commit 7c5b4718519ad8277acbc3286ffec43b57185fd7
parent 7173ae07264593ecd2ca9e5bec2954a2c7e05d51
Author: Nils Gillmann <ng0@n0.is>
Date: Thu, 4 Oct 2018 23:23:24 +0000
inbook -> book
Signed-off-by: Nils Gillmann <ng0@n0.is>
Diffstat:
| M | gnunetbib.bib | | | 84 | ++++++++++++++++++++++++++++++++++++++++---------------------------------------- |
1 file changed, 42 insertions(+), 42 deletions(-)
diff --git a/gnunetbib.bib b/gnunetbib.bib
@@ -238,7 +238,7 @@
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/paper_short.pdf},
author = {Matthias Wachs and Fabian Oehlmann and Christian Grothoff}
}
-@inbook {pir2014,
+@book {pir2014,
title = {The Best of Both Worlds: Combining Information-Theoretic and Computational PIR for Communication Efficiency},
booktitle = {Privacy Enhancing Technologies},
series = {Lecture Notes in Computer Science},
@@ -345,7 +345,7 @@ We present a hybrid PIR protocol that combines two PIR protocols, one from each
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/decmon_0.pdf},
author = {Omar Tarabai}
}
-@inbook {anonymity_and_cover_traffic2014,
+@book {anonymity_and_cover_traffic2014,
title = {Do Dummies Pay Off? Limits of Dummy Traffic Protection in Anonymous Communications},
booktitle = {Privacy Enhancing Technologies},
series = {Lecture Notes in Computer Science},
@@ -378,7 +378,7 @@ as an evaluation of its performance},
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/DP5\%3A\%20A\%20Private\%20Presence\%20Service.pdf},
author = {Borisov, Nikita and Danezis, George and Goldberg, Ian}
}
-@inbook {obfuscation_osn2014,
+@book {obfuscation_osn2014,
title = {On the Effectiveness of Obfuscation Techniques in Online Social Networks},
booktitle = {Privacy Enhancing Technologies},
series = {Lecture Notes in Computer Science},
@@ -409,7 +409,7 @@ as an evaluation of its performance},
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/SupritiSinghMasterThesis.pdf},
author = {Supriti Singh}
}
-@inbook {forward_secure_encryption2014,
+@book {forward_secure_encryption2014,
title = {Forward-Secure Distributed Encryption},
booktitle = {Privacy Enhancing Technologies},
series = {Lecture Notes in Computer Science},
@@ -504,7 +504,7 @@ obtained with different parameter sets and different test cases are presented an
pages = {361{\textendash}370},
author = {Jonathan Ullman}
}
-@inbook {Broadening2013Chatzikokolakis,
+@book {Broadening2013Chatzikokolakis,
title = {Broadening the Scope of Differential Privacy Using Metrics},
booktitle = {Privacy Enhancing Technologies},
series = {Lecture Notes in Computer Science},
@@ -609,7 +609,7 @@ In this paper we describe the problems that occur when debugging widely distribu
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/p169-al-ameen.pdf},
author = {Al-Ameen, Mahdi N. and Matthew Wright}
}
-@inbook {sep-privacy,
+@book {sep-privacy,
title = {Privacy},
booktitle = {The Stanford Encyclopedia of Philosophy},
year = {2013},
@@ -694,7 +694,7 @@ This thesis includes extensive measurement data highlighting the possible benefi
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/autonetkit-small.pdf},
author = {Knight, Simon and Jaboldinov, Askar and Maennel, Olaf and Phillips, Iain and Roughan, Matthew}
}
-@inbook {2012,
+@book {2012,
title = {BLIP: Non-interactive Differentially-Private Similarity Computation on Bloom filters},
booktitle = {Stabilization, Safety, and Security of Distributed Systems},
series = {Lecture Notes in Computer Science},
@@ -790,7 +790,7 @@ This work presents the fundamental goals and ideas behind GADS, provides technic
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/schanzen2012msc.pdf},
author = {Martin Schanzenbach}
}
-@inbook {2012,
+@book {2012,
title = {Differential Privacy with Imperfect Randomness},
booktitle = {Advances in Cryptology {\textendash} CRYPTO 2012},
series = {Lecture Notes in Computer Science},
@@ -945,7 +945,7 @@ not detecting a potential snooping AS from 57\% to 11\%.
