gnunetbib

Bibliography (BibTeX, based on AnonBib)
Log | Files | Refs | README | LICENSE

commit 7c5b4718519ad8277acbc3286ffec43b57185fd7
parent 7173ae07264593ecd2ca9e5bec2954a2c7e05d51
Author: Nils Gillmann <ng0@n0.is>
Date:   Thu,  4 Oct 2018 23:23:24 +0000

inbook -> book

Signed-off-by: Nils Gillmann <ng0@n0.is>

Diffstat:
Mgnunetbib.bib | 84++++++++++++++++++++++++++++++++++++++++----------------------------------------
1 file changed, 42 insertions(+), 42 deletions(-)

diff --git a/gnunetbib.bib b/gnunetbib.bib @@ -238,7 +238,7 @@ www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/paper_short.pdf}, author = {Matthias Wachs and Fabian Oehlmann and Christian Grothoff} } -@inbook {pir2014, +@book {pir2014, title = {The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency}, booktitle = {Privacy Enhancing Technologies}, series = {Lecture Notes in Computer Science}, @@ -345,7 +345,7 @@ We present a hybrid PIR protocol that combines two PIR protocols, one from each www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/decmon_0.pdf}, author = {Omar Tarabai} } -@inbook {anonymity_and_cover_traffic2014, +@book {anonymity_and_cover_traffic2014, title = {Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications}, booktitle = {Privacy Enhancing Technologies}, series = {Lecture Notes in Computer Science}, @@ -378,7 +378,7 @@ as an evaluation of its performance}, www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/DP5\%3A\%20A\%20Private\%20Presence\%20Service.pdf}, author = {Borisov, Nikita and Danezis, George and Goldberg, Ian} } -@inbook {obfuscation_osn2014, +@book {obfuscation_osn2014, title = {On the Effectiveness of Obfuscation Techniques in Online Social Networks}, booktitle = {Privacy Enhancing Technologies}, series = {Lecture Notes in Computer Science}, @@ -409,7 +409,7 @@ as an evaluation of its performance}, www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/SupritiSinghMasterThesis.pdf}, author = {Supriti Singh} } -@inbook {forward_secure_encryption2014, +@book {forward_secure_encryption2014, title = {Forward-Secure Distributed Encryption}, booktitle = {Privacy Enhancing Technologies}, series = {Lecture Notes in Computer Science}, @@ -504,7 +504,7 @@ obtained with different parameter sets and different test cases are presented an pages = {361{\textendash}370}, author = {Jonathan Ullman} } -@inbook {Broadening2013Chatzikokolakis, +@book {Broadening2013Chatzikokolakis, title = {Broadening the Scope of Differential Privacy Using Metrics}, booktitle = {Privacy Enhancing Technologies}, series = {Lecture Notes in Computer Science}, @@ -609,7 +609,7 @@ In this paper we describe the problems that occur when debugging widely distribu www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/p169-al-ameen.pdf}, author = {Al-Ameen, Mahdi N. and Matthew Wright} } -@inbook {sep-privacy, +@book {sep-privacy, title = {Privacy}, booktitle = {The Stanford Encyclopedia of Philosophy}, year = {2013}, @@ -694,7 +694,7 @@ This thesis includes extensive measurement data highlighting the possible benefi www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/autonetkit-small.pdf}, author = {Knight, Simon and Jaboldinov, Askar and Maennel, Olaf and Phillips, Iain and Roughan, Matthew} } -@inbook {2012, +@book {2012, title = {BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters}, booktitle = {Stabilization, Safety, and Security of Distributed Systems}, series = {Lecture Notes in Computer Science}, @@ -790,7 +790,7 @@ This work presents the fundamental goals and ideas behind GADS, provides technic www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/schanzen2012msc.pdf}, author = {Martin Schanzenbach} } -@inbook {2012, +@book {2012, title = {Differential Privacy with Imperfect Randomness}, booktitle = {Advances in Cryptology {\textendash} CRYPTO 2012}, series = {Lecture Notes in Computer Science}, @@ -945,7 +945,7 @@ not detecting a potential snooping AS from 57\% to 11\%. www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/LASTor\%3A\%20A\%20Low-Latency\%20AS-Aware\%20Tor\%20Client.pdf}, author = {Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha} } -@inbook {2012, +@book {2012, title = {Lower Bounds in Differential Privacy}, booktitle = {Theory of Cryptography}, series = {Lecture Notes in Computer Science}, @@ -1417,7 +1417,7 @@ outline a set of new performance requirements that anonymous blacklisting system www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/ed25519-20110926.pdf}, author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Hang} } -@inbook {2011, +@book {2011, title = {How Much Is Enough? Choosing ε for Differential