-
1
-
-
33745218758
-
Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage
-
Ateniese, G., Fu, K., Green, M., Hohenberger, S.: Improved Proxy Re-Encryption Schemes with Applications to Secure Distributed Storage, ACM Transactions on Information and System Security, 9(1), 2006, 1-30.
-
(2006)
ACM Transactions On Information and System Security
, vol.9
, Issue.1
, pp. 1-30
-
-
Ateniese, G.1
Fu, K.2
Green, M.3
Hohenberger, S.4
-
2
-
-
39749124886
-
MuON: Epidemic based mutual anonymity in unstructured P2P networks
-
Bansod, N., Malgi, A., Choi, B. K., Mayo, J.: MuON: Epidemic based mutual anonymity in unstructured P2P networks, The International Journal of Computer and Telecommunications Networking, 52(5), 2008, 915-934.
-
(2008)
The International Journal of Computer and Telecommunications Networking
, vol.52
, Issue.5
, pp. 915-934
-
-
Bansod, N.1
Malgi, A.2
Choi, B.K.3
Mayo, J.4
-
3
-
-
44349161717
-
Optimal Transit Price Negotiation: The Distributed Learning Perspective
-
Barth, D., Echabbi, L., Hamlaoui, C.: Optimal Transit Price Negotiation: The Distributed Learning Perspective, Journal of Universal Computer Science, 14(5), 2008, 745-765.
-
(2008)
Journal of Universal Computer Science
, vol.14
, Issue.5
, pp. 745-765
-
-
Barth, D.1
Echabbi, L.2
Hamlaoui, C.3
-
4
-
-
0019532104
-
Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms
-
Chaum, D. L.: Untraceable Electronic Mail, Return Addresses, and Digital Pseudonyms, Communications of the ACM, 24(2), 1981, 84-90.
-
(1981)
Communications of The ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
5
-
-
85084161366
-
Tor: The Second-Generation Onion Router
-
San Diego, CA, USA, 9-13 August
-
Dingledine, R., Mathewson, N., Syverson, P.: Tor: The Second-Generation Onion Router, In Proceedings of the 13th Conference on USENIX Security Symposium, San Diego, CA, USA, 9-13 August 2004, 21-38.
-
(2004)
Proceedings of The 13th Conference On Usenix Security Symposium
, pp. 21-38
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
6
-
-
0038349207
-
Tarzan: A Peer-to-Peer Anonymizing Network Layer
-
Washington, USA, 18-22 November
-
Freedman M. J., Morris, R.: Tarzan: A Peer-to-Peer Anonymizing Network Layer, In Proceedings of the 9th ACM Conference on Computer and Communications Security (CCS), Washington, USA, 18-22 November 2002, 193-206.
-
(2002)
Proceedings of The 9th Acm Conference On Computer and Communications Security (CCS)
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
7
-
-
38049061546
-
Identity-Based Proxy Re-encryption
-
Zhuhai, China, 5-8 June
-
Green, M., Ateniese, G.: Identity-Based Proxy Re-encryption, In Proceedings of the 5th International Conference on Applied Cryptography and Network Security (ACNS'07), Zhuhai, China, 5-8 June 2007, 288-306.
-
(2007)
Proceedings of The 5th International Conference On Applied Cryptography and Network Security (ACNS'07)
, pp. 288-306
-
-
Green, M.1
Ateniese, G.2
-
8
-
-
0141427800
-
King: Estimating Latency between Arbitrary Internet End Hosts
-
Marseille, France, 6-8 November
-
Gummadi, K. P., Saroiu, S., Gribble, S. D.: King: Estimating Latency between Arbitrary Internet End Hosts, In Proceedings of the 2nd ACM SIGCOMM Workshop on Internet measurment (IMW), Marseille, France, 6-8 November 2002, 5-18.
