Certificate Transparency with Privacy
暂无分享,去创建一个
Dan Boneh | Joseph Bonneau | Saba Eskandarian | Eran Messeri | Joseph Bonneau | D. Boneh | Saba Eskandarian | Eran Messeri
[1] Niloy Ganguly,et al. Analyzing the vulnerability of superpeer networks against attack , 2007, CCS '07.
[2] Harsha V. Madhyastha,et al. LASTor: A Low-Latency AS-Aware Tor Client , 2012, IEEE/ACM Transactions on Networking.
[3] Ben Adida,et al. Helios: Web-based Open-Audit Voting , 2008, USENIX Security Symposium.
[4] Ethan Heilman,et al. Eclipse Attacks on Bitcoin's Peer-to-Peer Network , 2015, USENIX Security Symposium.
[5] Arno Fiedler,et al. Certificate transparency , 2014, Commun. ACM.
[6] Micah Adler,et al. An Analysis of the Degradation of Anonymous Protocols , 2002, NDSS.
[7] Qi Zhang,et al. Indra: a peer-to-peer approach to network intrusion detection and prevention , 2003, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003..
[8] Apu Kapadia,et al. Halo: High-Assurance Locate for Distributed Hash Tables , 2008, NDSS.
[9] David Mazières,et al. Tangler: a censorship-resistant publishing system based on document entanglements , 2001, CCS '01.
[10] Bryce Wilcox-O'Hearn,et al. Experiences Deploying a Large-Scale Emergent Network , 2002, IPTPS.
[11] Prateek Mittal,et al. In search of an anonymous and secure lookup: attacks on structured peer-to-peer anonymous communication systems , 2010, CCS '10.
[12] Helen Nissenbaum,et al. A Critical Look at Decentralized Personal Data Architectures , 2012, ArXiv.
[13] CastroMiguel,et al. Secure routing for structured peer-to-peer overlay networks , 2002 .
[14] Nicholas Hopper,et al. Scalable onion routing with torsk , 2009, CCS.
[15] Marianne Winslett,et al. PeerAccess: a logic for distributed authorization , 2005, CCS '05.
[16] James F. Doyle,et al. Peer-to-Peer: harnessing the power of disruptive technologies , 2001, UBIQ.
[17] Ian Goldberg,et al. Practical Robust Communication in DHTs Tolerating a Byzantine Adversary , 2010, 2010 IEEE 30th International Conference on Distributed Computing Systems.
[18] Christian Decker,et al. Exploring and improving BitTorrent topologies , 2013, IEEE P2P 2013 Proceedings.
[19] Paul F. Syverson,et al. As-awareness in Tor path selection , 2009, CCS.
[20] Eli Ben-Sasson,et al. Zerocash: Decentralized Anonymous Payments from Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[21] Radu Sion,et al. XPay: practical anonymous payments for tor routing and other networked services , 2009, WPES '09.
[22] Roel Peeters,et al. Balloon: A Forward-Secure Append-Only Persistent Authenticated Data Structure , 2015, ESORICS.
[23] J. Camenisch,et al. Proving in Zero-Knowledge that a Number is the Product of Two Safe Primes , 1998 .
[24] Leslie Lamport,et al. Time, clocks, and the ordering of events in a distributed system , 1978, CACM.
[25] Robert Tappan Morris,et al. Alpaca: extensible authorization for distributed services , 2007, CCS '07.
[26] Jan Camenisch,et al. An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation , 2001, IACR Cryptol. ePrint Arch..
[27] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[28] Roel Peeters,et al. Insynd: Improved Privacy-Preserving Transparency Logging , 2016, ESORICS.
[29] Hovav Shacham,et al. Randomizable Proofs and Delegatable Anonymous Credentials , 2009, CRYPTO.
[30] Cristina Nita-Rotaru,et al. A survey of attack and defense techniques for reputation systems , 2009, CSUR.
[31] Carmela Troncoso,et al. Drac: An Architecture for Anonymous Low-Volume Communications , 2010, Privacy Enhancing Technologies.
[32] Ralf Sasse,et al. ARPKI: Attack Resilient Public-Key Infrastructure , 2014, CCS.
