bibliography

Collection of P2P research papers
Log | Files | Refs | README

ModeNameSize
-rw-r--r--README16L
-rw-r--r--docs/024-DatabasesPaper.pdf36241B
-rw-r--r--docs/0409026v1.pdf622847B
-rw-r--r--docs/052820031647_102.pdf180592B
-rw-r--r--docs/05_75_fisheye-state-routing-in_0.pdf133721B
-rw-r--r--docs/0611016v1.pdf363168B
-rw-r--r--docs/0710.4903v1.pdf39L
-rw-r--r--docs/081199.pdf219198B
-rw-r--r--docs/10.1.1.1.1674.pdf67495B
-rw-r--r--docs/10.1.1.10.2545.pdf133336B
-rw-r--r--docs/10.1.1.10.4919.pdf214317B
-rw-r--r--docs/10.1.1.10.4919_0.pdf214317B
-rw-r--r--docs/10.1.1.10.5444.pdf188832B
-rw-r--r--docs/10.1.1.10.6119.pdf307292B
-rw-r--r--docs/10.1.1.100.8338.pdf133732B
-rw-r--r--docs/10.1.1.101.4674.pdf1882311B
-rw-r--r--docs/10.1.1.101.688.pdf541579B
-rw-r--r--docs/10.1.1.102.5368.pdf121939B
-rw-r--r--docs/10.1.1.102.5763.pdf222170B
-rw-r--r--docs/10.1.1.102.9992.pdf158475B
-rw-r--r--docs/10.1.1.103.426.pdf579005B
-rw-r--r--docs/10.1.1.103.7483.pdf341955B
-rw-r--r--docs/10.1.1.104.8086.pdf60706B
-rw-r--r--docs/10.1.1.106.5673.pdf208895B
-rw-r--r--docs/10.1.1.106.7489.pdf111743B
-rw-r--r--docs/10.1.1.107.244.pdf385133B
-rw-r--r--docs/10.1.1.108.4263.pdf198836B
-rw-r--r--docs/10.1.1.108.4976.pdf152516B
-rw-r--r--docs/10.1.1.108.7110.pdf297260B
-rw-r--r--docs/10.1.1.109.2034.pdf336446B
-rw-r--r--docs/10.1.1.11.1341.pdf76364B
-rw-r--r--docs/10.1.1.11.2672.pdf205531B
-rw-r--r--docs/10.1.1.112.1333.pdf218141B
-rw-r--r--docs/10.1.1.112.7612.pdf205210B
-rw-r--r--docs/10.1.1.113.5668.pdf356251B
-rw-r--r--docs/10.1.1.12.277.pdf253026B
-rw-r--r--docs/10.1.1.12.3222.pdf45024B
-rw-r--r--docs/10.1.1.12.3388.pdf96496B
-rw-r--r--docs/10.1.1.12.3444.pdf205065B
-rw-r--r--docs/10.1.1.12.5408.pdf24984L
-rw-r--r--docs/10.1.1.12.5992.pdf242842B
-rw-r--r--docs/10.1.1.120.6858.pdf167565B
-rw-r--r--docs/10.1.1.120.7766.pdf749574B
-rw-r--r--docs/10.1.1.124.9928.pdf206916B
-rw-r--r--docs/10.1.1.125.4474.pdf114996B
-rw-r--r--docs/10.1.1.126.5915.pdf589894B
-rw-r--r--docs/10.1.1.127.9488.pdf177978B
-rw-r--r--docs/10.1.1.13.3464.pdf200204B
-rw-r--r--docs/10.1.1.13.5048.pdf91533B
-rw-r--r--docs/10.1.1.13.5636.pdf259677B
-rw-r--r--docs/10.1.1.13.9006_0.pdf167171B
-rw-r--r--docs/10.1.1.13.9956.pdf122384B
-rw-r--r--docs/10.1.1.130.6088.pdf313707B
-rw-r--r--docs/10.1.1.14.4740.pdf104857B
-rw-r--r--docs/10.1.1.144.9141.pdf109531B
-rw-r--r--docs/10.1.1.15.3254.pdf151040B
-rw-r--r--docs/10.1.1.16.1456.pdf109848B
-rw-r--r--docs/10.1.1.16.4761.pdf240137B
-rw-r--r--docs/10.1.1.16.909.pdf76119B
-rw-r--r--docs/10.1.1.18.6742.pdf239932B
-rw-r--r--docs/10.1.1.19.8434.pdf183530B
-rw-r--r--docs/10.1.1.19.9193.pdf157963B
-rw-r--r--docs/10.1.1.19.9316.pdf225987B
-rw-r--r--docs/10.1.1.2.8796.pdf231216B
-rw-r--r--docs/10.1.1.20.2147.pdf149081B
-rw-r--r--docs/10.1.1.20.6972.pdf183050B
-rw-r--r--docs/10.1.1.23.9004.pdf167658B
-rw-r--r--docs/10.1.1.24.3781.pdf194187B
-rw-r--r--docs/10.1.1.24.8205.pdf188416B
-rw-r--r--docs/10.1.1.26.1365.pdf232342B
-rw-r--r--docs/10.1.1.27.1639_(2).pdf118020B
-rw-r--r--docs/10.1.1.29.1814.pdf238607B
-rw-r--r--docs/10.1.1.3.1198.pdf224531B
-rw-r--r--docs/10.1.1.3.3027.pdf33596B
-rw-r--r--docs/10.1.1.3.5649.pdf79862B
-rw-r--r--docs/10.1.1.3.9155.pdf223695B
-rw-r--r--docs/10.1.1.31.7263.pdf188791B
-rw-r--r--docs/10.1.1.33.2632.pdf362699B
-rw-r--r--docs/10.1.1.34.4081.pdf212034B
-rw-r--r--docs/10.1.1.34.5547.pdf257834B
-rw-r--r--docs/10.1.1.39.8384.pdf74681B
-rw-r--r--docs/10.1.1.4.334.pdf168420B
-rw-r--r--docs/10.1.1.4.6246.pdf144394B
-rw-r--r--docs/10.1.1.4.7003_(1).pdf212023B
-rw-r--r--docs/10.1.1.40.3691.pdf72451B
-rw-r--r--docs/10.1.1.40.8955.pdf24380B
-rw-r--r--docs/10.1.1.41.4031.pdf294512B
-rw-r--r--docs/10.1.1.42.8899.pdf285287B
-rw-r--r--docs/10.1.1.43.4892.pdf69751B
-rw-r--r--docs/10.1.1.48.4680.pdf51452B
-rw-r--r--docs/10.1.1.5.2005.pdf260062B
-rw-r--r--docs/10.1.1.5.3353.pdf390669B
-rw-r--r--docs/10.1.1.5.9855.pdf208202B
-rw-r--r--docs/10.1.1.53.7112.pdf244600B
-rw-r--r--docs/10.1.1.55.257.pdf258519B
-rw-r--r--docs/10.1.1.56.3350.pdf47584B
-rw-r--r--docs/10.1.1.56.3350_0.pdf47584B
-rw-r--r--docs/10.1.1.56.9968.pdf89493B
-rw-r--r--docs/10.1.1.59.6799.pdf920465B
-rw-r--r--docs/10.1.1.6.1545.pdf177301B
-rw-r--r--docs/10.1.1.6.2954.pdf548724B
-rw-r--r--docs/10.1.1.60.7750_0.pdf33421L
-rw-r--r--docs/10.1.1.60.8756.pdf205125B
-rw-r--r--docs/10.1.1.61.249.pdf142518B
-rw-r--r--docs/10.1.1.61.3184.pdf130487B
-rw-r--r--docs/10.1.1.61.5727.pdf73627B
-rw-r--r--docs/10.1.1.61.6219.pdf86627B
-rw-r--r--docs/10.1.1.62.3119.pdf296547B
-rw-r--r--docs/10.1.1.63.2427.pdf81247B
-rw-r--r--docs/10.1.1.65.4280_0.pdf354223B
-rw-r--r--docs/10.1.1.65.8267.pdf328246B
-rw-r--r--docs/10.1.1.65.8269_0.pdf117222B
-rw-r--r--docs/10.1.1.65.9976.pdf964232B
-rw-r--r--docs/10.1.1.66.7970.pdf205689B
-rw-r--r--docs/10.1.1.67.6509.pdf1073095B
-rw-r--r--docs/10.1.1.67.9307.pdf96066B
-rw-r--r--docs/10.1.1.68.5832.pdf177910B
-rw-r--r--docs/10.1.1.68.7579.pdf256497B
-rw-r--r--docs/10.1.1.72.3011.pdf217380B
-rw-r--r--docs/10.1.1.72.8036.pdf110188B
-rw-r--r--docs/10.1.1.73.6464.pdf243728B
-rw-r--r--docs/10.1.1.73.7247.pdf429807B
-rw-r--r--docs/10.1.1.74.1585.pdf357267B
-rw-r--r--docs/10.1.1.74.8097.pdf333185B
-rw-r--r--docs/10.1.1.76.5241.pdf411997B
-rw-r--r--docs/10.1.1.76.9310.pdf810661B
-rw-r--r--docs/10.1.1.79.364.pdf773713B
-rw-r--r--docs/10.1.1.79.4460.pdf363208B
-rw-r--r--docs/10.1.1.80.1566.pdf263598B
-rw-r--r--docs/10.1.1.80.713.pdf214842B
-rw-r--r--docs/10.1.1.83.5920.pdf7961L
-rw-r--r--docs/10.1.1.84.5715.pdf80277B
-rw-r--r--docs/10.1.1.84.9197.pdf107075B
-rw-r--r--docs/10.1.1.85.9211.pdf67494B
-rw-r--r--docs/10.1.1.87.7718.pdf239213B
-rw-r--r--docs/10.1.1.88.2405.pdf135230B
-rw-r--r--docs/10.1.1.88.2407_0.pdf151422B
-rw-r--r--docs/10.1.1.88.2793.pdf723434B
-rw-r--r--docs/10.1.1.88.2867.pdf1035264B
-rw-r--r--docs/10.1.1.9.5699.pdf180128B
-rw-r--r--docs/10.1.1.90.8499.pdf369572B
-rw-r--r--docs/10.1.1.90.9758.pdf163771B
-rw-r--r--docs/10.1.1.91.8217.pdf828605B
-rw-r--r--docs/10.1.1.91.8331.pdf181099B
-rw-r--r--docs/10.1.1.92.7281.pdf197131B
-rw-r--r--docs/10.1.1.94.4826.pdf267978B
-rw-r--r--docs/10.1.1.96.4283.pdf432968B
-rw-r--r--docs/107.pdf101891B
-rw-r--r--docs/173.pdf36248B
-rw-r--r--docs/180.pdf99659B
-rw-r--r--docs/19490.pdf83441L
-rw-r--r--docs/1999syverson-fm99.pdf265128B
-rw-r--r--docs/2002-08-esorics02-ipd-correlation.pdf408226B
-rw-r--r--docs/2004-ISLPED-Energy-aware_demand_paging_on_NAND_flash-based_embedded_storages.pdf222664B
-rw-r--r--docs/2007j_sigirforum_shen.pdf150348B
