/docs/
- ../
- 024-DatabasesPaper.pdf
- 0409026v1.pdf
- 052820031647_102.pdf
- 05_75_fisheye-state-routing-in_0.pdf
- 0611016v1.pdf
- 0710.4903v1.pdf
- 081199.pdf
- 10.1.1.1.1674.pdf
- 10.1.1.10.2545.pdf
- 10.1.1.10.4919.pdf
- 10.1.1.10.4919_0.pdf
- 10.1.1.10.5444.pdf
- 10.1.1.10.6119.pdf
- 10.1.1.100.8338.pdf
- 10.1.1.101.4674.pdf
- 10.1.1.101.688.pdf
- 10.1.1.102.5368.pdf
- 10.1.1.102.5763.pdf
- 10.1.1.102.9992.pdf
- 10.1.1.103.426.pdf
- 10.1.1.103.7483.pdf
- 10.1.1.104.8086.pdf
- 10.1.1.106.5673.pdf
- 10.1.1.106.7489.pdf
- 10.1.1.107.244.pdf
- 10.1.1.108.4263.pdf
- 10.1.1.108.4976.pdf
- 10.1.1.108.7110.pdf
- 10.1.1.109.2034.pdf
- 10.1.1.11.1341.pdf
- 10.1.1.11.2672.pdf
- 10.1.1.112.1333.pdf
- 10.1.1.112.7612.pdf
- 10.1.1.113.5668.pdf
- 10.1.1.12.277.pdf
- 10.1.1.12.3222.pdf
- 10.1.1.12.3388.pdf
- 10.1.1.12.3444.pdf
- 10.1.1.12.5408.pdf
- 10.1.1.12.5992.pdf
- 10.1.1.120.6858.pdf
- 10.1.1.120.7766.pdf
- 10.1.1.124.9928.pdf
- 10.1.1.125.4474.pdf
- 10.1.1.126.5915.pdf
- 10.1.1.127.9488.pdf
- 10.1.1.13.3464.pdf
- 10.1.1.13.5048.pdf
- 10.1.1.13.5636.pdf
- 10.1.1.13.9006_0.pdf
- 10.1.1.13.9956.pdf
- 10.1.1.130.6088.pdf
- 10.1.1.14.4740.pdf
- 10.1.1.144.9141.pdf
- 10.1.1.15.3254.pdf
- 10.1.1.16.1456.pdf
- 10.1.1.16.4761.pdf
- 10.1.1.16.909.pdf
- 10.1.1.18.6742.pdf
- 10.1.1.19.8434.pdf
- 10.1.1.19.9193.pdf
- 10.1.1.19.9316.pdf
- 10.1.1.2.8796.pdf
- 10.1.1.20.2147.pdf
- 10.1.1.20.6972.pdf
- 10.1.1.23.9004.pdf
- 10.1.1.24.3781.pdf
- 10.1.1.24.8205.pdf
- 10.1.1.26.1365.pdf
- 10.1.1.27.1639_(2).pdf
- 10.1.1.29.1814.pdf
- 10.1.1.3.1198.pdf
- 10.1.1.3.3027.pdf
- 10.1.1.3.5649.pdf
- 10.1.1.3.9155.pdf
- 10.1.1.31.7263.pdf
- 10.1.1.33.2632.pdf
- 10.1.1.34.4081.pdf
- 10.1.1.34.5547.pdf
- 10.1.1.39.8384.pdf
- 10.1.1.4.334.pdf
- 10.1.1.4.6246.pdf
- 10.1.1.4.7003_(1).pdf
- 10.1.1.40.3691.pdf
- 10.1.1.40.8955.pdf
- 10.1.1.41.4031.pdf
- 10.1.1.42.8899.pdf
- 10.1.1.43.4892.pdf
- 10.1.1.48.4680.pdf
- 10.1.1.5.2005.pdf
- 10.1.1.5.3353.pdf
- 10.1.1.5.9855.pdf
- 10.1.1.53.7112.pdf
- 10.1.1.55.257.pdf
- 10.1.1.56.3350.pdf
- 10.1.1.56.3350_0.pdf
- 10.1.1.56.9968.pdf
- 10.1.1.59.6799.pdf
- 10.1.1.6.1545.pdf
- 10.1.1.6.2954.pdf
- 10.1.1.60.7750_0.pdf
- 10.1.1.60.8756.pdf
- 10.1.1.61.249.pdf
- 10.1.1.61.3184.pdf
- 10.1.1.61.5727.pdf
- 10.1.1.61.6219.pdf
- 10.1.1.62.3119.pdf
- 10.1.1.63.2427.pdf
- 10.1.1.65.4280_0.pdf
- 10.1.1.65.8267.pdf
- 10.1.1.65.8269_0.pdf
- 10.1.1.65.9976.pdf
- 10.1.1.66.7970.pdf
- 10.1.1.67.6509.pdf
- 10.1.1.67.9307.pdf
- 10.1.1.68.5832.pdf
- 10.1.1.68.7579.pdf
- 10.1.1.72.3011.pdf
- 10.1.1.72.8036.pdf
- 10.1.1.73.6464.pdf
- 10.1.1.73.7247.pdf
- 10.1.1.74.1585.pdf
- 10.1.1.74.8097.pdf
- 10.1.1.76.5241.pdf
- 10.1.1.76.9310.pdf
- 10.1.1.79.364.pdf
- 10.1.1.79.4460.pdf
- 10.1.1.80.1566.pdf
- 10.1.1.80.713.pdf
- 10.1.1.83.5920.pdf
- 10.1.1.84.5715.pdf
- 10.1.1.84.9197.pdf
- 10.1.1.85.9211.pdf
- 10.1.1.87.7718.pdf
- 10.1.1.88.2405.pdf
- 10.1.1.88.2407_0.pdf
- 10.1.1.88.2793.pdf
- 10.1.1.88.2867.pdf
- 10.1.1.9.5699.pdf
- 10.1.1.90.8499.pdf
- 10.1.1.90.9758.pdf
- 10.1.1.91.8217.pdf
- 10.1.1.91.8331.pdf
- 10.1.1.92.7281.pdf
- 10.1.1.94.4826.pdf
- 10.1.1.96.4283.pdf
- 107.pdf
- 173.pdf
- 180.pdf
- 19490.pdf
- 1999syverson-fm99.pdf
- 2002-08-esorics02-ipd-correlation.pdf
- 2004-ISLPED-Energy-aware_demand_paging_on_NAND_flash-based_embedded_storages.pdf
- 2007j_sigirforum_shen.pdf
- 2011-FSW-Scalability-Paranoia.pdf
- 264.pdf
- 30c3gns.pdf
- 31.pdf
- 6-914.ppt
- 617203.pdf
- A02370_DF_CFP_SpringerOpen_SI_CFP_EURASIP_JWCN_Global_A42.pdf
- AAAI'08_-_Local_search_for_DCOP.pdf
- AAAI'96_-_Mixed_constraint_satisfaction.pdf
- AAMAS'05_-_Accelerating_the_DCOP_algorithm_ADOPT.pdf
- AAMAS08_-_DCOP_algorithms_in_a_real_world_problem.pdf
- ACM_Computing_Surveys_-_A_survey_of_p2p_content_distribution_technologies.pdf
- ACM_SIGCOMM'05_-_Cheng_&_Friedman_-_Sybilproof_reputation_mechanisms.pdf