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/LASTor\%3A\%20A\%20Low-Latency\%20AS-Aware\%20Tor\%20Client.pdf},
author = {Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha}
}
-@inbook {2012,
+@book {2012,
title = {Lower Bounds in Differential Privacy},
booktitle = {Theory of Cryptography},
series = {Lecture Notes in Computer Science},
@@ -1417,7 +1417,7 @@ outline a set of new performance requirements that anonymous blacklisting system
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/ed25519-20110926.pdf},
author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Hang}
}
-@inbook {2011,
+@book {2011,
title = {How Much Is Enough? Choosing ε for Differential Privacy},
booktitle = {Information Security},
series = {Lecture Notes in Computer Science},
@@ -1649,7 +1649,7 @@ This paper provides the necessary background on I2P, gives details on the attack
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/pet2011i2p.pdf},
author = {Michael Herrmann and Christian Grothoff}
}
-@inbook {2011,
+@book {2011,
title = {Private Similarity Computation in Distributed Systems: From Cryptography to Differential Privacy},
booktitle = {Principles of Distributed Systems},
series = {Lecture Notes in Computer Science},
@@ -1798,7 +1798,7 @@ We analyzed the security of our protocols by developing formal definitions of th
pages = {199{\textendash}208},
author = {Arpita Ghosh and Aaron Roth}
}
-@inbook {2011,
+@book {2011,
title = {Social Market: Combining Explicit and Implicit Social Networks},
booktitle = {Stabilization, Safety, and Security of Distributed Systems},
series = {Lecture Notes in Computer Science},
@@ -2119,7 +2119,7 @@ To evaluate the platform{\textquoteright}s suitability for application developme
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/DistributingSocialApp2010Leroy.pdf},
author = {Vincent Leroy}
}
-@inbook {2010,
+@book {2010,
title = {Drac: An Architecture for Anonymous Low-Volume Communications},
booktitle = {Privacy Enhancing Technologies},
series = {Lecture Notes in Computer Science},
@@ -2669,7 +2669,7 @@ We measure the empirical trade-off between accuracy and privacy in these adaptat
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/AIMS\%2709\%20-\%20Sybil\%20attacks\%20protection\%20schemes\%20in\%20KAD.pdf},
author = {Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier}
}
-@inbook {Bogetoft:2009:SMC:1601990.1602018,
+@book {Bogetoft:2009:SMC:1601990.1602018,
title = {Financial Cryptography and Data Security},
booktitle = {Financial Cryptography and Data Security},
series = {Lecture Notes in Computer Science},
@@ -2802,7 +2802,7 @@ pseudo-random simulations and limiting simulation lengths, while other technique
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/Thesis\%20-\%20F.Schadd.pdf},
author = {Frederik Christiaan Schadd}
}
-@inbook {2009,
+@book {2009,
title = {Multi Party Distributed Private Matching, Set Disjointness and Cardinality of Set Intersection with Information Theoretic Security},
booktitle = {Cryptology and Network Security},
series = {Lecture Notes in Computer Science},
@@ -2833,7 +2833,7 @@ pseudo-random simulations and limiting simulation lengths, while other technique
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/nymble-tdsc.pdf},
author = {Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean Smith}
}
-@inbook {2009,
+@book {2009,
title = {An Optimally Fair Coin Toss},
booktitle = {Theory of Cryptography},
series = {Lecture Notes in Computer Science},
@@ -3071,7 +3071,7 @@ Unlike previous proposals for P2P anonymity schemes, Torsk does not require all
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/gsn09-security-mayer.pdf},
author = {Mayer, Christoph P.}
}
-@inbook {2009,
+@book {2009,
title = {Self-organized Data Redundancy Management for Peer-to-Peer Storage Systems},
booktitle = {Self-Organizing Systems},
series = {Lecture Notes in Computer Science},
@@ -3274,7 +3274,7 @@ techniques, we show how to optimally modify packets in real-time to reduce the a
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/morphing09.pdf},
author = {Charles Wright and Scott Coull and Fabian Monrose}
}
-@inbook {2009,
+@book {2009,
title = {Tuning Vivaldi: Achieving Increased Accuracy and Stability},
booktitle = {Self-Organizing Systems},
series = {Lecture Notes in Computer Science},
@@ -3745,7 +3745,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/LOCEntropy2008.pdf},
author = {Luke O{\textquoteright}Connor}
}
-@inbook {2008,
+@book {2008,
title = {Estimating The Size Of Peer-To-Peer Networks Using Lambert{\textquoteright}s W Function},
booktitle = {Grid Computing - Achievements and Prospects},
year = {2008},
@@ -5408,7 +5408,7 @@ message to an elliptic curve.
