aboutsummaryrefslogtreecommitdiff
diff options
context:
space:
mode:
authorng0 <ng0@n0.is>2019-03-03 11:30:49 +0000
committerng0 <ng0@n0.is>2019-03-03 11:30:49 +0000
commitac2cc95e992afef7b6e4d717a79ac2f71b8ddbbb (patch)
tree962691d47e5239a4401dde77ca2f314ebd62086f
parentab29fcfc36df3a78809712a077bc853a086463d0 (diff)
downloadgnunetbib-ac2cc95e992afef7b6e4d717a79ac2f71b8ddbbb.tar.gz
gnunetbib-ac2cc95e992afef7b6e4d717a79ac2f71b8ddbbb.zip
gnunetbib.bib: Update URL.
-rw-r--r--gnunetbib.bib2060
1 files changed, 1030 insertions, 1030 deletions
diff --git a/gnunetbib.bib b/gnunetbib.bib
index 1d778fd..efad4f7 100644
--- a/gnunetbib.bib
+++ b/gnunetbib.bib
@@ -47,7 +47,7 @@
47 abstract = {In this thesis we translate Brandt's privacy preserving sealed-bid online auction protocol from RSA to elliptic curve arithmetic and analyze the theoretical and practical benefits. With Brandt's protocol, the auction outcome is completely resolved by the bidders and the seller without the need for a trusted third party. Loosing bids are not revealed to anyone. We present libbrandt, our implementation of four algorithms with different outcome and pricing properties, and describe how they can be incorporated in a real-world online auction system. Our performance measurements show a reduction of computation time and prospective bandwidth cost of over 90\% compared to an implementation of the RSA version of the same algorithms. We also evaluate how libbrandt scales in different dimensions and conclude that the system we have presented is promising with respect to an adoption in the real world}, 47 abstract = {In this thesis we translate Brandt's privacy preserving sealed-bid online auction protocol from RSA to elliptic curve arithmetic and analyze the theoretical and practical benefits. With Brandt's protocol, the auction outcome is completely resolved by the bidders and the seller without the need for a trusted third party. Loosing bids are not revealed to anyone. We present libbrandt, our implementation of four algorithms with different outcome and pricing properties, and describe how they can be incorporated in a real-world online auction system. Our performance measurements show a reduction of computation time and prospective bandwidth cost of over 90\% compared to an implementation of the RSA version of the same algorithms. We also evaluate how libbrandt scales in different dimensions and conclude that the system we have presented is promising with respect to an adoption in the real world},
48 www_section = {auctions, GNUnet, secure multi-party computation}, 48 www_section = {auctions, GNUnet, secure multi-party computation},
49 www_tags = selected, 49 www_tags = selected,
50 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/thesis_0.pdf}, 50 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/thesis_0.pdf},
51 url = {https://bibliography.gnunet.org}, 51 url = {https://bibliography.gnunet.org},
52 author = {Markus Teich}, 52 author = {Markus Teich},
53 editor = {Totakura, Sree Harsha and Grothoff, Christian and Felix Brandt} 53 editor = {Totakura, Sree Harsha and Grothoff, Christian and Felix Brandt}
@@ -65,7 +65,7 @@
65 www_section = {CADET, GNUnet, measurement, performance}, 65 www_section = {CADET, GNUnet, measurement, performance},
66 www_tags = selected, 66 www_tags = selected,
67 url = {https://bibliography.gnunet.org}, 67 url = {https://bibliography.gnunet.org},
68 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/lurchi-bs-thesis.pdf}, 68 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/lurchi-bs-thesis.pdf},
69 author = {Christian Ulrich} 69 author = {Christian Ulrich}
70} 70}
71@conference {dold2016byzantine, 71@conference {dold2016byzantine,
@@ -75,7 +75,7 @@
75 www_section = unsorted, 75 www_section = unsorted,
76 www_tags = selected, 76 www_tags = selected,
77 url = {https://bibliography.gnunet.org}, 77 url = {https://bibliography.gnunet.org},
78 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/dold2016byzantine.pdf}, 78 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/dold2016byzantine.pdf},
79 author = {Dold, Florian and Grothoff, Christian} 79 author = {Dold, Florian and Grothoff, Christian}
80} 80}
81@conference {consensus2016, 81@conference {consensus2016,
@@ -85,7 +85,7 @@
85 month = jun, 85 month = jun,
86 abstract = {Applications of secure multiparty computation such as certain electronic voting or auction protocols require Byzantine agreement on large sets of elements. Implementations proposed in the literature so far have relied on state machine replication, and reach agreement on each individual set element in sequence. We introduce set-union consensus, a specialization of Byzantine consensus that reaches agreement over whole sets. This primitive admits an efficient and simple implementation by the composition of Eppstein's set reconciliation protocol with Ben-Or's ByzConsensus protocol. A free software implementation of this construction is available in GNUnet. Experimental results indicate that our approach results in an efficient protocol for very large sets, especially in the absence of Byzantine faults. We show the versatility of set-union consensus by using it to implement distributed key generation, ballot collection and cooperative decryption for an electronic voting protocol implemented in GNUnet}, 86 abstract = {Applications of secure multiparty computation such as certain electronic voting or auction protocols require Byzantine agreement on large sets of elements. Implementations proposed in the literature so far have relied on state machine replication, and reach agreement on each individual set element in sequence. We introduce set-union consensus, a specialization of Byzantine consensus that reaches agreement over whole sets. This primitive admits an efficient and simple implementation by the composition of Eppstein's set reconciliation protocol with Ben-Or's ByzConsensus protocol. A free software implementation of this construction is available in GNUnet. Experimental results indicate that our approach results in an efficient protocol for very large sets, especially in the absence of Byzantine faults. We show the versatility of set-union consensus by using it to implement distributed key generation, ballot collection and cooperative decryption for an electronic voting protocol implemented in GNUnet},
87 www_section = {byzantine fault tolerance, consensus, GNUnet}, 87 www_section = {byzantine fault tolerance, consensus, GNUnet},
88 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/consensus2016.pdf}, 88 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/consensus2016.pdf},
89 www_tags = selected, 89 www_tags = selected,
90 url = {https://bibliography.gnunet.org}, 90 url = {https://bibliography.gnunet.org},
91 author = {Florian Dold and Christian Grothoff} 91 author = {Florian Dold and Christian Grothoff}
@@ -100,7 +100,7 @@
100 address = {Hyderabad}, 100 address = {Hyderabad},
101 abstract = {GNU Taler is a new electronic online payment system which provides privacy for customers and accountability for merchants. It uses an exchange service to issue digital coins using blind signatures, and is thus not subject to the performance issues that plague Byzantine fault-tolerant consensus-based solutions. The focus of this paper is addressing the challenges payment systems face in the context of the Web. We discuss how to address Web-specific challenges, such as handling bookmarks and sharing of links, as well as supporting users that have disabled JavaScript. Web payment systems must also navigate various constraints imposed by modern Web browser security architecture, such as same-origin policies and the separation between browser extensions and Web pages. While our analysis focuses on how Taler operates within the security infrastructure provided by the modern Web, the results partially generalize to other payment systems. We also include the perspective of merchants, as existing systems have often struggled with securing payment information at the merchant's side. Here, challenges include avoiding database transactions for customers that do not actually go through with the purchase, as well as cleanly separating security-critical functions of the payment system from the rest of the Web service}, 101 abstract = {GNU Taler is a new electronic online payment system which provides privacy for customers and accountability for merchants. It uses an exchange service to issue digital coins using blind signatures, and is thus not subject to the performance issues that plague Byzantine fault-tolerant consensus-based solutions. The focus of this paper is addressing the challenges payment systems face in the context of the Web. We discuss how to address Web-specific challenges, such as handling bookmarks and sharing of links, as well as supporting users that have disabled JavaScript. Web payment systems must also navigate various constraints imposed by modern Web browser security architecture, such as same-origin policies and the separation between browser extensions and Web pages. While our analysis focuses on how Taler operates within the security infrastructure provided by the modern Web, the results partially generalize to other payment systems. We also include the perspective of merchants, as existing systems have often struggled with securing payment information at the merchant's side. Here, challenges include avoiding database transactions for customers that do not actually go through with the purchase, as well as cleanly separating security-critical functions of the payment system from the rest of the Web service},
102 www_section = {blind signatures, GNUnet, incentives, payments, Taler, web}, 102 www_section = {blind signatures, GNUnet, incentives, payments, Taler, web},
103 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/taler2016space.pdf}, 103 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/taler2016space.pdf},
104 www_tags = selected, 104 www_tags = selected,
105 url = {https://taler.net/en/bibliography.html}, 105 url = {https://taler.net/en/bibliography.html},
106 author = {Jeffrey Burdges and Florian Dold and Christian Grothoff and Marcello Stanisci} 106 author = {Jeffrey Burdges and Florian Dold and Christian Grothoff and Marcello Stanisci}
@@ -116,7 +116,7 @@
116 address = {Berlin}, 116 address = {Berlin},
117 abstract = {This thesis studies the GNUnet project comprising its history, ideas and the P2P network technology. It specifically investigates the question of emancipatory potentials with regard to forms of information power due to a widely deployed new Internet technology and tries to identify essential suspensions of power within the scope of an impact assessment. Moreover, we will see by contrasting the GNUnet project with the critical data protection project, founded on social theory, that both are heavily concerned about the problem of illegitimate and unrestrained information power, giving us additional insights for the assessment. Last but least I'll try to present a scheme of how both approaches may interact to realize their goals}, 117 abstract = {This thesis studies the GNUnet project comprising its history, ideas and the P2P network technology. It specifically investigates the question of emancipatory potentials with regard to forms of information power due to a widely deployed new Internet technology and tries to identify essential suspensions of power within the scope of an impact assessment. Moreover, we will see by contrasting the GNUnet project with the critical data protection project, founded on social theory, that both are heavily concerned about the problem of illegitimate and unrestrained information power, giving us additional insights for the assessment. Last but least I'll try to present a scheme of how both approaches may interact to realize their goals},
118 www_section = {GNUnet, peer-to-peer}, 118 www_section = {GNUnet, peer-to-peer},
119 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/xrs2016.pdf}, 119 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/xrs2016.pdf},
120 www_tags = selected, 120 www_tags = selected,
121 url = {https://bibliography.gnunet.org}, 121 url = {https://bibliography.gnunet.org},
122 author = {Christian Ricardo K{\"u}hne} 122 author = {Christian Ricardo K{\"u}hne}
@@ -145,7 +145,7 @@
145 address = {Heraklion, Greece}, 145 address = {Heraklion, Greece},
146 abstract = {Future online social networks need to not only protect sensitive data of their users, but also protect them from abusive behavior coming from malicious participants in the network. We investigate the use of supervised learning techniques to detect abusive behavior and describe privacy-preserving protocols to compute the feature set required by abuse classification algorithms in a secure and privacy-preserving way. While our method is not yet fully resilient against a strong adaptive adversary, our evaluation suggests that it will be useful to detect abusive behavior with a minimal impact on privacy}, 146 abstract = {Future online social networks need to not only protect sensitive data of their users, but also protect them from abusive behavior coming from malicious participants in the network. We investigate the use of supervised learning techniques to detect abusive behavior and describe privacy-preserving protocols to compute the feature set required by abuse classification algorithms in a secure and privacy-preserving way. While our method is not yet fully resilient against a strong adaptive adversary, our evaluation suggests that it will be useful to detect abusive behavior with a minimal impact on privacy},
147 www_section = {abuse, GNUnet, Privacy preserving, reputation, Social networking}, 147 www_section = {abuse, GNUnet, Privacy preserving, reputation, Social networking},
148 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p4t.pdf}, 148 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p4t.pdf},
149 www_tags = selected, 149 www_tags = selected,
150 url = {https://bibliography.gnunet.org}, 150 url = {https://bibliography.gnunet.org},
151 author = {{\'A}lvaro Garc{\'\i}a-Recuero and Jeffrey Burdges and Christian Grothoff} 151 author = {{\'A}lvaro Garc{\'\i}a-Recuero and Jeffrey Burdges and Christian Grothoff}
@@ -156,7 +156,7 @@
156 year = {2016}, 156 year = {2016},
157 chapter = {46}, 157 chapter = {46},
158 www_section = {Architecture, GNUnet, Internet}, 158 www_section = {Architecture, GNUnet, Internet},
159 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fk-2016-1-p46.pdf}, 159 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fk-2016-1-p46.pdf},
160 www_tags = selected, 160 www_tags = selected,
161 url = {https://bibliography.gnunet.org}, 161 url = {https://bibliography.gnunet.org},
162 author = {Christian Ricardo K{\"u}hne} 162 author = {Christian Ricardo K{\"u}hne}
@@ -172,7 +172,7 @@
172 address = {M{\"u}nchen}, 172 address = {M{\"u}nchen},
173 abstract = {Byzantine consensus is a fundamental and well-studied problem in the area of distributed system. It requires a group of peers to reach agreement on some value, even if a fraction of the peers is controlled by an adversary. This thesis proposes set union consensus, an efficient generalization of Byzantine consensus from single elements to sets. This is practically motivated by Secure Multiparty Computation protocols such as electronic voting, where a large set of elements must be collected and agreed upon. Existing practical implementations of Byzantine consensus are typically based on state machine replication and not well-suited for agreement on sets, since they must process individual agreements on all set elements in sequence. We describe and evaluate our implementation of set union consensus in GNUnet, which is based on a composition of Eppstein set reconciliation protocol with the simple gradecast consensus prococol described by Ben-Or}, 173 abstract = {Byzantine consensus is a fundamental and well-studied problem in the area of distributed system. It requires a group of peers to reach agreement on some value, even if a fraction of the peers is controlled by an adversary. This thesis proposes set union consensus, an efficient generalization of Byzantine consensus from single elements to sets. This is practically motivated by Secure Multiparty Computation protocols such as electronic voting, where a large set of elements must be collected and agreed upon. Existing practical implementations of Byzantine consensus are typically based on state machine replication and not well-suited for agreement on sets, since they must process individual agreements on all set elements in sequence. We describe and evaluate our implementation of set union consensus in GNUnet, which is based on a composition of Eppstein set reconciliation protocol with the simple gradecast consensus prococol described by Ben-Or},
174 www_section = {byzantine consensus, GNUnet, secure multiparty computation, set reconciliation, voting}, 174 www_section = {byzantine consensus, GNUnet, secure multiparty computation, set reconciliation, voting},
175 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ma_dold_consensus_21dec2015.pdf}, 175 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ma_dold_consensus_21dec2015.pdf},
176 www_tags = selected, 176 www_tags = selected,
177 url = {https://bibliography.gnunet.org}, 177 url = {https://bibliography.gnunet.org},
178 author = {Florian Dold} 178 author = {Florian Dold}
@@ -185,7 +185,7 @@
185 address = {M{\"u}nchen}, 185 address = {M{\"u}nchen},
186 www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN}, 186 www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN},
187 journal = {unknown}, 187 journal = {unknown},
188 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mcb-es.pdf}, 188 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/mcb-es.pdf},
189 www_tags = selected, 189 www_tags = selected,
190 url = {https://bibliography.gnunet.org}, 190 url = {https://bibliography.gnunet.org},
191 author = {Christian Grothoff and Matthias Wachs and Monika Ermert and Jacob Appelbaum} 191 author = {Christian Grothoff and Matthias Wachs and Monika Ermert and Jacob Appelbaum}
@@ -198,7 +198,7 @@
198 address = {M{\"u}nchen}, 198 address = {M{\"u}nchen},
199 www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN}, 199 www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN},
200 journal = {unknown}, 200 journal = {unknown},
201 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mcb-it.pdf}, 201 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/mcb-it.pdf},
202 www_tags = selected, 202 www_tags = selected,
203 url = {https://bibliography.gnunet.org}, 203 url = {https://bibliography.gnunet.org},
204 author = {Christian Grothoff and Matthias Wachs and Monika Ermert and Jacob Appelbaum and Luca Saiu} 204 author = {Christian Grothoff and Matthias Wachs and Monika Ermert and Jacob Appelbaum and Luca Saiu}
@@ -211,7 +211,7 @@
211 address = {M{\"u}nchen}, 211 address = {M{\"u}nchen},
212 www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN}, 212 www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN},
213 journal = {unknown}, 213 journal = {unknown},
214 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mcb-fr.pdf}, 214 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/mcb-fr.pdf},
215 www_tags = selected, 215 www_tags = selected,
216 url = {https://bibliography.gnunet.org}, 216 url = {https://bibliography.gnunet.org},
217 author = {Christian Grothoff and Matthias Wachs and Monika Ermert and Jacob Appelbaum and Ludovic Court{\`e}s} 217 author = {Christian Grothoff and Matthias Wachs and Monika Ermert and Jacob Appelbaum and Ludovic Court{\`e}s}
@@ -224,7 +224,7 @@
224 address = {M{\"u}nchen}, 224 address = {M{\"u}nchen},
225 www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN, TLS}, 225 www_section = {DNS, DNSSEC, MORECOWBELL, NAMECOIN, TLS},
226 journal = {unknown}, 226 journal = {unknown},
227 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mcb-en.pdf}, 227 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/mcb-en.pdf},
228 www_tags = selected, 228 www_tags = selected,
229 url = {https://bibliography.gnunet.org}, 229 url = {https://bibliography.gnunet.org},
230 author = {Christian Grothoff and Matthias Wachs and Monika Ermert and Jacob Appelbaum} 230 author = {Christian Grothoff and Matthias Wachs and Monika Ermert and Jacob Appelbaum}
@@ -244,7 +244,7 @@
244 isbn = {3-937201-45-9}, 244 isbn = {3-937201-45-9},
245 doi = {10.2313/NET-2015-02-1}, 245 doi = {10.2313/NET-2015-02-1},
246 url = {http://nbn-resolving.de/urn/resolver.pl?urn:bvb:91-diss-20150225-1231854-0-7}, 246 url = {http://nbn-resolving.de/urn/resolver.pl?urn:bvb:91-diss-20150225-1231854-0-7},
247 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NET-2015-02-1.pdf}, 247 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NET-2015-02-1.pdf},
248 author = {Matthias Wachs} 248 author = {Matthias Wachs}
249} 249}
250@mastersthesis {panic2014, 250@mastersthesis {panic2014,
@@ -260,7 +260,7 @@
260 This thesis presents Panic!, a combination of open hardware design and free software to detect physical integrity attacks and to react by securely erasing cryptographic keys and other sensitive data from memory. To improve auditability and to allow cheap reproduction, the components of Panic! are kept simple in terms of conceptual design and lines of code. 260 This thesis presents Panic!, a combination of open hardware design and free software to detect physical integrity attacks and to react by securely erasing cryptographic keys and other sensitive data from memory. To improve auditability and to allow cheap reproduction, the components of Panic! are kept simple in terms of conceptual design and lines of code.
261 First, the motivation to use home routers for services besides routing and the need to protect their physical integrity is discussed. Second, the idea and functionality of the Panic! system is introduced and the high-level interactions between its components explained. Third, the software components to be run on the router are described. Fourth, the requirements of the measurement circuit are declared and a prototype is presented. Fifth, some characteristics of pressurized environments are discussed and the difficulties for finding adequate containments are explained. Finally, an outlook to tasks left for the future is given}, 261 First, the motivation to use home routers for services besides routing and the need to protect their physical integrity is discussed. Second, the idea and functionality of the Panic! system is introduced and the high-level interactions between its components explained. Third, the software components to be run on the router are described. Fourth, the requirements of the measurement circuit are declared and a prototype is presented. Fifth, some characteristics of pressurized environments are discussed and the difficulties for finding adequate containments are explained. Finally, an outlook to tasks left for the future is given},
262 www_section = {GNUnet, home router, intrusion detection, memory erasure, Panic, physical access}, 262 www_section = {GNUnet, home router, intrusion detection, memory erasure, Panic, physical access},
263 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/panic.pdf}, 263 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/panic.pdf},
264 www_tags = selected, 264 www_tags = selected,
265 url = {https://bibliography.gnunet.org}, 265 url = {https://bibliography.gnunet.org},
266 author = {Nicolas Bene{\v s}} 266 author = {Nicolas Bene{\v s}}
@@ -275,7 +275,7 @@
275 This paper presents a novel approach for automatic transport selection and resource allocation with a focus on decentralised networks. Our goal is to evaluate the communication mechanisms available for each communication partner and then allocate resources in line with the requirements of the applications. 275 This paper presents a novel approach for automatic transport selection and resource allocation with a focus on decentralised networks. Our goal is to evaluate the communication mechanisms available for each communication partner and then allocate resources in line with the requirements of the applications.