-rw-r--r--docs/2011-FSW-Scalability-Paranoia.pdf189734B
-rw-r--r--docs/264.pdf495157B
-rw-r--r--docs/30c3gns.pdf2013211B
-rw-r--r--docs/31.pdf320385B
-rw-r--r--docs/6-914.ppt465408B
-rw-r--r--docs/617203.pdf1172625B
-rw-r--r--docs/A02370_DF_CFP_SpringerOpen_SI_CFP_EURASIP_JWCN_Global_A42.pdf474589B
-rw-r--r--docs/AAAI'08_-_Local_search_for_DCOP.pdf200389B
-rw-r--r--docs/AAAI'96_-_Mixed_constraint_satisfaction.pdf123033B
-rw-r--r--docs/AAMAS'05_-_Accelerating_the_DCOP_algorithm_ADOPT.pdf4661000B
-rw-r--r--docs/AAMAS08_-_DCOP_algorithms_in_a_real_world_problem.pdf486149B
-rw-r--r--docs/ACM_Computing_Surveys_-_A_survey_of_p2p_content_distribution_technologies.pdf517773B
-rw-r--r--docs/ACM_SIGCOMM'05_-_Cheng_&_Friedman_-_Sybilproof_reputation_mechanisms.pdf189455B
-rw-r--r--docs/ACNS'05_-_Garcia_&_Hoepman_-_Off-line_Karma.pdf179762B
-rw-r--r--docs/ACSAC'02_-_A_secure_directory_service_based_on_exclusive_encryption.pdf231311B
-rw-r--r--docs/ACSAC'11_-_BACKLIT.pdf702766B
-rw-r--r--docs/ACSAC'11_-_Tortoise.pdf476389B
-rw-r--r--docs/ADC07.pdf1027025B
-rw-r--r--docs/AIMS'09_-_Sybil_attacks_protection_schemes_in_KAD.pdf245803B
-rw-r--r--docs/ALL.bib8L
-rw-r--r--docs/APFS.pdf224125B
-rw-r--r--docs/ARES'06_-_Fair_Trading_of_Information.pdf423016B
-rw-r--r--docs/ASIACRYPT'07_-_IBBE_with_constant_size_ciphertexts_and_private_keys.pdf503474B
-rw-r--r--docs/ASWN2003.pdf743356B
-rw-r--r--docs/ATEC'04_-_A_network_positioning_system.pdf223195B
-rw-r--r--docs/A_Novel_Testbed_for_P2P_Networks.pdf344958B
-rw-r--r--docs/Amann_-_Secure_asynchronous_change_notifications.pdf931135B
-rw-r--r--docs/Amnefelt_&_Svenningsson_-_Keso.pdf341739B
-rw-r--r--docs/AnonymityTrilemma_StrongAnonymityLowBandwidthOverheadLowLatency_ChooseTwo.pdf941645B
-rw-r--r--docs/Applied_Intelligence_-_Combinatorial_Auctions.pdf672330B
-rw-r--r--docs/AthanRAM07.pdf374631B
-rw-r--r--docs/AuthenticationEuroPKI2008.pdf346612B
-rw-r--r--docs/AutoNetkit_0.pdf454269B
-rw-r--r--docs/BD.pdf60980B
-rw-r--r--docs/BFTSim-nsdi08.pdf299518B
-rw-r--r--docs/BLIP2012Alaggan.pdf529720B
-rw-r--r--docs/BM-mixencrypt.pdf263941B
-rw-r--r--docs/BS.pdf180043B
-rw-r--r--docs/BenSalemBHJ03mobihoc.pdf204705B
-rw-r--r--docs/Bogetoft_et_al._-_Secure_multiparty_computation_goes_live.pdf335795B
-rw-r--r--docs/BonehGolle-psp2002.pdf6929L
-rw-r--r--docs/Brahms-Comnet-Mar09.pdf802515B
-rw-r--r--docs/Brahms-rps-mar09.pdf833280B
-rw-r--r--docs/Brodening2013Chatzikokolakis.pdf694007B
-rw-r--r--docs/Browne_et_al_-_A_survey_of_MCTS_methods.pdf2465222B
-rw-r--r--docs/Brumley_&_Tuveri_-_Timing_Attacks.pdf356025B
-rw-r--r--docs/BucheggerL02.pdf149637B
-rw-r--r--docs/BuildingAnASTopologyModel.pdf499394B
-rw-r--r--docs/ButtyanH03monet.pdf176799B
-rw-r--r--docs/CCS'03_-_Yang_&_Garcia-Molina_-_PPay.pdf14231L
-rw-r--r--docs/CCS'06_-_Attributed-based_encryption_for_fine-grained_access_control_of_encrypted_data.pdf277458B
-rw-r--r--docs/CCS'07_-_ABE_with_non-monotonic_access_structures.pdf216604B
-rw-r--r--docs/CCS'08_-_FairplayMP.pdf266316B
-rw-r--r--docs/CCS'08_-_Identity-based_encryption_with_efficient_revocation.pdf302141B
-rw-r--r--docs/CCS'11_-_Cirripede.pdf1116428B
-rw-r--r--docs/CCS'11_-_Throughput-fingerprinting.pdf451773B
-rw-r--r--docs/CCS'11_-_Trust-based_Anonymous_Communication1.pdf373511B
-rw-r--r--docs/CG'06_-_Selectivity_and_backup_operators_in_MCTS.pdf136788B
-rw-r--r--docs/CIA'04_-_Despotovic_&_Aberer_-_Peers'_performance_in_P2P_networks.pdf190223B
-rw-r--r--docs/CMU-CS-99-148.pdf446488B
-rw-r--r--docs/CRYPTO'02_-_The_LSD_broadcast_encryption_scheme.pdf166360B
-rw-r--r--docs/CRYPTO'84_-_El_Gamal_-_Public_Key_Cryptosystem.pdf336486B
-rw-r--r--docs/CSD-01-1141.pdf194015B
-rw-r--r--docs/CSD-02-1178.pdf227576B
-rw-r--r--docs/CSD-05-1390.pdf222801B
-rw-r--r--docs/CSET'11_-_ExperimenTor.pdf489919B
-rw-r--r--docs/CU-CS-909-00.pdf157009B
-rw-r--r--docs/CaberNet_Radicals_Workshop_-_Puzzles_in_P2P_Systems.pdf127742B
-rw-r--r--docs/CameraReady_240.pdf126013B
-rw-r--r--docs/Chaffinch.pdf192760B
-rw-r--r--docs/ChatziPP07.pdf1605556B
-rw-r--r--docs/ChinaCom'06_-_Combating_hidden_action_in_unstructured_p2p_systems.pdf5539323B
-rw-r--r--docs/Choosing-ε-2011Lee.pdf380069B
-rw-r--r--docs/CoNEXT2008.pdf343787B
-rw-r--r--docs/CoRR_-_Critical_look_at_decentralization.pdf163362B
-rw-r--r--docs/CoRR_-_X-Vine.pdf427038B
-rw-r--r--docs/CollusionResistant2009Melchor.pdf273722B
-rw-r--r--docs/Combining_Virtual_and_Physical_Structures_for_Self-organized_Routing_0.pdf453012B
-rw-r--r--docs/Communications_of_the_ACM_-_Reputation_Systems.pdf67185B
-rw-r--r--docs/Compcon_'97_-_Privacy-enhancing_Technologies_for_the_Internet.pdf42068B
-rw-r--r--docs/CompletelenessTheorems1988Ben-Or.pdf1045722B
-rw-r--r--docs/Computer_Networks_-_Wang,_Chiu_&_Lui_-_Overlay_network_traffic_on_ISP_peering.pdf380115B
-rw-r--r--docs/Concurrency_and_Computation_-_TRIBLER.pdf281955B
-rw-r--r--docs/DD08Survey.pdf334714B
-rw-r--r--docs/DIALM'02_-_Feigenbaum_&_Shenker_-_Distributed_algorithmic_mechanism_design.pdf181536B
-rw-r--r--docs/DIP_2872.pdf520133B
-rw-r--r--docs/DP5:_A_Private_Presence_Service.pdf611692B
-rw-r--r--docs/DPwithImperfectRandomness2012Dodis.pdf368311B
-rw-r--r--docs/Dan-SFMix03.pdf463823B
-rw-r--r--docs/DanezisDKT09.pdf266957B
-rw-r--r--docs/DanezisG09.pdf484535B
-rw-r--r--docs/Deanonymization2008narayanan.pdf702939B
-rw-r--r--docs/Dellarocas_-_Reputation_Mechanisms.pdf650219B
-rw-r--r--docs/Dependent_Link_Padding_Algorithms_for.pdf1740835B
-rw-r--r--docs/DiazThesis05.pdf1474252B
-rw-r--r--docs/DifferentialPrivacy2006Dwork_0.pdf194959B
-rw-r--r--docs/DifferentialPrivacy2011Alvim.pdf261471B
-rw-r--r--docs/DisclousrePrevention2010Dwork.pdf867L
-rw-r--r--docs/DistributedPrivateData2008Beimel.pdf359274B
-rw-r--r--docs/DistributedSearch2014Hermann.pdf342436B
-rw-r--r--docs/DistributingSocialApp2010Leroy.pdf3583482B
-rw-r--r--docs/Douglas-thesis.pdf3713207B
-rw-r--r--docs/Duminuco_&_Biersack_-_Hierarchical_Codes.pdf478014B
-rw-r--r--docs/EC'04_-_Robust_incentive_techniques_for_P2P_networks.pdf168711B
-rw-r--r--docs/EC'05_-_Hidden-action_in_multi-hop_routing.pdf237707B
-rw-r--r--docs/EC'06_-_Incentive-compatible_interdomain_routing.pdf245673B
-rw-r--r--docs/EC'08_-_Why_share_in_peer-to-peer_networks.pdf138205B
-rw-r--r--docs/EC'09_-_Sybilproof_transitive_trust_protocols.pdf173640B
-rw-r--r--docs/EUROCRYPT'05_-_Fuzzy_Identity-Based_Encryption.pdf200579B
-rw-r--r--docs/EUROCRYPT'89_-_Waidner&Pfitzmann_-_The_dining_cryptographers_in_the_disco_.pdf82278B