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/INFOCOM\%2707\%20-\%20Mesh\%20or\%20multiple-tree.pdf},
author = {Magharei, Nazanin and Rejaie, Reza}
}
-@inbook {2007,
+@book {2007,
title = {Multiparty Computation for Interval, Equality, and Comparison Without Bit-Decomposition Protocol},
booktitle = {Public Key Cryptography {\textendash} PKC 2007},
series = {Lecture Notes in Computer Science},
@@ -5526,7 +5526,7 @@ We also report strong efficiency gains over OptAPO in experiments on three probl
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/fuhrmann07wons.pdf},
author = {Thomas Fuhrmann}
}
-@inbook {2007,
+@book {2007,
title = {Practical and Secure Solutions for Integer Comparison},
booktitle = {Public Key Cryptography {\textendash} PKC 2007},
series = {Lecture Notes in Computer Science},
@@ -6259,7 +6259,7 @@ Alpha-mixing is an approach that can be added to traditional batching strategies
url = {http://works.bepress.com/cramton/35},
author = {Peter Cramton and Yoav Shoham and Richard Steinberg}
}
-@inbook {2006,
+@book {2006,
title = {Combining Virtual and Physical Structures for Self-organized Routing},
booktitle = {Self-Organizing Systems},
series = {Lecture Notes in Computer Science},
@@ -6390,7 +6390,7 @@ In this paper we review SSR{\textquoteright}s self-organizing features and demon
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/Golle-sp2006.pdf},
author = {Philippe Golle and XiaoFeng Wang and Jakobsson, Markus and Alex Tsow}
}
-@inbook {2006,
+@book {2006,
title = {Differential Privacy},
booktitle = {Automata, Languages and Programming},
series = {Lecture Notes in Computer Science},
@@ -6856,7 +6856,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/Saito\%20-\%20i-WAT\%20Dissertation.pdf},
author = {Saito, Kenji}
}
-@inbook {2006,
+@book {2006,
title = {Less Hashing, Same Performance: Building a Better Bloom Filter},
booktitle = {Algorithms {\textendash} ESA 2006},
series = {Lecture Notes in Computer Science},
@@ -7283,7 +7283,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
url = {http://www.emeraldinsight.com/Insight/viewContentItem.do;jsessionid=6C3CF32A99DF3971C2144B461C8F2CF5?contentType=Article\&hdAction=lnkpdf\&contentId=1550662},
author = {Jin-Qiao Shi and Bin-Xing Fang and Li-Jie Shao}
}
-@inbook {2006,
+@book {2006,
title = {Reputation Mechanisms},
booktitle = {Handbook on Information Systems and Economics},
year = {2006},
@@ -7526,7 +7526,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/Trust_infocom06_v4.pdf},
author = {Yan L. Sun and Zhu Han and Wei Yu and K. J. Ray Liu}
}
-@inbook {2006,
+@book {2006,
title = {Unconditionally Secure Constant-Rounds Multi-party Computation for Equality, Comparison, Bits and Exponentiation},
booktitle = {Theory of Cryptography},
series = {Lecture Notes in Computer Science},
@@ -7985,7 +7985,7 @@ This paper describes the design and implementation of rcc, the router configurat
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/HOT-P2P\%2705\%20-\%20Khorshadi\%2C\%20Liu\%20\%26\%20Ghosal.pdf},
author = {Khorshadi, Behrooz and Liu, Xin and Dipak Ghosal}
}
-@inbook {2005,
+@book {2005,
title = {Distributed Hash Tables},
booktitle = {Peer-to-Peer Systems and Applications},
series = {Lecture Notes in Computer Science},
@@ -8113,7 +8113,7 @@ This paper describes the design and implementation of rcc, the router configurat
