-
1
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for internet applications
-
I. Stoica, R. Morris, D. Liben-Nowell, D. R. Karger, M. F. Kaashoek, F. Dabek, and H. Balakrishnan, "Chord: A scalable peer-to-peer lookup protocol for internet applications," IEEE/ACM Trans. Netw., vol. 11, no. 1, pp. 17-32, 2003.
-
(2003)
IEEE/ACM Trans. Netw.
, vol.11
, Issue.1
, pp. 17-32
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
2
-
-
2442421260
-
Kademlia: A peer-to-peer information system based on the xor metric
-
P. Maymounkov and D. Mazieres, "Kademlia: A peer-to-peer information system based on the xor metric," IPTPS, 2001.
-
(2001)
IPTPS
-
-
Maymounkov, P.1
Mazieres, D.2
-
4
-
-
0002901250
-
Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility
-
A. Rowstron and P. Druschel, "Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility," in Proc. SOSP'01, 2001.
-
(2001)
Proc. SOSP'01
-
-
Rowstron, A.1
Druschel, P.2
-
5
-
-
77951462266
-
Ap3: Cooperative, decentrialized anonymous communication
-
A. Mislove, G. Oberoi, A. Post, C. Reis, P. Druschel, and D. S. Wallach, "Ap3: Cooperative, decentrialized anonymous communication," ACM SIGOPS European Workshop, 2004.
-
(2004)
ACM SIGOPS European Workshop
-
-
Mislove, A.1
Oberoi, G.2
Post, A.3
Reis, C.4
Druschel, P.5
Wallach, D.S.6
-
6
-
-
34547281136
-
Salsa: A structured approach to large-scale anonymity
-
A. Nambiar and M. Wright, "Salsa: A structured approach to large-scale anonymity," ACM CCS, 2006.
-
(2006)
ACM CCS
-
-
Nambiar, A.1
Wright, M.2
-
7
-
-
74049122426
-
Nisan: Network information service for anonymization networks
-
November
-
A. Panchenko, S. Richter, and A. Rache, "Nisan: Network information service for anonymization networks," ACM CCS, November 2009.
-
(2009)
ACM CCS
-
-
Panchenko, A.1
Richter, S.2
Rache, A.3
-
8
-
-
74049096125
-
Scalable onion routing with torsk
-
November
-
J. McLachlan, A. Tran, N. Hopper, and Y. Kim, "Scalable onion routing with torsk," ACM CCS, November 2009.
-
(2009)
ACM CCS
-
-
McLachlan, J.1
Tran, A.2
Hopper, N.3
Kim, Y.4
-
9
-
-
74049096681
-
Shadowwalker: Peer-to-peer anonymous communication using redundant structured topologies
-
November
-
P. Mittal and N. Borisov, "Shadowwalker: Peer-to-peer anonymous communication using redundant structured topologies," ACM CCS, November 2009.
-
(2009)
ACM CCS
-
-
Mittal, P.1
Borisov, N.2
-
10
-
-
84995370788
-
Privacy, cost, and availability tradeoffs in decentralized osns
-
A. Shakimov, A. Varshavsky, L. P. Cox, and R. Cáceres, "Privacy, cost, and availability tradeoffs in decentralized osns," ser. WOSN '09, 2009, pp. 13-18.
-
(2009)
Ser. WOSN '09
, pp. 13-18
-
-
Shakimov, A.1
Varshavsky, A.2
Cox, L.P.3
Cáceres, R.4
-
12
-
-
33845373081
-
A survey of peer-to-peer security issues
-
D. Wallach, "A survey of peer-to-peer security issues," in Software Security Theories and Systems, ser. LNCS, 2003, vol. 2609, pp. 253-258.
-
(2003)
Software Security Theories and Systems, Ser. LNCS
, vol.2609
, pp. 253-258
-
-
Wallach, D.1
-
13
-
-
70349273917
-
Information leaks in structured peer-to-peer anonymous communication systems
-
P. Mittal and N. Borisov, "Information leaks in structured peer-to-peer anonymous communication systems," ACM CCS, 2008.
-
(2008)
ACM CCS
-
-
Mittal, P.1
Borisov, N.2
-
14
-
-
78649990817
-
In search of an anonymous and secure lookup: Attacks on structured peer-to-peer anonymous communication systems
-
Q. Wang, P. Mittal, and N. Borisov, "In search of an anonymous and secure lookup: Attacks on structured peer-to-peer anonymous communication systems," ACM CCS, 2010.
