You are here

Bibliography

Export 124 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is D  [Clear All Filters]
2003
Dabek F, Zhao BY, Druschel P, Kubiatowicz J, Stoica I. Towards a Common API for Structured Peer-to-Peer Overlays. In: IPTPS'03. Proccedings of the Second International Workshop on Peer-to-Peer Systems. Vol. 2735. IPTPS'03. Proccedings of the Second International Workshop on Peer-to-Peer Systems. Berkeley, CA, USA: Springer; 2003. pp. 33-44.
2004
Dabek F, Li J, Sit E, Robertson J, Kaashoek FM, Morris R. Designing a DHT for Low Latency and High Throughput. In: NSDI'04 - Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation . NSDI'04 - Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation . San Francisco, CA, USA: USENIX Association; 2004. pp. 7–7. Available from: http://dl.acm.org/citation.cfm?id=1251175.1251182
Dabek F, Cox R, Kaashoek FM, Morris R. Vivaldi: a decentralized network coordinate system. SIGCOMM Computer Communication Review [Internet]. 2004 ;34(4):15–26. Available from: http://doi.acm.org/10.1145/1030194.1015471
2001
Dabek F, Kaashoek FM, Karger D, Morris R, Stoica I. Wide-area cooperative storage with CFS. In: SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles. SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles. New York, NY, USA: ACM; 2001. pp. 202–215. Available from: http://portal.acm.org/citation.cfm?id=502054#
2001
Damg\aard I, Jurik M. A Generalisation, a Simplification and Some Applications of Paillier's Probabilistic Public-Key System. In: Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography. Proceedings of the 4th International Workshop on Practice and Theory in Public Key Cryptography: Public Key Cryptography. London, UK, UK: Springer-Verlag; 2001. Available from: http://dl.acm.org/citation.cfm?id=648118.746742
2002
Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P, Violante F. A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: In Proceedings of the 9th ACM Conference on Computer and Communications Security. In Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press; 2002. pp. 207–216. Available from: http://seclab.dti.unimi.it/Papers/ccs02.ps
Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P, Violante F. A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: In Proceedings of the 9th ACM Conference on Computer and Communications Security. In Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press; 2002. pp. 207–216. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.7.1784&rep=rep1&type=pdf
2006
Goldberg I. On the Security of the Tor Authentication Protocol. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 316–331. Available from: http://www.springerlink.com/content/n77w19002743xu51/
Danezis G, Wittneben B. The Economics of Mass Surveillance and the Questionable Value of Anonymous Communications. In: Anderson R Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006). Proceedings of the Fifth Workshop on the Economics of Information Security (WEIS 2006). Cambridge, UK; 2006. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.9384
Danezis G. Breaking Four Mix-related Schemes Based on Universal Re-encryption. In: Proceedings of Information Security Conference 2006. Proceedings of Information Security Conference 2006. Springer-Verlag; 2006. Available from: http://www.springerlink.com/content/x038u85171776236/
2002
Danezis G. Forward Secure Mixes. In: Fisher-Hubner J Proceedings of 7th Nordic Workshop on Secure IT Systems. Proceedings of 7th Nordic Workshop on Secure IT Systems. Karlstad, Sweden; 2002. pp. 195–207. Available from: http://citeseer.ist.psu.edu/533725.html
2009
Danezis G, Goldberg I. Sphinx: A Compact and Provably Secure Mix Format. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. IEEE Computer Society; 2009. pp. 269–282. Available from: http://portal.acm.org/citation.cfm?id=1607723.1608138
2004
Danezis G. The Traffic Analysis of Continuous-Time Mixes. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Vol. 3424. Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Springer Berlin / Heidelberg; 2004. pp. 35–50. Available from: http://www.springerlink.com/content/kgenxdaxkyey4ed2/
2006
Pashalidis A, Meyer B. Linking Anonymous Transactions: The Consistent View Attack. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 384–392. Available from: http://www.springerlink.com/content/y6l6412387663581/
2009
Danezis G, Diaz C, Käsper E, Troncoso C. The Wisdom of Crowds: Attacks and Optimal Constructions. In: Backes M, Ning P Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 21-23. Vol. 5789. Proceedings of the 14th European Symposium on Research in Computer Security (ESORICS 2009), Saint-Malo, France, September 21-23. Springer; 2009. pp. 406–423. Available from: http://www.springerlink.com/content/t6q86u137t4762k8/
2003
Danezis G. Statistical Disclosure Attacks: Traffic Confirmation in Open Environments. In: Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003). Proceedings of Security and Privacy in the Age of Uncertainty, (SEC2003). Athens: IFIP TC11; 2003. pp. 421–426. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.4512
2006
Øverlier L, Syverson P. Valet Services: Improving Hidden Servers with a Personal Touch. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 223–244. Available from: http://www.springerlink.com/content/d58607007777r8l1/
2003
Danezis G, Dingledine R, Mathewson N. Mixminion: Design of a Type III Anonymous Remailer Protocol. In: In Proceedings of the 2003 IEEE Symposium on Security and Privacy. In Proceedings of the 2003 IEEE Symposium on Security and Privacy. ; 2003. pp. 2–15. Available from: http://mixminion.net/minion-design.pdf
2006
Clayton R, Murdoch SJ, Watson RNM. Ignoring the Great Firewall of China. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 20–35. Available from: http://www.springerlink.com/content/7224582654260k03/

Pages