You are here

Publications by Keyword

A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
(107) 2fast (1) 802.11 (4)
ABE (1) abuse (1) access control (2)
accountability (1) accounting (1) accuracy (2)
action (1) ad-hoc networks (31) adaptive adversary (1)
ADOPT algorithm (1) affiliated values model (1) agent cooperation (1)
AI (1) ALC (1) algebraic geometry (1)
algorithmic mechanism design (1) algorithms (14) algoweb_ldpc (1)
allocative efficiency (1) altruistic cooperation (1) altruistic punishment (1)
Amazon (1) AN.ON (1) Analysis of algorithms (1)
analytical modeling (1) And-Or trees (1) anomaly (1)
anonymity (150) anonymity measurement (8) anonymity network (2)
anonymity service (4) anonymization (1) anonymous access (1)
anonymous authentication (2) anonymous blacklisting (4) anonymous communication (5)
anonymous communication anonymity protection (1) anonymous communications (1) anonymous credential system (2)
anonymous credentials (1) anonymous IM (1) anonymous multicast (2)
anonymous presence (1) anonymous publishing (3) anonymous voice (1)
anonymous web browsing (2) ant colony optimization (1) anticensorship (1)
anycast (1) AOMDV (1) APFS (1)
API (3) application layer multicast (1) application management (1)
application model (1) application-level (1) application-level multicast (1)
apportioned backup system (1) arbitrary hidden services (1) arbitrary network (1)
Architecture (1) array codes (1) Arrays (1)
artificial intelligence (3) as (2) asymmetric information (1)
asymmetry (1) asymptotically optimal (1) asynchronous (1)
attack (20) attack detection (1) attack mitigation (1)
attacks (1) attribute-based encryption (1) auction (1)
auction mechanisms (1) auction theory (1) auctions (3)
audit logs (1) authentication (5) automated (1)
automated configuration (1) automated negociation autonomous agent (1) automatic (1)
automation (1) autonetkit (1) autonomic distributed system (1)
autonomous system (1) autonomous systems (4) autonomus system (1)
availability (2) BACKLIT (1) backup (11)
Backup Systems (1) bandit-based methods (1) BANDWIDTH (2)
bandwidth allocation (3) bandwidth exchange (1) bandwidth sharing (1)
bandwidth utilization (1) bargaining problems (1) bartering (1)
bayesian game (1) Bayesian Nash equilibrium (1) BDH (1)
BEC (2) behavior (1) benchmarking (1)
BFS-Tree (1) bgp (1) big files (1)
bilinear gruop (1) Bismuth (1) BitTorrent (15)
bittorrent system (1) Bitwise Sharing (1) black-hole attack (1)
blind signatures (1) blocking (1) blocking resistance (2)
Bloom filter (4) bloom filters (1) Bluetooth (2)
BnB-ADOPT (1) BNymble (1) bootstrapping (3)
border gateway protocol (3) border gateway protocol (BGP) (1) Botnet (1)
Broadcast (1) broadcast encryption (1) broadcast encryption scheme (1)
buffering (1) built-in utility (1) bullet (1)
byzantine agreement (2) byzantine consensus (1) byzantine fault tolerance (5)
Byzantine Resilient Sampling (1) Byzantine storage (1) caching proxies (2)
CADET (2) CAN (5) capabilities (1)
category hierarchy (1) category mapping algorithms (1) Celeste (1)
censorship (1) censorship resistance (7) censorship-resistance (1)
centralized file server (1) certificate (1) certificate revocation (2)
certification authority (1) chain computation management (1) chainsaw (1)
charging (1) cheap pseudonyms (2) checkpointing (1)
Chord (9) churn (6) ciphertext (1)
circuit evaluation protocol (1) Circuits (1) CliqueNet (1)
clock skew (1) clone detection (1) clustering (1)
Clustering algorithms (1) coding theory (11) collaboration (3)
collaborative download (1) collaborative filtering (1) collusion (2)
collusion detection (2) collusion-resistant distributed protocol (1) combinatorial auctions (1)
combinatorial matrix theory (1) command and control channels (1) commercial Web sites (1)
commodity-based (1) common values model (1) communal randomness (1)
Communication (1) communication chain (1) communication complexity (4)
communication network (5) communication system security (1) commutative operations (1)
compact routing (1) comparison (1) complex querie (1)
Complexity (1) composite residuosity (1) composite-residuosity (1)
compression (5) Computational efficiency (1) Computational Geometry (1)
Computer Algebra (1) Computer applications (1) computer go (1)