- ACNS'05_-_Garcia_&_Hoepman_-_Off-line_Karma.pdf
- ACSAC'02_-_A_secure_directory_service_based_on_exclusive_encryption.pdf
- ACSAC'11_-_BACKLIT.pdf
- ACSAC'11_-_Tortoise.pdf
- ADC07.pdf
- AIMS'09_-_Sybil_attacks_protection_schemes_in_KAD.pdf
- ALL.bib
- APFS.pdf
- ARES'06_-_Fair_Trading_of_Information.pdf
- ASIACRYPT'07_-_IBBE_with_constant_size_ciphertexts_and_private_keys.pdf
- ASWN2003.pdf
- ATEC'04_-_A_network_positioning_system.pdf
- A_Novel_Testbed_for_P2P_Networks.pdf
- Amann_-_Secure_asynchronous_change_notifications.pdf
- Amnefelt_&_Svenningsson_-_Keso.pdf
- AnonymityTrilemma_StrongAnonymityLowBandwidthOverheadLowLatency_ChooseTwo.pdf
- Applied_Intelligence_-_Combinatorial_Auctions.pdf
- AthanRAM07.pdf
- AuthenticationEuroPKI2008.pdf
- AutoNetkit_0.pdf
- BD.pdf
- BFTSim-nsdi08.pdf
- BLIP2012Alaggan.pdf
- BM-mixencrypt.pdf
- BS.pdf
- BenSalemBHJ03mobihoc.pdf
- Bogetoft_et_al._-_Secure_multiparty_computation_goes_live.pdf
- BonehGolle-psp2002.pdf
- Brahms-Comnet-Mar09.pdf
- Brahms-rps-mar09.pdf
- Brodening2013Chatzikokolakis.pdf
- Browne_et_al_-_A_survey_of_MCTS_methods.pdf
- Brumley_&_Tuveri_-_Timing_Attacks.pdf
- BucheggerL02.pdf
- BuildingAnASTopologyModel.pdf
- ButtyanH03monet.pdf
- CCS'03_-_Yang_&_Garcia-Molina_-_PPay.pdf
- CCS'06_-_Attributed-based_encryption_for_fine-grained_access_control_of_encrypted_data.pdf
- CCS'07_-_ABE_with_non-monotonic_access_structures.pdf
- CCS'08_-_FairplayMP.pdf
- CCS'08_-_Identity-based_encryption_with_efficient_revocation.pdf
- CCS'11_-_Cirripede.pdf
- CCS'11_-_Throughput-fingerprinting.pdf
- CCS'11_-_Trust-based_Anonymous_Communication1.pdf
- CG'06_-_Selectivity_and_backup_operators_in_MCTS.pdf
- CIA'04_-_Despotovic_&_Aberer_-_Peers'_performance_in_P2P_networks.pdf
- CMU-CS-99-148.pdf
- CRYPTO'02_-_The_LSD_broadcast_encryption_scheme.pdf
- CRYPTO'84_-_El_Gamal_-_Public_Key_Cryptosystem.pdf
- CSD-01-1141.pdf
- CSD-02-1178.pdf
- CSD-05-1390.pdf
- CSET'11_-_ExperimenTor.pdf
- CU-CS-909-00.pdf
- CaberNet_Radicals_Workshop_-_Puzzles_in_P2P_Systems.pdf
- CameraReady_240.pdf
- Chaffinch.pdf
- ChatziPP07.pdf
- ChinaCom'06_-_Combating_hidden_action_in_unstructured_p2p_systems.pdf
- Choosing-ε-2011Lee.pdf
- CoNEXT2008.pdf
- CoRR_-_Critical_look_at_decentralization.pdf
- CoRR_-_X-Vine.pdf
- CollusionResistant2009Melchor.pdf
- Combining_Virtual_and_Physical_Structures_for_Self-organized_Routing_0.pdf
- Communications_of_the_ACM_-_Reputation_Systems.pdf
- Compcon_'97_-_Privacy-enhancing_Technologies_for_the_Internet.pdf
- CompletelenessTheorems1988Ben-Or.pdf
- Computer_Networks_-_Wang,_Chiu_&_Lui_-_Overlay_network_traffic_on_ISP_peering.pdf
- Concurrency_and_Computation_-_TRIBLER.pdf
- DD08Survey.pdf
- DIALM'02_-_Feigenbaum_&_Shenker_-_Distributed_algorithmic_mechanism_design.pdf
- DIP_2872.pdf
- DP5:_A_Private_Presence_Service.pdf
- DPwithImperfectRandomness2012Dodis.pdf
- Dan-SFMix03.pdf
- DanezisDKT09.pdf
- DanezisG09.pdf
- Deanonymization2008narayanan.pdf
- Dellarocas_-_Reputation_Mechanisms.pdf
- Dependent_Link_Padding_Algorithms_for.pdf
- DiazThesis05.pdf
- DifferentialPrivacy2006Dwork_0.pdf
- DifferentialPrivacy2011Alvim.pdf
- DisclousrePrevention2010Dwork.pdf
- DistributedPrivateData2008Beimel.pdf
- DistributedSearch2014Hermann.pdf
- DistributingSocialApp2010Leroy.pdf
- Douglas-thesis.pdf
- Duminuco_&_Biersack_-_Hierarchical_Codes.pdf
- EC'04_-_Robust_incentive_techniques_for_P2P_networks.pdf
- EC'05_-_Hidden-action_in_multi-hop_routing.pdf
- EC'06_-_Incentive-compatible_interdomain_routing.pdf
- EC'08_-_Why_share_in_peer-to-peer_networks.pdf
- EC'09_-_Sybilproof_transitive_trust_protocols.pdf
- EUROCRYPT'05_-_Fuzzy_Identity-Based_Encryption.pdf
- EUROCRYPT'89_-_Waidner&Pfitzmann_-_The_dining_cryptographers_in_the_disco_.pdf
- EUROCRYPT'92_-_Chaun_&_Pedersen_-_Transferred_cash_grows_in_size.pdf
- EdmanS09.pdf
