On preserving privacy in content-oriented networks
暂无分享,去创建一个
Scott Shenker | Teemu Koponen | Barath Raghavan | Somaya Arianfar | S. Shenker | Barath Raghavan | S. Arianfar | Teemu Koponen | B. Raghavan
[1] Silvio Micali,et al. Non-Interactive Oblivious Transfer and Spplications , 1989, CRYPTO.
[2] David R. Safford,et al. Practical Private Information Retrieval with Secure Coprocessors , 2000 .
[3] Joan Feigenbaum,et al. Towards a theory of data entanglement , 2007, Theor. Comput. Sci..
[4] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[5] Rafail Ostrovsky,et al. Deniable Encryption , 1997, IACR Cryptol. ePrint Arch..
[6] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[7] Ronald L. Rivest,et al. All-or-Nothing Encryption and the Package Transform , 1997, FSE.
[8] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[9] Nikita Borisov,et al. Off-the-record communication, or, why not to use PGP , 2004, WPES '04.
[10] Moni Naor,et al. Oblivious Transfer with Adaptive Queries , 1999, CRYPTO.
[11] Silvio Micali,et al. Computationally Private Information Retrieval with Polylogarithmic Communication , 1999, EUROCRYPT.
[12] Roger Dingledine,et al. The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[13] R. Anderson. The Eternity Service , 1996 .
[14] Ahmed Obied,et al. Broadcast Encryption , 2008, Encyclopedia of Multimedia.
[15] Van Jacobson,et al. Networking named content , 2009, CoNEXT '09.
[16] David Mazières,et al. Tangler: a censorship-resistant publishing system based on document entanglements , 2001, CCS '01.
[17] Rafail Ostrovsky,et al. Replication is not needed: single database, computationally-private information retrieval , 1997, Proceedings 38th Annual Symposium on Foundations of Computer Science.
[18] Timothy Roscoe,et al. Mnemosyne: Peer-to-Peer Steganographic Storage , 2002, IPTPS.
[19] Michael Luby,et al. LT codes , 2002, The 43rd Annual IEEE Symposium on Foundations of Computer Science, 2002. Proceedings..
[20] Johann-Christoph Freytag,et al. Repudiative information retrieval , 2002, WPES '02.
[21] Moni Naor,et al. Efficient oblivious transfer protocols , 2001, SODA '01.
[22] Moni Naor,et al. On the Construction of Pseudorandom Permutations: Luby—Rackoff Revisited , 1996, Journal of Cryptology.
[23] Nick Feamster,et al. Infranet: Circumventing Web Censorship and Surveillance , 2002, USENIX Security Symposium.
[24] Paul F. Syverson,et al. Onion routing , 1999, CACM.
[25] Dan S. Wallach,et al. Dagster: Censorship-Resistant Publishing Without Replication , 2002 .
[26] Scott Shenker,et al. A data-oriented (and beyond) network architecture , 2007, SIGCOMM '07.
[27] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[28] Ian Clarke,et al. Protecting Free Expression Online with Freenet , 2002, IEEE Internet Comput..
[29] Karen R. Sollins,et al. Arguments for an information-centric internetworking architecture , 2010, CCRV.