computer go. (1) computer network performance (1) computer networks (4)
Computer science (1) computer security (1) computing (1)
Conferences (1) confidentiality (1) conflict detection (1)
congestion (1) congestion avoidance (1) consensus (1)
constraint satisfaction (1) consumer behaviour (1) Content Addressable Networks (1)
content availability (1) content centric (1) content distribution (4)
content-based (1) content-based publish/subscribe (1) contracts (4)
convergent encryption (1) convert channel (1) cooperation (10)
cooperative (1) cooperative games (1) coordination (1)
coordination ratio (1) Costs (1) countermeasure (1)
counting (1) coupling (1) Covariance matrix (1)
cover traffic (1) covert channels (1) CPFR (1)
CPU (1) credentials (2) credibility (1)
credit schemes (1) cross layer communication (1) Crowds (3)
cryogenic (1) cryptographic protocols (1) cryptographic security (1)
cryptographic systems (1) cryptographic tree structure (1) cryptography (14)
cryptology (1) cryptosystem (1) cryptree (1)
crytographic file system (1) Curve25519 (1) customer transactions (1)
data dissemination (1) Data mining (2) data privacy (5)
data races (1) data reconstruction (1) data replication (1)
data sharing (2) data structures (2) database_privacy differential_privacy stat (1)
dblp (4) DC-net (1) DC-network (1)
DCOP (5) de Bruijn graph (1) deanonymize hidden services (1)
debugging (2) Decentralisation (1) decentralized (7)
decentralized file system (1) decision problem (1) decision-making (1)
Decisional bilinear diffie-hellman (1) decoy routing (1) deep packet inspection (2)
DefenestraTor (1) defense (1) delay tolerant network (4)
delay tolerant networks (1) delegation (1) denial-of-service (7)
dependability (2) descentralised coordination (1) descentralized learning (1)
design (2) detection (2) detection system (1)
DFA (3) DHT (1) difference digest (1)
Differential Privacy (6) digital signature (2) dilemma (1)
dining cryptographers (3) directory service (1) disclosure attacks (1)
DisCOPs (1) discrete logarithm (1) discrete logarithms (1)
DisCSP algorithm (1) Displays (1) distance vector (1)
distributed algorithmic mechanism design (1) distributed applications (1) distributed complex event processing (1)
distributed computation (1) distributed computational economies (1) distributed computing (3)
distributed constraint optimization (4) distributed constraint satisfaction (2) distributed database (2)
distributed eigenvector computation (1) distributed file system (2) distributed hash table (51)
distributed hash table (29) distributed hosts (1) distributed interactive applications (1)
distributed k-ary system (1) distributed name-space (1) distributed networked storage (1)
distributed packet scheduling (1) distributed problem solving (1) distributed social networks (1)
distributed storage (7) distributed systems (8) distribution trees (1)
DKS (2) DNS (11) DNSSEC (4)
document location (1) document motion (1) DOLR (1)
double auction (1) download (1) DPOP (1)
Drac (1) DuckDuckGo search engine (1) dummies (1)
dummy traffic (1) duplicate files (1) DVB (2)
dynamic accumulators (1) dynamic binary instrumentation (1) dynamic peer network (1)
e-business (1) e-commerce (3) ECC (2)
ECDH (1) economic behavior (1) economic framework (1)
economic models (1) economics (10) Economics: general interest (1)
economy (1) ECRS (2) Ed25519 (1)
EdDSA (1) efficient (1) egalitarism (1)
EGOIST (3) electronic mail (2) electronic money (1)
electronic voting (5) elliptic curve cryptography (2) empirical survey (1)
emulab (2) emulation (11) encoding (3)
encrypted traffic (1) encryption (6) end-system multicast (1)
end-to-end measurement (1) energy consumption (1) energy efficiency (1)
energy-aware (1) entropy (1) epidemic protocols (1)
epistemic logic (1) equilibrium (1) erasure codes (2)
erasure coding (5) evaluation (2) event-driven (1)
evolution (1) exchange-based mechanism (1) exclusion (1)
exclusive encryption (1) exhaustive search (1) existential-honesty (1)
expander graphs (1) experimental economics (1) experimentation (1)
ExperimenTor (1) F2F (1) failure detection (1)
fairness (2) farsite (2) fault removal (1)
fault-tolerance (11) feasibility analysis (1) FEC (1)
federated (1) file access control mechanism (1) file swapping traffic (1)