-
(2010)
ACM CCS
-
-
Wang, Q.1
Mittal, P.2
Borisov, N.3
-
15
-
-
2442603590
-
Secure routing for structured peer-to-peer overlay networks
-
December
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, "Secure routing for structured peer-to-peer overlay networks," in OSDI, December 2002.
-
(2002)
OSDI
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
16
-
-
85180784621
-
Halo: High-assurance locate for distributed hash tables
-
February
-
A. Kapadia and N. Triandopoulos, "Halo: High-assurance locate for distributed hash tables," in NDSS, February 2008.
-
(2008)
NDSS
-
-
Kapadia, A.1
Triandopoulos, N.2
-
17
-
-
77955963220
-
Practical robust communication in dhts tolerating a byzantine adversary
-
M. Young, A. Kate, I. Goldberg, and M. Karsten, "Practical robust communication in dhts tolerating a byzantine adversary," Proc. ICDCS'10, pp. 263-272, 2010.
-
(2010)
Proc. ICDCS'10
, pp. 263-272
-
-
Young, M.1
Kate, A.2
Goldberg, I.3
Karsten, M.4
-
18
-
-
84866953243
-
Adding query privacy to robust dhts
-
July
-
M. Backes, I. Goldberg, A. Kate, and T. Toft, "Adding query privacy to robust dhts," Tech. rep., arXiv:1107.1072v1 [cs.CR], July 2011.
-
(2011)
Tech. Rep., ArXiv:1107.1072v1 [cs.CR]
-
-
Backes, M.1
Goldberg, I.2
Kate, A.3
Toft, T.4
-
19
-
-
84947273682
-
The sybil attack
-
J. Douceur, "The sybil attack," in Peer-to-Peer Systems, 2002, vol. 2429, pp. 251-260.
-
(2002)
Peer-to-peer Systems
, vol.2429
, pp. 251-260
-
-
Douceur, J.1
-
20
-
-
85027289714
-
Computational puzzles as sybil defenses
-
N. Borisov, "Computational puzzles as sybil defenses," in Peer-to-Peer Computing, 2006.
-
(2006)
Peer-to-peer Computing
-
-
Borisov, N.1
-
21
-
-
85180633166
-
Sybilinfer: Detecting sybil nodes using social networks
-
G. Danezis and P. Mittal, "Sybilinfer: Detecting sybil nodes using social networks," in NDSS, 2009.
-
(2009)
NDSS
-
-
Danezis, G.1
Mittal, P.2
-
22
-
-
45749116664
-
Sybillimit: A near-optimal social network defense against sybil attacks
-
H. Yu, P. B. Gibbons, M. Kaminsky, and F. Xiao, "Sybillimit: A near-optimal social network defense against sybil attacks," in IEEE Symposium on Security and Privacy (Oakland), 2008.
-
(2008)
IEEE Symposium on Security and Privacy (Oakland)
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
-
23
-
-
78649989557
-
-
Aug. v0.34
-
A. Pfitzmann and M. Hansen, "A terminology for talking about privacy by data minimization: Anonymity, unlinkability, undetectability, unobservability, pseudonymity, and identity management," Aug. 2010, v0.34.
-
(2010)
A Terminology for Talking About Privacy by Data Minimization: Anonymity, Unlinkability, Undetectability, Unobservability, Pseudonymity, and Identity Management
-
-
Pfitzmann, A.1
Hansen, M.2
-
25
-
-
77955973071
-
Myrmic: Secure and robust dht routing
-
P. Wang, I. Osipkov, N. Hopper, and Y. Kim, "Myrmic: Secure and robust dht routing," Tech. rep., Digital Technology Center, University of Minnesota at Twin Cities, 2007.
-
(2007)
Tech. Rep., Digital Technology Center, University of Minnesota at Twin Cities
-
-
Wang, P.1
Osipkov, I.2
Hopper, N.3
Kim, Y.4
-
26
-
-
26844513223
-
Certificate revocation system implementation based on the merkle hash tree
-
J. L. Muoz, J. Forne, O. Esparza, and M. Soriano, "Certificate revocation system implementation based on the merkle hash tree," Inte. Journ. of Inf. Sec., vol. 2, no. 2, 2003.
-
(2003)
Inte. Journ. of Inf. Sec.
