Trust-based privacy preservation for peer-to-peer data sharing
暂无分享,去创建一个
[1] Scott Shenker,et al. Geographic routing without location information , 2003, MobiCom '03.
[2] Emin Gün Sirer,et al. Herbivore: A Scalable and Efficient Protocol for Anonymous Communication , 2003 .
[3] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[4] S. Buchegger,et al. Cooperation of Nodes. In: L. Buttyan and J.-P. Hubaux (eds.), Report on a Working Session on Security in Wireless Ad Hoc Networks , 2002 .
[5] Bharat K. Bhargava,et al. Authorization Based on Evidence and Trust , 2002, DaWaK.
[6] Aravind Srinivasan,et al. P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[7] Levente Buttyán,et al. Enforcing service availability in mobile ad-hoc WANs , 2000, MobiHoc.
[8] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[9] Ying Zhang,et al. Localization from mere connectivity , 2003, MobiHoc '03.
[10] B. Bhattacharjee,et al. A Protocol for Scalable Anonymous Communication , 1999 .
[11] Burton H. Bloom,et al. Space/time trade-offs in hash coding with allowable errors , 1970, CACM.
[12] Lorrie Faith Cranor,et al. Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System , 2000, USENIX Security Symposium.
[13] Bharat Bhargava,et al. Formalization of dynamic trust and uncertain evidence for user authorization , 2005 .
[14] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[15] Aviel D. Rubin,et al. Publius: a robust, tamper-evident, censorship-resistant web publishing system , 2000 .
[16] T. Başar,et al. A New Approach to Linear Filtering and Prediction Problems , 2001 .
[17] Leszek Lilien. Developing Pervasive Trust Paradigm for Authentication and Authorization , 2003 .
[18] Aravind Srinivasan,et al. P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[19] Latanya Sweeney,et al. Achieving k-Anonymity Privacy Protection Using Generalization and Suppression , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[20] Gary F. Templeton,et al. Managing P2P security , 2004, CACM.
[21] Ninghui Li,et al. Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..
[22] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[23] Ling Liu,et al. TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[24] Brian Neil Levine,et al. Responder anonymity and anonymous peer-to-peer file sharing , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[25] Latanya Sweeney,et al. k-Anonymity: A Model for Protecting Privacy , 2002, Int. J. Uncertain. Fuzziness Knowl. Based Syst..
[26] Paul Syverson,et al. Onion Routing for Anonymous and Private Internet Connections , 1999 .
[27] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[28] Ian Clarke,et al. Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..
[29] Emil C. Lupu,et al. Reconciling role based management and role based access control , 1997, RBAC '97.
[30] Xiaoyan Hong,et al. ANODR: anonymous on demand routing with untraceable routes for mobile ad-hoc networks , 2003, MobiHoc '03.
[31] Hemant K. Bhargava,et al. MMM: A Web-Based System for Sharing Statistical Computing Modules , 1997, IEEE Internet Comput..
[32] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[33] Li Xiao,et al. Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks , 2003, IEEE Trans. Parallel Distributed Syst..