file swarming (1) file system (1) file systems (12)
file-sharing (10) filing-erasure-coding (1) Filtering theory (1)
filters (1) Fingerprint recognition (1) fingerprinting (1)
firewall (1) flexibility (1) flexible media encoding (1)
flexible service platforms (1) flooding (1) flooding attacks (3)
flow (1) flow control (1) flow correlation attack (1)
flow marking attack (1) fluid model (1) for:isp (1)
forecasting (1) forensics (1) formal methods (1)
formal security model (1) forward error correction (1) forward security (1)
forward traceability (1) forwarding (1) FPGA (1)
framework (6) free riding (2) free-loader (1)
free-loading (1) free-rider (1) free-riding (7)
Freedom (2) freeloader (1) Freeloading (1)
Freenet (5) FTP-ALG (1) fusion algorithm (1)
Fuzzy IBE (1) game search (1) game theory (10)
game-theoretic (1) game-theory (1) games (1)
garbage collection (1) Gauger (1) GDB (1)
generating functions (1) generation (1) GENI (1)
globally accessible objects (1) GNS (2) GNU Name System (5)
GNUnet (54) Gnutella (4) gossip (2)
Gossip-based protocols (2) gossple (1) government censorship (1)
GPS (1) graph connectivity (1) graphs (1)
GRID (3) grid computing (1) group signatures (1)
groupware (1) guarantee (1) Guard (2)
Hacienda (1) harvelaar (1) heterogeneity (3)
heuristic method (1) hidden action (2) hidden Markov models (1)
hidden services (1) hidden-action (2) hidden-information (1)
hierarchical identity-based encryption (1) hierarchy (3) high availability (1)
high-throughput (1) highly dynamic groups (1) History (2)
hitting set attack (1) HKDF (1) HMAC (1)
home router (1) homomorphic encryption (2) homorphic encryption computation (1)
Hordes (3) host-independent (1) HTTP (2)
human factors (1) human society (1) Human–computer interaction (1)
Hunch (1) hybrid cellular networks (1) hybrid encryption (2)
Hydra (1) i-WAT (1) I2P (3)
IBBE (1) IBE (2) ICMP (1)
identity (1) Identity and Access Management (1) identity cost (1)
identity escrow (1) identity model (1) identity verification (1)
identity-based encryption (1) identity-free routing (1) IDs distribution (1)
IEEE 802.11 (1) IGOR (1) imcomplete knowledge (1)
incentive schemes (1) incentives (13) incomplete information (1)
index terms-dependability (1) indexing (1) indirect reciprocity (1)
indirection (1) individual performance (1) Inference algorithms (1)
inference attacks (1) inference mechanisms (1) information filtering (2)
information hiding (4) information leaks (1) information processing (1)
information retrieval (1) Information science (1) information security (2)
information sharing (1) information trading (1) information-theoretic security (1)
infranet (1) input/output (I/O) (1) installation (4)
integrated-services networks (1) integrity and security (1) integrity protection (1)
inter-domain routing (1) inter-packet delay (1) interdomain routing (1)
interest analysis (1) Internet (7) Internet communication (1)
internet congestion protocols (1) internet coordinates-embedding systems (1) Internet exchange (1)
internet routing (1) Internet service privacy (1) internet topology (1)
Internet user (1) Internetworking (1) intersection attacks (1)
intertorrent collaboration (1) intrusion detection (1) invertible bloom filter (1)
invertible-matrix (1) invisible (1) ip address (1)
IPTV (1) IRA (1) IRC (1)
irregular bipartite graphs (1) ISDN (1) isp (2)
iterated prisoner's dilemma (1) iterated prisoners (1) JAP (1)
job control (1) Join-leave attacks (1) KAD (6)
Kademlia (3) kalman filter (1) karma (1)
kazaa (1) KBR (1) Kernel (1)
Keso (1) key abstraction (1) key authentication (1)
key derivation (1) key management (1) keywords (4)
kNN classification (1) Knock (1) Koorde (1)
LA (1) Laboratories (1) Lagrangean conditions (1)
lambert w function (1) landmark work (1) LAP (1)
large block FEC codes (1) large scale content distribution (1) large scale testing (1)
large-scale software development (1) Last.fm (1) latency (7)
lattice attacks (1) LDGM (1) LDPC (3)
leader-follower games (1) learning automata (1) legal attack (2)
libextractor (1) libraries (2) Library Thing (1)
limited storage (1) limited-open-verification (1) linear coding (1)
linear programming (1) link estimation (1) link padding (1)
linq (1) Linux (1) load balancing (9)
