You are here

Bibliography

Export 61 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is R  [Clear All Filters]
2010
Hübsch C, Mayer CP, Waldhorst OP. On Runtime Adaptation of Application-Layer Multicast Protocol Parameters. In: Proceedings of Networked Services and Applications – Engineering, Control and Management (EUNICE). Proceedings of Networked Services and Applications – Engineering, Control and Management (EUNICE). Trondheim, Norway: Springer; 2010. Available from: http://www.tm.uni-karlsruhe.de/itm/WebMan/view.php?view=publikationen_detail&id=389&lang=en
2007
Evans NS, GauthierDickey C, Grothoff C. Routing in the Dark: Pitch Black. In: 23rd Annual Computer Security Applications Conference (ACSAC 2007). 23rd Annual Computer Security Applications Conference (ACSAC 2007). IEEE Computer Society; 2007. pp. 305–314. Available from: http://grothoff.org/christian/pitchblack.pdf
2002
Beimel A, Stahl Y. Robust information-theoretic private information retrieval. In: Proceedings of the 3rd Conference on Security in Communication Networks. Vol. 2576. Proceedings of the 3rd Conference on Security in Communication Networks. Springer-Verlag; 2002. pp. 326–341. Available from: http://www.springerlink.com/content/9bnlbf2e2lp9u9p4/
2004
Feldman M, Lai K, Stoica I, Chuang J. Robust incentive techniques for peer-to-peer networks. In: EC'04. Proceedings of the 5th ACM Conference on Electronic Commerce. EC'04. Proceedings of the 5th ACM Conference on Electronic Commerce. New York, NY, USA: ACM; 2004. pp. 102–111. Available from: http://doi.acm.org/10.1145/988772.988788
Awerbuch B. Robust Distributed Name Service. In: In Proc. of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS. In Proc. of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS. ; 2004. pp. 1–8. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.4900
2008
Narayanan A, Shmatikov V. Robust De-anonymization of Large Sparse Datasets. In: Proceedings of the 2008 IEEE Symposium on Security and Privacy. Proceedings of the 2008 IEEE Symposium on Security and Privacy. Washington, DC, USA: IEEE Computer Society; 2008. Available from: http://dx.doi.org/10.1109/SP.2008.33
2009
McLachlan J, Hopper NJ. On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM; 2009. Available from: http://portal.acm.org/citation.cfm?id=1655193
2003
Dinur I, Nissim K. Revealing Information While Preserving Privacy. In: Proceedings of the Twenty-second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. Proceedings of the Twenty-second ACM SIGMOD-SIGACT-SIGART Symposium on Principles of Database Systems. New York, NY, USA: ACM; 2003. Available from: http://doi.acm.org/10.1145/773153.773173
Golle P, Jakobsson M. Reusable Anonymous Return Channels. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2003). Washington, DC, USA: ACM New York, NY, USA; 2003. Available from: http://portal.acm.org/citation.cfm?id=1005155
2003
Fuhrmann T, Harbaum T, Kassianidis P, Schöller M, Zitterbart M. Results on the practical feasibility of programmable network services. In: In 2nd International Workshop on Active Network Technologies and Applications (ANTA. In 2nd International Workshop on Active Network Technologies and Applications (ANTA. ; 2003. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.67.3074
2001
Scarlata V, Levine BN, Shields C. Responder Anonymity and Anonymous Peer-to-Peer File Sharing. In: Network Protocols, 2001. Ninth International Conference on . Network Protocols, 2001. Ninth International Conference on . ; 2001. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.20.7821&rep=rep1&type=url&i=0
2003
Padmanabhan VN, Wang HJ, Chou PA. Resilient Peer-to-Peer Streaming. In: ICNP'03. Proceedings of the 11th IEEE International Conference on Network Protocols. ICNP'03. Proceedings of the 11th IEEE International Conference on Network Protocols. Atlanta, Georgia, USA: IEEE Computer Society; 2003. p. 16–. Available from: http://dl.acm.org/citation.cfm?id=951950.952204
2002
Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P, Violante F. A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: In Proceedings of the 9th ACM Conference on Computer and Communications Security. In Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press; 2002. pp. 207–216. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.7.1784&rep=rep1&type=pdf
Damiani E, De Capitani di Vimercati S, Paraboschi S, Samarati P, Violante F. A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks. In: In Proceedings of the 9th ACM Conference on Computer and Communications Security. In Proceedings of the 9th ACM Conference on Computer and Communications Security. ACM Press; 2002. pp. 207–216. Available from: http://seclab.dti.unimi.it/Papers/ccs02.ps
2008
Androulaki E, Choi SG, Bellovin SM, Malkin T. Reputation Systems for Anonymous Networks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 202–218. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428272
2000
Resnick P, Kuwabara K, Zeckhauser R, Friedman E. Reputation systems. Communications of the ACM [Internet]. 2000 ;43(12):45–48. Available from: http://doi.acm.org/10.1145/355112.355122
2006
Dellarocas C. Reputation Mechanisms. In: Handbook on Information Systems and Economics. Handbook on Information Systems and Economics. Elsevier; 2006. pp. 629-660.

Pages