-
1
-
-
54049153176
-
Low-resource routing attacks against tor
-
(Alexandria, VA, 2007)
-
BAUER, K., ET AL. Low-resource routing attacks against tor. In Proc. of WPES (Alexandria, VA, 2007).
-
Proc. of WPES
-
-
Bauer, K.1
-
2
-
-
67249103862
-
Oversim: A flexible overlay network simulation framework
-
BAUMGART, I., HEEP, B., AND KRAUSE, S. Oversim: A flexible overlay network simulation framework. In Proc. of GI (2007).
-
(2007)
Proc. of GI
-
-
Baumgart, I.1
Heep, B.2
Krause, S.3
-
3
-
-
56649105529
-
Denial of service or denial of security? How attacks on reliability can compromise anonymity
-
BORISOV, N., ET AL. Denial of service or denial of security? How attacks on reliability can compromise anonymity. In CCS (2007).
-
(2007)
CCS
-
-
Borisov, N.1
-
4
-
-
2442603590
-
Security for structured peer-to-peer overlay networks
-
December 2002
-
CASTRO, M., ET AL. Security for structured peer-to-peer overlay networks. In Proc. of OSDI (December 2002).
-
Proc. of OSDI
-
-
Castro, M.1
-
5
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
CHAUM, D. L. Untraceable electronic mail, return addresses, and digital pseudonyms. CACM 24, 2 (1981).
-
(1981)
CACM 24
, Issue.2
-
-
Chaum, D.L.1
-
6
-
-
34447129576
-
Efficient replica maintenance for distributed storage systems
-
May 2006
-
CHUN, B.-G., ET AL. Efficient replica maintenance for distributed storage systems. In Proc. of NSDI (May 2006).
-
Proc. of NSDI
-
-
Chun, B.-G.1
-
7
-
-
2642576704
-
Towards a common API for structured P2P overlays
-
February 2003
-
DABEK, F., ET AL. Towards a common API for structured P2P overlays. In Proc. of IPTPS (February 2003).
-
Proc. of IPTPS
-
-
Dabek, F.1
-
8
-
-
67249160847
-
Mix-networks with restricted routes
-
March 2003
-
DANEZIS, G. Mix-networks with restricted routes. In Proc. of PET (March 2003).
-
Proc. of PET
-
-
Danezis, G.1
-
9
-
-
3242815149
-
Towards measuring anonymity
-
April 2002
-
DIAZ, C., SEYS, S., CLAESSENS, J., AND PRENEEL, B. Towards measuring anonymity. In Proc. of PET (April 2002).
-
Proc. of PET
-
-
Diaz, C.1
Seys, S.2
Claessens, J.3
Prneel, B.4
-
11
-
-
33646756818
-
Reliable MIX cascade networks through reputation
-
March 2002
-
DINGLEDINE, R., AND SYVERSON, P. Reliable MIX cascade networks through reputation. In Proc. of FC (March 2002).
-
Proc. of FC
-
-
Dingledine, R.1
Syverson, P.2
-
12
-
-
4544304744
-
The sybil attack
-
Cambridge, MA, March 2002
-
DOUCEUR, J. R. The Sybil attack. In Proc. of IPTPS (Cambridge, MA, March 2002).
-
Proc. of IPTPS
-
-
Douceur, J.R.1
-
13
-
-
0038349207
-
A peer-to-peer anonymizing network layer
-
Nov. 2002
-
FREEDMAN, M. J., AND MORRIS, R. Tarzan: A peer-to-peer anonymizing network layer. In Proc. of CCS (Nov. 2002).
-
Proc. of CCS
-
-
Freedman, M.J.1
Tarzan, M.R.2
-
14
-
-
85180784621
-
Halo-high assurance locate for distributed hash tables
-
KAPADIA, A., AND TRIANDOPOULOS, N. Halo-high assurance locate for distributed hash tables. In Proc of NDSS (2008).
-
(2008)
Proc of NDSS
-
-
Kapadia, A.1
Triandopoulos, N.2
-
15
-
-
33745798251
-
Timing attacks in low-latency mix-based systems
-
Feb 2004
-
LEVINE, B. N., REITER, M. K., WANG, C., AND WRIGHT, M. K Timing attacks in low-latency mix-based systems. In FC (Feb 2004).
-
FC
-
-
Levine, B.N.1
Reiter, M.K.2
Wang, C.3
Wright, M.K.4
-
17
-
-
34547281136
-
A structured approach to largescale anonymity
-
Nov 2006
-
NAMBIAR, A., AND WRIGHT,M. Salsa: A structured approach to largescale anonymity. In Proc. of CCS (Nov 2006).
-
Proc. of CCS
-
-
Nambiar, A.1
Salsa, W.M.2
-
18
-
-
67249129582
-
Protecting anonymity in dynamic peerto-peer networks
-
Sept. 2008
-
PUTTASWAMY, K. P. N., ET AL. Protecting anonymity in dynamic peerto- peer networks. Tech. Rep. 2008-2012, UCSB, Sept. 2008.
-
Tech. Rep. 2008-12 UCSB
-
-
Puttaswamy, K.P.N.1
-
19
-
-
67249114503
-
Securing structured overlays against identity attacks
-
Jan. 2008
-
PUTTASWAMY, K. P. N., ET AL. Securing structured overlays against identity attacks. Tech. Rep. 2008-2101, UCSB, Jan. 2008.
