-
1
-
-
33749571809
-
Towards a scalable and robust DHT
-
New York, NY, USA, ACM
-
B. Awerbuch and C. Scheideler. Towards a scalable and robust DHT. In SPAA '06: Proceedings of the eighteenth annual ACM symposium on parallelism in algorithms and architectures, pages 318-327, New York, NY, USA, 2006. ACM.
-
(2006)
SPAA '06: Proceedings of the eighteenth annual ACM symposium on parallelism in algorithms and architectures
, pp. 318-327
-
-
Awerbuch, B.1
Scheideler, C.2
-
3
-
-
84937578170
-
Web MIXes: A system for anonymous and unobservable Internet access
-
H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, Springer-Verlag, Jul
-
O. Berthold, H. Federrath, and S. Köpsell. Web MIXes: A system for anonymous and unobservable Internet access. In H. Federrath, editor, Proceedings of Designing Privacy Enhancing Technologies: Workshop on Design Issues in Anonymity and Unobservability, pages 115-129. Springer-Verlag, LNCS 2009, Jul 2000.
-
(2000)
LNCS
, pp. 115-129
-
-
Berthold, O.1
Federrath, H.2
Köpsell, S.3
-
4
-
-
50249119735
-
Denial of service or denial of security?
-
New York, NY, USA, ACM
-
N. Borisov, G. Danezis, P. Mittal, and P. Tabriz. Denial of service or denial of security? In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 92-102, New York, NY, USA, 2007. ACM.
-
(2007)
CCS '07: Proceedings of the 14th ACM conference on Computer and communications security
, pp. 92-102
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
5
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
Boston, MA, USA, December
-
M. Castro, P. Druschel, A. J. Ganesh, A. I. T. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In Symposium on Operating Systems Design and Implementation (OSDI 02), Boston, MA, USA, December 2002.
-
(2002)
Symposium on Operating Systems Design and Implementation (OSDI 02)
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.J.3
Rowstron, A.I.T.4
Wallach, D.S.5
-
6
-
-
50249147866
-
Bridging and fingerprinting: Epistemic attacks on route selection
-
N. Borisov and I. Goldberg, editors, Leuven, Belgium, July, Springer
-
G. Danezis and P. Syverson. Bridging and fingerprinting: Epistemic attacks on route selection. In N. Borisov and I. Goldberg, editors, Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008), pages 151-166, Leuven, Belgium, July 2008. Springer.
-
(2008)
Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008)
, pp. 151-166
-
-
Danezis, G.1
Syverson, P.2
-
10
-
-
67249102575
-
Halo: High-assurance locate for distributed hash tables
-
The Internet Society
-
A. Kapadia and N. Triandopoulos. Halo: High-assurance locate for distributed hash tables. In NDSS. The Internet Society, 2008.
-
(2008)
NDSS
-
-
Kapadia, A.1
Triandopoulos, N.2
-
14
-
-
77951462266
-
-
A. Mislove, G. Oberoi, A. Post, C. Reis, and P. Druschel. AP3: Cooperative, decentralized anonymous communication. In In Proc. of SIGOPS European Workshop, 2004.
-
A. Mislove, G. Oberoi, A. Post, C. Reis, and P. Druschel. AP3: Cooperative, decentralized anonymous communication. In In Proc. of SIGOPS European Workshop, 2004.
-
-
-
-
15
-
-
70349273917
-
Information leaks in structured peer-to-peer anonymous communication systems
-
P. Syverson, S. Jha, and X. Zhang, editors, Alexandria, Virginia, USA, October, ACM Press
-
P. Mittal and N. Borisov. Information leaks in structured peer-to-peer anonymous communication systems. In P. Syverson, S. Jha, and X. Zhang, editors, Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008), pages 267-278, Alexandria, Virginia, USA, October 2008. ACM Press.
-
(2008)
Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008)
, pp. 267-278
-
-
Mittal, P.1
Borisov, N.2
-
16
-
-
33644815552
-
Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications
-
San Diego, CA, September
-
R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications. In ACM SIGCOMM 2001, San Diego, CA, September 2001.
-
(2001)
ACM SIGCOMM 2001
-
-
Morris, R.1
Karger, D.2
Kaashoek, F.3
Balakrishnan, H.4
-
17
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
Alexandria, VA, USA, October, ACM Press
-
A. Nambiar and M. Wright. Salsa: A structured approach to large-scale anonymity. In Proceedings of ACM CCS 2006, Alexandria, VA, USA, October 2006. ACM Press.
-
(2006)
Proceedings of ACM CCS 2006
-
-
Nambiar, A.1
Wright, M.2
-
19
-
-
70449120776
-
Shalon: Lightweight anonymization based on open standards
-
San Francisco, CA, USA, August, IEEE Press
-
A. Panchenko, B. Westermann, L. Pimenidis, and C. Andersson. Shalon: Lightweight anonymization based on open standards. In Proceedings of the 19th International Conference on Computer Communications and Networks (IEEE ICCCN 2009), San Francisco, CA, USA, August 2009. IEEE Press.
-
(2009)
Proceedings of the 19th International Conference on Computer Communications and Networks (IEEE ICCCN 2009)
-
-
Panchenko, A.1
Westermann, B.2
Pimenidis, L.3
Andersson, C.4
-
22
-
-
0030676973
-
Anonymous connections and onion routing
-
Oakland, California, USA, IEEE Computer Society
-
P. F. Syverson, D. M. Goldschlag, and M. G. Reed. Anonymous connections and onion routing. In Proceedings of the IEEE Symposium on Security and Privacy, pages 44-54, Oakland, California, USA, 1997. IEEE Computer Society.
-
(1997)
Proceedings of the IEEE Symposium on Security and Privacy
, pp. 44-54
-
-
Syverson, P.F.1
Goldschlag, D.M.2
Reed, M.G.3
-
23
-
-
77049097177
-
Breaking the collusion detection mechanism of morphmix
-
G. Danezis and P. Golle, editors, Cambridge, UK, June, Springer
-
P. Tabriz and N. Borisov. Breaking the collusion detection mechanism of morphmix. In G. Danezis and P. Golle, editors, Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006), pages 368-384, Cambridge, UK, June 2006. Springer.
-
(2006)
Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006)
, pp. 368-384
-
-
Tabriz, P.1
Borisov, N.2
-
24
-
-
49049088635
-
-
Tor Documentation. https://www.torproject.org/documentation.html.
-
Tor Documentation
-
-
-
25
-
-
70350632925
-
A kademlia-based node lookup system for anonymization networks
-
Advances in Information Security and Assurance: Proceedings of the Third International Conference on Information Security and Assurance ISA 2009, of, Seoul, South Korea, Jun, Springer
-
B. Westermann, A. Panchenko, and L. Pimenidis. A kademlia-based node lookup system for anonymization networks. In Advances in Information Security and Assurance: Proceedings of the Third International Conference on Information Security and Assurance (ISA 2009), volume 5576 of LNCS, pages 179-189, Seoul, South Korea, Jun 2009. Springer.
-
(2009)
LNCS
, vol.5576
, pp. 179-189
-
-
Westermann, B.1
Panchenko, A.2
Pimenidis, L.3
|