-rw-r--r--docs/EUROCRYPT'92_-_Chaun_&_Pedersen_-_Transferred_cash_grows_in_size.pdf1086366B
-rw-r--r--docs/EdmanS09.pdf158444B
-rw-r--r--docs/EdmanSY07.pdf188957B
-rw-r--r--docs/EffecitvePrivateMatching2004Freedman.pdf306947B
-rw-r--r--docs/EmpiricalAspects2009Wang.pdf268976B
-rw-r--r--docs/EppGooUye-SIGCOMM-11.pdf341292B
-rw-r--r--docs/Erdős_&_Rényi_-_On_Random_Graphs.pdf1410802B
-rw-r--r--docs/Euro-Par'05_-_Pastis.pdf123992B
-rw-r--r--docs/Experiences_Deploying_a_Large-Scale_Emergent_Network.pdf93370B
-rw-r--r--docs/FAST'09_-_Open-source_erasure_coding_libraries_for_storage.pdf515672B
-rw-r--r--docs/FC'11_-_BNymble.pdf191536B
-rw-r--r--docs/FC'11_-_Malice_versus_AN.ON_.pdf1040865B
-rw-r--r--docs/FC'11_-_Proximax.pdf179439B
-rw-r--r--docs/FC'12_-_Congestion-aware_Path_Selection_for_Tor.pdf962626B
-rw-r--r--docs/FGCS_-_P2P_Contracts:_a_Framework_for_Resource_and_Service_Exchange.pdf201234B
-rw-r--r--docs/FOCI'11_-_Decoy_Routing:_Toward_Unblockable_Internet_Communication.pdf145566B
-rw-r--r--docs/FREENIX'01_-_A_transparent_cryptographic_file_system_for_UNIX.pdf145234B
-rw-r--r--docs/FalsepositiverateBloomFilter2008Bose.pdf128200B
-rw-r--r--docs/Feldman,_Lai,_Chuang_&_Stoica_-_Quantifying_disincentives_in_peer-to-peer_networks.pdf116464B
-rw-r--r--docs/Finite-length_analysis_of_low-density_parity-check_codes_on.pdf474693B
-rw-r--r--docs/Fireflies.pdf179116B
-rw-r--r--docs/FitHir06.pdf128034B
-rw-r--r--docs/Formalizing_Anonymous_Blacklisting_Systems.pdf966218B
-rw-r--r--docs/Freedom_Security2-1.pdf55910B
-rw-r--r--docs/Fu--FlowMarking--2005.pdf247715B
-rw-r--r--docs/GECON'04_-_Designing_incentive_mechanisms_for_p2p_systems.pdf403825B
-rw-r--r--docs/GHPvR05.pdf4153L
-rw-r--r--docs/GKK03.pdf310356B
-rw-r--r--docs/GNUnet_pet.pdf3014L
-rw-r--r--docs/Generalisation2001Damgard.pdf250591B
-rw-r--r--docs/Ghodsi_-_Distributed_k-ary_System.pdf1635373B
-rw-r--r--docs/Golle-sp2006.pdf184479B
-rw-r--r--docs/GolleJakobssonJuelsSyverson-universal04.pdf2529L
-rw-r--r--docs/GossipPeerSampling2007Jelasity.pdf689931B
-rw-r--r--docs/Gossipico.pdf499173B
-rw-r--r--docs/Gossiping2007Kermarrrec.pdf168161B
-rw-r--r--docs/Grid_Computing_-_Estimating_The_Size_Of_Peer-To-Peer_Networks.pdf654064B
-rw-r--r--docs/Group_Decision_and_Negociation_-_Automated_Negociation.pdf1037008B
-rw-r--r--docs/HICSS'02_-_A_computational_model_of_trust_and_reputation.pdf363406B
-rw-r--r--docs/HOT-P2P'05_-_Khorshadi,_Liu_&_Ghosal.pdf270414B
-rw-r--r--docs/HPDC'06_-_Peer_to_peer_size_estimation_in_large_and_dynamic_networks.pdf495491B
-rw-r--r--docs/HPL-2002-163.pdf713563B
-rw-r--r--docs/HotOS_IX_-_High_available,_scalable_storage,_dynamic_peer_networks.pdf96589B
-rw-r--r--docs/HotOrNot.pdf1492855B
-rw-r--r--docs/HotP2P'10_-_KAD_DHT_attack_mitigation.pdf321859B
-rw-r--r--docs/I2P-PET-CON-2009.1.pdf257242B
-rw-r--r--docs/ICC'08_-_Super-Seeding_in_BitTorrent.PDF249457B
-rw-r--r--docs/ICDCN'10_-_Poisoning_the_Kad_Network.pdf387398B
-rw-r--r--docs/ICDCS'02_-_Reclaiming_space_for_duplicate_files.pdf572963B
-rw-r--r--docs/ICDCS'04.pdf157938B
-rw-r--r--docs/ICDCS'06_-_Improving_traffic_locality_in_BitTorrent.pdf155172B
-rw-r--r--docs/ICDCS'09_-_Regenerating_codes_for_p2p_backup_systems.pdf445777B
-rw-r--r--docs/ICN'07_-_PlanetLab.pdf253943B
-rw-r--r--docs/ICNP'03_-_Resilient_peer-to-peer_streaming.pdf372484B
-rw-r--r--docs/IEEE-IC-SecurityPerformance-May-2003.pdf309330B
-rw-r--r--docs/IEEE_CST_-_A_Survey_and_Comparison_of_Peer-to-Peer_Overlay.pdf276266B
-rw-r--r--docs/IEEE_Communications_Magazine_-_Video_Streaming_in_P2P_Systems.pdf793579B
-rw-r--r--docs/IEEE_Computer_Society_-_2Fast.pdf211293B
-rw-r--r--docs/IEEE_DSO_-_Free_riding_on_Gnutella_revisited.pdf335280B
-rw-r--r--docs/IEEE_Journal_(25)_-_Hidden-action_in_network_routing.pdf424887B
-rw-r--r--docs/IEEE_Trans._on_Info._-_New_directions_in_cryptography.pdf2216632B
-rw-r--r--docs/IEEE_Transactions_on_Systems_-_Descentralized_learning.pdf311278B
-rw-r--r--docs/IEEE⁄ACM_Banner_&_Orda.pdf681489B
-rw-r--r--docs/IEEE⁄ACM_Trans._Netw.'02_(10)-_Internet_pricing.pdf368751B
-rw-r--r--docs/IEEE⁄ACM_Transactions_on_Networking_-_Detecting_shared_congestion_of_flows.pdf383575B
-rw-r--r--docs/IH-1996.pdf185743B
-rw-r--r--docs/IJCAI'07_-_PC-DPOP.pdf226457B
-rw-r--r--docs/IJCCR_vol_10_(2006)_1_Ardron_and_Lietaer.pdf259905B
-rw-r--r--docs/IMC'04_-_Availability,_Usage,_and_Deployment_Characteristics_of_the_DNS.pdf856335B
-rw-r--r--docs/IMC'05_-_Measurement,_analysis_and_modeling_of_BitTorrent-like_systems.pdf1889416B
-rw-r--r--docs/IMC'06_-_Understanding_churn_in_p2p_networks.pdf261059B
-rw-r--r--docs/IMC'07_-_A_global_view_of_KAD.pdf163341B
-rw-r--r--docs/IMC'08_-_Detecting_BitTorrent_Blocking.pdf481202B
-rw-r--r--docs/INFOCOM'02_-_Probabilistic_location_and_routing.pdf225708B
-rw-r--r--docs/INFOCOM'05_-_Designing_incentives_for_peer-to-peer_routing.pdf237564B
-rw-r--r--docs/INFOCOM'05_-_Exploiting_anarchy_in_networks.pdf282032B
-rw-r--r--docs/INFOCOM'05_-_Market-driven_bandwidth_allocation.pdf604015B
-rw-r--r--docs/INFOCOM'05_-_Network_coding_for_large_scale_content_distribution.pdf108753B
-rw-r--r--docs/INFOCOM'06_-_Pianese,_Keller_&_Biersack_-_PULSE.pdf177363B
-rw-r--r--docs/INFOCOM'07_-_MARCH.pdf208345B
-rw-r--r--docs/INFOCOM'07_-_Mesh_or_multiple-tree.pdf205472B
-rw-r--r--docs/INFOCOM'07_-_Network_coding_for_distributed_storage_systems.pdf400656B
-rw-r--r--docs/INFOCOM'07_-_PRIME.pdf369504B
-rw-r--r--docs/INFOCOM'08_-_Stable_peers.PDF261140B
-rw-r--r--docs/INFOCOM'09_-_Queusing_models_for_p2p_streaming_systems.pdf233400B
-rw-r--r--docs/INFOCOM'09_-_Sybilproof_Indirect_Reprocity_Mechanism_for_P2P_Networks_.pdf243216B
-rw-r--r--docs/INFOCOM'09_-_Traffic_Engineering_vs._Content_Distribution.PDF196665B
-rw-r--r--docs/INFOCOM05_Poster.pdf117426B
-rw-r--r--docs/INFOCOMM'09_-_Mechanism_design_without_payments.pdf723984B
-rw-r--r--docs/IPTPS'01_-_Complex_queries_in_DHT-based_p2p_networks.pdf163797B
-rw-r--r--docs/IPTPS'01_-_Erasure_coding_vs._replication.pdf93361B
-rw-r--r--docs/IPTPS'02_-_Douceur_-_The_Sybil_Attack.pdf100091B
-rw-r--r--docs/IPTPS'03_-_Rateless_codes_and_big_downloads.pdf103854B
-rw-r--r--docs/IPTPS'03_-_Towards_a_common_API.pdf92791B
-rw-r--r--docs/IPTPS'05_-_High_availability_in_DHTs:_erasure_coding_vs._replication.pdf100392B
-rw-r--r--docs/IPTPS'05_-_The_BitTorrent:_measurements_and_analysis.pdf779757B
-rw-r--r--docs/IPTPS'06_-_On_object_maintenance_in_p2p_systems.pdf130180B
-rw-r--r--docs/IPTPS'06_-_Skype_p2p_VoIP_System.pdf917329B