-
Tech. Rep. 2008-01 UCSB
-
-
Puttaswamy, K.P.N.1
-
20
-
-
0032074579
-
Anonymous connections and onion routing
-
May 1998
-
REED, M. G., SYVERSON, P. F., AND GOLDSCHLAG, D. M. Anonymous connections and onion routing. IEEE JSAC 16, 4 (May 1998).
-
IEEE JSAC 16
, Issue.4
-
-
Reed, M.G.1
Syverson, P.F.2
Goldschlag, D.M.3
-
21
-
-
67249159398
-
Anonymity for web transactions
-
June 1998
-
REITER, M., AND RUBIN, A. Crowds: Anonymity for web transactions. ACM TISS 1, 1 (June 1998).
-
ACM TISS 1
, Issue.1
-
-
Reiter, M.1
Crowds, R.A.2
-
22
-
-
0003007594
-
Scalable, distributed object location and routing for large-scale peer-to-peer systems
-
November 2001
-
ROWSTRON, A., AND DRUSCHEL, P. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proc. Of Middleware (November 2001).
-
Proc. Of Middleware
-
-
Rowstone, A.1
Pastry, D.P.2
-
23
-
-
0038404059
-
A measurement study of peer-to-peer file sharing systems
-
January 2002
-
SAROIU, S.,GUMMADI, P. K., AND GRIBBLE, S. A measurement study of peer-to-peer file sharing systems. In Proc. of MMCN (January 2002).
-
Proc. of MMCN
-
-
Saroiu, S.1
Gummadi, P.K.2
Gribble, S.3
-
24
-
-
2642543760
-
Towards an information theoretic metric for anonymity
-
April 2002
-
SERJANTOV, A., AND DANEZIS, G. Towards an information theoretic metric for anonymity. In Proc. of PET (April 2002).
-
Proc. of PET
-
-
Serjantov, A.1
Danezis, G.2
-
25
-
-
84874954212
-
P5: A protocol for scalable anonymous communication
-
May 2002
-
SHERWOOD, R., ET AL. P5: A protocol for scalable anonymous communication. In IEEE Sec. and Priv. (May 2002).
-
IEEE Sec. and Priv
-
-
Sherwood, R.1
-
26
-
-
77951431567
-
Eluding carnivores: File sharing with strong anonymity
-
Sept. 2004
-
SIRER, E. G., ET AL. Eluding carnivores: File sharing with strong anonymity. In Proc. of ACM SIGOPS European Workshop (Sept. 2004).
-
Proc. of ACM SIGOPS European Workshop
-
-
Sirer, E.G.1
-
27
-
-
0002245383
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
STOICA, I., ET AL. Chord: A scalable peer-to-peer lookup service for internet applications. In Proc. of SIGCOMM (2001).
-
(2001)
Proc. of SIGCOMM
-
-
Stoica, I.1
-
28
-
-
33744901134
-
Internet indirection infrastructure
-
DOI 10.1145/964725.633033, Proceedings of the ACM SIGCOMM 2002 Conference - Applications, Technologies, Architectures, and Protocols for Computer Communications
-
STOICA, I., ET AL. Internet indirection infrastructure. In Proc. Of SIGCOMM (August 2002), ACM, pp. 73-86. (Pubitemid 43843776)
-
(2002)
Computer Communication Review
, vol.32
, Issue.4
, pp. 73-86
-
-
Stoica, I.1
Adkins, D.2
Zhuang, S.3
Shenker, S.4
Surana, S.5
-
29
-
-
0030676973
-
Anonymous connections and onion routing
-
May 1997
-
SYVERSON, P. F., ET AL. Anonymous connections and onion routing. In IEEE Sec. and Priv. (May 1997).
-
IEEE Sec. and Priv
-
-
Syverson, P.F.1
-
30
-
-
27944460736
-
An analysis of the degradation of anonymous protocols
-
Feb 2002
-
WRIGHT, M., ET AL. An analysis of the degradation of anonymous protocols. In Proc of NDSS (Feb. 2002).
-
Proc of NDSS
-
-
Wright, M.1
-
31
-
-
84954435745
-
Defending anonymous communications against passive logging attacks
-
May 2003
-
WRIGHT, M., ET AL. Defending anonymous communications against passive logging attacks. In Proc. of IEEE Sec. and Priv. (May 2003).
-
Proc. of IEEE Sec. and Priv
-
-
Wright, M.1
-
32
-
-
14544273666
-
The predecessor attack: An analysis of a threat to anonymous communications systems
-
WRIGHT, M., ET AL. The predecessor attack: An analysis of a threat to anonymous communications systems. ACM TISS 7, 4 (2004).
-
(2004)
ACM TISS 7
, Issue.4
-
-
Wright, M.1
-
33
-
-
34247223162
-
Cashmere: Resilient anonymous routing
-
Boston, MA, May 2005
-
ZHUANG, L., ET AL. Cashmere: Resilient anonymous routing. In Proc. of NSDI (Boston, MA, May 2005).
-
Proc. of NSDI
-
-
Zhuang, L.1
|