A Survey of Anonymous Peer-to-Peer File-Sharing
暂无分享,去创建一个
[1] Matthew K. Wright,et al. Timing Attacks in Low-Latency Mix Systems (Extended Abstract) , 2004, Financial Cryptography.
[2] Stephen E. Deering,et al. Host extensions for IP multicasting , 1986, RFC.
[3] Dieter Gollmann,et al. Computer Security – ESORICS 2003 , 2003, Lecture Notes in Computer Science.
[4] Andreas Pfitzmann,et al. Anonymity, Unobservability, and Pseudonymity - A Proposal for Terminology , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[5] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[6] Vitaly Shmatikov,et al. Probabilistic analysis of anonymity , 2002, Proceedings 15th IEEE Computer Security Foundations Workshop. CSFW-15.
[7] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[8] Dan S. Wallach,et al. AP3: cooperative, decentralized anonymous communication , 2004, EW 11.
[9] Micah Adler,et al. Defending anonymous communications against passive logging attacks , 2003, 2003 Symposium on Security and Privacy, 2003..
[10] Jean-François Raymond,et al. Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[11] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[12] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[13] Peter Sewell,et al. Passive Attack Analysis for Connection-Based Anonymity Systems , 2003, ESORICS.
[14] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[15] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[16] Anton Stiglic,et al. Traffic Analysis Attacks and Trade-Offs in Anonymity Providing Systems , 2001, Information Hiding.
[17] Paul F. Syverson,et al. Anonymous connections and onion routing , 1997, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097).
[18] Dennis Kügler,et al. An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks , 2003, Privacy Enhancing Technologies.
[19] Brian Neil Levine,et al. Responder anonymity and anonymous peer-to-peer file sharing , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[20] Aleksandar Kuzmanovic,et al. Denial-of-service resilience in peer-to-peer file sharing systems , 2005, SIGMETRICS '05.
[21] Hannes Federrath. Designing Privacy Enhancing Technologies , 2001, Lecture Notes in Computer Science.
[22] Imed Bouazizi,et al. ARA-the ant-colony based routing algorithm for MANETs , 2002, Proceedings. International Conference on Parallel Processing Workshop.
[23] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[24] Li Xiao,et al. A mutual anonymous peer-to-peer protocol design , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[25] Roger Dingledine,et al. The Free Haven Project: Distributed Anonymous Storage Service , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[26] Micah Adler,et al. An Analysis of the Degradation of Anonymous Protocols , 2002, NDSS.
[27] Gene Tsudik,et al. Mixing E-mail with Babel , 1996, Proceedings of Internet Society Symposium on Network and Distributed Systems Security.
[28] Rafail Ostrovsky,et al. Xor-trees for efficient anonymous multicast and reception , 2000, TSEC.
[29] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.