You are here

Bibliography

Export 1152 results:
Author Title Type [ Year(Asc)]
2009
Kermarrec A-M. Challenges in Personalizing and Decentralizing the Web: An Overview of GOSSPLE. In: ; 2009. pp. 1–16.
Holz R, Haage D. CLIO/UNISONO: practical distributed and overlay- wide network measurement. In: ; 2009.
Melchor CA, Ait-Salem B, Gaborit P. A Collusion-Resistant Distributed Scalar Product Protocol with Application to Privacy-Preserving Computation of Trust. In: Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on. Network Computing and Applications, 2009. NCA 2009. Eighth IEEE International Symposium on. ; 2009.
Nojima R, Kadobayashi Y. Cryptographically secure Bloom-filters. Transactions on Data Privacy. 2009 ;2:131–139.
Narayanan A, Shmatikov V. De-anonymizing Social Networks. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. IEEE Computer Society; 2009. pp. 173–187. Available from: http://randomwalker.info/social-networks/
Badishi G, Caronni G, Keidar I, Rom R, Scott G. Deleting files in the Celeste peer-to-peer storage system. Journal of Parallel and Distributed Computing [Internet]. 2009 ;69(7):613–622. Available from: http://dl.acm.org/citation.cfm?id=1550962.1551186
McSherry F, Mironov I. Differentially Private Recommender Systems: Building Privacy into the Netflix Prize Contenders. In: Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. Proceedings of the 15th ACM SIGKDD International Conference on Knowledge Discovery and Data Mining. New York, NY, USA: ACM; 2009. Available from: http://doi.acm.org/10.1145/1557019.1557090
Hübsch C, Waldhorst OP. Enhancing Application-Layer Multicast Solutions by Wireless Underlay Support. In: Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany. Kommunikation in Verteilten Systemen (KiVS) 2009, Kassel, Germany. ; 2009. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.2935
Bucher M. Evaluation of Current P2P-SIP Proposals with Respect to the Igor/SSR API . Chair for Network Architectures. 2009 ;Computer Science.
Cholez T, Chrisment I, Festor O. Evaluation of Sybil Attacks Protection Schemes in KAD. In: AIMS'09 - Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services. Vol. 5637. AIMS'09 - Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services. Enschede, The Netherlands: Springer-Verlag; 2009. pp. 70–82. Available from: http://dx.doi.org/10.1007/978-3-642-02627-0_6
Bogetoft P, Christensen DL, Damgárd I, Geisler M, Jakobsen T, Krøigaard M, Nielsen JD, Nielsen JB, Nielsen K, Pagter J, et al. Financial Cryptography and Data Security. In: Dingledine R, Golle P Financial Cryptography and Data Security. Vol. 6052. 1stst ed. Financial Cryptography and Data Security. Berlin, Heidelberg: Springer-Verlag; 2009. pp. 325–343. Available from: http://dx.doi.org/10.1007/978-3-642-03549-4_20
Tran A, Hopper NJ, Kim Y. Hashing it out in public: Common failure modes of DHT-based anonymity schemes. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM; 2009. Available from: http://portal.acm.org/citation.cfm?id=1655188.1655199
Frey D, Guerraoui R, Kermarrec A-M, Koldehofe B, Mogensen M, Monod M, Quéma V. Heterogeneous gossip. In: Middleware '09: Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. Middleware '09: Proceedings of the 10th ACM/IFIP/USENIX International Conference on Middleware. New York, NY, USA: Springer-Verlag New York, Inc.; 2009. pp. 1–20. Available from: http://portal.acm.org/citation.cfm?id=1656984#
Steiner M, En-Najjary T, Biersack EW. Long term study of peer behavior in the KAD DHT. IEEE/ACM Transactions on Networking. 2009 ;17(5).
Saballus B, Fuhrmann T. Maintaining reference graphs of globally accessible objects in fully decentralized distributed systems. In: HPDC '09: Proceedings of the 18th ACM international symposium on High performance distributed computing. HPDC '09: Proceedings of the 18th ACM international symposium on High performance distributed computing. New York, NY, USA: ACM; 2009. pp. 59–60. Available from: http://portal.acm.org/citation.cfm?id=1551609.1551621#
Moscibroda T, Schmid S. On Mechanism Design without Payments for Throughput Maximization. In: INFOCOM'09. Proceedings of the 28th IEEE International Conference on Computer Communications. INFOCOM'09. Proceedings of the 28th IEEE International Conference on Computer Communications. Rio de Janeiro, Brazil: IEEE Computer Society; 2009. pp. 972-980.
Vasserman EY, Jansen R, Tyra J, Hopper NJ, Kim Y. Membership-concealing overlay networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 390–399. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653709
Schadd FC. Monte-Carlo Search Techniques in the Modern Board Game Thurn and Taxis. Knowledge Engineering. 2009 ;Master Science of Artificial Intelligence:93.
G. Narayanan S, Aishwarya T, Agrawal A, Patra A, Choudhary A, C. Rangan P. Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security. In: Garay JA, Miyaji A, Otsuka A Cryptology and Network Security. Vol. 5888. Cryptology and Network Security. Springer Berlin Heidelberg; 2009. pp. 21-40. Available from: http://dx.doi.org/10.1007/978-3-642-10433-6_2
Tsang PP, Kapadia A, Cornelius C, Smith S. Nymble: Blocking Misbehaving Users in Anonymizing Networks. IEEE Transactions on Dependable and Secure Computing (TDSC) [Internet]. 2009 . Available from: http://www.computer.org/portal/web/csdl/doi/10.1109/TDSC.2009.38
Moran T, Naor M, Segev G. An Optimally Fair Coin Toss. In: Reingold O Theory of Cryptography. Vol. 5444. Theory of Cryptography. Springer Berlin Heidelberg; 2009. pp. 1-18. Available from: http://dx.doi.org/10.1007/978-3-642-00457-5_1
Anon. Optimization of distributed services with UNISONO. In: GI/ITG KuVS Fachgespräch NGN Service Delivery Platforms & Service Overlay Networks. GI/ITG KuVS Fachgespräch NGN Service Delivery Platforms & Service Overlay Networks. ; 2009. Available from: http://www.net.in.tum.de/de/mitarbeiter/holz/
Schimmer L. Peer Profiling and Selection in the I2P Anonymous Network. In: PET-CON 2009.1. PET-CON 2009.1. TU Dresden, Germany ; 2009.
Montresor A, Jelasity M, Jesi GP, Voulgaris S. PeerSim: A Scalable P2P Simulator. In: P2P'09 - Proceedings of the 9th International Conference on Peer-to-Peer. P2P'09 - Proceedings of the 9th International Conference on Peer-to-Peer. Seattle, WA; 2009. pp. 99-100. Available from: http://peersim.sourceforge.net/
Plank JS, Luo J, Schuman CD, Xu L, Wilcox-O'Hearn Z. A performance evaluation and examination of open-source erasure coding libraries for storage. In: FAST'09 - Proccedings of the 7th Conference on File and Storage Technologies. FAST'09 - Proccedings of the 7th Conference on File and Storage Technologies. San Francisco, CA, USA: USENIX Association; 2009. pp. 253–265. Available from: http://www.usenix.org/event/fast09/tech/full_papers/plank/plank_html/

Pages