276 We begin by detailing the overall requirements for an algorithm for transport selection and resource allocation, and then compare three different solutions using (1) a heuristic, (2) linear optimisation, and (3) machine learning. To show the suitability and the specific benefits of each approach, we evaluate their performance with respect to usability, scalability and quality of the solution found in relation to application requirements}, 276 We begin by detailing the overall requirements for an algorithm for transport selection and resource allocation, and then compare three different solutions using (1) a heuristic, (2) linear optimisation, and (3) machine learning. To show the suitability and the specific benefits of each approach, we evaluate their performance with respect to usability, scalability and quality of the solution found in relation to application requirements},
277 www_section = {GNUnet, resource allocation}, 277 www_section = {GNUnet, resource allocation},
278 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/paper_short.pdf}, 278 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/paper_short.pdf},
279 www_tags = selected, 279 www_tags = selected,
280 url = {https://bibliography.gnunet.org}, 280 url = {https://bibliography.gnunet.org},
281 author = {Matthias Wachs and Fabian Oehlmann and Christian Grothoff} 281 author = {Matthias Wachs and Fabian Oehlmann and Christian Grothoff}
@@ -294,7 +294,7 @@ We present a hybrid PIR protocol that combines two PIR protocols, one from each
294 isbn = {978-3-319-08505-0}, 294 isbn = {978-3-319-08505-0},
295 doi = {10.1007/978-3-319-08506-7_4}, 295 doi = {10.1007/978-3-319-08506-7_4},
296 url = {http://dx.doi.org/10.1007/978-3-319-08506-7_4}, 296 url = {http://dx.doi.org/10.1007/978-3-319-08506-7_4},
297 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/pir_0.pdf}, 297 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/pir_0.pdf},
298 www_section = unsorted, 298 www_section = unsorted,
299 author = {Devet, Casey and Goldberg, Ian}, 299 author = {Devet, Casey and Goldberg, Ian},
300 editor = {De Cristofaro, Emiliano and Murdoch, StevenJ} 300 editor = {De Cristofaro, Emiliano and Murdoch, StevenJ}
@@ -306,7 +306,7 @@ We present a hybrid PIR protocol that combines two PIR protocols, one from each
306 month = jan, 306 month = jan,
307 abstract = {This paper describes CADET, a new transport protocol for confidential and authenticated data transfer in decentralized networks. This transport protocol is designed to operate in restricted-route scenarios such as friend-to-friend or ad-hoc wireless networks. We have implemented CADET and evaluated its performance in various network scenarios, compared it to the well-known TCP/IP stack and tested its response to rapidly changing network topologies. While our current implementation is still significantly slower in high-speed low-latency networks, for typical Internet-usage our system provides much better connectivity and security with comparable performance to TCP/IP}, 307 abstract = {This paper describes CADET, a new transport protocol for confidential and authenticated data transfer in decentralized networks. This transport protocol is designed to operate in restricted-route scenarios such as friend-to-friend or ad-hoc wireless networks. We have implemented CADET and evaluated its performance in various network scenarios, compared it to the well-known TCP/IP stack and tested its response to rapidly changing network topologies. While our current implementation is still significantly slower in high-speed low-latency networks, for typical Internet-usage our system provides much better connectivity and security with comparable performance to TCP/IP},
308 www_section = {CADET, encryption, GNUnet, routing}, 308 www_section = {CADET, encryption, GNUnet, routing},
309 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cadet.pdf}, 309 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cadet.pdf},
310 www_tags = selected, 310 www_tags = selected,
311 url = {https://bibliography.gnunet.org}, 311 url = {https://bibliography.gnunet.org},
312 author = {Polot, Bartlomiej and Christian Grothoff} 312 author = {Polot, Bartlomiej and Christian Grothoff}
@@ -316,7 +316,7 @@ We present a hybrid PIR protocol that combines two PIR protocols, one from each
316 booktitle = {IEEE International Conference on Peer to Peer computing}, 316 booktitle = {IEEE International Conference on Peer to Peer computing},
317 year = {2014}, 317 year = {2014},
318 abstract = {The vast majority of Internet users are relying on centralized search engine providers to conduct their web searches. However, search results can be censored and search queries can be recorded by these providers without the user's knowledge. Distributed web search engines based on peer-to-peer networks have been proposed to mitigate these threats. In this paper we analyze the three most popular real-world distributed web search engines: Faroo, Seeks and Yacy, with respect to their censorship resistance and privacy protection. We show that none of them provides an adequate level of protection against an adversary with modest resources. Recognizing these flaws, we identify security properties a censorship-resistant and privacy-preserving distributed web search engine should provide. We propose two novel defense mechanisms called node density protocol and webpage verification protocol to achieve censorship resistance and show their effectiveness and feasibility with simulations. Finally, we elaborate on how state-of-the-art defense mechanisms achieve privacy protection in distributed web search engines}, 318 abstract = {The vast majority of Internet users are relying on centralized search engine providers to conduct their web searches. However, search results can be censored and search queries can be recorded by these providers without the user's knowledge. Distributed web search engines based on peer-to-peer networks have been proposed to mitigate these threats. In this paper we analyze the three most popular real-world distributed web search engines: Faroo, Seeks and Yacy, with respect to their censorship resistance and privacy protection. We show that none of them provides an adequate level of protection against an adversary with modest resources. Recognizing these flaws, we identify security properties a censorship-resistant and privacy-preserving distributed web search engine should provide. We propose two novel defense mechanisms called node density protocol and webpage verification protocol to achieve censorship resistance and show their effectiveness and feasibility with simulations. Finally, we elaborate on how state-of-the-art defense mechanisms achieve privacy protection in distributed web search engines},
319 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DistributedSearch2014Hermann.pdf}, 319 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DistributedSearch2014Hermann.pdf},
320 www_section = unsorted, 320 www_section = unsorted,
321 url = {https://bibliography.gnunet.org}, 321 url = {https://bibliography.gnunet.org},
322 author = {Michael Herrmann and Ren Zhang and Kai-Chun Ning and Claudia Diaz} 322 author = {Michael Herrmann and Ren Zhang and Kai-Chun Ning and Claudia Diaz}
@@ -329,7 +329,7 @@ We present a hybrid PIR protocol that combines two PIR protocols, one from each
329 organization = {Springer Verlag}, 329 organization = {Springer Verlag},
330 abstract = {The Domain Name System (DNS) is vital for access to information on the Internet. This makes it a target for attackers whose aim is to suppress free access to information. This paper introduces the design and implementation of the GNU Name System (GNS), a fully decentralized and censorship-resistant name system. GNS provides a privacy-enhancing alternative to DNS which preserves the desirable property of memorable names. Due to its design, it can also double as a partial replacement of public key infrastructures, such as X.509. The design of GNS incorporates the capability to integrate and coexist with DNS. GNS is based on the principle of a petname system and builds on ideas from the Simple Distributed Security Infrastructure (SDSI), addressing a central issue with the decentralized mapping of secure identifiers to memorable names: namely the impossibility of providing a global, secure and memorable mapping without a trusted authority. GNS uses the transitivity in the SDSI design to replace the trusted root with secure delegation of authority, thus making petnames useful to other users while operating under a very strong adversary model. In addition to describing the GNS design, we also discuss some of the mechanisms that are needed to smoothly integrate GNS with existing processes and procedures in Web browsers. Specifically, we show how GNS is able to transparently support many assumptions that the existing HTTP(S) infrastructure makes about globally unique names}, 330 abstract = {The Domain Name System (DNS) is vital for access to information on the Internet. This makes it a target for attackers whose aim is to suppress free access to information. This paper introduces the design and implementation of the GNU Name System (GNS), a fully decentralized and censorship-resistant name system. GNS provides a privacy-enhancing alternative to DNS which preserves the desirable property of memorable names. Due to its design, it can also double as a partial replacement of public key infrastructures, such as X.509. The design of GNS incorporates the capability to integrate and coexist with DNS. GNS is based on the principle of a petname system and builds on ideas from the Simple Distributed Security Infrastructure (SDSI), addressing a central issue with the decentralized mapping of secure identifiers to memorable names: namely the impossibility of providing a global, secure and memorable mapping without a trusted authority. GNS uses the transitivity in the SDSI design to replace the trusted root with secure delegation of authority, thus making petnames useful to other users while operating under a very strong adversary model. In addition to describing the GNS design, we also discuss some of the mechanisms that are needed to smoothly integrate GNS with existing processes and procedures in Web browsers. Specifically, we show how GNS is able to transparently support many assumptions that the existing HTTP(S) infrastructure makes about globally unique names},
331 www_section = {DNS, GNU Name System, GNUnet, PKI}, 331 www_section = {DNS, GNU Name System, GNUnet, PKI},
332 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/paper_cans2014_camera_ready.pdf}, 332 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/paper_cans2014_camera_ready.pdf},
333 www_tags = selected, 333 www_tags = selected,
334 url = {https://bibliography.gnunet.org}, 334 url = {https://bibliography.gnunet.org},
335 author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff} 335 author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff}
@@ -345,7 +345,7 @@ We present a hybrid PIR protocol that combines two PIR protocols, one from each
345 address = {Munich}, 345 address = {Munich},
346 abstract = {Static analysis is often used to automatically check for common bugs in programs. Compilers already check for some common programming errors and issue warnings; however, they do not do a very deep analysis because this would slow the compilation of the program down. Specialized tools like Coverity or Clang Static Analyzer look at possible runs of a program and track the state of variables in respect to function calls. This information helps to identify possible bugs. In event driven programs like GNUnet callbacks are registered for later execution. Normal static analysis cannot track these function calls. This thesis is an attempt to extend different static analysis tools so that they can handle this case as well. Different solutions were thought of and executed with Coverity and Clang. This thesis describes the theoretical background of model checking and static analysis, the practical usage of wide spread static analysis tools, and how these tools can be extended in order to improve their usefulness}, 346 abstract = {Static analysis is often used to automatically check for common bugs in programs. Compilers already check for some common programming errors and issue warnings; however, they do not do a very deep analysis because this would slow the compilation of the program down. Specialized tools like Coverity or Clang Static Analyzer look at possible runs of a program and track the state of variables in respect to function calls. This information helps to identify possible bugs. In event driven programs like GNUnet callbacks are registered for later execution. Normal static analysis cannot track these function calls. This thesis is an attempt to extend different static analysis tools so that they can handle this case as well. Different solutions were thought of and executed with Coverity and Clang. This thesis describes the theoretical background of model checking and static analysis, the practical usage of wide spread static analysis tools, and how these tools can be extended in order to improve their usefulness},
347 www_section = {event-driven, flow control, GNUnet, static analysis}, 347 www_section = {event-driven, flow control, GNUnet, static analysis},
348 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/scheibner_thesis.pdf}, 348 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/scheibner_thesis.pdf},
349 www_tags = selected, 349 www_tags = selected,
350 url = {https://bibliography.gnunet.org}, 350 url = {https://bibliography.gnunet.org},
351 author = {Florian Scheibner} 351 author = {Florian Scheibner}
@@ -364,7 +364,7 @@ We present a hybrid PIR protocol that combines two PIR protocols, one from each
364 The energy measurements enacted at the end of this thesis demonstrate that, for the specific setup and conditions present during our experimentation, Cryogenic is capable to achieve savings between 1\% and 10\% for a USB WiFi device. 364 The energy measurements enacted at the end of this thesis demonstrate that, for the specific setup and conditions present during our experimentation, Cryogenic is capable to achieve savings between 1\% and 10\% for a USB WiFi device.
365 Although we ideally target mobile platforms, Cryogenic has been developed by means a new Linux module that integrates with the existing POSIX event loop system calls. This allows to use Cryogenic on many different platforms as long as they use a GNU/Linux distribution as the main operating system. An evidence of this can be found in this thesis, where we demonstrate the power savings on a single-board computer}, 365 Although we ideally target mobile platforms, Cryogenic has been developed by means a new Linux module that integrates with the existing POSIX event loop system calls. This allows to use Cryogenic on many different platforms as long as they use a GNU/Linux distribution as the main operating system. An evidence of this can be found in this thesis, where we demonstrate the power savings on a single-board computer},
366 www_section = {cooperative, cryogenic, GNUnet, Linux, POSIX, power}, 366 www_section = {cooperative, cryogenic, GNUnet, Linux, POSIX, power},
367 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/morales2014cryogenic.pdf}, 367 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/morales2014cryogenic.pdf},
368 www_tags = selected, 368 www_tags = selected,
369 url = {https://bibliography.gnunet.org}, 369 url = {https://bibliography.gnunet.org},
370 author = {Alejandra Morales} 370 author = {Alejandra Morales}
@@ -382,7 +382,7 @@ We present a hybrid PIR protocol that combines two PIR protocols, one from each
382 Most of the practical efforts in this area have focused on replacing traditional voting booths with electronic terminals, but did not attempt to apply cryptographic techniques able to guarantee critical properties of elections such as secrecy of ballot and verifiability. While such techniques were extensively researched in the past 30 years, practical implementation of cryptographically secure remote electronic voting schemes are not readily available. All existing implementation we are aware of either exhibit critical security flaws, are proprietary black-box systems or require additional physical assumptions such as a preparatory key ceremony executed by the election officials. The latter makes such systems unusable for purely digital communities. 382 Most of the practical efforts in this area have focused on replacing traditional voting booths with electronic terminals, but did not attempt to apply cryptographic techniques able to guarantee critical properties of elections such as secrecy of ballot and verifiability. While such techniques were extensively researched in the past 30 years, practical implementation of cryptographically secure remote electronic voting schemes are not readily available. All existing implementation we are aware of either exhibit critical security flaws, are proprietary black-box systems or require additional physical assumptions such as a preparatory key ceremony executed by the election officials. The latter makes such systems unusable for purely digital communities.
383 This thesis describes the design and implementation of an electronic voting system in GNUnet, a framework for secure and decentralized networking. We provide a short survey of voting schemes and existing implementations. The voting scheme we implemented makes use of threshold cryptography, a technique which requires agreement among a large subset of the election officials to execute certain cryptographic operations. Since such protocols have applications outside of electronic voting, we describe their design and implementation in GNUnet separately}, 383 This thesis describes the design and implementation of an electronic voting system in GNUnet, a framework for secure and decentralized networking. We provide a short survey of voting schemes and existing implementations. The voting scheme we implemented makes use of threshold cryptography, a technique which requires agreement among a large subset of the election officials to execute certain cryptographic operations. Since such protocols have applications outside of electronic voting, we describe their design and implementation in GNUnet separately},
384 www_section = {GNUnet, secure multiparty computation, voting}, 384 www_section = {GNUnet, secure multiparty computation, voting},
385 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ba_dold_voting_24aug2014.pdf}, 385 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ba_dold_voting_24aug2014.pdf},
386 www_tags = selected, 386 www_tags = selected,
387 url = {https://bibliography.gnunet.org}, 387 url = {https://bibliography.gnunet.org},
388 author = {Florian Dold} 388 author = {Florian Dold}
@@ -397,7 +397,7 @@ We present a hybrid PIR protocol that combines two PIR protocols, one from each
397 abstract = {In decentralized networks, collecting and analysing information from the network is useful for developers and operators to monitor the behaviour and detect anomalies such as attacks or failures in both the overlay and underlay networks. But realizing such an infrastructure is hard to achieve due to the decentralized nature of the network especially if the anomaly occurs on systems not operated by developers or participants get separated from the collection points. In this thesis a decentralized monitoring infrastructure using a decentralized peer-to-peer network is developed to collect information and detect anomalies in a collaborative way without coordination by and in absence of a centralized infrastructure and report detected incidents to a monitoring infrastructure. 397 abstract = {In decentralized networks, collecting and analysing information from the network is useful for developers and operators to monitor the behaviour and detect anomalies such as attacks or failures in both the overlay and underlay networks. But realizing such an infrastructure is hard to achieve due to the decentralized nature of the network especially if the anomaly occurs on systems not operated by developers or participants get separated from the collection points. In this thesis a decentralized monitoring infrastructure using a decentralized peer-to-peer network is developed to collect information and detect anomalies in a collaborative way without coordination by and in absence of a centralized infrastructure and report detected incidents to a monitoring infrastructure.
398 We start by introducing background information about peer-to-peer networks, anomalies and anomaly detection techniques in literature. Then we present some of the related work regarding monitoring decentralized networks, anomaly detection and data aggregation in decentralized networks. Then we perform an analysis of the system objectives, target environment and the desired properties of the system. Then we design the system in terms of the overall structure and its individual components. We follow with details about the system implementation. Lastly, we evaluate the final system implementation against our desired objectives}, 398 We start by introducing background information about peer-to-peer networks, anomalies and anomaly detection techniques in literature. Then we present some of the related work regarding monitoring decentralized networks, anomaly detection and data aggregation in decentralized networks. Then we perform an analysis of the system objectives, target environment and the desired properties of the system. Then we design the system in terms of the overall structure and its individual components. We follow with details about the system implementation. Lastly, we evaluate the final system implementation against our desired objectives},
399 www_section = {anomaly, censorship, detection, GNUnet}, 399 www_section = {anomaly, censorship, detection, GNUnet},
400 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/decmon_0.pdf}, 400 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/decmon_0.pdf},
401 www_tags = selected, 401 www_tags = selected,
402 url = {https://bibliography.gnunet.org}, 402 url = {https://bibliography.gnunet.org},
403 author = {Omar Tarabai} 403 author = {Omar Tarabai}
@@ -417,7 +417,7 @@ communication systems enable the reconstruction of user behavioral profiles. Pro
417 isbn = {978-3-319-08505-0}, 417 isbn = {978-3-319-08505-0},
418 doi = {10.1007/978-3-319-08506-7_11}, 418 doi = {10.1007/978-3-319-08506-7_11},
419 url = {http://dx.doi.org/10.1007/978-3-319-08506-7_11}, 419 url = {http://dx.doi.org/10.1007/978-3-319-08506-7_11},
420 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/anonymity_and_cover_traffic.pdf}, 420 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/anonymity_and_cover_traffic.pdf},
421 author = {Oya, Simon and Troncoso, Carmela and P{\'e}rez-Gonz{\'a}lez, Fernando}, 421 author = {Oya, Simon and Troncoso, Carmela and P{\'e}rez-Gonz{\'a}lez, Fernando},
422 www_section = unsorted, 422 www_section = unsorted,
423 editor = {De Cristofaro, Emiliano and Murdoch, StevenJ} 423 editor = {De Cristofaro, Emiliano and Murdoch, StevenJ}
@@ -433,7 +433,7 @@ service that provides privacy-friendly indication of presence to support real-ti
433list secret. Besides presence, high-integrity status updates are supported, to facilitate key update and rendezvous protocols. While infrastructure services are required for DP5 to operate, they are 433list secret. Besides presence, high-integrity status updates are supported, to facilitate key update and rendezvous protocols. While infrastructure services are required for DP5 to operate, they are
434designed to not require any long-term secrets and provide perfect forward secrecy in case of compromise. We provide security arguments for the indistinguishability properties of the protocol, as well 434designed to not require any long-term secrets and provide perfect forward secrecy in case of compromise. We provide security arguments for the indistinguishability properties of the protocol, as well
435as an evaluation of its performance}, 435as an evaluation of its performance},
436 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DP5\%3A\%20A\%20Private\%20Presence\%20Service.pdf}, 436 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DP5\%3A\%20A\%20Private\%20Presence\%20Service.pdf},
437 www_section = unsorted, 437 www_section = unsorted,
438 url = {https://bibliography.gnunet.org}, 438 url = {https://bibliography.gnunet.org},
439 author = {Borisov, Nikita and Danezis, George and Goldberg, Ian} 439 author = {Borisov, Nikita and Danezis, George and Goldberg, Ian}
@@ -451,7 +451,7 @@ as an evaluation of its performance},
451 isbn = {978-3-319-08505-0}, 451 isbn = {978-3-319-08505-0},
452 doi = {10.1007/978-3-319-08506-7_3}, 452 doi = {10.1007/978-3-319-08506-7_3},
453 url = {http://dx.doi.org/10.1007/978-3-319-08506-7_3}, 453 url = {http://dx.doi.org/10.1007/978-3-319-08506-7_3},
454 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/obfuscation_osn.pdf}, 454 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/obfuscation_osn.pdf},
455 www_section = unsorted, 455 www_section = unsorted,
456 author = {Chen, Terence and Boreli, Roksana and Kaafar, Mohamed-Ali and Friedman, Arik}, 456 author = {Chen, Terence and Boreli, Roksana and Kaafar, Mohamed-Ali and Friedman, Arik},
457 editor = {De Cristofaro, Emiliano and Murdoch, StevenJ} 457 editor = {De Cristofaro, Emiliano and Murdoch, StevenJ}
@@ -469,7 +469,7 @@ as an evaluation of its performance},
469 www_section = {DHT, GNUnet, performance analysis, testbed, X-vine}, 469 www_section = {DHT, GNUnet, performance analysis, testbed, X-vine},
470 www_tags = selected, 470 www_tags = selected,
471 url = {https://bibliography.gnunet.org}, 471 url = {https://bibliography.gnunet.org},
472 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SupritiSinghMasterThesis.pdf}, 472 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SupritiSinghMasterThesis.pdf},
473 author = {Supriti Singh} 473 author = {Supriti Singh}
474} 474}
475@mastersthesis {2017_0, 475@mastersthesis {2017_0,
@@ -531,7 +531,7 @@ GNS is an open standard with a complete free software reference implementation c
531 www_section = {DNS, GNU Name System, GNUnet, privacy, ReclaimID}, 531 www_section = {DNS, GNU Name System, GNUnet, privacy, ReclaimID},
532 www_tags = selected, 532 www_tags = selected,
533 url = {https://bibliography.gnunet.org}, 533 url = {https://bibliography.gnunet.org},
534 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/dasein10.pdf}, 534 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/dasein10.pdf},
535 author = {Christian Grothoff and Martin Schanzenbach and Annett Laube and Emmanuel Benoist} 535 author = {Christian Grothoff and Martin Schanzenbach and Annett Laube and Emmanuel Benoist}
536} 536}
537 537
@@ -552,7 +552,7 @@ distributed encryption scheme that is much more efficient for small plaintext do
552 isbn = {978-3-319-08505-0}, 552 isbn = {978-3-319-08505-0},
553 doi = {10.1007/978-3-319-08506-7_7}, 553 doi = {10.1007/978-3-319-08506-7_7},
554 url = {http://dx.doi.org/10.1007/978-3-319-08506-7_7}, 554 url = {http://dx.doi.org/10.1007/978-3-319-08506-7_7},
555 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/foward_secure_encryption.pdf}, 555 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/foward_secure_encryption.pdf},
556 www_section = unsorted, 556 www_section = unsorted,
557 author = {Lueks, Wouter and Hoepman, Jaap-Henk and Kursawe, Klaus}, 557 author = {Lueks, Wouter and Hoepman, Jaap-Henk and Kursawe, Klaus},
558 editor = {De Cristofaro, Emiliano and Murdoch, StevenJ} 558 editor = {De Cristofaro, Emiliano and Murdoch, StevenJ}
@@ -569,7 +569,7 @@ TCP Stealth replaces the traditional random TCP SQN number with a token that aut
569 569
570This thesis also describes Knock, a free software implementation of TCP Stealth for the Linux kernel and {\tt libknockify}, a shared library that wraps network system calls to activate Knock on GNU/Linux systems, allowing administrators to deploy Knock without recompilation. Finally, we present experimental results demonstrating that TCP Stealth is compatible with most existing middleboxes on the Internet}, 570This thesis also describes Knock, a free software implementation of TCP Stealth for the Linux kernel and {\tt libknockify}, a shared library that wraps network system calls to activate Knock on GNU/Linux systems, allowing administrators to deploy Knock without recompilation. Finally, we present experimental results demonstrating that TCP Stealth is compatible with most existing middleboxes on the Internet},
571 www_section = {GNUnet, Hacienda, Knock, TCP Stealth}, 571 www_section = {GNUnet, Hacienda, Knock, TCP Stealth},
572 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ma_kirsch_2014_0.pdf}, 572 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ma_kirsch_2014_0.pdf},
573 www_section = unsorted, 573 www_section = unsorted,
574 url = {https://bibliography.gnunet.org}, 574 url = {https://bibliography.gnunet.org},
575 author = {Julian Kirsch} 575 author = {Julian Kirsch}
@@ -583,7 +583,7 @@ This thesis also describes Knock, a free software implementation of TCP Stealth
583 organization = {W3C/IAB}, 583 organization = {W3C/IAB},
584 address = {London, UK}, 584 address = {London, UK},
585 www_section = {GNU Name System, GNUnet, KBR, PKI}, 585 www_section = {GNU Name System, GNUnet, KBR, PKI},
586 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/strint2014.pdf}, 586 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/strint2014.pdf},
587 www_section = unsorted, 587 www_section = unsorted,
588 url = {https://bibliography.gnunet.org}, 588 url = {https://bibliography.gnunet.org},
589 author = {Christian Grothoff and Polot, Bartlomiej and Carlo von Loesch} 589 author = {Christian Grothoff and Polot, Bartlomiej and Carlo von Loesch}
@@ -608,7 +608,7 @@ This thesis explores the feasibility of using machine learning to improve the qu
608 608
609The design is evaluated with the help of simulation and a realistic implementation in the GNUnet Peer-to-Peer framework. Our experimental results highlight some of the implications of the multitude of implementation choices, key challenges, and possible directions for the use of reinforcement learning in this domain}, 609The design is evaluated with the help of simulation and a realistic implementation in the GNUnet Peer-to-Peer framework. Our experimental results highlight some of the implications of the multitude of implementation choices, key challenges, and possible directions for the use of reinforcement learning in this domain},
610 www_section = {bandwidth allocation, GNUnet, machine learning}, 610 www_section = {bandwidth allocation, GNUnet, machine learning},
611 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/oehlmann2014machinelearning.pdf}, 611 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/oehlmann2014machinelearning.pdf},
612 www_section = unsorted, 612 www_section = unsorted,
613 url = {https://bibliography.gnunet.org}, 613 url = {https://bibliography.gnunet.org},
614 author = {Fabian Oehlmann} 614 author = {Fabian Oehlmann}
@@ -627,7 +627,7 @@ The design is evaluated with the help of simulation and a realistic implementati
627In this thesis, one such algorithm, proposed by Dreier and Kerschbaum, is discussed, implemented, and evaluated with respect to numerical stability and scalability. Results 627In this thesis, one such algorithm, proposed by Dreier and Kerschbaum, is discussed, implemented, and evaluated with respect to numerical stability and scalability. Results
628obtained with different parameter sets and different test cases are presented and some problems are exposed. It was found that the algorithm has some unforeseen limitations, particularly when implemented within the bounds of normal primitive data types. Random numbers generated during the protocol have to be extremely small so as to not cause problems with overflows after a series of multiplications. The number of peers participating additionally limits the size of numbers. A positive finding was that results produced when none of the aforementioned problems occur are generally quite accurate. We discuss a few possibilities to overcome some of the problems with an implementation using arbitrary precision numbers}, 628obtained with different parameter sets and different test cases are presented and some problems are exposed. It was found that the algorithm has some unforeseen limitations, particularly when implemented within the bounds of normal primitive data types. Random numbers generated during the protocol have to be extremely small so as to not cause problems with overflows after a series of multiplications. The number of peers participating additionally limits the size of numbers. A positive finding was that results produced when none of the aforementioned problems occur are generally quite accurate. We discuss a few possibilities to overcome some of the problems with an implementation using arbitrary precision numbers},
629 www_section = {GNUnet, linear programming, secure multi-party computation}, 629 www_section = {GNUnet, linear programming, secure multi-party computation},
630 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/arias2014bs.pdf}, 630 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/arias2014bs.pdf},
631 www_section = unsorted, 631 www_section = unsorted,
632 url = {https://bibliography.gnunet.org}, 632 url = {https://bibliography.gnunet.org},
633 author = {Raphael Arias} 633 author = {Raphael Arias}
@@ -655,7 +655,7 @@ In this paper we explore the implications of differential privacy when the indis
655 isbn = {978-3-642-39076-0}, 655 isbn = {978-3-642-39076-0},
656 doi = {10.1007/978-3-642-39077-7_5}, 656 doi = {10.1007/978-3-642-39077-7_5},
657 url = {http://dx.doi.org/10.1007/978-3-642-39077-7_5}, 657 url = {http://dx.doi.org/10.1007/978-3-642-39077-7_5},
658 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Brodening2013Chatzikokolakis.pdf}, 658 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Brodening2013Chatzikokolakis.pdf},
659 www_section = unsorted, 659 www_section = unsorted,
660 author = {Chatzikokolakis, Konstantinos and Andr{\'e}s, MiguelE. and Bordenabe, Nicol{\'a}sEmilio and Palamidessi, Catuscia}, 660 author = {Chatzikokolakis, Konstantinos and Andr{\'e}s, MiguelE. and Bordenabe, Nicol{\'a}sEmilio and Palamidessi, Catuscia},
661 editor = {De Cristofaro, Emiliano and Wright, Matthew} 661 editor = {De Cristofaro, Emiliano and Wright, Matthew}
@@ -670,7 +670,7 @@ In this paper we explore the implications of differential privacy when the indis
670 address = {Amsterdam}, 670 address = {Amsterdam},
671 abstract = {This work presents the design of a social messaging service for the GNUnet peer-to-peer framework that offers scalability, extensibility, and end-to-end encrypted communication. The scalability property is achieved through multicast message delivery, while extensibility is made possible by using PSYC (Protocol for SYnchronous Communication), which provides an extensible RPC (Remote Procedure Call) syntax that can evolve over time without having to upgrade the software on all nodes in the network. Another key feature provided by the PSYC layer are stateful multicast channels, which are used to store e.g. user profiles. End-to-end encrypted communication is provided by the mesh service of GNUnet, upon which the multicast channels are built. Pseudonymous users and social places in the system have cryptographical identities --- identified by their public key --- these are mapped to human memorable names using GNS (GNU Name System), where each pseudonym has a zone pointing to its places}, 671 abstract = {This work presents the design of a social messaging service for the GNUnet peer-to-peer framework that offers scalability, extensibility, and end-to-end encrypted communication. The scalability property is achieved through multicast message delivery, while extensibility is made possible by using PSYC (Protocol for SYnchronous Communication), which provides an extensible RPC (Remote Procedure Call) syntax that can evolve over time without having to upgrade the software on all nodes in the network. Another key feature provided by the PSYC layer are stateful multicast channels, which are used to store e.g. user profiles. End-to-end encrypted communication is provided by the mesh service of GNUnet, upon which the multicast channels are built. Pseudonymous users and social places in the system have cryptographical identities --- identified by their public key --- these are mapped to human memorable names using GNS (GNU Name System), where each pseudonym has a zone pointing to its places},
672 www_section = {GNS, GNUnet, PSYC, social networks}, 672 www_section = {GNS, GNUnet, PSYC, social networks},
673 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/gnunet-psyc.pdf}, 673 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/gnunet-psyc.pdf},
674 www_section = unsorted, 674 www_section = unsorted,
675 url = {https://bibliography.gnunet.org}, 675 url = {https://bibliography.gnunet.org},
