You are here

Bibliography

Export 1139 results:
[ Author(Desc)] Title Type Year
A B C D E F G H I J K L M N O P Q R S T U V W X Y Z 
A
Aad I, Castelluccia C, Hubaux J-P. Packet coding for strong anonymity in ad hoc networks. [Internet]. 2006 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.2407
Abe M. Universally Verifiable mix-net With Verification Work Independent of The Number of mix Servers. In: Proceedings of EUROCRYPT 1998. Proceedings of EUROCRYPT 1998. Springer-Verlag, LNCS 1403; 1998. Available from: http://www.springerlink.com/content/hl8838u4l9354544/
Aberer K, Cudre-Mauroux P, Datta A, Despotovic Z, Hauswirth M, Punceva M, Schmidt R. P-Grid: A Self-organizing Structured P2P System. [Internet]. 2003 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.5649
Aberer K, Datta A, Hauswirth M. Multifaceted Simultaneous Load Balancing in DHT-based P2P systems: A new game with old balls and bins. In: Self-* Properties in Complex Information Systems, “Hot Topics” series, LNCS. Self-* Properties in Complex Information Systems, “Hot Topics” series, LNCS. Springer; 2004. Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.3746
Acedański S, Deb S, Médard M, Koetter R. How good is random linear coding based distributed networked storage?. In: NetCod'05 - First Workshop on Network Coding, Theory, and Applications. NetCod'05 - First Workshop on Network Coding, Theory, and Applications. Riva del Garda, Italy: Citeseer; 2005.
Acher G, Fliegl D, Fuhrmann T. A Software and Hardware IPTV Architecture for Scalable DVB Distribution. International Journal of Digital Multimedia Broadcasting [Internet]. 2009 ;2009. Available from: http://www.hindawi.com/journals/ijdmb/2009/617203.html
Acquisti A. Privacy in Electronic Commerce and the Economics of Immediate Gratification. [Internet]. 2004 . Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.58.3760&rep=rep1&type=pdf
Acquisti A, Dingledine R, Syverson P. On the Economics of Anonymity. In: Financial Cryptography. Springer-Verlag, LNCS 2742. Financial Cryptography. Springer-Verlag, LNCS 2742. ; 2003. pp. 84–102. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.13.5636&rep=rep1&type=pdf
Adams C. A Classification for Privacy Techniques. University of Ottawa Law & Technology Journal [Internet]. 2006 ;3:35–52. Available from: http://papers.ssrn.com/sol3/papers.cfm?abstract_id=999672
Adida B, Wikström D. Obfuscated Ciphertext Mixing. [Internet]. 2005 . Available from: http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.6592
Adida B, Wikström D. How to Shuffle in Public. In: Proceedings of the Theory of Cryptography 2007. Proceedings of the Theory of Cryptography 2007. Springer Berlin / Heidelberg; 2007. Available from: http://www.springerlink.com/content/j6p730488x602r28/
Adya A, Bolosky WJ, Castro M, Cermak G, Chaiken R, Douceur JR, Howell J, Lorch JR, Theimer M, Wattenhofer RP. FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted Environment. ACM SIGOPS Operating Systems Review [Internet]. 2002 ;36(SI):1–14. Available from: http://doi.acm.org/10.1145/844128.844130
Aekaterinidis I, Triantafillou P. PastryStrings: A Comprehensive Content-Based Publish/Subscribe DHT Network. In: Proceedings of the 26th IEEE International Conference on Distributed Computing Systems. Proceedings of the 26th IEEE International Conference on Distributed Computing Systems. Washington, DC, USA: IEEE Computer Society; 2006. p. 23–. Available from: http://dx.doi.org/10.1109/ICDCS.2006.63
Aggarwal V, Akonjang O, Feldmann A. Improving User and ISP Experience through ISP-aided P2P Locality. In: GI'08. Proceedings of 11th IEEE Global Internet Symposium 2008. GI'08. Proceedings of 11th IEEE Global Internet Symposium 2008. Phoenix, AZ: IEEE Computer Society; 2008.
Aggarwal CC, Yu PS. Privacy-Preserving Data Mining: Models and Algorithms. Springer US; 2008.
Agrawal D, Kesdogan D, Penz S. Probabilistic Treatment of MIXes to Hamper Traffic Analysis. In: Proceedings of the 2003 IEEE Symposium on Security and Privacy. Proceedings of the 2003 IEEE Symposium on Security and Privacy. IEEE Computer Society Washington, DC, USA; 2003. pp. 16–27. Available from: http://portal.acm.org/citation.cfm?id=829515.830557
Aguilar Melchor C, Deswarte Y, Iguchi-Cartigny J. Closed-Circuit Unobservable Voice Over IP. In: Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FL, USA. Proceedings of 23rd Annual Computer Security Applications Conference (ACSAC'07), Miami, FL, USA. IEEE Computer Society Press; 2007. Available from: http://www.computer.org/portal/web/csdl/doi/10.1109/ACSAC.2007.34
Ahmed R, Boutaba R. Distributed Pattern Matching: A Key to Flexible and Efficient P2P Search. In: 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006. 2006 IEEE/IFIP Network Operations and Management Symposium NOMS 2006. IEEE; 2006. pp. 198–208. Available from: http://dx.doi.org/10.1109/NOMS.2006.1687551
von Ahn L, Bortz A, Hopper NJ. k-Anonymous Message Transmission. In: Conference on Computer and Communications Security. Conference on Computer and Communications Security. Washington D.C., USA: ACM New York, NY, USA; 2003. Available from: http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.9.9348&rep=rep1&type=url&i=2
Aiyer AS, Alvisi L, Clement A, Dahlin M, Martin J-P, Porth C. BAR fault tolerance for cooperative services. SIGOPS Oper. Syst. Rev. [Internet]. 2005 ;39(5):45–58. Available from: http://portal.acm.org/citation.cfm?id=1095816#
Akerlof GA. The market for "lemons": Quality uncertainty and the market mechanism. The Quarterly Journal of Economics [Internet]. 1970 ;84(3):488-500. Available from: http://www.jstor.org/stable/1879431
Akhoondi M, Yu C, Madhyastha HV. LASTor: A Low-Latency AS-Aware Tor Client. In: Proceedings of the 2012 IEEE Symposium on Security and Privacy. Proceedings of the 2012 IEEE Symposium on Security and Privacy. San Francisco, CA, USA: IEEE Computer Society; 2012.
Al-Ameen MN, Wright M. Persea: A Sybil-resistant Social DHT. In: Proceedings of the Third ACM Conference on Data and Application Security and Privacy. Proceedings of the Third ACM Conference on Data and Application Security and Privacy. New York, NY, USA: ACM; 2013. Available from: http://doi.acm.org.eaccess.ub.tum.de/10.1145/2435349.2435372
Vasserman EY, Jansen R, Tyra J, Hopper NJ, Kim Y. Membership-concealing overlay networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 390–399. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653709
Alaggan M, Gambs S, Kermarrec A-M. BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters. In: Richa AW, Scheideler C Stabilization, Safety, and Security of Distributed Systems. Vol. 7596. Stabilization, Safety, and Security of Distributed Systems. Springer Berlin Heidelberg; 2012. pp. 202-216. Available from: http://dx.doi.org/10.1007/978-3-642-33536-5_20

Pages