You are here

Bibliography

Export 1150 results:
Author Title Type [ Year(Asc)]
2012
Tarkoma S, Rothenberg CE, Lagerspetz E. Theory and Practice of Bloom Filters for Distributed Systems. Communications Surveys Tutorials, IEEE. 2012 ;14:131-155.
Zeng Y, Zhong N, Ren X, Wang Y. User Interests Driven Web Personalization Based on Multiple Social Networks. In: Proceedings of the 4th International Workshop on Web Intelligence &\#38; Communities. Proceedings of the 4th International Workshop on Web Intelligence &\#38; Communities. New York, NY, USA: ACM; 2012. Available from: http://doi.acm.org/10.1145/2189736.2189749
2011
Bagai R, Lu H, Li R, Tang B. An Accurate System-Wide Anonymity Metric for Probabilistic Attacks. In: PETS'11 - Proceedings of the 11th Privacy Enhancing Technologies Symposium. PETS'11 - Proceedings of the 11th Privacy Enhancing Technologies Symposium. Waterloo, Canada; 2011.
Evans NS, Grothoff C. Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols. In: 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). 4th Workshop on Cyber Security Experimentation and Test (CSET 2011). San Francisco, California: USENIX Association; 2011.
Lofgren P, Hopper NJ. BNymble: More anonymous blacklisting at almost no cost. In: FC'11 - Proceedings of Financial Cryptography and Data Security . FC'11 - Proceedings of Financial Cryptography and Data Security . St. Lucia; 2011.
Smits R, Jain D, Pidcock S, Goldberg I, Hengartner U. BridgeSPA: Improving Tor Bridges with Single Packet Authorization. In: WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society . WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society . Chicago, IL, United States: ACM; 2011.
Houmansadr A, Nguyen GTK, Caesar M, Borisov N. Cirripede: Circumvention Infrastructure using Router Redirection with Plausible Deniability. In: CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. Chicago, IL, United States: ACM; 2011.
Bai X, Guerraoui R, Kermarrec A-M, Leroy V. Collaborative Personalized Top-k Processing. ACM Trans. Database Syst. [Internet]. 2011 ;36:26:1–26:38. Available from: http://doi.acm.org/10.1145/2043652.2043659
Shapiro M, Preguica N, Baquero C, Zawirski M. A comprehensive study of Convergent and Commutative Replicated Data Types. Le Chensay Cedex: INRIA Rocquencourt; 2011.
Furness J, Kolberg M. Considering Complex Search Techniques in DHTs under Churn. In: CCNC 2011 - IEEE Consumer Communications and Networking Conference. CCNC 2011 - IEEE Consumer Communications and Networking Conference. Las Vegas, NV, USA: IEEE Computer Society; 2011.
Karlin J, Ellard D, Jackson AW, Jones CE, Lauer G, Mankins DP, Strayer TW. Decoy Routing: Toward Unblockable Internet Communication. In: FOCI'11 - Proceedings of the USENIX Workshop on Free and Open Communications on the Internet. FOCI'11 - Proceedings of the USENIX Workshop on Free and Open Communications on the Internet. San Francisco, CA, USA; 2011.
AlSabah M, Bauer K, Goldberg I, Grunwald D, McCoy D, Savage S, Voelker GM. DefenestraTor: Throwing out Windows in Tor. In: PETS'11 - Proceedings of the 11th Privacy Enhancing Technologies Symposium . PETS'11 - Proceedings of the 11th Privacy Enhancing Technologies Symposium . Waterloo, Canada; 2011.
Beimel A, Nissim K, Omri E. Distributed Private Data Analysis: On Simultaneously Solving How and What. CoRR. 2011 ;abs/1103.2626.
Bauer K, Sherr M, McCoy D, Grunwald D. ExperimenTor: A Testbed for Safe and Realistic Tor Experimentation. In: CSET'11 - Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test. CSET'11 - Proceedings of the USENIX Workshop on Cyber Security Experimentation and Test. San Francisco, CA, USA; 2011.
Moore BW, Wacek C, Sherr M. Exploring the Potential Benefits of Expanded Rate Limiting in Tor: Slow and Steady Wins the Race With Tortoise. In: ACSAC'11 - Proceedings of 2011 Annual Computer Security Applications Conference. ACSAC'11 - Proceedings of 2011 Annual Computer Security Applications Conference. Orlando, FL, USA; 2011.
Luo X, Zhou P, Zhang J, Perdisci R, Lee W, Chang RKC. Exposing Invisible Timing-based Traffic Watermarks with BACKLIT. In: ACSAC'11 - Proceedings of 2011 Annual Computer Security Applications Conference . ACSAC'11 - Proceedings of 2011 Annual Computer Security Applications Conference . Orlando, FL, USA; 2011.
Lofgren P, Hopper NJ. FAUST: Efficient, TTP-Free Abuse Prevention by Anonymous Whitelisting. In: WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society. WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society. Chicago, IL, United States: ACM; 2011.
Prusty S, Levine BN, Liberatore M. Forensic investigation of the OneSwarm anonymous filesharing system. In: Proceedings of the 18th ACM conference on Computer and communications security. Proceedings of the 18th ACM conference on Computer and communications security. New York, NY, USA: ACM; 2011. pp. 201–214.
Henry R, Goldberg I. Formalizing Anonymous Blacklisting Systems. In: Proceedings of the 2011 IEEE Symposium on Security and Privacy. Proceedings of the 2011 IEEE Symposium on Security and Privacy. San Francisco, CA, USA; 2011.
Grothoff C. The Free Secure Network Systems Group: Secure Peer-to-Peer Networking and Beyond. In: SysSec 2011. SysSec 2011. Amsterdam, Netherlands; 2011.
Bernstein DJ, Duif N, Lange T, Schwabe P, Hang B-Y. High-speed high-security signatures. Journal of Cryptographic Engineering [Internet]. 2011 ;2:77--89. Available from: http://ed25519.cr.yp.to/papers.html
Lee J, Clifton C. How Much Is Enough? Choosing ε for Differential Privacy. In: Lai X, Zhou J, Li H Information Security. Vol. 7001. Information Security. Springer Berlin Heidelberg; 2011. pp. 325-340. Available from: http://dx.doi.org/10.1007/978-3-642-24861-0_22
Bauer K. Improving Security and Performance in Low Latency Anonymity Networks. Computer science. 2011 :240.
Westermann B, Kesdogan D. Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection. In: FC'11 - Proceedings of Financial Cryptography and Data Security . FC'11 - Proceedings of Financial Cryptography and Data Security . St. Lucia; 2011.
Tariq MA, Koldehofe B, Koch GG, Khan I, Rothermel K. Meeting subscriber-defined QoS constraints in publish/subscribe systems. Concurr. Comput. : Pract. Exper. [Internet]. 2011 ;23:2140–2153. Available from: http://dx.doi.org/10.1002/cpe.1751

Pages