- EdmanSY07.pdf
- EffecitvePrivateMatching2004Freedman.pdf
- EmpiricalAspects2009Wang.pdf
- EppGooUye-SIGCOMM-11.pdf
- Erdős_&_Rényi_-_On_Random_Graphs.pdf
- Euro-Par'05_-_Pastis.pdf
- Experiences_Deploying_a_Large-Scale_Emergent_Network.pdf
- FAST'09_-_Open-source_erasure_coding_libraries_for_storage.pdf
- FC'11_-_BNymble.pdf
- FC'11_-_Malice_versus_AN.ON_.pdf
- FC'11_-_Proximax.pdf
- FC'12_-_Congestion-aware_Path_Selection_for_Tor.pdf
- FGCS_-_P2P_Contracts:_a_Framework_for_Resource_and_Service_Exchange.pdf
- FOCI'11_-_Decoy_Routing:_Toward_Unblockable_Internet_Communication.pdf
- FREENIX'01_-_A_transparent_cryptographic_file_system_for_UNIX.pdf
- FalsepositiverateBloomFilter2008Bose.pdf
- Feldman,_Lai,_Chuang_&_Stoica_-_Quantifying_disincentives_in_peer-to-peer_networks.pdf
- Finite-length_analysis_of_low-density_parity-check_codes_on.pdf
- Fireflies.pdf
- FitHir06.pdf
- Formalizing_Anonymous_Blacklisting_Systems.pdf
- Freedom_Security2-1.pdf
- Fu--FlowMarking--2005.pdf
- GECON'04_-_Designing_incentive_mechanisms_for_p2p_systems.pdf
- GHPvR05.pdf
- GKK03.pdf
- GNUnet_pet.pdf
- Generalisation2001Damgard.pdf
- Ghodsi_-_Distributed_k-ary_System.pdf
- Golle-sp2006.pdf
- GolleJakobssonJuelsSyverson-universal04.pdf
- GossipPeerSampling2007Jelasity.pdf
- Gossipico.pdf
- Gossiping2007Kermarrrec.pdf
- Grid_Computing_-_Estimating_The_Size_Of_Peer-To-Peer_Networks.pdf
- Group_Decision_and_Negociation_-_Automated_Negociation.pdf
- HICSS'02_-_A_computational_model_of_trust_and_reputation.pdf
- HOT-P2P'05_-_Khorshadi,_Liu_&_Ghosal.pdf
- HPDC'06_-_Peer_to_peer_size_estimation_in_large_and_dynamic_networks.pdf
- HPL-2002-163.pdf
- HotOS_IX_-_High_available,_scalable_storage,_dynamic_peer_networks.pdf
- HotOrNot.pdf
- HotP2P'10_-_KAD_DHT_attack_mitigation.pdf
- I2P-PET-CON-2009.1.pdf
- ICC'08_-_Super-Seeding_in_BitTorrent.PDF
- ICDCN'10_-_Poisoning_the_Kad_Network.pdf
- ICDCS'02_-_Reclaiming_space_for_duplicate_files.pdf
- ICDCS'04.pdf
- ICDCS'06_-_Improving_traffic_locality_in_BitTorrent.pdf
- ICDCS'09_-_Regenerating_codes_for_p2p_backup_systems.pdf
- ICN'07_-_PlanetLab.pdf
- ICNP'03_-_Resilient_peer-to-peer_streaming.pdf
- IEEE-IC-SecurityPerformance-May-2003.pdf
- IEEE_CST_-_A_Survey_and_Comparison_of_Peer-to-Peer_Overlay.pdf
- IEEE_Communications_Magazine_-_Video_Streaming_in_P2P_Systems.pdf
- IEEE_Computer_Society_-_2Fast.pdf
- IEEE_DSO_-_Free_riding_on_Gnutella_revisited.pdf
- IEEE_Journal_(25)_-_Hidden-action_in_network_routing.pdf
- IEEE_Trans._on_Info._-_New_directions_in_cryptography.pdf
- IEEE_Transactions_on_Systems_-_Descentralized_learning.pdf
- IEEE⁄ACM_Banner_&_Orda.pdf
- IEEE⁄ACM_Trans._Netw.'02_(10)-_Internet_pricing.pdf
- IEEE⁄ACM_Transactions_on_Networking_-_Detecting_shared_congestion_of_flows.pdf
- IH-1996.pdf
- IJCAI'07_-_PC-DPOP.pdf
- IJCCR_vol_10_(2006)_1_Ardron_and_Lietaer.pdf
- IMC'04_-_Availability,_Usage,_and_Deployment_Characteristics_of_the_DNS.pdf
- IMC'05_-_Measurement,_analysis_and_modeling_of_BitTorrent-like_systems.pdf
- IMC'06_-_Understanding_churn_in_p2p_networks.pdf
- IMC'07_-_A_global_view_of_KAD.pdf
- IMC'08_-_Detecting_BitTorrent_Blocking.pdf
- INFOCOM'02_-_Probabilistic_location_and_routing.pdf
- INFOCOM'05_-_Designing_incentives_for_peer-to-peer_routing.pdf
- INFOCOM'05_-_Exploiting_anarchy_in_networks.pdf
- INFOCOM'05_-_Market-driven_bandwidth_allocation.pdf
- INFOCOM'05_-_Network_coding_for_large_scale_content_distribution.pdf
- INFOCOM'06_-_Pianese,_Keller_&_Biersack_-_PULSE.pdf
- INFOCOM'07_-_MARCH.pdf
- INFOCOM'07_-_Mesh_or_multiple-tree.pdf
- INFOCOM'07_-_Network_coding_for_distributed_storage_systems.pdf
- INFOCOM'07_-_PRIME.pdf
- INFOCOM'08_-_Stable_peers.PDF
- INFOCOM'09_-_Queusing_models_for_p2p_streaming_systems.pdf
- INFOCOM'09_-_Sybilproof_Indirect_Reprocity_Mechanism_for_P2P_Networks_.pdf
