You are here

Bibliography

Export 99 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Last Name is S  [Clear All Filters]
2008
Schiele G, Süselbeck R, Wacker A, Triebel T, Becker C. Consistency Management for Peer-to-Peer-based Massively Multiuser Virtual Environments. In: Proc. 1st Int.Workshop on Massively Multiuser Virtual Environments (MMVE’08). Proc. 1st Int.Workshop on Massively Multiuser Virtual Environments (MMVE’08). ; 2008. Available from: http://www.spovnet.de/files/publications/MMVEConsistency.pdf/view
2009
Schimmer L. Peer Profiling and Selection in the I2P Anonymous Network. In: PET-CON 2009.1. PET-CON 2009.1. TU Dresden, Germany ; 2009.
2004
Schollmeier R. Signaling and Networking in Unstructured Peer-to-Peer Networks. Faculty of Electrical Engineering and Information Technology. 2004 :177.
2005
Serjantov A, Murdoch SJ. Message Splitting Against the Partial Adversary. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Springer Berlin / Heidelberg; 2005. pp. 26–39. Available from: http://www.springerlink.com/content/375x2pv385388h86/
2003
Serjantov A, Lewis S. Puzzles in P2P Systems. In: 8th CaberNet Radicals Workshop. 8th CaberNet Radicals Workshop. Ajaccio, Corsica: Network of Excellence in Distributed and Dependable Computing Systems; 2003.
Serjantov A, Newman RE. On the Anonymity of Timed Pool Mixes. In: Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems. Proceedings of the Workshop on Privacy and Anonymity Issues in Networked and Distributed Systems. Athens, Greece: Kluwer; 2003. pp. 427–434. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.5699
2002
Serjantov A, Dingledine R, Syverson P. From a Trickle to a Flood: Active Attacks on Several Mix Types. In: Petitcolas F Proceedings of Information Hiding Workshop (IH 2002). Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578; 2002. Available from: http://www.springerlink.com/content/um0kf3dp88b0eg5v/
Serjantov A, Danezis G. Towards an Information Theoretic Metric for Anonymity. Lecture Notes in Computer Science [Internet]. 2002 ;Volume 2482/2003:41–53. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.12.5992&rep=rep1&type=url&i=0
2003
Serjantov A, Sewell P. Passive Attack Analysis for Connection-Based Anonymity Systems. In: Proceedings of ESORICS 2003. Proceedings of ESORICS 2003. Springer Berlin / Heidelberg; 2003. Available from: http://www.springerlink.com/content/8jva7vy8tkert9ur/
2002
Serjantov A. Anonymizing censorship resistant systems. In: Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002). Proceedings of the 1st International Peer To Peer Systems Workshop (IPTPS 2002). Springer-Verlag London, UK; 2002. Available from: http://portal.acm.org/citation.cfm?id=687808
2008
Shafaat TM, Ghodsi A, Haridi S. A Practical Approach to Network Size Estimation for Structured Overlays. In: IWSOS'08 - Proceedings of the 3rd International Workshop on Self-Organizing Systems. Vol. 5343. IWSOS'08 - Proceedings of the 3rd International Workshop on Self-Organizing Systems. Vienna, Austria: Springer-Verlag; 2008. pp. 71–83. Available from: http://dx.doi.org/10.1007/978-3-540-92157-8_7
2006
Shaneck M, Kim Y, Kumar V. Privacy Preserving Nearest Neighbor Search. In: Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on. Data Mining Workshops, 2006. ICDM Workshops 2006. Sixth IEEE International Conference on. ; 2006.
2002
Shapiro JS, Vanderburgh J. CPCMS: A Configuration Management System Based on Cryptographic Names. In: Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference. Proceedings of the FREENIX Track: 2002 USENIX Annual Technical Conference. Berkeley, CA, USA: USENIX Association; 2002. pp. 207–220. Available from: http://portal.acm.org/citation.cfm?id=715916#
2002
Shapiro JS, Adams J. Design Evolution of the EROS Single-Level Store. In: ATEC '02: Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference. ATEC '02: Proceedings of the General Track of the annual conference on USENIX Annual Technical Conference. Berkeley, CA, USA: USENIX Association; 2002. pp. 59–72. Available from: http://portal.acm.org/citation.cfm?id=713855#
2007
Shen X, Tan B, Zhai CX. Privacy protection in personalized search. SIGIR Forum. 2007 ;41:4–17.
Sherr M, Thau B, Blaze M. Towards application-aware anonymous routing. In: In Second USENIX Workshop on Hot Topics in Security (HotSec. In Second USENIX Workshop on Hot Topics in Security (HotSec. USENIX Association Berkeley, CA, USA; 2007. Available from: http://portal.acm.org/citation.cfm?id=1361423
2000
Shields C, Levine BN. A Protocol for Anonymous Communication Over the Internet. In: In ACM Conference on Computer and Communications Security. In ACM Conference on Computer and Communications Security. ACM Press; 2000. pp. 33–42. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.37.3890&rep=rep1&type=url&i=0
2008
Shimshock E, Staats M, Hopper NJ. Breaking and Provably Fixing Minx. In: Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 99–114. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428266
2006
Shmatikov V, Wang M-H. Timing Analysis in Low-Latency Mix Networks: Attacks and Defenses. In: Proceedings of ESORICS 2006. Proceedings of ESORICS 2006. Springer Berlin / Heidelberg; 2006. Available from: http://www.springerlink.com/content/3n136578m4211484/

Pages