-
1
-
-
50249119735
-
Denial of service or denial of security?
-
New York, NY, USA, ACM
-
Nikita Borisov, George Danezis, Prateek Mittal, and Parisa Tabriz. Denial of service or denial of security? In CCS '07: Proceedings of the 14th ACM conference on Computer and communications security, pages 92-102, New York, NY, USA, 2007. ACM.
-
(2007)
CCS '07: Proceedings of the 14th ACM Conference on Computer and Communications Security
, pp. 92-102
-
-
Borisov, N.1
Danezis, G.2
Mittal, P.3
Tabriz, P.4
-
2
-
-
0019532104
-
Untraceable electronic mail, return addresses, and digital pseudonyms
-
David L. Chaum. Untraceable electronic mail, return addresses, and digital pseudonyms. Commun. ACM, 24(2):84-90, 1981.
-
(1981)
Commun. ACM
, vol.24
, Issue.2
, pp. 84-90
-
-
Chaum, D.L.1
-
4
-
-
85084161366
-
Tor: The second-generation onion router
-
Berkeley, CA, USA, USENIX Association
-
Roger Dingledine, Nick Mathewson, and Paul Syverson. Tor: the second-generation onion router. In SSYM'04: Proceedings of the 13th conference on USENIX Security Symposium, pages 21-21, Berkeley, CA, USA, 2004. USENIX Association.
-
(2004)
SSYM'04: Proceedings of the 13th Conference on USENIX Security Symposium
, pp. 21-21
-
-
Dingledine, R.1
Mathewson, N.2
Syverson, P.3
-
5
-
-
0038349207
-
Tarzan: A peer-to-peer anonymizing network layer
-
New York, NY, USA, ACM
-
Michael J. Freedman and Robert Morris. Tarzan: a peer-to-peer anonymizing network layer. In CCS '02: Proceedings of the 9th ACM conference on Computer and communications security, pages 193-206, New York, NY, USA, 2002. ACM.
-
(2002)
CCS '02: Proceedings of the 9th ACM Conference on Computer and Communications Security
, pp. 193-206
-
-
Freedman, M.J.1
Morris, R.2
-
6
-
-
1242310042
-
The impact of DHT routing geometry on resilience and proximity
-
New York, NY, USA, ACM
-
K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica. The impact of DHT routing geometry on resilience and proximity. In SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications, pages 381-394, New York, NY, USA, 2003. ACM.
-
(2003)
SIGCOMM '03: Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 381-394
-
-
Gummadi, K.1
Gummadi, R.2
Gribble, S.3
Ratnasamy, S.4
Shenker, S.5
Stoica, I.6
-
7
-
-
35248866616
-
Koorde: A simple degree-optimal distributed hash table
-
M. Kaashoek and D. Karger. Koorde: A simple degree-optimal distributed hash table. Peer-to-Peer Systems II, pages 98-107, 2003.
-
(2003)
Peer-to-Peer Systems II
, pp. 98-107
-
-
Kaashoek, M.1
Karger, D.2
-
9
-
-
74049096125
-
Scalable onion routing with torsk
-
New York, NY, USA, ACM
-
Jon McLachlan, Andrew Tran, Nicholas Hopper, and Yongdae Kim. Scalable onion routing with torsk. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 590-599, New York, NY, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 590-599
-
-
McLachlan, J.1
Tran, A.2
Hopper, N.3
Kim, Y.4
-
10
-
-
77951462266
-
AP3: Cooperative, decentralized anonymous communication
-
New York, NY, USA, ACM
-
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles Reis, Peter Druschel, and Dan S. Wallach. AP3: cooperative, decentralized anonymous communication. In EW 11: Proceedings of the 11th workshop on ACM SIGOPS European workshop, page 30, New York, NY, USA, 2004. ACM.
-
(2004)
EW 11: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop
, pp. 30
-
-
Mislove, A.1
Oberoi, G.2
Post, A.3
Reis, C.4
Druschel, P.5
Wallach, D.S.6
-
11
-
-
70349273917
-
Information leaks in structured peer-to-peer anonymous communication systems
-
New York, NY, USA, ACM
-
Prateek Mittal and Nikita Borisov. Information leaks in structured peer-to-peer anonymous communication systems. In CCS '08: Proceedings of the 15th ACM conference on Computer and communications security, pages 267-278, New York, NY, USA, 2008. ACM.
-
(2008)
CCS '08: Proceedings of the 15th ACM Conference on Computer and Communications Security
, pp. 267-278
-
-
Mittal, P.1
Borisov, N.2
-
12
-
-
74049096681
-
ShadowWalker: Peer-to-peer anonymous communication using redundant structured topologies
-
New York, NY, USA, ACM
-
Prateek Mittal and Nikita Borisov. ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies. In CCS '09: Proceedings of the 16th ACM conference on Computer and communications security, pages 161-172, New York, NY, USA, 2009. ACM.