- INFOCOM'09_-_Traffic_Engineering_vs._Content_Distribution.PDF
- INFOCOM05_Poster.pdf
- INFOCOMM'09_-_Mechanism_design_without_payments.pdf
- IPTPS'01_-_Complex_queries_in_DHT-based_p2p_networks.pdf
- IPTPS'01_-_Erasure_coding_vs._replication.pdf
- IPTPS'02_-_Douceur_-_The_Sybil_Attack.pdf
- IPTPS'03_-_Rateless_codes_and_big_downloads.pdf
- IPTPS'03_-_Towards_a_common_API.pdf
- IPTPS'05_-_High_availability_in_DHTs:_erasure_coding_vs._replication.pdf
- IPTPS'05_-_The_BitTorrent:_measurements_and_analysis.pdf
- IPTPS'06_-_On_object_maintenance_in_p2p_systems.pdf
- IPTPS'06_-_Skype_p2p_VoIP_System.pdf
- IRB-TR-03-003.pdf
- ITC-20'07_-_Estimating_churn_in_structured_p2p_networks.pdf
- IWSOS'08_-_Network_Size_Estimation_for_Structured_Overlays.pdf
- Infocom2007-sns.pdf
- Infocom2008.pdf
- Informatik_Spektrum_-_Peer-to-peer_networking_&_-computing.pdf
- IntegerComparisonSolution2007Garay.pdf
- InterestsInference2010Wen.pdf
- JPE_(1993)_-_Gode_&_Sunder_-_Allocative_Efficiency.pdf
- Jelasity,_Montresor_&_Babaoglu_-_Gossip-based_aggregation.pdf
- Jiang,_Bai_&_Wang_-_Trust_and_Cooperation_in_Peer-to-Peer_Systems.pdf
- Journal_of_AI_-_BnB-ADOPT.pdf
- Journal_of_Parallel_&_Distributed_Computing_-_Deleting_files_in_the_Celeste_p2p_storage_systems.pdf
- Journal_of_Public_Economics_-_Bolton,_Katok_&_Ockenfels.pdf
- Journal_of_Supercomputing_-_Insight_into_redundancy_schemes_in_DHTs.pdf
- Kernighan_&_Lin_-_An_Efficient_Heuristic_Procedure_for_Partitioning_Graphs%0A.pdf
- Kising_-_Proximity_Neighbor_Selection_for_IGOR.pdf
- KongHG07.pdf
- LAP:_Lightweight_Anonymity_and_Privacy.pdf
- LASTor:_A_Low-Latency_AS-Aware_Tor_Client.pdf
- LNCS_-_Distributed_Hash_Tables.pdf
- LOCEntropy2008.pdf
- Laffont_&_Martimort_-_The_Theory_of_Incentives.pdf
- Lecture_Notes_in_Computer_Science_-_Selected_DHT_Algorithms_.pdf
- LessHashing2006Kirsch.pdf
- Levine-2002.pdf
- Liberatore-2006.pdf
- LightweightParadigm.pdf
- Long_Term_Study_of_Peer_Behavior_in_the_kad_DHT.pdf
- LowerBoundsDP2012De.pdf
- MDS'07_-_Conner_&_Nahrstedt_-_Securing_peer-to-peer_media_streaming_systems.pdf
- MIT-LCS-TR-179.pdf
- MMVEConsistency.pdf
- MalleshW07.pdf
- Malugo.pdf
- MarPi08.pdf
- Marti-ElsevierScienceSubmitted05_0.pdf
- Marx_-_Parameterized_graph_separation_problems.pdf
- Menezes_&_Monteiro_-_An_Introduction_to_Auction_Theory.pdf
- Mies_-_SpoVNet.pdf
- MultiParty2009Narayanan.pdf
- MultiPartyComputation2001Cramer.pdf
- MultiPartyComputation2007Nishide.pdf
- NCA'05_-_Decentralized_Schemes_for_Size_Estimation_in_Large_and_Dynamic_Groups.pdf
- NDSS'11_-_Security_API_for_Distributed_Social_Networks.pdf
- NDSS11-2.pdf
- NET-2011-08-1.pdf
- NET-2015-02-1.pdf
- NGC'03_-_Scalable_Application-level_Anycast_.pdf
- NMNC_-_Progressive_strategies_for_MCTS.pdf
- NSDI'04_-_Designing_a_DHT_for_low_latency_and_high_throughput.pdf
- NSDI'07_-_Do_incentives_build_robustness_in_BitTorrent.pdf
- NarayananS09.pdf
- NetCod'05_-_Random_linear_coding_based_distributed_networked_storage.pdf
- NetEcon'03_-_Cohen_-_Incentives_build_robustness_in_BitTorrent.pdf
- NetEcon'06_-_Harvelaar.pdf
- NetEcon'06_-_Improving_robustness_of_p2p_streaming.pdf
- NetEcon'08_-_Yang_-_Auction,_but_don't_block.pdf
- NetworkWithoutUserObservabiliy1985Pfitzmann.pdf
- Neumann_&_Morgenstern_-_Theory_of_Games_and_Economic_Behavior.pdf
- ODSBR-TISSEC.pdf
- OPODIS-116b.pdf
- OSDI'00_-_Fast_and_Secure_Distributed_Read-Only_File_System.pdf
- OSDI'00_-_Overcast.pdf
- Oper._Res._-_Optimal_Resource_Allocation.pdf
- OptimallyFairCoinToss2009Moran.pdf
- Ostrovsky-Skeith.pdf
- OurData2006Dwork.pdf
- P2P'03_-_Buragohain,_Agrawal_&_Suri_-_Incentives_in_P2P_systems.pdf
- P2P'03_-_Identity_crisis:_anonymity_vs_reputation.pdf
- P2P'04_-_Reputation_management_framework.pdf
- P2P'09_-_PeerSim.pdf
- P2PECON'05_-_Incentives_in_BitTorrent_induce_free_riding.pdf
- P2PECON'05_-_KARMA.pdf
