
-
Zhang, X.1
Zhang, Q.2
Zhang, Z.3
Song, G.4
Zhu, W.5
-
19
-
-
33749389215
-
Modeling and analysis of random walk search algorithms in P2P networks
-
N. Bisnik and A. Abouzeid, "Modeling and analysis of random walk search algorithms in P2P networks", In Proceedings of HOT-P2P, 2005.
-
(2005)
Proceedings of HOT-P2P
-
-
Bisnik, N.1
Abouzeid, A.2
-
21
-
-
32344448483
-
Efficient lookup on unstructured topologies
-
R. Morselli, B. Bhattacharjee, A. Srinivasan, and M. A. Marsh, "Efficient lookup on unstructured topologies", In Proceedings of ACM PODC, 2005.
-
(2005)
Proceedings of ACM PODC
-
-
Morselli, R.1
Bhattacharjee, B.2
Srinivasan, A.3
Marsh, M.A.4
-
24
-
-
35548992569
-
SybilGuard: Defending against Sybil Attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman, "SybilGuard: defending against Sybil Attacks via social networks", In Proceedings of ACM SIGCOMM, 2006.
-
(2006)
Proceedings of ACM SIGCOMM
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|