676 author = {Gabor X Toth} 676 author = {Gabor X Toth}
@@ -687,7 +687,7 @@ In this paper we explore the implications of differential privacy when the indis
687 687
688This paper maps the design space and gives design requirements for censorship resistant name systems. We survey the existing range of ideas for the realization of such a system and discuss the challenges these systems have to overcome in practice. Finally, we present the results from a survey on browser usage, which supports the idea that delegation should be a key ingredient in any censorship resistant name system}, 688This paper maps the design space and gives design requirements for censorship resistant name systems. We survey the existing range of ideas for the realization of such a system and discuss the challenges these systems have to overcome in practice. Finally, we present the results from a survey on browser usage, which supports the idea that delegation should be a key ingredient in any censorship resistant name system},
689 www_section = {DNS, GNS, GNU Name System, GNUnet, PKI, SDSI, Zooko's Triangle}, 689 www_section = {DNS, GNS, GNU Name System, GNUnet, PKI, SDSI, Zooko's Triangle},
690 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fps2013wachs.pdf}, 690 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fps2013wachs.pdf},
691 www_section = unsorted, 691 www_section = unsorted,
692 url = {https://bibliography.gnunet.org}, 692 url = {https://bibliography.gnunet.org},
693 author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff} 693 author = {Matthias Wachs and Martin Schanzenbach and Christian Grothoff}
@@ -718,7 +718,7 @@ To address the varying needs of an experimenter and the range of available hardw
718 718
719We specifically target HPC systems like compute clusters and supercomputers and demonstrate how such systems can be used for large scale emulations by evaluating two P2P applications with deployment sizes up to 90k peers on a supercomputer}, 719We specifically target HPC systems like compute clusters and supercomputers and demonstrate how such systems can be used for large scale emulations by evaluating two P2P applications with deployment sizes up to 90k peers on a supercomputer},
720 www_section = {emulation, GNUnet, large scale testing, protocol evaluation, testbed}, 720 www_section = {emulation, GNUnet, large scale testing, protocol evaluation, testbed},
721 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/thesis_lowres.pdf , https://gnunet.org/git/bibliography.git/plain/docs/thesis.pdf}, 721 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/thesis_lowres.pdf , https://git.gnunet.org/bibliography.git/plain/docs/thesis.pdf},
722 www_section = unsorted, 722 www_section = unsorted,
723 url = {https://bibliography.gnunet.org}, 723 url = {https://bibliography.gnunet.org},
724 author = {Totakura, Sree Harsha} 724 author = {Totakura, Sree Harsha}
@@ -736,7 +736,7 @@ We specifically target HPC systems like compute clusters and supercomputers and
736 736
737In this paper we describe the problems that occur when debugging widely distributed systems and how Monkey handles them. First, we describe our Motivation for develop- ing the Monkey system. Afterwards we present the most common existing automatic crash handlers and how they work. Thirdly you will get an overview of the Monkey system and its components. In the fourth chapter we will analyze one report gener- ated by Monkey, evaluate an online experiment we conducted and present some of our finding during the development of the clustering algorithm used to categorize crash reports. Last, we discuss some of Monkeys features and compare them to the existing approaches. Also some ideas for the future development of the Monkey system are presented before we conclude that Monkey's approach is promising, but some work is still left to establish Monkey in the open source community}, 737In this paper we describe the problems that occur when debugging widely distributed systems and how Monkey handles them. First, we describe our Motivation for develop- ing the Monkey system. Afterwards we present the most common existing automatic crash handlers and how they work. Thirdly you will get an overview of the Monkey system and its components. In the fourth chapter we will analyze one report gener- ated by Monkey, evaluate an online experiment we conducted and present some of our finding during the development of the clustering algorithm used to categorize crash reports. Last, we discuss some of Monkeys features and compare them to the existing approaches. Also some ideas for the future development of the Monkey system are presented before we conclude that Monkey's approach is promising, but some work is still left to establish Monkey in the open source community},
738 www_section = {automatic, clustering, debugging, GDB, GNUnet, report, Tor}, 738 www_section = {automatic, clustering, debugging, GDB, GNUnet, report, Tor},
739 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/main_0.pdf}, 739 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/main_0.pdf},
740 www_section = unsorted, 740 www_section = unsorted,
741 url = {https://bibliography.gnunet.org}, 741 url = {https://bibliography.gnunet.org},
742 author = {Markus Teich} 742 author = {Markus Teich}
@@ -753,7 +753,7 @@ In this paper we describe the problems that occur when debugging widely distribu
753 isbn = {978-1-4503-1890-7}, 753 isbn = {978-1-4503-1890-7},
754 doi = {10.1145/2435349.2435372}, 754 doi = {10.1145/2435349.2435372},
755 url = {http://doi.acm.org.eaccess.ub.tum.de/10.1145/2435349.2435372}, 755 url = {http://doi.acm.org.eaccess.ub.tum.de/10.1145/2435349.2435372},
756 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p169-al-ameen.pdf}, 756 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p169-al-ameen.pdf},
757 author = {Al-Ameen, Mahdi N. and Matthew Wright} 757 author = {Al-Ameen, Mahdi N. and Matthew Wright}
758} 758}
759@book {sep-privacy, 759@book {sep-privacy,
@@ -773,7 +773,7 @@ In this paper we describe the problems that occur when debugging widely distribu
773 abstract = {Although the Public Key Infrastructure (PKI) using X.509 is meant to prevent the occurrence of man-in-the-middle attacks on TLS, there are still situations in which such attacks are possible due to the large number of Certification Authorities (CA) that has to be trusted. Recent incidents involving CA compromises, which lead to issuance of rogue certificates indicate the weakness of the PKI model. Recently various public key pinning protocols -- such as DANE or TACK -- have been proposed to thwart man-in-the-middle attacks on TLS connections. It will take a longer time, however, until any of these protocols reach wide deployment. We present an approach intended as an interim solution to bridge this gap and provide protection for connections to servers not yet using a pinning protocol. The presented method is based on public key pinning with a trust on first use model, and can be combined with existing notary approaches as well}, 773 abstract = {Although the Public Key Infrastructure (PKI) using X.509 is meant to prevent the occurrence of man-in-the-middle attacks on TLS, there are still situations in which such attacks are possible due to the large number of Certification Authorities (CA) that has to be trusted. Recent incidents involving CA compromises, which lead to issuance of rogue certificates indicate the weakness of the PKI model. Recently various public key pinning protocols -- such as DANE or TACK -- have been proposed to thwart man-in-the-middle attacks on TLS connections. It will take a longer time, however, until any of these protocols reach wide deployment. We present an approach intended as an interim solution to bridge this gap and provide protection for connections to servers not yet using a pinning protocol. The presented method is based on public key pinning with a trust on first use model, and can be combined with existing notary approaches as well},
774 www_section = {certificate, pinning, PKI, public key pinning, TLS, TOFU, trust on first use, X.509}, 774 www_section = {certificate, pinning, PKI, public key pinning, TLS, TOFU, trust on first use, X.509},
775 journal = {unknown}, 775 journal = {unknown},
776 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/tofu-pinning.pdf}, 776 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/tofu-pinning.pdf},
777 www_section = unsorted, 777 www_section = unsorted,
778 url = {https://bibliography.gnunet.org}, 778 url = {https://bibliography.gnunet.org},
779 author = {Gabor X Toth}, 779 author = {Gabor X Toth},
@@ -796,7 +796,7 @@ Furthermore, we focus on the SPDY server push feature which allows servers to se
796 796
797This thesis includes extensive measurement data highlighting the possible benefits of using SPDY instead of HTTP and HTTPS (1.0 or 1.1), especially with respect to networks experiencing latency or loss. Moreover, the real profit from using SPDY within the Tor network on loading some of the most popular web sites is presented. Finally, evaluations of the proposed push prediction algorithm are given for emphasizing the possible gain of employing it at SPDY reverse and forward proxies}, 797This thesis includes extensive measurement data highlighting the possible benefits of using SPDY instead of HTTP and HTTPS (1.0 or 1.1), especially with respect to networks experiencing latency or loss. Moreover, the real profit from using SPDY within the Tor network on loading some of the most popular web sites is presented. Finally, evaluations of the proposed push prediction algorithm are given for emphasizing the possible gain of employing it at SPDY reverse and forward proxies},
798 www_section = {anonymity, HTTP, privacy, spdy, Tor}, 798 www_section = {anonymity, HTTP, privacy, spdy, Tor},
799 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/uzunov2013torspdy.pdf}, 799 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/uzunov2013torspdy.pdf},
800 www_section = unsorted, 800 www_section = unsorted,
801 url = {https://bibliography.gnunet.org}, 801 url = {https://bibliography.gnunet.org},
802 author = {Andrey Uzunov} 802 author = {Andrey Uzunov}
@@ -821,7 +821,7 @@ This thesis includes extensive measurement data highlighting the possible benefi
821 year = {2013}, 821 year = {2013},
822 www_section = {anonymity network, arbitrary hidden services, command and control channels, data privacy, deanonymize hidden services, DuckDuckGo search engine, hidden services, Internet, Internet service privacy, privacy, search engines, Silk Road, Tor, Tor hidden services, volunteer based anonymity network, volunteer operated relays}, 822 www_section = {anonymity network, arbitrary hidden services, command and control channels, data privacy, deanonymize hidden services, DuckDuckGo search engine, hidden services, Internet, Internet service privacy, privacy, search engines, Silk Road, Tor, Tor hidden services, volunteer based anonymity network, volunteer operated relays},
823 doi = {10.1109/SP.2013.15}, 823 doi = {10.1109/SP.2013.15},
824 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Trawling_for_tor_HS.pdf}, 824 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Trawling_for_tor_HS.pdf},
825 www_section = unsorted, 825 www_section = unsorted,
826 url = {https://bibliography.gnunet.org}, 826 url = {https://bibliography.gnunet.org},
827 author = {Biryukov, A. and Pustogarov, I. and Weinmann, R.} 827 author = {Biryukov, A. and Pustogarov, I. and Weinmann, R.}
@@ -833,7 +833,7 @@ This thesis includes extensive measurement data highlighting the possible benefi
833 publisher = {IEEE}, 833 publisher = {IEEE},
834 organization = {IEEE}, 834 organization = {IEEE},
835 abstract = {We present WHATSUP, a collaborative filtering system for disseminating news items in a large-scale dynamic setting with no central authority. WHATSUP constructs an implicit social network based on user profiles that express the opinions of users about the news items they receive (like-dislike). Users with similar tastes are clustered using a similarity metric reflecting long-standing and emerging (dis)interests. News items are disseminated through a novel heterogeneous gossip protocol that (1) biases the orientation of its targets towards those with similar interests, and (2) amplifies dissemination based on the level of interest in every news item. We report on an extensive evaluation of WHATSUP through (a) simulations, (b) a ModelNet emulation on a cluster, and (c) a PlanetLab deployment based on real datasets. We show that WHATSUP outperforms various alternatives in terms of accurate and complete delivery of relevant news items while preserving the fundamental advantages of standard gossip: namely, simplicity of deployment and robustness}, 835 abstract = {We present WHATSUP, a collaborative filtering system for disseminating news items in a large-scale dynamic setting with no central authority. WHATSUP constructs an implicit social network based on user profiles that express the opinions of users about the news items they receive (like-dislike). Users with similar tastes are clustered using a similarity metric reflecting long-standing and emerging (dis)interests. News items are disseminated through a novel heterogeneous gossip protocol that (1) biases the orientation of its targets towards those with similar interests, and (2) amplifies dissemination based on the level of interest in every news item. We report on an extensive evaluation of WHATSUP through (a) simulations, (b) a ModelNet emulation on a cluster, and (c) a PlanetLab deployment based on real datasets. We show that WHATSUP outperforms various alternatives in terms of accurate and complete delivery of relevant news items while preserving the fundamental advantages of standard gossip: namely, simplicity of deployment and robustness},
836 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/whatsup.pdf}, 836 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/whatsup.pdf},
837 www_section = unsorted, 837 www_section = unsorted,
838 url = {https://bibliography.gnunet.org}, 838 url = {https://bibliography.gnunet.org},
839 author = {Antoine Boutet and Davide Frey and Rachid Guerraoui and Arnaud Jegou and Anne-Marie Kermarrec} 839 author = {Antoine Boutet and Davide Frey and Rachid Guerraoui and Arnaud Jegou and Anne-Marie Kermarrec}
@@ -851,7 +851,7 @@ This thesis includes extensive measurement data highlighting the possible benefi
851 issn = {0146-4833}, 851 issn = {0146-4833},
852 doi = {10.1145/2377677.2377699}, 852 doi = {10.1145/2377677.2377699},
853 url = {http://doi.acm.org/10.1145/2377677.2377699}, 853 url = {http://doi.acm.org/10.1145/2377677.2377699},
854 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/autonetkit-small.pdf}, 854 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/autonetkit-small.pdf},
855 author = {Knight, Simon and Jaboldinov, Askar and Maennel, Olaf and Phillips, Iain and Roughan, Matthew} 855 author = {Knight, Simon and Jaboldinov, Askar and Maennel, Olaf and Phillips, Iain and Roughan, Matthew}
856} 856}
857@book {2012_0, 857@book {2012_0,
@@ -867,7 +867,7 @@ This thesis includes extensive measurement data highlighting the possible benefi
867 isbn = {978-3-642-33535-8}, 867 isbn = {978-3-642-33535-8},
868 doi = {10.1007/978-3-642-33536-5_20}, 868 doi = {10.1007/978-3-642-33536-5_20},
869 url = {http://dx.doi.org/10.1007/978-3-642-33536-5_20}, 869 url = {http://dx.doi.org/10.1007/978-3-642-33536-5_20},
870 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/BLIP2012Alaggan.pdf}, 870 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/BLIP2012Alaggan.pdf},
871 www_section = unsorted, 871 www_section = unsorted,
872 author = {Alaggan, Mohammad and Gambs, S{\'e}bastien and Kermarrec, Anne-Marie}, 872 author = {Alaggan, Mohammad and Gambs, S{\'e}bastien and Kermarrec, Anne-Marie},
873 editor = {Richa, Andr{\'e}aW. and Scheideler, Christian} 873 editor = {Richa, Andr{\'e}aW. and Scheideler, Christian}
@@ -880,7 +880,7 @@ This thesis includes extensive measurement data highlighting the possible benefi
880 address = {Bonaire}, 880 address = {Bonaire},
881 abstract = {Tor, an anonymity network formed by volunteer nodes, uses the estimated bandwidth of the nodes as a central feature of its path selection algorithm. The current load on nodes is not considered in this algorithm, however, and we observe that some nodes persist in being under-utilized or congested. This can degrade the network's performance, discourage Tor adoption, and consequently reduce the size of Tor's anonymity set. In an effort to reduce congestion and improve load balancing, we propose a congestion-aware path selection algorithm. Using latency as an indicator of congestion, clients use opportunistic and lightweight active measurements to evaluate the congestion state of nodes, and reject nodes that appear congested. Through experiments conducted on the live Tor network, we verify our hypothesis that clients can infer congestion using latency and show that congestion-aware path selection can improve performance}, 881 abstract = {Tor, an anonymity network formed by volunteer nodes, uses the estimated bandwidth of the nodes as a central feature of its path selection algorithm. The current load on nodes is not considered in this algorithm, however, and we observe that some nodes persist in being under-utilized or congested. This can degrade the network's performance, discourage Tor adoption, and consequently reduce the size of Tor's anonymity set. In an effort to reduce congestion and improve load balancing, we propose a congestion-aware path selection algorithm. Using latency as an indicator of congestion, clients use opportunistic and lightweight active measurements to evaluate the congestion state of nodes, and reject nodes that appear congested. Through experiments conducted on the live Tor network, we verify our hypothesis that clients can infer congestion using latency and show that congestion-aware path selection can improve performance},
882 www_section = {algorithms, Tor, volunteer nodes}, 882 www_section = {algorithms, Tor, volunteer nodes},
883 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/FC\%2712\%20-\%20Congestion-aware\%20Path\%20Selection\%20for\%20Tor.pdf}, 883 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/FC\%2712\%20-\%20Congestion-aware\%20Path\%20Selection\%20for\%20Tor.pdf},
884 url = {https://bibliography.gnunet.org}, 884 url = {https://bibliography.gnunet.org},
885 author = {Tao Wang and Kevin Bauer and Clara Forero and Ian Goldberg} 885 author = {Tao Wang and Kevin Bauer and Clara Forero and Ian Goldberg}
886} 886}
@@ -895,7 +895,7 @@ This thesis includes extensive measurement data highlighting the possible benefi
895 isbn = {978-1-4503-1628-6}, 895 isbn = {978-1-4503-1628-6},
896 doi = {10.1145/2387238.2387253}, 896 doi = {10.1145/2387238.2387253},
897 url = {http://doi.acm.org/10.1145/2387238.2387253}, 897 url = {http://doi.acm.org/10.1145/2387238.2387253},
898 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/crisp-mswim.pdf}, 898 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/crisp-mswim.pdf},
899 author = {Sadiq, Umair and Kumar, Mohan and Wright, Matthew} 899 author = {Sadiq, Umair and Kumar, Mohan and Wright, Matthew}
900} 900}
901@article {DBLP:journals/corr/abs-1202-4503, 901@article {DBLP:journals/corr/abs-1202-4503,
@@ -907,7 +907,7 @@ This thesis includes extensive measurement data highlighting the possible benefi
907 abstract = {While the Internet was conceived as a decentralized network, the most widely used web applications today tend toward centralization. Control increasingly rests with centralized service providers who, as a consequence, have also amassed unprecedented amounts of data about the behaviors and personalities of individuals. Developers, regulators, and consumer advocates have looked to alternative decentralized architectures as the natural response to threats posed by these centralized services. The result has been a great variety of solutions that include personal data stores (PDS), infomediaries, Vendor Relationship Management (VRM) systems, and federated and distributed social networks. And yet, for all these efforts, decentralized personal data architectures have seen little adoption. This position paper attempts to account for these failures, challenging the accepted wisdom in the web community on the feasibility and desirability of these approaches. We start with a historical discussion of the development of various categories of decentralized personal data architectures. Then we survey the main ideas to illustrate the common themes among these efforts. We tease apart the design characteristics of these systems from the social values that they (are intended to) promote. We use this understanding to point out numerous drawbacks of the decentralization paradigm, some inherent and others incidental. We end with recommendations for designers of these systems for working towards goals that are achievable, but perhaps more limited in scope and ambition}, 907 abstract = {While the Internet was conceived as a decentralized network, the most widely used web applications today tend toward centralization. Control increasingly rests with centralized service providers who, as a consequence, have also amassed unprecedented amounts of data about the behaviors and personalities of individuals. Developers, regulators, and consumer advocates have looked to alternative decentralized architectures as the natural response to threats posed by these centralized services. The result has been a great variety of solutions that include personal data stores (PDS), infomediaries, Vendor Relationship Management (VRM) systems, and federated and distributed social networks. And yet, for all these efforts, decentralized personal data architectures have seen little adoption. This position paper attempts to account for these failures, challenging the accepted wisdom in the web community on the feasibility and desirability of these approaches. We start with a historical discussion of the development of various categories of decentralized personal data architectures. Then we survey the main ideas to illustrate the common themes among these efforts. We tease apart the design characteristics of these systems from the social values that they (are intended to) promote. We use this understanding to point out numerous drawbacks of the decentralization paradigm, some inherent and others incidental. We end with recommendations for designers of these systems for working towards goals that are achievable, but perhaps more limited in scope and ambition},
908 www_section = {distributed social networks, economics, personal data stores, policy, privacy, web}, 908 www_section = {distributed social networks, economics, personal data stores, policy, privacy, web},
909 url = {https://bibliography.gnunet.org}, 909 url = {https://bibliography.gnunet.org},
910 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CoRR\%20-\%20Critical\%20look\%20at\%20decentralization.pdf}, 910 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CoRR\%20-\%20Critical\%20look\%20at\%20decentralization.pdf},
911 author = {Arvind Narayanan and Vincent Toubiana and Solon Barocas and Helen Nissenbaum and Dan Boneh} 911 author = {Arvind Narayanan and Vincent Toubiana and Solon Barocas and Helen Nissenbaum and Dan Boneh}
912} 912}
913@mastersthesis {2012_2, 913@mastersthesis {2012_2,
@@ -921,7 +921,7 @@ This thesis includes extensive measurement data highlighting the possible benefi
921 address = {Garching bei M{\"u}nchen}, 921 address = {Garching bei M{\"u}nchen},
922 abstract = {This thesis presents a novel approach for decentralized evaluation of regular expressions for capability discovery in DHT-based overlays. The system provides support for announcing capabilities expressed as regular expressions and discovering participants offering adequate capabilities. The idea behind our approach is to convert regular expressions into finite automatons and store the corresponding states and transitions in a DHT. We show how locally constructed DFA are merged in the DHT into an NFA without the knowledge of any NFA already present in the DHT and without the need for any central authority. Furthermore we present options of optimizing the DFA. There exist several possible applications for this general approach of decentralized regular expression evaluation. However, in this thesis we focus on the application of discovering users that are willing to provide network access using a specified protocol to a particular destination. We have implemented the system for our proposed approach and conducted a simulation. Moreover we present the results of an emulation of the implemented system in a cluster}, 922 abstract = {This thesis presents a novel approach for decentralized evaluation of regular expressions for capability discovery in DHT-based overlays. The system provides support for announcing capabilities expressed as regular expressions and discovering participants offering adequate capabilities. The idea behind our approach is to convert regular expressions into finite automatons and store the corresponding states and transitions in a DHT. We show how locally constructed DFA are merged in the DHT into an NFA without the knowledge of any NFA already present in the DHT and without the need for any central authority. Furthermore we present options of optimizing the DFA. There exist several possible applications for this general approach of decentralized regular expression evaluation. However, in this thesis we focus on the application of discovering users that are willing to provide network access using a specified protocol to a particular destination. We have implemented the system for our proposed approach and conducted a simulation. Moreover we present the results of an emulation of the implemented system in a cluster},
923 www_section = {DFA, distributed hash table, GNUnet, NFA, regular expressions, search}, 923 www_section = {DFA, distributed hash table, GNUnet, NFA, regular expressions, search},
924 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/szengel2012ms.pdf}, 924 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/szengel2012ms.pdf},
925 url = {https://bibliography.gnunet.org}, 925 url = {https://bibliography.gnunet.org},
926 author = {Maximilian Szengel} 926 author = {Maximilian Szengel}
927} 927}
@@ -936,7 +936,7 @@ This thesis includes extensive measurement data highlighting the possible benefi
936 address = {Garching bei M{\"u}nchen}, 936 address = {Garching bei M{\"u}nchen},
937 abstract = {This thesis presents the design and implementation of the GNU Alternative Domain System (GADS), a decentralized, secure name system providing memorable names for the Internet as an alternative to the Domain Name System (DNS). The system builds on ideas from Rivest's Simple Distributed Security Infrastructure (SDSI) to address a central issue with providing a decentralized mapping of secure identifiers to memorable names: providing a global, secure and memorable mapping is impossible without a trusted authority. SDSI offers an alternative by linking local name spaces; GADS uses the transitivity provided by the SDSI design to build a decentralized and censorship resistant name system without a trusted root based on secure delegation of authority. Additional details need to be considered in order to enable GADS to integrate smoothly with the World Wide Web. While following links on the Web matches following delegations in GADS, the existing HTTP-based infrastructure makes many assumptions about globally unique names; however, proxies can be used to enable legacy applications to function with GADS. This work presents the fundamental goals and ideas behind GADS, provides technical details on how GADS has been implemented and discusses deployment issues for using GADS with existing systems. We discuss how GADS and legacy DNS can interoperate during a transition period and what additional security advantages GADS offers over DNS with Security Extensions (DNSSEC). Finally, we present the results of a survey into surfing behavior, which suggests that the manual introduction of new direct links in GADS will be infrequent}, 937 abstract = {This thesis presents the design and implementation of the GNU Alternative Domain System (GADS), a decentralized, secure name system providing memorable names for the Internet as an alternative to the Domain Name System (DNS). The system builds on ideas from Rivest's Simple Distributed Security Infrastructure (SDSI) to address a central issue with providing a decentralized mapping of secure identifiers to memorable names: providing a global, secure and memorable mapping is impossible without a trusted authority. SDSI offers an alternative by linking local name spaces; GADS uses the transitivity provided by the SDSI design to build a decentralized and censorship resistant name system without a trusted root based on secure delegation of authority. Additional details need to be considered in order to enable GADS to integrate smoothly with the World Wide Web. While following links on the Web matches following delegations in GADS, the existing HTTP-based infrastructure makes many assumptions about globally unique names; however, proxies can be used to enable legacy applications to function with GADS. This work presents the fundamental goals and ideas behind GADS, provides technical details on how GADS has been implemented and discusses deployment issues for using GADS with existing systems. We discuss how GADS and legacy DNS can interoperate during a transition period and what additional security advantages GADS offers over DNS with Security Extensions (DNSSEC). Finally, we present the results of a survey into surfing behavior, which suggests that the manual introduction of new direct links in GADS will be infrequent},
938 www_section = {censorship resistance, decentralized, DNS, GNU Name System, GNUnet}, 938 www_section = {censorship resistance, decentralized, DNS, GNU Name System, GNUnet},
939 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/schanzen2012msc.pdf}, 939 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/schanzen2012msc.pdf},
940 url = {https://bibliography.gnunet.org}, 940 url = {https://bibliography.gnunet.org},
941 author = {Martin Schanzenbach} 941 author = {Martin Schanzenbach}
942} 942}
@@ -955,7 +955,7 @@ Interestingly, the design of our mechanism is quite different from the tradition
955 isbn = {978-3-642-32008-8}, 955 isbn = {978-3-642-32008-8},
956 doi = {10.1007/978-3-642-32009-5_29}, 956 doi = {10.1007/978-3-642-32009-5_29},
957 url = {http://dx.doi.org/10.1007/978-3-642-32009-5_29}, 957 url = {http://dx.doi.org/10.1007/978-3-642-32009-5_29},
958 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DPwithImperfectRandomness2012Dodis.pdf}, 958 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DPwithImperfectRandomness2012Dodis.pdf},
959 www_section = unsorted, 959 www_section = unsorted,
960 author = {Dodis, Yevgeniy and L{\'o}pez-Alt, Adriana and Mironov, Ilya and Vadhan, Salil}, 960 author = {Dodis, Yevgeniy and L{\'o}pez-Alt, Adriana and Mironov, Ilya and Vadhan, Salil},
961 editor = {Safavi-Naini, Reihaneh and Canetti, Ran} 961 editor = {Safavi-Naini, Reihaneh and Canetti, Ran}
@@ -982,7 +982,7 @@ experimental results that demonstrate the viability, efficiency and
982accuracy of the protocol}, 982accuracy of the protocol},
983 www_section = {GNUnet, network security, network size estimation, peer-to-peer networking}, 983 www_section = {GNUnet, network security, network size estimation, peer-to-peer networking},
984 journal = {unknown}, 984 journal = {unknown},
985 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/nse-techreport.pdf}, 985 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/nse-techreport.pdf},
986 url = {https://bibliography.gnunet.org}, 986 url = {https://bibliography.gnunet.org},
987 author = {Nathan S Evans and Polot, Bartlomiej and Christian Grothoff} 987 author = {Nathan S Evans and Polot, Bartlomiej and Christian Grothoff}
988} 988}
@@ -998,7 +998,7 @@ accuracy of the protocol},
998 abstract = {The size of a Peer-to-Peer (P2P) network is an important parameter for performance tuning of P2P routing algorithms. This paper introduces and evaluates a new efficient method for participants in an unstructured P2P network to establish the size of the overall network. The presented method is highly efficient, propagating information about the current size of the network to all participants using O(|E|) operations where |E| is the number of edges in the network. Afterwards, all nodes have the same network size estimate, which can be made arbitrarily accurate by averaging results from multiple rounds of the protocol. Security measures are included which make it prohibitively expensive for a typical active participating adversary to significantly manipulate the estimates. This paper includes experimental results that demonstrate the viability, efficiency and accuracy of the protocol}, 998 abstract = {The size of a Peer-to-Peer (P2P) network is an important parameter for performance tuning of P2P routing algorithms. This paper introduces and evaluates a new efficient method for participants in an unstructured P2P network to establish the size of the overall network. The presented method is highly efficient, propagating information about the current size of the network to all participants using O(|E|) operations where |E| is the number of edges in the network. Afterwards, all nodes have the same network size estimate, which can be made arbitrarily accurate by averaging results from multiple rounds of the protocol. Security measures are included which make it prohibitively expensive for a typical active participating adversary to significantly manipulate the estimates. This paper includes experimental results that demonstrate the viability, efficiency and accuracy of the protocol},
999 www_section = {byzantine fault tolerance, GNUnet, network size estimation, proof of work}, 999 www_section = {byzantine fault tolerance, GNUnet, network size estimation, proof of work},
1000 url = {http://grothoff.org/christian/rrsize2012.pdf}, 1000 url = {http://grothoff.org/christian/rrsize2012.pdf},
1001 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/paper-ifip.pdf}, 1001 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/paper-ifip.pdf},
1002 author = {Nathan S Evans and Polot, Bartlomiej and Christian Grothoff} 1002 author = {Nathan S Evans and Polot, Bartlomiej and Christian Grothoff}
1003} 1003}
1004@conference {gossipico2012, 1004@conference {gossipico2012,
@@ -1011,7 +1011,7 @@ accuracy of the protocol},
1011 organization = {Springer Verlag}, 1011 organization = {Springer Verlag},
1012 address = {Prague, CZ}, 1012 address = {Prague, CZ},
1013 www_section = {network size estimation}, 1013 www_section = {network size estimation},
1014 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Gossipico.pdf}, 1014 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Gossipico.pdf},
1015 url = {https://bibliography.gnunet.org}, 1015 url = {https://bibliography.gnunet.org},
1016 author = {Ruud van de Bovenkamp and Fernando Kuipers and Piet Van Mieghem} 1016 author = {Ruud van de Bovenkamp and Fernando Kuipers and Piet Van Mieghem}
1017} 1017}
@@ -1021,7 +1021,7 @@ accuracy of the protocol},
1021 year = {2012}, 1021 year = {2012},
1022 pages = {287--304}, 1022 pages = {287--304},
1023 www_section = {emulab, emulation, testbed}, 1023 www_section = {emulab, emulation, testbed},
1024 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/how-to-build-a-better-testbed.pdf}, 1024 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/how-to-build-a-better-testbed.pdf},
1025 url = {https://bibliography.gnunet.org}, 1025 url = {https://bibliography.gnunet.org},
1026 author = {Fabien Hermenier and Robert Ricci} 1026 author = {Fabien Hermenier and Robert Ricci}
1027} 1027}
@@ -1034,7 +1034,7 @@ accuracy of the protocol},
1034 abstract = {With mobile phones becoming first-class citizens in the online world, the rich location data they bring to the table is set to revolutionize all aspects of online life including content delivery, recommendation systems, and advertising. However, user-tracking is a concern with such location-based services, not only because location data can be linked uniquely to individuals, but because the low-level nature of current location APIs and the resulting dependence on the cloud to synthesize useful representations virtually guarantees such tracking. 1034 abstract = {With mobile phones becoming first-class citizens in the online world, the rich location data they bring to the table is set to revolutionize all aspects of online life including content delivery, recommendation systems, and advertising. However, user-tracking is a concern with such location-based services, not only because location data can be linked uniquely to individuals, but because the low-level nature of current location APIs and the resulting dependence on the cloud to synthesize useful representations virtually guarantees such tracking.