[33] Honggang Zhang,et al. The growth of Diaspora - A decentralized online social network in the wild , 2012, 2012 Proceedings IEEE INFOCOM Workshops.
[34] Christian Grothoff,et al. Automatic transport selection and resource allocation for resilient communication in decentralised networks , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.
[35] Thorsten Strufe,et al. A survey on decentralized Online Social Networks , 2014, Comput. Networks.
[36] David Chaum,et al. An Improved Protocol for Demonstrating Possession of Discrete Logarithms and Some Generalizations , 1987, EUROCRYPT.
[37] Jan Camenisch,et al. Proving in Zero-Knowledge that a Number Is the Product of Two Safe Primes , 1998, EUROCRYPT.
[38] Virgil D. Gligor,et al. A key-management scheme for distributed sensor networks , 2002, CCS '02.
[39] Ghassan O. Karame,et al. Double-spending fast payments in bitcoin , 2012, CCS.
[40] David Chaum,et al. Wallet Databases with Observers , 1992, CRYPTO.
[41] Peter Saint-Andre. Extensible Messaging and Presence Protocol (XMPP): Core , 2011, RFC.
[42] Eran Messeri,et al. Certificate Transparency: Domain Label Redaction , 2017 .
[43] Alptekin Küpçü,et al. Efficient Key Authentication Service for Secure End-to-End Communications , 2015, ProvSec.
[44] Jussi Kangasharju,et al. Measuring large-scale distributed systems: case of BitTorrent Mainline DHT , 2013, IEEE P2P 2013 Proceedings.
[45] Herbert Bos,et al. SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets , 2013, 2013 IEEE Symposium on Security and Privacy.
[46] Minaxi Gupta,et al. Inferring Mechanics of Web Censorship Around the World , 2012, FOCI.
[47] Stefan Schiffner,et al. On the limits of privacy in reputation systems , 2011, WPES.
[48] Nikita Borisov,et al. Defending Tor from Network Adversaries: A Case Study of Network Path Prediction , 2014, Proc. Priv. Enhancing Technol..
[49] Adrian Perrig,et al. Efficient gossip protocols for verifying the consistency of Certificate logs , 2015, 2015 IEEE Conference on Communications and Network Security (CNS).
[50] Prateek Mittal,et al. Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems , 2012, TSEC.
[51] Vitaly Shmatikov,et al. De-anonymizing Social Networks , 2009, 2009 30th IEEE Symposium on Security and Privacy.
[52] Gregor Schiele,et al. Efficient bandwidth estimation for peer-to-peer systems , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.
[53] Sudheendra Hangal,et al. PrPl: a decentralized social networking infrastructure , 2010, MCS '10.
[54] Felix Freitag,et al. Tahoe-LAFS Distributed Storage Service in Community Network Clouds , 2014, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing.
[55] Elaine Shi,et al. Multi-cloud oblivious storage , 2013, CCS.
[56] Dawn Xiaodong Song,et al. Preserving Link Privacy in Social Network Based Systems , 2012, NDSS.
[57] Phillip B. Gibbons,et al. DCast: sustaining collaboration in overlay multicast despite rational collusion , 2012, CCS.
[58] David Wolinsky,et al. Keeping Authorities "Honest or Bust" with Decentralized Witness Cosigning , 2015, 2016 IEEE Symposium on Security and Privacy (SP).
[59] Fabian Monrose,et al. DNS Prefetching and Its Privacy Implications: When Good Things Go Bad , 2010, LEET.
[60] Adrian Perrig,et al. Efficient security primitives derived from a secure aggregation algorithm , 2008, CCS.
[61] Claus-Peter Schnorr,et al. Efficient signature generation by smart cards , 2004, Journal of Cryptology.
[62] Iddo Bentov,et al. How to Use Bitcoin to Incentivize Correct Computations , 2014, CCS.
[63] Jan Camenisch,et al. A Signature Scheme with Efficient Protocols , 2002, SCN.
[64] Steven Myers,et al. ANONIZE: A Large-Scale Anonymous Survey System , 2014, 2014 IEEE Symposium on Security and Privacy.
[65] Valérie Viet Triem Tong,et al. An efficient distributed PKI for structured P2P networks , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[66] Sean W. Smith,et al. Blacklistable anonymous credentials: blocking misbehaving users without ttps , 2007, CCS '07.
