-
1
-
-
77954408459
-
A modified algorithm for peer-to-peer security
-
Azerbaijan National Acad. Science, Gebze, Turkey
-
Akleylek, S., L. Emmungil and U. Nuriyev, 2005. A modified algorithm for peer-to-peer security. Proceedings of the System and Control Theory Workshop, (SCTW'05), Azerbaijan National Acad. Science, Gebze, Turkey, pp: 258-264.
-
(2005)
Proceedings of the System and Control Theory Workshop, (SCTW'05)
, pp. 258-264
-
-
Akleylek, S.1
Emmungil, L.2
Nuriyev, U.3
-
2
-
-
33749661564
-
-
Springer Verlag, Cambridge, UK.
-
Bangerter, E., J. Camenisch, A. Lysyanskaya, M. Blaze and B. Crispo et at, 2006. A Cryptographic Framework for the Controlled Release of Certified Data. Springer Verlag, Cambridge, UK., pp: 20-50.
-
(2006)
A Cryptographic Framework for the Controlled Release of Certified Data
, pp. 20-50
-
-
Bangerter, E.1
Camenisch, J.2
Lysyanskaya, A.3
Blaze, M.4
Crispo, B.5
-
3
-
-
39749124886
-
MuON: Epidemic based mutual anonymity in unstructured P2P networks
-
Bansod, N., A. Malgi, B.K. Choi and J. Mayo, 2008. MuON: Epidemic based mutual anonymity in unstructured P2P networks. Comput. Networks, 52: 915-934.
-
(2008)
Comput. Networks
, vol.52
, pp. 915-934
-
-
Bansod, N.1
Malgi, A.2
Choi, B.K.3
Mayo, J.4
-
4
-
-
0038059205
-
IP traceback with deterministic packet marking
-
Belenky, A. and N. Ansari, 2003. IP traceback with deterministic packet marking. Commun. Lett. IEEE, 7: 162-164.
-
(2003)
Commun. Lett. IEEE
, vol.7
, pp. 162-164
-
-
Belenky, A.1
Ansari, N.2
-
5
-
-
85011016678
-
Tracing anonymous packets to their approximate source
-
Dec. 3-8, New Orleans, Louisiana, USA.
-
Burch, H. and B. Cheswick, 2000. Tracing anonymous packets to their approximate source. Proceedings of the 14th Systems Administration Conference (USENIX LISA 2000), Dec. 3-8, New Orleans, Louisiana, USA., pp: 319-327.
-
(2000)
Proceedings of the 14th Systems Administration Conference (USENIX LISA 2000)
, pp. 319-327
-
-
Burch, H.1
Cheswick, B.2
-
6
-
-
33846193135
-
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots
-
Chang, C.C., C.Y. Linand, K.C. Lin, 2007. Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots. J. Network Comput. Appl., 30: 662-676.
-
(2007)
J. Network Comput. Appl.
, vol.30
, pp. 662-676
-
-
Chang, C.C.1
Linand, C.Y.2
Lin, K.C.3
-
7
-
-
85024290278
-
Group signatures
-
Davies, D.W. (Ed.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-54620-7
-
Chaum, D. and E.V. Heyst, 1991. Group Signatures. In: Advances in Cryptology-EURO CRYPT '91, Davies, D.W. (Ed.). Springer, Berlin, Heidelberg, ISBN: 978-3-540-54620-7, pp: 257-265.
-
(1991)
Advances in Cryptology-EURO CRYPT '91
, pp. 257-265
-
-
Chaum, D.1
Heyst, E.V.2
-
8
-
-
0020915882
-
-
Springer-Verlag, Santa Barbara, CA, USA.
-
Chaum, D., 1983. Blind Signatures for Untraceable Payments, Advances in Cryptology-Crypto '82. Springer-Verlag, Santa Barbara, CA, USA., pp: 199-203.