, vol.2
, Issue.2
-
-
Muoz, J.L.1
Forne, J.2
Esparza, O.3
Soriano, M.4
-
27
-
-
50249179543
-
Certificate revocation system based on peer-to-peer crl distribution
-
M. C. Morogan and S. Muftic, "Certificate revocation system based on peer-to-peer crl distribution," in Proc. of the DMS'03 Conference, 2003.
-
(2003)
Proc. of the DMS'03 Conference
-
-
Morogan, M.C.1
Muftic, S.2
-
28
-
-
84866953240
-
Efficient certificate revocation: A p2p approach
-
C. Y. Liau, S. Bressan, K.-L. Tan, C. Yee, L. Stphane, and B. K. lee Tan, "Efficient certificate revocation: A p2p approach," in HICSS'05, 2005.
-
(2005)
HICSS'05
-
-
Liau, C.Y.1
Bressan, S.2
Tan, K.-L.3
Yee, C.4
Stphane, L.5
Lee Tan, B.K.6
-
29
-
-
0038311861
-
Towards an analysis of onion routing security
-
LNCS, Springer July
-
P. Syverson, G. Tsudik, M. Reed, and C. Landwehr, "Towards an analysis of onion routing security," International Workshop on Design Issues in Anonymity and Unobservaility, vol. 2009, LNCS, Springer, July 2000.
-
(2000)
International Workshop on Design Issues in Anonymity and Unobservaility
, vol.2009
-
-
Syverson, P.1
Tsudik, G.2
Reed, M.3
Landwehr, C.4
-
30
-
-
84866938061
-
Octopus: A secure and anonymous dht lookup
-
Q. Wang and N. Borisov, "Octopus: A secure and anonymous dht lookup," technical report, arXiv cs.CR, 2012. http://arxiv. org/abs/1203.2668.
-
(2012)
Technical Report, ArXiv Cs.CR
-
-
Wang, Q.1
Borisov, N.2
-
31
-
-
84875702502
-
Designing a dht for low latency and high throughput
-
F. Dabek, J. Li, E. Sit, J. Robertson, M. F. Kaashoek, and R. Morris, "Designing a dht for low latency and high throughput," NSDI'04, 2004.
-
(2004)
NSDI'04
-
-
Dabek, F.1
Li, J.2
Sit, E.3
Robertson, J.4
Kaashoek, M.F.5
Morris, R.6
-
32
-
-
33845351408
-
Cyclone: A novel design schema for hierarchical dhts
-
M. S. Artigas, P. G. Lopez, J. P. Ahullo, and A. F. G. Skarmeta, "Cyclone: A novel design schema for hierarchical dhts," In P2P 05, pp. 49-56, 2005.
-
(2005)
P2P 05
, pp. 49-56
-
-
Artigas, M.S.1
Lopez, P.G.2
Ahullo, J.P.3
Skarmeta, A.F.G.4
-
33
-
-
84866953244
-
Balancing the shadows
-
M. Schuchard, A. Dean, V. Heorhiadi, N. Hopper, and Y. Kim, "Balancing the shadows," ACM WPES, 2010.
-
(2010)
ACM WPES
-
-
Schuchard, M.1
Dean, A.2
Heorhiadi, V.3
Hopper, N.4
Kim, Y.5
-
34
-
-
0036184272
-
Protecting free expression online with {Freenet}
-
I. Clarke, T. W. Hong, S. G. Miller, O. Sandberg, and B. Wiley, "Protecting Free Expression Online with {Freenet}," IEEE Internet Computing, vol. 6, no. 1, pp. 40-49, 2002.
-
(2002)
IEEE Internet Computing
, vol.6
, Issue.1
, pp. 40-49
-
-
Clarke, I.1
Hong, T.W.2
Miller, S.G.3
Sandberg, O.4
Wiley, B.5
-
35
-
-
74049098547
-
Membership-concealing overlay networks
-
E. Y. Vasserman, R. Jansen, J. Tyra, N. Hopper, and Y. Kim, "Membership-concealing overlay networks," in ACM CCS, 2009.
-
(2009)
ACM CCS
-
-
Vasserman, E.Y.1
Jansen, R.2
Tyra, J.3
Hopper, N.4
Kim, Y.5
-
36
-
-
84866938064
-
-
WASTE. http://waste.sourceforge.net/.
-
-
-
|