You are here

Bibliography

Export 66 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is I  [Clear All Filters]
2003
Marti S, Garcia-Molina H. Identity Crisis: Anonymity vs. Reputation in P2P Systems. In: P2P'03. Proceecings of the 3rd International Conference on Peer-to-Peer Computing. P2P'03. Proceecings of the 3rd International Conference on Peer-to-Peer Computing. Linköping, Sweden: IEEE Computer Society; 2003. p. 134.
2007
Delerablée C. Identity-based broadcast encryption with constant size ciphertexts and private keys. In: ASIACRYPT 2007 - Proceedings of the Advances in Cryptology 13th International Conference on Theory and Application of Cryptology and Information Security. ASIACRYPT 2007 - Proceedings of the Advances in Cryptology 13th International Conference on Theory and Application of Cryptology and Information Security. Kuching, Malaysia: Springer-Verlag; 2007. pp. 200–215. Available from: http://dl.acm.org/citation.cfm?id=1781454.1781471
2008
Boldyreva A, Goyal V, Kumar V. Identity-based encryption with efficient revocation. In: CCS'08 - Proceedings of the 15th ACM Conference on Computer and Communications Security. CCS'08 - Proceedings of the 15th ACM Conference on Computer and Communications Security. Alexandria, VA, USA: ACM; 2008. pp. 417–426. Available from: http://doi.acm.org/10.1145/1455770.1455823
2006
Morcos F, Chantem T, Little P, Gasiba T, Thain D. iDIBS: An Improved Distributed Backup System. In: ICPADS '06: Proceedings of the 12th International Conference on Parallel and Distributed Systems. ICPADS '06: Proceedings of the 12th International Conference on Parallel and Distributed Systems. Washington, DC, USA: IEEE Computer Society; 2006. pp. 58–67. Available from: http://portal.acm.org/citation.cfm?id=1156431.1157518#
Clayton R, Murdoch SJ, Watson RNM. Ignoring the Great Firewall of China. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 20–35. Available from: http://www.springerlink.com/content/7224582654260k03/
Kutzner K, Fuhrmann T. The IGOR File System for Efficient Data Distribution in the GRID. In: Proceedings of the Cracow Grid Workshop CGW 2006. Proceedings of the Cracow Grid Workshop CGW 2006. Cracow, Poland; 2006. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.1091
2008
Amann B, Elser B, Houri Y, Fuhrmann T. IgorFs: A Distributed P2P File System. In: Peer-to-Peer Computing. Peer-to-Peer Computing. ; 2008. pp. 77-78. Available from: http://www.pubzone.org/dblp/conf/p2p/AmannEHF08
2003
Gummadi KP, Gummadi R, Gribble SD, Ratnasamy S, Shenker S, Stoica I. The impact of DHT routing geometry on resilience and proximity. In: SIGCOMM '03 - Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. SIGCOMM '03 - Proceedings of the 2003 Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Karlsruhe, Germany: ACM; 2003. pp. 381–394. Available from: http://doi.acm.org/10.1145/863955.863998
2008
Diaz C, Troncoso C, Serjantov A. On the Impact of Social Network Profiling on Anonymity. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 44–62. Available from: http://portal.acm.org/citation.cfm?id=1428263
2005
Neumann C, Francillon A, Furodet D. Impacts of packet scheduling and packet loss distribution on FEC Performances: observations and recommendations. In: CoNEXT'05: Proceedings of the 2005 ACM conference on Emerging network experiment and technology. CoNEXT'05: Proceedings of the 2005 ACM conference on Emerging network experiment and technology. New York, NY, USA: ACM Press; 2005. pp. 166–176. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.8807
2008
Zander S, Murdoch SJ. An Improved Clock-skew Measurement Technique for Revealing Hidden Services. In: Proceedings of the 17th USENIX Security Symposium. Proceedings of the 17th USENIX Security Symposium. San Jose, CA, US: USENIX Association Berkeley, CA, USA; 2008. Available from: http://portal.acm.org/citation.cfm?id=1496726
2004
Fairbrother P. An Improved Construction for Universal Re-encryption. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Vol. 3424. Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Springer Berlin / Heidelberg; 2004. pp. 79–87. Available from: http://www.springerlink.com/content/q07439n27u1egx0w/
2002
Ranganathan K, Iamnitchi A, Foster I. Improving Data Availability through Dynamic Model-Driven Replication in Large Peer-to-Peer Communities. In: CCGRID '02: Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid. CCGRID '02: Proceedings of the 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid. Washington, DC, USA: IEEE Computer Society; 2002. p. 376. Available from: http://portal.acm.org/citation.cfm?id=873217#
2007
Øverlier L, Syverson P. Improving Efficiency and Simplicity of Tor circuit establishment and hidden services. In: Borisov N, Golle P Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Proceedings of the Seventh Workshop on Privacy Enhancing Technologies (PET 2007). Ottawa, Canada: Springer; 2007. Available from: http://www.springerlink.com/content/j68v312681l8v874/
2003
Clayton R. Improving Onion Notation. In: Dingledine R Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Proceedings of Privacy Enhancing Technologies workshop (PET 2003). Springer-Verlag, LNCS 2760; 2003. pp. 81–87. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.5965
2006
Pai V, Mohr AE. Improving Robustness of Peer-to-Peer Streaming with Incentives. In: NetEcon'06. 1st Workshop on the Economics of Networked Systems. NetEcon'06. 1st Workshop on the Economics of Networked Systems. Ann Arbor, Michigan, USA: ACM; 2006.

Pages