-
(1983)
Blind Signatures for Untraceable Payments, Advances in Cryptology-Crypto '82
, pp. 199-203
-
-
Chaum, D.1
-
9
-
-
51849137463
-
Scalable byzantine fault tolerant public key authentication for peer-to-peer networks
-
Spain, Aug. 26-29, Springer-Verlag, Berlin, Heidelberg
-
Chen, R., W. Guo, L. Tang, J. Hu and Z. Chen, 2008. Scalable byzantine fault tolerant public key authentication for peer-to-peer networks. Proceedings of the 14th International Euro-Par Conference on Parallel Processing Las Palmas de Gran Canaria, Spain, Aug. 26-29, Springer-Verlag, Berlin, Heidelberg, pp: 601-610.
-
(2008)
Proceedings of the 14th International Euro-Par Conference on Parallel Processing Las Palmas de Gran Canaria
, pp. 601-610
-
-
Chen, R.1
Guo, W.2
Tang, L.3
Hu, J.4
Chen, Z.5
-
10
-
-
67749097815
-
FBT: An efficient traceback scheme in hierarchical wireless sensor network
-
Cheng, B.C., H. Chen and G.T. Liao, 2008. FBT: An efficient traceback scheme in hierarchical wireless sensor network. Security Commun. Networks, 2: 133-144.
-
(2008)
Security Commun. Networks
, vol.2
, pp. 133-144
-
-
Cheng, B.C.1
Chen, H.2
Liao, G.T.3
-
11
-
-
58349119575
-
-
Institute of Electrical and Electronics Engineers Computer Society, Zhangjiajie, Hunan, China
-
Dong, J., C. Tan and Y. Zhang, 2008. A Reputation Evaluation Method in P2P Anonymous Environment. Institute of Electrical and Electronics Engineers Computer Society, Zhangjiajie, Hunan, China, pp: 1516-1521.
-
(2008)
A Reputation Evaluation Method in P2P Anonymous Environment
, pp. 1516-1521
-
-
Dong, J.1
Tan, C.2
Zhang, Y.3
-
12
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
Nov. 18-22, Association for Computing Machinery, Washington DC, USA
-
Freedman, M.J. and R. Morris, 2002. Tarzan: A peer-to-peer anonymizing network layer. Proceedings of the 9th ACM Conference on Computer and Communications Security, Nov. 18-22, Association for Computing Machinery, Washington, DC, USA., pp: 193-206.
-
(2002)
Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
13
-
-
24344445915
-
-
Institute of Electrical and Electronics Engineers Inc., Seoul, Korea
-
Gong, C. and K.I.P. Sarac, 2005. Traceback Based on Packet Marking and Logging. Institute of Electrical and Electronics Engineers Inc., Seoul, Korea, pp: 1043-1047.
-
(2005)
Traceback Based on Packet Marking and Logging
, pp. 1043-1047
-
-
Gong, C.1
Sarac, K.I.P.2
-
14
-
-
46149086782
-
-
IEEE Computer Society, Santa Barbara, CA, United States
-
Han, J. and Y. Liu, 2006. Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems. IEEE Computer Society, Santa Barbara, CA, United States, pp: 22-31.
-
(2006)
Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems
, pp. 22-31
-
-
Han, J.1
Liu, Y.2
-
16
-
-
26444604913
-
A random walk based anonymous peer-to-peer protocol design
-
Networking and Mobile Computing: Third International Conference, ICCNMC 2005. Proceedings
-
Han, J., Y. Liu, L. Lu, L. Hu and A. Paul, 2005. A Random Walk Based Anonymous Peer-to-Peer Protocol Design. In: Networking and Mobile Computing, Lu, X. andW. Ahao(Eds.).LNCS., 3619, Springer-Verlag, Berlin, Heidelberg, ISBN-13: 978-3-540-28102-3, pp: 143-152. (Pubitemid 41435753)
-
(2005)
Lecture Notes in Computer Science
, vol.3619
, pp. 143-152
-
-
Han, J.1
Liu, Y.2
Lu, L.3
Hu, L.4
Patil, A.5
-
17
-
-
33746307119
-
A mutual anonymous peer-to-peer protocol design
-
April 04-08, IEEE Computer Society, Denver, Colorado, USA
-
Han, J., Y. Liu, L. Xiao, R. Xiao and L. M. Ni, 2005. A mutual anonymous peer-to-peer protocol design. Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium, April 04-08, IEEE Computer Society, Denver, Colorado, USA., pp: 68-77.
