Preserving receiver's anonymity for circular structured P2P networks
暂无分享,去创建一个
[1] Matthew K. Wright,et al. Salsa: a structured approach to large-scale anonymity , 2006, CCS '06.
[2] Ling Liu,et al. Agyaat: mutual anonymity over structured P2P networks , 2006, Internet Res..
[3] Michela Meo,et al. Self-Chord: A Bio-inspired Algorithm for Structured P2P Systems , 2009, 2009 9th IEEE/ACM International Symposium on Cluster Computing and the Grid.
[4] Prateek Mittal,et al. ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies , 2009, CCS.
[5] Nikita Borisov,et al. Breaking the Collusion Detection Mechanism of MorphMix , 2006, Privacy Enhancing Technologies.
[6] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[7] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[8] Emin Gün Sirer,et al. Herbivore: A Scalable and Efficient Protocol for Anonymous Communication , 2003 .
[9] Christian Grothoff,et al. gap - Practical Anonymous Networking , 2003, Privacy Enhancing Technologies.
[10] Gennaro Cordasco,et al. F-Chord: Improved Uniform Routing on Chord , 2004 .
[11] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[12] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[13] Amiya Nayak,et al. Hybrid-Chord: A Peer-to-Peer System Based on Chord , 2004, ICDCIT.
[14] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[15] Bernhard Plattner,et al. Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.
[16] Aravind Srinivasan,et al. P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[17] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[18] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[19] Yiming Hu,et al. TAP: a novel tunneling approach for anonymity in structured P2P systems , 2004, International Conference on Parallel Processing, 2004. ICPP 2004..
[20] Nikita Borisov,et al. Anonymity in Structured Peer-to-Peer Networks , 2003 .
[21] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[22] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[23] Aravind Srinivasan,et al. P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[24] Thomas E. Anderson,et al. Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.
[25] Dan S. Wallach,et al. AP3: cooperative, decentralized anonymous communication , 2004, EW 11.
[26] Ben Y. Zhao,et al. Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.