You are here

Bibliography

Export 1144 results:
Author Title Type [ Year(Asc)]
2013
Ullman J. Answering $n^2+o(1)$ Counting Queries with Differential Privacy is Hard. In: ; 2013. pp. 361–370.
Chatzikokolakis K, Andrés ME, Bordenabe NE, Palamidessi C. Broadening the Scope of Differential Privacy Using Metrics. In: De Cristofaro E, Wright M Privacy Enhancing Technologies. Vol. 7981. Privacy Enhancing Technologies. Springer Berlin Heidelberg; 2013. pp. 82-102. Available from: http://dx.doi.org/10.1007/978-3-642-39077-7_5
Toth GX. Design of a Social Messaging System Using Stateful Multicast. 2013 ;M.Sc.:76.
Wachs M, Schanzenbach M, Grothoff C. On the Feasibility of a Censorship Resistant Decentralized Name System. In: 6th International Symposium on Foundations & Practice of Security (FPS 2013). 6th International Symposium on Foundations & Practice of Security (FPS 2013). La Rochelle, France: Springer Verlag; 2013.
Boutet A, Frey D, Jegou A, Kermarrec A-M, Ribeiro HB. FreeRec: An Anonymous and Distributed Personalization Architecture. In: ; 2013. pp. 58–73.
Totakura SHarsha. Large Scale Distributed Evaluation of Peer-to-Peer Protocols. Department of Computer Science. 2013 ;Master of Science:76.
Teich M. Monkey - Generating Useful Bug Reports Automatically. Informatics. 2013 ;Bachelor:50.
Al-Ameen MN, Wright M. Persea: A Sybil-resistant Social DHT. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. Proceedings of the Third ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM; 2013. Available from: http://doi.acm.org.eaccess.ub.tum.de/10.1145/2435349.2435372
DeCew J. Privacy. In: Zalta EN The Stanford Encyclopedia of Philosophy. {Fall 2013}. The Stanford Encyclopedia of Philosophy. ; 2013.
Toth GX. Public Key Pinning for TLS Using a Trust on First Use Model. (Vlieg T).; 2013.
Uzunov A. Speeding Up Tor with SPDY. Computer Science. 2013 ;Master's in Computer Science:124.
Kermarrec A-M. Towards a Personalized Internet: a Case for a Full Decentralization. Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences. 2013 ;371.
Biryukov A, Pustogarov I, Weinmann R. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. In: Security and Privacy (SP), 2013 IEEE Symposium on. Security and Privacy (SP), 2013 IEEE Symposium on. ; 2013.
Boutet A, Frey D, Guerraoui R, Jegou A, Kermarrec A-M. WhatsUp: A Decentralized Instant News Recommender. In: IEEE 27th International Symposium on Parallel & Distributed Processing. IEEE 27th International Symposium on Parallel & Distributed Processing. IEEE; 2013.
2012
Knight S, Jaboldinov A, Maennel O, Phillips I, Roughan M. AutoNetkit: simplifying large scale, open-source network experimentation. SIGCOMM Comput. Commun. Rev. [Internet]. 2012 ;42:97–98. Available from: http://doi.acm.org/10.1145/2377677.2377699
Alaggan M, Gambs S, Kermarrec A-M. BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters. In: Richa AW, Scheideler C Stabilization, Safety, and Security of Distributed Systems. Vol. 7596. Stabilization, Safety, and Security of Distributed Systems. Springer Berlin Heidelberg; 2012. pp. 202-216. Available from: http://dx.doi.org/10.1007/978-3-642-33536-5_20
Wang T, Bauer K, Forero C, Goldberg I. Congestion-aware Path Selection for Tor. In: FC'12 - Proceedings of the 16th International Conference in Financial Cryptography and Data Security . FC'12 - Proceedings of the 16th International Conference in Financial Cryptography and Data Security . Bonaire; 2012.
Sadiq U, Kumar M, Wright M. CRISP: Collusion-resistant Incentive-compatible Routing and Forwarding in Opportunistic Networks. In: Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York, NY, USA: ACM; 2012. Available from: http://doi.acm.org/10.1145/2387238.2387253
Narayanan A, Toubiana V, Barocas S, Nissenbaum H, Boneh D. A Critical Look at Decentralized Personal Data Architectures. CoRR. 2012 ;abs/1202.4503.
Szengel M. Decentralized Evaluation of Regular Expressions for Capability Discovery in Peer-to-Peer Networks. Department of Computer Science. 2012 ;M.S.:100.
Schanzenbach M. Design and Implementation of a Censorship Resistant and Fully Decentralized Name System. Fakultaet fuer Informatik. 2012 ;M.Sc.:116.
Dodis Y, López-Alt A, Mironov I, Vadhan S. Differential Privacy with Imperfect Randomness. In: Safavi-Naini R, Canetti R Advances in Cryptology – CRYPTO 2012. Vol. 7417. Advances in Cryptology – CRYPTO 2012. Springer Berlin Heidelberg; 2012. pp. 497-516. Available from: http://dx.doi.org/10.1007/978-3-642-32009-5_29
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. Garching bei Muenchen: Technische Universitaet Muenchen; 2012.

Pages