1035In this paper, we propose privacy-preserving location-based matching as a fundamental platform primitive and as an alternative to exposing low-level, latitude-longitude (lat-long) coordinates to applications. Applications set rich location-based triggers and have these be fired based on location updates either from the local device or from a remote device (e.g., a friend's phone). Our Koi platform, comprising a privacy-preserving matching service in the cloud and a phone-based agent, realizes this primitive across multiple phone and browser platforms. By masking low-level lat-long information from applications, Koi not only avoids leaking privacy-sensitive information, it also eases the task of programmers by providing a higher-level abstraction that is easier for applications to build upon. Koi's privacy-preserving protocol prevents the cloud service from tracking users. We verify the non-tracking properties of Koi using a theorem prover, illustrate how privacy guarantees can easily be added to a wide range of location-based applications, and show that our public deployment is performant, being able to perform 12K matches per second on a single core}, 1035In this paper, we propose privacy-preserving location-based matching as a fundamental platform primitive and as an alternative to exposing low-level, latitude-longitude (lat-long) coordinates to applications. Applications set rich location-based triggers and have these be fired based on location updates either from the local device or from a remote device (e.g., a friend's phone). Our Koi platform, comprising a privacy-preserving matching service in the cloud and a phone-based agent, realizes this primitive across multiple phone and browser platforms. By masking low-level lat-long information from applications, Koi not only avoids leaking privacy-sensitive information, it also eases the task of programmers by providing a higher-level abstraction that is easier for applications to build upon. Koi's privacy-preserving protocol prevents the cloud service from tracking users. We verify the non-tracking properties of Koi using a theorem prover, illustrate how privacy guarantees can easily be added to a wide range of location-based applications, and show that our public deployment is performant, being able to perform 12K matches per second on a single core},
1036 www_section = {location privacy, matching}, 1036 www_section = {location privacy, matching},
1037 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/nsdi12-koi.pdf}, 1037 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/nsdi12-koi.pdf},
1038 url = {https://bibliography.gnunet.org}, 1038 url = {https://bibliography.gnunet.org},
1039 author = {Saikat Guha and Mudit Jain and Venkata Padmanabhan} 1039 author = {Saikat Guha and Mudit Jain and Venkata Padmanabhan}
1040} 1040}
@@ -1050,7 +1050,7 @@ In this paper, we propose privacy-preserving location-based matching as a fundam
1050such that users can choose between the level of anonymity and usability. We propose Lightweight Anonymity and Privacy (LAP), an efficient network-based solution featuring lightweight path establishment and stateless communication, by concealing an end-host's topological location to enhance anonymity against 1050such that users can choose between the level of anonymity and usability. We propose Lightweight Anonymity and Privacy (LAP), an efficient network-based solution featuring lightweight path establishment and stateless communication, by concealing an end-host's topological location to enhance anonymity against
1051remote tracking. To show practicality, we demonstrate that LAP can work on top of the current Internet and proposed future Internet architectures}, 1051remote tracking. To show practicality, we demonstrate that LAP can work on top of the current Internet and proposed future Internet architectures},
1052 www_section = {anonymous communication anonymity protection, LAP}, 1052 www_section = {anonymous communication anonymity protection, LAP},
1053 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/LAP\%3A\%20Lightweight\%20Anonymity\%20and\%20Privacy.pdf}, 1053 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/LAP\%3A\%20Lightweight\%20Anonymity\%20and\%20Privacy.pdf},
1054 url = {https://bibliography.gnunet.org}, 1054 url = {https://bibliography.gnunet.org},
1055 author = {Hsu-Chun Hsiao and Tiffany Hyun-Jin Kim and Adrian Perrig and Akira Yamada and Sam Nelson and Marco Gruteser and Wei Ming} 1055 author = {Hsu-Chun Hsiao and Tiffany Hyun-Jin Kim and Adrian Perrig and Akira Yamada and Sam Nelson and Marco Gruteser and Wei Ming}
1056} 1056}
@@ -1095,7 +1095,7 @@ comparison to the default Tor client, LASTor reduces median
1095latencies by 25\% while also reducing the false negative rate of 1095latencies by 25\% while also reducing the false negative rate of
1096not detecting a potential snooping AS from 57\% to 11\%}, 1096not detecting a potential snooping AS from 57\% to 11\%},
1097 www_section = {anonymous communication, as, autonomous system, Tor}, 1097 www_section = {anonymous communication, as, autonomous system, Tor},
1098 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/LASTor\%3A\%20A\%20Low-Latency\%20AS-Aware\%20Tor\%20Client.pdf}, 1098 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/LASTor\%3A\%20A\%20Low-Latency\%20AS-Aware\%20Tor\%20Client.pdf},
1099 url = {https://bibliography.gnunet.org}, 1099 url = {https://bibliography.gnunet.org},
1100 author = {Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha} 1100 author = {Masoud Akhoondi and Curtis Yu and Harsha V. Madhyastha}
1101} 1101}
@@ -1117,7 +1117,7 @@ We also simplify the lower bounds on noise for counting queries in [11] and also
1117 isbn = {978-3-642-28913-2}, 1117 isbn = {978-3-642-28913-2},
1118 doi = {10.1007/978-3-642-28914-9_18}, 1118 doi = {10.1007/978-3-642-28914-9_18},
1119 url = {http://dx.doi.org/10.1007/978-3-642-28914-9_18}, 1119 url = {http://dx.doi.org/10.1007/978-3-642-28914-9_18},
1120 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/LowerBoundsDP2012De.pdf}, 1120 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/LowerBoundsDP2012De.pdf},
1121 author = {De, Anindya}, 1121 author = {De, Anindya},
1122 editor = {Cramer, Ronald} 1122 editor = {Cramer, Ronald}
1123} 1123}
@@ -1128,7 +1128,7 @@ We also simplify the lower bounds on noise for counting queries in [11] and also
1128 pages = {1--19}, 1128 pages = {1--19},
1129 publisher = {Springer}, 1129 publisher = {Springer},
1130 www_section = {emulation, ModelNet, P2P emulation, traffic engineering}, 1130 www_section = {emulation, ModelNet, P2P emulation, traffic engineering},
1131 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/modelnet-si-ppna11.pdf}, 1131 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/modelnet-si-ppna11.pdf},
1132 url = {https://bibliography.gnunet.org}, 1132 url = {https://bibliography.gnunet.org},
1133 author = {Rossi, D. and Veglia, P. and Sammarco, M. and Larroca, F.} 1133 author = {Rossi, D. and Veglia, P. and Sammarco, M. and Larroca, F.}
1134} 1134}
@@ -1144,7 +1144,7 @@ We also simplify the lower bounds on noise for counting queries in [11] and also
1144 abstract = {Debugging is tedious and time consuming work that, for certain types of bugs, can and should be automated. Debugging distributed systems is more complex due to time dependencies between interacting processes. Another related problem is duplicate bug reports in bug repositories. Finding bug duplicates is hard and wastes developers' time which may affect the development team's rate of bug fixes and new releases. 1144 abstract = {Debugging is tedious and time consuming work that, for certain types of bugs, can and should be automated. Debugging distributed systems is more complex due to time dependencies between interacting processes. Another related problem is duplicate bug reports in bug repositories. Finding bug duplicates is hard and wastes developers' time which may affect the development team's rate of bug fixes and new releases.
1145In this master thesis we introduce Monkey, a new tool that provides a solution for automated classification, investigation and characterization of bugs, as well as a solution for comparing bug reports and avoiding duplicates. Our tool is particularly suitable for distributed systems due to its autonomy. We present Monkey's key design goals and architecture and give experimental results demonstrating the viability of our approach}, 1145In this master thesis we introduce Monkey, a new tool that provides a solution for automated classification, investigation and characterization of bugs, as well as a solution for comparing bug reports and avoiding duplicates. Our tool is particularly suitable for distributed systems due to its autonomy. We present Monkey's key design goals and architecture and give experimental results demonstrating the viability of our approach},
1146 www_section = {automation, debugging, distributed systems}, 1146 www_section = {automation, debugging, distributed systems},
1147 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/safey-thesis-monkey.pdf , https://gnunet.org/git/bibliography.git/plain/docs/safey-presentation-monkey.pdf}, 1147 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/safey-thesis-monkey.pdf , https://git.gnunet.org/bibliography.git/plain/docs/safey-presentation-monkey.pdf},
1148 url = {https://bibliography.gnunet.org}, 1148 url = {https://bibliography.gnunet.org},
1149 author = {Safey A. Halim} 1149 author = {Safey A. Halim}
1150} 1150}
@@ -1158,7 +1158,7 @@ for traversing NAT routers by exploiting their built-in FTP and IRC application-
1158significantly improves the success chance without requiring any user interaction at all. To demonstrate the framework, we show 1158significantly improves the success chance without requiring any user interaction at all. To demonstrate the framework, we show
1159a small test setup with laptop computers and home NAT routers}, 1159a small test setup with laptop computers and home NAT routers},
1160 www_section = {FTP-ALG, NAT}, 1160 www_section = {FTP-ALG, NAT},
1161 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WHW_12-NTALG.pdf}, 1161 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WHW_12-NTALG.pdf},
1162 url = {https://bibliography.gnunet.org}, 1162 url = {https://bibliography.gnunet.org},
1163 author = {Wander, M. and Holzapfel, S. and Wacker, A. and Weis, T.} 1163 author = {Wander, M. and Holzapfel, S. and Wacker, A. and Weis, T.}
1164} 1164}
@@ -1169,7 +1169,7 @@ a small test setup with laptop computers and home NAT routers},
1169 year = {2012}, 1169 year = {2012},
1170 www_section = {anonymity, distributed hash table}, 1170 www_section = {anonymity, distributed hash table},
1171 url = {http://dblp.uni-trier.de/db/journals/corr/corr1203.html$\#$abs-1203-2668}, 1171 url = {http://dblp.uni-trier.de/db/journals/corr/corr1203.html$\#$abs-1203-2668},
1172 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/octopus_dht.pdf}, 1172 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/octopus_dht.pdf},
1173 author = {Wang, Qiyan and Borisov, Nikita} 1173 author = {Wang, Qiyan and Borisov, Nikita}
1174} 1174}
1175@conference {oakland2012-peekaboo, 1175@conference {oakland2012-peekaboo,
@@ -1185,7 +1185,7 @@ include ones like those standardized by TLS, SSH, and IPsec, and even more compl
1185total upstream and downstream bandwidth to identify {\textemdash}with 98\% accuracy{\textemdash} which of two websites was visited. One implication of what we find is that, in the context of website identification, it is unlikely that bandwidth-efficient, general- 1185total upstream and downstream bandwidth to identify {\textemdash}with 98\% accuracy{\textemdash} which of two websites was visited. One implication of what we find is that, in the context of website identification, it is unlikely that bandwidth-efficient, general-
1186purpose TA countermeasures can ever provide the type of security targeted in prior work}, 1186purpose TA countermeasures can ever provide the type of security targeted in prior work},
1187 www_section = {encrypted traffic, machine learning, padding, privacy, traffic analysis countermeasures}, 1187 www_section = {encrypted traffic, machine learning, padding, privacy, traffic analysis countermeasures},
1188 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Peek-a-Boo\%2C\%20I\%20Still\%20See\%20You\%3A\%20Why\%20Efficient\%20Traffic\%20Analysis\%20Countermeasures\%20Fail.pdf}, 1188 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Peek-a-Boo\%2C\%20I\%20Still\%20See\%20You\%3A\%20Why\%20Efficient\%20Traffic\%20Analysis\%20Countermeasures\%20Fail.pdf},
1189 url = {https://bibliography.gnunet.org}, 1189 url = {https://bibliography.gnunet.org},
1190 author = {Kevin P. Dyer and Scott Coull and Thomas Ristenpart and Thomas Shrimpton} 1190 author = {Kevin P. Dyer and Scott Coull and Thomas Ristenpart and Thomas Shrimpton}
1191} 1191}
@@ -1200,7 +1200,7 @@ purpose TA countermeasures can ever provide the type of security targeted in pri
1200 issn = {0924-1868}, 1200 issn = {0924-1868},
1201 doi = {10.1007/s11257-011-9110-z}, 1201 doi = {10.1007/s11257-011-9110-z},
1202 url = {http://dx.doi.org/10.1007/s11257-011-9110-z}, 1202 url = {http://dx.doi.org/10.1007/s11257-011-9110-z},
1203 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Personalization2012Toch.pdf}, 1203 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Personalization2012Toch.pdf},
1204 author = {Toch, Eran and Wang, Yang and Cranor, LorrieFaith} 1204 author = {Toch, Eran and Wang, Yang and Cranor, LorrieFaith}
1205} 1205}
1206@conference {DBLP:conf/focs/DworkNV12, 1206@conference {DBLP:conf/focs/DworkNV12,
@@ -1227,7 +1227,7 @@ purpose TA countermeasures can ever provide the type of security targeted in pri
1227 journal = {Proc. CoNEXT}, 1227 journal = {Proc. CoNEXT},
1228 year = {2012}, 1228 year = {2012},
1229 www_section = {emulation, mininet, network, virtualization}, 1229 www_section = {emulation, mininet, network, virtualization},
1230 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mininet-hifi.pdf}, 1230 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/mininet-hifi.pdf},
1231 url = {https://bibliography.gnunet.org}, 1231 url = {https://bibliography.gnunet.org},
1232 author = {Handigol, N. and Heller, B. and Jeyakumar, V. and Lantz, B. and McKeown, N.} 1232 author = {Handigol, N. and Heller, B. and Jeyakumar, V. and Lantz, B. and McKeown, N.}
1233} 1233}
@@ -1251,7 +1251,7 @@ Saturn is not only that it effectively tackles all three issues together{\textem
1251providing fault tolerance over DHTs{\textemdash}but also that it can be applied on top of any order-preserving DHT enabling it to dynamically 1251providing fault tolerance over DHTs{\textemdash}but also that it can be applied on top of any order-preserving DHT enabling it to dynamically
1252handle replication and, thus, to trade off replication costs for fair load distribution and fault tolerance}, 1252handle replication and, thus, to trade off replication costs for fair load distribution and fault tolerance},
1253 www_section = {distributed hash table, load balancing, range queries, Saturn}, 1253 www_section = {distributed hash table, load balancing, range queries, Saturn},
1254 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/saturn-range-dht.pdf}, 1254 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/saturn-range-dht.pdf},
1255 url = {https://bibliography.gnunet.org}, 1255 url = {https://bibliography.gnunet.org},
1256 author = {Theoni Pitoura and Nikos Ntarmos and Peter Triantafillou} 1256 author = {Theoni Pitoura and Nikos Ntarmos and Peter Triantafillou}
1257} 1257}
@@ -1266,7 +1266,7 @@ handle replication and, thus, to trade off replication costs for fair load distr
1266 issn = {0269-2821}, 1266 issn = {0269-2821},
1267 doi = {10.1007/s10462-011-9222-1}, 1267 doi = {10.1007/s10462-011-9222-1},
1268 url = {http://dx.doi.org/10.1007/s10462-011-9222-1}, 1268 url = {http://dx.doi.org/10.1007/s10462-011-9222-1},
1269 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PersonalizedRecommender2012Zhou.pdf}, 1269 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PersonalizedRecommender2012Zhou.pdf},
1270 author = {Zhou, Xujuan and Xu, Yue and Li, Yuefeng and Josang, Audun and Cox, Clive} 1270 author = {Zhou, Xujuan and Xu, Yue and Li, Yuefeng and Josang, Audun and Cox, Clive}
1271} 1271}
1272@article {2012_15, 1272@article {2012_15,
@@ -1280,7 +1280,7 @@ handle replication and, thus, to trade off replication costs for fair load distr
1280 www_section = {AI, artificial intelligence, bandit-based methods, computer go., game search, MCTS, monte carlo tree search, UCB, UCT, upper confidence bounds, upper confidence bounds for trees}, 1280 www_section = {AI, artificial intelligence, bandit-based methods, computer go., game search, MCTS, monte carlo tree search, UCB, UCT, upper confidence bounds, upper confidence bounds for trees},
1281 issn = {1943-068X}, 1281 issn = {1943-068X},
1282 doi = {10.1109/TCIAIG.2012.2186810}, 1282 doi = {10.1109/TCIAIG.2012.2186810},
1283 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Browne\%20et\%20al\%20-\%20A\%20survey\%20of\%20MCTS\%20methods.pdf}, 1283 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Browne\%20et\%20al\%20-\%20A\%20survey\%20of\%20MCTS\%20methods.pdf},
1284 url = {https://bibliography.gnunet.org}, 1284 url = {https://bibliography.gnunet.org},
1285 author = {Cameron Browne and Edward Powley and Daniel Whitehouse and Simon Lucas and Peter I. Cowling and Philipp Rohlfshagen and Stephen Tavener and Diego Perez and Spyridon Samothrakis and Simon Colton} 1285 author = {Cameron Browne and Edward Powley and Daniel Whitehouse and Simon Lucas and Peter I. Cowling and Philipp Rohlfshagen and Stephen Tavener and Diego Perez and Spyridon Samothrakis and Simon Colton}
1286} 1286}
@@ -1295,7 +1295,7 @@ handle replication and, thus, to trade off replication costs for fair load distr
1295 www_section = {Arrays, Bismuth, bloom filters, distributed systems, Filtering theory, filters, Fingerprint recognition, forwarding, information processing, measurement data summarization, networking costs, overlay networks, Peer to peer computing, peer-to-peer computing, Peer-to-peer systems, Probabilistic logic, probabilistic structures, probabilistic techniques, probability, routing, telecommunication network routing}, 1295 www_section = {Arrays, Bismuth, bloom filters, distributed systems, Filtering theory, filters, Fingerprint recognition, forwarding, information processing, measurement data summarization, networking costs, overlay networks, Peer to peer computing, peer-to-peer computing, Peer-to-peer systems, Probabilistic logic, probabilistic structures, probabilistic techniques, probability, routing, telecommunication network routing},
1296 issn = {1553-877X}, 1296 issn = {1553-877X},
1297 doi = {10.1109/SURV.2011.031611.00024}, 1297 doi = {10.1109/SURV.2011.031611.00024},
1298 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/TheoryandPracticeBloomFilter2011Tarkoma.pdf}, 1298 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/TheoryandPracticeBloomFilter2011Tarkoma.pdf},
1299 www_section = unsorted, 1299 www_section = unsorted,
1300 url = {https://bibliography.gnunet.org}, 1300 url = {https://bibliography.gnunet.org},
1301 author = {Tarkoma, S. and Rothenberg, C.E. and Lagerspetz, E.} 1301 author = {Tarkoma, S. and Rothenberg, C.E. and Lagerspetz, E.}
@@ -1312,7 +1312,7 @@ handle replication and, thus, to trade off replication costs for fair load distr
1312 isbn = {978-1-4503-1189-2}, 1312 isbn = {978-1-4503-1189-2},
1313 doi = {10.1145/2189736.2189749}, 1313 doi = {10.1145/2189736.2189749},
1314 url = {http://doi.acm.org/10.1145/2189736.2189749}, 1314 url = {http://doi.acm.org/10.1145/2189736.2189749},
1315 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WebPersonalization2012Zeng.pdf}, 1315 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WebPersonalization2012Zeng.pdf},
1316 author = {Zeng, Yi and Zhong, Ning and Ren, Xu and Wang, Yan} 1316 author = {Zeng, Yi and Zhong, Ning and Ren, Xu and Wang, Yan}
1317} 1317}
1318@conference {pets2011-bagai, 1318@conference {pets2011-bagai,
@@ -1324,7 +1324,7 @@ handle replication and, thus, to trade off replication costs for fair load distr
1324 abstract = {We give a critical analysis of the system-wide anonymity metric of Edman et al. [3], which is based on the permanent value of a doubly-stochastic matrix. By providing an intuitive understanding of the permanent of such a matrix, we show that a metric that looks no further than this composite value is at best a rough indicator of anonymity. We identify situations where its inaccuracy is acute, and reveal a better anonymity indicator. Also, by constructing an information-preserving embedding of a smaller class of attacks into the wider class for which this metric was proposed, we show that this metric fails to possess desirable 1324 abstract = {We give a critical analysis of the system-wide anonymity metric of Edman et al. [3], which is based on the permanent value of a doubly-stochastic matrix. By providing an intuitive understanding of the permanent of such a matrix, we show that a metric that looks no further than this composite value is at best a rough indicator of anonymity. We identify situations where its inaccuracy is acute, and reveal a better anonymity indicator. Also, by constructing an information-preserving embedding of a smaller class of attacks into the wider class for which this metric was proposed, we show that this metric fails to possess desirable
1325generalization properties. Finally, we present a new anonymity metric that does not exhibit these shortcomings. Our new metric is accurate as well as general}, 1325generalization properties. Finally, we present a new anonymity metric that does not exhibit these shortcomings. Our new metric is accurate as well as general},
1326 www_section = {combinatorial matrix theory, probabilistic attacks, system-wide anonymity metric}, 1326 www_section = {combinatorial matrix theory, probabilistic attacks, system-wide anonymity metric},
1327 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PETS\%2711\%20-\%20An\%20Accurate\%20System-Wide\%20Anonymity\%20Metric\%20for\%20Probabilistic\%20Attacks.pdf}, 1327 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PETS\%2711\%20-\%20An\%20Accurate\%20System-Wide\%20Anonymity\%20Metric\%20for\%20Probabilistic\%20Attacks.pdf},
1328 url = {https://bibliography.gnunet.org}, 1328 url = {https://bibliography.gnunet.org},
1329 author = {Rajiv Bagai and Huabo Lu and Rong Li and Bin Tang} 1329 author = {Rajiv Bagai and Huabo Lu and Rong Li and Bin Tang}
1330} 1330}
@@ -1337,7 +1337,7 @@ generalization properties. Finally, we present a new anonymity metric that does
1337 address = {San Francisco, California}, 1337 address = {San Francisco, California},
