You are here

Bibliography

Export 1150 results:
Author Title Type [ Year(Asc)]
2014
Borisov N, Danezis G, Goldberg I. DP5: A Private Presence Service. Centre for Applied Cryptographic Research (CACR), University of Waterloo. 2014 .
Chen T, Boreli R, Kaafar M-A, Friedman A. On the Effectiveness of Obfuscation Techniques in Online Social Networks. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 42-62. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_3
Singh S. Experimental comparison of Byzantine fault tolerant distributed hash tables. Computer Science. 2014 ;M.S.:42.
Lueks W, Hoepman J-H, Kursawe K. Forward-Secure Distributed Encryption. In: De Cristofaro E, Murdoch SJ Privacy Enhancing Technologies. Vol. 8555. Privacy Enhancing Technologies. Springer International Publishing; 2014. pp. 123-142. Available from: http://dx.doi.org/10.1007/978-3-319-08506-7_7
Kirsch J. Improved Kernel-Based Port-Knocking in Linux. Computer Science. 2014 ;M.S.
Grothoff C, Polot B, von Loesch C. The Internet is Broken: Idealistic Ideas for Building a GNU Network. In: W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). London, UK: W3C/IAB; 2014.
Oehlmann F. Machine Learning for Bandwidth Management in Decentralized Networks. Department of Computer Science. 2014 ;M. Sc.:91.
Arias R. Numerical Stability and Scalability of Secure Private Linear Programming. Computer Science. 2014 ;B. Sc.:65.
2013
Ullman J. Answering $n^2+o(1)$ Counting Queries with Differential Privacy is Hard. In: ; 2013. pp. 361–370.
Chatzikokolakis K, Andrés ME, Bordenabe NE, Palamidessi C. Broadening the Scope of Differential Privacy Using Metrics. In: De Cristofaro E, Wright M Privacy Enhancing Technologies. Vol. 7981. Privacy Enhancing Technologies. Springer Berlin Heidelberg; 2013. pp. 82-102. Available from: http://dx.doi.org/10.1007/978-3-642-39077-7_5
Toth GX. Design of a Social Messaging System Using Stateful Multicast. 2013 ;M.Sc.:76.
Wachs M, Schanzenbach M, Grothoff C. On the Feasibility of a Censorship Resistant Decentralized Name System. In: 6th International Symposium on Foundations & Practice of Security (FPS 2013). 6th International Symposium on Foundations & Practice of Security (FPS 2013). La Rochelle, France: Springer Verlag; 2013.
Boutet A, Frey D, Jegou A, Kermarrec A-M, Ribeiro HB. FreeRec: An Anonymous and Distributed Personalization Architecture. In: ; 2013. pp. 58–73.
Totakura SHarsha. Large Scale Distributed Evaluation of Peer-to-Peer Protocols. Department of Computer Science. 2013 ;Master of Science:76.
Teich M. Monkey - Generating Useful Bug Reports Automatically. Informatics. 2013 ;Bachelor:50.
Al-Ameen MN, Wright M. Persea: A Sybil-resistant Social DHT. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. Proceedings of the Third ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM; 2013. Available from: http://doi.acm.org.eaccess.ub.tum.de/10.1145/2435349.2435372
DeCew J. Privacy. In: Zalta EN The Stanford Encyclopedia of Philosophy. {Fall 2013}. The Stanford Encyclopedia of Philosophy. ; 2013.
Toth GX. Public Key Pinning for TLS Using a Trust on First Use Model. (Vlieg T).; 2013.
Uzunov A. Speeding Up Tor with SPDY. Computer Science. 2013 ;Master's in Computer Science:124.
Kermarrec A-M. Towards a Personalized Internet: a Case for a Full Decentralization. Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences. 2013 ;371.
Biryukov A, Pustogarov I, Weinmann R. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. In: Security and Privacy (SP), 2013 IEEE Symposium on. Security and Privacy (SP), 2013 IEEE Symposium on. ; 2013.
Boutet A, Frey D, Guerraoui R, Jegou A, Kermarrec A-M. WhatsUp: A Decentralized Instant News Recommender. In: IEEE 27th International Symposium on Parallel & Distributed Processing. IEEE 27th International Symposium on Parallel & Distributed Processing. IEEE; 2013.
2012
Knight S, Jaboldinov A, Maennel O, Phillips I, Roughan M. AutoNetkit: simplifying large scale, open-source network experimentation. SIGCOMM Comput. Commun. Rev. [Internet]. 2012 ;42:97–98. Available from: http://doi.acm.org/10.1145/2377677.2377699
Alaggan M, Gambs S, Kermarrec A-M. BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters. In: Richa AW, Scheideler C Stabilization, Safety, and Security of Distributed Systems. Vol. 7596. Stabilization, Safety, and Security of Distributed Systems. Springer Berlin Heidelberg; 2012. pp. 202-216. Available from: http://dx.doi.org/10.1007/978-3-642-33536-5_20
Wang T, Bauer K, Forero C, Goldberg I. Congestion-aware Path Selection for Tor. In: FC'12 - Proceedings of the 16th International Conference in Financial Cryptography and Data Security . FC'12 - Proceedings of the 16th International Conference in Financial Cryptography and Data Security . Bonaire; 2012.

Pages