-
3
-
-
50349083227
-
PAR: Payment for anonymous routing
-
E. Androulaki, M. Raykova, S. Srivatsan, A. Stavrou, and S. M. Bellovin. PAR: Payment for anonymous routing. In PETS '08: Proceedings of the 8th International Symposium on Privacy Enhancing Technologies, pages 219-236, 2008.
-
(2008)
PETS '08: Proceedings of the 8th International Symposium on Privacy Enhancing Technologies
, pp. 219-236
-
-
Androulaki, E.1
Raykova, M.2
Srivatsan, S.3
Stavrou, A.4
Bellovin, S.M.5
-
4
-
-
78649998054
-
-
The anonymizer. http://anonymizer.com/.
-
-
-
-
12
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
E. Damiani, D. C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security, pages 207-216, 2002.
-
(2002)
CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 207-216
-
-
Damiani, E.1
Di Vimercati, D.C.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
16
-
-
0033365373
-
A case for relative differentiated services and the proportional differentiation model.
-
C. Dovrolis and P. Ramanathan. A case for relative differentiated services and the proportional differentiation model. IEEE network, 13(5):26-34, 1999.
-
(1999)
IEEE Network
, vol.13
, Issue.5
, pp. 26-34
-
-
Dovrolis, C.1
Ramanathan, P.2
-
18
-
-
0033204884
-
Proportional differentiated services: Delay differentiation and packet scheduling
-
C. Dovrolis, D. Stiliadis, and P. Ramanathan. Proportional differentiated services: delay differentiation and packet scheduling. In SIGCOMM '99: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication, pages 109-120, 1999.
-
(1999)
SIGCOMM '99: Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communication
, pp. 109-120
-
-
Dovrolis, C.1
Stiliadis, D.2
Ramanathan, P.3
-
19
-
-
0036476131
-
Proportional differentiated services: Delay differentiation and packet scheduling
-
C. Dovrolis, D. Stiliadis, and P. Ramanathan. Proportional differentiated services: delay differentiation and packet scheduling. IEEE/ACM Transactions on Networking, 10(1):12-26, 2002.
-
(2002)
IEEE/ACM Transactions on Networking
, vol.10
, Issue.1
, pp. 12-26
-
-
Dovrolis, C.1
Stiliadis, D.2
Ramanathan, P.3
-
23
-
-
78649989575
-
-
The GMP Library
-
The GMP Library. http://gmplib.org/.
-
-
-
-
24
-
-
0005063385
-
Onion routing
-
D. Goldschlag, M. Reed, and P. Syverson. Onion routing. Communications of the ACM, 42(2):39-41, 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
25
-
-
84949478858
-
Incentives for sharing in peer-to-peer networks
-
P. Golle, K. Leyton-Brown, I. Mironov, and M. Lillibridge. Incentives for sharing in peer-to-peer networks. In WELCOM'01: Proceedings of the Second International Workshop on Electronic Commerce, pages 75-87, 2001.
-
(2001)
WELCOM'01: Proceedings of the Second International Workshop on Electronic Commerce
, pp. 75-87
-
-
Golle, P.1
Leyton-Brown, K.2
Mironov, I.3
Lillibridge, M.4
-
26
-
-
0014413249
-
The tragedy of the commons
-
December
-
G. Hardin. The tragedy of the commons. Science, 162(3859):1243-1248, December 1968.
-
(1968)
Science
, vol.162
, Issue.3859
, pp. 1243-1248
-
-
Hardin, G.1
-
27
-
-
84947902272
-
Tracking the evolution of web trafic: 1995-2003
-
F. Hernandez-Campos, K. Jefiay, and F. Smith. Tracking the evolution of web trafic: 1995-2003. In MASCOTS 2003: The 11th IEEE/ACM Internatiofial Symposium on Modeling, Analysis, and Simulation of Computer Telecommunications Systems, pages 16-25, 2003.
-
(2003)
MASCOTS 2003: The 11th IEEE/ACM Internatiofial Symposium on Modeling, Analysis, and Simulation of Computer Telecommunications Systems
, pp. 16-25
-
-
Hernandez-Campos, F.1
Jefiay, K.2
Smith, F.3
-
29
-
-
84957613612
-
Ripping coins for a fair exchange
-
M. Jakobsson. Ripping coins for a fair exchange. In EUROCRYPT, pages 220-230, 1995.
-
(1995)
EUROCRYPT
, pp. 220-230
-
-
Jakobsson, M.1
-
32
-
-
50249133191
-
Shining light in dark places: Understanding the Tor network
-
D. Mccoy, K. Bauer, D. Grunwald, T. Kohno, and D. Sicker.Shining light in dark places: Understanding the Tor network. In PETS '08: Proceedings of the 8th International Symposium on Privacy Enhancing Technologies, pages 63-76, 2008.
