You are here

Bibliography

Export 14 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is security  [Clear All Filters]
2013
Al-Ameen MN, Wright M. Persea: A Sybil-resistant Social DHT. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. Proceedings of the Third ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM; 2013. Available from: http://doi.acm.org.eaccess.ub.tum.de/10.1145/2435349.2435372
2011
Bauer K. Improving Security and Performance in Low Latency Anonymity Networks. Computer science. 2011 :240.
Backes M, Maffei M, Pecina K. A Security API for Distributed Social Networks. In: NDSS'11 - Proceedings of the Network and Distributed Security Symposium. NDSS'11 - Proceedings of the Network and Distributed Security Symposium. San Diego, CA, USA: The Internet Society; 2011. Available from: http://www.lbs.cs.uni-saarland.de/publications/sapi.pdf
Mittal P, Caesar M, Borisov N. X-Vine: Secure and Pseudonymous Routing Using Social Networks. Computer Research Repository [Internet]. 2011 ;abs/1109.0971. Available from: http://dblp.uni-trier.de/db/journals/corr/corr1109.html#abs-1109-0971
2010
Inan A, Kantarcioglu M, Ghinita G, Bertino E. Private Record Matching Using Differential Privacy. In: Proceedings of the 13th International Conference on Extending Database Technology. Proceedings of the 13th International Conference on Extending Database Technology. New York, NY, USA: ACM; 2010. Available from: http://doi.acm.org/10.1145/1739041.1739059
2009
Melchor CA, Ait-Salem B, Gaborit P. A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust. In: Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on. Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on. ; 2009.
Cholez T, Chrisment I, Festor O. Evaluation of Sybil Attacks Protection Schemes in KAD. In: AIMS'09 - Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services. Vol. 5637. AIMS'09 - Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services. Enschede, The Netherlands: Springer-Verlag; 2009. pp. 70–82. Available from: http://dx.doi.org/10.1007/978-3-642-02627-0_6
2007
Kaafar MA, Mathy L, Barakat C, Salamatian K, Turletti T, Dabbous W. Securing Internet Coordinate Embedding Systems. SIGCOMM Computer Communication Review [Internet]. 2007 ;37(4):61–72. Available from: http://doi.acm.org/10.1145/1282427.1282388
Conner W, Nahrstedt K. Securing peer-to-peer media streaming systems from selfish and malicious behavior. In: MDS'07. Proceedings of the 4th on Middleware Doctoral Symposium. Vol. 13. MDS'07. Proceedings of the 4th on Middleware Doctoral Symposium. Newport Beach, CA, USA: ACM; 2007. pp. 1–6. Available from: http://doi.acm.org/10.1145/1377934.1377937
2006
Atallah M, Blanton M, Deshpand V, Frikken K, Li J, Schwarz L. Secure Collaborative Planning, Forecasting, and Replenishment. In: Proceedings of Multi-Echelon/Public Applications of Supply Chain Management Conference. Proceedings of Multi-Echelon/Public Applications of Supply Chain Management Conference. ; 2006. pp. 1-52.
Levine BN, Shields C, Margolin BN. A Survey of Solutions to the Sybil Attack. Amherst, MA: University of Massachusetts Amherst; 2006. Available from: http://prisms.cs.umass.edu/brian/pubs/levine.sybil.tr.2006.pdf
2005
Garcia FD, Hoepman J-H. Off-line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications. In: ACNS'05. 3rd Applied Cryptography and Network Security Conference. Vol. 3531. ACNS'05. 3rd Applied Cryptography and Network Security Conference. New York, NY, USA: Springer; 2005. pp. 364–377.
2002
Fu K, Kaashoek FM, Mazières D. Fast and secure distributed read-only file system. In: OSDI 2000 - Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation. Vol. 20. OSDI 2000 - Proceedings of the 4th USENIX Symposium on Operating Systems Design and Implementation. San Diego, CA, USA: ACM; 2002. pp. 1–24. Available from: http://doi.acm.org/10.1145/505452.505453
Clifton C, Kantarcioglu M, Vaidya J, Lin X, Zhu MY. Tools for privacy preserving distributed data mining. SIGKDD Explorations Newsletter [Internet]. 2002 ;4(2):28–34. Available from: http://doi.acm.org/10.1145/772862.772867