[67] Glenn Greenwald,et al. No Place to Hide: Edward Snowden, the NSA, and the U.S. Surveillance State , 2014 .
[68] Nicholas Hopper,et al. Hashing it out in public: common failure modes of DHT-based anonymity schemes , 2009, WPES '09.
[69] Chris Palmer,et al. Public Key Pinning Extension for HTTP , 2015, RFC.
[70] Adi Shamir,et al. How to share a secret , 1979, CACM.
[71] Yitao Duan,et al. P4P: Practical Large-Scale Privacy-Preserving Distributed Computation Robust against Malicious Users , 2010, USENIX Security Symposium.
[72] Carmela Troncoso,et al. PIR-Tor: Scalable Anonymous Communication Using Private Information Retrieval , 2011, USENIX Security Symposium.
[73] Moni Naor,et al. NSEC5 from Elliptic Curves: Provably Preventing DNSSEC Zone Enumeration with Shorter Responses , 2016, IACR Cryptol. ePrint Arch..
[74] David Wolinsky,et al. AnonRep: Towards Tracking-Resistant Anonymous Reputation , 2016, NSDI.
[75] Alex Biryukov,et al. Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization , 2013, 2013 IEEE Symposium on Security and Privacy.
[76] Nick Mathewson,et al. Anonymity Loves Company: Usability and the Network Effect , 2006, WEIS.
[77] Claudia Diaz,et al. Hero or Villain: The Data Controller in Privacy Law and Technologies , 2013 .
[78] Nikita Borisov,et al. rBridge: User Reputation based Tor Bridge Distribution with Privacy Preservation , 2013, NDSS.
[79] Marcin Andrychowicz,et al. Secure Multiparty Computations on Bitcoin , 2014, 2014 IEEE Symposium on Security and Privacy.
[80] Eric Wustrow,et al. CAge: Taming Certificate Authorities by Inferring Restricted Scopes , 2013, Financial Cryptography.
[81] George Danezis,et al. DP5: A Private Presence Service , 2015, Proc. Priv. Enhancing Technol..
[82] Rajesh Sharma,et al. SuperNova: Super-peers based architecture for decentralized online social networks , 2011, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012).
[83] Jan Camenisch,et al. Endorsed E-Cash , 2007, 2007 IEEE Symposium on Security and Privacy (SP '07).
[84] Alptekin Küpçü,et al. ZKPDL: A Language-Based System for Efficient Zero-Knowledge Proofs and Electronic Cash , 2010, USENIX Security Symposium.
[85] Sonja Buchegger,et al. PeerSoN: P2P social networking: early experiences and insights , 2009, SNS '09.
[86] Paul E. Hoffman,et al. The DNS-Based Authentication of Named Entities (DANE) Transport Layer Security (TLS) Protocol: TLSA , 2012, RFC.
[87] Aniket Kate,et al. (Nothing else) MATor(s): Monitoring the Anonymity of Tor's Path Selection , 2014, IACR Cryptol. ePrint Arch..
[88] Hovav Shacham,et al. Short Group Signatures , 2004, CRYPTO.
[89] Joan Feigenbaum,et al. KeyNote: Trust Management for Public-Key Infrastructures (Position Paper) , 1998, Security Protocols Workshop.
[90] Sushil Jajodia,et al. Providing witness anonymity in peer-to-peer systems , 2006, CCS '06.
[91] George Danezis,et al. Mixminion: design of a type III anonymous remailer protocol , 2003, 2003 Symposium on Security and Privacy, 2003..
[92] George Danezis,et al. Panel Discussion - Mix Cascades Versus Peer-to-Peer: Is One Concept Superior? , 2004, Privacy Enhancing Technologies.
[93] Ariel J. Feldman,et al. Social Networking with Frientegrity: Privacy and Integrity with an Untrusted Provider , 2012, USENIX Security Symposium.
[94] David Wolinsky,et al. Crypto-Book: an architecture for privacy preserving online identities , 2013, HotNets.
[95] Alex Pentland,et al. Enigma: Decentralized Computation Platform with Guaranteed Privacy , 2015, ArXiv.
[96] David P. Anderson,et al. SETI@home: an experiment in public-resource computing , 2002, CACM.
