You are here

Bibliography

Export 1150 results:
Author Title Type [ Year(Asc)]
2011
Yang Z, Wilson C, Wang X, Gao T, Zhao BY, Dai Y. Uncovering social network sybils in the wild. In: Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. Proceedings of the 2011 ACM SIGCOMM conference on Internet measurement conference. Berlin, Germany: ACM; 2011. pp. 259–268. Available from: http://doi.acm.org/10.1145/2068816.2068841
Panchenko A, Niessen L, Zinnen A, Engel T. Website Fingerprinting in Onion Routing Based Anonymization Networks. In: WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society. WPES'11 - Proceedings of the Workshop on Privacy in the Electronic Society. Chicago, IL, United States: ACM; 2011.
Eppstein D, Goodrich MT, Uyeda F, Varghese G. What's the difference?: efficient set reconciliation without prior context. In: Proceedings of the ACM SIGCOMM 2011 conference. Proceedings of the ACM SIGCOMM 2011 conference. New York, NY, USA: ACM; 2011. pp. 218–229. Available from: http://doi.acm.org/10.1145/2018436.2018462
Mittal P, Caesar M, Borisov N. X-Vine: Secure and Pseudonymous Routing Using Social Networks. Computer Research Repository [Internet]. 2011 ;abs/1109.0971. Available from: http://dblp.uni-trier.de/db/journals/corr/corr1109.html#abs-1109-0971
Calandrino JA, Kilzer A, Narayanan A, Felten EW, Shmatikov V. "You Might Also Like:" Privacy Risks of Collaborative Filtering. In: Security and Privacy (SP), 2011 IEEE Symposium on. Security and Privacy (SP), 2011 IEEE Symposium on. ; 2011.
2010
Polot B. Adapting Blackhat Approaches to Increase the Resilience of Whitehat Application Scenarios. Computer Science. 2010 ;M.S.
Kermarrec A-M, Leroy V, Moin A, Thraves C. Application of Random Walks to Decentralized Recommender Systems. In: 14th International Conference on Principles of Distributed Systems. 14th International Conference on Principles of Distributed Systems. ; 2010.
Hübsch C, Mayer CP, Waldhorst OP. The Ariba Framework for Application Development using Service Overlays. Praxis der Informationsverarbeitung und Kommunikation [Internet]. 2010 ;33(1):7-11. Available from: http://www.reference-global.com/doi/abs/10.1515/piko.2010.003
Müller A, Evans NS, Grothoff C, Kamkar S. Autonomous NAT Traversal. In: 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). Delft, The Netherlands: IEEE; 2010. Available from: http://grothoff.org/christian/pwnat.pdf
Yeoh W, Felner A, Koenig S. BnB-ADOPT: an asynchronous branch-and-bound DCOP algorithm. Journal of Artificial Intelligence Research [Internet]. 2010 ;38:85-133. Available from: http://www.jair.org/papers/paper2849.html
Ngan T-W ``J'', Dingledine R, Wallach DS. Building Incentives into Tor. In: Sion R Proceedings of Financial Cryptography (FC '10). Proceedings of Financial Cryptography (FC '10). ; 2010.
Koch GG, Koldehofe B, Rothermel K. Cordies: expressive event correlation in distributed systems. In: DEBS '10: Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems. DEBS '10: Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems. New York, NY, USA: ACM; 2010. pp. 26–37. Available from: http://portal.acm.org/citation.cfm?id=1827424&dl=GUIDE&coll=portal&CFID=97675623&CFTOKEN=70931453#
Krawczyk H. Cryptographic Extraction and Key Derivation: The HKDF Scheme. [Internet]. 2010 . Available from: http://eprint.iacr.org/2010/264
Ruottu T. Developing Peer-to-Peer Web Applications. Computer Science. 2010 ;M.S.:66.
Dwork C, Naor M, Pitassi T, Rothblum GN. Differential Privacy Under Continual Observation. In: Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC'10). Proceedings of the 42nd ACM Symposium on Theory of Computing (STOC'10). ; 2010. pp. 715–724.
Dwork C, Naor M. On the Difficulties of Disclosure Prevention in Statistical Databases or The Case for Differential Privacy. Journal of Privacy and Confidentiality [Internet]. 2010 ;2:93-107. Available from: http://research.microsoft.com/apps/pubs/default.aspx?id=135704
Leroy V. Distributing social applications. 2010 .
Danezis G, Diaz C, Troncoso C, Laurie B. Drac: An Architecture for Anonymous Low-Volume Communications. In: Atallah MJ, Hopper NJ Privacy Enhancing Technologies. Vol. 6205. Privacy Enhancing Technologies. Springer Berlin Heidelberg; 2010. pp. 202-219. Available from: http://dx.doi.org/10.1007/978-3-642-14527-8_12
Cholez T, Chrisment I, Festor O. Efficient DHT attack mitigation through peers’ ID distribution . In: HOTP2P'10 - International Workshop on Hot Topics in Peer-to-Peer Systems. HOTP2P'10 - International Workshop on Hot Topics in Peer-to-Peer Systems. Atlanta, Georgia, USA; 2010.
Koch GG, Tariq MA, Koldehofe B, Rothermel K. Event processing for large-scale distributed games. In: Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems. Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems. New York, NY, USA: ACM; 2010. pp. 103–104. Available from: http://doi.acm.org/10.1145/1827418.1827440
Bertier M, Frey D, Guerraoui R, Kermarrec A-M, Leroy V. The Gossple Anonymous Social Network. In: Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware . Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware . ACM/IFIP/USENIX; 2010. pp. 191–211.
Duminuco A, Biersack EW. Hierarchical codes: A flexible trade-off for erasure codes in peer-to-peer storage systems. Peer-to-Peer Networking and Applications. 2010 ;3(1):52-66.
Wen Z, Lin C-Y. How Accurately Can One's Interests Be Inferred from Friends?. In: Proceedings of the 19th International Conference on World Wide Web. Proceedings of the 19th International Conference on World Wide Web. New York, NY, USA: ACM; 2010. Available from: http://doi.acm.org/10.1145/1772690.1772875
Hopper NJ, Vasserman EY, Chan-Tin E. How Much Anonymity does Network Latency Leak?. ACM Transactions on Information and System Security [Internet]. 2010 :82 - 91. Available from: http://portal.acm.org/citation.cfm?id=1315245.1315257
Nguyen HX, Roughan M, Knight S, Falkner N, Maennel O, Bush R. How to Build Complex, Large-Scale Emulated Networks. In: TRIDENTCOM. TRIDENTCOM. ; 2010. pp. 3-18.

Pages