MuON: epidemic based mutual anonymity
暂无分享,去创建一个
[1] Aravind Srinivasan,et al. P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[2] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[3] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[4] David R. Karger,et al. Analysis of the evolution of peer-to-peer systems , 2002, PODC '02.
[5] Stefan Saroiu,et al. A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .
[6] Michael Roe,et al. Performance of Block Ciphers and Hash Functions - One Year Later , 1994, FSE.
[7] Robbert van Renesse,et al. The power of epidemics: robust communication for large-scale distributed systems , 2003, CCRV.
[8] Brian Neil Levine,et al. A protocol for anonymous communication over the Internet , 2000, CCS.
[9] Ian T. Foster,et al. Mapping the Gnutella Network: Properties of Large-Scale Peer-to-Peer Systems and Implications for System Design , 2002, ArXiv.
[10] Scott Shenker,et al. Epidemic algorithms for replicated database maintenance , 1988, OPSR.
[11] Gene Tsudik,et al. Mixing E-mail with Babel , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[12] Andreas Pfitzmann,et al. Networks without user observability , 1987, Comput. Secur..
[13] B. Bhattacharjee,et al. A Protocol for Scalable Anonymous Communication , 1999 .
[14] Krishna P. Gummadi,et al. Measurement, modeling, and analysis of a peer-to-peer file-sharing workload , 2003, SOSP '03.
[15] Lorrie Faith Cranor,et al. Publius: A Robust, Tamper-Evident, Censorship-Resistant, and Source-Anonymous Web Publishing System , 2000, USENIX Security Symposium.
[16] Anne-Marie Kermarrec,et al. Peer-to-Peer Membership Management for Gossip-Based Protocols , 2003, IEEE Trans. Computers.
[17] Márk Jelasity,et al. A Modular Paradigm for Building Self-Organizing Peer-to-Peer Applications , 2003, Engineering Self-Organising Systems.
[18] Kenneth P. Birman,et al. Bimodal multicast , 1999, TOCS.
[19] Indranil Gupta,et al. Fighting fire with fire: using randomized gossip to combat stochastic scalability limits , 2002 .
[20] Anne-Marie Kermarrec,et al. The Peer Sampling Service: Experimental Evaluation of Unstructured Gossip-Based Implementations , 2004, Middleware.
[21] Aravind Srinivasan,et al. P/sup 5/ : a protocol for scalable anonymous communication , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[22] Oliver Berthold,et al. Dummy Traffic against Long Term Intersection Attacks , 2002, Privacy Enhancing Technologies.
[23] Scott Shenker,et al. Making gnutella-like P2P systems scalable , 2003, SIGCOMM '03.
[24] Stefan Savage,et al. Understanding Availability , 2003, IPTPS.
[25] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[26] Aruna Seneviratne,et al. Cost-effective broadcast for fully decentralized peer-to-peer networks , 2003, Comput. Commun..
[27] Christian Grothoff,et al. gap - Practical Anonymous Networking , 2003, Privacy Enhancing Technologies.
[28] Ian T. Foster,et al. Mapping the Gnutella Network: Macroscopic Properties of Large-Scale Peer-to-Peer Systems , 2002, IPTPS.
[29] Robert Tappan Morris,et al. A performance vs. cost framework for evaluating DHT design tradeoffs under churn , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[30] Shivakant Mishra,et al. Evaluation of gossip to build scalable and reliable multicast protocols , 2004, Perform. Evaluation.
[31] Yiming Hu,et al. TAP: a novel tunneling approach for anonymity in structured P2P systems , 2004 .
[32] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[33] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[34] Yossi Matias,et al. Consistent, yet anonymous, Web access with LPWA , 1999, CACM.
[35] Brent Waters,et al. Receiver anonymity via incomparable public keys , 2003, CCS '03.
[36] John Kubiatowicz,et al. Handling churn in a DHT , 2004 .
[37] Jia Wang,et al. Analyzing peer-to-peer traffic across large networks , 2004, IEEE/ACM Trans. Netw..
[38] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[39] Brian Neil Levine,et al. Responder anonymity and anonymous peer-to-peer file sharing , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[40] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[41] Li Xiao,et al. Low-Cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks , 2003, IEEE Trans. Parallel Distributed Syst..