1338 abstract = {This paper presents details on the design and implementation of a scalable framework for evaluating peer-to-peer protocols. Unlike systems based on simulation, emulation-based systems enable the experimenter to obtain data that reflects directly on the concrete implementation in much greater detail. This paper argues that emulation is a better model for experiments with peer-to-peer protocols since it can provide scalability and high flexibility while eliminating the cost of moving from experimentation to deployment. We discuss our unique experience with large-scale emulation using the GNUnet peer-to-peer framework and provide experimental results to support these claims }, 1338 abstract = {This paper presents details on the design and implementation of a scalable framework for evaluating peer-to-peer protocols. Unlike systems based on simulation, emulation-based systems enable the experimenter to obtain data that reflects directly on the concrete implementation in much greater detail. This paper argues that emulation is a better model for experiments with peer-to-peer protocols since it can provide scalability and high flexibility while eliminating the cost of moving from experimentation to deployment. We discuss our unique experience with large-scale emulation using the GNUnet peer-to-peer framework and provide experimental results to support these claims },
1339 www_section = {distributed hash table, emulation, GNUnet, scalability, security analysis}, 1339 www_section = {distributed hash table, emulation, GNUnet, scalability, security analysis},
1340 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cset2011.pdf}, 1340 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cset2011.pdf},
1341 url = {https://bibliography.gnunet.org}, 1341 url = {https://bibliography.gnunet.org},
1342 author = {Nathan S Evans and Christian Grothoff} 1342 author = {Nathan S Evans and Christian Grothoff}
1343} 1343}
@@ -1350,7 +1350,7 @@ generalization properties. Finally, we present a new anonymity metric that does
1350 abstract = {Anonymous blacklisting schemes allow online service providers to prevent future anonymous access by abusive users while preserving the privacy of all anonymous users (both abusive and non-abusive). The first scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on trusted third parties who can collude to de-anonymize users of the scheme. Two recently proposed schemes, Nymbler and Jack, reduce the trust placed in these third parties at the expense of using less-efficient asymmetric crypto primitives. We present BNymble, a scheme which matches the anonymity guarantees of Nymbler and Jack while (nearly) maintaining the efficiency of the original Nymble. The key insight of 1350 abstract = {Anonymous blacklisting schemes allow online service providers to prevent future anonymous access by abusive users while preserving the privacy of all anonymous users (both abusive and non-abusive). The first scheme proposed for this purpose was Nymble, an extremely efficient scheme based only on symmetric primitives; however, Nymble relies on trusted third parties who can collude to de-anonymize users of the scheme. Two recently proposed schemes, Nymbler and Jack, reduce the trust placed in these third parties at the expense of using less-efficient asymmetric crypto primitives. We present BNymble, a scheme which matches the anonymity guarantees of Nymbler and Jack while (nearly) maintaining the efficiency of the original Nymble. The key insight of
1351BNymble is that we can achieve the anonymity goals of these more recent schemes by replacing only the infrequent {\textquotedblleft}User Registration{\textquotedblright} protocol from Nymble with asymmetric primitives. We prove the security of BNymble, and report on its efficiency}, 1351BNymble is that we can achieve the anonymity goals of these more recent schemes by replacing only the infrequent {\textquotedblleft}User Registration{\textquotedblright} protocol from Nymble with asymmetric primitives. We prove the security of BNymble, and report on its efficiency},
1352 www_section = {anonymous access, anonymous blacklisting, BNymble}, 1352 www_section = {anonymous access, anonymous blacklisting, BNymble},
1353 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/FC\%2711\%20-\%20BNymble.pdf}, 1353 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/FC\%2711\%20-\%20BNymble.pdf},
1354 url = {https://bibliography.gnunet.org}, 1354 url = {https://bibliography.gnunet.org},
1355 author = {Peter Lofgren and Nicholas J. Hopper} 1355 author = {Peter Lofgren and Nicholas J. Hopper}
1356} 1356}
@@ -1363,7 +1363,7 @@ BNymble is that we can achieve the anonymity goals of these more recent schemes
1363 organization = {ACM}, 1363 organization = {ACM},
1364 address = {Chicago, IL, United States}, 1364 address = {Chicago, IL, United States},
1365 abstract = {Tor is a network designed for low-latency anonymous communications. Tor clients form circuits through relays that are listed in a public directory, and then relay their encrypted traffic through these circuits. This indirection makes it difficult for a local adversary to determine with whom a particular Tor user is communicating. In response, some local adversaries restrict access to Tor by blocking each of the publicly listed relays. To deal with such an adversary, Tor uses bridges, which are unlisted relays that can be used as alternative entry points into the Tor network. Unfortunately, issues with Tor's bridge implementation make it easy to discover large numbers of bridges. An adversary that hoards this information may use it to determine when each bridge is online over time. If a bridge operator also browses with Tor on the same machine, this information may be sufficient to deanonymize him. We present BridgeSPA as a method to mitigate this issue. A client using BridgeSPA relies on innocuous single packet authorization (SPA) to present a time-limited key to a bridge. Before this authorization takes place, the bridge will not reveal whether it is online. We have implemented BridgeSPA as a working proof-of-concept, which is available under an open-source licence}, 1365 abstract = {Tor is a network designed for low-latency anonymous communications. Tor clients form circuits through relays that are listed in a public directory, and then relay their encrypted traffic through these circuits. This indirection makes it difficult for a local adversary to determine with whom a particular Tor user is communicating. In response, some local adversaries restrict access to Tor by blocking each of the publicly listed relays. To deal with such an adversary, Tor uses bridges, which are unlisted relays that can be used as alternative entry points into the Tor network. Unfortunately, issues with Tor's bridge implementation make it easy to discover large numbers of bridges. An adversary that hoards this information may use it to determine when each bridge is online over time. If a bridge operator also browses with Tor on the same machine, this information may be sufficient to deanonymize him. We present BridgeSPA as a method to mitigate this issue. A client using BridgeSPA relies on innocuous single packet authorization (SPA) to present a time-limited key to a bridge. Before this authorization takes place, the bridge will not reveal whether it is online. We have implemented BridgeSPA as a working proof-of-concept, which is available under an open-source licence},
1366 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WPES\%2711\%20-\%20bridgeSPA.pdf}, 1366 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WPES\%2711\%20-\%20bridgeSPA.pdf},
1367 www_section = unsorted, 1367 www_section = unsorted,
1368 url = {https://bibliography.gnunet.org}, 1368 url = {https://bibliography.gnunet.org},
1369 author = {Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs Hengartner} 1369 author = {Rob Smits and Divam Jain and Sarah Pidcock and Ian Goldberg and Urs Hengartner}
@@ -1380,7 +1380,7 @@ BNymble is that we can achieve the anonymity goals of these more recent schemes
1380We therefore propose Cirripede, a system that can be used for unobservable communication with Internet destinations. Cirripede is designed to be deployed by ISPs; it intercepts connections from clients to innocent-looking destinations and redirects them to the true destination requested by the client. The communication is encoded in a way that is indistinguishable from normal communications to anyone without the master secret key, while public-key cryptography is used to eliminate the need for any secret information that must be shared with Cirripede users. 1380We therefore propose Cirripede, a system that can be used for unobservable communication with Internet destinations. Cirripede is designed to be deployed by ISPs; it intercepts connections from clients to innocent-looking destinations and redirects them to the true destination requested by the client. The communication is encoded in a way that is indistinguishable from normal communications to anyone without the master secret key, while public-key cryptography is used to eliminate the need for any secret information that must be shared with Cirripede users.
1381Cirripede is designed to work scalably with routers that handle large volumes of traffic while imposing minimal overhead on ISPs and not disrupting existing traffic. This allows Cirripede proxies to be strategically deployed at central locations, making access to Cirripede very difficult to block. We built a proof-of-concept implementation of Cirripede and performed a testbed evaluation of its performance properties}, 1381Cirripede is designed to work scalably with routers that handle large volumes of traffic while imposing minimal overhead on ISPs and not disrupting existing traffic. This allows Cirripede proxies to be strategically deployed at central locations, making access to Cirripede very difficult to block. We built a proof-of-concept implementation of Cirripede and performed a testbed evaluation of its performance properties},
1382 www_section = {censorship-resistance, unobservability}, 1382 www_section = {censorship-resistance, unobservability},
1383 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CCS\%2711\%20-\%20Cirripede.pdf}, 1383 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CCS\%2711\%20-\%20Cirripede.pdf},
1384 url = {https://bibliography.gnunet.org}, 1384 url = {https://bibliography.gnunet.org},
1385 author = {Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Borisov, Nikita} 1385 author = {Amir Houmansadr and Giang T. K. Nguyen and Matthew Caesar and Borisov, Nikita}
1386} 1386}
@@ -1395,7 +1395,7 @@ Cirripede is designed to work scalably with routers that handle large volumes of
1395 issn = {0362-5915}, 1395 issn = {0362-5915},
1396 doi = {10.1145/2043652.2043659}, 1396 doi = {10.1145/2043652.2043659},
1397 url = {http://doi.acm.org/10.1145/2043652.2043659}, 1397 url = {http://doi.acm.org/10.1145/2043652.2043659},
1398 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/TopK-Processing2011Bai.pdf}, 1398 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/TopK-Processing2011Bai.pdf},
1399 author = {Bai, Xiao and Guerraoui, Rachid and Kermarrec, Anne-Marie and Leroy, Vincent} 1399 author = {Bai, Xiao and Guerraoui, Rachid and Kermarrec, Anne-Marie and Leroy, Vincent}
1400} 1400}
1401@article {2011_1, 1401@article {2011_1,
@@ -1418,7 +1418,7 @@ and sequences. It discusses some properties needed to implement non-trivial CRDT
1418 www_section = {commutative operations, data replication, optimistic replication}, 1418 www_section = {commutative operations, data replication, optimistic replication},
1419 journal = {unknown}, 1419 journal = {unknown},
1420 isbn = {0249-6399}, 1420 isbn = {0249-6399},
1421 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/crdt.pdf}, 1421 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/crdt.pdf},
1422 url = {https://bibliography.gnunet.org}, 1422 url = {https://bibliography.gnunet.org},
1423 author = {Marc Shapiro and Nuno Preguica and Carlos Baquero and Marek Zawirski} 1423 author = {Marc Shapiro and Nuno Preguica and Carlos Baquero and Marek Zawirski}
1424} 1424}
@@ -1446,7 +1446,7 @@ and sequences. It discusses some properties needed to implement non-trivial CRDT
1446 abstract = {We present decoy routing, a mechanism capable of circumventing common network filtering strategies. Unlike other circumvention techniques, decoy routing does not require a client to connect to a specific IP address (which 1446 abstract = {We present decoy routing, a mechanism capable of circumventing common network filtering strategies. Unlike other circumvention techniques, decoy routing does not require a client to connect to a specific IP address (which
1447is easily blocked) in order to provide circumvention. We show that if it is possible for a client to connect to any unblocked host/service, then decoy routing could be used to connect them to a blocked destination without cooperation from the host. This is accomplished by placing the circumvention service in the network itself -- where a single device could proxy traffic between a significant fraction of hosts -- instead of at the edge}, 1447is easily blocked) in order to provide circumvention. We show that if it is possible for a client to connect to any unblocked host/service, then decoy routing could be used to connect them to a blocked destination without cooperation from the host. This is accomplished by placing the circumvention service in the network itself -- where a single device could proxy traffic between a significant fraction of hosts -- instead of at the edge},
1448 www_section = {decoy routing, Internet communication, network filter}, 1448 www_section = {decoy routing, Internet communication, network filter},
1449 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/FOCI\%2711\%20-\%20Decoy\%20Routing\%3A\%20Toward\%20Unblockable\%20Internet\%20Communication.pdf}, 1449 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/FOCI\%2711\%20-\%20Decoy\%20Routing\%3A\%20Toward\%20Unblockable\%20Internet\%20Communication.pdf},
1450 url = {https://bibliography.gnunet.org}, 1450 url = {https://bibliography.gnunet.org},
1451 author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer} 1451 author = {Josh Karlin and Daniel Ellard and Alden W. Jackson and Christine E. Jones and Greg Lauer and David P. Mankins and W. Timothy Strayer}
1452} 1452}
@@ -1458,7 +1458,7 @@ is easily blocked) in order to provide circumvention. We show that if it is poss
1458 address = {Waterloo, Canada}, 1458 address = {Waterloo, Canada},
1459 abstract = {Tor is one of the most widely used privacy enhancing technologies for achieving online anonymity and resisting censorship. While conventional wisdom dictates that the level of anonymity offered by Tor increases as its user base grows, the most significant obstacle to Tor adoption continues to be its slow performance. We seek to enhance Tor's performance by offering techniques to control congestion and improve flow control, thereby reducing unnecessary delays. To reduce congestion, we first evaluate small fixed-size circuit windows and a dynamic circuit window that adaptively re-sizes in response to perceived congestion. While these solutions improve web page response times and require modification only to exit routers, they generally offer poor flow control and slower downloads relative to Tor's current design. To improve flow control while reducing congestion, we implement N23, an ATM-style per-link algorithm that allows Tor routers to explicitly cap their queue lengths and signal congestion via back-pressure. Our results show that N23 offers better congestion and flow control, resulting in improved web page response times and faster page loads compared to Tor's current design and other window-based approaches. We also argue that our proposals do not enable any new attacks on Tor users' privacy}, 1459 abstract = {Tor is one of the most widely used privacy enhancing technologies for achieving online anonymity and resisting censorship. While conventional wisdom dictates that the level of anonymity offered by Tor increases as its user base grows, the most significant obstacle to Tor adoption continues to be its slow performance. We seek to enhance Tor's performance by offering techniques to control congestion and improve flow control, thereby reducing unnecessary delays. To reduce congestion, we first evaluate small fixed-size circuit windows and a dynamic circuit window that adaptively re-sizes in response to perceived congestion. While these solutions improve web page response times and require modification only to exit routers, they generally offer poor flow control and slower downloads relative to Tor's current design. To improve flow control while reducing congestion, we implement N23, an ATM-style per-link algorithm that allows Tor routers to explicitly cap their queue lengths and signal congestion via back-pressure. Our results show that N23 offers better congestion and flow control, resulting in improved web page response times and faster page loads compared to Tor's current design and other window-based approaches. We also argue that our proposals do not enable any new attacks on Tor users' privacy},
1460 www_section = {congestion, DefenestraTor, online anonymity, performance, privacy enhancing technologies, Tor, Windows}, 1460 www_section = {congestion, DefenestraTor, online anonymity, performance, privacy enhancing technologies, Tor, Windows},
1461 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PETS\%2711\%20-\%20DefenestraTor.pdf}, 1461 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PETS\%2711\%20-\%20DefenestraTor.pdf},
1462 url = {https://bibliography.gnunet.org}, 1462 url = {https://bibliography.gnunet.org},
1463 author = {Mashael AlSabah and Kevin Bauer and Ian Goldberg and Dirk Grunwald and Damon McCoy and Stefan Savage and Geoffrey M. Voelker} 1463 author = {Mashael AlSabah and Kevin Bauer and Ian Goldberg and Dirk Grunwald and Damon McCoy and Stefan Savage and Geoffrey M. Voelker}
1464} 1464}
@@ -1472,7 +1472,7 @@ We initiate an examination whether there are advantages to a paradigm where both
1472* When we require that the error is o(n{\surd}) and the number of rounds is constant, there is no benefit in the new paradigm. 1472* When we require that the error is o(n{\surd}) and the number of rounds is constant, there is no benefit in the new paradigm.
1473* When we allow an error of O(n{\surd}), the new paradigm yields more efficient protocols when we consider protocols that compute symmetric functions. 1473* When we allow an error of O(n{\surd}), the new paradigm yields more efficient protocols when we consider protocols that compute symmetric functions.
1474Our results also yield new separations between the local and global models of computations for private data analysis}, 1474Our results also yield new separations between the local and global models of computations for private data analysis},
1475 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DistributedPrivateData2008Beimel.pdf}, 1475 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DistributedPrivateData2008Beimel.pdf},
1476 www_section = unsorted, 1476 www_section = unsorted,
1477 url = {https://bibliography.gnunet.org}, 1477 url = {https://bibliography.gnunet.org},
1478 author = {Amos Beimel and Kobbi Nissim and Eran Omri} 1478 author = {Amos Beimel and Kobbi Nissim and Eran Omri}
@@ -1486,7 +1486,7 @@ Our results also yield new separations between the local and global models of co
1486 abstract = {Tor is one of the most widely-used privacy enhancing technologies for achieving online anonymity and resisting censorship. Simultaneously, Tor is also an evolving research network on which investigators perform experiments to improve the network's resilience to attacks and enhance its performance. Existing methods for studying Tor have included analytical modeling, simulations, small-scale network emulations, small-scale PlanetLab deployments, and measurement and analysis of the live Tor network. Despite the growing body of work concerning Tor, there is no widely accepted methodology for conducting Tor research in a manner that preserves realism while protecting live users' privacy. In an effort to propose a standard, rigorous experimental framework for 1486 abstract = {Tor is one of the most widely-used privacy enhancing technologies for achieving online anonymity and resisting censorship. Simultaneously, Tor is also an evolving research network on which investigators perform experiments to improve the network's resilience to attacks and enhance its performance. Existing methods for studying Tor have included analytical modeling, simulations, small-scale network emulations, small-scale PlanetLab deployments, and measurement and analysis of the live Tor network. Despite the growing body of work concerning Tor, there is no widely accepted methodology for conducting Tor research in a manner that preserves realism while protecting live users' privacy. In an effort to propose a standard, rigorous experimental framework for
1487conducting Tor research in a way that ensures safety and realism, we present the design of ExperimenTor, a large-scale Tor network emulation toolkit and testbed. We also report our early experiences with prototype testbeds currently deployed at four research institutions}, 1487conducting Tor research in a way that ensures safety and realism, we present the design of ExperimenTor, a large-scale Tor network emulation toolkit and testbed. We also report our early experiences with prototype testbeds currently deployed at four research institutions},
1488 www_section = {experimentation, ExperimenTor, privacy enhancing technologies, Tor}, 1488 www_section = {experimentation, ExperimenTor, privacy enhancing technologies, Tor},
1489 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CSET\%2711\%20-\%20ExperimenTor.pdf}, 1489 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CSET\%2711\%20-\%20ExperimenTor.pdf},
1490 url = {https://bibliography.gnunet.org}, 1490 url = {https://bibliography.gnunet.org},
1491 author = {Kevin Bauer and Micah Sherr and Damon McCoy and Dirk Grunwald} 1491 author = {Kevin Bauer and Micah Sherr and Damon McCoy and Dirk Grunwald}
1492} 1492}
@@ -1499,7 +1499,7 @@ conducting Tor research in a way that ensures safety and realism, we present the
1499 abstract = {Tor is a volunteer-operated network of application-layer relays that enables users to communicate privately and anonymously. Unfortunately, Tor often exhibits poor performance due to congestion caused by the unbalanced ratio of clients to available relays, as well as a disproportionately high consumption of network capacity by a small fraction of filesharing users. 1499 abstract = {Tor is a volunteer-operated network of application-layer relays that enables users to communicate privately and anonymously. Unfortunately, Tor often exhibits poor performance due to congestion caused by the unbalanced ratio of clients to available relays, as well as a disproportionately high consumption of network capacity by a small fraction of filesharing users.
