You are here

Bibliography

Export 1152 results:
Author Title Type [ Year(Asc)]
2009
Malarkodi B, Rakesh P, Venkataramani B. Performance Evaluation of On-Demand Multipath Distance Vector Routing Protocol under Different Traffic Models. In: International Conference on Advances in Recent Technologies in Communication and Computing, 2009. ARTCom '09. International Conference on Advances in Recent Technologies in Communication and Computing, 2009. ARTCom '09. ; 2009. pp. 77-80.
Evans NS, Dingledine R, Grothoff C. A Practical Congestion Attack on Tor Using Long Paths. In: 18th USENIX Security Symposium. 18th USENIX Security Symposium. USENIX; 2009. pp. 33–50. Available from: http://grothoff.org/christian/tor.pdf
Duminuco A, Biersack EW. A Practical Study of Regenerating Codes for Peer-to-Peer Backup Systems. In: ICDCS'09 - Proceedings of the 29th IEEE International Conference on Distributed Computing Systems. ICDCS'09 - Proceedings of the 29th IEEE International Conference on Distributed Computing Systems. Montreal, Québec, Canada: IEEE Computer Society; 2009. pp. 376–384. Available from: http://dx.doi.org/10.1109/ICDCS.2009.14
McSherry FD. Privacy Integrated Queries: An Extensible Platform for Privacy-preserving Data Analysis. In: Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. Proceedings of the 2009 ACM SIGMOD International Conference on Management of Data. New York, NY, USA: ACM; 2009. Available from: http://doi.acm.org.eaccess.ub.tum.de/10.1145/1559845.1559850
Tariq MA, Koldehofe B, Koch GG, Rothermel K. Providing Probabilistic Latency Bounds for Dynamic Publish/Subscribe Systems. In: Kommunikation in Verteilten Systemen (KiVS). Kommunikation in Verteilten Systemen (KiVS). Gesellschaft fuer Informatik(GI); 2009. pp. 155–166. Available from: http://www.springerlink.com/content/x36578745jv7wr88/
Wu D, Liu Y, Ross KW. Queuing Network Models for Multi-Channel P2P Live Streaming Systems. In: INFOCOM'09. Proceedings of the 28th IEEE International Conference on Computer Communications. INFOCOM'09. Proceedings of the 28th IEEE International Conference on Computer Communications. Rio de Janeiro, Brazil: IEEE Computer Society; 2009. pp. 73-81.
McLachlan J, Hopper NJ. On the risks of serving whenever you surf: Vulnerabilities in Tor's blocking resistance design. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM; 2009. Available from: http://portal.acm.org/citation.cfm?id=1655193
Awerbuch B, Scheideler C. Robust Random Number Generation for Peer-to-Peer Systems. Theor. Comput. Sci. [Internet]. 2009 ;410:453–466. Available from: http://dx.doi.org/10.1016/j.tcs.2008.10.003
Di P, Fuhrmann T. Scalable landmark flooding: a scalable routing protocol for WSNs. In: Co-Next Student Workshop '09: Proceedings of the 5th international student workshop on Emerging networking experiments and technologies. Co-Next Student Workshop '09: Proceedings of the 5th international student workshop on Emerging networking experiments and technologies. New York, NY, USA: ACM; 2009. pp. 1–2. Available from: http://portal.acm.org/citation.cfm?id=1658997.1658999#
McLachlan J, Tran A, Hopper NJ, Kim Y. Scalable onion routing with Torsk. In: Proceedings of CCS 2009. Proceedings of CCS 2009. ACM New York, NY, USA; 2009. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653733
Mayer CP. Security and Privacy Challenges in the Internet of Things. In: Proceedings of KiVS Workshop on Global Sensor Networks (GSN09). Proceedings of KiVS Workshop on Global Sensor Networks (GSN09). ; 2009. Available from: http://doc.tm.uka.de/2009/security-gsn-camera-ready.pdf
Houri Y, Jobmann M, Fuhrmann T. Self-organized Data Redundancy Management for Peer-to-Peer Storage Systems. In: Self-Organizing Systems. Vol. Volume 5918/2009. Self-Organizing Systems. ; 2009. pp. 65-76. Available from: http://www.springerlink.com/content/28660w27373vh408/
