You are here

Bibliography

Export 1150 results:
Author Title Type [ Year(Asc)]
2010
Gamiochipi RLL. Incentive-driven QoS in peer-to-peer overlays. Department of Electronic and Electrical Engineering [Internet]. 2010 ;PhD:209. Available from: http://eprints.ucl.ac.uk/19490/
Chan Y-W, Ho T-H, Shih P-C, Chung Y-C. Malugo: A peer-to-peer storage system. [Internet]. 2010 . Available from: http://www.ingentaconnect.com/content/ind/ijahuc/2010/00000005/00000004/art00002;jsessionid=kcpun0o76hoe.alexandra
Albrecht JR, Huang DY. Managing Distributed Applications Using Gush. In: TRIDENTCOM. TRIDENTCOM. ; 2010. pp. 401-411.
Perälä PHJ, Paananen JP, Mukhopadhyay M, Laulajainen J-P. A Novel Testbed for P2P Networks. In: TRIDENTCOM. TRIDENTCOM. ; 2010. pp. 69-83.
Locher T, Mysicka D, Schmid S, Wattenhofer RP. Poisoning the Kad network. In: ICDCN'10 - Proceedings of the 11th International Conference on Distributed Computing and Networking. ICDCN'10 - Proceedings of the 11th International Conference on Distributed Computing and Networking. Kolkata, India: Springer-Verlag; 2010. pp. 195–206. Available from: http://dl.acm.org/citation.cfm?id=2018057.2018085
Fessi A, Evans NS, Niedermayer H, Holz R. Pr2-P2PSIP: Privacy Preserving P2P Signaling for VoIP and IM. In: Principles, Systems and Applications of IP Telecommunications (IPTComm), Munich. Principles, Systems and Applications of IP Telecommunications (IPTComm), Munich. Munich, Germany; 2010. pp. 141–152.
Isdal T, Piatek M, Krishnamurthy A, Anderson T. Privacy-preserving P2P data sharing with OneSwarm. SIGCOMM Comput. Commun. Rev. [Internet]. 2010 ;40:111–122. Available from: http://doi.acm.org/10.1145/1851275.1851198
Pang H, Shen J, Krishnan R. Privacy-preserving similarity-based text retrieval. ACM Trans. Internet Technol. 2010 ;10:1–39.
Inan A, Kantarcioglu M, Ghinita G, Bertino E. Private Record Matching Using Differential Privacy. In: Proceedings of the 13th International Conference on Extending Database Technology. Proceedings of the 13th International Conference on Extending Database Technology. New York, NY, USA: ACM; 2010. Available from: http://doi.acm.org/10.1145/1739041.1739059
Tariq MA, Koldehofe B, Altaweel A, Rothermel K. Providing basic security mechanisms in broker-less publish/subscribe systems. In: DEBS '10: Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems. DEBS '10: Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems. New York, NY, USA: ACM; 2010. pp. 38–49. Available from: http://portal.acm.org/citation.cfm?id=1827418.1827425&coll=portal&dl=GUIDE#
Hübsch C, Mayer CP, Mies S, Bless R, Waldhorst OP, Zitterbart M. Reconnecting the internet with ariba: self-organizing provisioning of end-to-end connectivity in heterogeneous networks. SIGCOMM Comput. Commun. Rev. [Internet]. 2010 ;40:131–132. Available from: http://portal.acm.org/citation.cfm?doid=1672308.1672334#
Hübsch C, Mayer CP, Waldhorst OP. On Runtime Adaptation of Application-Layer Multicast Protocol Parameters. In: Proceedings of Networked Services and Applications – Engineering, Control and Management (EUNICE). Proceedings of Networked Services and Applications – Engineering, Control and Management (EUNICE). Trondheim, Norway: Springer; 2010. Available from: http://www.tm.uni-karlsruhe.de/itm/WebMan/view.php?view=publikationen_detail&id=389&lang=en
Krause S, Hübsch C. Scalable Application-Layer Multicast Simulations with OverSim. In: 7th Annual IEEE Consumer Communiations & Networking Conference. 7th Annual IEEE Consumer Communiations & Networking Conference. ; 2010.
Burkhart M, Strasser M, Many D, Dimitropoulos X. SEPIA: privacy-preserving aggregation of multi-domain network events and statistics. In: Proceedings of the 19th USENIX conference on Security. Proceedings of the 19th USENIX conference on Security. Washington, DC, USA: USENIX Association; 2010. pp. 15–15. Available from: http://dl.acm.org/citation.cfm?id=1929820.1929840
Marks D, Tschorsch F, Scheuermann B. Unleashing Tor, BitTorrent & Co.: How to Relieve TCP Deficiencies in Overlays. In: LCN 2010: Proceedings of the 35th IEEE Conference on Local Computer Networks. LCN 2010: Proceedings of the 35th IEEE Conference on Local Computer Networks. ; 2010.
Hübsch C, Mayer CP, Waldhorst OP. User-perceived Performance of the NICE Application Layer Multicast Protocol in Large and Highly Dynamic Groups. In: Proceedings of 15th International GI/ITG Conference on "Measurement, Modelling and Evaluation of Computing Systems". Proceedings of 15th International GI/ITG Conference on "Measurement, Modelling and Evaluation of Computing Systems". Essen, Germany: Springer Berlin, Heidelberg; 2010. pp. 62–77. Available from: http://www.springerlink.com/content/t6k421560103540n/
Hübsch C, Mayer CP, Mies S, Bless R, Waldhorst OP, Zitterbart M. Using Legacy Applications in Future Heterogeneous Networks with ariba. In: Proceedings of IEEE INFOCOM. Proceedings of IEEE INFOCOM. San Diego, CA, USA; 2010.
2009
Edman M, Syverson P. AS-awareness in Tor path selection. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 380–389. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653708
Attrapadung N, Imai H. Attribute-Based Encryption Supporting Direct/Indirect Revocation Modes. In: Proceedings of the 12th IMA International Conference on Cryptography and Coding. Proceedings of the 12th IMA International Conference on Cryptography and Coding. Cirencester, UK: Springer-Verlag; 2009. pp. 278–300. Available from: http://dx.doi.org/10.1007/978-3-642-10868-6_17
Troncoso C, Danezis G. The bayesian traffic analysis of mix networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 369–379. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653707
Mayer CP. Bloom filters and overlays for routing in pocket switched networks. In: Co-Next Student Workshop '09: Proceedings of the 5th international student workshop on Emerging networking experiments and technologies. Co-Next Student Workshop '09: Proceedings of the 5th international student workshop on Emerging networking experiments and technologies. New York, NY, USA: ACM; 2009. pp. 43–44. Available from: http://portal.acm.org/citation.cfm?doid=1658997.1659021#
Knoll M, Helling M, Wacker A, Holzapfel S, Weis T. Bootstrapping Peer-to-Peer Systems Using IRC. In: WETICE'09 - Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises. WETICE'09 - Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises. Groningen, The Netherlands: IEEE Computer Society; 2009. pp. 122–127. Available from: http://dx.doi.org/10.1109/WETICE.2009.40
Bortnikov E, Gurevich M, Keidar I, Kliot G, Shraer A. Brahms: Byzantine Resilient Random Membership Sampling. Computer Networks Journal (COMNET), Special Issue on Gossiping in Distributed Systems. 2009 .
Kermarrec A-M. Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLE. In: ; 2009. pp. 1–16.
Holz R, Haage D. CLIO/UNISONO: practical distributed and overlay- wide network measurement. In: ; 2009.

Pages