-
(2005)
Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium
, pp. 68-77
-
-
Han, J.1
Liu, Y.2
Xiao, L.3
Xiao, R.4
Ni, L.M.5
-
18
-
-
41049100407
-
Provide privacy for mobile P2P systems
-
June 6-10, IEEE Computer Society, Ohio, USA
-
Han, J., Z. Yanmin, L. Yunhao, C. Jianfeng and H.J. Lei, 2005. Provide privacy for mobile P2P systems. Proceedings of the 1 st International Workshop on Mobility in Peer-to-Peer Systems. June 6-10, IEEE Computer Society, Ohio, USA., pp: 829-834.
-
(2005)
Proceedings of the 1 st International Workshop on Mobility in Peer-to-Peer Systems
, pp. 829-834
-
-
Han, J.1
Yanmin, Z.2
Yunhao, L.3
Jianfeng, C.4
Lei, H.J.5
-
19
-
-
41649097852
-
-
Shanghai Jiaotong Daxue Xuebao/J. Shanghai Jiaotong Univ.
-
Hao, L.M., S.T. Yang, S.N. Lu and G.L. Chen, 2008. Trusted computing-based reputation scheme with anonymity in P2P systems. Shanghai Jiaotong Daxue Xuebao/J. Shanghai Jiaotong Univ., 42: 165-168.
-
(2008)
Trusted Computing-Based Reputation Scheme with Anonymity in P2P Systems
, vol.42
, pp. 165-168
-
-
Hao, L.M.1
Yang, S.T.2
Lu, S.N.3
Chen, G.L.4
-
20
-
-
67649217531
-
A novel and efficient unlinkable secret handshakes scheme
-
Huang, H. and Z. Cao, 2009. A novel and efficient unlinkable secret handshakes scheme. IEEE Commun. Lett., 13: 363-365.
-
(2009)
IEEE Commun. Lett.
, vol.13
, pp. 363-365
-
-
Huang, H.1
Cao, Z.2
-
21
-
-
46449115795
-
-
Institute of Electronic and Electronic Engineering Computer Society, Urumchi, Xinjiang, China
-
Ji, W., S. Yang,D. Wei and W. Lu, 2007. GARM: AGroup-Anonymity Reputation Model in Peer-to-Peer System. Institute of Electronic and Electronic Engineering Computer Society, Urumchi, Xinjiang, China, pp: 481-488.
-
(2007)
GARM: AGroup-Anonymity Reputation Model in Peer-to-Peer System
, pp. 481-488
-
-
Ji, W.1
Yang, S.2
Wei, D.3
Lu, W.4
-
22
-
-
33746880318
-
ZSBT: A novel algorithm for tracing DoS attackers in MANETs
-
Jin, X., Y. Zhang, Y. Pan and Y. Zhou, 2006. ZSBT: A novel algorithm for tracing DoS attackers in MANETs. Eurasip J. Wireless Commun. Network., 2006: 9-9
-
(2006)
Eurasip J. Wireless Commun. Network
, vol.2006
, pp. 9-9
-
-
Jin, X.1
Zhang, Y.2
Pan, Y.3
Zhou, Y.4
-
23
-
-
84880467894
-
The eigentrust algorithm for reputation management in p2p networks
-
Budapest, Hungary, May 20-24, ACM, New York, USA.,pp
-
Kamvar, S.D., M. T. Schlosser andH. Garcia-Molina, 2003. The eigentrust algorithm for reputation management in p2p networks. Proceedings of the 12th International Conference on World Wide Web, Budapest, Hungary, May 20-24, ACM, New York, USA.,pp: 640-651.