[97] Carmela Troncoso,et al. Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks , 2010, Privacy Enhancing Technologies.
[98] Yevgeniy Dodis,et al. A Verifiable Random Function with Short Proofs and Keys , 2005, Public Key Cryptography.
[99] Fang Yu,et al. Finding the Linchpins of the Dark Web: a Study on Topologically Dedicated Hosts on Malicious Web Infrastructures , 2013, 2013 IEEE Symposium on Security and Privacy.
[100] Prateek Mittal,et al. ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies , 2009, CCS.
[101] Ninghui Li,et al. Distributed Credential Chain Discovery in Trust Management , 2003, J. Comput. Secur..
[102] Ralf Sasse,et al. Automated Verification of Group Key Agreement Protocols , 2014, 2014 IEEE Symposium on Security and Privacy.
[103] Hovav Shacham,et al. Short Signatures from the Weil Pairing , 2001, J. Cryptol..
[104] Dan Boneh,et al. Riposte: An Anonymous Messaging System Handling Millions of Users , 2015, 2015 IEEE Symposium on Security and Privacy.
[105] Micah Sherr,et al. An Empirical Evaluation of Relay Selection in Tor , 2013, NDSS.
[106] Yakov Rekhter,et al. A Border Gateway Protocol 4 (BGP-4) , 1994, RFC.
[107] Adam Langley,et al. Certificate Transparency Version 2.0 , 2019, RFC.
[108] Zhong Chen,et al. Sorcery: Could we make P2P content sharing systems robust to deceivers? , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[109] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[110] Brent Waters,et al. Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs , 2010, NDSS.
[111] Paul F. Syverson,et al. Anonymous connections and onion routing , 1998, IEEE J. Sel. Areas Commun..
[112] Ian Goldberg,et al. DefenestraTor: Throwing Out Windows in Tor , 2011, PETS.
[113] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[114] Douglas Stebila,et al. Secure Logging Schemes and Certificate Transparency , 2016, ESORICS.
[115] Martín Abadi,et al. Authentication in the Taos operating system , 1994, TOCS.
[116] Mihir Bellare,et al. Robust computational secret sharing and a unified account of classical secret-sharing goals , 2007, CCS '07.
[117] Arnar Birgisson,et al. Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud , 2014, NDSS.
[118] Micah Sherr,et al. Scalable Link-Based Relay Selection for Anonymous Routing , 2009, Privacy Enhancing Technologies.
[119] C. Jackson,et al. Towards Short-Lived Certificates , 2012 .
[120] Matthew K. Wright,et al. Salsa: a structured approach to large-scale anonymity , 2006, CCS '06.
[121] Mark Ryan,et al. Enhanced Certificate Transparency and End-to-End Encrypted Mail , 2014, NDSS.
[122] George Danezis,et al. PrivEx: Private Collection of Traffic Statistics for Anonymous Communication Networks , 2014, CCS.
[123] Matthew Smith,et al. Hey, NSA: Stay Away from my Market! Future Proofing App Markets against Powerful Attackers , 2014, CCS.
[124] Melissa Chase,et al. Transparency Overlays and Applications , 2016, IACR Cryptol. ePrint Arch..
[125] Michael Kaminsky,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, S&P 2008.
[126] Sean W. Smith,et al. Nymble: Anonymous IP-Address Blocking , 2007, Privacy Enhancing Technologies.
[127] Micah Adler,et al. The predecessor attack: An analysis of a threat to anonymous communications systems , 2004, TSEC.
[128] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[129] Jeremy Clark,et al. 2013 IEEE Symposium on Security and Privacy SoK: SSL and HTTPS: Revisiting past challenges and evaluating certificate trust model enhancements , 2022 .
[130] Sushil Jajodia,et al. Tracking anonymous peer-to-peer VoIP calls on the internet , 2005, CCS '05.
[131] Christian Grothoff,et al. Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P , 2011, PETS.
[132] Moxie Marlinspike,et al. Trust Assertions for Certificate Keys , 2013 .
[133] Nikita Borisov,et al. A Tune-up for Tor: Improving Security and Performance in the Tor Network , 2008, NDSS.