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/SHA1AttackProceedingVersion.pdf},
author = {Xiaoyun Wang and Yiqun Lisa Yin and Hongbo Yu}
}
-@inbook {DBLP:conf/p2p/EberspacherS05a,
+@book {DBLP:conf/p2p/EberspacherS05a,
title = {First and Second Generation of Peer-to-Peer Systems},
booktitle = {Peer-to-Peer Systems and Applications},
series = {Lecture Notes in Computer Science},
@@ -8762,7 +8762,7 @@ We have developed a prototype based on the FreePastry open-source implementation
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/pet05-bissias.pdf},
author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine}
}
-@inbook {2005,
+@book {2005,
title = {Privacy-Preserving Set Operations},
booktitle = {Advances in Cryptology {\textendash} CRYPTO 2005},
series = {Lecture Notes in Computer Science},
@@ -8779,7 +8779,7 @@ We have developed a prototype based on the FreePastry open-source implementation
author = {Kissner, Lea and Song, Dawn},
editor = {Shoup, Victor}
}
-@inbook {2005,
+@book {2005,
title = {On Private Scalar Product Computation for Privacy-Preserving Data Mining},
booktitle = {Information Security and Cryptology {\textendash} ICISC 2004},
series = {Lecture Notes in Computer Science},
@@ -8981,7 +8981,7 @@ We have developed a prototype based on the FreePastry open-source implementation
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/10.1.1.101.688.pdf},
author = {Sandberg, Oskar}
}
-@inbook {conf/p2p/GotzRW05,
+@book {conf/p2p/GotzRW05,
title = {Selected DHT Algorithms},
booktitle = {Peer-to-Peer Systems and Applications},
series = {Lecture Notes in Computer Science},
@@ -9091,7 +9091,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/31.pdf},
author = {Mijeom Kim and Mohan Kumar and Behrooz Shirazi}
}
-@inbook {Bartolini:2005:SFA:2167504.2167521,
+@book {Bartolini:2005:SFA:2167504.2167521,
title = {A software framework for automated negotiation},
booktitle = {Software Engineering for Multi-Agent Systems III},
series = {Lecture Notes in Computer Science},
@@ -9695,7 +9695,7 @@ ict theory to analyse these systems. Under our assumptions, resource distributio
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/10.1.1.4.7003\%20\%281\%29.pdf},
author = {George Danezis and Ross Anderson}
}
-@inbook {2004,
+@book {2004,
title = {Efficient Private Matching and Set Intersection},
booktitle = {Advances in Cryptology - EUROCRYPT 2004},
series = {Lecture Notes in Computer Science},
@@ -9882,7 +9882,7 @@ This work was supported in part by the National Science Foundation under Contrac
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/PINS\%2704\%20-\%20\%20Free-riding\%20and\%20whitewashing\%20in\%20P2P\%20systems.pdf},
author = {Michal Feldman and Papadimitriou, Christos and John Chuang and Ion Stoica}
}
-@inbook {2004,
+@book {2004,
title = {Group Spreading: A Protocol for Provably Secure Distributed Name Service},
booktitle = {Automata, Languages and Programming},
series = {Lecture Notes in Computer Science},
@@ -10784,7 +10784,7 @@ This paper describes the motivation, architecture and implementation for a new p
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/danezis-pet2004.pdf},
author = {George Danezis}
}
-@inbook {Jiang_trustand,
+@book {Jiang_trustand,