Privacy}, booktitle = {Information Security}, series = {Lecture Notes in Computer Science}, @@ -1649,7 +1649,7 @@ This paper provides the necessary background on I2P, gives details on the attack www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/pet2011i2p.pdf}, author = {Michael Herrmann and Christian Grothoff} } -@inbook {2011, +@book {2011, title = {Private Similarity Computation in Distributed Systems: From Cryptography to Differential Privacy}, booktitle = {Principles of Distributed Systems}, series = {Lecture Notes in Computer Science}, @@ -1798,7 +1798,7 @@ We analyzed the security of our protocols by developing formal definitions of th pages = {199{\textendash}208}, author = {Arpita Ghosh and Aaron Roth} } -@inbook {2011, +@book {2011, title = {Social Market: Combining Explicit and Implicit Social Networks}, booktitle = {Stabilization, Safety, and Security of Distributed Systems}, series = {Lecture Notes in Computer Science}, @@ -2119,7 +2119,7 @@ To evaluate the platform{\textquoteright}s suitability for application developme www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/DistributingSocialApp2010Leroy.pdf}, author = {Vincent Leroy} } -@inbook {2010, +@book {2010, title = {Drac: An Architecture for Anonymous Low-Volume Communications}, booktitle = {Privacy Enhancing Technologies}, series = {Lecture Notes in Computer Science}, @@ -2669,7 +2669,7 @@ We measure the empirical trade-off between accuracy and privacy in these adaptat www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/AIMS\%2709\%20-\%20Sybil\%20attacks\%20protection\%20schemes\%20in\%20KAD.pdf}, author = {Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier} } -@inbook {Bogetoft:2009:SMC:1601990.1602018, +@book {Bogetoft:2009:SMC:1601990.1602018, title = {Financial Cryptography and Data Security}, booktitle = {Financial Cryptography and Data Security}, series = {Lecture Notes in Computer Science}, @@ -2802,7 +2802,7 @@ pseudo-random simulations and limiting simulation lengths, while other technique www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/Thesis\%20-\%20F.Schadd.pdf}, author = {Frederik Christiaan Schadd} } -@inbook {2009, +@book {2009, title = {Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security}, booktitle = {Cryptology and Network Security}, series = {Lecture Notes in Computer Science}, @@ -2833,7 +2833,7 @@ pseudo-random simulations and limiting simulation lengths, while other technique www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/nymble-tdsc.pdf}, author = {Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean Smith} } -@inbook {2009, +@book {2009, title = {An Optimally Fair Coin Toss}, booktitle = {Theory of Cryptography}, series = {Lecture Notes in Computer Science}, @@ -3071,7 +3071,7 @@ Unlike previous proposals for P2P anonymity schemes, Torsk does not require all www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/gsn09-security-mayer.pdf}, author = {Mayer, Christoph P.} } -@inbook {2009, +@book {2009, title = {Self-organized Data Redundancy Management for Peer-to-Peer Storage Systems}, booktitle = {Self-Organizing Systems}, series = {Lecture Notes in Computer Science}, @@ -3274,7 +3274,7 @@ techniques, we show how to optimally modify packets in real-time to reduce the a www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/morphing09.pdf}, author = {Charles Wright and Scott Coull and Fabian Monrose} } -@inbook {2009, +@book {2009, title = {Tuning Vivaldi: Achieving Increased Accuracy and Stability}, booktitle = {Self-Organizing Systems}, series = {Lecture Notes in Computer Science}, @@ -3745,7 +3745,7 @@ To deal with such networks researchers have suggested to use flooding-based rout www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/LOCEntropy2008.pdf}, author = {Luke O{\textquoteright}Connor} } -@inbook {2008, +@book {2008, title = {Estimating The Size Of Peer-To-Peer Networks Using Lambert{\textquoteright}s W Function}, booktitle = {Grid Computing - Achievements and Prospects}, year = {2008}, @@ -5408,7 +5408,7 @@ message to an elliptic curve. www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/INFOCOM\%2707\%20-\%20Mesh\%20or\%20multiple-tree.pdf}, author = {Magharei, Nazanin and Rejaie, Reza} } -@inbook {2007, +@book {2007, title = {Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol}, booktitle = {Public Key Cryptography {\textendash} PKC 2007}, series = {Lecture Notes in Computer Science}, @@ -5526,7 +5526,7 @@ We also report strong efficiency gains over OptAPO in experiments on three probl www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/fuhrmann07wons.pdf}, author = {Thomas Fuhrmann} } -@inbook {2007, +@book {2007, title = {Practical and Secure Solutions for Integer Comparison}, booktitle = {Public Key Cryptography {\textendash} PKC 2007}, series = {Lecture Notes in Computer Science}, @@ -6259,7 +6259,7 @@ Alpha-mixing is an approach that can be added to traditional batching strategies url = {http://works.bepress.com/cramton/35}, author = {Peter Cramton and Yoav Shoham and Richard Steinberg} } -@inbook {2006, +@book {2006, title = {Combining Virtual and Physical Structures for Self-organized Routing}, booktitle = {Self-Organizing Systems}, series = {Lecture Notes in Computer Science}, @@ -6390,7 +6390,7 @@ In this paper we review SSR{\textquoteright}s self-organizing features and demon www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/Golle-sp2006.pdf}, author = {Philippe Golle and XiaoFeng Wang and Jakobsson, Markus and Alex Tsow} } -@inbook {2006, +@book {2006, title = {Differential Privacy}, booktitle = {Automata, Languages and Programming}, series = {Lecture Notes in Computer Science}, @@ -6856,7 +6856,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/Saito\%20-\%20i-WAT\%20Dissertation.pdf}, author = {Saito, Kenji} } -@inbook {2006, +@book {2006, title = {Less Hashing, Same Performance: Building a Better Bloom Filter}, booktitle = {Algorithms {\textendash} ESA 2006}, series = {Lecture Notes in Computer Science}, @@ -7283,7 +7283,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased url = {http://www.emeraldinsight.com/Insight/viewContentItem.do;jsessionid=6C3CF32A99DF3971C2144B461C8F2CF5?contentType=Article\&hdAction=lnkpdf\&contentId=1550662}, author = {Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao} } -@inbook {2006, +@book {2006, title = {Reputation Mechanisms}, booktitle = {Handbook on Information Systems and Economics}, year = {2006}, @@ -7526,7 +7526,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/Trust_infocom06_v4.pdf}, author = {Yan L. Sun and Zhu Han and Wei Yu and K. J. Ray Liu} } -@inbook {2006, +@book {2006, title = {Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation}, booktitle = {Theory of Cryptography}, series = {Lecture Notes in Computer Science}, @@ -7985,7 +7985,7 @@ This paper describes the design and implementation of rcc, the router configurat www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/HOT-P2P\%2705\%20-\%20Khorshadi\%2C\%20Liu\%20\%26\%20Ghosal.pdf}, author = {Khorshadi, Behrooz and Liu, Xin and Dipak Ghosal} } -@inbook {2005, +@book {2005, title = {Distributed Hash Tables}, booktitle = {Peer-to-Peer Systems and Applications}, series = {Lecture Notes in Computer Science}, @@ -8113,7 +8113,7 @@ This paper describes the design and implementation of rcc, the router configurat www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/SHA1AttackProceedingVersion.pdf}, author = {Xiaoyun Wang and Yiqun Lisa Yin and Hongbo Yu} } -@inbook {DBLP:conf/p2p/EberspacherS05a, +@book {DBLP:conf/p2p/EberspacherS05a, title = {First and Second Generation of Peer-to-Peer Systems}, booktitle = {Peer-to-Peer Systems and Applications}, series = {Lecture Notes in Computer Science}, @@ -8762,7 +8762,7 @@ We have developed a prototype based on the FreePastry open-source implementation www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/pet05-bissias.pdf}, author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine} } -@inbook {2005, +@book {2005, title = {Privacy-Preserving Set Operations}, booktitle = {Advances in Cryptology {\textendash} CRYPTO 2005}, series = {Lecture Notes in Computer Science}, @@ -8779,7 +8779,7 @@ We have developed a prototype based on the FreePastry open-source implementation author = {Kissner, Lea and Song, Dawn}, editor = {Shoup, Victor} } -@inbook {2005, +@book {2005, title = {On Private Scalar Product Computation for Privacy-Preserving Data Mining}, booktitle = {Information Security and Cryptology {\textendash} ICISC 2004}, series = {Lecture Notes in Computer Science}, @@ -8981,7 +8981,7 @@ We have developed a prototype based on the FreePastry open-source implementation www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/10.1.1.101.688.pdf}, author = {Sandberg, Oskar} } -@inbook {conf/p2p/GotzRW05, +@book {conf/p2p/GotzRW05, title = {Selected DHT Algorithms}, booktitle = {Peer-to-Peer Systems and Applications}, series = {Lecture Notes in Computer Science}, @@ -9091,7 +9091,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/31.pdf}, author = {Mijeom Kim and Mohan Kumar and Behrooz Shirazi} } -@inbook {Bartolini:2005:SFA:2167504.2167521, +@book {Bartolini:2005:SFA:2167504.2167521, title = {A software framework for automated negotiation}, booktitle = {Software Engineering for