You are here

Bibliography

Export 10 results:
Author Title Type [ Year(Asc)]
Filters: First Letter Of Title is V  [Clear All Filters]
2004
Srivatsa M, Liu L. Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. In: ACSAC '04: Proceedings of the 20th Annual Computer Security Applications Conference. ACSAC '04: Proceedings of the 20th Annual Computer Security Applications Conference. Washington, DC, USA: IEEE Computer Society; 2004. pp. 252–261. Available from: http://portal.acm.org/citation.cfm?id=1038254.1038318#
Dabek F, Cox R, Kaashoek FM, Morris R. Vivaldi: a decentralized network coordinate system. SIGCOMM Computer Communication Review [Internet]. 2004 ;34(4):15–26. Available from: http://doi.acm.org/10.1145/1030194.1015471
2002
Malkhi D, Naor M, Ratajczak D. Viceroy: a scalable and dynamic emulation of the butterfly. In: PODC '02: Proceedings of the twenty-first annual symposium on Principles of distributed computing. PODC '02: Proceedings of the twenty-first annual symposium on Principles of distributed computing. New York, NY, USA: ACM; 2002. pp. 183–192. Available from: http://portal.acm.org/citation.cfm?id=571857#
2001
Neff AC. A Verifiable Secret Shuffle and its Application to E-Voting. In: Samarati P {Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)}. {Proceedings of the 8th ACM Conference on Computer and Communications Security (CCS 2001)}. ACM Press; 2001. pp. 116–125. Available from: http://portal.acm.org/citation.cfm?id=502000
2002
Quinlan S, Dorward S. Venti: A New Approach to Archival Storage. In: FAST '02: Proceedings of the Conference on File and Storage Technologies. FAST '02: Proceedings of the Conference on File and Storage Technologies. Berkeley, CA, USA: USENIX Association; 2002. pp. 89–101. Available from: http://portal.acm.org/citation.cfm?id=651321#
2006
Øverlier L, Syverson P. Valet Services: Improving Hidden Servers with a Personal Touch. In: Danezis G, Golle P Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Proceedings of the Sixth Workshop on Privacy Enhancing Technologies (PET 2006). Cambridge, UK: Springer; 2006. pp. 223–244. Available from: http://www.springerlink.com/content/d58607007777r8l1/