You are here

Bibliography

Export 123 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is D  [Clear All Filters]
2004
Dabek F, Cox R, Kaashoek FM, Morris R. Vivaldi: a decentralized network coordinate system. SIGCOMM Computer Communication Review [Internet]. 2004 ;34(4):15–26. Available from: http://doi.acm.org/10.1145/1030194.1015471
2001
Dabek F, Kaashoek FM, Karger D, Morris R, Stoica I. Wide-area cooperative storage with CFS. In: SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles. SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles. New York, NY, USA: ACM; 2001. pp. 202–215. Available from: http://portal.acm.org/citation.cfm?id=502054#
2003
Dabek F, Zhao BY, Druschel P, Kubiatowicz J, Stoica I. Towards a Common API for Structured Peer-to-Peer Overlays. In: IPTPS'03. Proccedings of the Second International Workshop on Peer-to-Peer Systems. Vol. 2735. IPTPS'03. Proccedings of the Second International Workshop on Peer-to-Peer Systems. Berkeley, CA, USA: Springer; 2003. pp. 33-44.
2004
Dabek F, Li J, Sit E, Robertson J, Kaashoek FM, Morris R. Designing a DHT for Low Latency and High Throughput. In: NSDI'04 - Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation . NSDI'04 - Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation . San Francisco, CA, USA: USENIX Association; 2004. pp. 7–7. Available from: http://dl.acm.org/citation.cfm?id=1251175.1251182
2001
Damg\aard I, Jurik M. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography. Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography. London, UK, UK: Springer-Verlag; 2001. Available from: http://dl.acm.org/citation.cfm?id=648118.746742
2002
Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P, Violante F. A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: In Proceedings of the 9th ACM Conference on Computer and Communications Security. In Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press; 2002. pp. 207–216. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.7.1784&rep=rep1&type=pdf
Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P, Violante F. A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: In Proceedings of the 9th ACM Conference on Computer and Communications Security. In Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press; 2002. pp. 207–216. Available from: http://seclab.dti.unimi.it/Papers/ccs02.ps
2006
Ciaccio G. Improving Sender Anonymity in a Structured Overlay with Imprecise Routing. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 190–207. Available from: http://www.springerlink.com/content/v473127846n07255/
2010
Danezis G, Diaz C, Troncoso C, Laurie B. Drac: An Architecture for Anonymous Low-Volume Communications. In: Atallah MJ, Hopper NJ Privacy Enhancing Technologies. Vol. 6205. Privacy Enhancing Technologies. Springer Berlin Heidelberg; 2010. pp. 202-219. Available from: http://dx.doi.org/10.1007/978-3-642-14527-8_12
2007
Danezis G, Diaz C, Troncoso C. Two-Sided Statistical Disclosure Attack. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.7347
2004
Danezis G, Serjantov A. Statistical Disclosure or Intersection Attacks on Anonymity Systems. In: Proceedings of 6th Information Hiding Workshop (IH 2004). Proceedings of 6th Information Hiding Workshop (IH 2004). Toronto: Springer Berlin / Heidelberg; 2004. Available from: http://www.springerlink.com/content/tqljb3hybk4rubla/
2005
Danezis G, Clulow J. Compulsion Resistant Anonymous Communications. In: Proceedings of Information Hiding Workshop (IH 2005). Proceedings of Information Hiding Workshop (IH 2005). Springer Berlin / Heidelberg; 2005. pp. 11–25. Available from: http://www.springerlink.com/content/74461772r675l828/
2006
Tabriz P, Borisov N. Breaking the Collusion Detection Mechanism of MorphMix. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 368–384. Available from: http://www.springerlink.com/content/p2612108665331n7/
2008
Danezis G, Syverson P. Bridging and Fingerprinting: Epistemic Attacks on Route Selection. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 133–150. Available from: http://www.springerlink.com/content/q2r7g81286026576/
2004
Danezis G, Anderson R. The Economics of Censorship Resistance. In: In The Third Annual Workshop on Economics and Information Security (WEIS04. In The Third Annual Workshop on Economics and Information Security (WEIS04. ; 2004. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.4.7003&rep=rep1&type=pdf
Danezis G. Better Anonymous Communications. [Internet]. 2004 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.3200
2006
Heydt-Benjamin TS, Chae H-J, Defend B, Fu K. Privacy for Public Transportation. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 1–19. Available from: http://www.springerlink.com/content/c75053mr42n82wv5/
2007
Danezis G, Diaz C. Space-Efficient Private Search. In: Proceedings of Financial Cryptography (FC2007). Proceedings of Financial Cryptography (FC2007). Tobago: Springer-Verlag; 2007. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.7014
2003
Danezis G, Sassaman L. Heartbeat Traffic to Counter (n-1) Attacks. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003). Washington, DC, USA: ACM New York, NY, USA; 2003. Available from: http://portal.acm.org/citation.cfm?id=1005154
2004
Danezis G, Laurie B. Minx: A simple and efficient anonymous packet format. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Washington, DC, USA: ACM New York, NY, USA; 2004. Available from: http://portal.acm.org/citation.cfm?id=1029179.1029198
2006
Goldberg I. On the Security of the Tor Authentication Protocol. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 316–331. Available from: http://www.springerlink.com/content/n77w19002743xu51/

Pages