-
1
-
-
35348871999
-
Analysis of topological characteristics of huge online social networking services
-
May
-
AHN, Y.-Y., HAN, S., KWAK, H., MOON, S., AND JEONG, H. Analysis of topological characteristics of huge online social networking services. In Proc. of WWW (May 2007).
-
(2007)
Proc. of WWW
-
-
AHN, Y.-Y.1
HAN, S.2
KWAK, H.3
MOON, S.4
JEONG, H.5
-
2
-
-
58049191390
-
-
The anonymizer. Anonymizer.com
-
The anonymizer. Anonymizer.com.
-
-
-
-
3
-
-
79959681025
-
Low-resource routing attacks against tor
-
Alexandria, VA
-
BAUER, K., MCCOY, D., GRUNWALD, D., KOHNO, T., AND SICKER, D. Low-resource routing attacks against tor. In Proc. of WPES (Alexandria, VA, 2007).
-
(2007)
Proc. of WPES
-
-
BAUER, K.1
MCCOY, D.2
GRUNWALD, D.3
KOHNO, T.4
SICKER, D.5
-
4
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
CHAUM, D. L. Untraceable electronic mail, return addresses, and digital pseudonyms. CACM 24, 2 (1981).
-
(1981)
CACM 24
, pp. 2
-
-
CHAUM, D.L.1
-
6
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
Nov
-
FREEDMAN, M. J., AND MORRIS, R. Tarzan: A peer-to-peer anonymizing network layer. In Proc. of CCS (Nov. 2002).
-
(2002)
Proc. of CCS
-
-
FREEDMAN, M.J.1
MORRIS, R.2
-
7
-
-
80054705061
-
Reliable email
-
San Jose, CA, May
-
GARRISS, S., KAMINSKY, M., FREEDMAN, M. J., KARP, B., MAZIERES, D., AND YU, H. Re: Reliable email. In Proc. of NSDI (San Jose, CA, May 2006).
-
(2006)
Proc. of NSDI
-
-
GARRISS, S.1
KAMINSKY, M.2
FREEDMAN, M.J.3
KARP, B.4
MAZIERES, D.5
YU, H.R.6
-
8
-
-
34748819854
-
An experimental study of the skype peer-to-peer voip system
-
GUHA, S., DASWANI, N., AND JAIN, R. An experimental study of the skype peer-to-peer voip system. In Proc. of IPTPS (2006).
-
(2006)
Proc. of IPTPS
-
-
GUHA, S.1
DASWANI, N.2
JAIN, R.3
-
9
-
-
58049198390
-
Improving anonymity using social links
-
Tech. Rep. 2008-13, UC Santa Barbara, Sept
-
KRISHNA P. N. PUTTASWAMY, A. S., AND ZHAO, B. Y. Improving anonymity using social links. Tech. Rep. 2008-13, UC Santa Barbara, Sept. 2008.
-
(2008)
-
-
KRISHNA, P.N.1
PUTTASWAMY, A.S.2
ZHAO, B.Y.3
-
10
-
-
33745798251
-
Timing attacks in low-latency mix-based systems
-
Feb
-
LEVINE, B. N., REITER, M. K., WANG, C., AND WRIGHT, M. Timing attacks in low-latency mix-based systems. In Proceedings of Financial Cryptography (Feb. 2004).
-
(2004)
Proceedings of Financial Cryptography
-
-
LEVINE, B.N.1
REITER, M.K.2
WANG, C.3
WRIGHT, M.4
-
11
-
-
50249158667
-
Shining light in dark places: A study of anonymous network usage
-
Tech. Rep. CU-CS-1032-07, Univ. of CO
-
MCCOY, D., BAUER, K., GRUNWALD, D., TABRIZ, P., AND SICKER, D. Shining light in dark places: A study of anonymous network usage. Tech. Rep. CU-CS-1032-07, Univ. of CO, 2007.
-
(2007)
-
-
MCCOY, D.1
BAUER, K.2
GRUNWALD, D.3
TABRIZ, P.4
SICKER, D.5
-
12
-
-
42149117427
-
Measurement and analysis of online social networks
-
Oct
-
MISLOVE, A., MARCON, M., GUMMADI, K. P., DRUSCHEL, P., AND BHATTACHARJEE, B. Measurement and analysis of online social networks. In Proc. of IMC (Oct 2007).