[134] Xin Zhang,et al. SCION: Scalability, Control, and Isolation on Next-Generation Networks , 2011, 2011 IEEE Symposium on Security and Privacy.
[135] Maxim Raya,et al. Revocation games in ephemeral networks , 2008, CCS.
[136] Collin Jackson,et al. Accountable key infrastructure (AKI): a proposal for a public-key validation infrastructure , 2013, WWW.
[137] Elaine Shi,et al. Authenticated data structures, generically , 2014, POPL.
[138] Wilson C. Hsieh,et al. Bigtable: A Distributed Storage System for Structured Data , 2006, TOCS.
[139] Harry Halpin,et al. LEAP: A Next-Generation Client VPN and Encrypted Email Provider , 2016, CANS.
[140] Dirk Grunwald,et al. Low-resource routing attacks against tor , 2007, WPES '07.
[141] Jan Camenisch,et al. Signature Schemes and Anonymous Credentials from Bilinear Maps , 2004, CRYPTO.
[142] Steven J. Murdoch,et al. Sampled Traffic Analysis by Internet-Exchange-Level Adversaries , 2007, Privacy Enhancing Technologies.
[143] Christian Scheideler,et al. HSkip+: A self-stabilizing overlay network for nodes with heterogeneous bandwidths , 2014, 14-th IEEE International Conference on Peer-to-Peer Computing.
[144] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[145] Eyal Kushilevitz,et al. Private information retrieval , 1998, JACM.
[146] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[147] Jianping Pan,et al. The impact of NAT on BitTorrent-like P2P systems , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[148] David Chaum,et al. Untraceable electronic mail, return addresses, and digital pseudonyms , 1981, CACM.
[149] Cristina Nita-Rotaru,et al. On the accuracy of decentralized virtual coordinate systems in adversarial networks , 2007, CCS '07.
[150] Prateek Mittal,et al. X-Vine: Secure and Pseudonymous Routing in DHTs Using Social Networks , 2012, NDSS.
[151] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[152] Alex Biryukov,et al. Deanonymisation of Clients in Bitcoin P2P Network , 2014, CCS.
[153] Nicholas Hopper,et al. Membership-concealing overlay networks , 2009, CCS.
[154] Ethan L. Miller,et al. POTSHARDS: Secure Long-Term Storage Without Encryption , 2007, USENIX Annual Technical Conference.
[155] Jan Camenisch,et al. How to win the clonewars: efficient periodic n-times anonymous authentication , 2006, CCS '06.
[156] Joachim Biskup,et al. Threshold-based identity recovery for privacy enhanced applications , 2000, CCS.
[157] Nikita Borisov,et al. Cachet: a decentralized architecture for privacy preserving social networking with caching , 2012, CoNEXT '12.
[158] M. Frans Kaashoek,et al. VerSum: Verifiable Computations over Large Public Logs , 2014, CCS.
[159] Torben P. Pedersen. Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing , 1991, CRYPTO.
[160] Ian Goldberg,et al. Enhancing Tor's performance using real-time traffic classification , 2012, CCS.
[161] Benjamin C. M. Fung,et al. Secure Distributed Framework for Achieving ε-Differential Privacy , 2012, Privacy Enhancing Technologies.
[162] Jeremy Clark,et al. Provisions: Privacy-preserving Proofs of Solvency for Bitcoin Exchanges , 2015, CCS.
[163] Ian Goldberg,et al. An improved algorithm for tor circuit scheduling , 2010, CCS '10.
[164] Sean W. Smith,et al. PEREA: towards practical TTP-free revocation in anonymous authentication , 2008, CCS.
[165] Sanjay Ghemawat,et al. MapReduce: Simplified Data Processing on Large Clusters , 2004, OSDI.
[166] Sushmita Ruj,et al. Certificate Transparency with Enhancements and Short Proofs , 2017, ACISP.
[167] Lujo Bauer,et al. Distributed proving in access-control systems , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[168] David Wolinsky,et al. Dissent in Numbers: Making Strong Anonymity Scale , 2012, OSDI.
[169] Joos Vandewalle,et al. Revocable anonymous access to the Internet? , 2003, Internet Res..
[170] Stefan Brands,et al. Rapid Demonstration of Linear Relations Connected by Boolean Operators , 1997, EUROCRYPT.
