You are here

Bibliography

Export 59 results:
Author Title [ Type(Desc)] Year
Filters: First Letter Of Title is M  [Clear All Filters]
Book Chapter
Hand S, Roscoe T. Mnemosyne: Peer-to-Peer Steganographic Storage. In: Druschel P, Kaashoek F, Rowstron A Peer-to-Peer Systems. Vol. 2429. Peer-to-Peer Systems. Springer Berlin Heidelberg; 2002. pp. 130-140. Available from: http://dx.doi.org/10.1007/3-540-45748-8_13
G. Narayanan S, Aishwarya T, Agrawal A, Patra A, Choudhary A, C. Rangan P. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security. In: Garay JA, Miyaji A, Otsuka A Cryptology and Network Security. Vol. 5888. Cryptology and Network Security. Springer Berlin Heidelberg; 2009. pp. 21-40. Available from: http://dx.doi.org/10.1007/978-3-642-10433-6_2
Nishide T, Ohta K. Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol. In: Okamoto T, Wang X Public Key Cryptography – PKC 2007. Vol. 4450. Public Key Cryptography – PKC 2007. Springer Berlin Heidelberg; 2007. pp. 343-360. Available from: http://dx.doi.org/10.1007/978-3-540-71677-8_23
Cramer R, Damgárd I, Nielsen JB. Multiparty Computation from Threshold Homomorphic Encryption. In: Pfitzmann B Advances in Cryptology — EUROCRYPT 2001. Vol. 2045. Advances in Cryptology — EUROCRYPT 2001. Springer Berlin Heidelberg; 2001. pp. 280-300. Available from: http://dx.doi.org/10.1007/3-540-44987-6_18
Conference Paper
Perng G, Reiter MK, Wang C. M2: Multicasting Mixes for Efficient and Anonymous Communication. In: Proceedings of the 26th IEEE Conference on Distributed Computing Systems. Proceedings of the 26th IEEE Conference on Distributed Computing Systems. ; 2006. Available from: http://ieeexplore.ieee.org/Xplore/login.jsp?url=http%3A%2F%2Fieeexplore.ieee.org%2Fiel5%2F10967%2F34569%2F01648846.pdf%3Ftp%3D%26isnumber%3D%26arnumber%3D1648846&authDecision=-203
Rodriguez A, Killian C, Bhat S, Kostić D, Vahdat A. MACEDON: methodology for automatically creating, evaluating, and designing overlay networks. In: NSDI'04: Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation. NSDI'04: Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation. Berkeley, CA, USA: USENIX Association; 2004. pp. 20–20. Available from: http://portal.acm.org/citation.cfm?id=1251175.1251195#
Saballus B, Fuhrmann T. Maintaining reference graphs of globally accessible objects in fully decentralized distributed systems. In: HPDC '09: Proceedings of the 18th ACM international symposium on High performance distributed computing. HPDC '09: Proceedings of the 18th ACM international symposium on High performance distributed computing. New York, NY, USA: ACM; 2009. pp. 59–60. Available from: http://portal.acm.org/citation.cfm?id=1551609.1551621#
Fiat A, Saia J, Young M. Making chord robust to byzantine attacks. In: In Proc. of the European Symposium on Algorithms (ESA. In Proc. of the European Symposium on Algorithms (ESA. Springer; 2005. pp. 803–814. Available from: http://www.springerlink.com/content/422llxn7khwej72n/
Chawathe Y, Breslau L, Lanham N, Shenker S. Making gnutella-like P2P systems scalable. In: SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. SIGCOMM '03: Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications. New York, NY, USA: ACM; 2003. pp. 407–418. Available from: http://portal.acm.org/citation.cfm?id=864000#
Jakobsson M, Juels A, Rivest R. Making mix nets robust for electronic voting by randomized partial checking. In: Proceedings of the 11th USENIX Security Symposium. Proceedings of the 11th USENIX Security Symposium. USENIX Association Berkeley, CA, USA; 2002. Available from: http://portal.acm.org/citation.cfm?id=647253.720294
Westermann B, Kesdogan D. Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection. In: FC'11 - Proceedings of Financial Cryptography and Data Security . FC'11 - Proceedings of Financial Cryptography and Data Security . St. Lucia; 2011.
