You are here

Bibliography

Export 59 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is M  [Clear All Filters]
2004
Rodriguez A, Killian C, Bhat S, Kostić D, Vahdat A. MACEDON: methodology for automatically creating, evaluating, and designing overlay networks. In: NSDI'04: Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation. NSDI'04: Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation. Berkeley, CA, USA: USENIX Association; 2004. pp. 20–20. Available from: http://portal.acm.org/citation.cfm?id=1251175.1251195#
2009
Saballus B, Fuhrmann T. Maintaining reference graphs of globally accessible objects in fully decentralized distributed systems. In: HPDC '09: Proceedings of the 18th ACM international symposium on High performance distributed computing. HPDC '09: Proceedings of the 18th ACM international symposium on High performance distributed computing. New York, NY, USA: ACM; 2009. pp. 59–60. Available from: http://portal.acm.org/citation.cfm?id=1551609.1551621#
2005
Fiat A, Saia J, Young M. Making chord robust to byzantine attacks. In: In Proc. of the European Symposium on Algorithms (ESA. In Proc. of the European Symposium on Algorithms (ESA. Springer; 2005. pp. 803–814. Available from: http://www.springerlink.com/content/422llxn7khwej72n/
2003
Chawathe Y, Breslau L, Lanham N, Shenker S. Making gnutella-like P2P systems scalable. In: SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. New York, NY, USA: ACM; 2003. pp. 407–418. Available from: http://portal.acm.org/citation.cfm?id=864000#
2002
Jakobsson M, Juels A, Rivest R. Making mix nets robust for electronic voting by randomized partial checking. In: Proceedings of the 11th USENIX Security Symposium. Proceedings of the 11th USENIX Security Symposium. USENIX Association Berkeley, CA, USA; 2002. Available from: http://portal.acm.org/citation.cfm?id=647253.720294
2011
Westermann B, Kesdogan D. Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection. In: FC'11 - Proceedings of Financial Cryptography and Data Security . FC'11 - Proceedings of Financial Cryptography and Data Security . St. Lucia; 2011.
2016
Schanzenbach M, Banse C. Managing and Presenting User Attributes over a Decentralized Secure Name System. In: Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Crete, Greece: Springer; 2016.
2007
King B. Mapping an Arbitrary Message to an Elliptic Curve when Defined over GF (2n). International Journal of Network Security. 2007 ;8(2):169--176.
Zhang Z, Chen S, Yoon MK. MARCH: A Distributed Incentive Scheme for Peer-to-Peer Networks. In: INFOCOM 2007. 26th IEEE International Conference on Computer Communications. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. Anchorage, Alaska, USA: IEEE Computer Society; 2007. pp. 1091-1099.
2005
Wang W, Li B. Market-driven bandwidth allocation in selfish overlay networks. In: INFOCOM'05. Proceedings of the 24th IEEE International Conference on Computer Communications. INFOCOM'05. Proceedings of the 24th IEEE International Conference on Computer Communications. Miami, FL, USA: IEEE Computer Society; 2005. pp. 2578-2589.
2002
Saroiu S, Gummadi KP, Gribble SD. A Measurement Study of Peer-to-Peer File Sharing Systems. In: Multimedia Computing and Networking (MMCN),. Multimedia Computing and Networking (MMCN),. San Jose; 2002. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.4223&rep=rep1&type=pdf
2005
Guo L, Chen S, Xiao Z, Tan E, Ding X, Zhang X. Measurements, analysis, and modeling of BitTorrent-like systems. In: IMC'05. Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement. IMC'05. Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement. Berkeley, CA, USA: USENIX Association; 2005. pp. 4–4. Available from: http://www.usenix.org/events/imc05/tech/full_papers/guo/guo_html/
2004
Tóth G, Hornák Z. Measuring Anonymity in a Non-adaptive, Real-time System. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Vol. 3424. Proceedings of Privacy Enhancing Technologies workshop (PET 2004). ; 2004. pp. 226–241. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.851
Tóth G, Hornák Z, Vajda F. Measuring Anonymity Revisited. In: Liimatainen S, Virtanen T Proceedings of the Ninth Nordic Workshop on Secure IT Systems. Proceedings of the Ninth Nordic Workshop on Secure IT Systems. Espoo, Finland; 2004. pp. 85–90. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.7843
2005
Kutzner K, Fuhrmann T. Measuring Large Overlay Networks - The Overnet Example. In: Konferenzband der 14. Fachtagung Kommunikation in Verteilten Systemen (KiVS 2005). Konferenzband der 14. Fachtagung Kommunikation in Verteilten Systemen (KiVS 2005). Kaiserslautern, Germany; 2005. Available from: http://i30www.ira.uka.de/research/publications/p2p/
2006
Shmatikov V, Wang M-H. Measuring Relationship Anonymity in Mix Networks. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006). ACM New York, NY, USA; 2006. Available from: http://portal.acm.org/citation.cfm?id=1179611
2009
Moscibroda T, Schmid S. On Mechanism Design without Payments for Throughput Maximization. In: INFOCOM'09. Proceedings of the 28th IEEE International Conference on Computer Communications. INFOCOM'09. Proceedings of the 28th IEEE International Conference on Computer Communications. Rio de Janeiro, Brazil: IEEE Computer Society; 2009. pp. 972-980.
2009
Vasserman EY, Jansen R, Tyra J, Hopper NJ, Kim Y. Membership-concealing overlay networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 390–399. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653709

Pages