You are here

Bibliography

Export 131 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is S  [Clear All Filters]
2004
Dingledine R, Shmatikov V, Syverson P. Synchronous Batching: From Cascades to Free Routes. In: Proceedings of Privacy Enhancing Technologies workshop (PET 2004). Vol. 3424. Proceedings of Privacy Enhancing Technologies workshop (PET 2004). ; 2004. pp. 186–206. Available from: http://www.springerlink.com/content/uqvfwe97ehlldm8d/
2003
Manku GS, Bawa M, Raghavan P. Symphony: distributed hashing in a small world. In: USITS'03: Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems. USITS'03: Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems. Berkeley, CA, USA: USENIX Association; 2003. pp. 10–10. Available from: http://portal.acm.org/citation.cfm?id=1251460.1251470#
2009
Resnick P, Sami R. Sybilproof Transitive Trust Protocols. In: EC'09. Proceedings of the 10th ACM Conference on Electronic commerce. EC'09. Proceedings of the 10th ACM Conference on Electronic commerce. Stanford, California, USA: ACM; 2009. pp. 345–354. Available from: http://doi.acm.org/10.1145/1566374.1566423
2005
Cheng A, Friedman E. Sybilproof reputation mechanisms. In: Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems. Proceedings of the 2005 ACM SIGCOMM Workshop on Economics of Peer-to-Peer Systems. Philadelphia, PA: ACM; 2005. pp. 128–132. Available from: http://doi.acm.org/10.1145/1080192.1080202
2009
Gamiochipi RLL, Griffin D, Clegg RG, Mykoniati E, Rio M. A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks. In: INFOCOM 2009. The 28th IEEE International Conference on Computer Communications. INFOCOM 2009. The 28th IEEE International Conference on Computer Communications. Rio de Janeiro, Brazil: IEEE Computer Society; 2009. pp. 343-351.
2006
Yu H, Kaminsky M, Gibbons PB, Flaxman A. SybilGuard: defending against sybil attacks via social networks. In: SIGCOMM'06. Proceedings of the 2006 conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. SIGCOMM'06. Proceedings of the 2006 conference on Applications, Technologies, Architectures, and Protocols for Computer Communications. Pisa, Italy: ACM; 2006. pp. 267–278. Available from: http://doi.acm.org/10.1145/1159913.1159945
2002
Douceur JR. The Sybil Attack. In: IPTPS'01 - Revised Papers from the First International Workshop on Peer-to-Peer Systems. IPTPS'01 - Revised Papers from the First International Workshop on Peer-to-Peer Systems. Cambridge, MA: Springer-Verlag London; 2002. pp. 251–260. Available from: http://dl.acm.org/citation.cfm?id=646334.687813
2011
Houmansadr A, Borisov N. SWIRL: A Scalable Watermark to Detect Correlated Network Flows. In: NDSS'11 - Proceedings of the Network and Distributed Security Symposium. NDSS'11 - Proceedings of the Network and Distributed Security Symposium. San Diego, CA, USA; 2011.
2004
Tamilmani K, Pai V, Mohr AE. SWIFT: A System With Incentives For Trading. In: P2PECON'04. Proceedings of the 2nd Workshop on Economics of Peer-to-Peer Systems. P2PECON'04. Proceedings of the 2nd Workshop on Economics of Peer-to-Peer Systems. Cambridge, Massachusetts, USA; 2004.
2008
Smaragdakis G, Laoutaris N, Michiardi P, Bestavros A, Byers JW, Roussopoulos M. Swarming on Optimized Graphs for n-way Broadcast. In: Proceedings of IEEE INFOCOM 2008. Proceedings of IEEE INFOCOM 2008. Phoenix, AZ; 2008.
2003
Fuhrmann T. Supporting Peer-to-Peer Computing with FlexiNet. In: CCGRID '03: Proceedings of the 3st International Symposium on Cluster Computing and the Grid. CCGRID '03: Proceedings of the 3st International Symposium on Cluster Computing and the Grid. Washington, DC, USA: IEEE Computer Society; 2003. p. 390. Available from: http://portal.acm.org/citation.cfm?id=791231.792432#
2007
Patterson ML, Sassaman L. Subliminal Channels in the Private Information Retrieval Protocols. In: Proceedings of the 28th Symposium on Information Theory in the Benelux. Proceedings of the 28th Symposium on Information Theory in the Benelux. Enschede,NL: Werkgemeenschap voor Informatie- en Communicatietheorie; 2007. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.9190
2001
Benes T. The Strong Eternity Service. In: Moskowitz IS Proceedings of Information Hiding Workshop (IH 2001). Proceedings of Information Hiding Workshop (IH 2001). Springer-Verlag, LNCS 2137; 2001. Available from: http://portal.acm.org/citation.cfm?id=731726
1987
Stumm M. Strategies for decentralized resource management. In: SIGCOMM'87. Proceedings of the ACM Workshop on Frontiers in Computer Communications Technology. SIGCOMM'87. Proceedings of the ACM Workshop on Frontiers in Computer Communications Technology. Stowe, VT, USA: ACM; 1987. pp. 245–253. Available from: http://doi.acm.org/10.1145/55482.55508

Pages