-
(2003)
Proceedings of the 12th International Conference on World Wide Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
24
-
-
58049189579
-
Heightening security of P2P networks by neighborhood key method
-
Nov. 1-3, Institute of Electrical and Electronics Engineering Computer Society, Wuhan, China
-
Lai-Cheng, C, 2008. Heightening security of P2P networks by neighborhood key method. Proceedings of the 1 st International Conference on Intelligent Networks and Intelligent Systems, Nov. 1-3, Institute of Electrical and Electronics Engineering Computer Society, Wuhan, China, pp: 201-204.
-
(2008)
Proceedings of the 1 st International Conference on Intelligent Networks and Intelligent Systems
, pp. 201-204
-
-
Lai-Cheng, C.1
-
25
-
-
0020780905
-
Weak byzantine generals problem
-
Lamport, L., 1983. Weak byzantine generals problem. J. ACM, 30: 668-676.
-
(1983)
J. ACM
, vol.30
, pp. 668-676
-
-
Lamport, L.1
-
26
-
-
0043016341
-
-
April 2003, Institute of Electrical and Electronics Engineers Inc., San Francisco, CA, USA
-
Lee, S., R. Sherwood and B. Bhattacharjee, 2003. Cooperative peer groups in NICE. Proceedings of IEEE INFOCOM, April, 2003, Institute of Electrical and Electronics Engineers Inc., San Francisco, CA, USA.,pp: 1272-1282.
-
(2003)
Cooperative peer groups in NICE. Proceedings of IEEE INFOCOM
, pp. 1272-1282
-
-
Lee, S.1
Sherwood, R.2
Bhattacharjee, B.3
-
27
-
-
70349731555
-
-
IEEE Computer Society, Fukuoka, Japan
-
Lee, Y.K., S.W. Han, S.J. Lee, B.H. Chung and D.G. Lee, 2009. Anonymous Authentication System using Group Signature. IEEE Computer Society, Fukuoka, Japan, pp: 1235-1239.
-
(2009)
Anonymous Authentication System using Group Signature
, pp. 1235-1239
-
-
Lee, Y.K.1
Han, S.W.2
Lee, S.J.3
Chung, B.H.4
Lee, D.G.5
-
29
-
-
54049090834
-
A steganography scheme in P2P network
-
Aug. 15-17, Harbin, China
-
Li, Z., X. Sun, B. Wang and X. Wang, 2008. A steganography scheme in P2P network. Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing, Aug. 15-17, Harbin, China, pp: 20-24.
-
(2008)
Proceedings of the 4th International Conference on Intelligent Information Hiding and Multimedia Signal Processing
, pp. 20-24
-
-
Li, Z.1
Sun, X.2
Wang, B.3
Wang, X.4
-
30
-
-
33745853424
-
-
Springer Verlag, Seoul, Korea
-
Liu, J.K., P.P. Tsang, D.S. Wong and R.W. Zhu, 2006. Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms. Springer Verlag, Seoul, Korea, pp: 389-409.
-
(2006)
Universal Custodian-Hiding Verifiable Encryption for Discrete Logarithms
, pp. 389-409
-
-
Liu, J.K.1
Tsang, P.P.2
Wong, D.S.3
Zhu, R.W.4
-
31
-
-
51649110861
-
Pseudo trust: Zero-knowledge authentication in anonymous P2Ps
-
Lu, L., J. Han, Y. Liu, L. Hu, J.P. Huai, L. Ni and J. Ma, 2008. Pseudo trust: Zero-knowledge authentication in anonymous P2Ps. IEEE Trans. Parallel Distributed Syst, 19: 1325-1337.
