Measuring Freenet in the Wild: Censorship-Resilience under Observation
暂无分享,去创建一个
Stefanie Roos | Thorsten Strufe | Benjamin Schiller | Stefan Hacker | Benjamin Schiller | T. Strufe | Stefanie Roos | Stefan Hacker
[1] Jon M. Kleinberg,et al. The small-world phenomenon: an algorithmic perspective , 2000, STOC '00.
[2] H. Federrath. Freenet : A Distributed Anonymous Information Storage and Retrieval System in Designing Privacy Enhancing Technologies , 2001 .
[3] Krishna P. Gummadi,et al. A measurement study of Napster and Gnutella as examples of peer-to-peer file sharing systems , 2002, CCRV.
[4] Ian Clarke,et al. Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..
[5] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[6] Stefan Savage,et al. Understanding Availability , 2003, IPTPS.
[7] Krishna P. Gummadi,et al. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.
[8] Fabián E. Bustamante,et al. Friendships that Last: Peer Lifespan and its Role in P2P Protocols , 2003, WCW.
[9] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[10] John Kubiatowicz,et al. Handling churn in a DHT , 2004 .
[11] Thomas Fuhrmann,et al. Bootstrapping locality-aware P2P networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[12] Jia Wang,et al. Analyzing peer-to-peer traffic across large networks , 2004, IEEE/ACM Trans. Netw..
[13] Johan A. Pouwelse,et al. The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.
[14] Xiaoning Ding,et al. Measurements, analysis, and modeling of BitTorrent-like systems , 2005, IMC '05.
[15] J. Srivastava,et al. TR 05-030 Network Size Estimation In A Peer-to-Peer Network , 2005 .
[16] Daniel Stutzbach,et al. Understanding churn in peer-to-peer networks , 2006, IMC '06.
[17] Oskar Sandberg,et al. Distributed Routing in Small-World Networks , 2006, ALENEX.
[18] Christian Grothoff,et al. Routing in the Dark: Pitch Black , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[19] Mohamed Hefeeda,et al. Traffic modeling and proportional partial caching for peer-to-peer systems , 2008, TNET.
[20] Nicholas Hopper,et al. Membership-concealing overlay networks , 2009, CCS.
[21] Anja Feldmann,et al. Understanding online social network usage from a network perspective , 2009, IMC '09.
[22] Prateek Mittal,et al. ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies , 2009, CCS.
[23] I. Clarke,et al. Private Communication Through a Network of Trusted Connections : The Dark Freenet , 2010 .
[24] Thomas E. Anderson,et al. Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.
[25] Prateek Mittal,et al. X-Vine: Secure and Pseudonymous Routing Using Social Networks , 2011, ArXiv.
[26] Stefanie Roos,et al. Attack Resistant Network Embeddings for Darknets , 2011, 2011 IEEE 30th Symposium on Reliable Distributed Systems Workshops.
[27] Stefanie Roos,et al. A contribution to analyzing and enhancing Darknet routing , 2013, 2013 Proceedings IEEE INFOCOM.
[28] Zhenhai Duan,et al. A traceback attack on Freenet , 2013, 2013 Proceedings IEEE INFOCOM.
[29] David Wolinsky,et al. Hang with your buddies to resist intersection attacks , 2013, CCS.