You are here

Bibliography

Export 1150 results:
Author Title Type [ Year(Asc)]
2012
Sadiq U, Kumar M, Wright M. CRISP: Collusion-resistant Incentive-compatible Routing and Forwarding in Opportunistic Networks. In: Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. Proceedings of the 15th ACM International Conference on Modeling, Analysis and Simulation of Wireless and Mobile Systems. New York, NY, USA: ACM; 2012. Available from: http://doi.acm.org/10.1145/2387238.2387253
Narayanan A, Toubiana V, Barocas S, Nissenbaum H, Boneh D. A Critical Look at Decentralized Personal Data Architectures. CoRR. 2012 ;abs/1202.4503.
Szengel M. Decentralized Evaluation of Regular Expressions for Capability Discovery in Peer-to-Peer Networks. Department of Computer Science. 2012 ;M.S.:100.
Schanzenbach M. Design and Implementation of a Censorship Resistant and Fully Decentralized Name System. Fakultaet fuer Informatik. 2012 ;M.Sc.:116.
Dodis Y, López-Alt A, Mironov I, Vadhan S. Differential Privacy with Imperfect Randomness. In: Safavi-Naini R, Canetti R Advances in Cryptology – CRYPTO 2012. Vol. 7417. Advances in Cryptology – CRYPTO 2012. Springer Berlin Heidelberg; 2012. pp. 497-516. Available from: http://dx.doi.org/10.1007/978-3-642-32009-5_29
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. Garching bei Muenchen: Technische Universitaet Muenchen; 2012.
Evans NS, Polot B, Grothoff C. Efficient and Secure Decentralized Network Size Estimation. In: IFIP International Conferences on Networking (Networking 2012). IFIP International Conferences on Networking (Networking 2012). Prague, CZ: Springer Verlag; 2012. p. 304--317. Available from: http://grothoff.org/christian/rrsize2012.pdf
van de Bovenkamp R, Kuipers F, Mieghem PV. Gossip-based counting in dynamic networks. In: IFIP International Conferences on Networking (Networking 2012). IFIP International Conferences on Networking (Networking 2012). Prague, CZ: Springer Verlag; 2012. pp. 404–419.
Hermenier F, Ricci R. How to Build a Better Testbed: Lessons from a Decade of Network Experiments on Emulab. In: TRIDENTCOM. TRIDENTCOM. ; 2012. pp. 287-304.
Guha S, Jain M, Padmanabhan V. Koi: A Location-Privacy Platform for Smartphone Apps. In: {Proceedings of the 9th Symposium on Networked Systems Design and Implementation (NSDI)}. {Proceedings of the 9th Symposium on Networked Systems Design and Implementation (NSDI)}. San Jose, CA; 2012.
Hsiao H-C, Kim TH-J, Perrig A, Yamada A, Nelson S, Gruteser M, Ming W. LAP: Lightweight Anonymity and Privacy. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. Proceedings of the 2012 IEEE Symposium on Security and Privacy. San Francisco, CA, USA: IEEE Computer Society; 2012.
Akhoondi M, Yu C, Madhyastha HV. LASTor: A Low-Latency AS-Aware Tor Client. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. Proceedings of the 2012 IEEE Symposium on Security and Privacy. San Francisco, CA, USA: IEEE Computer Society; 2012.
De A. Lower Bounds in Differential Privacy. In: Cramer R Theory of Cryptography. Vol. 7194. Theory of Cryptography. Springer Berlin Heidelberg; 2012. pp. 321-338. Available from: http://dx.doi.org/10.1007/978-3-642-28914-9_18
Rossi D, Veglia P, Sammarco M, Larroca F. ModelNet-TE: An emulation tool for the study of P2P and traffic engineering interaction dynamics. Peer-to-Peer Networking and Applications. 2012 :1–19.
Halim SA. Monkey: Automated debugging of deployed distributed systems. Department of Computer Science. 2012 ;M.S.:78.
Wander M, Holzapfel S, Wacker A, Weis T. NTALG - TCP NAT traversal with application-level gateways. In: Consumer Communications and Networking Conference (CCNC), 2012 IEEE. Consumer Communications and Networking Conference (CCNC), 2012 IEEE. ; 2012.
Wang Q, Borisov N. Octopus: A Secure and Anonymous DHT Lookup. CoRR [Internet]. 2012 ;abs/1203.2668. Available from: http://dblp.uni-trier.de/db/journals/corr/corr1203.html#abs-1203-2668
Dyer KP, Coull SE, Ristenpart T, Shrimpton T. Peek-a-Boo, I Still See You: Why Efficient Traffic Analysis Countermeasures Fail. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. Proceedings of the 2012 IEEE Symposium on Security and Privacy. San Francisco, CA, USA: IEEE Computer Society; 2012.
Toch E, Wang Y, Cranor LF. Personalization and privacy: a survey of privacy risks and remedies in personalization-based systems. User Modeling and User-Adapted Interaction [Internet]. 2012 ;22:203-220. Available from: http://dx.doi.org/10.1007/s11257-011-9110-z
Dwork C, Naor M, Vadhan SP. The Privacy of the Analyst and the Power of the State. In: ; 2012. pp. 400–409.
Moin A. Recommendation and Visualization Techniques for Large Scale Data. 2012 .
Handigol N, Heller B, Jeyakumar V, Lantz B, McKeown N. Reproducible network experiments using container based emulation. Proc. CoNEXT. 2012 .
Pitoura T, Ntarmos N, Triantafillou P. Saturn: Range Queries, Load Balancing and Fault Tolerance in DHT Data Systems. IEEE Transactions on Knowledge and Data Engineering. 2012 ;24(7).
Zhou X, Xu Y, Li Y, Josang A, Cox C. The state-of-the-art in personalized recommender systems for social networking. Artificial Intelligence Review [Internet]. 2012 ;37:119-132. Available from: http://dx.doi.org/10.1007/s10462-011-9222-1
Browne C, Powley E, Whitehouse D, Lucas S, Cowling PI, Rohlfshagen P, Tavener S, Perez D, Samothrakis S, Colton S. A Survey of Monte Carlo Tree Search Methods. IEEE Transactions on Computational Intelligence and AI in Games. 2012 ;4(1):1-43.

Pages