Privacy in Peer-to-Peer Networks
暂无分享,去创建一个
[1] Randall J. Atkinson,et al. Security Architecture for the Internet Protocol , 1995, RFC.
[2] Krishna P. Gummadi,et al. Canon in G major: designing DHTs with hierarchical structure , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[3] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[4] Miguel Castro,et al. Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.
[5] Patrick Valduriez,et al. Supporting Data Privacy in P2P Systems , 2013, Security and Privacy Preserving in Social Networks.
[6] Johan A. Pouwelse,et al. The Bittorrent P2P File-Sharing System: Measurements and Analysis , 2005, IPTPS.
[7] Diomidis Spinellis,et al. A survey of peer-to-peer content distribution technologies , 2004, CSUR.
[8] Evangelos P. Markatos,et al. Tracing a Large-Scale Peer to Peer System: An Hour in the Life of Gnutella , 2002, 2nd IEEE/ACM International Symposium on Cluster Computing and the Grid (CCGRID'02).
[9] Jon Crowcroft,et al. A survey and comparison of peer-to-peer overlay network schemes , 2005, IEEE Communications Surveys & Tutorials.
[10] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[11] Chuan Wu,et al. rStream: Resilient and Optimal Peer-to-Peer Streaming with Rateless Codes , 2008, IEEE Transactions on Parallel and Distributed Systems.
[12] Henning Schulzrinne,et al. Survey of Attacks and Defenses on P2PSIP Communications , 2012, IEEE Communications Surveys & Tutorials.
[13] Daniel J. Solove. A Taxonomy of Privacy , 2006 .
[14] Matei Ripeanu,et al. Peer-to-peer architecture case study: Gnutella network , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[15] Dan S. Wallach,et al. AP3: cooperative, decentralized anonymous communication , 2004, EW 11.
[16] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM 2002.
[17] Scott Shenker,et al. Querying the Internet with PIER , 2003, VLDB.
[18] Rüdiger Schollmeier,et al. A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications , 2001, Proceedings First International Conference on Peer-to-Peer Computing.
[19] Vijay S. Pande,et al. Folding@Home and Genome@Home: Using distributed computing to tackle previously intractable problem , 2009, 0901.0866.
[20] Niklas Carlsson,et al. Peer-assisted On-demand Video Streaming with Selfish Peers , 2009, Networking.
[21] Internet Architecture Board,et al. Peer-to-Peer (P2P) Architecture: Definition, Taxonomies, Examples, and Applicability , 2009, RFC.
[22] Ian T. Foster,et al. Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design , 2002, ArXiv.
[23] Nathaniel Good,et al. Usability and privacy: a study of Kazaa P2P file-sharing , 2003, CHI '03.
[24] L. Javier García-Villalba,et al. Advantages of identity certificate segregation in P2PSIP systems , 2011, IET Commun..
[25] Walid Dabbous,et al. I know where you are and what you are sharing: exploiting P2P communications to invade users' privacy , 2011, IMC '11.
[26] Stefan A. Brands,et al. Rethinking Public Key Infrastructures and Digital Certificates: Building in Privacy , 2000 .
[27] Robert Morris,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.
[28] Hoang Giang Ngo. From inter-connecting P2P overlays to co-operating P2P systems , 2013 .
[29] Amna Qureshi,et al. A survey on security, privacy and anonymity in legal distribution of copyrighted multimedia content over peer-to-peer networks , 2013 .
[30] Alberto Montresor,et al. Security and privacy issues in P2P streaming systems: A survey , 2011, Peer-to-Peer Netw. Appl..
[31] Jan Camenisch,et al. Information privacy?! , 2012, Comput. Networks.
[32] Anup Basu,et al. pcVOD: Internet Peer-to-Peer Video-On-Demand with Storage Caching on Peers , 2005, DMS.
[33] Alon Y. Halevy,et al. Piazza: data management infrastructure for semantic web applications , 2003, WWW '03.
[34] Nikita Borisov,et al. Anonymity in Structured Peer-to-Peer Networks , 2003 .
[35] Nathan S. Evans,et al. Pr2-P2PSIP: privacy preserving P2P signaling for VoIP and IM , 2010, IPTComm.
[36] Yunhao Liu,et al. AnySee: Peer-to-Peer Live Streaming , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[37] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[38] Bernhard Plattner,et al. Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection , 2002, WPES '02.
[39] Wenjie Wang,et al. Live streaming performance of the Zattoo network , 2009, IMC '09.
[40] Bharat K. Bhargava,et al. Trust-based privacy preservation for peer-to-peer data sharing , 2006, IEEE Transactions on Systems, Man, and Cybernetics - Part A: Systems and Humans.
[41] Eric Rescorla,et al. Datagram Transport Layer Security , 2006, RFC.
[42] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[43] Maher Khemakhem,et al. Taxonomy of Structured P2P Overlay Networks Security Attacks , 2012 .
[44] Ian Clarke,et al. Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..
[45] Moni Naor,et al. Viceroy: a scalable and dynamic emulation of the butterfly , 2002, PODC '02.
[46] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[47] Rakesh Kumar,et al. The FastTrack overlay: A measurement study , 2006, Comput. Networks.
[48] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[49] Ann L. Chervenak,et al. Peer-to-Peer Approaches to Grid Resource Discovery , 2007, CoreGRID Workshop - Making Grids Work.
[50] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[51] Antony I. T. Rowstron,et al. PAST: a large-scale, persistent peer-to-peer storage utility , 2001, Proceedings Eighth Workshop on Hot Topics in Operating Systems.
[52] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[53] Antonio F. Gómez-Skarmeta,et al. Cyclone: a novel design schema for hierarchical DHTs , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
[54] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[55] Tim Dierks,et al. The Transport Layer Security (TLS) Protocol Version 1.2 , 2008 .
[56] Krishna P. Gummadi,et al. Measuring and analyzing the characteristics of Napster and Gnutella hosts , 2003, Multimedia Systems.
[57] Ian T. Foster,et al. Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems , 2002, IPTPS.
[58] Dan S. Wallach,et al. A Survey of Peer-to-Peer Security Issues , 2002, ISSS.
[59] Ben Y. Zhao,et al. An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .
[60] Keith W. Ross,et al. A Measurement Study of a Large-Scale P2P IPTV System , 2007, IEEE Transactions on Multimedia.
[61] David P. Anderson,et al. SETI@home: an experiment in public-resource computing , 2002, CACM.
[62] Cullen Jennings,et al. SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System , 2005, First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA'05).
[63] Zhiyong Xu,et al. HIERAS: a DHT based hierarchical P2P routing algorithm , 2003, 2003 International Conference on Parallel Processing, 2003. Proceedings..
[64] Vinod Vaikuntanathan,et al. Information leak in the Chord lookup protocol , 2004 .
[65] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[66] Miguel Castro,et al. SplitStream: high-bandwidth multicast in cooperative environments , 2003, SOSP '03.
[67] Ravi S. Sandhu,et al. Peer-to-peer access control architecture using trusted computing technology , 2005, SACMAT '05.