- P2PECON'05_-_Self-recharging_virtual_currency.pdf
- P2PEcon'04_-_SWIFT.pdf
- P2PEcon'05_-_A_new_mechanism_for_the_free-rider_problem.pdf
- PAM'04_-_Dissecting_bittorrent.pdf
- PASSAT'11_-_Multiparty_linear_programming.pdf
- PETS'11_-_An_Accurate_System-Wide_Anonymity_Metric_for_Probabilistic_Attacks.pdf
- PETS'11_-_DefenestraTor.pdf
- PINS'04_-__Free-riding_and_whitewashing_in_P2P_systems.pdf
- PIR_Kesdogan.pdf
- PNAS_(2003)_-_The_evolution_of_altruistic_punishment.pdf
- PNAS_-_Nash_-_Equilibrium_points_in_n-person_games.pdf
- PODC'02_-_Building_secure_file_systems_out_of_Byzantine_storage.pdf
- PODC'06_-_Peer_counting_and_sampling_in_overlay_networks.pdf
- PShuffle.pdf
- Pastry.pdf
- Patterns_of_Failure.pdf
- Peek-a-Boo,_I_Still_See_You:_Why_Efficient_Traffic_Analysis_Countermeasures_Fail.pdf
- Personalization2012Toch.pdf
- PersonalizedRecommender2012Zhou.pdf
- PersonalizedWebSearch2004Liu.pdf
- PlayMentalGame1987Goldreich.pdf
- Polot2010.pdf
- Preface.pdf
- PrivacyIntergratedQueries2009McSherry.pdf
- PrivacyPractices2005Jensen.pdf
- PrivacyPreserving2006Shaneck.pdf
- PrivacyPreserving2007Ambirbekyan.pdf
- PrivacyPreservingSetOperations2005Kissner.pdf
- Privacy_PPNA2011Das.pdf
- PrivateRecommender2009McSherry.pdf
- PrivateRecordMatching2010Inan.pdf
- PrivateScalarProduct2004Goethals.pdf
- PrivateSimilarity2011Alaggan.pdf
- Prospects_for_Remailers.pdf
- ProtocolSecurecomputations1982Yao.pdf
- PublicKeyCryptoSystems1999Paillier.pdf
- QoS_pubsub.pdf
- Quest01.pdf
- README
- RI070302.pdf
- RP03-1.pdf
- RR-5578.pdf
- RRMPH02-1.pdf
- Reed_&_Solomon_-_Polynomial_Codes_Over_Certain_Finite_Fields.pdf
- Reliable_MultiCast1997Flyod.pdf
- Retrivability_of_data_in_ad-hoc_backup.pdf
- RevelaingInformation2003Dinur.pdf
- SAINT'03_-_Kwon_&_Ryu.pdf
- SAINT'07_-_Local_production,_local_consumption_p2p_architecture.pdf
- SASO'07_-_Garbacki,_Epema_&_van_Steen.pdf
- SBirrer-dhtBasedMulticast_0.pdf
- SELMAS_-_Software_framework_for_automated_negotiation.pdf
- SHA1AttackProceedingVersion.pdf
- SIGCOMM'03_-_On_selfish_routing_in_internet-like_environments.pdf
- SIGCOMM'03_-_The_impact_of_DHT_routing_geometry_on_resilience_and_proximity.pdf
- SIGCOMM'04_-_Qui_&_Srikant_-_Modeling_and_performance_analysis.pdf
- SIGCOMM'06_-_SybilGuard.pdf
- SIGCOMM'08_-_Rationality_and_traffic_attraction.pdf
- SIGCOMM'11_-_Uncovering_social_network_sybils.pdf
- SIGCOMM'87_-_Strategies_for_decentralized_resource_management.pdf
- SIGCOMM_Comp._Comm._Rev._-_Minimizing_churn_in_distributed_systems.pdf
- SIGCOMM_Compt._Commun._Rev._-_Vivaldi.pdf
- SIGCOMM_Comput._Commun._Rev._-_BitTorrent_is_an_Auction.pdf
- SIGCOMM_Comput._Commun._Rev._-_P4P:_Provider_Portal_for_Applications.pdf
- SIGCOMM_Comput._Commun._Rev._-_Practical,_distributed_network_coordinates.pdf
- SIGCOMM_Comput._Commun._Rev._-_Securing_Internet_Coordinate_Embedding_Systems.pdf
- SIGCOMM_Comput._Commun._Rev_-_Network_Coding:_an_Instant_Primer.pdf
- SIGCOMM_Computers_Communication_Review_-_Bubblestorm.pdf
- SIGKDD_Explor._Newsl._-_Distributed_data_mining.pdf
- SIGMETRICS'05_-_Bharambe,_Herley_&_Padmanabhan.pdf
- SIGMETRICS'05_-_Coupon_replication_systems.pdf
- SIGOPS_-_FARSITE.pdf
- SIGOSP'03_-_Spitstream:_High-bandwidth_multicast.pdf
- SIGecom_Exch._(5)_-_Overcoming_free-riding_behavior.pdf
- SK.pdf
- SKademlia2007.pdf
- SODA'04_-_Network_failure_detection_and_graph_connectivity%0A.pdf
- SOSP'03_-_Bullet.pdf
- SPAA'05_-_Selfish_routing_with_incomplete_information.pdf
- SRC-RR-168.pdf
- SRDS'06_-_Cryptree.pdf
- STACS'99_-_Nisan_-_Algorithms_for_selfish_agents.pdf
- STOC'08_-_Optimal_mechanism_design_and_money_burning.pdf
- STOC'97_-_Practical_Loss-Resilient_Codes.pdf
- STOC'99_-_Nisan_&_Ronen_-_Algorithmic_mechanism_design.pdf
- Saito_-_i-WAT_Dissertation.pdf
- Salsa.pdf
- Schollmeier_-_Signaling_and_networking_in_unstructured_p2p_networks.pdf