Schanzenbach M, Banse C. Managing and Presenting User Attributes over a Decentralized Secure Name System. In: Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Data Privacy Management and Security Assurance - 11th International Workshop, {DPM} 2016 and 5th International Workshop, {QASA} 2016, Heraklion, Crete, Greece, September 26-27, 2016, Proceedings. Crete, Greece: Springer; 2016.
Albrecht JR, Huang DY. Managing Distributed Applications Using Gush. In: TRIDENTCOM. TRIDENTCOM. ; 2010. pp. 401-411.
Zhang Z, Chen S, Yoon MK. MARCH: A Distributed Incentive Scheme for Peer-to-Peer Networks. In: INFOCOM 2007. 26th IEEE International Conference on Computer Communications. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. Anchorage, Alaska, USA: IEEE Computer Society; 2007. pp. 1091-1099.
Wang W, Li B. Market-driven bandwidth allocation in selfish overlay networks. In: INFOCOM'05. Proceedings of the 24th IEEE International Conference on Computer Communications. INFOCOM'05. Proceedings of the 24th IEEE International Conference on Computer Communications. Miami, FL, USA: IEEE Computer Society; 2005. pp. 2578-2589.
Saroiu S, Gummadi KP, Gribble SD. A Measurement Study of Peer-to-Peer File Sharing Systems. In: Multimedia Computing and Networking (MMCN),. Multimedia Computing and Networking (MMCN),. San Jose; 2002. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.4223&rep=rep1&type=pdf
Guo L, Chen S, Xiao Z, Tan E, Ding X, Zhang X. Measurements, analysis, and modeling of BitTorrent-like systems. In: IMC'05. Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement. IMC'05. Proceedings of the 5th ACM SIGCOMM Conference on Internet Measurement. Berkeley, CA, USA: USENIX Association; 2005. pp. 4–4. Available from: http://www.usenix.org/events/imc05/tech/full_papers/guo/guo_html/
Tóth G, Hornák Z. Measuring Anonymity in a Non-adaptive, Real-time System. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Vol. 3424. Proceedings of Privacy Enhancing Technologies workshop (PET 2004). ; 2004. pp. 226–241. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.851
Tóth G, Hornák Z, Vajda F. Measuring Anonymity Revisited. In: Liimatainen S, Virtanen T Proceedings of the Ninth Nordic Workshop on Secure IT Systems. Proceedings of the Ninth Nordic Workshop on Secure IT Systems. Espoo, Finland; 2004. pp. 85–90. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.7843
Kutzner K, Fuhrmann T. Measuring Large Overlay Networks - The Overnet Example. In: Konferenzband der 14. Fachtagung Kommunikation in Verteilten Systemen (KiVS 2005). Konferenzband der 14. Fachtagung Kommunikation in Verteilten Systemen (KiVS 2005). Kaiserslautern, Germany; 2005. Available from: http://i30www.ira.uka.de/research/publications/p2p/
Shmatikov V, Wang M-H. Measuring Relationship Anonymity in Mix Networks. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2006). ACM New York, NY, USA; 2006. Available from: http://portal.acm.org/citation.cfm?id=1179611
Moscibroda T, Schmid S. On Mechanism Design without Payments for Throughput Maximization. In: INFOCOM'09. Proceedings of the 28th IEEE International Conference on Computer Communications. INFOCOM'09. Proceedings of the 28th IEEE International Conference on Computer Communications. Rio de Janeiro, Brazil: IEEE Computer Society; 2009. pp. 972-980.
Vasserman EY, Jansen R, Tyra J, Hopper NJ, Kim Y. Membership-concealing overlay networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 390–399. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653709
Magharei N, Rejaie R. Mesh or Multiple-Tree: A Comparative Study of Live P2P Streaming Approaches. In: INFOCOM 2007. 26th IEEE International Conference on Computer Communications. INFOCOM 2007. 26th IEEE International Conference on Computer Communications. Anchorage, Alaska, USA: IEEE Computer Society; 2007. pp. 1424–1432.
Serjantov A, Murdoch SJ. Message Splitting Against the Partial Adversary. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Proceedings of Privacy Enhancing Technologies workshop (PET 2005). Springer Berlin / Heidelberg; 2005. pp. 26–39. Available from: http://www.springerlink.com/content/375x2pv385388h86/

Pages