title = {Trust and Cooperation in Peer-to-Peer Systems},
booktitle = {Lecture Notes in Computer Science},
volume = {3032},
@@ -11520,7 +11520,7 @@ In this paper, we propose a new P2P routing algorithm - - HIERAS to relieve this
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/10.1.1.13.3464.pdf},
author = {Indranil Gupta and Kenneth P. Birman and Prakash Linga and Alan Demers and Robbert Van Renesse}
}
-@inbook {2003,
+@book {2003,
title = {Koorde: A Simple degree-optimal distributed hash table},
booktitle = {Peer-to-Peer Systems II},
series = {Lecture Notes in Computer Science},
@@ -13303,7 +13303,7 @@ We further investigate this intriguing proposal. Specifically, we
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/memory-bound-crypto.pdf},
author = {Cynthia Dwork and Andrew Goldberg and Moni Naor}
}
-@inbook {2002,
+@book {2002,
title = {Mnemosyne: Peer-to-Peer Steganographic Storage},
booktitle = {Peer-to-Peer Systems},
series = {Lecture Notes in Computer Science},
@@ -14244,7 +14244,7 @@ Our construction strictly improves upon previous constructions and resolves some
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/lbfs.pdf},
author = {Muthitacharoen, Athicha and Chen, Benjie and David Mazi{\`e}res}
}
-@inbook {2001,
+@book {2001,
title = {Multiparty Computation from Threshold Homomorphic Encryption},
booktitle = {Advances in Cryptology {\textemdash} EUROCRYPT 2001},
series = {Lecture Notes in Computer Science},
@@ -14341,7 +14341,7 @@ This compilation represents the collected wisdom of today{\textquoteright}s peer
url = {http://portal.acm.org/citation.cfm?id=558412$\#$},
editor = {Andy oram}
}
-@inbook {2001,
+@book {2001,
title = {Peer-To-Peer: Harnessing the Power of Disruptive Technologies -- Chapter 12: Free Haven},
year = {2001},
publisher = {O{\textquoteright}Reilly Media},
@@ -15455,7 +15455,7 @@ This exposition presents a model to formally study such algorithms. This model,
url = {http://ieeexplore.ieee.org/Xplore/login.jsp?url=http\%3A\%2F\%2Fieeexplore.ieee.org\%2Fiel4\%2F49\%2F14639\%2F00668973.pdf\%3Farnumber\%3D668973\&authDecision=-203},
author = {Anja Jerichow and Jan M{\"u}ller and Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}
}
-@inbook {Goldreich98securemulti-party,
+@book {Goldreich98securemulti-party,
title = {Secure Multi-Party Computation},
booktitle = {The Foundations of Cryptography },
volume = {2},
@@ -15508,7 +15508,7 @@ This exposition presents a model to formally study such algorithms. This model,
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/chor97computationally.pdf},
author = {Benny Chor and Niv Gilboa}
}
-@inbook {Ogata97faulttolerant,
+@book {Ogata97faulttolerant,
title = {Fault Tolerant Anonymous Channel},
booktitle = { Information and Communications Security},
series = { Lecture Notes in Computer Science},
@@ -16082,7 +16082,7 @@ We also sketch applications of these signatures to a payment system, solving dis
www_pdf_url = {https://gnunet.org/git/bibliography.git/tree/docs/SIGCOMM\%2787\%20-\%20Strategies\%20for\%20decentralized\%20resource\%20management.pdf},
author = {Stumm, Michael}
}
-@inbook {1986,
+@book {1986,
title = {Networks Without User Observability {\textemdash} Design Options},
booktitle = {Advances in Cryptology {\textemdash} EUROCRYPT{\textquoteright} 85},
series = {Lecture Notes in Computer Science},