[171] Mark Ryan,et al. DECIM: Detecting Endpoint Compromise In Messaging , 2018, IEEE Transactions on Information Forensics and Security.
[172] Ernesto Damiani,et al. A reputation-based approach for choosing reliable resources in peer-to-peer networks , 2002, CCS '02.
[173] A. Pfitzmann,et al. Anonymity, Unlinkability, Unobservability, Pseudonymity, and Identity Management – A Consolidated Proposal for Terminology , 2002 .
[174] Fabrice Boudot,et al. Efficient Proofs that a Committed Number Lies in an Interval , 2000, EUROCRYPT.
[175] Pradeep K. Khosla,et al. Survivable Information Storage Systems , 2000, Computer.
[176] Andreas Terzis,et al. On the Effectiveness of Distributed Worm Monitoring , 2005, USENIX Security Symposium.
[177] Abhi Shelat,et al. Efficient Protocols for Set Membership and Range Proofs , 2008, ASIACRYPT.
[178] Michael J. Freedman,et al. CONIKS: Bringing Key Transparency to End Users , 2015, USENIX Security Symposium.
[179] Adrian Perrig,et al. Distributed detection of node replication attacks in sensor networks , 2005, 2005 IEEE Symposium on Security and Privacy (S&P'05).
[180] Alptekin Küpçü,et al. Making p2p accountable without losing privacy , 2007, WPES '07.
[181] R. Anderson. The Eternity Service , 1996 .
[182] David Chaum,et al. The dining cryptographers problem: Unconditional sender and recipient untraceability , 1988, Journal of Cryptology.
[183] Prateek Mittal,et al. Pisces: Anonymous Communication Using Social Networks , 2013, NDSS.
[184] Sean W. Smith,et al. Nymble: Blocking Misbehaving Users in Anonymizing Networks , 2011, IEEE Transactions on Dependable and Secure Computing.
[185] Carl M. Ellison Cybercash. Establishing Identity Without Certification Authorities , 1996 .
[186] Ronald L. Rivest,et al. Can We Eliminate Certificate Revocations Lists? , 1998, Financial Cryptography.
[187] Adi Shamir,et al. A method for obtaining digital signatures and public-key cryptosystems , 1978, CACM.
[188] Jun Wang,et al. TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.
[189] Adrian Perrig,et al. Perspectives: Improving SSH-style Host Authentication with Multi-Path Probing , 2008, USENIX Annual Technical Conference.
[190] Silvio Micali,et al. Verifiable random functions , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[191] Christian Grothoff,et al. A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System , 2014, CANS.
[192] Qian Wang,et al. Plutus: Scalable Secure File Sharing on Untrusted Storage , 2003, FAST.
[193] George Danezis,et al. SybilInfer: Detecting Sybil Nodes using Social Networks , 2009, NDSS.
[194] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[195] David C. Parkes,et al. On non-cooperative location privacy: a game-theoretic analysis , 2009, CCS.
[196] Dan Bogdanov,et al. Sharemind: A Framework for Fast Privacy-Preserving Computations , 2008, ESORICS.
[197] Micah Sherr,et al. Users get routed: traffic correlation on tor by realistic adversaries , 2013, CCS.
[198] Robert N. M. Watson,et al. Metrics for Security and Performance in Low-Latency Anonymity Systems , 2008, Privacy Enhancing Technologies.
[199] Stuart S. Shapiro,et al. Privacy by design , 2010, Commun. ACM.
[200] Amit A. Levy,et al. Vanish: Increasing Data Privacy with Self-Destructing Data , 2009, USENIX Security Symposium.
[201] Nicolas Kourtellis,et al. Socially-aware distributed hash tables for decentralized online social networks , 2015, 2015 IEEE International Conference on Peer-to-Peer Computing (P2P).
[202] Ivan Damgård,et al. An Integer Commitment Scheme based on Groups with Hidden Order , 2001, IACR Cryptol. ePrint Arch..
[203] Nick Mathewson,et al. Trust-based anonymous communication: adversary models and routing algorithms , 2011, CCS '11.
[204] Hector Garcia-Molina,et al. PPay: micropayments for peer-to-peer systems , 2003, CCS '03.