Mittal P, Borisov N. ShadowWalker: Peer-to-peer Anonymous Communication Using Redundant Structured Topologies. In: Proceedings of the 16th ACM Conference on Computer and Communications Security. Proceedings of the 16th ACM Conference on Computer and Communications Security. New York, NY, USA: ACM; 2009. Available from: http://doi.acm.org/10.1145/1653662.1653683
Acher G, Fliegl D, Fuhrmann T. A Software and Hardware IPTV Architecture for Scalable DVB Distribution. International Journal of Digital Multimedia Broadcasting [Internet]. 2009 ;2009. Available from: http://www.hindawi.com/journals/ijdmb/2009/617203.html
Harvey P. Solving very large distributed constraint satisfaction problems. School of Computer Science and Software Engineering. 2009 ;Doctor of Philosophy:211.
Danezis G, Goldberg I. Sphinx: A Compact and Provably Secure Mix Format. In: Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. Proceedings of the 30th IEEE Symposium on Security and Privacy (S&P 2009), 17-20 May, Oakland, California, USA. IEEE Computer Society; 2009. pp. 269–282. Available from: http://portal.acm.org/citation.cfm?id=1607723.1608138
Briones-Garcıa JA, Koldehofe B, Rothermel K. SPINE : Adaptive Publish/Subscribe for Wireless Mesh Networks. In: Proc of the 8th IEEE International Conference on Innovative Internet Community Systems (I2CS 2008). Proc of the 8th IEEE International Conference on Innovative Internet Community Systems (I2CS 2008). ; 2009. Available from: http://studia.complexica.net/index.php?option=com_content&view=article&id=116%3Aspine--adaptive-publishsubscribe-for-wireless-mesh-networks-pp-320-353&catid=47%3Anumber-3&Itemid=89&lang=fr
Holz R, Mayer CP, Mies S, Niedermayer H, Tariq MA. SpoVNet Security Task Force Report. [Internet]. 2009 ;ISSN 1613-849X. Available from: http://doc.tm.uka.de/2009/TM-2009-3.pdf
Gamiochipi RLL, Griffin D, Clegg RG, Mykoniati E, Rio M. A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks. In: INFOCOM 2009. The 28th IEEE International Conference on Computer Communications. INFOCOM 2009. The 28th IEEE International Conference on Computer Communications. Rio de Janeiro, Brazil: IEEE Computer Society; 2009. pp. 343-351.
Resnick P, Sami R. Sybilproof Transitive Trust Protocols. In: EC'09. Proceedings of the 10th ACM Conference on Electronic commerce. EC'09. Proceedings of the 10th ACM Conference on Electronic commerce. Stanford, California, USA: ACM; 2009. pp. 345–354. Available from: http://doi.acm.org/10.1145/1566374.1566423
Kelly D. A taxonomy for and analysis of anonymous communications networks. [Internet]. 2009 . Available from: http://oai.dtic.mil/oai/oai?verb=getRecord&metadataPrefix=html&identifier=ADA495688
Mies S, Waldhorst OP, Wippel H. Towards End-to-End Connectivity for Overlays across Heterogeneous Networks. In: Proc. Int. Workshop on the Network of the Future (Future-Net 2009), co-located with IEEE Int. Conf. on Communications (ICC 2009). Proc. Int. Workshop on the Network of the Future (Future-Net 2009), co-located with IEEE Int. Conf. on Communications (ICC 2009). Dresden, Germany; 2009. Available from: http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=5207975
DiPalantino D, Johari R. Traffic Engineering vs. Content Distribution: A Game Theoretic Perspective. In: INFOCOM 2009. The 28th IEEE International Conference on Computer Communications. INFOCOM 2009. The 28th IEEE International Conference on Computer Communications. Rio de Janeiro: IEEE Computer Society; 2009. pp. 540-548.
Wright C, Coull SE, Monrose F. Traffic Morphing: An efficient defense against statistical traffic analysis. In: Proceedings of the Network and Distributed Security Symposium - {NDSS} '09. Proceedings of the Network and Distributed Security Symposium - {NDSS} '09. IEEE; 2009.
Elser B, Förschler A, Fuhrmann T. Tuning Vivaldi: Achieving Increased Accuracy and Stability. In: Self-Organizing Systems. Vol. Volume 5918/2009. Self-Organizing Systems. ; 2009. pp. 174-184. Available from: http://www.springerlink.com/content/h7r3q58251x72155/

Pages