-
(2002)
Proceedings of The 2nd Acm Sigcomm Workshop On Internet Measurment (IMW)
, pp. 5-18
-
-
Gummadi, K.P.1
Saroiu, S.2
Gribble, S.D.3
-
9
-
-
84883649048
-
Efficient Routing for Peer-to-Peer Overlays
-
San Francisco, USA, 29-31 March
-
Gupta, A., Liskov, B., Rodrigues, R.: Efficient Routing for Peer-to-Peer Overlays, In Proceedings of the 1th Symposium on Networked Systems Design and Implementation (NSDI), San Francisco, USA, 29-31 March 2004, 9-23.
-
(2004)
Proceedings of The 1th Symposium On Networked Systems Design and Implementation (NSDI)
, pp. 9-23
-
-
Gupta, A.1
Liskov, B.2
Rodrigues, R.3
-
10
-
-
44349096469
-
Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model
-
Hwang, Y. H., Liu, J. K., Chow S. S.M.: Certificateless Public Key Encryption Secure against Malicious KGC Attacks in the Standard Model, Journal of Universal Computer Science, 14(3), 2008, 463-480.
-
(2008)
Journal of Universal Computer Science
, vol.14
, Issue.3
, pp. 463-480
-
-
Hwang, Y.H.1
Liu, J.K.2
Chow, S.S.M.3
-
11
-
-
44349146190
-
Parallel Key Exchange
-
Jeong, I. R., Lee, D. H.: Parallel Key Exchange, Journal of Universal Computer Science, 14(3), 2008, 377-396.
-
(2008)
Journal of Universal Computer Science
, vol.14
, Issue.3
, pp. 377-396
-
-
Jeong, I.R.1
Lee, D.H.2
-
12
-
-
0002054934
-
Crowds: Anonymity for Web Transactions
-
Reiter, M. K., Rubin, A. D.: Crowds: Anonymity for Web Transactions, ACM Transactions on Information and System Security, 1(1), 1998, 66-92.
-
(1998)
ACM Transactions On Information and System Security
, vol.1
, Issue.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
13
-
-
0038041177
-
Introducing Morphmix: Peer-to-peer based Anonymous Internet Usage with Collusion Detection
-
Washington, USA, 18-22 November
-
Rennhard, M., Plattner, B.: Introducing Morphmix: Peer-to-peer based Anonymous Internet Usage with Collusion Detection, In Proceedings of the Workshop on Privacy in the Electronic Society, Washington, USA, 18-22 November 2002, 91-102.
-
(2002)
In Proceedings of the Workshop On Privacy In The Electronic Society
, pp. 91-102
-
-
Rennhard, M.1
Plattner, B.2
-
14
-
-
57349142855
-
Pastry: Scalable, Decentralized Object Location, and Routing For Large-scale Peer-to-peer Systems
-
Heidelberg, Germany, 12-16 November
-
Rowstron, A., Druschel, P.: Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems, In Proceedings of the 18th IFIP/ACM International Conference on Distributed System Platforms (Middleware), Heidelberg, Germany, 12-16 November 2001, 329-350.
-
(2001)
Proceedings of The 18th IFIP/ACM International Conference On Distributed System Platforms (Middleware)
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
15
-
-
0036028606
-
A Measurement Study of Peerto-Peer File Sharing Systems
-
San Jose, CA, USA, 23-24 January
-
Saroiu, S., Gummadi, P. K., Gribble, S. D.: A Measurement Study of Peerto-Peer File Sharing Systems, In Proceedings of Multimedia Computing and Networking, San Jose, CA, USA, 23-24 January 2002, 156-170.
-
(2002)
Proceedings of Multimedia Computing and Networking
, pp. 156-170
-
-
Saroiu, S.1
Gummadi, P.K.2
Gribble, S.D.3
-
16
-
-
0035701330
-
Responder Anonymity and Anonymous Peer-to-Peer File Sharing
-
Riverside, CA, 11-14 November
-
Scarlata, V., Levine, B. N., Shields, C.: Responder Anonymity and Anonymous Peer-to-Peer File Sharing, In Proceedings of IEEE International Conference on Network Protocols (ICNP 2001), Riverside, CA, 11-14 November 2001, 272-280.
