Mistrustful P2P: Deterministic privacy-preserving P2P file sharing model to hide user content interests in untrusted peer-to-peer networks
暂无分享,去创建一个
[1] Mohamed Ali Kâafar,et al. Digging into Anonymous Traffic: A Deep Analysis of the Tor Anonymizing Network , 2010, 2010 Fourth International Conference on Network and System Security.
[2] Xiaoning Ding,et al. A performance study of BitTorrent-like peer-to-peer systems , 2007, IEEE Journal on Selected Areas in Communications.
[3] R. Spinello. Intellectual Property: Legal and Moral Challenges of Online File Sharing , 2014 .
[4] John Nagle,et al. Congestion control in IP/TCP internetworks , 1984, CCRV.
[5] Johan A. Pouwelse,et al. The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.
[6] Johan A. Pouwelse,et al. Hiding user content interest while preserving P2P performance , 2014, SAC.
[7] Angelos D. Keromytis,et al. Detection and analysis of eavesdropping in anonymous communication networks , 2014, International Journal of Information Security.
[8] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[9] Manuel Ricardo,et al. Storm: Rateless MDS Erasure Codes , 2014, WICON.
[10] Joongheon Kim,et al. The Sybil Attacks and Defenses: A Survey , 2013, Smart Comput. Rev..
[11] Tracey Ho,et al. Modeling Flash Crowd Performance in Peer-to-Peer File Distribution , 2014, IEEE Transactions on Parallel and Distributed Systems.
[12] Daniel Stutzbach,et al. Understanding churn in peer-to-peer networks , 2006, IMC '06.
[13] Thomas E. Anderson,et al. Privacy-preserving P2P data sharing with OneSwarm , 2010, SIGCOMM '10.
[14] Rafael Capurro,et al. Intercultural Information Ethics , 2018 .
[15] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[16] Shi-Chun Tsai,et al. On the inapproximability of maximum intersection problems , 2012, Inf. Process. Lett..
[17] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[18] Keith W. Miller,et al. Computer ethics : analyzing information technology , 2009 .
[19] P. Savola. The Ultimate Copyright Shopping Opportunity – Jurisdiction and Choice of Law in Website Blocking Injunctions , 2014 .
[20] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[21] J. Quintais. Private Copying and Downloading from Unlawful Sources , 2015 .
[22] J. Clough. Principles of Cybercrime , 2010, The Military Law and the Law of War Review.
[23] Manuel Ricardo,et al. Mistrustful P2P: Privacy-preserving file sharing over untrustworthy Peer-to-Peer networks , 2016, 2016 IFIP Networking Conference (IFIP Networking) and Workshops.
[24] Sean W. Smith,et al. Nymble: Blocking Misbehaving Users in Anonymizing Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[26] Manuel Ricardo,et al. CIDRarchy: CIDR-based ns-3 routing protocol for large scale network simulation , 2015, SimuTools.
[27] Dan S. Wallach,et al. The BitTorrent Anonymity Marketplace , 2011, ArXiv.
[28] Dirk Grunwald,et al. BitBlender: light-weight anonymity for BitTorrent , 2008, AIPACa '08.
[29] Sachin Katti,et al. Information Slicing: Anonymity Using Unreliable Overlays , 2007, NSDI.
[30] Maher Khemakhem,et al. Mitigation of Sybil Attacks in Structured P2P Overlay Networks , 2012, 2012 Eighth International Conference on Semantics, Knowledge and Grids.
[31] Walid Dabbous,et al. One Bad Apple Spoils the Bunch: Exploiting P2P Applications to Trace and Profile Tor Users , 2011, LEET.
[32] K. Himma. The Handbook of Information and Computer Ethics , 2007 .