local encodability (1) location privacy (1) location-aware topology (1)
Location-based services (1) LOF outlier detection (1) logic gates (1)
lookup (1) loss pattern (1) loss-resilient code (1)
lossless (1) low density (1) low latency anonymous networks (1)
low-density parity-check (4) Low-Energy Adaptive Clustering Hierarchy (1) LP decoding (1)
LPLC (1) LSD (1) machine learning (2)
malicious behavior detection (1) Malugo (1) march (1)
market (2) market-driven (1) Markov chain (5)
matching (2) maximum-likelihood (1) MBIOS (1)
MCTS (3) MCTS heuristic search (1) mdc (1)
MDS Codes (1) measurement (1) measurement data summarization (1)
mechanis design (1) mechanism design (5) media content (1)
Medical diagnostic imaging (1) membership concealment (1) memory erasure (1)
mercury (1) merge conflicts (1) mesh (1)
mesh networks (3) message logging (1) metadata (1)
metaheuristics (1) micropayments (1) Millionaires’ problem (1)
mininet (1) mix (19) mix cascades (1)
mix chain (1) mixed CSP (1) mobile Ad-hoc networks (15)
mobile peer-to-peer networks (1) mobility (1) model-driven (1)
ModelNet (1) modern board game (1) money burning (1)
monte carlo tree search (1) Monte-Carlo Tree Search (3) moral hazard (2)
moral-hazard (1) MORECOWBELL (4) Morphmix (1)
multi-authority (1) multi-channel (1) multi-dimensional range queries (1)
Multi-dimensional range query (1) multi-hop (1) multi-hop networks (6)
multi-path (1) multi-player online game (1) multi-torrent collaboration (1)
multi-user (1) multicast (16) multicasting (2)
multimedia (1) multimedia communication (1) multimedia systems (1)
Multiparty Computation (2) multiparty computation primitives (1) multiple description coding (1)
multiple objects (1) multiple sources (1) multiple storage locations (1)
multiple torrents (1) multiway cut (1) multple tree (1)
n-anonymous authentication (1) n-persona game (1) NAMECOIN (4)
nash equilibria (1) nash equilibrium (1) NAT (5)
nat traversal techniques (1) natural computation (1) nearest neighbor search (1)
Nearest neighbor searches (1) negociation (1) negotiation (1)
neighbor selection (2) neighborhood management (2) nesC (1)
net-neutrality (1) Netflix (1) netkit (1)
network (7) network address translation (1) network application (1)
network architecture (1) network coding (3) network complexity theory. (1)
network coordinates (2) network emulation (1) network filter (1)
network forensics (1) network infrastructure (1) network infrastructure state-level censorship (1)
Network management (2) network measurement (1) network positioning algorithms (1)
network positioning system (1) network positioning systems (1) network routing (1)
network security (2) network size estimation (7) network storage (1)
network topology (2) networking (1) networking costs (1)
networks (1) NFA (1) NICE (1)
node selection (1) noise (1) non-interactive (1)
non-membership proofs (1) non-monotonic access (1) nonlinear (1)
nonrelatives (1) nps (1) number theory (1)
obfuscated ciphertext mixing (1) Object clustering (1) oblivious circuits (2)
obsolete database (2) on-demand routing (1) OneSwarm (2)
onion routing (24) online anonymity (1) online marketplace (1)
online social networks (1) online-social-networks (1) open currency (1)
open-source (1) openDHT (2) OpenPGP (1)
opportunistic networks (1) OptAPO (1) optimal mechanism design (1)
optimistic replication (1) optimization (2) overcast (1)
overhead (1) overlay (5) overlay network (1)
overlay networks (20) overlay-network (1) overlays (1)
OverSim (1) P2P (135) P2P emulation (1)
p2p network (8) p2p overlay multicast system (1) p2p resource sharing (1)
p2p streaming system (1) p2psockets (1) packet forwarding (1)
packet loss (1) packet scheduling (1) packet timing information (1)
padding (1) paillier public-key system (1) Panic (1)
parameterized complexity (1) PARC (1) pareto (1)
Paris metro pricing (1) partial centralization technique (1) partially adversial cooperation (1)
partitioning graphs (1) pass (1) Pastis (1)
Pastry (2) path coupling (2) path diversity (1)
pattern clustering (1) pattern recognition (1) payment (3)
payments (1) peer behavior (1) peer performance (1)
peer resource contribution (1) peer sampling service (1) peer to peer (2)
Peer to peer computing (1) peer-to-peer (6) Peer-to-peer application (1)