-rw-r--r--docs/IRB-TR-03-003.pdf233421B
-rw-r--r--docs/ITC-20'07_-_Estimating_churn_in_structured_p2p_networks.pdf652466B
-rw-r--r--docs/IWSOS'08_-_Network_Size_Estimation_for_Structured_Overlays.pdf661810B
-rw-r--r--docs/Infocom2007-sns.pdf933905B
-rw-r--r--docs/Infocom2008.pdf301764B
-rw-r--r--docs/Informatik_Spektrum_-_Peer-to-peer_networking_&_-computing.pdf144894B
-rw-r--r--docs/IntegerComparisonSolution2007Garay.pdf421884B
-rw-r--r--docs/InterestsInference2010Wen.pdf443516B
-rw-r--r--docs/JPE_(1993)_-_Gode_&_Sunder_-_Allocative_Efficiency.pdf4934L
-rw-r--r--docs/Jelasity,_Montresor_&_Babaoglu_-_Gossip-based_aggregation.pdf533887B
-rw-r--r--docs/Jiang,_Bai_&_Wang_-_Trust_and_Cooperation_in_Peer-to-Peer_Systems.pdf57598B
-rw-r--r--docs/Journal_of_AI_-_BnB-ADOPT.pdf1118962B
-rw-r--r--docs/Journal_of_Parallel_&_Distributed_Computing_-_Deleting_files_in_the_Celeste_p2p_storage_systems.pdf316979B
-rw-r--r--docs/Journal_of_Public_Economics_-_Bolton,_Katok_&_Ockenfels.pdf171465B
-rw-r--r--docs/Journal_of_Supercomputing_-_Insight_into_redundancy_schemes_in_DHTs.pdf377919B
-rw-r--r--docs/Kernighan_&_Lin_-_An_Efficient_Heuristic_Procedure_for_Partitioning_Graphs%0A.pdf1644398B
-rw-r--r--docs/Kising_-_Proximity_Neighbor_Selection_for_IGOR.pdf504001B
-rw-r--r--docs/KongHG07.pdf271575B
-rw-r--r--docs/LAP:_Lightweight_Anonymity_and_Privacy.pdf623018B
-rw-r--r--docs/LASTor:_A_Low-Latency_AS-Aware_Tor_Client.pdf587476B
-rw-r--r--docs/LNCS_-_Distributed_Hash_Tables.pdf663450B
-rw-r--r--docs/LOCEntropy2008.pdf2145L
-rw-r--r--docs/Laffont_&_Martimort_-_The_Theory_of_Incentives.pdf2885306B
-rw-r--r--docs/Lecture_Notes_in_Computer_Science_-_Selected_DHT_Algorithms_.pdf373183B
-rw-r--r--docs/LessHashing2006Kirsch.pdf481622B
-rw-r--r--docs/Levine-2002.pdf331338B
-rw-r--r--docs/Liberatore-2006.pdf1129382B
-rw-r--r--docs/LightweightParadigm.pdf170873B
-rw-r--r--docs/Long_Term_Study_of_Peer_Behavior_in_the_kad_DHT.pdf5127L
-rw-r--r--docs/LowerBoundsDP2012De.pdf300103B
-rw-r--r--docs/MDS'07_-_Conner_&_Nahrstedt_-_Securing_peer-to-peer_media_streaming_systems.pdf81085B
-rw-r--r--docs/MIT-LCS-TR-179.pdf3956207B
-rw-r--r--docs/MMVEConsistency.pdf101658B
-rw-r--r--docs/MalleshW07.pdf186258B
-rw-r--r--docs/Malugo.pdf1384774B
-rw-r--r--docs/MarPi08.pdf388866B
-rw-r--r--docs/Marti-ElsevierScienceSubmitted05_0.pdf137938B
-rw-r--r--docs/Marx_-_Parameterized_graph_separation_problems.pdf223322B
-rw-r--r--docs/Menezes_&_Monteiro_-_An_Introduction_to_Auction_Theory.pdf1024012B
-rw-r--r--docs/Mies_-_SpoVNet.pdf855827B
-rw-r--r--docs/MultiParty2009Narayanan.pdf237480B
-rw-r--r--docs/MultiPartyComputation2001Cramer.pdf288149B
-rw-r--r--docs/MultiPartyComputation2007Nishide.pdf573462B
-rw-r--r--docs/NCA'05_-_Decentralized_Schemes_for_Size_Estimation_in_Large_and_Dynamic_Groups.pdf1700392B
-rw-r--r--docs/NDSS'11_-_Security_API_for_Distributed_Social_Networks.pdf1061504B
-rw-r--r--docs/NDSS11-2.pdf591374B
-rw-r--r--docs/NET-2011-08-1.pdf5578807B
-rw-r--r--docs/NET-2015-02-1.pdf4125709B
-rw-r--r--docs/NGC'03_-_Scalable_Application-level_Anycast_.pdf120085B
-rw-r--r--docs/NMNC_-_Progressive_strategies_for_MCTS.pdf367543B
-rw-r--r--docs/NSDI'04_-_Designing_a_DHT_for_low_latency_and_high_throughput.pdf243452B
-rw-r--r--docs/NSDI'07_-_Do_incentives_build_robustness_in_BitTorrent.pdf955812B
-rw-r--r--docs/NarayananS09.pdf261102B
-rw-r--r--docs/NetCod'05_-_Random_linear_coding_based_distributed_networked_storage.pdf223284B
-rw-r--r--docs/NetEcon'03_-_Cohen_-_Incentives_build_robustness_in_BitTorrent.pdf81110B
-rw-r--r--docs/NetEcon'06_-_Harvelaar.pdf549850B
-rw-r--r--docs/NetEcon'06_-_Improving_robustness_of_p2p_streaming.pdf107858B
-rw-r--r--docs/NetEcon'08_-_Yang_-_Auction,_but_don't_block.pdf369873B
-rw-r--r--docs/NetworkWithoutUserObservabiliy1985Pfitzmann.pdf506407B
-rw-r--r--docs/Neumann_&_Morgenstern_-_Theory_of_Games_and_Economic_Behavior.pdf33143357B
-rw-r--r--docs/ODSBR-TISSEC.pdf581550B
-rw-r--r--docs/OPODIS-116b.pdf2138L
-rw-r--r--docs/OSDI'00_-_Fast_and_Secure_Distributed_Read-Only_File_System.pdf399590B
-rw-r--r--docs/OSDI'00_-_Overcast.pdf1469L
-rw-r--r--docs/Oper._Res._-_Optimal_Resource_Allocation.pdf180433B
-rw-r--r--docs/OptimallyFairCoinToss2009Moran.pdf376906B
-rw-r--r--docs/Ostrovsky-Skeith.pdf3957L
-rw-r--r--docs/OurData2006Dwork.pdf501611B
-rw-r--r--docs/P2P'03_-_Buragohain,_Agrawal_&_Suri_-_Incentives_in_P2P_systems.pdf176308B
-rw-r--r--docs/P2P'03_-_Identity_crisis:_anonymity_vs_reputation.pdf102194B
-rw-r--r--docs/P2P'04_-_Reputation_management_framework.pdf427283B
-rw-r--r--docs/P2P'09_-_PeerSim.pdf64900B
-rw-r--r--docs/P2PECON'05_-_Incentives_in_BitTorrent_induce_free_riding.pdf203312B
-rw-r--r--docs/P2PECON'05_-_KARMA.pdf119291B
-rw-r--r--docs/P2PECON'05_-_Self-recharging_virtual_currency.pdf139169B
-rw-r--r--docs/P2PEcon'04_-_SWIFT.pdf96545B
-rw-r--r--docs/P2PEcon'05_-_A_new_mechanism_for_the_free-rider_problem.pdf144169B
-rw-r--r--docs/PAM'04_-_Dissecting_bittorrent.pdf208806B
-rw-r--r--docs/PASSAT'11_-_Multiparty_linear_programming.pdf323020B
-rw-r--r--docs/PETS'11_-_An_Accurate_System-Wide_Anonymity_Metric_for_Probabilistic_Attacks.pdf264210B
-rw-r--r--docs/PETS'11_-_DefenestraTor.pdf772304B
-rw-r--r--docs/PINS'04_-__Free-riding_and_whitewashing_in_P2P_systems.pdf121347B
-rw-r--r--docs/PIR_Kesdogan.pdf183033B
-rw-r--r--docs/PNAS_(2003)_-_The_evolution_of_altruistic_punishment.pdf239344B
-rw-r--r--docs/PNAS_-_Nash_-_Equilibrium_points_in_n-person_games.pdf235487B
-rw-r--r--docs/PODC'02_-_Building_secure_file_systems_out_of_Byzantine_storage.pdf159568B
-rw-r--r--docs/PODC'06_-_Peer_counting_and_sampling_in_overlay_networks.pdf208212B
-rw-r--r--docs/PShuffle.pdf185492B
-rw-r--r--docs/Pastry.pdf171247B
-rw-r--r--docs/Patterns_of_Failure.pdf104690B
-rw-r--r--docs/Peek-a-Boo,_I_Still_See_You:_Why_Efficient_Traffic_Analysis_Countermeasures_Fail.pdf652864B
-rw-r--r--docs/Personalization2012Toch.pdf595419B
-rw-r--r--docs/PersonalizedRecommender2012Zhou.pdf175737B
-rw-r--r--docs/PersonalizedWebSearch2004Liu.pdf1167769B
-rw-r--r--docs/PlayMentalGame1987Goldreich.pdf1291546B
-rw-r--r--docs/Polot2010.pdf1047893B
-rw-r--r--docs/Preface.pdf295898B
-rw-r--r--docs/PrivacyIntergratedQueries2009McSherry.pdf854813B
-rw-r--r--docs/PrivacyPractices2005Jensen.pdf378432B
-rw-r--r--docs/PrivacyPreserving2006Shaneck.pdf128421B
-rw-r--r--docs/PrivacyPreserving2007Ambirbekyan.pdf396566B
-rw-r--r--docs/PrivacyPreservingSetOperations2005Kissner.pdf245850B
-rw-r--r--docs/Privacy_PPNA2011Das.pdf643128B