- Science_-_Hardin_-_The_Tragedy_of_the_Commons.pdf
- Secure_Collaborative_Planning_Forecasting_and_Replenishment.pdf
- Serj02-iptps.pdf
- ShWa-Relationship.pdf
- ShWa-Timing06.pdf
- SocialMarket2011Frey.pdf
- Stathopoulos07a.pdf
- SupritiSinghMasterThesis.pdf
- TH04.pdf
- THV04.pdf
- TISSEC_-_PEREA.pdf
- TM-2009-3.pdf
- Tariq2011Meeting.pdf
- Tech_Report_-_A_Survey_of_Solutions_to_the_Sybil_Attack.pdf
- Tech_Report_-_Analyzing_peer_behavior_in_KAD.pdf
- Tech_Report_-_Privacy_guarantees_through_DCS.pdf
- Tech_report_-_DCOP_as_a_formal_model_of_PARC.pdf
- Telex:_Anticensorship_in_the_Network_Infrastructure.pdf
- TheoryandPracticeBloomFilter2011Tarkoma.pdf
- Thesis_-_Autonomic_distributed_systems.pdf
- Thesis_-_F.Schadd.pdf
- Thesis_-_P.Harvey.pdf
- TopK-Processing2011Bai.pdf
- Trawling_for_tor_HS.pdf
- Triebel2007a.pdf
- Trivers_-_The_evolution_of_reciprocal_altruism.pdf
- TroncosoD09.pdf
- Trust_infocom06_v4.pdf
- UCAM-CL-TR-637.pdf
- UREbreak06.pdf
- USENIX_-_PIR-Tor.pdf
- USENIX_Security'10_-_SEPIA.pdf
- UnconditionallySecure2006Damgard.pdf
- UnconditionallySecureProtocol2007Li.pdf
- User-Perceived_Performance_of_the_NICE_Application_Layer_Multicast_Protocol_in_Large_and_Highly_Dynamic_Groups_1.pdf
- VTC03.pdf
- VassermanJTHK09.pdf
- WEIS'05_-_Moore_-_Counterin_hidden-action_attacks.pdf
- WHW_12-NTALG.pdf
- WIAPP'03_-_Deconstructing_the_Kazaa_network.pdf
- WPES'04_-_Forecasting_and_benchamking.pdf
- WPES'11_-_FAUST.pdf
- WPES'11_-_Fingerprinting.pdf
- WPES'11_-_bridgeSPA.pdf
- WWW'03_-_The_EigenTrust_algorithm.pdf
- WangCJ05.pdf
- WebPersonalization2012Zeng.pdf
- WhatCanWeLearnPrivately2008Kasiviswanthan.pdf
- WiOpt'03_-_Buchegger_&_Le_Boudec_-_Reputation_Systems.pdf
- Widmer2001g.pdf
- Workshop_on_Economics_of_P2P_Systems'03_-_Chun,_Fu_&_Vahdat.pdf
- Wright-2004.pdf
- WrightMM06.pdf
- Youmightlike2011Calandrino.pdf
- a3.pdf
- a7-pizzonia.pdf
- a_peel_of_the_onion__syverson_2011.pdf
- adams06.pdf
- adida07.pdf
- aff.pdf
- agrawal03.pdf
- akerlof.pdf
- alpha-mixing-pet2006.pdf
- amann08igorfs.pdf
- andrei-thesis.pdf
- anonymity_and_cover_traffic.pdf
- apres.pdf
- arias2014bs.pdf
- article-89.pdf
- asplos-x_annot.pdf
- autonetkit-small.pdf
- awerbuch-robust.pdf
- ba_dold_voting_24aug2014.pdf
- babel.pdf
- bart2013ccc.pdf
- batman-status.pdf
- bauer-alpaca2008.pdf
- bauer-wpes2007.pdf
- bayeux.pdf
- beimel-barrier.pdf
- beimel01informationtheoretic.pdf
- berman-fc2004.pdf
- bgpmisconfig.pdf
- bloomfilter.pdf
- bootstrap.pdf
- brands06.pdf
- btor.pdf
- byz.pdf
- cadet.pdf
- camenisch2002da.pdf
- camenisch2002ssep.pdf
- camenisch2003pve.pdf
- camlys05.pdf
- can-mcast.pdf
- can.pdf
- casc-rep.pdf
- cashmere.pdf
- casper-usenix2003.pdf
- ccs03-SNKeyMan.pdf
- ccs07-blac.pdf
- ccs07-doa.pdf
- ccs09-torsk.pdf
- ccs2008-mittal.pdf
- ccsw09-fingerprinting.pdf
- cebolla.pdf
- cfp_0.pdf
- cfs_sosp.pdf
- chainsaw.pdf
- chaum-mix_0.pdf
- chl05-full-eurocrypt2005.pdf
- chor97computationally.pdf
- chord_sigcomm.pdf
- ciaccio-pet2006.pdf
- cl01a.pdf
- clayton-pet2003.pdf
- clayton-pet2006.pdf
- cliquenet-iptp.pdf
- clog-the-queue.pdf
- clonewars.pdf
- cocaTOCS.pdf
- compact.pdf
- conext09-phdworkshop-cameraready.pdf
- consensus2016.pdf
- coopbittorrentcom_0.pdf
- cooper.pdf
- coral-iptps03.pdf
- cosic-2007-001.pdf
- cramer04bootstrapping.pdf
- cramer04lifescience.pdf
- cramer04odgmbc.pdf
- cramer04scheduling.pdf
- cramer05isprp.pdf
- cramer05pns.pdf
- cramer05selfstabilizing.pdf
- cramer06bootstrapping.pdf
- crdt.pdf
- crisp-mswim.pdf
- crowds.pdf
- cryptoeprint-2005-394.pdf
- cset2011.pdf
- cucs-039-04.pdf
- curve25519-20060209.pdf
- cview-pet2006.pdf
- danezis-pet2003.pdf
- danezis-pet2004.pdf
- danezis-pet2007.pdf
- danezis-pet2008.pdf
- danezis-weis2006.pdf
- danezis-wpes2003.pdf
- danezis-wpes2004.pdf
- dasein10.pdf
- dcnet-jcrypt88.pdf
- debs04perng.pdf
- decmon_0.pdf