-
(2001)
Proceedings of IEEE International Conference On Network Protocols (ICNP 2001)
, pp. 272-280
-
-
Scarlata, V.1
Levine, B.N.2
Shields, C.3
-
17
-
-
0034447260
-
A Protocol for Anonymous Communication over the Internet
-
Athens, 1-4 November
-
Shields, C., Levine, B. N.: A Protocol for Anonymous Communication over the Internet, In ACM Conference on Computer and Communications Security, Athens, 1-4 November 2000, 33-42.
-
(2000)
ACM Conference On Computer and Communications Security
, pp. 33-42
-
-
Shields, C.1
Levine, B.N.2
-
18
-
-
29244448736
-
P5: A protocol for Scalable Anonymous Communication
-
Sherwood, R., Bhattacharjee, B., Srinivasan, A.: P5: A protocol for Scalable Anonymous Communication, Journal of Computer Security, 13(6), 2005, 839-876.
-
(2005)
Journal of Computer Security
, vol.13
, Issue.6
, pp. 839-876
-
-
Sherwood, R.1
Bhattacharjee, B.2
Srinivasan, A.3
-
19
-
-
2442588844
-
SLIC: A Selfish Link-based Incentive Mechanism for Unstructured Peer-to-Peer Networks
-
Tokyo, Japan, 24-26 March
-
Sun, Q., Garcia-Molina, H.: SLIC: A Selfish Link-based Incentive Mechanism for Unstructured Peer-to-Peer Networks, In Proceedings of the 24th International Conference on Computing Systems(ICDCS), Tokyo, Japan, 24-26 March 2004, 506-515.
-
(2004)
In Proceedings of The 24th International Conference On Computing Systems(ICDCS)
, pp. 506-515
-
-
Sun, Q.1
Garcia-Molina, H.2
-
21
-
-
45949090793
-
Ranking Retrieval Systems with Partial Relevance Judgements
-
Wu, S., Crestani, F.: Ranking Retrieval Systems with Partial Relevance Judgements, Journal of Universal Computer Science, 14(7), 2008, 1020-1030.
-
(2008)
Journal of Universal Computer Science
, vol.14
, Issue.7
, pp. 1020-1030
-
-
Wu, S.1
Crestani, F.2
-
22
-
-
10044298435
-
TAP: A Novel Tunnelling Approach for Anonymity in Structured P2P Systems
-
Montreal, Quebec, Canada, 15-18 August
-
Zhu, Y., Hu, Y.: TAP: A Novel Tunnelling Approach for Anonymity in Structured P2P Systems, In Proceedings of International Conference on Parallel Processing (ICPP), Montreal, Quebec, Canada, 15-18 August 2004, 21-28.
-
(2004)
Proceedings of International Conference On Parallel Processing (ICPP)
, pp. 21-28
-
-
Zhu, Y.1
Hu, Y.2
-
23
-
-
84873857575
-
Cashmere: Resilient Anonymous Routing
-
Boston, MA, USA, 2-4 May
-
Zhuang, L., Zhou, F., Zhao, B. Y., Rowstron, A.: Cashmere: Resilient Anonymous Routing, In Proceedings of the 2nd Symposium on Networked Systems Design and Implementation (NSDI), Boston, MA, USA, 2-4 May 2005, 301-314.
-
(2005)
Proceedings of The 2nd Symposium On Networked Systems Design and Implementation (NSDI)
, pp. 301-314
-
-
Zhuang, L.1
Zhou, F.2
Zhao, B.Y.3
Rowstron, A.4
-
24
-
-
34548800704
-
Making Peer-to-Peer Anonymous Routing Resilient to Failures
-
Long Beach, CA, USA, 26-30 March
-
Zhu, Y., Hu, Y.: Making Peer-to-Peer Anonymous Routing Resilient to Failures, In Proceedings of the 21st International Parallel and Distributed Processing Symposium (IPDPS), Long Beach, CA, USA, 26-30 March 2007, 4228-4238.
-
(2007)
Proceedings of The 21st International Parallel and Distributed Processing Symposium (IPDPS)
, pp. 4228-4238
-
-
Zhu, Y.1
Hu, Y.2
|