You are here

Bibliography

Export 66 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is I  [Clear All Filters]
2007
Kendall G, Yao X, Ching SY. The Iterated Prisoner's Dilemma: 20 Years On. Singapore: World Scientific Publishing Co. Pte. Ltd.; 2007 p. 262.
2005
Cramer C, Fuhrmann T. ISPRP: A Message-Efficient Protocol for Initializing Structured P2P Networks. In: Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference (IPCCC). Proceedings of the 24th IEEE International Performance, Computing, and Communications Conference (IPCCC). Phoenix, AZ; 2005. pp. 365–370. Available from: http://i30www.ira.uka.de/research/publications/p2p/
1991
Pfitzmann A, Pfitzmann B, Waidner M. ISDN-mixes: Untraceable communication with very small bandwidth overhead. In: Proceedings of the GI/ITG Conference on Communication in Distributed Systems. Proceedings of the GI/ITG Conference on Communication in Distributed Systems. Springer-Verlag London, UK; 1991. pp. 451–463. Available from: http://portal.acm.org/citation.cfm?id=645662.664536
2001
Feeney LM, Nilsson M. Investigating the energy consumption of a wireless network interface in an ad hoc networking environment. In: INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE . INFOCOM 2001. Twentieth Annual Joint Conference of the IEEE Computer and Communications Societies. Proceedings. IEEE . Anchorage, AK , USA; 2001. Available from: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=916651
1991
Deswarte Y, Blain L, Fabre J-C. Intrusion Tolerance in Distributed Computing Systems. In: In Proceedings of the IEEE Symposium on Research in Security and Privacy. In Proceedings of the IEEE Symposium on Research in Security and Privacy. ; 1991. pp. 110–121. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.9968
2002
Freedman MJ, Sit E, Cates J, Morris R. Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer. Revised Papers from the First International Workshop on Peer-to-Peer Systems [Internet]. 2002 ; Vol. 2429:121 - 129 . Available from: http://www.cs.rice.edu/Conferences/IPTPS02/182.pdf
Rennhard M, Plattner B. Introducing MorphMix: Peer-to-Peer based Anonymous Internet Usage with Collusion Detection. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2002). Washington, DC, USA: ACM New York, NY, USA; 2002. Available from: http://portal.acm.org/citation.cfm?id=644537
Wang X, Reeves DS, Wu FS. Inter-Packet Delay Based Correlation for Tracing Encrypted Connections through Stepping Stones. In: Proceedings of ESORICS 2002. Proceedings of ESORICS 2002. Springer Berlin / Heidelberg; 2002. pp. 244–263. Available from: http://portal.acm.org/citation.cfm?id=699363
Cao X-R, Shen H-X, Milito R, Wirth P. Internet pricing with a game theoretical approach: concepts and examples. IEEE/ACM Trans. Netw. [Internet]. 2002 ;10(2):208–216. Available from: http://dl.acm.org/citation.cfm?id=508325.508330
2014
Grothoff C, Polot B, von Loesch C. The Internet is Broken: Idealistic Ideas for Building a GNU Network. In: W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). London, UK: W3C/IAB; 2014.
2004
Tolia N, Harkes J, Kozuch M, Satyanarayanan M. Integrating Portable and Distributed Storage. In: FAST '04: Proceedings of the 3rd USENIX Conference on File and Storage Technologies. FAST '04: Proceedings of the 3rd USENIX Conference on File and Storage Technologies. Berkeley, CA, USA: USENIX Association; 2004. pp. 227–238. Available from: http://portal.acm.org/citation.cfm?id=1096703#
2001
Estrin D, Pottie GJ, Girod L, Srivastava M. Instrumenting The World With Wireless Sensor Networks. In: In International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2001. In International Conference on Acoustics, Speech, and Signal Processing (ICASSP 2001. ; 2001. pp. 2033–2036. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.3027
2008
Chen G, Qiu T, Wu F. Insight into redundancy schemes in DHTs. Journal of Supercomputing [Internet]. 2008 ;43(2):183–198. Available from: http://dl.acm.org/citation.cfm?id=1331483.1331515
2002
Feamster N, Balazinska M, Harfst G, Balakrishnan H, Karger D. Infranet: Circumventing Web Censorship and Surveillance. In: Proceedings of the 11th USENIX Security Symposium. Proceedings of the 11th USENIX Security Symposium. USENIX Association Berkeley, CA, USA; 2002. Available from: http://portal.acm.org/citation.cfm?id=720281
Feamster N, Balazinska M, Harfst G, Balakrishnan H, Karger D. Infranet: Circumventing Web Censorship and Surveillance. In: In Proceedings of the 11th USENIX Security Symposium. In Proceedings of the 11th USENIX Security Symposium. Association; 2002. pp. 247–262. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.18.5049&rep=rep1&type=pdf
2007
Katti S, Cohen J, Katabi D. Information Slicing: Anonymity Using Unreliable Overlays. In: Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI). Proceedings of the 4th USENIX Symposium on Network Systems Design and Implementation (NSDI). ; 2007. Available from: http://dspace.mit.edu/handle/1721.1/36344a
2008
Mittal P, Borisov N. Information Leaks in Structured Peer-to-peer Anonymous Communication Systems. In: Syverson P, Jha S, Zhang X Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Alexandria, Virginia, USA: ACM Press; 2008. pp. 267–278. Available from: http://portal.acm.org/citation.cfm?id=1455805

Pages