1500This paper argues the very counterintuitive notion that slowing down traffic on Tor will increase the bandwidth capacity of the network and consequently improve the experience of interactive web users. We introduce Tortoise, a system for rate limiting Tor at its ingress points. We demonstrate that Tortoise incurs little penalty for interactive web users, while significantly decreasing the throughput for filesharers. Our techniques provide incentives to filesharers to configure their Tor clients to also relay traffic, which in turn improves the network's overall performance. We present large-scale emulation results that indicate that interactive users will achieve a significant speedup if even a small fraction of clients opt to run relays}, 1500This paper argues the very counterintuitive notion that slowing down traffic on Tor will increase the bandwidth capacity of the network and consequently improve the experience of interactive web users. We introduce Tortoise, a system for rate limiting Tor at its ingress points. We demonstrate that Tortoise incurs little penalty for interactive web users, while significantly decreasing the throughput for filesharers. Our techniques provide incentives to filesharers to configure their Tor clients to also relay traffic, which in turn improves the network's overall performance. We present large-scale emulation results that indicate that interactive users will achieve a significant speedup if even a small fraction of clients opt to run relays},
1501 www_section = {anonymity, performance, Tor}, 1501 www_section = {anonymity, performance, Tor},
1502 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ACSAC\%2711\%20-\%20Tortoise.pdf}, 1502 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ACSAC\%2711\%20-\%20Tortoise.pdf},
1503 url = {https://bibliography.gnunet.org}, 1503 url = {https://bibliography.gnunet.org},
1504 author = {W. Brad Moore and Chris Wacek and Micah Sherr} 1504 author = {W. Brad Moore and Chris Wacek and Micah Sherr}
1505} 1505}
@@ -1512,7 +1512,7 @@ This paper argues the very counterintuitive notion that slowing down traffic on
1512 abstract = {Traffic watermarking is an important element in many network security and privacy applications, such as tracing botnet C\&C communications and deanonymizing peer-to-peer VoIP calls. The state-of-the-art traffic watermarking schemes are usually based on packet timing information and they are notoriously difficult to detect. In this paper, we show for the first time that even the most sophisticated timing-based watermarking schemes (e.g., RAINBOW and SWIRL) are not invisible by proposing a new detection system called BACKLIT. BACKLIT is designed according to the observation that any practical timing-based traffic watermark will cause noticeable alterations in the intrinsic timing features typical of TCP flows. We propose five metrics that are sufficient for detecting four state-of-the-art traffic watermarks for bulk transfer and interactive traffic. BACKLIT can be easily deployed in stepping stones and anonymity networks (e.g., Tor), because it does not rely on strong assumptions and can be realized in an active or passive mode. We have conducted extensive experiments to evaluate BACKLIT's detection performance using the PlanetLab platform. The results show that BACKLIT can detect watermarked network flows 1512 abstract = {Traffic watermarking is an important element in many network security and privacy applications, such as tracing botnet C\&C communications and deanonymizing peer-to-peer VoIP calls. The state-of-the-art traffic watermarking schemes are usually based on packet timing information and they are notoriously difficult to detect. In this paper, we show for the first time that even the most sophisticated timing-based watermarking schemes (e.g., RAINBOW and SWIRL) are not invisible by proposing a new detection system called BACKLIT. BACKLIT is designed according to the observation that any practical timing-based traffic watermark will cause noticeable alterations in the intrinsic timing features typical of TCP flows. We propose five metrics that are sufficient for detecting four state-of-the-art traffic watermarks for bulk transfer and interactive traffic. BACKLIT can be easily deployed in stepping stones and anonymity networks (e.g., Tor), because it does not rely on strong assumptions and can be realized in an active or passive mode. We have conducted extensive experiments to evaluate BACKLIT's detection performance using the PlanetLab platform. The results show that BACKLIT can detect watermarked network flows
1513with high accuracy and few false positives}, 1513with high accuracy and few false positives},
1514 www_section = {BACKLIT, detection system, invisible, network security, packet timing information, privacy, traffic watermark}, 1514 www_section = {BACKLIT, detection system, invisible, network security, packet timing information, privacy, traffic watermark},
1515 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ACSAC\%2711\%20-\%20BACKLIT.pdf}, 1515 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ACSAC\%2711\%20-\%20BACKLIT.pdf},
1516 url = {https://bibliography.gnunet.org}, 1516 url = {https://bibliography.gnunet.org},
1517 author = {Xiapu Luo and Peng Zhou and Junjie Zhang and Roberto Perdisci and Wenke Lee and Rocky K. C. Chang} 1517 author = {Xiapu Luo and Peng Zhou and Junjie Zhang and Roberto Perdisci and Wenke Lee and Rocky K. C. Chang}
1518} 1518}
@@ -1527,7 +1527,7 @@ with high accuracy and few false positives},
1527 abstract = {We introduce Faust, a solution to the {\textquotedblleft}anonymous blacklisting problem:{\textquotedblright} allow an anonymous user to prove that she is authorized to access an online service such that if the user misbehaves, she retains her anonymity but will be unable to 1527 abstract = {We introduce Faust, a solution to the {\textquotedblleft}anonymous blacklisting problem:{\textquotedblright} allow an anonymous user to prove that she is authorized to access an online service such that if the user misbehaves, she retains her anonymity but will be unable to
1528authenticate in future sessions. Faust uses no trusted third parties and is one to two orders of magnitude more efficient than previous schemes without trusted third parties. The key idea behind Faust is to eliminate the explicit blacklist used in all previous approaches, and rely instead on an implicit whitelist, based on blinded authentication tokens}, 1528authenticate in future sessions. Faust uses no trusted third parties and is one to two orders of magnitude more efficient than previous schemes without trusted third parties. The key idea behind Faust is to eliminate the explicit blacklist used in all previous approaches, and rely instead on an implicit whitelist, based on blinded authentication tokens},
1529 www_section = {anonymous authentication, anonymous blacklisting, privacy-enhancing revocation}, 1529 www_section = {anonymous authentication, anonymous blacklisting, privacy-enhancing revocation},
1530 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WPES\%2711\%20-\%20FAUST.pdf}, 1530 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WPES\%2711\%20-\%20FAUST.pdf},
1531 url = {https://bibliography.gnunet.org}, 1531 url = {https://bibliography.gnunet.org},
1532 author = {Peter Lofgren and Nicholas J. Hopper} 1532 author = {Peter Lofgren and Nicholas J. Hopper}
1533} 1533}
@@ -1544,7 +1544,7 @@ authenticate in future sessions. Faust uses no trusted third parties and is one
1544 www_section = {anonymity, OneSwarm, p2p network}, 1544 www_section = {anonymity, OneSwarm, p2p network},
1545 isbn = {978-1-4503-0948-6}, 1545 isbn = {978-1-4503-0948-6},
1546 doi = {http://doi.acm.org/10.1145/2046707.2046731}, 1546 doi = {http://doi.acm.org/10.1145/2046707.2046731},
1547 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/prusty.ccs_.2011.pdf}, 1547 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/prusty.ccs_.2011.pdf},
1548 url = {https://bibliography.gnunet.org}, 1548 url = {https://bibliography.gnunet.org},
1549 author = {Prusty, Swagatika and Brian Neil Levine and Marc Liberatore} 1549 author = {Prusty, Swagatika and Brian Neil Levine and Marc Liberatore}
1550} 1550}
@@ -1559,7 +1559,7 @@ research efforts have focused on using anonymous blacklisting systems (which are
1559problem and survey the literature on anonymous blacklisting systems, comparing and contrasting the architecture of various existing schemes, and discussing the tradeoffs inherent with each design. The literature on anonymous blacklisting systems lacks a unified set of definitions; each scheme operates under different trust assumptions and provides different security and privacy guarantees. Therefore, before we discuss the existing approaches in detail, we first propose a formal definition for anonymous blacklisting systems, and a set of security and privacy properties that these systems should possess. We also 1559problem and survey the literature on anonymous blacklisting systems, comparing and contrasting the architecture of various existing schemes, and discussing the tradeoffs inherent with each design. The literature on anonymous blacklisting systems lacks a unified set of definitions; each scheme operates under different trust assumptions and provides different security and privacy guarantees. Therefore, before we discuss the existing approaches in detail, we first propose a formal definition for anonymous blacklisting systems, and a set of security and privacy properties that these systems should possess. We also
1560outline a set of new performance requirements that anonymous blacklisting systems should satisfy to maximize their potential for real-world adoption, and give formal definitions for several optional features already supported by some schemes in the literature}, 1560outline a set of new performance requirements that anonymous blacklisting systems should satisfy to maximize their potential for real-world adoption, and give formal definitions for several optional features already supported by some schemes in the literature},
1561 www_section = {anonymity, anonymous blacklisting, authentication, privacy enhancing technologies, privacy-enhanced revocation}, 1561 www_section = {anonymity, anonymous blacklisting, authentication, privacy enhancing technologies, privacy-enhanced revocation},
1562 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Formalizing\%20Anonymous\%20Blacklisting\%20Systems.pdf}, 1562 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Formalizing\%20Anonymous\%20Blacklisting\%20Systems.pdf},
1563 url = {https://bibliography.gnunet.org}, 1563 url = {https://bibliography.gnunet.org},
1564 author = {Ryan Henry and Ian Goldberg} 1564 author = {Ryan Henry and Ian Goldberg}
1565} 1565}
@@ -1570,7 +1570,7 @@ outline a set of new performance requirements that anonymous blacklisting system
1570 address = {Amsterdam, Netherlands}, 1570 address = {Amsterdam, Netherlands},
1571 abstract = {This paper introduces the current research and future plans of the Free Secure Network Systems Group at the Technische Universit\&auml;t M\&uuml;nchen. In particular, we provide some insight into the development process and architecture of the GNUnet P2P framework and the challenges we are currently working on}, 1571 abstract = {This paper introduces the current research and future plans of the Free Secure Network Systems Group at the Technische Universit\&auml;t M\&uuml;nchen. In particular, we provide some insight into the development process and architecture of the GNUnet P2P framework and the challenges we are currently working on},
1572 www_section = {anonymity, GNUnet, routing}, 1572 www_section = {anonymity, GNUnet, routing},
1573 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/syssec2011.pdf}, 1573 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/syssec2011.pdf},
1574 url = {https://bibliography.gnunet.org}, 1574 url = {https://bibliography.gnunet.org},
1575 author = {Christian Grothoff} 1575 author = {Christian Grothoff}
1576} 1576}
@@ -1584,7 +1584,7 @@ outline a set of new performance requirements that anonymous blacklisting system
1584 chapter = {77}, 1584 chapter = {77},
1585 www_section = {ECC, Ed25519, EdDSA, GNUnet}, 1585 www_section = {ECC, Ed25519, EdDSA, GNUnet},
1586 url = {http://ed25519.cr.yp.to/papers.html}, 1586 url = {http://ed25519.cr.yp.to/papers.html},
1587 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ed25519-20110926.pdf}, 1587 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ed25519-20110926.pdf},
1588 author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Hang} 1588 author = {Daniel J. Bernstein and Niels Duif and Tanja Lange and Peter Schwabe and Bo-Yin Hang}
1589} 1589}
1590@book {2011_5, 1590@book {2011_5,
@@ -1601,7 +1601,7 @@ outline a set of new performance requirements that anonymous blacklisting system
1601 isbn = {978-3-642-24860-3}, 1601 isbn = {978-3-642-24860-3},
1602 doi = {10.1007/978-3-642-24861-0_22}, 1602 doi = {10.1007/978-3-642-24861-0_22},
1603 url = {http://dx.doi.org/10.1007/978-3-642-24861-0_22}, 1603 url = {http://dx.doi.org/10.1007/978-3-642-24861-0_22},
1604 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Choosing-\%CE\%B5-2011Lee.pdf}, 1604 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Choosing-\%CE\%B5-2011Lee.pdf},
1605 author = {Lee, Jaewoo and Clifton, Chris}, 1605 author = {Lee, Jaewoo and Clifton, Chris},
1606 editor = {Lai, Xuejia and Zhou, Jianying and Li, Hui} 1606 editor = {Lai, Xuejia and Zhou, Jianying and Li, Hui}
1607} 1607}
@@ -1616,7 +1616,7 @@ outline a set of new performance requirements that anonymous blacklisting system
1616 1616
1617To better understand the security and performance properties of a popular low latency anonymity network, we characterize Tor, focusing on its application protocol distribution, geopolitical client and router distributions, and performance. For instance, we observe that peer-to-peer file sharing protocols use an unfair portion of the network's scarce bandwidth. To reduce the congestion produced by bulk downloaders in networks such as Tor, we design, implement, and analyze an anonymizing network tailored specifically for the BitTorrent peer-to-peer file sharing protocol. We next analyze Tor's security and anonymity properties and empirically show that Tor is vulnerable to practical end-to-end traffic correlation attacks launched by relatively weak adversaries that inflate their bandwidth claims to attract traffic and thereby compromise key positions on clients' paths. We also explore the security and performance trade-offs that revolve around path length design decisions and we show that shorter paths offer performance benefits and provide increased resilience to certain attacks. Finally, we discover a source of performance degradation in Tor that results from poor congestion and flow control. To improve Tor's performance and grow its user base, we offer a fresh approach to congestion and flow control inspired by techniques from IP and ATM networks}, 1617To better understand the security and performance properties of a popular low latency anonymity network, we characterize Tor, focusing on its application protocol distribution, geopolitical client and router distributions, and performance. For instance, we observe that peer-to-peer file sharing protocols use an unfair portion of the network's scarce bandwidth. To reduce the congestion produced by bulk downloaders in networks such as Tor, we design, implement, and analyze an anonymizing network tailored specifically for the BitTorrent peer-to-peer file sharing protocol. We next analyze Tor's security and anonymity properties and empirically show that Tor is vulnerable to practical end-to-end traffic correlation attacks launched by relatively weak adversaries that inflate their bandwidth claims to attract traffic and thereby compromise key positions on clients' paths. We also explore the security and performance trade-offs that revolve around path length design decisions and we show that shorter paths offer performance benefits and provide increased resilience to certain attacks. Finally, we discover a source of performance degradation in Tor that results from poor congestion and flow control. To improve Tor's performance and grow its user base, we offer a fresh approach to congestion and flow control inspired by techniques from IP and ATM networks},
1618 www_section = {low latency anonymous networks, performance, security}, 1618 www_section = {low latency anonymous networks, performance, security},
1619 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/kevin-thesis.pdf}, 1619 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/kevin-thesis.pdf},
1620 url = {https://bibliography.gnunet.org}, 1620 url = {https://bibliography.gnunet.org},
1621 author = {Kevin Bauer} 1621 author = {Kevin Bauer}
1622} 1622}
@@ -1628,7 +1628,7 @@ To better understand the security and performance properties of a popular low la
1628 address = {St. Lucia}, 1628 address = {St. Lucia},
1629 abstract = {In this paper we investigate the impact of missing replay protection as well as missing integrity protection concerning a local attacker in AN.ON. AN.ON is a low latency anonymity network mostly used to anonymize web traffic. We demonstrate that both protection mechanisms are important by presenting two attacks that become feasible as soon as the mechanisms are missing. We mount both attacks on the AN.ON network which neither implements replay protection nor integrity protection yet}, 1629 abstract = {In this paper we investigate the impact of missing replay protection as well as missing integrity protection concerning a local attacker in AN.ON. AN.ON is a low latency anonymity network mostly used to anonymize web traffic. We demonstrate that both protection mechanisms are important by presenting two attacks that become feasible as soon as the mechanisms are missing. We mount both attacks on the AN.ON network which neither implements replay protection nor integrity protection yet},
1630 www_section = {AN.ON, anonymity network, integrity protection, replay protection}, 1630 www_section = {AN.ON, anonymity network, integrity protection, replay protection},
1631 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/FC\%2711\%20-\%20Malice\%20versus\%20AN.ON_.pdf}, 1631 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/FC\%2711\%20-\%20Malice\%20versus\%20AN.ON_.pdf},
1632 url = {https://bibliography.gnunet.org}, 1632 url = {https://bibliography.gnunet.org},
1633 author = {Benedikt Westermann and Dogan Kesdogan} 1633 author = {Benedikt Westermann and Dogan Kesdogan}
1634} 1634}
@@ -1645,7 +1645,7 @@ To better understand the security and performance properties of a popular low la
1645 issn = {1532-0626}, 1645 issn = {1532-0626},
1646 doi = {10.1002/cpe.1751}, 1646 doi = {10.1002/cpe.1751},
1647 url = {http://dx.doi.org/10.1002/cpe.1751}, 1647 url = {http://dx.doi.org/10.1002/cpe.1751},
1648 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Tariq2011Meeting.pdf}, 1648 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Tariq2011Meeting.pdf},
1649 author = {Tariq, Muhammad Adnan and Boris Koldehofe and Gerald G. Koch and Khan, Imran and Kurt Rothermel} 1649 author = {Tariq, Muhammad Adnan and Boris Koldehofe and Gerald G. Koch and Khan, Imran and Kurt Rothermel}
1650} 1650}
1651@mastersthesis {2011_6, 1651@mastersthesis {2011_6,
@@ -1671,7 +1671,7 @@ emulation framework capable of running a large number of nodes using our full co
1671 www_section = {distributed hash table, Freenet, GNUnet, NAT, R5N, Tor}, 1671 www_section = {distributed hash table, Freenet, GNUnet, NAT, R5N, Tor},
1672 isbn = {3-937201-26-2}, 1672 isbn = {3-937201-26-2},
1673 issn = {1868-2642}, 1673 issn = {1868-2642},
1674 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NET-2011-08-1.pdf}, 1674 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NET-2011-08-1.pdf},
1675 url = {https://bibliography.gnunet.org}, 1675 url = {https://bibliography.gnunet.org},
1676 author = {Nathan S Evans} 1676 author = {Nathan S Evans}
1677} 1677}
@@ -1686,7 +1686,7 @@ emulation framework capable of running a large number of nodes using our full co
1686 issn = {1936-6442}, 1686 issn = {1936-6442},
1687 doi = {10.1007/s12083-010-0075-1}, 1687 doi = {10.1007/s12083-010-0075-1},
1688 url = {http://dx.doi.org/10.1007/s12083-010-0075-1}, 1688 url = {http://dx.doi.org/10.1007/s12083-010-0075-1},
1689 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Privacy_PPNA2011Das.pdf}, 1689 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Privacy_PPNA2011Das.pdf},
1690 author = {Das, Kamalika and Bhaduri, Kanishka and Kargupta, Hillol} 1690 author = {Das, Kamalika and Bhaduri, Kanishka and Kargupta, Hillol}
1691} 1691}
1692@conference {LEBLOND:2011:INRIA-00574178:1, 1692@conference {LEBLOND:2011:INRIA-00574178:1,
@@ -1700,7 +1700,7 @@ emulation framework capable of running a large number of nodes using our full co
1700 abstract = {Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in practice to trace a significant number of streams originating from secure (i.e., proxied) applications. In this paper, we show that linkability allows us to trace 193\% of additional streams, including 27\% of HTTP streams possibly originating from {\textquoteleft}{\textquoteleft}secure'' browsers. In particular, we traced 9\% of Tor streams carried by our instrumented exit nodes. Using BitTorrent as the insecure application, we design two attacks tracing BitTorrent users on Tor. We run these attacks in the wild for 23 days and reveal 10,000 IP addresses of Tor users. Using these IP addresses, we then profile not only the BitTorrent downloads but also the websites visited per country of origin of Tor users. We show that BitTorrent users on Tor are over-represented in some countries as compared to BitTorrent users outside of Tor. By analyzing the type of content downloaded, we then explain the observed behaviors by the higher concentration of pornographic content downloaded at the scale of a country. Finally, we present results suggesting the existence of an underground BitTorrent ecosystem on Tor}, 1700 abstract = {Tor is a popular low-latency anonymity network. However, Tor does not protect against the exploitation of an insecure application to reveal the IP address of, or trace, a TCP stream. In addition, because of the linkability of Tor streams sent together over a single circuit, tracing one stream sent over a circuit traces them all. Surprisingly, it is unknown whether this linkability allows in practice to trace a significant number of streams originating from secure (i.e., proxied) applications. In this paper, we show that linkability allows us to trace 193\% of additional streams, including 27\% of HTTP streams possibly originating from {\textquoteleft}{\textquoteleft}secure'' browsers. In particular, we traced 9\% of Tor streams carried by our instrumented exit nodes. Using BitTorrent as the insecure application, we design two attacks tracing BitTorrent users on Tor. We run these attacks in the wild for 23 days and reveal 10,000 IP addresses of Tor users. Using these IP addresses, we then profile not only the BitTorrent downloads but also the websites visited per country of origin of Tor users. We show that BitTorrent users on Tor are over-represented in some countries as compared to BitTorrent users outside of Tor. By analyzing the type of content downloaded, we then explain the observed behaviors by the higher concentration of pornographic content downloaded at the scale of a country. Finally, we present results suggesting the existence of an underground BitTorrent ecosystem on Tor},
1701 www_section = {anonymity, Tor}, 1701 www_section = {anonymity, Tor},
1702 url = {http://hal.inria.fr/inria-00574178/PDF/btor.pdf}, 1702 url = {http://hal.inria.fr/inria-00574178/PDF/btor.pdf},
1703 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/btor.pdf}, 1703 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/btor.pdf},
1704 author = {Le Blond, Stevens and Manils, Pere and Abdelberi, Chaabane and Kaafar, Mohamed Ali and Claude Castelluccia and Legout, Arnaud and Dabbous, Walid} 1704 author = {Le Blond, Stevens and Manils, Pere and Abdelberi, Chaabane and Kaafar, Mohamed Ali and Claude Castelluccia and Legout, Arnaud and Dabbous, Walid}
1705} 1705}
1706@article {perea-tissec11, 1706@article {perea-tissec11,
@@ -1721,7 +1721,7 @@ We call our extension PEREA-Naughtiness. We prove the security of our constructi
1721 issn = {1094-9224}, 1721 issn = {1094-9224},
1722 doi = {http://doi.acm.org/10.1145/2043628.2043630}, 1722 doi = {http://doi.acm.org/10.1145/2043628.2043630},
1723 url = {http://doi.acm.org/10.1145/2043628.2043630}, 1723 url = {http://doi.acm.org/10.1145/2043628.2043630},
1724 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/TISSEC\%20-\%20PEREA.pdf}, 1724 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/TISSEC\%20-\%20PEREA.pdf},
1725 author = {Man Ho Au and Patrick P. Tsang and Apu Kapadia} 1725 author = {Man Ho Au and Patrick P. Tsang and Apu Kapadia}
1726} 1726}
1727@article {gauger2011lj, 1727@article {gauger2011lj,
@@ -1744,7 +1744,7 @@ We call our extension PEREA-Naughtiness. We prove the security of our constructi
1744 abstract = {Existing anonymous communication systems like Tor do not scale well as they require all users to maintain up-to-date information about all available Tor relays in the system. Current proposals for scaling anonymous communication advocate a peer-to-peer (P2P) approach. While the P2P paradigm scales to millions of nodes, it provides new opportunities to compromise anonymity. In this paper, we step away from the P2P paradigm and advocate a client-server approach to scalable anonymity. We propose PIR-Tor, an architecture for the Tor network in which users obtain information about only a few onion routers using private information retrieval techniques. Obtaining information about only a few onion routers is the key to the scalability of our approach, while the use of private retrieval information techniques helps preserve client anonymity. The security of our architecture depends on the security of PIR schemes which are 1744 abstract = {Existing anonymous communication systems like Tor do not scale well as they require all users to maintain up-to-date information about all available Tor relays in the system. Current proposals for scaling anonymous communication advocate a peer-to-peer (P2P) approach. While the P2P paradigm scales to millions of nodes, it provides new opportunities to compromise anonymity. In this paper, we step away from the P2P paradigm and advocate a client-server approach to scalable anonymity. We propose PIR-Tor, an architecture for the Tor network in which users obtain information about only a few onion routers using private information retrieval techniques. Obtaining information about only a few onion routers is the key to the scalability of our approach, while the use of private retrieval information techniques helps preserve client anonymity. The security of our architecture depends on the security of PIR schemes which are
1745well understood and relatively easy to analyze, as opposed to peer-to-peer designs that require analyzing extremely complex and dynamic systems. In particular, we demonstrate that reasonable parameters of our architecture provide equivalent security to that of the Tor network. Moreover, our experimental results show that the overhead of PIR-Tor is manageable even when the Tor network scales by two orders of magnitude}, 1745well understood and relatively easy to analyze, as opposed to peer-to-peer designs that require analyzing extremely complex and dynamic systems. In particular, we demonstrate that reasonable parameters of our architecture provide equivalent security to that of the Tor network. Moreover, our experimental results show that the overhead of PIR-Tor is manageable even when the Tor network scales by two orders of magnitude},
1746 www_section = {anonymous communication, peer to peer, PIR-Tor}, 1746 www_section = {anonymous communication, peer to peer, PIR-Tor},
1747 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/USENIX\%20-\%20PIR-Tor.pdf}, 1747 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/USENIX\%20-\%20PIR-Tor.pdf},
1748 url = {https://bibliography.gnunet.org}, 1748 url = {https://bibliography.gnunet.org},
1749 author = {Prateek Mittal and Femi Olumofin and Carmela Troncoso and Borisov, Nikita and Ian Goldberg} 1749 author = {Prateek Mittal and Femi Olumofin and Carmela Troncoso and Borisov, Nikita and Ian Goldberg}
1750} 1750}
@@ -1759,7 +1759,7 @@ well understood and relatively easy to analyze, as opposed to peer-to-peer desig
1759 address = {Boston, Massachusetts, USA}, 1759 address = {Boston, Massachusetts, USA},
1760 abstract = {Cryptographic solutions to privacy-preserving multiparty linear programming are slow. This makes them unsuitable for many economically important applications, such as supply chain optimization, whose size exceeds their practically feasible input range. In this paper we present a privacy-preserving trans- formation that allows secure outsourcing of the linear program computation in an ef?cient manner. We evaluate security by quantifying the leakage about the input after the transformation and present implementation results. Using this transformation, we can mostly replace the costly cryptographic operations and securely solve problems several orders of magnitude larger}, 1760 abstract = {Cryptographic solutions to privacy-preserving multiparty linear programming are slow. This makes them unsuitable for many economically important applications, such as supply chain optimization, whose size exceeds their practically feasible input range. In this paper we present a privacy-preserving trans- formation that allows secure outsourcing of the linear program computation in an ef?cient manner. We evaluate security by quantifying the leakage about the input after the transformation and present implementation results. Using this transformation, we can mostly replace the costly cryptographic operations and securely solve problems several orders of magnitude larger},
1761 www_section = {cryptography, SMC}, 1761 www_section = {cryptography, SMC},