peer-to-peer asymmetric file sharing system (1) peer-to-peer bartering (1) peer-to-peer computing (1)
peer-to-peer currencies (1) peer-to-peer file system (1) peer-to-peer live video streaming (1)
peer-to-peer networking (56) Peer-to-peer networks (1) Peer-to-Peer Proxy (1)
peer-to-peer storage (4) peer-to-peer storage system (1) peer-to-peer streaming (2)
Peer-to-peer systems (2) Peering (1) PeerLive (1)
Peerscape (1) PeerSim (1) per-flow (1)
performance (9) performance analysis (3) performance degradation (1)
Persona (1) personal area network (1) personal computer usage data (1)
personal data stores (1) Personalization (2) personalized Web search (1)
PGP (3) physical access (1) PIER (1)
pinning (1) Pipenet (1) PIR (1)
PIR-Tor (1) PKI (5) PlanetLab (4)
plush (1) pocket switched network (1) policy (2)
polling protocol (1) polynomial-sharing (1) Polynomials (1)
Portable media players (1) portable operating system interface (POSIX®) (1) POSIX (1)
power (1) predecessor attack (1) prescribed protocol (1)
presence (1) prices (1) pricing schemes (1)
principal-agent model (2) prisoner's dilemma (1) prisoners dilemma (1)
privacy (79) privacy enhancing technologies (3) Privacy Parameter (1)
privacy preservation (1) Privacy preserving (2) privacy preserving data mining (1)
Privacy preserving Set operations (1) privacy risks (1) privacy-enhanced revocation (1)
privacy-enhanced revocation. (1) privacy-enhancing revocation (1) privacy-enhancing technology (1)
privacy-preserving computation (1) Privacy-preserving computation of trust (1) Privacy-preserving data mining (1)
privacy-preserving set ntersection (1) private channels (1) private information retrieval (14)
private key (2) private multiparty summation protocol (1) private scalar product protocol (1)
private values model (1) proactive aggregation (1) proactive secret-sharing (1)
probabilistic attacks (1) probabilistic key sharing (1) probabilistic location (1)
Probabilistic logic (1) probabilistic structures (1) probabilistic techniques (1)
probability (1) problem (1) profile learning (1)
programmable networks (7) programming (1) proof of work (1)
proportional share (1) Proposals (1) protocol evaluation (1)
protocols (1) provable security (1) Proximax (1)
proximity neighbor selection (2) proximity route selection (1) proximity routing (1)
proxy (2) pseudonym (13) PSYC (1)
public key (1) public key cryptography (13) public key cryptosystem (1)
public key management (1) public key pinning (1) public verifiability (1)
public-key cryptography (1) publish/subscribe (4) pulse (1)
puzzle (1) QoS (5) quality of services (1)
queries (1) R5N (2) rainbow (1)
random (1) random graph theory (1) random graphs (1)
Random Membership (1) Random number generation (1) random sampling (2)
random walks (3) randomization (1) randomized partial checking (2)
randomized replicaed storage (1) range (1) range queries (5)
rapid mixing (3) Rate-Distortion (1) rateless code (1)
rateless-ness (1) re-encryption (5) read-only (1)
read-write (1) reciprocal altruism (1) reciprocity (1)
recommender system (2) recommender systems (3) record matching (1)
recovery algorithm (2) redundancy (7) Reed-Solomon (1)
Regenerating Codes (2) regular expressions (3) relaxation (1)
reliability (11) reliable multicast (1) remailer (3)
repetitive attack (1) replay protection (1) replica selection (1)
Replication (2) replication system (1) report (1)
reprocity mechanism (1) reputation (16) reputation management (1)
reputation mechanism (1) reputation system (4) reputation systems (1)
resilience (2) resilient overlay network (2) resource allocation (4)
resource discovery (2) resource exchange (2) resource peering (1)
resource sharing (1) resource utilization (1) retransmission timer estimation (1)
retrieval effectiveness (1) return address (1) Revenue Equivalence Theorem (1)
revocation (2) ring network (1) RIP (1)
robustness (16) rollback-recovery (1) route bridging attack (1)
route diversity (1) route metrics (1) routing (34)
routing allocation (1) routing geometry (1) routing protocols (1)
routing scalability (1) RSG (1) Rshare (1)
rumor (1) RWAP (1) SALAD (1)
sampling (1) Saturn (1) scalability (3)
scalable source routing (12) scalar product protocol (1) scalar-product (1)
schedule coordination (1) Scribe (2) SDSI (1)
