You are here

Bibliography

Export 124 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is D  [Clear All Filters]
2001
Dabek F, Kaashoek FM, Karger D, Morris R, Stoica I. Wide-area cooperative storage with CFS. In: SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles. SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles. New York, NY, USA: ACM; 2001. pp. 202–215. Available from: http://portal.acm.org/citation.cfm?id=502054#
2003
Dabek F, Zhao BY, Druschel P, Kubiatowicz J, Stoica I. Towards a Common API for Structured Peer-to-Peer Overlays. In: IPTPS'03. Proccedings of the Second International Workshop on Peer-to-Peer Systems. Vol. 2735. IPTPS'03. Proccedings of the Second International Workshop on Peer-to-Peer Systems. Berkeley, CA, USA: Springer; 2003. pp. 33-44.
2004
Dabek F, Li J, Sit E, Robertson J, Kaashoek FM, Morris R. Designing a DHT for Low Latency and High Throughput. In: NSDI'04 - Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation . NSDI'04 - Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation . San Francisco, CA, USA: USENIX Association; 2004. pp. 7–7. Available from: http://dl.acm.org/citation.cfm?id=1251175.1251182
Dabek F, Cox R, Kaashoek FM, Morris R. Vivaldi: a decentralized network coordinate system. SIGCOMM Computer Communication Review [Internet]. 2004 ;34(4):15–26. Available from: http://doi.acm.org/10.1145/1030194.1015471
2001
Damg\aard I, Jurik M. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography. Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography. London, UK, UK: Springer-Verlag; 2001. Available from: http://dl.acm.org/citation.cfm?id=648118.746742
2002
Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P, Violante F. A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: In Proceedings of the 9th ACM Conference on Computer and Communications Security. In Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press; 2002. pp. 207–216. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.7.1784&rep=rep1&type=pdf
Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P, Violante F. A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: In Proceedings of the 9th ACM Conference on Computer and Communications Security. In Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press; 2002. pp. 207–216. Available from: http://seclab.dti.unimi.it/Papers/ccs02.ps
2008
Danezis G, Syverson P. Bridging and Fingerprinting: Epistemic Attacks on Route Selection. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 133–150. Available from: http://www.springerlink.com/content/q2r7g81286026576/
2004
Danezis G, Anderson R. The Economics of Censorship Resistance. In: In The Third Annual Workshop on Economics and Information Security (WEIS04. In The Third Annual Workshop on Economics and Information Security (WEIS04. ; 2004. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.4.7003&rep=rep1&type=pdf
Danezis G. Better Anonymous Communications. [Internet]. 2004 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.3200
2006
Heydt-Benjamin TS, Chae H-J, Defend B, Fu K. Privacy for Public Transportation. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 1–19. Available from: http://www.springerlink.com/content/c75053mr42n82wv5/
2007
Danezis G, Diaz C. Space-Efficient Private Search. In: Proceedings of Financial Cryptography (FC2007). Proceedings of Financial Cryptography (FC2007). Tobago: Springer-Verlag; 2007. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.7014
2003
Danezis G, Sassaman L. Heartbeat Traffic to Counter (n-1) Attacks. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003). Washington, DC, USA: ACM New York, NY, USA; 2003. Available from: http://portal.acm.org/citation.cfm?id=1005154
2004
Danezis G, Laurie B. Minx: A simple and efficient anonymous packet format. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Washington, DC, USA: ACM New York, NY, USA; 2004. Available from: http://portal.acm.org/citation.cfm?id=1029179.1029198
2006
Goldberg I. On the Security of the Tor Authentication Protocol. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 316–331. Available from: http://www.springerlink.com/content/n77w19002743xu51/
Danezis G, Wittneben B. The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications. In: Anderson R Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006). Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006). Cambridge, UK; 2006. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.9384
2002
Danezis G. Forward Secure Mixes. In: Fisher-Hubner J Proceedings of 7th Nordic Workshop on Secure IT Systems. Proceedings of 7th Nordic Workshop on Secure IT Systems. Karlstad, Sweden; 2002. pp. 195–207. Available from: http://citeseer.ist.psu.edu/533725.html
2006
Danezis G. Breaking Four Mix-related Schemes Based on Universal Re-encryption. In: Proceedings of Information Security Conference 2006. Proceedings of Information Security Conference 2006. Springer-Verlag; 2006. Available from: http://www.springerlink.com/content/x038u85171776236/
2009
Danezis G, Goldberg I. Sphinx: A Compact and Provably Secure Mix Format. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. IEEE Computer Society; 2009. pp. 269–282. Available from: http://portal.acm.org/citation.cfm?id=1607723.1608138

Pages