- di06linyphi.pdf
- di07mass.pdf
- di08iptps.pdf
- di09broadcastssr.pdf
- di09slf.pdf
- diaz-pet2008.pdf
- diaz-wpes2007.pdf
- disad-free-routes.pdf
- dissens2021.pdf
- dold2016byzantine.pdf
- dolstra.pdf
- drac-pet2010.pdf
- e2e-traffic.pdf
- eScholarship_UC_item_4x6723n2.pdf
- ebe.pdf
- ecrs.pdf
- ed25519-20110926.pdf
- elnikety.pdf
- emergence_of_scaling_in_random_networks__barabasi_albert_science_286__1999.pdf
- emulab.pdf
- encrypteddata.pdf
- encsearch.pdf
- epost-eurosys2006.pdf
- errorsIT.pdf
- esed.pdf
- esorics04-mauw.pdf
- esorics05-Klonowski.pdf
- eternity.pdf
- evans_ghm_presentation.pdf
- fairbrother-pet2004.pdf
- fast03.pdf
- fault.dvi_.pdf
- feamster-pet2003.pdf
- fessi_iptcomm_2010.pdf
- fk-2016-1-p46.pdf
- flash-mix.pdf
- flow-correlation04.pdf
- focs01.pdf
- foward_secure_encryption.pdf
- fps-slides-mw.pdf
- fps2013wachs.pdf
- freedom2-arch.pdf
- freehaven.net-anonbib-cache-mixmaster-spec.txt.pdf
- freehaven_pres.pdf
- freenet.pdf
- fu-active.pdf
- fu-analytical.pdf
- fudico.pdf
- fuhrmann02architecture_0.pdf
- fuhrmann03evaluation.pdf
- fuhrmann03feedback.pdf
- fuhrmann03overlaySRS.pdf
- fuhrmann03performance.pdf
- fuhrmann03strategy.pdf
- fuhrmann03supportingP2P.pdf
- fuhrmann05emnets.pdf
- fuhrmann05networking.pdf
- fuhrmann06pushing.pdf
- fuhrmann07wons.pdf
- fulltext.pdf
- fulltext3.pdf
- george-thesis.pdf
- getTechreport.pdf
- ghm2010.pdf
- globecom00.pdf
- gns2014wachs.pdf
- gnunet-psyc.pdf
- goldberg-2007.pdf
- golle-ccs2004.pdf
- golle-eurocrypt2004.pdf
- golle-pet2004.pdf
- gossip-podc05.pdf
- gossple2010Bertier.pdf
- grothoff_ghm2013gns.pdf
- grothoff_slides_berlin.pdf
- gsn09-security-mayer.pdf
- gup.pdf
- gush.pdf
- habil.pdf
- halpern-oneill-2003.pdf
- harvey.pdf
- hashcash.pdf
- herbivore-esigops.pdf
- herbivore-tr.pdf
- herrmann2011mt.pdf
- heydt-benjamin-pet2006.pdf
- hill_climbing.pdf
- hintz02.pdf
- hitting-set04.pdf
- hordes-final-all.dvi_.pdf
- hotmobile07.pdf
- how-to-build-a-better-testbed.pdf
- hs-attack06.pdf
- http___freehaven.net_anonbib_cache_pipenet10.html_.pdf
- hurler03context.pdf
- i3.pdf
- icdcs2006-m2.pdf
- idemix.pdf
- ih05-Klonowski.pdf
- ih05-Luke.pdf
- ih05-csispir.pdf
- ih05-danezisclulow.pdf
- ij_23-alife99.pdf
- ijns-2009-v8-n2-p169-176.pdf
- imc05-tcpnat.pdf
- improved-clockskew.pdf
- incentives-fc10.pdf
- incentives-for-cooperation-in_0.pdf
- incomparable-pkeys.pdf
- infocom01investigating.pdf
- infocom06-kad.pdf
- infranet.pdf
- integratingpds-fast04.pdf
- ishai2006ca.pdf
- iwan2004.pdf
- jmlr08.pdf
- jsac-2001.pdf
- jsac.pdf
- k-anonymous_ccs2003.pdf
- kevin-thesis.pdf
- kissner04private.pdf
- knock.pdf
- koch08confidence.pdf
- koepsell-wpes2004_0.pdf
- koorde.pdf
- kostas-thesis.pdf
- kpos_0.pdf
- kugler2.pdf
- kutzner03connecting.pdf
- kutzner05autonomic.pdf
- kutzner05dvdr.pdf
- kutzner05overnet.pdf
- kutzner06igor.pdf
- kutzner06securessr.pdf
- kutzner07linearization.pdf
- lafs.pdf
- langos02.pdf
- lbfs.pdf
- ldpc.pdf
- lee.pdf
- lightweight_prob_broadcast.pdf
- lillibridge.pdf
- limits-open.pdf
- location.pdf
- loesing2008performance.pdf
- lurchi-bs-thesis.pdf
- lynx_slides_youbroketheinternet.pdf
- ma_dold_consensus_21dec2015.pdf
- ma_kirsch_2014_0.pdf
- main.pdf
- main_0.pdf
- manku03symphony.pdf
- max-presentation.pdf
- maze_freeride.pdf
- mcb-en.pdf
- mcb-es.pdf
- mcb-fr.pdf
- mcb-it.pdf
- mccoy-pet2008.pdf
- memory-bound-crypto.pdf
- michpi-020801.pdf
- middleware-monod.pdf
- mininet-hifi.pdf
- minion-design.pdf
- mix-acc.pdf
- mix.pdf
- mixmaster-reliable.pdf
- mmcn.pdf
- modelnet-si-ppna11.pdf
- morales2014cryogenic.pdf
- morphing09.pdf
- morphmix-fc2004.pdf
- morphmix-pet2006.pdf
- morphmix-wpes2002.pdf
- multipath-dv-perf.pdf
- murdoch-pet2007.pdf
- murdoch-pet2008.pdf
- netgames.pdf
- new_sequences_of_linear_time_erasure_cod_64778.pdf
- newman-pet2004.pdf