-
(2008)
IEEE Trans. Parallel Distributed Syst
, vol.19
, pp. 1325-1337
-
-
Lu, L.1
Han, J.2
Liu, Y.3
Hu, L.4
Huai, J.P.5
Ni, L.6
Ma, J.7
-
32
-
-
12344261863
-
WonGoo: A peer-to-peer protocol for anonymous communication
-
June 21-24, CSREA Press, Las Vegas, NV, United States
-
Lu, T., B. Fang, Y. Sun and X. Cheng, 2004. WonGoo: A peer-to-peer protocol for anonymous communication. Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications, June 21-24, CSREA Press, Las Vegas, NV, United States, pp: 1102-1106.
-
(2004)
Proceedings of the International Conference on Parallel and Distributed Processing Techniques and Applications
, pp. 1102-1106
-
-
Lu, T.1
Fang, B.2
Sun, Y.3
Cheng, X.4
-
33
-
-
46749118057
-
Securing peer-to-peer overlay networks from Sybil attack
-
Oct. 17-19, IEEE, Sydney, Australia
-
Lua, E.K., 2007. Securing peer-to-peer overlay networks from Sybil attack. Proceedings of International Symposium on Communication and Information Technology, Oct. 17-19, IEEE, Sydney, Australia, pp: 1213-1218.
-
(2007)
Proceedings of International Symposium on Communication and Information Technology
, pp. 1213-1218
-
-
Lua, E.K.1
-
34
-
-
84943517115
-
On the utility of distributed cryptography in P2P and MANETs: The case of membership control
-
Nov. 04-07, TEEE Computer Society Washington DC, USA.,pp
-
Narasimha, M., G. Tsudik and J.H. Yi, 2003. On the utility of distributed cryptography in P2P and MANETs: The case of membership control. Proceedings of 11th IEEE International Conference on Network Protocols, Nov. 04-07, TEEE Computer Society Washington, DC, USA.,pp: 336-345.
-
(2003)
Proceedings of 11th IEEE International Conference on Network Protocols
, pp. 336-345
-
-
Narasimha, M.1
Tsudik, G.2
Yi, J.H.3
-
35
-
-
26444607972
-
-
Springer Verlag, New York, United States
-
Nguyen, L. and R. Safavi-Naini, 2005. Dynamic K-Times Anonymous Authentication. Springer Verlag, New York, United States, pp: 318-333.
-
(2005)
Dynamic K-Times Anonymous Authentication
, pp. 318-333
-
-
Nguyen, L.1
Safavi-Naini, R.2
-
36
-
-
0035010963
-
-
Institute of Electrical and Electronics Engineers Inc., Anchorage, AK, United States
-
Park, K. and H. Lee, 2001. On the Effectiveness of Probabilistic Packet Marking for IP Traceback Under Denial of Service Attack. Institute of Electrical and Electronics Engineers Inc., Anchorage, AK, United States, pp: 338-347.
-
(2001)
On the Effectiveness of Probabilistic Packet Marking for IP Traceback Under Denial of Service Attack
, pp. 338-347
-
-
Park, K.1
Lee, H.2
-
37
-
-
0002054934
-
Crowds: Anonymity for Web transaction
-
Reiter, M.K. and A.D. Rubin, 1998. Crowds: Anonymity for Web transaction. ACM TISSEC, 1: 66-92.
-
(1998)
ACM TISSEC
, vol.1
, pp. 66-92
-
-
Reiter, M.K.1
Rubin, A.D.2
-
38
-
-
0038041177
-
Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection
-
Nov. 21, Association for Computing Machinery, Washington DC, USA.
-
Rennhard, M. and B. Plattner, 2002. Introducing MorphMix: Peer-to-peer based anonymous internet usage with collusion detection. Proceedings of the ACM Conference on Computer and Communications Security, Nov. 21, Association for Computing Machinery, Washington, DC, USA., pp: 91-102.
-
(2002)
Proceedings of the ACM Conference on Computer and Communications Security
, pp. 91-102
-
-
Rennhard, M.1
Plattner, B.2
-
39
-
-
84946833891
-
How to leak a secret
-
(ICTACISAC'Ol), Springer-Verlag
-
Ronald, L. R., S. Adi and T. Yael, 2001. How to leak a secret. Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology, (ICTACISAC'Ol), Springer-Verlag, pp: 552-565.
