An Encoding for Censorship-Resistant Sharing
暂无分享,去创建一个
Christian Grothoff | Krista Grothoff | Jussi T. Lindgren | Tzvetan Horozov | T. Horozov | J. T. Lindgren | C. Grothoff | K. Grothoff | T. Horozov | J. T. Lindgren | Christian Grothoff
[1] Marvin Theimer,et al. Reclaiming space from duplicate files in a serverless distributed file system , 2002, Proceedings 22nd International Conference on Distributed Computing Systems.
[2] Eu-Jin Goh,et al. Secure Indexes , 2003, IACR Cryptol. ePrint Arch..
[3] Nick Feamster,et al. Infranet: Circumventing Web Censorship and Surveillance , 2002, USENIX Security Symposium.
[4] Dennis Shasha,et al. Building secure file systems out of byzantine storage , 2002, PODC '02.
[5] Maurice Herlihy,et al. How to Make Replicated Data Secure , 1987, CRYPTO.
[6] Ralph C. Merkle,et al. A Certified Digital Signature , 1989, CRYPTO.
[7] Edith Cohen,et al. Replication strategies in unstructured peer-to-peer networks , 2002, SIGCOMM.
[8] John H. Hartman,et al. The Swarm scalable storage system , 1999, Proceedings. 19th IEEE International Conference on Distributed Computing Systems (Cat. No.99CB37003).
[9] Bryce Wilcox-O ' Hearn. Experiences Deploying a Large-Scale Emergent Network , 2002 .
[10] R. S. Fabry,et al. A fast file system for UNIX , 1984, TOCS.
[11] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[12] DruschelPeter,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001 .
[13] Christian Grothoff,et al. An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks , 2005 .
[14] Antony I. T. Rowstron,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.
[15] R. Anderson. The Eternity Service , 1996 .
[16] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[17] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[18] Christian Grothoff,et al. Efficient Sharing of Encrypted Data , 2002, ACISP.
[19] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[20] Michael K. Reiter,et al. Censorship Resistance Revisited , 2005, Information Hiding.
[21] Emin Gün Sirer,et al. Fighting peer-to-peer SPAM and decoys with object reputation , 2005, P2PECON '05.
[22] Christian Grothoff. Reading file metadata with extract and libextractor , 2005 .
[23] Roger Dingledine,et al. The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[24] Robert Tappan Morris,et al. Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.
[25] Andrew V. Goldberg,et al. A prototype implementation of archival Intermemory , 1999, DL '99.
[26] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[27] David Mazières,et al. Self-certifying file system , 2000 .
[28] Adi Shamir,et al. How to share a secret , 1979, CACM.
[29] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[30] David Mazières,et al. Tangler: a censorship-resistant publishing system based on document entanglements , 2001, CCS '01.
[31] Aviel D. Rubin,et al. Publius: a robust, tamper-evident, censorship-resistant web publishing system , 2000 .
[32] Michael O. Rabin,et al. Efficient dispersal of information for security, load balancing, and fault tolerance , 1989, JACM.