1762 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PASSAT\%2711\%20-\%20Multiparty\%20linear\%20programming.pdf}, 1762 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PASSAT\%2711\%20-\%20Multiparty\%20linear\%20programming.pdf},
1763 url = {https://bibliography.gnunet.org}, 1763 url = {https://bibliography.gnunet.org},
1764 author = {Dreier, Jannik and Florian Kerschbaum} 1764 author = {Dreier, Jannik and Florian Kerschbaum}
1765} 1765}
@@ -1796,7 +1796,7 @@ This thesis provides the necessary background on I2P, gives details on
1796the attack --- including experimental data from measurements against the 1796the attack --- including experimental data from measurements against the
1797actual I2P network --- and discusses possible solutions}, 1797actual I2P network --- and discusses possible solutions},
1798 www_section = {anonymity, attack, denial-of-service, I2P}, 1798 www_section = {anonymity, attack, denial-of-service, I2P},
1799 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/herrmann2011mt.pdf}, 1799 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/herrmann2011mt.pdf},
1800 url = {https://bibliography.gnunet.org}, 1800 url = {https://bibliography.gnunet.org},
1801 author = {Michael Herrmann} 1801 author = {Michael Herrmann}
1802} 1802}
@@ -1817,7 +1817,7 @@ victim with a denial-of-service attack while giving the victim the opportunity t
1817 1817
1818This paper provides the necessary background on I2P, gives details on the attack --- including experimental data from measurements against the actual I2P network --- and discusses possible solutions}, 1818This paper provides the necessary background on I2P, gives details on the attack --- including experimental data from measurements against the actual I2P network --- and discusses possible solutions},
1819 www_section = {anonymity, attack, Guard, I2P, onion routing}, 1819 www_section = {anonymity, attack, Guard, I2P, onion routing},
1820 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/pet2011i2p.pdf}, 1820 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/pet2011i2p.pdf},
1821 url = {https://bibliography.gnunet.org}, 1821 url = {https://bibliography.gnunet.org},
1822 author = {Michael Herrmann and Christian Grothoff} 1822 author = {Michael Herrmann and Christian Grothoff}
1823} 1823}
@@ -1838,7 +1838,7 @@ private mechanism, will only gain a negligible advantage (up to a privacy parame
1838 isbn = {978-3-642-25872-5}, 1838 isbn = {978-3-642-25872-5},
1839 doi = {10.1007/978-3-642-25873-2_25}, 1839 doi = {10.1007/978-3-642-25873-2_25},
1840 url = {http://dx.doi.org/10.1007/978-3-642-25873-2_25}, 1840 url = {http://dx.doi.org/10.1007/978-3-642-25873-2_25},
1841 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PrivateSimilarity2011Alaggan.pdf}, 1841 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PrivateSimilarity2011Alaggan.pdf},
1842 author = {Alaggan, Mohammad and Gambs, S{\'e}bastien and Kermarrec, Anne-Marie}, 1842 author = {Alaggan, Mohammad and Gambs, S{\'e}bastien and Kermarrec, Anne-Marie},
1843 editor = {Fern{\`a}ndez Anta, Antonio and Lipari, Giuseppe and Roy, Matthieu} 1843 editor = {Fern{\`a}ndez Anta, Antonio and Lipari, Giuseppe and Roy, Matthieu}
1844} 1844}
@@ -1850,7 +1850,7 @@ private mechanism, will only gain a negligible advantage (up to a privacy parame
1850 address = {St. Lucia}, 1850 address = {St. Lucia},
1851 abstract = {Many people currently use proxies to circumvent government censorship that blocks access to content on the Internet. Unfortunately, the dissemination channels used to distribute proxy server locations are increasingly being monitored to discover and quickly block these proxies. This has given rise to a large number of ad hoc dissemination channels that leverage trust networks to reach legitimate users and at the same time prevent proxy server addresses from falling into the hands of censors. To address this problem in a more principled manner, we present Proximax, a robust system that continuously distributes pools of proxies to a large number of channels. The key research challenge in Proximax is to distribute the proxies among the different channels in a way that maximizes the usage of these proxies while minimizing the risk of having them blocked. This is challenging because of two conflicting goals: widely disseminating the location of the proxies to fully utilize their capacity and preventing (or at least delaying) their discovery by censors. We present a practical system that lays out a design and analytical model that balances these factors}, 1851 abstract = {Many people currently use proxies to circumvent government censorship that blocks access to content on the Internet. Unfortunately, the dissemination channels used to distribute proxy server locations are increasingly being monitored to discover and quickly block these proxies. This has given rise to a large number of ad hoc dissemination channels that leverage trust networks to reach legitimate users and at the same time prevent proxy server addresses from falling into the hands of censors. To address this problem in a more principled manner, we present Proximax, a robust system that continuously distributes pools of proxies to a large number of channels. The key research challenge in Proximax is to distribute the proxies among the different channels in a way that maximizes the usage of these proxies while minimizing the risk of having them blocked. This is challenging because of two conflicting goals: widely disseminating the location of the proxies to fully utilize their capacity and preventing (or at least delaying) their discovery by censors. We present a practical system that lays out a design and analytical model that balances these factors},
1852 www_section = {government censorship, Proximax, proxy}, 1852 www_section = {government censorship, Proximax, proxy},
1853 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/FC\%2711\%20-\%20Proximax.pdf}, 1853 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/FC\%2711\%20-\%20Proximax.pdf},
1854 url = {https://bibliography.gnunet.org}, 1854 url = {https://bibliography.gnunet.org},
1855 author = {Kirill Levchenko and Damon McCoy} 1855 author = {Kirill Levchenko and Damon McCoy}
1856} 1856}
@@ -1874,7 +1874,7 @@ private mechanism, will only gain a negligible advantage (up to a privacy parame
1874 abstract = {This paper describes a new secure DHT routing algorithm for open, decentralized P2P networks operating in a restricted-route environment with malicious participants. We have implemented our routing algorithm and have evaluated its performance under various topologies and in the presence of malicious peers. For small-world topologies, our algorithm provides significantly better performance when compared to existing methods. In more densely connected topologies, our performance is better than or on par with other designs}, 1874 abstract = {This paper describes a new secure DHT routing algorithm for open, decentralized P2P networks operating in a restricted-route environment with malicious participants. We have implemented our routing algorithm and have evaluated its performance under various topologies and in the presence of malicious peers. For small-world topologies, our algorithm provides significantly better performance when compared to existing methods. In more densely connected topologies, our performance is better than or on par with other designs},
1875 www_section = {distributed hash table, GNUnet, R5N, routing}, 1875 www_section = {distributed hash table, GNUnet, R5N, routing},
1876 www_tags = selected, 1876 www_tags = selected,
1877 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/nss2011.pdf}, 1877 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/nss2011.pdf},
1878 url = {https://bibliography.gnunet.org}, 1878 url = {https://bibliography.gnunet.org},
1879 author = {Nathan S Evans and Christian Grothoff} 1879 author = {Nathan S Evans and Christian Grothoff}
1880} 1880}
@@ -1891,7 +1891,7 @@ In this paper, we analyze critically the notion of differential privacy in light
1891privacy and leakage, due to the graph symmetries induced by the adjacency relation. Furthermore, we consider the utility of the randomized answer, which measures its expected degree of accuracy. We focus on certain kinds of utility functions called {\textquotedblleft}binary{\textquotedblright}, which have a close correspondence with the R{\'e}nyi min mutual information. Again, it turns out that there can be a tight correspondence between differential privacy and utility, depending on the symmetries induced by the adjacency relation and by the query. Depending on these symmetries we can also build an optimal-utility randomization mechanism while preserving the required level of differential privacy. Our main contribution is a study of the kind of structures that can be induced by the adjacency relation and the query, and how to use them to derive bounds on the leakage and achieve the optimal utility}, 1891privacy and leakage, due to the graph symmetries induced by the adjacency relation. Furthermore, we consider the utility of the randomized answer, which measures its expected degree of accuracy. We focus on certain kinds of utility functions called {\textquotedblleft}binary{\textquotedblright}, which have a close correspondence with the R{\'e}nyi min mutual information. Again, it turns out that there can be a tight correspondence between differential privacy and utility, depending on the symmetries induced by the adjacency relation and by the query. Depending on these symmetries we can also build an optimal-utility randomization mechanism while preserving the required level of differential privacy. Our main contribution is a study of the kind of structures that can be induced by the adjacency relation and the query, and how to use them to derive bounds on the leakage and achieve the optimal utility},
1892 isbn = {978-3-642-22011-1}, 1892 isbn = {978-3-642-22011-1},
1893 url = {http://dl.acm.org/citation.cfm?id=2027223.2027228}, 1893 url = {http://dl.acm.org/citation.cfm?id=2027223.2027228},
1894 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DifferentialPrivacy2011Alvim.pdf}, 1894 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DifferentialPrivacy2011Alvim.pdf},
1895 www_section = unsorted, 1895 www_section = unsorted,
1896 author = {Alvim, M{\'a}rio S. and Andr{\'e}s, Miguel E.} 1896 author = {Alvim, M{\'a}rio S. and Andr{\'e}s, Miguel E.}
1897} 1897}
@@ -1906,7 +1906,7 @@ privacy and leakage, due to the graph symmetries induced by the adjacency relati
1906 journal = {unknown}, 1906 journal = {unknown},
1907 issn = {2011/232}, 1907 issn = {2011/232},
1908 url = {http://eprint.iacr.org/2011/232}, 1908 url = {http://eprint.iacr.org/2011/232},
1909 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Brumley\%20\%26\%20Tuveri\%20-\%20Timing\%20Attacks.pdf}, 1909 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Brumley\%20\%26\%20Tuveri\%20-\%20Timing\%20Attacks.pdf},
1910 author = {Billy Bob Brumley and Nicola Tuveri} 1910 author = {Billy Bob Brumley and Nicola Tuveri}
1911} 1911}
1912@conference {2011_12, 1912@conference {2011_12,
@@ -1918,7 +1918,7 @@ privacy and leakage, due to the graph symmetries induced by the adjacency relati
1918 abstract = {There's a lot of buzz out there about "replacing" Facebook with a privacy-enhanced, decentralized, ideally open source something. In this talk we'll focus on how much privacy we should plan for (specifically about how we cannot entrust our privacy to modern virtual machine technology) and the often underestimated problem of getting such a monster network to function properly. These issues can be considered together or separately: Even if you're not as concerned about privacy as we are, the scalability problem still persists }, 1918 abstract = {There's a lot of buzz out there about "replacing" Facebook with a privacy-enhanced, decentralized, ideally open source something. In this talk we'll focus on how much privacy we should plan for (specifically about how we cannot entrust our privacy to modern virtual machine technology) and the often underestimated problem of getting such a monster network to function properly. These issues can be considered together or separately: Even if you're not as concerned about privacy as we are, the scalability problem still persists },
1919 www_section = {GNUnet, privacy, social networks}, 1919 www_section = {GNUnet, privacy, social networks},
1920 url = {https://secushare.org/2011-FSW-Scalability-Paranoia}, 1920 url = {https://secushare.org/2011-FSW-Scalability-Paranoia},
1921 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/2011-FSW-Scalability-Paranoia.pdf}, 1921 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/2011-FSW-Scalability-Paranoia.pdf},
1922 author = {Carlo v. Loesch and Gabor X Toth and Mathias Baumann} 1922 author = {Carlo v. Loesch and Gabor X Toth and Mathias Baumann}
1923} 1923}
1924@article {Murillo:2011:SCT:1938287.1938323, 1924@article {Murillo:2011:SCT:1938287.1938323,
@@ -1936,7 +1936,7 @@ privacy and leakage, due to the graph symmetries induced by the adjacency relati
1936 issn = {0924-669X}, 1936 issn = {0924-669X},
1937 doi = {10.1007/s10489-009-0178-7}, 1937 doi = {10.1007/s10489-009-0178-7},
1938 url = {http://dx.doi.org/10.1007/s10489-009-0178-7}, 1938 url = {http://dx.doi.org/10.1007/s10489-009-0178-7},
1939 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Applied\%20Intelligence\%20-\%20Combinatorial\%20Auctions.pdf}, 1939 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Applied\%20Intelligence\%20-\%20Combinatorial\%20Auctions.pdf},
1940 author = {Murillo, Javier and Mu{\~n}oz, V{\'\i}ctor and Busquets, D{\'\i}dac and L{\'o}pez, Beatriz} 1940 author = {Murillo, Javier and Mu{\~n}oz, V{\'\i}ctor and Busquets, D{\'\i}dac and L{\'o}pez, Beatriz}
1941} 1941}
1942@article {2011_13, 1942@article {2011_13,
@@ -1965,7 +1965,7 @@ includes methods for establishing social relations and for sharing resources. Th
1965We analyzed the security of our protocols by developing formal definitions of the aforementioned security properties and by verifying them using ProVerif, an automated theorem prover for cryptographic protocols. Finally, we built a prototypical implementation and conducted an experimental evaluation to demonstrate the efficiency and the scalability of our framework}, 1965We analyzed the security of our protocols by developing formal definitions of the aforementioned security properties and by verifying them using ProVerif, an automated theorem prover for cryptographic protocols. Finally, we built a prototypical implementation and conducted an experimental evaluation to demonstrate the efficiency and the scalability of our framework},
1966 www_section = {API, online-social-networks, security}, 1966 www_section = {API, online-social-networks, security},
1967 url = {http://www.lbs.cs.uni-saarland.de/publications/sapi.pdf }, 1967 url = {http://www.lbs.cs.uni-saarland.de/publications/sapi.pdf },
1968 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NDSS\%2711\%20-\%20Security\%20API\%20for\%20Distributed\%20Social\%20Networks.pdf}, 1968 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NDSS\%2711\%20-\%20Security\%20API\%20for\%20Distributed\%20Social\%20Networks.pdf},
1969 author = {Michael Backes and Maffei, Matteo and Pecina, Kim} 1969 author = {Michael Backes and Maffei, Matteo and Pecina, Kim}
1970} 1970}
1971@conference {DBLP:conf/sigecom/GhoshR11, 1971@conference {DBLP:conf/sigecom/GhoshR11,
@@ -1991,7 +1991,7 @@ In this paper, we embrace the social aspects of the Web 2.0 by considering a nov
1991 isbn = {978-3-642-24549-7}, 1991 isbn = {978-3-642-24549-7},
1992 doi = {10.1007/978-3-642-24550-3_16}, 1992 doi = {10.1007/978-3-642-24550-3_16},
1993 url = {http://dx.doi.org/10.1007/978-3-642-24550-3_16}, 1993 url = {http://dx.doi.org/10.1007/978-3-642-24550-3_16},
1994 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SocialMarket2011Frey.pdf}, 1994 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SocialMarket2011Frey.pdf},
1995 www_section = unsorted, 1995 www_section = unsorted,
1996 author = {Frey, Davide and J{\'e}gou, Arnaud and Kermarrec, Anne-Marie}, 1996 author = {Frey, Davide and J{\'e}gou, Arnaud and Kermarrec, Anne-Marie},
1997 editor = {D{\'e}fago, Xavier and Petit, Franck and Villain, Vincent} 1997 editor = {D{\'e}fago, Xavier and Petit, Franck and Villain, Vincent}
@@ -2009,7 +2009,7 @@ reduced by a factor of 2 in the median case.
2009Such information leaks from a single Tor circuit can be combined over multiple connections to exactly identify a user's guard relay(s). Finally, we are also able to link two connections from the same initiator with a crossover error rate of less 2009Such information leaks from a single Tor circuit can be combined over multiple connections to exactly identify a user's guard relay(s). Finally, we are also able to link two connections from the same initiator with a crossover error rate of less
2010than 1.5\% in under 5 minutes. Our attacks are also more accurate and require fewer resources than previous attacks on Tor}, 2010than 1.5\% in under 5 minutes. Our attacks are also more accurate and require fewer resources than previous attacks on Tor},
2011 www_section = {anonymity, attacks, throughput}, 2011 www_section = {anonymity, attacks, throughput},
2012 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CCS\%2711\%20-\%20Throughput-fingerprinting.pdf}, 2012 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CCS\%2711\%20-\%20Throughput-fingerprinting.pdf},
2013 url = {https://bibliography.gnunet.org}, 2013 url = {https://bibliography.gnunet.org},
2014 author = {Prateek Mittal and Ahmed Khurshid and Joshua Juen and Matthew Caesar and Borisov, Nikita} 2014 author = {Prateek Mittal and Ahmed Khurshid and Joshua Juen and Matthew Caesar and Borisov, Nikita}
2015} 2015}
@@ -2023,7 +2023,7 @@ than 1.5\% in under 5 minutes. Our attacks are also more accurate and require fe
2023scalable approach for flow correlation than passive traffic analysis. Previous designs of scalable watermarks, however, were subject to multi-flow attacks. They also introduced delays too large to be used in most environments. We design SWIRL, a Scalable Watermark that is Invisible and Resilient to packet Losses. SWIRL is the first watermark that is practical to use for large-scale traffic analysis. SWIRL uses a flow-dependent approach to resist multi-flow 2023scalable approach for flow correlation than passive traffic analysis. Previous designs of scalable watermarks, however, were subject to multi-flow attacks. They also introduced delays too large to be used in most environments. We design SWIRL, a Scalable Watermark that is Invisible and Resilient to packet Losses. SWIRL is the first watermark that is practical to use for large-scale traffic analysis. SWIRL uses a flow-dependent approach to resist multi-flow
2024attacks, marking each flow with a different pattern. SWIRL is robust to packet losses and network jitter, yet it introduces only small delays that are invisible to both benign users and determined adversaries. We analyze the performance of SWIRL both analytically and on the PlanetLab testbed, demonstrating very low error rates. We consider applications of SWIRL to stepping stone detection and linking anonymous communication. We also propose a novel application of watermarks to defend against congestion attacks on Tor}, 2024attacks, marking each flow with a different pattern. SWIRL is robust to packet losses and network jitter, yet it introduces only small delays that are invisible to both benign users and determined adversaries. We analyze the performance of SWIRL both analytically and on the PlanetLab testbed, demonstrating very low error rates. We consider applications of SWIRL to stepping stone detection and linking anonymous communication. We also propose a novel application of watermarks to defend against congestion attacks on Tor},
2025 www_section = {anonymity, SWIRL, traffic analysis, watermarking}, 2025 www_section = {anonymity, SWIRL, traffic analysis, watermarking},
2026 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NDSS11-2.pdf}, 2026 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NDSS11-2.pdf},
2027 url = {https://bibliography.gnunet.org}, 2027 url = {https://bibliography.gnunet.org},
2028 author = {Amir Houmansadr and Borisov, Nikita} 2028 author = {Amir Houmansadr and Borisov, Nikita}
2029} 2029}
@@ -2036,7 +2036,7 @@ attacks, marking each flow with a different pattern. SWIRL is robust to packet l
2036 abstract = {In this paper, we present Telex, a new approach to resisting state-level Internet censorship. Rather than attempting to win the cat-and-mouse game of finding open proxies, we leverage censors' unwillingness to completely block day-to-day Internet access. In effect, Telex converts innocuous, unblocked websites into proxies, without their explicit collaboration. We envision that friendly ISPs would deploy Telex stations on paths between censors' networks and popular, uncensored Internet destinations. Telex stations would monitor seemingly innocuous flows for a special {\textquotedblleft}tag{\textquotedblright} and transparently divert them to a forbidden website or service instead. We propose a new cryptographic scheme based on elliptic curves for tagging TLS handshakes such that the tag is visible to a Telex 2036 abstract = {In this paper, we present Telex, a new approach to resisting state-level Internet censorship. Rather than attempting to win the cat-and-mouse game of finding open proxies, we leverage censors' unwillingness to completely block day-to-day Internet access. In effect, Telex converts innocuous, unblocked websites into proxies, without their explicit collaboration. We envision that friendly ISPs would deploy Telex stations on paths between censors' networks and popular, uncensored Internet destinations. Telex stations would monitor seemingly innocuous flows for a special {\textquotedblleft}tag{\textquotedblright} and transparently divert them to a forbidden website or service instead. We propose a new cryptographic scheme based on elliptic curves for tagging TLS handshakes such that the tag is visible to a Telex
2037station but not to a censor. In addition, we use our tagging scheme to build a protocol that allows clients to connect to Telex stations while resisting both passive and active attacks. We also present a proof-of-concept implementation that demonstrates the feasibility of our system}, 2037station but not to a censor. In addition, we use our tagging scheme to build a protocol that allows clients to connect to Telex stations while resisting both passive and active attacks. We also present a proof-of-concept implementation that demonstrates the feasibility of our system},
2038 www_section = {anticensorship, network infrastructure state-level censorship, proxy, telex}, 2038 www_section = {anticensorship, network infrastructure state-level censorship, proxy, telex},
2039 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Telex\%3A\%20Anticensorship\%20in\%20the\%20Network\%20Infrastructure.pdf}, 2039 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Telex\%3A\%20Anticensorship\%20in\%20the\%20Network\%20Infrastructure.pdf},
2040 url = {https://bibliography.gnunet.org}, 2040 url = {https://bibliography.gnunet.org},
2041 author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman} 2041 author = {Eric Wustrow and Scott Wolchok and Ian Goldberg and J. Alex Halderman}
2042} 2042}
@@ -2050,7 +2050,7 @@ station but not to a censor. In addition, we use our tagging scheme to build a p
2050 address = {Chicago, IL, United States}, 2050 address = {Chicago, IL, United States},
2051 abstract = {We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on anonymous communication, and in particular onion routing, although we expect the approach to apply more broadly. This paper provides two main contributions. First, we present a novel model to consider the various security concerns for route selection in anonymity networks when users vary their trust over parts of the network. Second, to show the usefulness of our model, we present as an example a new algorithm to select paths in onion routing. We analyze its effectiveness against deanonymization and other information leaks, and particularly how it fares in our model versus existing algorithms, which do not consider trust. In contrast to those, we find that our trust-based routing strategy can protect anonymity against an adversary capable of attacking a significant fraction of the network}, 2051 abstract = {We introduce a novel model of routing security that incorporates the ordinarily overlooked variations in trust that users have for different parts of the network. We focus on anonymous communication, and in particular onion routing, although we expect the approach to apply more broadly. This paper provides two main contributions. First, we present a novel model to consider the various security concerns for route selection in anonymity networks when users vary their trust over parts of the network. Second, to show the usefulness of our model, we present as an example a new algorithm to select paths in onion routing. We analyze its effectiveness against deanonymization and other information leaks, and particularly how it fares in our model versus existing algorithms, which do not consider trust. In contrast to those, we find that our trust-based routing strategy can protect anonymity against an adversary capable of attacking a significant fraction of the network},
2052 www_section = {anonymous communication, onion routing, privacy, trust}, 2052 www_section = {anonymous communication, onion routing, privacy, trust},
2053 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CCS\%2711\%20-\%20Trust-based\%20Anonymous\%20Communication1.pdf}, 2053 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CCS\%2711\%20-\%20Trust-based\%20Anonymous\%20Communication1.pdf},
2054 url = {https://bibliography.gnunet.org}, 2054 url = {https://bibliography.gnunet.org},
2055 author = {Aaron Johnson and Paul Syverson and Roger Dingledine and Nick Mathewson} 2055 author = {Aaron Johnson and Paul Syverson and Roger Dingledine and Nick Mathewson}
2056} 2056}
@@ -2069,7 +2069,7 @@ station but not to a censor. In addition, we use our tagging scheme to build a p
2069 isbn = {978-1-4503-1013-0}, 2069 isbn = {978-1-4503-1013-0},
2070 doi = {10.1145/2068816.2068841}, 2070 doi = {10.1145/2068816.2068841},
2071 url = {http://doi.acm.org/10.1145/2068816.2068841}, 2071 url = {http://doi.acm.org/10.1145/2068816.2068841},
2072 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%2711\%20-\%20Uncovering\%20social\%20network\%20sybils.pdf}, 2072 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%2711\%20-\%20Uncovering\%20social\%20network\%20sybils.pdf},
2073 author = {Yang, Zhi and Wilson, Christo and Wang, Xiao and Gao, Tingting and Ben Y. Zhao and Dai, Yafei} 2073 author = {Yang, Zhi and Wilson, Christo and Wang, Xiao and Gao, Tingting and Ben Y. Zhao and Dai, Yafei}
2074} 2074}
2075@conference {wpes11-panchenko, 2075@conference {wpes11-panchenko,
@@ -2085,7 +2085,7 @@ fingerprinting solely based on volume, time, and direction of the traffic. As a
2085results of existing works on a given state-of-the-art dataset in Tor from 3\% to 55\% and in JAP from 20\% to 80\%. The datasets assume a closed-world with 775 websites only. In a next step, we transfer our findings to a more complex and realistic open-world scenario, i.e., recognition of several websites in a set of thousands of random unknown websites. To the best of our knowledge, this work is the first successful attack in the open-world scenario. We achieve a surprisingly high true positive rate of up to 73\% for a false positive rate of 0.05\%. Finally, we show preliminary results of a proof-of-concept implementation that applies camouflage as a countermeasure to hamper the fingerprinting attack. For 2085results of existing works on a given state-of-the-art dataset in Tor from 3\% to 55\% and in JAP from 20\% to 80\%. The datasets assume a closed-world with 775 websites only. In a next step, we transfer our findings to a more complex and realistic open-world scenario, i.e., recognition of several websites in a set of thousands of random unknown websites. To the best of our knowledge, this work is the first successful attack in the open-world scenario. We achieve a surprisingly high true positive rate of up to 73\% for a false positive rate of 0.05\%. Finally, we show preliminary results of a proof-of-concept implementation that applies camouflage as a countermeasure to hamper the fingerprinting attack. For
2086JAP, the detection rate decreases from 80\% to 4\% and for Tor it drops from 55\% to about 3\%}, 2086JAP, the detection rate decreases from 80\% to 4\% and for Tor it drops from 55\% to about 3\%},
2087 www_section = {anonymous communication, pattern recognition, privacy, traffic analysis, website fingerprinting}, 2087 www_section = {anonymous communication, pattern recognition, privacy, traffic analysis, website fingerprinting},
2088 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WPES\%2711\%20-\%20Fingerprinting.pdf}, 2088 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WPES\%2711\%20-\%20Fingerprinting.pdf},
2089 url = {https://bibliography.gnunet.org}, 2089 url = {https://bibliography.gnunet.org},
2090 author = {Andriy Panchenko and Lukas Niessen and Andreas Zinnen and Thomas Engel} 2090 author = {Andriy Panchenko and Lukas Niessen and Andreas Zinnen and Thomas Engel}
2091} 2091}
@@ -2102,7 +2102,7 @@ JAP, the detection rate decreases from 80\% to 4\% and for Tor it drops from 55\
2102 isbn = {978-1-4503-0797-0}, 2102 isbn = {978-1-4503-0797-0},
2103 doi = {10.1145/2018436.2018462}, 2103 doi = {10.1145/2018436.2018462},
2104 url = {http://doi.acm.org/10.1145/2018436.2018462}, 2104 url = {http://doi.acm.org/10.1145/2018436.2018462},
2105 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EppGooUye-SIGCOMM-11.pdf}, 2105 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EppGooUye-SIGCOMM-11.pdf},
