You are here

Bibliography

Export 1106 results:
Author Title Type [ Year(Asc)]
Submitted
Dwork C. Differential Privacy. In: ; Submitted. pp. 1–12.
2014
Morales A. Cryogenic: Enabling Power-Aware Applications on Linux. Department of Computer Science. 2014 ;M. Sc.:106.
Grothoff C, Polot B, von Loesch C. The Internet is Broken: Idealistic Ideas for Building a GNU Network. In: W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). W3C/IAB Workshop on Strengthening the Internet Against Pervasive Monitoring (STRINT). London, UK: W3C/IAB; 2014.
Oehlmann F. Machine Learning for Bandwidth Management in Decentralized Networks. Department of Computer Science. 2014 ;M. Sc.:91.
Arias R. Numerical Stability and Scalability of Secure Private Linear Programming. Computer Science. 2014 ;B. Sc.:65.
2013
Ullman J. Answering $n^2+o(1)$ Counting Queries with Differential Privacy is Hard. In: ; 2013. pp. 361–370.
Chatzikokolakis K, Andrés ME, Bordenabe NEmilio, Palamidessi C. Broadening the Scope of Differential Privacy Using Metrics. In: ; 2013. pp. 82–102.
Toth GX. Design of a Social Messaging System Using Stateful Multicast. 2013 ;M.Sc.:76.
Wachs M, Schanzenbach M, Grothoff C. On the Feasibility of a Censorship Resistant Decentralized Name System. In: 6th International Symposium on Foundations & Practice of Security (FPS 2013). 6th International Symposium on Foundations & Practice of Security (FPS 2013). La Rochelle, France: Springer Verlag; 2013.
Boutet A, Frey D, Jegou A, Kermarrec A-M, Ribeiro HB. FreeRec: An Anonymous and Distributed Personalization Architecture. In: ; 2013. pp. 58–73.
Totakura SHarsha. Large Scale Distributed Evaluation of Peer-to-Peer Protocols. Department of Computer Science. 2013 ;Master of Science:76.
Teich M. Monkey - Generating Useful Bug Reports Automatically. Informatics. 2013 ;Bachelor:50.
Al-Ameen MN, Wright M. Persea: A Sybil-resistant Social DHT. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. Proceedings of the Third ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM; 2013. Available from: http://doi.acm.org.eaccess.ub.tum.de/10.1145/2435349.2435372
DeCew J. Privacy. In: Zalta EN The Stanford Encyclopedia of Philosophy. {Fall 2013}. The Stanford Encyclopedia of Philosophy. ; 2013.
Uzunov A. Speeding Up Tor with SPDY. Computer Science. 2013 ;Master's in Computer Science:124.
Kermarrec A-M. Towards a Personalized Internet: a Case for a Full Decentralization. Philosophical Transactions. Series A, Mathematical, Physical, and Engineering Sciences. 2013 ;371.
Biryukov A, Pustogarov I, Weinmann R. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization. In: Security and Privacy (SP), 2013 IEEE Symposium on. Security and Privacy (SP), 2013 IEEE Symposium on. ; 2013.
Boutet A, Frey D, Guerraoui R, Jegou A, Kermarrec A-M. WhatsUp: A Decentralized Instant News Recommender. In: IEEE 27th International Symposium on Parallel & Distributed Processing. IEEE 27th International Symposium on Parallel & Distributed Processing. IEEE; 2013.
2012
Knight S, Jaboldinov A, Maennel O, Phillips I, Roughan M. AutoNetkit: simplifying large scale, open-source network experimentation. SIGCOMM Comput. Commun. Rev. [Internet]. 2012 ;42:97–98. Available from: http://doi.acm.org/10.1145/2377677.2377699
Wang T, Bauer K, Forero C, Goldberg I. Congestion-aware Path Selection for Tor. In: FC'12 - Proceedings of the 16th International Conference in Financial Cryptography and Data Security . FC'12 - Proceedings of the 16th International Conference in Financial Cryptography and Data Security . Bonaire; 2012.
Sadiq U, Kumar M, Wright M. CRISP: Collusion-resistant Incentive-compatible Routing and Forwarding in Opportunistic Networks. In: Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York, NY, USA: ACM; 2012. Available from: http://doi.acm.org/10.1145/2387238.2387253
Narayanan A, Toubiana V, Barocas S, Nissenbaum H, Boneh D. A Critical Look at Decentralized Personal Data Architectures. CoRR. 2012 ;abs/1202.4503.
Szengel M. Decentralized Evaluation of Regular Expressions for Capability Discovery in Peer-to-Peer Networks. Department of Computer Science. 2012 ;M.S.:100.
Schanzenbach M. Design and Implementation of a Censorship Resistant and Fully Decentralized Name System. Fakultaet fuer Informatik. 2012 ;M.Sc.:116.
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. In: IFIP International Conferences on Networking (Networking 2012). IFIP International Conferences on Networking (Networking 2012). Prague, CZ: Springer Verlag; 2012. p. 304--317. Available from: http://grothoff.org/christian/rrsize2012.pdf

Pages