- ngc03_ldpc_slides_03sep18_4s.pdf
- nguyen-pet2003.pdf
- nice-wli.pdf
- nightingale-bluefs2004.pdf
- ns2018.pdf
- nsdi12-koi.pdf
- nse-techreport.pdf
- nss2011.pdf
- ntr-worlds05.pdf
- nym-alias-net.pdf
- nymble-tdsc.pdf
- obfuscation_osn.pdf
- oblivious_transfer.pdf
- octopus_dht.pdf
- oehlmann2014machinelearning.pdf
- oii2014.pdf
- oneswarm_SIGCOMM.pdf
- onion-discex00.pdf
- onionrouting.pdf
- openDHT.pdf
- opendht-fixing.pdf
- opodis10_HAL.pdf
- optimalscheme04.pdf
- osdi2002.pdf
- oualno-070618.pdf
- overlier-pet2007.pdf
- p110-santry.pdf
- p115-daswani_0.pdf
- p131-v40n1n-huebschA.pdf
- p135-cox.pdf
- p14-woo.pdf
- p169-al-ameen.pdf
- p190-kubi.pdf
- p255.pdf
- p2p2010slides.pdf
- p2plab-cpe.pdf
- p48-cramer_ACM2006.pdf
- p4t.pdf
- p5.pdf
- p625-bharambe1.pdf
- p_icalp04_0.pdf
- panic.pdf
- paper-JaiDem.pdf
- paper-ifip.pdf
- paper.dvi_.pdf
- paper.pdf
- paper_cans2014_camera_ready.pdf
- paper_short.pdf
- pastry.pdf
- peerstore-better-performance-by.pdf
- perea-ccs08.pdf
- pet05-bissias.pdf
- pet05-borisov.pdf
- pet05-serjantov.pdf
- pet05-zhu.pdf
- pet2011i2p.pdf
- petfive.pdf
- phd-thesis.fr_en.pdf
- pir.pdf
- pir_0.pdf
- pitchblack.pdf
- plos_nsdi_04.pdf
- plush.pdf
- pods06_paper01.pdf
- pool-dummy04.pdf
- practical.pdf
- privacy_preserving_similarity.pdf
- privsearch-aeolus.pdf
- prusty.ccs_.2011.pdf
- publ_2008_eickhold-fuhrmann-saballus-ua_ambicomp.pdf
- publius.pdf
- pwnat.pdf
- quant-adhoc.pdf
- r5rs.pdf
- rackoff93cryptographic.pdf
- rainbow.pdf
- randomized-checking.pdf
- rao.pdf
- raptor.pdf
- raykova-pet2008.pdf
- raymond00.pdf
- reardon-thesis.pdf
- recall.pdf
- reclaimID_2018.pdf
- reconcile.pdf
- reiter-ccs2004.pdf
- rep-anon.pdf
- replication.pdf
- reusable-channels-wpes2003.pdf
- ringstwice07.pdf
- robustgossip-final.pdf
- ron-sosp2001.pdf
- s15.pdf
- saballus07distributed.pdf
- saballus07secure.pdf
- saballus08gaos.pdf
- safey-presentation-monkey.pdf
- safey-thesis-monkey.pdf
- samarati.pdf
- sassaman-pet2008.pdf
- sassaman-wpes2005.pdf
- saturn-range-dht.pdf
- sba.pdf
- scan.pdf
- schaar-slides.pdf
- schanzen2012msc.pdf
- scheibner_thesis.pdf
- scholler03language.pdf
- secureindex.pdf
- self-star-load-balance.pdf
- sensor-route-security_0.pdf
- set.dvi_.pdf
- shadowwalker-ccs09.pdf
- shimshock-pet2008.pdf
- shmat_anon.pdf
- shmat_crowds.pdf
- shsm03.pdf
- shuffle-ccs01.pdf
- sigcomm02.pdf
- slicing07.pdf
- slides.pdf
- smli_tr-2005-146.pdf
- snader08.pdf
- sofem05-Klonowski.pdf
- speer02networking.pdf
- statistical-disclosure.pdf
- steinbrecher-pet2003.pdf
- steinbrecher-pet2003_0.pdf
- steven-thesis.pdf
- stop-and-go.pdf
- storedesign2002.pdf
- strint2014.pdf
- strong-eternity.pdf
- stutzbach.pdf
- swarm.pdf
- swn.pdf
- swroute.pdf
- sybildht.pdf
- sync-batching.pdf
- syssec2011.pdf
- szengel2012ms.pdf
- taler2016space.pdf
- tangler.pdf
- tap-pet2006.pdf
- tarzan-ccs02.pdf
- tarzan.pdf
- teich.pdf
- terminology.pdf
- thesis.pdf
- thesis_0.pdf
- thesis_lowres.pdf
- thiele06debruijn.pdf
- timing-fc2004.pdf
- tissec-latency-leak.pdf
- tofu-pinning.pdf
- tor-design.pdf
- tor-soups07.pdf
- tor.pdf
- torspinISC08.pdf
- torta05.pdf
- towards_comparable_network_simulations.pdf
- towards_measuring_anonymity.pdf
- tr-2002-23.pdf
- traffic_0.pdf
- transport.pdf
- trickle02.pdf
- troncoso-ih2007.pdf
- troncoso-pet2008.pdf
- twr-dp2pwa.pdf
- underlayabs-ngi08-final.pdf
- unisono_kuvs-ngn.pdf
- usability-weis2006.pdf
- ut-cs-03-510.pdf
- uva2013.pdf
- uzunov2013torspdy.pdf
- valet-pet2006.pdf
- venti-fast.pdf
- viceroy.pdf
- vldb03-pier.pdf
- w8paper13.pdf
- wachs_ghm_presentation.pdf
- web-mix-pet2000.pdf
- whatsup.pdf
- wiangsripanawan-acsw07.pdf
- wisa04-Klonowski.pdf
- wpes06-heydt-benjamin.pdf
- wpes09-bridge-attack.pdf
- wpes09-dht-attack.pdf
- wpes09-xpay.pdf
- wright-degrade.pdf
- wright-passive.pdf
- wright-passive2.pdf
- wright02.pdf
- xrs2016.pdf