-rw-r--r--docs/PrivateRecommender2009McSherry.pdf483886B
-rw-r--r--docs/PrivateRecordMatching2010Inan.pdf2899L
-rw-r--r--docs/PrivateScalarProduct2004Goethals.pdf242830B
-rw-r--r--docs/PrivateSimilarity2011Alaggan.pdf422112B
-rw-r--r--docs/Prospects_for_Remailers.pdf97840B
-rw-r--r--docs/ProtocolSecurecomputations1982Yao.pdf705034B
-rw-r--r--docs/PublicKeyCryptoSystems1999Paillier.pdf298453B
-rw-r--r--docs/QoS_pubsub.pdf178370B
-rw-r--r--docs/Quest01.pdf209675B
-rw-r--r--docs/README6L
-rw-r--r--docs/RI070302.pdf483599B
-rw-r--r--docs/RP03-1.pdf111290B
-rw-r--r--docs/RR-5578.pdf341780B
-rw-r--r--docs/RRMPH02-1.pdf83606B
-rw-r--r--docs/Reed_&_Solomon_-_Polynomial_Codes_Over_Certain_Finite_Fields.pdf411866B
-rw-r--r--docs/Reliable_MultiCast1997Flyod.pdf3101549B
-rw-r--r--docs/Retrivability_of_data_in_ad-hoc_backup.pdf3642777B
-rw-r--r--docs/RevelaingInformation2003Dinur.pdf209895B
-rw-r--r--docs/SAINT'03_-_Kwon_&_Ryu.pdf339233B
-rw-r--r--docs/SAINT'07_-_Local_production,_local_consumption_p2p_architecture.pdf1096754B
-rw-r--r--docs/SASO'07_-_Garbacki,_Epema_&_van_Steen.pdf407897B
-rw-r--r--docs/SBirrer-dhtBasedMulticast_0.pdf80284B
-rw-r--r--docs/SELMAS_-_Software_framework_for_automated_negotiation.pdf339107B
-rw-r--r--docs/SHA1AttackProceedingVersion.pdf2631L
-rw-r--r--docs/SIGCOMM'03_-_On_selfish_routing_in_internet-like_environments.pdf228887B
-rw-r--r--docs/SIGCOMM'03_-_The_impact_of_DHT_routing_geometry_on_resilience_and_proximity.pdf420760B
-rw-r--r--docs/SIGCOMM'04_-_Qui_&_Srikant_-_Modeling_and_performance_analysis.pdf510688B
-rw-r--r--docs/SIGCOMM'06_-_SybilGuard.pdf368617B
-rw-r--r--docs/SIGCOMM'08_-_Rationality_and_traffic_attraction.pdf386963B
-rw-r--r--docs/SIGCOMM'11_-_Uncovering_social_network_sybils.pdf536897B
-rw-r--r--docs/SIGCOMM'87_-_Strategies_for_decentralized_resource_management.pdf1172234B
-rw-r--r--docs/SIGCOMM_Comp._Comm._Rev._-_Minimizing_churn_in_distributed_systems.pdf493993B
-rw-r--r--docs/SIGCOMM_Compt._Commun._Rev._-_Vivaldi.pdf649008B
-rw-r--r--docs/SIGCOMM_Comput._Commun._Rev._-_BitTorrent_is_an_Auction.pdf362312B
-rw-r--r--docs/SIGCOMM_Comput._Commun._Rev._-_P4P:_Provider_Portal_for_Applications.pdf507572B
-rw-r--r--docs/SIGCOMM_Comput._Commun._Rev._-_Practical,_distributed_network_coordinates.pdf277622B
-rw-r--r--docs/SIGCOMM_Comput._Commun._Rev._-_Securing_Internet_Coordinate_Embedding_Systems.pdf7137L
-rw-r--r--docs/SIGCOMM_Comput._Commun._Rev_-_Network_Coding:_an_Instant_Primer.pdf145102B
-rw-r--r--docs/SIGCOMM_Computers_Communication_Review_-_Bubblestorm.pdf776426B
-rw-r--r--docs/SIGKDD_Explor._Newsl._-_Distributed_data_mining.pdf125039B
-rw-r--r--docs/SIGMETRICS'05_-_Bharambe,_Herley_&_Padmanabhan.pdf830L
-rw-r--r--docs/SIGMETRICS'05_-_Coupon_replication_systems.pdf239323B
-rw-r--r--docs/SIGOPS_-_FARSITE.pdf290248B
-rw-r--r--docs/SIGOSP'03_-_Spitstream:_High-bandwidth_multicast.pdf1650124B
-rw-r--r--docs/SIGecom_Exch._(5)_-_Overcoming_free-riding_behavior.pdf119236B
-rw-r--r--docs/SK.pdf443913B
-rw-r--r--docs/SKademlia2007.pdf210797B
-rw-r--r--docs/SODA'04_-_Network_failure_detection_and_graph_connectivity%0A.pdf172158B
-rw-r--r--docs/SOSP'03_-_Bullet.pdf375512B
-rw-r--r--docs/SPAA'05_-_Selfish_routing_with_incomplete_information.pdf630211B
-rw-r--r--docs/SRC-RR-168.pdf108087B
-rw-r--r--docs/SRDS'06_-_Cryptree.pdf339393B
-rw-r--r--docs/STACS'99_-_Nisan_-_Algorithms_for_selfish_agents.pdf239886B
-rw-r--r--docs/STOC'08_-_Optimal_mechanism_design_and_money_burning.pdf282489B
-rw-r--r--docs/STOC'97_-_Practical_Loss-Resilient_Codes.pdf159206B
-rw-r--r--docs/STOC'99_-_Nisan_&_Ronen_-_Algorithmic_mechanism_design.pdf321145B
-rw-r--r--docs/Saito_-_i-WAT_Dissertation.pdf14256574B
-rw-r--r--docs/Salsa.pdf226613B
-rw-r--r--docs/Schollmeier_-_Signaling_and_networking_in_unstructured_p2p_networks.pdf5555941B
-rw-r--r--docs/Science_-_Hardin_-_The_Tragedy_of_the_Commons.pdf341229B
-rw-r--r--docs/Secure_Collaborative_Planning_Forecasting_and_Replenishment.pdf556200B
-rw-r--r--docs/Serj02-iptps.pdf127758B
-rw-r--r--docs/ShWa-Relationship.pdf89394B
-rw-r--r--docs/ShWa-Timing06.pdf188210B
-rw-r--r--docs/SocialMarket2011Frey.pdf653103B
-rw-r--r--docs/Stathopoulos07a.pdf215483B
-rw-r--r--docs/SupritiSinghMasterThesis.pdf622873B
-rw-r--r--docs/TH04.pdf237778B
-rw-r--r--docs/THV04.pdf185380B
-rw-r--r--docs/TISSEC_-_PEREA.pdf983616B
-rw-r--r--docs/TM-2009-3.pdf729975B
-rw-r--r--docs/Tariq2011Meeting.pdf1172022B
-rw-r--r--docs/Tech_Report_-_A_Survey_of_Solutions_to_the_Sybil_Attack.pdf140676B
-rw-r--r--docs/Tech_Report_-_Analyzing_peer_behavior_in_KAD.pdf1072069B
-rw-r--r--docs/Tech_Report_-_Privacy_guarantees_through_DCS.pdf233931B
-rw-r--r--docs/Tech_report_-_DCOP_as_a_formal_model_of_PARC.pdf186769B
-rw-r--r--docs/Telex:_Anticensorship_in_the_Network_Infrastructure.pdf2482127B
-rw-r--r--docs/TheoryandPracticeBloomFilter2011Tarkoma.pdf1362039B
-rw-r--r--docs/Thesis_-_Autonomic_distributed_systems.pdf1584594B
-rw-r--r--docs/Thesis_-_F.Schadd.pdf1228723B
-rw-r--r--docs/Thesis_-_P.Harvey.pdf1461610B
-rw-r--r--docs/TopK-Processing2011Bai.pdf846461B
-rw-r--r--docs/Trawling_for_tor_HS.pdf480808B
-rw-r--r--docs/Triebel2007a.pdf272941B
-rw-r--r--docs/Trivers_-_The_evolution_of_reciprocal_altruism.pdf504072B
-rw-r--r--docs/TroncosoD09.pdf845037B
-rw-r--r--docs/Trust_infocom06_v4.pdf303163B
-rw-r--r--docs/UCAM-CL-TR-637.pdf218613B
-rw-r--r--docs/UREbreak06.pdf163624B
-rw-r--r--docs/USENIX_-_PIR-Tor.pdf529570B
-rw-r--r--docs/USENIX_Security'10_-_SEPIA.pdf513008B
-rw-r--r--docs/UnconditionallySecure2006Damgard.pdf524954B
-rw-r--r--docs/UnconditionallySecureProtocol2007Li.pdf391684B
-rw-r--r--docs/User-Perceived_Performance_of_the_NICE_Application_Layer_Multicast_Protocol_in_Large_and_Highly_Dynamic_Groups_1.pdf700467B
-rw-r--r--docs/VTC03.pdf186910B
-rw-r--r--docs/VassermanJTHK09.pdf537456B
-rw-r--r--docs/WEIS'05_-_Moore_-_Counterin_hidden-action_attacks.pdf137878B
-rw-r--r--docs/WHW_12-NTALG.pdf1188273B
-rw-r--r--docs/WIAPP'03_-_Deconstructing_the_Kazaa_network.pdf331345B
-rw-r--r--docs/WPES'04_-_Forecasting_and_benchamking.pdf238177B
-rw-r--r--docs/WPES'11_-_FAUST.pdf241209B
-rw-r--r--docs/WPES'11_-_Fingerprinting.pdf476010B
-rw-r--r--docs/WPES'11_-_bridgeSPA.pdf186580B
-rw-r--r--docs/WWW'03_-_The_EigenTrust_algorithm.pdf223109B
-rw-r--r--docs/WangCJ05.pdf214073B
-rw-r--r--docs/WebPersonalization2012Zeng.pdf671018B
-rw-r--r--docs/WhatCanWeLearnPrivately2008Kasiviswanthan.pdf747858B
-rw-r--r--docs/WiOpt'03_-_Buchegger_&_Le_Boudec_-_Reputation_Systems.pdf167171B
