You are here

Bibliography

Export 1152 results:
Author Title Type [ Year(Asc)]
2011
Westermann B, Kesdogan D. Malice versus AN.ON: Possible Risks of Missing Replay and Integrity Protection. In: FC'11 - Proceedings of Financial Cryptography and Data Security . FC'11 - Proceedings of Financial Cryptography and Data Security . St. Lucia; 2011.
Tariq MA, Koldehofe B, Koch GG, Khan I, Rothermel K. Meeting subscriber-defined QoS constraints in publish/subscribe systems. Concurr. Comput. : Pract. Exper. [Internet]. 2011 ;23:2140–2153. Available from: http://dx.doi.org/10.1002/cpe.1751
Evans NS. Methods for Secure Decentralized Routing in Open Networks. Network Architectures and Services, Department of Computer Science. 2011 ;Dr. rer. nat.:234.
Das K, Bhaduri K, Kargupta H. Multi-objective optimization based privacy preserving distributed data mining in Peer-to-Peer networks. Peer-to-Peer Networking and Applications [Internet]. 2011 ;4:192-209. Available from: http://dx.doi.org/10.1007/s12083-010-0075-1
Le Blond S, Manils P, Abdelberi C, Kaafar MA, Castelluccia C, Legout A, Dabbous W. One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users. In: 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11). 4th USENIX Workshop on Large-Scale Exploits and Emergent Threats (LEET '11). Boston, United States: USENIX; 2011. Available from: http://hal.inria.fr/inria-00574178/PDF/btor.pdf
Au MH, Tsang PP, Kapadia A. PEREA: Practical TTP-free revocation of repeatedly misbehaving anonymous users. ACM Transactions on Information and System Security ({ACM TISSEC}) [Internet]. 2011 ;14:29:1–29:34. Available from: http://doi.acm.org/10.1145/2043628.2043630
Polot B, Grothoff C. Performance Regression Monitoring with Gauger. LinuxJournal [Internet]. 2011 ;(209). Available from: http://www.linuxjournaldigital.com/linuxjournal/201109#pg68
Mittal P, Olumofin F, Troncoso C, Borisov N, Goldberg I. PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval. In: Proceedings of the 20th USENIX Security Symposium. Proceedings of the 20th USENIX Security Symposium. San Francisco, CA, USA; 2011.
Dreier J, Kerschbaum F. Practical Privacy-Preserving Multiparty Linear Programming Based on Problem Transformation. In: PASSAT'11 - Proceedings of the Third IEEE International Conference on Information Privacy, Security, Risk and Trust. PASSAT'11 - Proceedings of the Third IEEE International Conference on Information Privacy, Security, Risk and Trust. Boston, Massachusetts, USA: IEEE Computer Society; 2011. pp. 916-924.
Herrmann M. Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P. Lehrstuhl für Netzarchitekturen und Netzdienste. 2011 ;M.S.:59.
Herrmann M, Grothoff C. Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P. In: Privacy Enhancing Technologies Symposium (PETS 2011). Privacy Enhancing Technologies Symposium (PETS 2011). Waterloo, Canada: Springer Verlag; 2011.
Alaggan M, Gambs S, Kermarrec A-M. Private Similarity Computation in Distributed Systems: From Cryptography to Differential Privacy. In: Anta AFernàndez, Lipari G, Roy M Principles of Distributed Systems. Vol. 7109. Principles of Distributed Systems. Springer Berlin Heidelberg; 2011. pp. 357-377. Available from: http://dx.doi.org/10.1007/978-3-642-25873-2_25
Levchenko K, McCoy D. Proximax: Fighting Censorship With an Adaptive System for Distribution of Open Proxies. In: FC'11 - Proceedings of Financial Cryptography and Data Security . FC'11 - Proceedings of Financial Cryptography and Data Security . St. Lucia; 2011.
Kerschbaum F. Public-Key Encrypted Bloom Filters with Applications to Supply Chain Integrity. In: ; 2011. pp. 60–75.
Evans NS, Grothoff C. R5N : Randomized Recursive Routing for Restricted-Route Networks. In: 5th International Conference on Network and System Security (NSS 2011). 5th International Conference on Network and System Security (NSS 2011). Milan, Italy: IEEE; 2011.
Alvim MS, Andrés ME. On the Relation Between Differential Privacy and Quantitative Information Flow. In: Proceedings of the 38th International Conference on Automata, Languages and Programming - Volume Part II. Proceedings of the 38th International Conference on Automata, Languages and Programming - Volume Part II. Berlin, Heidelberg: Springer-Verlag; 2011. Available from: http://dl.acm.org/citation.cfm?id=2027223.2027228
Brumley BB, Tuveri N. Remote Timing Attacks are Still Practical. Cryptology ePrint Archive; 2011. Available from: http://eprint.iacr.org/2011/232
v. Loesch C, Toth GX, Baumann M. Scalability & Paranoia in a Decentralized Social Network. In: Federated Social Web. Federated Social Web. Berlin, Germany; 2011. Available from: http://secushare.org/2011-FSW-Scalability-Paranoia
Murillo J, Muñoz V, Busquets D, López B. Schedule coordination through egalitarian recurrent multi-unit combinatorial auctions. Applied Intelligence [Internet]. 2011 ;34(1):47–63. Available from: http://dx.doi.org/10.1007/s10489-009-0178-7
Pibernik R, Zhang Y, Kerschbaum F, Schröpfer A. Secure collaborative supply chain planning and inverse optimization - The JELS model. European Journal of Operations Research [Internet]. 2011 ;208(1):75 - 85 . Available from: http://www.sciencedirect.com/science/article/pii/S0377221710005552
Backes M, Maffei M, Pecina K. A Security API for Distributed Social Networks. In: NDSS'11 - Proceedings of the Network and Distributed Security Symposium. NDSS'11 - Proceedings of the Network and Distributed Security Symposium. San Diego, CA, USA: The Internet Society; 2011. Available from: http://www.lbs.cs.uni-saarland.de/publications/sapi.pdf
Ghosh A, Roth A. Selling Privacy at Auction. In: ; 2011. pp. 199–208.
Frey D, Jégou A, Kermarrec A-M. Social Market: Combining Explicit and Implicit Social Networks. In: Défago X, Petit F, Villain V Stabilization, Safety, and Security of Distributed Systems. Vol. 6976. Stabilization, Safety, and Security of Distributed Systems. Springer Berlin Heidelberg; 2011. pp. 193-207. Available from: http://dx.doi.org/10.1007/978-3-642-24550-3_16
Mittal P, Khurshid A, Juen J, Caesar M, Borisov N. Stealthy Traffic Analysis of Low-Latency Anonymous Communication Using Throughput Fingerprinting. In: CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. CCS'11 - Proceedings of the 18th ACM conference on Computer and Communications Security. Chicago, IL, United States: ACM; 2011.
Houmansadr A, Borisov N. SWIRL: A Scalable Watermark to Detect Correlated Network Flows. In: NDSS'11 - Proceedings of the Network and Distributed Security Symposium. NDSS'11 - Proceedings of the Network and Distributed Security Symposium. San Diego, CA, USA; 2011.

Pages