You are here

Bibliography

Export 33 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is L  [Clear All Filters]
2012
Hsiao H-C, Kim TH-J, Perrig A, Yamada A, Nelson S, Gruteser M, Ming W. LAP: Lightweight Anonymity and Privacy. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. Proceedings of the 2012 IEEE Symposium on Security and Privacy. San Francisco, CA, USA: IEEE Computer Society; 2012.
2008
Hibler M, Ricci R, Stoller L, Duerig J, Guruprasad S, Stack T, Webb K, Lepreau J. Large-scale Virtualization in the Emulab Network Testbed. In: USENIX Annual Technical Conference. USENIX Annual Technical Conference. ; 2008. pp. 113-128.
2012
Akhoondi M, Yu C, Madhyastha HV. LASTor: A Low-Latency AS-Aware Tor Client. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. Proceedings of the 2012 IEEE Symposium on Security and Privacy. San Francisco, CA, USA: IEEE Computer Society; 2012.
2000
Ohkubo M, Abe M. A Length-Invariant Hybrid MIX. In: Proceedings of ASIACRYPT 2000. Proceedings of ASIACRYPT 2000. Springer-Verlag, LNCS 1976; 2000. Available from: http://portal.acm.org/citation.cfm?id=647096.716874
2006
Kirsch A, Mitzenmacher M. Less Hashing, Same Performance: Building a Better Bloom Filter. In: Azar Y, Erlebach T Algorithms – ESA 2006. Vol. 4168. Algorithms – ESA 2006. Springer Berlin Heidelberg; 2006. pp. 456-467. Available from: http://dx.doi.org/10.1007/11841036_42
2008
Nussbaum L, Richard O. Lightweight emulation to study peer-to-peer systems. Concurrency and Computation: Practice and Experience [Internet]. 2008 ;20:735–749. Available from: http://dx.doi.org/10.1002/cpe.1242
2002
Kesdogan D, Agrawal D, Penz S. Limits of Anonymity in Open Environments. In: Petitcolas F Proceedings of Information Hiding Workshop (IH 2002). Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578; 2002. Available from: http://portal.acm.org/citation.cfm?id=731881
2006
Pashalidis A, Meyer B. Linking Anonymous Transactions: The Consistent View Attack. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 384–392. Available from: http://www.springerlink.com/content/y6l6412387663581/
Di P, Marcon M, Fuhrmann T. Linyphi: An IPv6-Compatible Implementation of SSR. In: Proceedings of the Third International Workshop on Hot Topics in Peer-to-Peer Systems. Proceedings of the Third International Workshop on Hot Topics in Peer-to-Peer Systems. Rhodes Island, Greec; 2006. Available from: http://i30www.ira.uka.de/research/publications/p2p/
2007
Saito K, Morino E, Suko Y, Suzuki T, Murai J. Local Production, Local Consumption: Peer-to-Peer Architecture for a Dependable and Sustainable Social Infrastructure. In: SAINT'07. Proceedings of the 2007 Symposium on Applications and the Internet. SAINT'07. Proceedings of the 2007 Symposium on Applications and the Internet. Hiroshima, Japan: IEEE Computer Society; 2007. p. 58.
2005
Gogolewski M, Klonowski M, Kutylowski M. Local View Attack on Anonymous Communication. In: Proceedings of ESORICS 2005. Proceedings of ESORICS 2005. Springer Berlin / Heidelberg; 2005. Available from: http://www.springerlink.com/content/ewblt5k80xrgqe4j/
2006
Øverlier L, Syverson P. Locating Hidden Servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy. Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE CS; 2006. Available from: http://portal.acm.org/citation.cfm?id=1130366
2004
Feamster N, Dingledine R. Location Diversity in Anonymity Networks. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Washington, DC, USA; 2004. Available from: http://portal.acm.org/citation.cfm?id=1029199

Pages