-
(2001)
Proceedings of the 7th International Conference on the Theory and Application of Cryptology and Information Security: Advances in Cryptology
, pp. 552-565
-
-
Ronald, L.R.1
Adi, S.2
Yael, T.3
-
40
-
-
0033650584
-
Practical network support for IP traceback
-
Savage, S., D. Wetherall, A. Karlin and T. Anderson, 2000. Practical network support for IP traceback. Comput. Commun. Rev., 30: 295-306.
-
(2000)
Comput. Commun. Rev.
, vol.30
, pp. 295-306
-
-
Savage, S.1
Wetherall, D.2
Karlin, A.3
Anderson, T.4
-
41
-
-
0035701330
-
Responder anonymity and anonymous peer-to-peer file sharing
-
Nov .11-14, Riverside, CA, United states, Institute of Electrical and Electronics Engineers Computer Society
-
Scarlata, V., B.N. Levine and C. Shields, 2001. Responder anonymity and anonymous peer-to-peer file sharing. Proceedings of the 9th International Conference on Network Protocols, Nov .11-14, Riverside, CA, United states, Institute of Electrical and Electronics Engineers Computer Society, pp: 272-280.
-
(2001)
Proceedings of the 9th International Conference on Network Protocols
, pp. 272-280
-
-
Scarlata, V.1
Levine, B.N.2
Shields, C.3
-
42
-
-
0036088867
-
P5: A protocol for scalable anonymous communication
-
(CSSRSP'02), Berkeley, CA, United States, Institute of Electrical and Electronics Engineers Inc.
-
Sherwood, R., B. Bhattacharjee and A. Srinivasan, 2002. P5: A protocol for scalable anonymous communication. Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy, (CSSRSP'02), Berkeley, CA, United States, Institute of Electrical and Electronics Engineers Inc., pp: 58-70.
-
(2002)
Proceedings of the IEEE Computer Society Symposium on Research in Security and Privacy
, pp. 58-70
-
-
Sherwood, R.1
Bhattacharjee, B.2
Srinivasan, A.3
-
43
-
-
50649097278
-
-
Institute of Electronic and Electronic Engineering Computer Society, Lyon, France
-
Shitrit, S., E. Felstame, N. Gilboa and O. Hermom, 2008. Anonymity Scheme for Interactive P2P Services. Institute of Electronic and Electronic Engineering Computer Society, Lyon, France, pp: 33-40.
-
(2008)
Anonymity Scheme for Interactive P2P Services
, pp. 33-40
-
-
Shitrit, S.1
Felstame, E.2
Gilboa, N.3
Hermom, O.4
-
44
-
-
0034775309
-
Hash-based IP traceback
-
Aug. 27-31, San Diego, California, USA
-
Snoeren, A.C., C. Partridge and L.A. Sanchez, 2001. Hash-based IP traceback. Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures and Protocols for Computer Communication, Aug. 27-31, San Diego, California, USA., pp: 3-14.
-
(2001)
Proceedings of the ACM SIGCOMM 2001 Conference on Applications, Technologies, Architectures and Protocols for Computer Communication
, pp. 3-14
-
-
Snoeren, A.C.1
Partridge, C.2
Sanchez, L.A.3
-
45
-
-
0034997397
-
Advanced and authenticated marking schemes for IP traceback
-
April 22-26, Anchorage, Alaska, USA.
-
Song, D.X.D. and A. Perrig, 2001. Advanced and authenticated marking schemes for IP traceback. Proceedings of the 20th Annual Joint Conference on IEEE Computer and Communications Societies, April 22-26, Anchorage, Alaska, USA., pp: 878-886.