-
(2007)
Proc. of IMC
-
-
MISLOVE, A.1
MARCON, M.2
GUMMADI, K.P.3
DRUSCHEL, P.4
BHATTACHARJEE, B.5
-
13
-
-
80054703857
-
Ostra: Leverging trust to thwart unwanted communication
-
April
-
MISLOVE, A., POST, A., GUMMADI, K. P., AND DRUSCHEL, P. Ostra: Leverging trust to thwart unwanted communication. In Proc. of NSDI (April 2008).
-
(2008)
Proc. of NSDI
-
-
MISLOVE, A.1
POST, A.2
GUMMADI, K.P.3
DRUSCHEL, P.4
-
15
-
-
0038404059
-
A measurement study of peer-to-peer file sharing systems
-
January
-
SAROIU, S., GUMMADI, P. K., AND GRIBBLE, S. A measurement study of peer-to-peer file sharing systems. In Proc. of MMCN (January 2002).
-
(2002)
Proc. of MMCN
-
-
SAROIU, S.1
GUMMADI, P.K.2
GRIBBLE, S.3
-
16
-
-
58049208252
-
Can social networks improve e-commerce: A study on social marketplaces
-
August
-
SWAMYNATHAN, G., WILSON, C., BOE, B., ALMEROTH, K. C., AND ZHAO, B. Y. Can social networks improve e-commerce: a study on social marketplaces. In Proc. of WOSN (August 2008).
-
(2008)
Proc. of WOSN
-
-
SWAMYNATHAN, G.1
WILSON, C.2
BOE, B.3
ALMEROTH, K.C.4
ZHAO, B.Y.5
-
17
-
-
0038311861
-
Towards an Analysis of Onion Routing Security
-
July
-
SYVERSON, P., TSUDIK, G., REED, M., AND LANDWEHR, C. Towards an Analysis of Onion Routing Security. In Proc. of WDIAU (July 2000).
-
(2000)
Proc. of WDIAU
-
-
SYVERSON, P.1
TSUDIK, G.2
REED, M.3
LANDWEHR, C.4
-
18
-
-
58049198393
-
Limewire building social network
-
January
-
WILSON, D. Limewire building social network. ZeroPaid News, January 2008.
-
(2008)
ZeroPaid News
-
-
WILSON, D.1
-
19
-
-
85180737609
-
An analysis of the degradation of anonymous protocols
-
Feb
-
WRIGHT, M., ADLER, M., LEVINE, B. N., AND SHIELDS, C. An analysis of the degradation of anonymous protocols. In Proc of NDSS (Feb. 2002).
-
(2002)
Proc of NDSS
-
-
WRIGHT, M.1
ADLER, M.2
LEVINE, B.N.3
SHIELDS, C.4
-
20
-
-
84954435745
-
Defending anonymous communications against passive logging attacks
-
May
-
WRIGHT, M., ADLER, M., LEVINE, B. N., AND SHIELDS, C. Defending anonymous communications against passive logging attacks. In Proc. of IEEE Symposium on Security and Privacy (May 2003).
-
(2003)
Proc. of IEEE Symposium on Security and Privacy
-
-
WRIGHT, M.1
ADLER, M.2
LEVINE, B.N.3
SHIELDS, C.4
-
21
-
-
58049217410
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
WRIGHT, M., ADLER, M., LEVINE, B. N., AND SHIELDS, C. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM TISS 7, 4 (2004).
-
(2004)
ACM TISS
, vol.7
, pp. 4
-
-
WRIGHT, M.1
ADLER, M.2
LEVINE, B.N.3
SHIELDS, C.4
-
22
-
-
45749116664
-
A near-optimal social network defense against sybil attacks
-
Oakland, CA, May
-
YU, H., GIBBONS, P., KAMINSKY, M., AND XIAO, F. A near-optimal social network defense against sybil attacks. In Proc. of IEEE Symposium on Security and Privacy (Oakland, CA, May 2008).
-
(2008)
Proc. of IEEE Symposium on Security and Privacy
-
-
YU, H.1
GIBBONS, P.2
KAMINSKY, M.3
XIAO, F.4
-
23
-
-
84873857575
-
Cashmere: Resilient anonymous routing
-
Boston, MA, May
-
ZHUANG, L., ZHOU, F., ZHAO, B. Y., AND ROWSTRON, A. Cashmere: Resilient anonymous routing. In Proc. of NSDI (Boston, MA, May 2005).
-
(2005)
Proc. of NSDI
-
-
ZHUANG, L.1
ZHOU, F.2
ZHAO, B.Y.3
ROWSTRON, A.4
|