-
(2009)
CCS '09: Proceedings of the 16th ACM Conference on Computer and Communications Security
, pp. 161-172
-
-
Mittal, P.1
Borisov, N.2
-
13
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
New York, NY, USA, ACM
-
Arjun Nambiar and Matthew Wright. Salsa: a structured approach to large-scale anonymity. In CCS '06: Proceedings of the 13th ACM conference on Computer and communications security, pages 17-26, New York, NY, USA, 2006. ACM.
-
(2006)
CCS '06: Proceedings of the 13th ACM Conference on Computer and Communications Security
, pp. 17-26
-
-
Nambiar, A.1
Wright, M.2
-
14
-
-
67249094910
-
Protecting anonymity in dynamic peer-to-peer networks
-
K.P.N. Puttaswamy, A. Sala, C. Wilson, and B.Y. Zhao. Protecting anonymity in dynamic peer-to-peer networks. In IEEE International Conference on Network Protocols (ICNP)(Oct. 2008), pages 104-113, 2008.
-
(2008)
IEEE International Conference on Network Protocols (ICNP)(Oct. 2008)
, pp. 104-113
-
-
Puttaswamy, K.P.N.1
Sala, A.2
Wilson, C.3
Zhao, B.Y.4
-
16
-
-
0038041177
-
Introducing morphmix: Peer-to-peer based anonymous internet usage with collusion detection
-
New York, NY, USA, ACM.
-
Marc Rennhard and Bernhard Plattner. Introducing morphmix: peer-to-peer based anonymous internet usage with collusion detection. In WPES '02: Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society, pages 91-102, New York, NY, USA, 2002. ACM.
-
(2002)
WPES '02: Proceedings of the 2002 ACM Workshop on Privacy in the Electronic Society
, pp. 91-102
-
-
Rennhard, M.1
Plattner, B.2
-
17
-
-
57349142855
-
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
-
London, UK, Springer-Verlag.
-
Antony I. T. Rowstron and Peter Druschel. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Middleware '01: Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg, pages 329-350, London, UK, 2001. Springer-Verlag.
-
(2001)
Middleware '01: Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
, pp. 329-350
-
-
Antony, I.1
Rowstron, T.2
Druschel, P.3
-
18
-
-
77951438838
-
Defending against eclipse attacks on overlay networks
-
New York, NY, USA, ACM
-
Atul Singh, Miguel Castro, Peter Druschel, and Antony Rowstron. Defending against eclipse attacks on overlay networks. In EW 11: Proceedings of the 11th workshop on ACM SIGOPS European workshop, page 21, New York, NY, USA, 2004. ACM.
-
(2004)
EW 11: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop
, pp. 21
-
-
Singh, A.1
Castro, M.2
Druschel, P.3
Rowstron, A.4
-
19
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
New York, NY, USA, ACM.
-
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications, pages 149-160, New York, NY, USA, 2001. ACM.
-
(2001)
SIGCOMM '01: Proceedings of the 2001 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
20
-
-
74049164513
-
Hashing it out in public: Common failure modes of DHT-based anonymity schemes
-
New York, NY, USA, ACM
-
Andrew Tran, Nicholas Hopper, and Yongdae Kim. Hashing it out in public: common failure modes of DHT-based anonymity schemes. In WPES '09: Proceedings of the 8th ACM workshop on Privacy in the electronic society, pages 71-80, New York, NY, USA, 2009. ACM.
-
(2009)
WPES '09: Proceedings of the 8th ACM Workshop on Privacy in the Electronic Society
, pp. 71-80
-
-
Tran, A.1
Hopper, N.2
Kim, Y.3
-
21
-
-
10044298435
-
TAP: A Novel Tunneling Approach for Anonymity in Structured P2P Systems
-
Washington, DC, USA, IEEE Computer Society
-
Yingwu Zhu and Yiming Hu. TAP: A Novel Tunneling Approach for Anonymity in Structured P2P Systems. In ICPP '04: Proceedings of the 2004 International Conference on Parallel Processing, pages 21-28, Washington, DC, USA, 2004. IEEE Computer Society.
-
(2004)
ICPP '04: Proceedings of the 2004 International Conference on Parallel Processing
, pp. 21-28
-
-
Zhu, Y.1
Hu, Y.2
-
22
-
-
84873857575
-
Cashmere: Resilient anonymous routing
-
Berkeley, CA, USA, USENIX Association
-
Li Zhuang, Feng Zhou, Ben Y. Zhao, and Antony Rowstron. Cashmere: resilient anonymous routing. In NSDI'05: Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation, pages 301-314, Berkeley, CA, USA, 2005. USENIX Association.
-
(2005)
NSDI'05: Proceedings of the 2nd Conference on Symposium on Networked Systems Design & Implementation
, pp. 301-314
-
-
Zhuang, L.1
Zhou, F.2
Zhao, B.Y.3
Rowstron, A.4
|