Analysing the MUTE Anonymous File-Sharing System Using the Pi-Calculus
暂无分享,去创建一个
[1] Ramon Puigjaner,et al. Computer Performance Evaluation , 2000, Lecture Notes in Computer Science.
[2] Riccardo Poli,et al. New ideas in optimization , 1999 .
[3] Vincent Danos,et al. Transactions in RCCS , 2005, CONCUR.
[4] Hugo A. López,et al. Formally Reasoning About Security Issues in P2P Protocols: A Case Study , 2005 .
[5] Pierre America,et al. ECOOP'91 European Conference on Object-Oriented Programming , 1991, Lecture Notes in Computer Science.
[6] Steve A. Schneider,et al. CSP and Anonymity , 1996, ESORICS.
[7] Tom Chothia,et al. A Survey of Anonymous Peer-to-Peer File-Sharing , 2005, EUC Workshops.
[8] Jun Pang,et al. Weak Probabilistic Anonymity , 2007, SecCO@CONCUR.
[9] Catuscia Palamidessi,et al. Probable Innocence Revisited , 2005, Formal Aspects in Security and Trust.
[10] Theo Dimitrakos,et al. Formal Aspects in Security and Trust, Fourth International Workshop, FAST 2006, Hamilton, Ontario, Canada, August 26-27, 2006, Revised Selected Papers , 2007, Formal Aspects in Security and Trust.
[11] Marco Dorigo,et al. The ant colony optimization meta-heuristic , 1999 .
[12] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[13] Marta Z. Kwiatkowska,et al. PRISM: Probabilistic Symbolic Model Checker , 2002, Computer Performance Evaluation / TOOLS.
[14] Mark Ryan,et al. Analysis of an Electronic Voting Protocol in the Applied Pi Calculus , 2005, ESOP.
[15] Mario Tokoro,et al. An Object Calculus for Asynchronous Communication , 1991, ECOOP.
[16] J. Deneubourg,et al. Trails and U-turns in the Selection of a Path by the Ant Lasius niger , 1992 .
[17] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[18] M. Dorigo,et al. The Ant Colony Optimization MetaHeuristic 1 , 1999 .
[19] Faron Mollerz,et al. The Mobility Workbench | a Tool for the -calculus | , 1994 .
[20] Faron Moller,et al. The Mobility Workbench - A Tool for the pi-Calculus , 1994, CAV.
[21] J. Bergstra,et al. Handbook of Process Algebra , 2001 .
[22] Roger Dingledine,et al. The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[23] Hannes Federrath. Designing Privacy Enhancing Technologies , 2001, Lecture Notes in Computer Science.
[24] Robin Milner,et al. The Polyadic π-Calculus: a Tutorial , 1993 .
[25] Elisa Bertino,et al. Computer Security — ESORICS 96 , 1996, Lecture Notes in Computer Science.
[26] Joachim Parrow,et al. An introduction to the pi-calculus , 2001 .
[27] Catuscia Palamidessi,et al. Probabilistic Anonymity , 2005, CONCUR.
[28] Ki Chang Kim,et al. Securing anonymity in P2P network , 2005, sOc-EUSAI '05.
[29] Laurence T. Yang,et al. Embedded and Ubiquitous Computing - EUC 2005, International Conference EUC 2005, Nagasaki, Japan, December 6-9, 2005, Proceedings , 2005, EUC.
[30] Wolter Pieters,et al. Provable anonymity , 2005, FMSE '05.
[31] Alwen Tiu. Level 0/1 Prover: A Tutorial , 2004 .
[32] Emin Gün Sirer,et al. Eluding carnivores: file sharing with strong anonymity , 2004, EW 11.
[33] Catuscia Palamidessi,et al. Probabilistic Asynchronous pi-Calculus , 2000, FoSSaCS.
[34] Imed Bouazizi,et al. ARA-the ant-colony based routing algorithm for MANETs , 2002, Proceedings. International Conference on Parallel Processing Workshop.