You are here

Bibliography

Export 33 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is L  [Clear All Filters]
2002
Luby MG. LT Codes. Foundations of Computer Science, Annual IEEE Symposium on [Internet]. 2002 :271. Available from: http://www.computer.org/portal/web/csdl/abs/proceedings/focs/2002/1822/00/18220271abs.htm
Halevy D, Shamir A. The LSD Broadcast Encryption Scheme. In: CRYPTO'02 - Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology. CRYPTO'02 - Proceedings of the 22nd Annual International Cryptology Conference on Advances in Cryptology. Santa Barbara, CA, USA: Springer-Verlag; 2002. pp. 47–60. Available from: http://dl.acm.org/citation.cfm?id=646767.704291
2007
Bauer K, McCoy D, Grunwald D, Kohno T, Sicker D. Low-Resource Routing Attacks Against Tor. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2007). Washington, DC, USA: ACM New York, NY, USA; 2007. Available from: http://portal.acm.org/citation.cfm?id=1314336
2012
De A. Lower Bounds in Differential Privacy. In: Cramer R Theory of Cryptography. Vol. 7194. Theory of Cryptography. Springer Berlin Heidelberg; 2012. pp. 321-338. Available from: http://dx.doi.org/10.1007/978-3-642-28914-9_18
1962
Gallager RG. Low-density parity-check codes. Information Theory, IRE Transactions on [Internet]. 1962 ;8(1):21 - 28 . Available from: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1057683
2005
Murdoch SJ, Danezis G. Low-Cost Traffic Analysis of Tor. In: Proceedings of the 2005 IEEE Symposium on Security and Privacy. Proceedings of the 2005 IEEE Symposium on Security and Privacy. IEEE CS; 2005. Available from: http://portal.acm.org/citation.cfm?id=1059390
2001
Muthitacharoen A, Chen B, Mazières D. A low-bandwidth network file system. In: SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles. SOSP '01: Proceedings of the eighteenth ACM symposium on Operating systems principles. New York, NY, USA: ACM; 2001. pp. 174–187. Available from: http://portal.acm.org/citation.cfm?id=502052#
2004
Feamster N, Dingledine R. Location Diversity in Anonymity Networks. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2004). Washington, DC, USA; 2004. Available from: http://portal.acm.org/citation.cfm?id=1029199
2006
Øverlier L, Syverson P. Locating Hidden Servers. In: Proceedings of the 2006 IEEE Symposium on Security and Privacy. Proceedings of the 2006 IEEE Symposium on Security and Privacy. IEEE CS; 2006. Available from: http://portal.acm.org/citation.cfm?id=1130366
2005
Gogolewski M, Klonowski M, Kutylowski M. Local View Attack on Anonymous Communication. In: Proceedings of ESORICS 2005. Proceedings of ESORICS 2005. Springer Berlin / Heidelberg; 2005. Available from: http://www.springerlink.com/content/ewblt5k80xrgqe4j/
2007
Saito K, Morino E, Suko Y, Suzuki T, Murai J. Local Production, Local Consumption: Peer-to-Peer Architecture for a Dependable and Sustainable Social Infrastructure. In: SAINT'07. Proceedings of the 2007 Symposium on Applications and the Internet. SAINT'07. Proceedings of the 2007 Symposium on Applications and the Internet. Hiroshima, Japan: IEEE Computer Society; 2007. p. 58.
2006
Di P, Marcon M, Fuhrmann T. Linyphi: An IPv6-Compatible Implementation of SSR. In: Proceedings of the Third International Workshop on Hot Topics in Peer-to-Peer Systems. Proceedings of the Third International Workshop on Hot Topics in Peer-to-Peer Systems. Rhodes Island, Greec; 2006. Available from: http://i30www.ira.uka.de/research/publications/p2p/
Pashalidis A, Meyer B. Linking Anonymous Transactions: The Consistent View Attack. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 384–392. Available from: http://www.springerlink.com/content/y6l6412387663581/
2002
Kesdogan D, Agrawal D, Penz S. Limits of Anonymity in Open Environments. In: Petitcolas F Proceedings of Information Hiding Workshop (IH 2002). Proceedings of Information Hiding Workshop (IH 2002). Springer-Verlag, LNCS 2578; 2002. Available from: http://portal.acm.org/citation.cfm?id=731881
2008
Nussbaum L, Richard O. Lightweight emulation to study peer-to-peer systems. Concurrency and Computation: Practice and Experience [Internet]. 2008 ;20:735–749. Available from: http://dx.doi.org/10.1002/cpe.1242

Pages