diff options
author | Nils Gillmann <ng0@n0.is> | 2018-10-14 14:10:44 +0000 |
---|---|---|
committer | Nils Gillmann <ng0@n0.is> | 2018-10-14 14:10:44 +0000 |
commit | 1370f6348480282c50e333ea7ca4fed202f86e04 (patch) | |
tree | 6f94bf00ae3964dcfcdafa2c829f1d93823fb69b | |
parent | e2200e9a607f4c1c08f1a08e953d26ea0b38e63c (diff) | |
download | gnunetbib-1370f6348480282c50e333ea7ca4fed202f86e04.tar.gz gnunetbib-1370f6348480282c50e333ea7ca4fed202f86e04.zip |
gnunetbib.bib: fix abstract has an extraneous period error
Signed-off-by: Nils Gillmann <ng0@n0.is>
-rw-r--r-- | gnunetbib.bib | 8 |
1 files changed, 4 insertions, 4 deletions
diff --git a/gnunetbib.bib b/gnunetbib.bib index c07af8d..db8b417 100644 --- a/gnunetbib.bib +++ b/gnunetbib.bib | |||
@@ -481,7 +481,7 @@ as an evaluation of its performance}, | |||
481 | school = {Universit{\'e} de Rennes 1}, | 481 | school = {Universit{\'e} de Rennes 1}, |
482 | type = {Habilitation {\`a} diriger des recherches}, | 482 | type = {Habilitation {\`a} diriger des recherches}, |
483 | address = {Rennes}, | 483 | address = {Rennes}, |
484 | abstract = {GNUnet is an alternative network stack for building secure, decentralized and privacy-preserving distributed applications. Our goal is to replace the old insecure Internet protocol stack. Starting from an application for secure publication of files, it has grown to include all kinds of basic protocol components and applications towards the creation of a GNU internet. This habilitation provides an overview of the GNUnet architecture, including the development process, the network architecture and the software architecture. The goal of Part 1 is to provide an overview of how the various parts of the project work together today, and to then give ideas for future directions. The text is a first attempt to provide this kind of synthesis, and in return does not go into extensive technical depth on any particular topic. Part 2 then gives selected technical details based on eight publications covering many of the core components. This is a harsh selection; on the GNUnet website there are more than 50 published research papers and theses related to GNUnet, providing extensive and in-depth documentation. Finally, Part 3 gives an overview of current plans and future work.}, | 484 | abstract = {GNUnet is an alternative network stack for building secure, decentralized and privacy-preserving distributed applications. Our goal is to replace the old insecure Internet protocol stack. Starting from an application for secure publication of files, it has grown to include all kinds of basic protocol components and applications towards the creation of a GNU internet. This habilitation provides an overview of the GNUnet architecture, including the development process, the network architecture and the software architecture. The goal of Part 1 is to provide an overview of how the various parts of the project work together today, and to then give ideas for future directions. The text is a first attempt to provide this kind of synthesis, and in return does not go into extensive technical depth on any particular topic. Part 2 then gives selected technical details based on eight publications covering many of the core components. This is a harsh selection; on the GNUnet website there are more than 50 published research papers and theses related to GNUnet, providing extensive and in-depth documentation. Finally, Part 3 gives an overview of current plans and future work}, |
485 | keywords = {decentralization, GNUnet, peer-to-peer, privacy, private information retrieval, routing, secure multiparty computation, self-organization}, | 485 | keywords = {decentralization, GNUnet, peer-to-peer, privacy, private information retrieval, routing, secure multiparty computation, self-organization}, |
486 | www_section = {decentralization, GNUnet, peer-to-peer, privacy, private information retrieval, routing, secure multiparty computation, self-organization}, | 486 | www_section = {decentralization, GNUnet, peer-to-peer, privacy, private information retrieval, routing, secure multiparty computation, self-organization}, |
487 | www_tags = selected, | 487 | www_tags = selected, |
@@ -493,7 +493,7 @@ as an evaluation of its performance}, | |||
493 | title = {Toward secure name resolution on the internet}, | 493 | title = {Toward secure name resolution on the internet}, |
494 | journal = {Computers & Security}, | 494 | journal = {Computers & Security}, |
495 | year = {2018}, | 495 | year = {2018}, |
496 | abstract = {The Domain Name System (DNS) provides crucial name resolution functions for most Internet services. As a result, DNS traffic provides an important attack vector for mass surveillance, as demonstrated by the QUANTUMDNS and MORECOWBELL programs of the NSA. This article reviews how DNS works and describes security considerations for next generation name resolution systems. We then describe DNS variations and analyze their impact on security and privacy. We also consider Namecoin, the GNU Name System and RAINS, which are more radical re-designs of name systems in that they both radically change the wire protocol and also eliminate the existing global consensus on TLDs provided by ICANN. Finally, we assess how the different systems stack up with respect to the goal of improving security and privacy of name resolution for the future Internet.