-rw-r--r--docs/Widmer2001g.pdf2331529B
-rw-r--r--docs/Workshop_on_Economics_of_P2P_Systems'03_-_Chun,_Fu_&_Vahdat.pdf282657B
-rw-r--r--docs/Wright-2004.pdf373761B
-rw-r--r--docs/WrightMM06.pdf275123B
-rw-r--r--docs/Youmightlike2011Calandrino.pdf441976B
-rw-r--r--docs/a3.pdf154084B
-rw-r--r--docs/a7-pizzonia.pdf1186300B
-rw-r--r--docs/a_peel_of_the_onion__syverson_2011.pdf220462B
-rw-r--r--docs/adams06.pdf8849L
-rw-r--r--docs/adida07.pdf290618B
-rw-r--r--docs/aff.pdf227828B
-rw-r--r--docs/agrawal03.pdf421216B
-rw-r--r--docs/akerlof.pdf2765L
-rw-r--r--docs/alpha-mixing-pet2006.pdf170468B
-rw-r--r--docs/amann08igorfs.pdf89806B
-rw-r--r--docs/andrei-thesis.pdf903808B
-rw-r--r--docs/anonymity_and_cover_traffic.pdf431726B
-rw-r--r--docs/apres.pdf135553B
-rw-r--r--docs/arias2014bs.pdf371470B
-rw-r--r--docs/article-89.pdf166437B
-rw-r--r--docs/asplos-x_annot.pdf2184547B
-rw-r--r--docs/autonetkit-small.pdf349257B
-rw-r--r--docs/awerbuch-robust.pdf76499B
-rw-r--r--docs/ba_dold_voting_24aug2014.pdf408919B
-rw-r--r--docs/babel.pdf314612B
-rw-r--r--docs/bart2013ccc.pdf8034306B
-rw-r--r--docs/batman-status.pdf329645B
-rw-r--r--docs/bauer-alpaca2008.pdf177318B
-rw-r--r--docs/bauer-wpes2007.pdf224264B
-rw-r--r--docs/bayeux.pdf155053B
-rw-r--r--docs/beimel-barrier.pdf194507B
-rw-r--r--docs/beimel01informationtheoretic.pdf275263B
-rw-r--r--docs/berman-fc2004.pdf3001L
-rw-r--r--docs/bgpmisconfig.pdf309825B
-rw-r--r--docs/bloomfilter.pdf38868B
-rw-r--r--docs/bootstrap.pdf134826B
-rw-r--r--docs/brands06.pdf158882B
-rw-r--r--docs/btor.pdf855312B
-rw-r--r--docs/byz.pdf1245510B
-rw-r--r--docs/cadet.pdf358356B
-rw-r--r--docs/camenisch2002da.pdf376L
-rw-r--r--docs/camenisch2002ssep.pdf298920B
-rw-r--r--docs/camenisch2003pve.pdf376L
-rw-r--r--docs/camlys05.pdf236435B
-rw-r--r--docs/can-mcast.pdf580369B
-rw-r--r--docs/can.pdf158969B
-rw-r--r--docs/casc-rep.pdf185707B
-rw-r--r--docs/cashmere.pdf190862B
-rw-r--r--docs/casper-usenix2003.pdf294068B
-rw-r--r--docs/ccs03-SNKeyMan.pdf191910B
-rw-r--r--docs/ccs07-blac.pdf239766B
-rw-r--r--docs/ccs07-doa.pdf259642B
-rw-r--r--docs/ccs09-torsk.pdf1075618B
-rw-r--r--docs/ccs2008-mittal.pdf290972B
-rw-r--r--docs/ccsw09-fingerprinting.pdf334117B
-rw-r--r--docs/cebolla.pdf124324B
-rw-r--r--docs/cfp_0.pdf705545B
-rw-r--r--docs/cfs_sosp.pdf211531B
-rw-r--r--docs/chainsaw.pdf268232B
-rw-r--r--docs/chaum-mix_0.pdf419790B
-rw-r--r--docs/chl05-full-eurocrypt2005.pdf379025B
-rw-r--r--docs/chor97computationally.pdf191725B
-rw-r--r--docs/chord_sigcomm.pdf194676B
-rw-r--r--docs/ciaccio-pet2006.pdf455768B
-rw-r--r--docs/cl01a.pdf332139B
-rw-r--r--docs/clayton-pet2003.pdf141655B
-rw-r--r--docs/clayton-pet2006.pdf236779B
-rw-r--r--docs/cliquenet-iptp.pdf71382B
-rw-r--r--docs/clog-the-queue.pdf900446B
-rw-r--r--docs/clonewars.pdf312673B
-rw-r--r--docs/cocaTOCS.pdf448284B
-rw-r--r--docs/compact.pdf196007B
-rw-r--r--docs/conext09-phdworkshop-cameraready.pdf131892B
-rw-r--r--docs/consensus2016.pdf339375B
-rw-r--r--docs/coopbittorrentcom_0.pdf130163B
-rw-r--r--docs/cooper.pdf250241B
-rw-r--r--docs/coral-iptps03.pdf230008B
-rw-r--r--docs/cosic-2007-001.pdf129439B
-rw-r--r--docs/cramer04bootstrapping.pdf80874B
-rw-r--r--docs/cramer04lifescience.pdf146965B
-rw-r--r--docs/cramer04odgmbc.pdf150806B
-rw-r--r--docs/cramer04scheduling.pdf75753B
-rw-r--r--docs/cramer05isprp.pdf81186B
-rw-r--r--docs/cramer05pns.pdf144940B
-rw-r--r--docs/cramer05selfstabilizing.pdf173173B
-rw-r--r--docs/cramer06bootstrapping.pdf145839B
-rw-r--r--docs/crdt.pdf1537629B
-rw-r--r--docs/crisp-mswim.pdf464947B
-rw-r--r--docs/crowds.pdf314983B
-rw-r--r--docs/cryptoeprint-2005-394.pdf253317B
-rw-r--r--docs/cset2011.pdf2991914B
-rw-r--r--docs/cucs-039-04.pdf285794B
-rw-r--r--docs/curve25519-20060209.pdf229091B
-rw-r--r--docs/cview-pet2006.pdf1779L
-rw-r--r--docs/danezis-pet2003.pdf187638B
-rw-r--r--docs/danezis-pet2004.pdf471015B
-rw-r--r--docs/danezis-pet2007.pdf202691B
-rw-r--r--docs/danezis-pet2008.pdf197060B
-rw-r--r--docs/danezis-weis2006.pdf198204B
-rw-r--r--docs/danezis-wpes2003.pdf135081B
-rw-r--r--docs/danezis-wpes2004.pdf130950B
-rw-r--r--docs/dasein10.pdf9007981B
-rw-r--r--docs/dcnet-jcrypt88.pdf717773B
-rw-r--r--docs/debs04perng.pdf263550B
-rw-r--r--docs/decmon_0.pdf1184615B
-rw-r--r--docs/di06linyphi.pdf182360B
-rw-r--r--docs/di07mass.pdf181886B
-rw-r--r--docs/di08iptps.pdf155358B
-rw-r--r--docs/di09broadcastssr.pdf199367B
-rw-r--r--docs/di09slf.pdf137580B
-rw-r--r--docs/diaz-pet2008.pdf951837B
-rw-r--r--docs/diaz-wpes2007.pdf2814L
-rw-r--r--docs/disad-free-routes.pdf154300B
-rw-r--r--docs/dissens2021.pdf965457B
-rw-r--r--docs/dold2016byzantine.pdf339375B
-rw-r--r--docs/dolstra.pdf128754B
-rw-r--r--docs/drac-pet2010.pdf330238B
-rw-r--r--docs/e2e-traffic.pdf252957B
-rw-r--r--docs/eScholarship_UC_item_4x6723n2.pdf398273B
-rw-r--r--docs/ebe.pdf176824B
-rw-r--r--docs/ecrs.pdf277176B
-rw-r--r--docs/ed25519-20110926.pdf481903B
-rw-r--r--docs/elnikety.pdf21037B
-rw-r--r--docs/emergence_of_scaling_in_random_networks__barabasi_albert_science_286__1999.pdf100251B
-rw-r--r--docs/emulab.pdf464879B
-rw-r--r--docs/encrypteddata.pdf161655B
-rw-r--r--docs/encsearch.pdf185346B
-rw-r--r--docs/epost-eurosys2006.pdf278116B
-rw-r--r--docs/errorsIT.pdf260094B
-rw-r--r--docs/esed.pdf215194B
-rw-r--r--docs/esorics04-mauw.pdf192460B
-rw-r--r--docs/esorics05-Klonowski.pdf11905L
-rw-r--r--docs/eternity.pdf151771B
-rw-r--r--docs/evans_ghm_presentation.pdf1541160B
-rw-r--r--docs/fairbrother-pet2004.pdf15L
-rw-r--r--docs/fast03.pdf187123B
-rw-r--r--docs/fault.dvi_.pdf154478B
-rw-r--r--docs/feamster-pet2003.pdf208923B
-rw-r--r--docs/fessi_iptcomm_2010.pdf548597B
-rw-r--r--docs/fk-2016-1-p46.pdf260779B
-rw-r--r--docs/flash-mix.pdf178079B
-rw-r--r--docs/flow-correlation04.pdf263401B
-rw-r--r--docs/focs01.pdf150830B
-rw-r--r--docs/foward_secure_encryption.pdf227691B
-rw-r--r--docs/fps-slides-mw.pdf1372883B
-rw-r--r--docs/fps2013wachs.pdf218057B
-rw-r--r--docs/freedom2-arch.pdf360862B
-rw-r--r--docs/freehaven.net-anonbib-cache-mixmaster-spec.txt.pdf56581B
-rw-r--r--docs/freehaven_pres.pdf142100B
-rw-r--r--docs/freenet.pdf239566B
-rw-r--r--docs/fu-active.pdf339843B
-rw-r--r--docs/fu-analytical.pdf207390B
-rw-r--r--docs/fudico.pdf34478B
-rw-r--r--docs/fuhrmann02architecture_0.pdf82432B
-rw-r--r--docs/fuhrmann03evaluation.pdf147669B
-rw-r--r--docs/fuhrmann03feedback.pdf289296B
-rw-r--r--docs/fuhrmann03overlaySRS.pdf266731B
-rw-r--r--docs/fuhrmann03performance.pdf191032B