search (7) search efficiency (1) search engines (2)
search intention (1) search refinement (1) search techniques (2)
secrecy (2) secret sharing (2) secret shraing (1)
secure file system (1) secure multi-party computation (10) secure multiparty computation (3)
secure protocol (1) secure protocols (1) Secure scalar product (2)
secure scalar-product protocols (1) secure supply (1) security (14)
security analysis (2) security model (2) security parameter (1)
security policy (3) security threat (1) self-organization (7)
self-policing network (1) selfish agent (1) selfish agents (1)
selfish neighbor selection (1) selfish overlay network (1) selfish routing (2)
sensor networks (10) separator (1) serverless (1)
serverless distributed file system architecture (1) service composition (1) service exchange (1)
session length (1) set difference (1) set reconciliation (3)
shared congestion (1) sharing (2) shell (1)
shortcut (1) shuffle network (1) side-channel attacks (1)
signaling traffic (1) signature scheme (1) Silk Road (1)
similarity measure (1) simulation (3) single system image (1)
skip graph (1) SkipNet (2) skype (1)
small-world (5) SMC (8) SNN clustering (1)
social capital (1) social dht (1) Social networking (2)
social networks (6) social-based (1) social-network-routing (1)
software merging (1) sparse bipartite graphs (1) spdy (1)
special needs (1) SRS (1) stable peer (1)
stale data (1) static analysis (1) statistical analysis (3)
Stealthnet (1) steganography (1) stochastic lifetime resilience (1)
storage (12) store information (1) strategy (2)
stream (1) streaming (1) structured overlays (1)
subjective blacklisting (1) subset-sums with noise (1) super-seeding (1)
Superposed sending. (1) supplychain management (1) survey (1)
swarm intelligence (1) SWIFT (1) SWIRL (1)
sybil (1) sybil accountsm (1) Sybil attack (8)
sybilGuard (1) sybilproof (2) symbolic evaluation (1)
Symphony (1) synchronous (1) system design (1)
system performance (1) system-wide anonymity metric (1) tagging attack (1)
Taler (1) tampering attack (1) Tarzan (1)
taste buddies (1) TCP Stealth (1) telecommunication network routing (1)
Telephony (1) telex (1) testbed (7)
text mining (2) theory (1) threshold cryptography (1)
throughput (1) throughtput maximization (1) timing attack (1)
timing attacks (1) TinyOS (2) tit-for-tat (3)
TLS (2) TOFU (1) top-k processing (1)
topology (1) topology matching (3) topology measurement (1)
Tor (27) Tor hidden services (1) tracing (1)
trade-off (1) trading (1) traffic (1)
traffic analysis (43) traffic analysis countermeasures (1) traffic classification (1)
traffic control (1) traffic engineering (3) traffic equilibrium (1)
traffic locality (1) traffic matrix (1) traffic measurement (1)
Traffic model (1) traffic watermark (1) transfer (1)
transitive trust (1) trees (1) trust (8)
trust computation (1) trust on first use (1) trusted network (1)
two-person nonzero sum games (1) ubiquitous computing (3) UCB (1)
UCT (1) unconditional security (2) universal re-encryption (4)
universal verifiability (1) UNIX (1) unlinkability (4)
unobservability (4) unstructured (1) unstructured peer-to-peer system (1)
untraceability (1) untrusted server (1) untrusted storage (1)
update complexity (1) upper confidence bounds (1) upper confidence bounds for trees (1)
uptime (1) usable security (1) User Attributes (1)
User generated content (1) user interfaces (1) user misbehavior (2)
user model (1) user modeling (1) user observability (1)
user profiles (3) user search histories (1) user-mode Linux (1)
VCG mechanism (2) verifiable shuffles (1) version control (2)
vertically partitioned frequent pattern mining (1) Viceroy (1) video streaming (1)
virtual currency (1) virtual laboratories (1) virtualization (4)
Vivaldi (2) VoIP (3) volunteer based anonymity network (1)
volunteer nodes (1) volunteer operated relays (1) voting (2)
vulnerability (2) WAT system (1) watermarking (1)
web (2) web personalization (1) Web search (1)
Web search engines (1) Web sites (1) website fingerprinting (1)
whitewash (1) whitewashing (1) Windows (2)
winner determination problem (1) wireless routing (1) wireless sensor network (7)
workload characterization (2) X-vine (1) X.509 (1)
zero-intelligence trader (1) Zooko's Triangle (1) ε (1)