}, | 496 | abstract = {The Domain Name System (DNS) provides crucial name resolution functions for most Internet services. As a result, DNS traffic provides an important attack vector for mass surveillance, as demonstrated by the QUANTUMDNS and MORECOWBELL programs of the NSA. This article reviews how DNS works and describes security considerations for next generation name resolution systems. We then describe DNS variations and analyze their impact on security and privacy. We also consider Namecoin, the GNU Name System and RAINS, which are more radical re-designs of name systems in that they both radically change the wire protocol and also eliminate the existing global consensus on TLDs provided by ICANN. Finally, we assess how the different systems stack up with respect to the goal of improving security and privacy of name resolution for the future Internet}, |
497 | keywords = {Future Internet, GNUnet, Name resolution, network architecture, privacy, Technology and society}, | 497 | keywords = {Future Internet, GNUnet, Name resolution, network architecture, privacy, Technology and society}, |
498 | www_section = {Future Internet, GNUnet, Name resolution, network architecture, privacy, Technology and society}, | 498 | www_section = {Future Internet, GNUnet, Name resolution, network architecture, privacy, Technology and society}, |
499 | issn = {0167-4048}, | 499 | issn = {0167-4048}, |
@@ -506,7 +506,7 @@ as an evaluation of its performance}, | |||
506 | title = {reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption}, | 506 | title = {reclaimID: Secure, Self-Sovereign Identities using Name Systems and Attribute-Based Encryption}, |
507 | booktitle = {ArXiv e-prints}, | 507 | booktitle = {ArXiv e-prints}, |
508 | year = {2018}, | 508 | year = {2018}, |
509 | abstract = {In this paper we present reclaimID: An architecture that allows users to reclaim their digital identities by securely sharing identity attributes without the need for a centralised service provider. We propose a design where user attributes are stored in and shared over a name system under user-owned namespaces. Attributes are encrypted using attribute-based encryption (ABE), allowing the user to selectively authorize and revoke access of requesting parties to subsets of his attributes. We present an implementation based on the decentralised GNU Name System (GNS) in combination with ciphertext-policy ABE using type-1 pairings. To show the practicality of our implementation, we carried out experimental evaluations of selected implementation aspects including attribute resolution performance. Finally, we show that our design can be used as a standard OpenID Connect Identity Provider allowing our implementation to be integrated into standard-compliant services.}, | 509 | abstract = {In this paper we present reclaimID: An architecture that allows users to reclaim their digital identities by securely sharing identity attributes without the need for a centralised service provider. We propose a design where user attributes are stored in and shared over a name system under user-owned namespaces. Attributes are encrypted using attribute-based encryption (ABE), allowing the user to selectively authorize and revoke access of requesting parties to subsets of his attributes. We present an implementation based on the decentralised GNU Name System (GNS) in combination with ciphertext-policy ABE using type-1 pairings. To show the practicality of our implementation, we carried out experimental evaluations of selected implementation aspects including attribute resolution performance. Finally, we show that our design can be used as a standard OpenID Connect Identity Provider allowing our implementation to be integrated into standard-compliant services}, |
510 | keywords = {Computer Science - Cryptography and Security}, | 510 | keywords = {Computer Science - Cryptography and Security}, |
511 | www_section = {Computer Science - Cryptography and Security}, | 511 | www_section = {Computer Science - Cryptography and Security}, |
512 | url = {https://arxiv.org/abs/1805.06253v1}, | 512 | url = {https://arxiv.org/abs/1805.06253v1}, |
@@ -13178,7 +13178,7 @@ The read-only file system makes the security of published content independent fr | |||
13178 | } | 13178 | } |
13179 | @article {2002_2_GNet, | 13179 | @article {2002_2_GNet, |
13180 | title = {The GNet Whitepaper}, | 13180 | title = {The GNet Whitepaper}, |
13181 | abstract = {This paper describes GNet, a reliable anonymous distributed backup system with reasonable defenses against malicious hosts and low overhead in traffic and CPU time. The system design is described and compared to other publicly used services with similar goals. Additionally, the implementation and the protocols of GNet are presented.}, | 13181 | abstract = {This paper describes GNet, a reliable anonymous distributed backup system with reasonable defenses against malicious hosts and low overhead in traffic and CPU time. The system design is described and compared to other publicly used services with similar goals. Additionally, the implementation and the protocols of GNet are presented}, |
13182 | year = {2002}, | 13182 | year = {2002}, |
13183 | month = jun, | 13183 | month = jun, |
13184 | institution = {Purdue University}, | 13184 | institution = {Purdue University}, |