-rw-r--r--docs/fuhrmann03strategy.pdf101539B
-rw-r--r--docs/fuhrmann03supportingP2P.pdf347772B
-rw-r--r--docs/fuhrmann05emnets.pdf107868B
-rw-r--r--docs/fuhrmann05networking.pdf850311B
-rw-r--r--docs/fuhrmann06pushing.pdf315664B
-rw-r--r--docs/fuhrmann07wons.pdf121127B
-rw-r--r--docs/fulltext.pdf489990B
-rw-r--r--docs/fulltext3.pdf432052B
-rw-r--r--docs/george-thesis.pdf1423594B
-rw-r--r--docs/getTechreport.pdf167487B
-rw-r--r--docs/ghm2010.pdf2484880B
-rw-r--r--docs/globecom00.pdf88019B
-rw-r--r--docs/gns2014wachs.pdf329282B
-rw-r--r--docs/gnunet-psyc.pdf879946B
-rw-r--r--docs/goldberg-2007.pdf271605B
-rw-r--r--docs/golle-ccs2004.pdf203541B
-rw-r--r--docs/golle-eurocrypt2004.pdf2907L
-rw-r--r--docs/golle-pet2004.pdf163297B
-rw-r--r--docs/gossip-podc05.pdf202498B
-rw-r--r--docs/gossple2010Bertier.pdf748868B
-rw-r--r--docs/grothoff_ghm2013gns.pdf451643B
-rw-r--r--docs/grothoff_slides_berlin.pdf1175131B
-rw-r--r--docs/gsn09-security-mayer.pdf1483012B
-rw-r--r--docs/gup.pdf291408B
-rw-r--r--docs/gush.pdf107139B
-rw-r--r--docs/habil.pdf8512300B
-rw-r--r--docs/halpern-oneill-2003.pdf194528B
-rw-r--r--docs/harvey.pdf156065B
-rw-r--r--docs/hashcash.pdf84537B
-rw-r--r--docs/herbivore-esigops.pdf74797B
-rw-r--r--docs/herbivore-tr.pdf308894B
-rw-r--r--docs/herrmann2011mt.pdf1504563B
-rw-r--r--docs/heydt-benjamin-pet2006.pdf372434B
-rw-r--r--docs/hill_climbing.pdf215057B
-rw-r--r--docs/hintz02.pdf133512B
-rw-r--r--docs/hitting-set04.pdf163621B
-rw-r--r--docs/hordes-final-all.dvi_.pdf202692B
-rw-r--r--docs/hotmobile07.pdf162637B
-rw-r--r--docs/how-to-build-a-better-testbed.pdf310395B
-rw-r--r--docs/hs-attack06.pdf627556B
-rw-r--r--docs/http___freehaven.net_anonbib_cache_pipenet10.html_.pdf13526B
-rw-r--r--docs/hurler03context.pdf148353B
-rw-r--r--docs/i3.pdf313747B
-rw-r--r--docs/icdcs2006-m2.pdf401465B
-rw-r--r--docs/idemix.pdf630700B
-rw-r--r--docs/ih05-Klonowski.pdf161608B
-rw-r--r--docs/ih05-Luke.pdf2547L
-rw-r--r--docs/ih05-csispir.pdf263982B
-rw-r--r--docs/ih05-danezisclulow.pdf158586B
-rw-r--r--docs/ij_23-alife99.pdf346219B
-rw-r--r--docs/ijns-2009-v8-n2-p169-176.pdf2377L
-rw-r--r--docs/imc05-tcpnat.pdf141783B
-rw-r--r--docs/improved-clockskew.pdf1427201B
-rw-r--r--docs/incentives-fc10.pdf250204B
-rw-r--r--docs/incentives-for-cooperation-in_0.pdf104615B
-rw-r--r--docs/incomparable-pkeys.pdf152680B
-rw-r--r--docs/infocom01investigating.pdf156420B
-rw-r--r--docs/infocom06-kad.pdf202519B
-rw-r--r--docs/infranet.pdf399493B
-rw-r--r--docs/integratingpds-fast04.pdf216632B
-rw-r--r--docs/ishai2006ca.pdf214217B
-rw-r--r--docs/iwan2004.pdf120043B
-rw-r--r--docs/jmlr08.pdf557759B
-rw-r--r--docs/jsac-2001.pdf283281B
-rw-r--r--docs/jsac.pdf388341B
-rw-r--r--docs/k-anonymous_ccs2003.pdf247127B
-rw-r--r--docs/kevin-thesis.pdf2821327B
-rw-r--r--docs/kissner04private.pdf169751B
-rw-r--r--docs/knock.pdf116322B
-rw-r--r--docs/koch08confidence.pdf198758B
-rw-r--r--docs/koepsell-wpes2004_0.pdf859667B
-rw-r--r--docs/koorde.pdf70909B
-rw-r--r--docs/kostas-thesis.pdf25584L
-rw-r--r--docs/kpos_0.pdf81047B
-rw-r--r--docs/kugler2.pdf218063B
-rw-r--r--docs/kutzner03connecting.pdf368341B
-rw-r--r--docs/kutzner05autonomic.pdf503461B
-rw-r--r--docs/kutzner05dvdr.pdf61496B
-rw-r--r--docs/kutzner05overnet.pdf364340B
-rw-r--r--docs/kutzner06igor.pdf111869B
-rw-r--r--docs/kutzner06securessr.pdf776198B
-rw-r--r--docs/kutzner07linearization.pdf131380B
-rw-r--r--docs/lafs.pdf275101B
-rw-r--r--docs/langos02.pdf232186B
-rw-r--r--docs/lbfs.pdf164053B
-rw-r--r--docs/ldpc.pdf724614B
-rw-r--r--docs/lee.pdf925L
-rw-r--r--docs/lightweight_prob_broadcast.pdf545863B
-rw-r--r--docs/lillibridge.pdf95500B
-rw-r--r--docs/limits-open.pdf180714B
-rw-r--r--docs/location.pdf2071983B
-rw-r--r--docs/loesing2008performance.pdf1117766B
-rw-r--r--docs/lurchi-bs-thesis.pdf803989B
-rw-r--r--docs/lynx_slides_youbroketheinternet.pdf262135B
-rw-r--r--docs/ma_dold_consensus_21dec2015.pdf924076B
-rw-r--r--docs/ma_kirsch_2014_0.pdf5282021B
-rw-r--r--docs/main.pdf213637B
-rw-r--r--docs/main_0.pdf587777B
-rw-r--r--docs/manku03symphony.pdf311197B
-rw-r--r--docs/max-presentation.pdf2108437B
-rw-r--r--docs/maze_freeride.pdf489642B
-rw-r--r--docs/mcb-en.pdf968272B
-rw-r--r--docs/mcb-es.pdf973271B
-rw-r--r--docs/mcb-fr.pdf1116795B
-rw-r--r--docs/mcb-it.pdf998629B
-rw-r--r--docs/mccoy-pet2008.pdf317710B
-rw-r--r--docs/memory-bound-crypto.pdf180680B
-rw-r--r--docs/michpi-020801.pdf75645B
-rw-r--r--docs/middleware-monod.pdf301009B
-rw-r--r--docs/mininet-hifi.pdf1251892B
-rw-r--r--docs/minion-design.pdf104137B
-rw-r--r--docs/mix-acc.pdf172301B
-rw-r--r--docs/mix.pdf389312B
-rw-r--r--docs/mixmaster-reliable.pdf4519405B
-rw-r--r--docs/mmcn.pdf522864B
-rw-r--r--docs/modelnet-si-ppna11.pdf567093B
-rw-r--r--docs/morales2014cryogenic.pdf6514875B
-rw-r--r--docs/morphing09.pdf428203B
-rw-r--r--docs/morphmix-fc2004.pdf509670B
-rw-r--r--docs/morphmix-pet2006.pdf204115B
-rw-r--r--docs/morphmix-wpes2002.pdf304685B
-rw-r--r--docs/multipath-dv-perf.pdf402263B
-rw-r--r--docs/murdoch-pet2007.pdf1530034B
-rw-r--r--docs/murdoch-pet2008.pdf627862B
-rw-r--r--docs/netgames.pdf371090B
-rw-r--r--docs/new_sequences_of_linear_time_erasure_cod_64778.pdf214724B
-rw-r--r--docs/newman-pet2004.pdf317301B
-rw-r--r--docs/ngc03_ldpc_slides_03sep18_4s.pdf90200B
-rw-r--r--docs/nguyen-pet2003.pdf174234B
-rw-r--r--docs/nice-wli.pdf470277B
-rw-r--r--docs/nightingale-bluefs2004.pdf221620B
-rw-r--r--docs/ns2018.pdf2725661B
-rw-r--r--docs/nsdi12-koi.pdf342043B
-rw-r--r--docs/nse-techreport.pdf745984B
-rw-r--r--docs/nss2011.pdf222840B
-rw-r--r--docs/ntr-worlds05.pdf87440B
-rw-r--r--docs/nym-alias-net.pdf84686B
-rw-r--r--docs/nymble-tdsc.pdf833088B
-rw-r--r--docs/obfuscation_osn.pdf1074827B
-rw-r--r--docs/oblivious_transfer.pdf249563B
-rw-r--r--docs/octopus_dht.pdf941386B
-rw-r--r--docs/oehlmann2014machinelearning.pdf978647B
-rw-r--r--docs/oii2014.pdf1849103B
-rw-r--r--docs/oneswarm_SIGCOMM.pdf2236812B
-rw-r--r--docs/onion-discex00.pdf153608B
-rw-r--r--docs/onionrouting.pdf104101B
-rw-r--r--docs/openDHT.pdf621717B
-rw-r--r--docs/opendht-fixing.pdf1397793B
-rw-r--r--docs/opodis10_HAL.pdf276905B
-rw-r--r--docs/optimalscheme04.pdf178165B
-rw-r--r--docs/osdi2002.pdf271251B
-rw-r--r--docs/oualno-070618.pdf324822B
-rw-r--r--docs/overlier-pet2007.pdf366449B
-rw-r--r--docs/p110-santry.pdf136879B
-rw-r--r--docs/p115-daswani_0.pdf249371B
-rw-r--r--docs/p131-v40n1n-huebschA.pdf561374B
-rw-r--r--docs/p135-cox.pdf178427B
-rw-r--r--docs/p14-woo.pdf383637B
-rw-r--r--docs/p169-al-ameen.pdf801914B
