A Framework for Privacy Preserving, Distributed Search Engine Using Topology of DLT and Onion Routing
暂无分享,去创建一个
[1] Jung Yeon Hwang,et al. Group signatures with controllable linkability for dynamic membership , 2013, Inf. Sci..
[2] J. M. Eklund,et al. Blockchain Technology in Healthcare: A Systematic Review , 2019, Healthcare.
[3] Nitin Rakesh,et al. Search engine optimization: Success factors , 2016, 2016 Fourth International Conference on Parallel, Distributed and Grid Computing (PDGC).
[4] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[5] Sunny King,et al. PPCoin: Peer-to-Peer Crypto-Currency with Proof-of-Stake , 2012 .
[6] Gary R. Orren,et al. The Electronic Commonwealth: The Impact of New Media Technologies on Democratic Politics , 1990 .
[7] Omer Tene. What Google Knows: Privacy and Internet Search Engines , 2007 .
[8] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[9] Ahmet Uyar,et al. Investigation of the accuracy of search engine hit counts , 2009, J. Inf. Sci..
[10] Bart Preneel,et al. Description of the YaCy Distributed Web Search Engine , 2014 .
[11] W. Harkness. Properties of the extended hypergeometric distribution , 1965 .
[12] Wolfgang Kerber,et al. Digital Markets, Data, and Privacy: Competition Law, Consumer Law, and Data Protection , 2016 .
[13] Satoshi Nakamoto. Bitcoin : A Peer-to-Peer Electronic Cash System , 2009 .
[14] David Starobinski,et al. Churn in the Bitcoin Network: Characterization and Impact , 2019, 2019 IEEE International Conference on Blockchain and Cryptocurrency (ICBC).
[15] Kishor S. Trivedi,et al. Performance Modeling of PBFT Consensus Process for Permissioned Blockchain Network (Hyperledger Fabric) , 2017, 2017 IEEE 36th Symposium on Reliable Distributed Systems (SRDS).
[16] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[17] Chun Chen,et al. Security and efficiency in roaming services for wireless networks: challenges, approaches, and prospects , 2013, IEEE Communications Magazine.
[18] Bart Preneel,et al. Censorship-resistant and privacy-preserving distributed web search , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.
[19] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[20] Mingwu Zhang,et al. Efficient Public Key Encryption With Equality Test Supporting Flexible Authorization , 2015, IEEE Transactions on Information Forensics and Security.
[21] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[22] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[23] Salil S. Kanhere,et al. BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.
[24] Mousa Farajallah,et al. Survey Paper: Cryptography Is The Science Of Information Security , 2011 .