Multi-Agent Systems III}, series = {Lecture Notes in Computer Science}, @@ -9695,7 +9695,7 @@ ict theory to analyse these systems. Under our assumptions, resource distributio www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/10.1.1.4.7003\%20\%281\%29.pdf}, author = {George Danezis and Ross Anderson} } -@inbook {2004, +@book {2004, title = {Efficient Private Matching and Set Intersection}, booktitle = {Advances in Cryptology - EUROCRYPT 2004}, series = {Lecture Notes in Computer Science}, @@ -9882,7 +9882,7 @@ This work was supported in part by the National Science Foundation under Contrac www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/PINS\%2704\%20-\%20\%20Free-riding\%20and\%20whitewashing\%20in\%20P2P\%20systems.pdf}, author = {Michal Feldman and Papadimitriou, Christos and John Chuang and Ion Stoica} } -@inbook {2004, +@book {2004, title = {Group Spreading: A Protocol for Provably Secure Distributed Name Service}, booktitle = {Automata, Languages and Programming}, series = {Lecture Notes in Computer Science}, @@ -10784,7 +10784,7 @@ This paper describes the motivation, architecture and implementation for a new p www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/danezis-pet2004.pdf}, author = {George Danezis} } -@inbook {Jiang_trustand, +@book {Jiang_trustand, title = {Trust and Cooperation in Peer-to-Peer Systems}, booktitle = {Lecture Notes in Computer Science}, volume = {3032}, @@ -11520,7 +11520,7 @@ In this paper, we propose a new P2P routing algorithm - - HIERAS to relieve this www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/10.1.1.13.3464.pdf}, author = {Indranil Gupta and Kenneth P. Birman and Prakash Linga and Alan Demers and Robbert Van Renesse} } -@inbook {2003, +@book {2003, title = {Koorde: A Simple degree-optimal distributed hash table}, booktitle = {Peer-to-Peer Systems II}, series = {Lecture Notes in Computer Science}, @@ -13303,7 +13303,7 @@ We further investigate this intriguing proposal. Specifically, we www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/memory-bound-crypto.pdf}, author = {Cynthia Dwork and Andrew Goldberg and Moni Naor} } -@inbook {2002, +@book {2002, title = {Mnemosyne: Peer-to-Peer Steganographic Storage}, booktitle = {Peer-to-Peer Systems}, series = {Lecture Notes in Computer Science}, @@ -14244,7 +14244,7 @@ Our construction strictly improves upon previous constructions and resolves some www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/lbfs.pdf}, author = {Muthitacharoen, Athicha and Chen, Benjie and David Mazi{\`e}res} } -@inbook {2001, +@book {2001, title = {Multiparty Computation from Threshold Homomorphic Encryption}, booktitle = {Advances in Cryptology {\textemdash} EUROCRYPT 2001}, series = {Lecture Notes in Computer Science}, @@ -14341,7 +14341,7 @@ This compilation represents the collected wisdom of today{\textquoteright}s peer url = {http://portal.acm.org/citation.cfm?id=558412$\#$}, editor = {Andy oram} } -@inbook {2001, +@book {2001, title = {Peer-To-Peer: Harnessing the Power of Disruptive Technologies -- Chapter 12: Free Haven}, year = {2001}, publisher = {O{\textquoteright}Reilly Media}, @@ -15455,7 +15455,7 @@ This exposition presents a model to formally study such algorithms. This model, url = {http://ieeexplore.ieee.org/Xplore/login.jsp?url=http\%3A\%2F\%2Fieeexplore.ieee.org\%2Fiel4\%2F49\%2F14639\%2F00668973.pdf\%3Farnumber\%3D668973\&authDecision=-203}, author = {Anja Jerichow and Jan M{\"u}ller and Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner} } -@inbook {Goldreich98securemulti-party, +@book {Goldreich98securemulti-party, title = {Secure Multi-Party Computation}, booktitle = {The Foundations of Cryptography }, volume = {2}, @@ -15508,7 +15508,7 @@ This exposition presents a model to formally study such algorithms. This model, www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/chor97computationally.pdf}, author = {Benny Chor and Niv Gilboa} } -@inbook {Ogata97faulttolerant, +@book {Ogata97faulttolerant, title = {Fault Tolerant Anonymous Channel}, booktitle = { Information and Communications Security}, series = { Lecture Notes in Computer Science}, @@ -16082,7 +16082,7 @@ We also sketch applications of these signatures to a payment system, solving dis www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/SIGCOMM\%2787\%20-\%20Strategies\%20for\%20decentralized\%20resource\%20management.pdf}, author = {Stumm, Michael} } -@inbook {1986, +@book {1986, title = {Networks Without User Observability {\textemdash} Design Options}, booktitle = {Advances in Cryptology {\textemdash} EUROCRYPT{\textquoteright} 85}, series = {Lecture Notes in Computer Science},