-
1
-
-
79959681025
-
Low-resource routing attacks against tor
-
K. Bauer, D. McCoy, D. Grunwald, T. Kohno, and D. Sicker. Low-Resource Routing Attacks Against Tor. In Proc. ACM WPES, pages 11-20, 2007.
-
(2007)
Proc. ACM WPES
, pp. 11-20
-
-
Bauer, K.1
McCoy, D.2
Grunwald, D.3
Kohno, T.4
Sicker, D.5
-
3
-
-
0036425135
-
Availability and locality measurements of peer-to-peer file systems
-
DOI 10.1117/12.475282
-
J. Chu, K. Labonte, and B. N. Levine. Availability and Locality Measurements of Peer-to-Peer File Systems. In Proc. ITCom: Scalability and Traffic Control in IP Networks II Conference, volume SPIE 4868, pages 310-321, July 2002. (Pubitemid 35314238)
-
(2002)
Proceedings of SPIE - The International Society for Optical Engineering
, vol.4868
, pp. 310-321
-
-
Chu, J.1
Labonte, K.2
Levine, B.N.3
-
8
-
-
78149324869
-
Privacy-preserving P2P data sharing with OneSwarm
-
August
-
T. Isdal, M. Piatek, A. Krishnamurthy, and T. Anderson. Privacy-preserving P2P data sharing with OneSwarm. In Proc. ACM SIGCOMM, pages 111-122, August 2010.
-
(2010)
Proc. ACM SIGCOMM
, pp. 111-122
-
-
Isdal, T.1
Piatek, M.2
Krishnamurthy, A.3
Anderson, T.4
-
9
-
-
77958113753
-
Privacy-preserving P2P data sharing with OneSwarm
-
Univ. of Washington
-
T. Isdal, M. Piatek, A. Krishnamurthy, and T. Anderson. Privacy-preserving P2P data sharing with OneSwarm. Technical report, Dept. CS and Eng., Univ. of Washington, 2010. http://oneswarm.cs.washington.edu/f2f-tr. pdf.
-
(2010)
Technical Report, Dept. CS and Eng.
-
-
Isdal, T.1
Piatek, M.2
Krishnamurthy, A.3
Anderson, T.4
-
11
-
-
84868546151
-
Forensic investigation of peer-to-peer file sharing networks
-
August
-
M. Liberatore, R. Erdely, T. Kerle, B. N. Levine, and C. Shields. Forensic Investigation of Peer-to-Peer File Sharing Networks. In Proc. DFRWS Annual Digital Forensics Research Conference, August 2010.
-
(2010)
Proc. DFRWS Annual Digital Forensics Research Conference
-
-
Liberatore, M.1
Erdely, R.2
Kerle, T.3
Levine, B.N.4
Shields, C.5
-
13
-
-
85006277702
-
Experiences building PlanetLab
-
L. Peterson, A. Bavier, M. E. Fiuczynski, and S. Muir. Experiences building PlanetLab. In Proc. USENIX OSDI, pages 351-366, 2006.
-
(2006)
Proc. USENIX OSDI
, pp. 351-366
-
-
Peterson, L.1
Bavier, A.2
Fiuczynski, M.E.3
Muir, S.4
-
15
-
-
0036187056
-
Mapping the Gnutella network
-
DOI 10.1109/4236.978369
-
M. Ripeanu, I. Foster, and A. Iamnitchi. Mapping the Gnutella Network. IEEE Internet Computing Journal, 6(1):50-57, 2002. (Pubitemid 34198227)
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.1
, pp. 50-57
-
-
Ripeanu, M.1
Iamnitchi, A.2
Foster, I.3
-
16
-
-
80755188462
-
-
J. Rorher. MUTE. http://mute-net.sourceforge.net.
-
-
-
Rorher, J.1
-
17
-
-
80755134977
-
-
and http://www.planetpeer .de/wiki/index.php /RShare\-documentation\-\% 28English\%29
-
RShare. http://www.stealthnet.de/en\-index.php and http://www.planetpeer. de/wiki/index.php/RShare\-documentation\-\%28English\%29.
-
RShare
-
-
-
18
-
-
0002098559
-
TCP congestion control with a misbehaving receiver
-
S. Savage, N. Cardwell, D. Wetherall, and T. Anderson. TCP congestion control with a misbehaving receiver. In Proc. ACM SIGCOMM, pages 71-78, October 1999. (Pubitemid 129500497)
-
(1999)
Computer Communication Review
, vol.29
, Issue.5
, pp. 71-78
-
-
Savage, S.1
Cardwell, N.2
Wetherall, D.3
Anderson, T.4
-
20
-
-
0038311861
-
Towards an analysis of onion routing security
-
July
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr. Towards an Analysis of Onion Routing Security. In Intl. Wkshp. on Designing Privacy Enhancing Technologies, pages 96-114, July 2000.
-
(2000)
Intl. Wkshp. on Designing Privacy Enhancing Technologies
, pp. 96-114
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
22
-
-
80755144178
-
File-sharing programs
-
U.S. General Accounting Office GAO-03-537T. Statement Before Congress; Linda D. Koontz, Information Management Issues, March
-
U.S. General Accounting Office. File-Sharing Programs. Child Pornography Is Readily Accessible over Peer-to-Peer Networks. GAO-03-537T. Statement Before Congress; Linda D. Koontz, Information Management Issues, March 2003.
-
(2003)
Child Pornography Is Readily Accessible Over Peer-to-peer Networks
-
-
-
23
-
-
80755145237
-
Federal rules of evidence
-
U.S. Government
-
U.S. Government. Federal Rules of Evidence. Rule 401. http://www.law.cornell.edu/rules/fre/rules.htm.
-
Rule
, vol.401
-
-
-
25
-
-
85180531810
-
Defeating vanish with low-cost sybil attacks against large DHTs
-
February
-
S. Wolchok, O. Hofmann, N. Heninger, E. Felten, J. Halderman, C. Rossbach, B. Waters, and E. Witchel. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs. In Proc. ISOC Symposium Network and Distributed System Security (NDSS), February 2010.
-
(2010)
Proc. ISOC Symposium Network and Distributed System Security (NDSS)
-
-
Wolchok, S.1
Hofmann, O.2
Heninger, N.3
Felten, E.4
Halderman, J.5
Rossbach, C.6
Waters, B.7
Witchel, E.8
-
26
-
-
85180737609
-
An analysis of the degradation of anonymous protocols
-
February
-
M. Wright, M. Adler, B. N. Levine, and C. Shields. An Analysis of the Degradation of Anonymous Protocols. In Proc. ISOC Symposium Network and Distributed System Security (NDSS), pages 38-50, February 2002.
-
(2002)
Proc. ISOC Symposium Network and Distributed System Security (NDSS)
, pp. 38-50
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
-
27
-
-
0038148416
-
Defending anonymous communication against passive logging attacks
-
May
-
M. Wright, M. Adler, B. N. Levine, and C. Shields. Defending Anonymous Communication Against Passive Logging Attacks. In Proc. IEEE Symposium on Security & Privacy, pages 28-41, May 2003.
-
(2003)
Proc. IEEE Symposium on Security & Privacy
, pp. 28-41
-
-
Wright, M.1
Adler, M.2
Levine, B.N.3
Shields, C.4
|