-
(2001)
Proceedings of the 20th Annual Joint Conference on IEEE Computer and Communications Societies
, pp. 878-886
-
-
Song, D.X.D.1
Perrig, A.2
-
46
-
-
84957629646
-
Fair blind signatures
-
Saint-Malo, France, Springer-Verlag GmbH and Company KG
-
Stadler, M., J.M. Piveteau and J. Camenisch, 1995. Fair blind signatures. Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques, 1995, Saint-Malo, France, Springer-Verlag GmbH and Company KG, pp: 209-219.
-
(1995)
Proceedings of the International Conference on the Theory and Application of Cryptographic Techniques 1995
, pp. 209-219
-
-
Stadler, M.1
Piveteau, J.M.2
Camenisch, J.3
-
47
-
-
85084163540
-
Centertrack: An IP overlay network for tracking DoS floods
-
Aug. 14-17, Denver, Colorado, USA
-
Stone, R., 2000. Centertrack: An IP overlay network for tracking DoS floods. Proceedings of the 9th USENIX Security Symposium, Aug. 14-17, Denver, Colorado, USA.,pp: 107-118.
-
(2000)
Proceedings of the 9th USENIX Security Symposium
, pp. 107-118
-
-
Stone, R.1
-
48
-
-
70350393707
-
On the security of a novel and efficient unlinkable secret handshakes scheme
-
Su, R., 2009. On the security of a novel and efficient unlinkable secret handshakes scheme. IEEE Commun. Lett., 13: 712-713.
-
(2009)
IEEE Commun. Lett.
, vol.13
, pp. 712-713
-
-
Su, R.1
-
49
-
-
52149088094
-
-
Springer Verlag, Turin, Italy
-
Suriadi, S., E. Foo and J. Smith, 2008. A User-Centric Protocol for Conditional Anonymity Revocation. Springer Verlag, Turin, Italy, pp: 185-194.
-
(2008)
A User-Centric Protocol for Conditional Anonymity Revocation
, pp. 185-194
-
-
Suriadi, S.1
Foo, E.2
Smith, J.3
-
50
-
-
0032074579
-
Anonymous connections and onion routing
-
Syverson, P.F., 1998. Anonymous connections and onion routing. IEEE J. Selected Areas Commun., 16: 482-494.
-
(1998)
IEEE J. Selected Areas Commun.
, vol.16
, pp. 482-494
-
-
Syverson, P.F.1
-
51
-
-
59249107072
-
A new scalable distributed authentication for P2P network and its performance evaluation
-
Takeda, A., D. Chakraborty, G. Kitagata, K. Hashimoto and N. Shiratori, 2008. A new scalable distributed authentication for P2P network and its performance evaluation. WSEAS Trans. Comput, 7: 1628-1637.
-
(2008)
WSEAS Trans. Comput
, vol.7
, pp. 1628-1637
-
-
Takeda, A.1
Chakraborty, D.2
Kitagata, G.3
Hashimoto, K.4
Shiratori, N.5
-
52
-
-
33745871113
-
-
United States, Springer Verlag, New York
-
Teranishi, I. and K. Sako, 2006. K-Times Anonymous Authentication with a Constant Proving Cost. United States, Springer Verlag, New York, pp: 525-542.
-
(2006)
K-Times Anonymous Authentication with a Constant Proving Cost
, pp. 525-542
-
-
Teranishi, I.1
Sako, K.2
-
53
-
-
67650805900
-
Fair blind signature based authentication for super peer P2P network
-
Wang, X. and X. Sun, 2009. Fair blind signature based authentication for super peer P2P network. Inform. Technol. J., 8: 887-894.
-
(2009)
Inform. Technol. J.
, vol.8
, pp. 887-894
-
-
Wang, X.1
Sun, X.2
-
54
-
-
77954413905
-
CST: P2P anonymous authentication system based on collaboration signature
-
May 21-23, IEEE Computer Society, Busan, Korea
-
Wang, X., X. Sun, G. Sun andL. Dond, 2010. CST: P2P anonymous authentication system based on collaboration signature. Proceedings of the 5th International Conference on Future Information Technology, May 21-23, IEEE Computer Society, Busan, Korea, pp: 1-7.