-
(2008)
PETS '08: Proceedings of the 8th International Symposium on Privacy Enhancing Technologies
, pp. 63-76
-
-
McCoy, D.1
Bauer, K.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
34
-
-
74049096125
-
Scalable onion routing with Torsk
-
J. McLachlan, A. Tran, N. Hopper, and Y. Kim. Scalable onion routing with Torsk. In CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security, pages 590-599, 2009.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 590-599
-
-
McLachlan, J.1
Tran, A.2
Hopper, N.3
Kim, Y.4
-
36
-
-
33646759921
-
Scrivener: Providing incentives in cooperative content distribution systems
-
A. Nandi, T.-W. J. Ngan, A. Singh, P. Druschel, and D. S. Wallach. Scrivener: providing incentives in cooperative content distribution systems. In Middleware'05: Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware, pages 270-291, 2005.
-
(2005)
Middleware'05: Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
, pp. 270-291
-
-
Nandi, A.1
Ngan, T.-W.J.2
Singh, A.3
Druschel, P.4
Wallach, D.S.5
-
39
-
-
34848855786
-
Combating double-spending using cooperative P2P systems
-
I. Osipkov, E. Y. Vasserman, N. Hopper, and Y. Kim. Combating double-spending using cooperative P2P systems. In ICDCS '07: Proceedings of the 27th International Conference on Distributed Computing Systems, page 41, 2007.
-
(2007)
ICDCS '07: Proceedings of the 27th International Conference on Distributed Computing Systems
, pp. 41
-
-
Osipkov, I.1
Vasserman, E.Y.2
Hopper, N.3
Kim, Y.4
-
44
-
-
84957802536
-
Towards an information theoretic metric for anonymity
-
A. Serjantov and G. Danezis. Towards an information theoretic metric for anonymity. In Privacy Enhancing Technologies, pages 41-53, 2002.
-
(2002)
Privacy Enhancing Technologies
, pp. 41-53
-
-
Serjantov, A.1
Danezis, G.2
-
47
-
-
78049358411
-
An improved algorithm for Tor circuit scheduling
-
University of Waterloo
-
C. Tang and I. Goldberg. An improved algorithm for Tor circuit scheduling. Technical Report CACR 2010-06, University of Waterloo, 2010.
-
(2010)
Technical Report CACR 2010-06
-
-
Tang, C.1
Goldberg, I.2
-
48
-
-
78650004294
-
-
Tor Project October
-
Tor partially blocked in China. Tor Project. https://blog.torproject.org/ blog/tor-partially-blocked-china. October 2009.
-
(2009)
-
-
-
49
-
-
78650000376
-
-
Tor Directory Protocol, Version 3. Tor Project.
-
Tor Directory Protocol, Version 3. Tor Project. http://gitweb.torproject. org/tor.git?a=blob-plain;hb=HEAD;f=doc/spec/dir-spec.txt
-
-
-
-
50
-
-
78650009349
-
-
Relay Flags. Tor Project November
-
Relay Flags. Tor Project. http://git.torproject.org/checkout/metrics/ master/out/dirarch/relayflags.csv. November 2009.
-
(2009)
-
-
-
51
-
-
78650013638
-
-
Tor Project November
-
Computing Bandwidth Adjustments. Tor Project. http://gitweb.torproject. org/tor.git?a=blob-plain;hb=HEAD;f=doc/spec/proposals/161-computing-bandwidth- adjustments.txt. November 2009.
-
(2009)
Computing Bandwidth Adjustments
-
-
-
52
-
-
78650005192
-
-
Tor Path Specification. Tor Project January
-
Tor Path Specification. Tor Project. org/tor.git?a=blob-plain;hb=HEAD;f= doc/spec/path-spec.txt. January 2010.
-
(2010)
-
-
-
53
-
-
78650014809
-
-
The Tor Project
-
The Tor Project. https://www.torproject.org/.
-
-
-
-
55
-
-
74049098547
-
Membership-concealing overlay networks
-
E. Vasserman, R. Jansen, J. Tyra, N. Hopper, and Y. Kim. Membership-concealing overlay networks. In CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security, pages 390-399, 2009.
-
(2009)
CCS'09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 390-399
-
-
Vasserman, E.1
Jansen, R.2
Tyra, J.3
Hopper, N.4
Kim, Y.5
-
57
-
-
3142738238
-
PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities
-
L. Xiong and L. Liu. PeerTrust: Supporting reputation-based trust for peer-to-peer electronic communities. IEEE Transactions on Knowledge and Data Engineering, 16:843-857, 2004.
-
(2004)
IEEE Transactions on Knowledge and Data Engineering
, vol.16
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
58
-
-
34047150751
-
PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing
-
R. Zhou and K. Hwang. PowerTrust: A robust and scalable reputation system for trusted peer-to-peer computing. IEEE Transactions on Parallel and Distributed Systems, 18(4):460-473, 2007.
-
(2007)
IEEE Transactions on Parallel and Distributed Systems
, vol.18
, Issue.4
, pp. 460-473
-
-
Zhou, R.1
Hwang, K.2
|