-rw-r--r--docs/p190-kubi.pdf166525B
-rw-r--r--docs/p255.pdf383240B
-rw-r--r--docs/p2p2010slides.pdf4010068B
-rw-r--r--docs/p2plab-cpe.pdf514417B
-rw-r--r--docs/p48-cramer_ACM2006.pdf212212B
-rw-r--r--docs/p4t.pdf809983B
-rw-r--r--docs/p5.pdf194062B
-rw-r--r--docs/p625-bharambe1.pdf1240848B
-rw-r--r--docs/p_icalp04_0.pdf163209B
-rw-r--r--docs/panic.pdf3910768B
-rw-r--r--docs/paper-JaiDem.pdf306187B
-rw-r--r--docs/paper-ifip.pdf335159B
-rw-r--r--docs/paper.dvi_.pdf158669B
-rw-r--r--docs/paper.pdf254678B
-rw-r--r--docs/paper_cans2014_camera_ready.pdf329282B
-rw-r--r--docs/paper_short.pdf154227B
-rw-r--r--docs/pastry.pdf168346B
-rw-r--r--docs/peerstore-better-performance-by.pdf77769B
-rw-r--r--docs/perea-ccs08.pdf427850B
-rw-r--r--docs/pet05-bissias.pdf327669B
-rw-r--r--docs/pet05-borisov.pdf188498B
-rw-r--r--docs/pet05-serjantov.pdf654390B
-rw-r--r--docs/pet05-zhu.pdf454740B
-rw-r--r--docs/pet2011i2p.pdf763908B
-rw-r--r--docs/petfive.pdf50351B
-rw-r--r--docs/phd-thesis.fr_en.pdf1249260B
-rw-r--r--docs/pir.pdf148776B
-rw-r--r--docs/pir_0.pdf411170B
-rw-r--r--docs/pitchblack.pdf488702B
-rw-r--r--docs/plos_nsdi_04.pdf160415B
-rw-r--r--docs/plush.pdf142336B
-rw-r--r--docs/pods06_paper01.pdf675146B
-rw-r--r--docs/pool-dummy04.pdf208416B
-rw-r--r--docs/practical.pdf177519B
-rw-r--r--docs/privacy_preserving_similarity.pdf1521020B
-rw-r--r--docs/privsearch-aeolus.pdf235016B
-rw-r--r--docs/prusty.ccs_.2011.pdf598315B
-rw-r--r--docs/publ_2008_eickhold-fuhrmann-saballus-ua_ambicomp.pdf545013B
-rw-r--r--docs/publius.pdf230127B
-rw-r--r--docs/pwnat.pdf203614B
-rw-r--r--docs/quant-adhoc.pdf197604B
-rw-r--r--docs/r5rs.pdf418485B
-rw-r--r--docs/rackoff93cryptographic.pdf170251B
-rw-r--r--docs/rainbow.pdf233139B
-rw-r--r--docs/randomized-checking.pdf156935B
-rw-r--r--docs/rao.pdf449226B
-rw-r--r--docs/raptor.pdf617593B
-rw-r--r--docs/raykova-pet2008.pdf743818B
-rw-r--r--docs/raymond00.pdf102811B
-rw-r--r--docs/reardon-thesis.pdf3267251B
-rw-r--r--docs/recall.pdf395233B
-rw-r--r--docs/reclaimID_2018.pdf1820341B
-rw-r--r--docs/reconcile.pdf177393B
-rw-r--r--docs/reiter-ccs2004.pdf198900B
-rw-r--r--docs/rep-anon.pdf104857B
-rw-r--r--docs/replication.pdf239261B
-rw-r--r--docs/reusable-channels-wpes2003.pdf1491L
-rw-r--r--docs/ringstwice07.pdf131596B
-rw-r--r--docs/robustgossip-final.pdf111551B
-rw-r--r--docs/ron-sosp2001.pdf656390B
-rw-r--r--docs/s15.pdf1485511B
-rw-r--r--docs/saballus07distributed.pdf110169B
-rw-r--r--docs/saballus07secure.pdf155540B
-rw-r--r--docs/saballus08gaos.pdf103498B
-rw-r--r--docs/safey-presentation-monkey.pdf1197308B
-rw-r--r--docs/safey-thesis-monkey.pdf1397913B
-rw-r--r--docs/samarati.pdf518845B
-rw-r--r--docs/sassaman-pet2008.pdf162303B
-rw-r--r--docs/sassaman-wpes2005.pdf259330B
-rw-r--r--docs/saturn-range-dht.pdf1951930B
-rw-r--r--docs/sba.pdf150255B
-rw-r--r--docs/scan.pdf235213B
-rw-r--r--docs/schaar-slides.pdf612153B
-rw-r--r--docs/schanzen2012msc.pdf965745B
-rw-r--r--docs/scheibner_thesis.pdf979306B
-rw-r--r--docs/scholler03language.pdf169639B
-rw-r--r--docs/secureindex.pdf241704B
-rw-r--r--docs/self-star-load-balance.pdf268794B
-rw-r--r--docs/sensor-route-security_0.pdf180964B
-rw-r--r--docs/set.dvi_.pdf223123B
-rw-r--r--docs/shadowwalker-ccs09.pdf242516B
-rw-r--r--docs/shimshock-pet2008.pdf498040B
-rw-r--r--docs/shmat_anon.pdf284910B
-rw-r--r--docs/shmat_crowds.pdf209141B
-rw-r--r--docs/shsm03.pdf139337B
-rw-r--r--docs/shuffle-ccs01.pdf3029L
-rw-r--r--docs/sigcomm02.pdf474776B
-rw-r--r--docs/slicing07.pdf284315B
-rw-r--r--docs/slides.pdf247684B
-rw-r--r--docs/smli_tr-2005-146.pdf163439B
-rw-r--r--docs/snader08.pdf253464B
-rw-r--r--docs/sofem05-Klonowski.pdf142641B
-rw-r--r--docs/speer02networking.pdf130264B
-rw-r--r--docs/statistical-disclosure.pdf107097B
-rw-r--r--docs/steinbrecher-pet2003.pdf207237B
-rw-r--r--docs/steinbrecher-pet2003_0.pdf207237B
-rw-r--r--docs/steven-thesis.pdf1769030B
-rw-r--r--docs/stop-and-go.pdf257322B
-rw-r--r--docs/storedesign2002.pdf139301B
-rw-r--r--docs/strint2014.pdf143617B
-rw-r--r--docs/strong-eternity.pdf221425B
-rw-r--r--docs/stutzbach.pdf280730B
-rw-r--r--docs/swarm.pdf174238B
-rw-r--r--docs/swn.pdf165207B
-rw-r--r--docs/swroute.pdf2968L
-rw-r--r--docs/sybildht.pdf196273B
-rw-r--r--docs/sync-batching.pdf277049B
-rw-r--r--docs/syssec2011.pdf125092B
-rw-r--r--docs/szengel2012ms.pdf1302095B
-rw-r--r--docs/taler2016space.pdf1595852B
-rw-r--r--docs/tangler.pdf194187B
-rw-r--r--docs/tap-pet2006.pdf183346B
-rw-r--r--docs/tarzan-ccs02.pdf214547B
-rw-r--r--docs/tarzan.pdf70809B
-rw-r--r--docs/teich.pdf638641B
-rw-r--r--docs/terminology.pdf697644B
-rw-r--r--docs/thesis.pdf7879216B
-rw-r--r--docs/thesis_0.pdf1483054B
-rw-r--r--docs/thesis_lowres.pdf1157137B
-rw-r--r--docs/thiele06debruijn.pdf107060B
-rw-r--r--docs/timing-fc2004.pdf217257B
-rw-r--r--docs/tissec-latency-leak.pdf2272132B
-rw-r--r--docs/tofu-pinning.pdf443837B
-rw-r--r--docs/tor-design.pdf175246B
-rw-r--r--docs/tor-soups07.pdf870537B
-rw-r--r--docs/tor.pdf1491237B
-rw-r--r--docs/torspinISC08.pdf547346B
-rw-r--r--docs/torta05.pdf372784B
-rw-r--r--docs/towards_comparable_network_simulations.pdf181919B
-rw-r--r--docs/towards_measuring_anonymity.pdf166437B
-rw-r--r--docs/tr-2002-23.pdf327905B
-rw-r--r--docs/traffic_0.pdf55422B
-rw-r--r--docs/transport.pdf157472B
-rw-r--r--docs/trickle02.pdf213585B
-rw-r--r--docs/troncoso-ih2007.pdf2388084B
-rw-r--r--docs/troncoso-pet2008.pdf840557B
-rw-r--r--docs/twr-dp2pwa.pdf4612271B
-rw-r--r--docs/underlayabs-ngi08-final.pdf254207B
-rw-r--r--docs/unisono_kuvs-ngn.pdf70658B
-rw-r--r--docs/usability-weis2006.pdf149446B
-rw-r--r--docs/ut-cs-03-510.pdf252114B
-rw-r--r--docs/uva2013.pdf1200167B
-rw-r--r--docs/uzunov2013torspdy.pdf1035211B
-rw-r--r--docs/valet-pet2006.pdf404977B
-rw-r--r--docs/venti-fast.pdf139090B
-rw-r--r--docs/viceroy.pdf169023B
-rw-r--r--docs/vldb03-pier.pdf171940B
-rw-r--r--docs/w8paper13.pdf90796B
-rw-r--r--docs/wachs_ghm_presentation.pdf401885B
-rw-r--r--docs/web-mix-pet2000.pdf1984L
-rw-r--r--docs/whatsup.pdf396579B
-rw-r--r--docs/wiangsripanawan-acsw07.pdf357390B
-rw-r--r--docs/wisa04-Klonowski.pdf98482B
-rw-r--r--docs/wpes06-heydt-benjamin.pdf866724B
-rw-r--r--docs/wpes09-bridge-attack.pdf1698090B
-rw-r--r--docs/wpes09-dht-attack.pdf725300B
-rw-r--r--docs/wpes09-xpay.pdf363792B
-rw-r--r--docs/wright-degrade.pdf207226B
-rw-r--r--docs/wright-passive.pdf236003B
-rw-r--r--docs/wright-passive2.pdf299706B
-rw-r--r--docs/wright02.pdf207226B
-rw-r--r--docs/xrs2016.pdf14458L