-
Proceedings of the 5th International Conference on Future Information Technology
, vol.2010
, pp. 1-7
-
-
Wang, X.1
Sun, X.2
Sun, G.3
Dond, L.4
-
55
-
-
69749102447
-
-
Institute of Electrical and Electronics Engineers Computer Society, Wuhan, Hubei, China
-
Wei, Y. and Y. He, 2009. A Pseudonym Changing-Based Anonymity Protocol for P2P Reputation Systems. Institute of Electrical and Electronics Engineers Computer Society, Wuhan, Hubei, China, pp: 975-980.
-
(2009)
A Pseudonym Changing-Based Anonymity Protocol for P2P Reputation Systems
, pp. 975-980
-
-
Wei, Y.1
He, Y.2
-
56
-
-
33745142175
-
Authentication with controlled anonymity in P2P systems
-
Dalian, China 2005. Institute of Electrical and Electronics Engineers Computer Society, Washington DC, USA., ISBN:0-7695-2405-2
-
Wierzbicki, A., A. Zwierko and Z. Kotulski, 2005. Authentication with Controlled Anonymity in P2P Systems. In: Parallel and Distributed Computing, Applications and Technologies. Dalian, China, 2005. Institute of Electrical and Electronics Engineers Computer Society, Washington, DC, USA., ISBN:0-7695-2405-2, pp: 871-875.
-
(2005)
Parallel and Distributed Computing, Applications and Technologies
, pp. 871-875
-
-
Wierzbicki, A.1
Zwierko, A.2
Kotulski, Z.3
-
57
-
-
51249104544
-
-
Institute of Electronic and Electronic Engineering Computer Society, Busan, Korea
-
Wu, H., C. Shi, H. Chen and C. Gao, 2008. A Trust Management Model for P2P File Sharing Systems. Institute of Electronic and Electronic Engineering Computer Society, Busan, Korea, pp: 41-44.
-
(2008)
A Trust Management Model for P2P File Sharing Systems
, pp. 41-44
-
-
Wu, H.1
Shi, C.2
Chen, H.3
Gao, C.4
-
58
-
-
34848842164
-
-
Institute of Electrical and Electronics Engineers Inc., Toronto, ON, Canada
-
Ye, F., H. Yang and Z. Liu, 2007. Catching Moles in Sensor Networks. Institute of Electrical and Electronics Engineers Inc., Toronto, ON, Canada.
-
(2007)
Catching Moles in Sensor Networks
-
-
Ye, F.1
Yang, H.2
Liu, Z.3
-
59
-
-
45849094777
-
Efficient secret authenticatable anonymous signcryption scheme with identity privacy
-
June 17, Taipei, Taiwan, Springer-Verlag, Berlin
-
Zhang, M.W., B. Yang, S.L. Zhu and W.Z. Zhang, 2008. Efficient secret authenticatable anonymous signcryption scheme with identity privacy. Proceedings of the Pacific Asian Workshop on Intelligence and Security Informatics, June 17, Taipei, Taiwan, Springer-Verlag, Berlin, pp: 126-137.
-
(2008)
Proceedings of the Pacific Asian Workshop on Intelligence and Security Informatics
, pp. 126-137
-
-
Zhang, M.W.1
Yang, B.2
Zhu, S.L.3
Zhang, W.Z.4
-
60
-
-
34547373192
-
-
Association for Computing Machinery, Alexandria, VA, United States
-
Zhu, B., S. Setia and S. Jajodia, 2006. Providing Witness Anonymity in Peer-to-Peer Systems. Association for Computing Machinery, Alexandria, VA, United States, pp: 6-16
-
(2006)
Providing Witness Anonymity in Peer-to-Peer Systems
, pp. 6-16
-
-
Zhu, B.1
Setia, S.2
Jajodia, S.3
|