2106 author = {Eppstein, David and Goodrich, Michael T. and Uyeda, Frank and Varghese, George} 2106 author = {Eppstein, David and Goodrich, Michael T. and Uyeda, Frank and Varghese, George}
2107} 2107}
2108@article {journals/corr/abs-1109-0971, 2108@article {journals/corr/abs-1109-0971,
@@ -2114,7 +2114,7 @@ JAP, the detection rate decreases from 80\% to 4\% and for Tor it drops from 55\
2114 abstract = {Distributed hash tables suffer from several security and privacy vulnerabilities, including the problem of Sybil attacks. Existing social network-based solutions to mitigate the Sybil attacks in DHT routing have a high state requirement and do not provide an adequate level of privacy. For instance, such techniques require a user to reveal their social network contacts. We design X-Vine, a protection mechanism for distributed hash tables that operates entirely by communicating over social network links. As with traditional peer-to-peer systems, X-Vine provides robustness, scalability, and a platform for innovation. The use of social network links for communication helps protect participant privacy and adds a new dimension of trust absent from previous designs. X-Vine is resilient to denial of service via Sybil attacks, and in fact is the first Sybil defense that requires only a logarithmic amount of state per node, making it suitable for large-scale and dynamic settings. X-Vine also helps protect the privacy of users social network contacts and keeps their IP addresses hidden from those outside of their social circle, providing a basis for pseudonymous communication. We first evaluate our design with analysis and simulations, using several real world large-scale social networking topologies. We show that the constraints of X-Vine allow the insertion of only a logarithmic number of Sybil identities per attack edge; we show this mitigates the impact of malicious attacks while not affecting the performance of honest nodes. Moreover, our algorithms are efficient, maintain low stretch, and avoid hot spots in the network. We validate our design with a PlanetLab implementation and a Facebook plugin}, 2114 abstract = {Distributed hash tables suffer from several security and privacy vulnerabilities, including the problem of Sybil attacks. Existing social network-based solutions to mitigate the Sybil attacks in DHT routing have a high state requirement and do not provide an adequate level of privacy. For instance, such techniques require a user to reveal their social network contacts. We design X-Vine, a protection mechanism for distributed hash tables that operates entirely by communicating over social network links. As with traditional peer-to-peer systems, X-Vine provides robustness, scalability, and a platform for innovation. The use of social network links for communication helps protect participant privacy and adds a new dimension of trust absent from previous designs. X-Vine is resilient to denial of service via Sybil attacks, and in fact is the first Sybil defense that requires only a logarithmic amount of state per node, making it suitable for large-scale and dynamic settings. X-Vine also helps protect the privacy of users social network contacts and keeps their IP addresses hidden from those outside of their social circle, providing a basis for pseudonymous communication. We first evaluate our design with analysis and simulations, using several real world large-scale social networking topologies. We show that the constraints of X-Vine allow the insertion of only a logarithmic number of Sybil identities per attack edge; we show this mitigates the impact of malicious attacks while not affecting the performance of honest nodes. Moreover, our algorithms are efficient, maintain low stretch, and avoid hot spots in the network. We validate our design with a PlanetLab implementation and a Facebook plugin},
2115 www_section = {anonymity, cryptography, dblp, distributed hash table, for:isp, routing, security, social-network-routing}, 2115 www_section = {anonymity, cryptography, dblp, distributed hash table, for:isp, routing, security, social-network-routing},
2116 url = {http://dblp.uni-trier.de/db/journals/corr/corr1109.html$\#$abs-1109-0971}, 2116 url = {http://dblp.uni-trier.de/db/journals/corr/corr1109.html$\#$abs-1109-0971},
2117 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CoRR\%20-\%20X-Vine.pdf}, 2117 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CoRR\%20-\%20X-Vine.pdf},
2118 author = {Prateek Mittal and Matthew Caesar and Borisov, Nikita} 2118 author = {Prateek Mittal and Matthew Caesar and Borisov, Nikita}
2119} 2119}
2120@conference {2011_16, 2120@conference {2011_16,
@@ -2126,7 +2126,7 @@ JAP, the detection rate decreases from 80\% to 4\% and for Tor it drops from 55\
2126In this paper, we develop algorithms which take a moderate amount of auxiliary information about a customer and infer this customer's transactions from temporal changes in the public outputs of a recommender system. Our inference attacks are passive and can be carried out by any Internet user. We evaluate their feasibility using public data from popular websites Hunch, Last.fm, LibraryThing, and Amazon}, 2126In this paper, we develop algorithms which take a moderate amount of auxiliary information about a customer and infer this customer's transactions from temporal changes in the public outputs of a recommender system. Our inference attacks are passive and can be carried out by any Internet user. We evaluate their feasibility using public data from popular websites Hunch, Last.fm, LibraryThing, and Amazon},
2127 www_section = {accuracy, Amazon, collaboration, collaborative filtering, commercial Web sites, consumer behaviour, Covariance matrix, customer transactions, data privacy, groupware, History, Hunch, Inference algorithms, inference attacks, inference mechanisms, information filtering, Internet, Internet user, Last.fm, Library Thing, privacy, privacy risks, recommender systems, Web sites}, 2127 www_section = {accuracy, Amazon, collaboration, collaborative filtering, commercial Web sites, consumer behaviour, Covariance matrix, customer transactions, data privacy, groupware, History, Hunch, Inference algorithms, inference attacks, inference mechanisms, information filtering, Internet, Internet user, Last.fm, Library Thing, privacy, privacy risks, recommender systems, Web sites},
2128 doi = {10.1109/SP.2011.40}, 2128 doi = {10.1109/SP.2011.40},
2129 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Youmightlike2011Calandrino.pdf}, 2129 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Youmightlike2011Calandrino.pdf},
2130 url = {https://bibliography.gnunet.org}, 2130 url = {https://bibliography.gnunet.org},
2131 author = {Calandrino, J.A. and Kilzer, A. and Narayanan, A. and Felten, E.W. and Shmatikov, V.} 2131 author = {Calandrino, J.A. and Kilzer, A. and Narayanan, A. and Felten, E.W. and Shmatikov, V.}
2132} 2132}
@@ -2138,7 +2138,7 @@ In this paper, we develop algorithms which take a moderate amount of auxiliary i
2138 type = {masters}, 2138 type = {masters},
2139 address = {M{\"u}nchen}, 2139 address = {M{\"u}nchen},
2140 www_section = {Botnet, distributed hash table, GNUnet}, 2140 www_section = {Botnet, distributed hash table, GNUnet},
2141 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Polot2010.pdf}, 2141 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Polot2010.pdf},
2142 url = {https://bibliography.gnunet.org}, 2142 url = {https://bibliography.gnunet.org},
2143 author = {Polot, Bartlomiej} 2143 author = {Polot, Bartlomiej}
2144} 2144}
@@ -2148,7 +2148,7 @@ In this paper, we develop algorithms which take a moderate amount of auxiliary i
2148 year = {2010}, 2148 year = {2010},
2149 month = sep, 2149 month = sep,
2150 www_section = {random walks, recommender system}, 2150 www_section = {random walks, recommender system},
2151 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/opodis10_HAL.pdf}, 2151 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/opodis10_HAL.pdf},
2152 url = {https://bibliography.gnunet.org}, 2152 url = {https://bibliography.gnunet.org},
2153 author = {Anne-Marie Kermarrec and Vincent Leroy and Afshin Moin and Christopher Thraves} 2153 author = {Anne-Marie Kermarrec and Vincent Leroy and Afshin Moin and Christopher Thraves}
2154} 2154}
@@ -2176,7 +2176,7 @@ In this paper, we develop algorithms which take a moderate amount of auxiliary i
2176method for establishing connections to peers behind NAT. The proposed method for Autonomous NAT traversal uses fake ICMP messages to initially contact the NATed peer. This paper presents how the method is supposed to work in theory, discusses some possible variations, introduces various concrete implementations of the proposed approach and evaluates empirical results of a measurement study designed to evaluate the efficacy of the idea in practice}, 2176method for establishing connections to peers behind NAT. The proposed method for Autonomous NAT traversal uses fake ICMP messages to initially contact the NATed peer. This paper presents how the method is supposed to work in theory, discusses some possible variations, introduces various concrete implementations of the proposed approach and evaluates empirical results of a measurement study designed to evaluate the efficacy of the idea in practice},
2177 www_section = {GNUnet, ICMP, NAT, P2P}, 2177 www_section = {GNUnet, ICMP, NAT, P2P},
2178 url = {http://grothoff.org/christian/pwnat.pdf}, 2178 url = {http://grothoff.org/christian/pwnat.pdf},
2179 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/pwnat.pdf}, 2179 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/pwnat.pdf},
2180 author = {Andreas M{\"u}ller and Nathan S Evans and Christian Grothoff and Samy Kamkar} 2180 author = {Andreas M{\"u}ller and Nathan S Evans and Christian Grothoff and Samy Kamkar}
2181} 2181}
2182@article {Yeoh:2008:BAB:1402298.1402307, 2182@article {Yeoh:2008:BAB:1402298.1402307,
@@ -2192,7 +2192,7 @@ method for establishing connections to peers behind NAT. The proposed method fo
2192 issn = {1076-9757}, 2192 issn = {1076-9757},
2193 doi = {10.1613/jair.2849}, 2193 doi = {10.1613/jair.2849},
2194 url = {http://www.jair.org/papers/paper2849.html}, 2194 url = {http://www.jair.org/papers/paper2849.html},
2195 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Journal\%20of\%20AI\%20-\%20BnB-ADOPT.pdf}, 2195 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Journal\%20of\%20AI\%20-\%20BnB-ADOPT.pdf},
2196 author = {Yeoh, William and Felner, Ariel and Koenig, Sven} 2196 author = {Yeoh, William and Felner, Ariel and Koenig, Sven}
2197} 2197}
2198@conference {incentives-fc10, 2198@conference {incentives-fc10,
@@ -2202,7 +2202,7 @@ method for establishing connections to peers behind NAT. The proposed method fo
2202 month = jan, 2202 month = jan,
2203 abstract = {Distributed anonymous communication networks like Tor depend on volunteers to donate their resources. However, the efforts of Tor volunteers have not grown as fast as the demands on the Tor network.We explore techniques to incentivize Tor users to relay Tor traffic too; if users contribute resources to the Tor overlay, they should receive faster service in return. In our design, the central Tor directory authorities measure performance and publish a list of Tor relays that should be given higher priority when establishing circuits. Simulations of our proposed design show that conforming users receive significant improvements in performance, in some cases experiencing twice the network throughput of selfish users who do not relay traffic for the Tor network}, 2203 abstract = {Distributed anonymous communication networks like Tor depend on volunteers to donate their resources. However, the efforts of Tor volunteers have not grown as fast as the demands on the Tor network.We explore techniques to incentivize Tor users to relay Tor traffic too; if users contribute resources to the Tor overlay, they should receive faster service in return. In our design, the central Tor directory authorities measure performance and publish a list of Tor relays that should be given higher priority when establishing circuits. Simulations of our proposed design show that conforming users receive significant improvements in performance, in some cases experiencing twice the network throughput of selfish users who do not relay traffic for the Tor network},
2204 www_section = {Tor}, 2204 www_section = {Tor},
2205 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/incentives-fc10.pdf}, 2205 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/incentives-fc10.pdf},
2206 url = {https://bibliography.gnunet.org}, 2206 url = {https://bibliography.gnunet.org},
2207 author = {Tsuen-Wan {\textquoteleft}{\textquoteleft}Johnny'' Ngan and Roger Dingledine and Dan S. Wallach}, 2207 author = {Tsuen-Wan {\textquoteleft}{\textquoteleft}Johnny'' Ngan and Roger Dingledine and Dan S. Wallach},
2208 editor = {Radu Sion} 2208 editor = {Radu Sion}
@@ -2233,7 +2233,7 @@ Beyond the theoretical interest in modeling KDFs, this work is intended to addre
2233(The HMAC-based scheme presented here, named HKDF, is being standardized by the IETF.)}, 2233(The HMAC-based scheme presented here, named HKDF, is being standardized by the IETF.)},
2234 www_section = {GNUnet, HKDF, HMAC, key derivation}, 2234 www_section = {GNUnet, HKDF, HMAC, key derivation},
2235 url = {http://eprint.iacr.org/2010/264}, 2235 url = {http://eprint.iacr.org/2010/264},
2236 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/264.pdf}, 2236 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/264.pdf},
2237 publisher = {unknown}, 2237 publisher = {unknown},
2238 author = {Hugo Krawczyk} 2238 author = {Hugo Krawczyk}
2239} 2239}
@@ -2248,7 +2248,7 @@ Beyond the theoretical interest in modeling KDFs, this work is intended to addre
2248 address = {Helsinki}, 2248 address = {Helsinki},
2249 abstract = {As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform's suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data}, 2249 abstract = {As the virtual world grows more complex, finding a standard way for storing data becomes increasingly important. Ideally, each data item would be brought into the computer system only once. References for data items need to be cryptographically verifiable, so the data can maintain its identity while being passed around. This way there will be only one copy of the users family photo album, while the user can use multiple tools to show or manipulate the album. Copies of users data could be stored on some of his family members computer, some of his computers, but also at some online services which he uses. When all actors operate over one replicated copy of the data, the system automatically avoids a single point of failure. Thus the data will not disappear with one computer breaking, or one service provider going out of business. One shared copy also makes it possible to delete a piece of data from all systems at once, on users request. In our research we tried to find a model that would make data manageable to users, and make it possible to have the same data stored at various locations. We studied three systems, Persona, Freenet, and GNUnet, that suggest different models for protecting user data. The main application areas of the systems studied include securing online social networks, providing anonymous web, and preventing censorship in file-sharing. Each of the systems studied store user data on machines belonging to third parties. The systems differ in measures they take to protect their users from data loss, forged information, censorship, and being monitored. All of the systems use cryptography to secure names used for the content, and to protect the data from outsiders. Based on the gained knowledge, we built a prototype platform called Peerscape, which stores user data in a synchronized, protected database. Data items themselves are protected with cryptography against forgery, but not encrypted as the focus has been disseminating the data directly among family and friends instead of letting third parties store the information. We turned the synchronizing database into peer-to-peer web by revealing its contents through an integrated http server. The REST-like http API supports development of applications in javascript. To evaluate the platform's suitability for application development we wrote some simple applications, including a public chat room, bittorrent site, and a flower growing game. During our early tests we came to the conclusion that using the platform for simple applications works well. As web standards develop further, writing applications for the platform should become easier. Any system this complex will have its problems, and we are not expecting our platform to replace the existing web, but are fairly impressed with the results and consider our work important from the perspective of managing user data},
2250 www_section = {content centric, ECRS, Freenet, GNUnet, P2P, Peerscape, Persona}, 2250 www_section = {content centric, ECRS, Freenet, GNUnet, P2P, Peerscape, Persona},
2251 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/twr-dp2pwa.pdf}, 2251 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/twr-dp2pwa.pdf},
2252 url = {https://bibliography.gnunet.org}, 2252 url = {https://bibliography.gnunet.org},
2253 author = {Toni Ruottu} 2253 author = {Toni Ruottu}
2254} 2254}
@@ -2270,7 +2270,7 @@ Beyond the theoretical interest in modeling KDFs, this work is intended to addre
2270 pages = {93--107}, 2270 pages = {93--107},
2271 abstract = {In 1977 Tore Dalenius articulated a desideratum for statistical databases: nothing about an individual should be learnable from the database that cannot be learned without access to the database. We give a general impossibility result showing that a natural formalization of Dalenius' goal cannot be achieved if the database is useful. The key obstacle is the side information that may be available to an adversary. Our results hold under very general conditions regarding the database, the notion of privacy violation, and the notion of utility.</p> <p>Contrary to intuition, a variant of the result threatens the privacy even of someone not in the database. This state of affairs motivated the notion of differential privacy [15, 16], a strong ad omnia privacy which, intuitively, captures the increased risk to one's privacy incurred by participating in a database}, 2271 abstract = {In 1977 Tore Dalenius articulated a desideratum for statistical databases: nothing about an individual should be learnable from the database that cannot be learned without access to the database. We give a general impossibility result showing that a natural formalization of Dalenius' goal cannot be achieved if the database is useful. The key obstacle is the side information that may be available to an adversary. Our results hold under very general conditions regarding the database, the notion of privacy violation, and the notion of utility.</p> <p>Contrary to intuition, a variant of the result threatens the privacy even of someone not in the database. This state of affairs motivated the notion of differential privacy [15, 16], a strong ad omnia privacy which, intuitively, captures the increased risk to one's privacy incurred by participating in a database},
2272 url = {http://research.microsoft.com/apps/pubs/default.aspx?id=135704}, 2272 url = {http://research.microsoft.com/apps/pubs/default.aspx?id=135704},
2273 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DisclousrePrevention2010Dwork.pdf}, 2273 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DisclousrePrevention2010Dwork.pdf},
2274 www_section = unsorted, 2274 www_section = unsorted,
2275 author = {Cynthia Dwork and Moni Naor} 2275 author = {Cynthia Dwork and Moni Naor}
2276} 2276}
@@ -2280,7 +2280,7 @@ Beyond the theoretical interest in modeling KDFs, this work is intended to addre
2280 month = dec, 2280 month = dec,
2281 school = {IRISA}, 2281 school = {IRISA},
2282 type = {phd}, 2282 type = {phd},
2283 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DistributingSocialApp2010Leroy.pdf}, 2283 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DistributingSocialApp2010Leroy.pdf},
2284 www_section = unsorted, 2284 www_section = unsorted,
2285 url = {https://bibliography.gnunet.org}, 2285 url = {https://bibliography.gnunet.org},
2286 author = {Vincent Leroy} 2286 author = {Vincent Leroy}
@@ -2298,7 +2298,7 @@ Beyond the theoretical interest in modeling KDFs, this work is intended to addre
2298 isbn = {978-3-642-14526-1}, 2298 isbn = {978-3-642-14526-1},
2299 doi = {10.1007/978-3-642-14527-8_12}, 2299 doi = {10.1007/978-3-642-14527-8_12},
2300 url = {http://dx.doi.org/10.1007/978-3-642-14527-8_12}, 2300 url = {http://dx.doi.org/10.1007/978-3-642-14527-8_12},
2301 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/drac-pet2010.pdf}, 2301 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/drac-pet2010.pdf},
2302 author = {Danezis, George and Claudia Diaz and Troncoso, Carmela and Laurie, Ben}, 2302 author = {Danezis, George and Claudia Diaz and Troncoso, Carmela and Laurie, Ben},
2303 editor = {Atallah, MikhailJ. and Hopper, Nicholas J} 2303 editor = {Atallah, MikhailJ. and Hopper, Nicholas J}
2304} 2304}
@@ -2312,7 +2312,7 @@ Beyond the theoretical interest in modeling KDFs, this work is intended to addre
2312process follows a geometric distribution. We then use this result to detect DHT attacks by comparing real peers' ID distributions to the theoretical one thanks to the Kullback-Leibler divergence. When an attack is detected, we propose countermeasures that progressively remove suspicious peers from the list of possible contacts to provide a safe DHT access. Evaluations show that our 2312process follows a geometric distribution. We then use this result to detect DHT attacks by comparing real peers' ID distributions to the theoretical one thanks to the Kullback-Leibler divergence. When an attack is detected, we propose countermeasures that progressively remove suspicious peers from the list of possible contacts to provide a safe DHT access. Evaluations show that our
2313method detects the most efficient attacks with a very small false-negative rate, while countermeasures successfully filter almost all malicious peers involved in an attack. Moreover, our solution completely fits the current design of the KAD network and introduces no network overhead}, 2313method detects the most efficient attacks with a very small false-negative rate, while countermeasures successfully filter almost all malicious peers involved in an attack. Moreover, our solution completely fits the current design of the KAD network and introduces no network overhead},
2314 www_section = {attack detection, attack mitigation, distributed hash table, IDs distribution, KAD, Sybil attack}, 2314 www_section = {attack detection, attack mitigation, distributed hash table, IDs distribution, KAD, Sybil attack},
2315 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/HotP2P\%2710\%20-\%20KAD\%20DHT\%20attack\%20mitigation.pdf}, 2315 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/HotP2P\%2710\%20-\%20KAD\%20DHT\%20attack\%20mitigation.pdf},
2316 url = {https://bibliography.gnunet.org}, 2316 url = {https://bibliography.gnunet.org},
2317 author = {Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier} 2317 author = {Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier}
2318} 2318}
@@ -2341,7 +2341,7 @@ method detects the most efficient attacks with a very small false-negative rate,
2341 organization = { ACM/IFIP/USENIX}, 2341 organization = { ACM/IFIP/USENIX},
2342 abstract = {While social networks provide news from old buddies, you can learn a lot more from people you do not know, but with whom you share many interests. We show in this paper how to build a network of anonymous social acquaintances using a gossip protocol we call Gossple, and how to leverage such a network to enhance navigation within Web 2.0 collaborative applications, {\`a} la LastFM and Delicious. Gossple nodes (users) periodically gossip digests of their interest profiles and compute their distances (in terms of interest) with respect to other nodes. This is achieved with little bandwidth and storage, fast convergence, and without revealing which profile is associated with which user. We evaluate Gossple on real traces from various Web 2.0 applications with hundreds of PlanetLab hosts and thousands of simulated nodes}, 2342 abstract = {While social networks provide news from old buddies, you can learn a lot more from people you do not know, but with whom you share many interests. We show in this paper how to build a network of anonymous social acquaintances using a gossip protocol we call Gossple, and how to leverage such a network to enhance navigation within Web 2.0 collaborative applications, {\`a} la LastFM and Delicious. Gossple nodes (users) periodically gossip digests of their interest profiles and compute their distances (in terms of interest) with respect to other nodes. This is achieved with little bandwidth and storage, fast convergence, and without revealing which profile is associated with which user. We evaluate Gossple on real traces from various Web 2.0 applications with hundreds of PlanetLab hosts and thousands of simulated nodes},
2343 www_section = {gossple, social networks}, 2343 www_section = {gossple, social networks},
2344 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/gossple2010Bertier.pdf}, 2344 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/gossple2010Bertier.pdf},
2345 url = {https://bibliography.gnunet.org}, 2345 url = {https://bibliography.gnunet.org},
2346 author = {Marin Bertier and Davide Frey and Rachid Guerraoui and Anne-Marie Kermarrec and Vincent Leroy} 2346 author = {Marin Bertier and Davide Frey and Rachid Guerraoui and Anne-Marie Kermarrec and Vincent Leroy}
2347} 2347}
@@ -2355,7 +2355,7 @@ method detects the most efficient attacks with a very small false-negative rate,
2355 abstract = {Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and maintained. The simplest redundancy scheme is replication, which however suffers from storage inefficiency. Another approach is erasure coding, which provides the same level of reliability as replication using a significantly smaller amount of storage. When redundant data are lost, they need to be replaced. While replacing replicated data consists in a simple copy, it becomes a complex operation with erasure codes: new data are produced performing a coding over some other available data. The amount of data to be read and coded is d times larger than the amount of data produced, where d, called repair degree, is larger than 1 and depends on the structure of the code. This implies that coding has a larger computational and I/O cost, which, for distributed storage systems, translates into increased network traffic. Participants of Peer-to-Peer systems often have ample storage and CPU power, but their network bandwidth may be limited. For these reasons existing coding techniques are not suitable for P2P storage. This work explores the design space between replication and the existing erasure codes. We propose and evaluate a new class of erasure codes, called Hierarchical Codes, which allows to reduce the network traffic due to maintenance without losing the benefits given by traditional erasure codes}, 2355 abstract = {Redundancy is the basic technique to provide reliability in storage systems consisting of multiple components. A redundancy scheme defines how the redundant data are produced and maintained. The simplest redundancy scheme is replication, which however suffers from storage inefficiency. Another approach is erasure coding, which provides the same level of reliability as replication using a significantly smaller amount of storage. When redundant data are lost, they need to be replaced. While replacing replicated data consists in a simple copy, it becomes a complex operation with erasure codes: new data are produced performing a coding over some other available data. The amount of data to be read and coded is d times larger than the amount of data produced, where d, called repair degree, is larger than 1 and depends on the structure of the code. This implies that coding has a larger computational and I/O cost, which, for distributed storage systems, translates into increased network traffic. Participants of Peer-to-Peer systems often have ample storage and CPU power, but their network bandwidth may be limited. For these reasons existing coding techniques are not suitable for P2P storage. This work explores the design space between replication and the existing erasure codes. We propose and evaluate a new class of erasure codes, called Hierarchical Codes, which allows to reduce the network traffic due to maintenance without losing the benefits given by traditional erasure codes},
2356 www_section = {dependability, erasure codes, peer-to-peer networking, reliability, storage}, 2356 www_section = {dependability, erasure codes, peer-to-peer networking, reliability, storage},
2357 doi = {10.1007/s12083-009-0044-8}, 2357 doi = {10.1007/s12083-009-0044-8},
2358 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Duminuco\%20\%26\%20Biersack\%20-\%20Hierarchical\%20Codes.pdf}, 2358 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Duminuco\%20\%26\%20Biersack\%20-\%20Hierarchical\%20Codes.pdf},
2359 url = {https://bibliography.gnunet.org}, 2359 url = {https://bibliography.gnunet.org},
2360 author = {Alessandro Duminuco and E W Biersack} 2360 author = {Alessandro Duminuco and E W Biersack}
2361} 2361}
@@ -2374,7 +2374,7 @@ outperforms methods that use only one type of social content. Second, we present
2374 isbn = {978-1-60558-799-8}, 2374 isbn = {978-1-60558-799-8},
2375 doi = {10.1145/1772690.1772875}, 2375 doi = {10.1145/1772690.1772875},
2376 url = {http://doi.acm.org/10.1145/1772690.1772875}, 2376 url = {http://doi.acm.org/10.1145/1772690.1772875},
2377 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/InterestsInference2010Wen.pdf}, 2377 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/InterestsInference2010Wen.pdf},
2378 author = {Wen, Zhen and Lin, Ching-Yung} 2378 author = {Wen, Zhen and Lin, Ching-Yung}
2379} 2379}
2380@article {tissec-latency-leak, 2380@article {tissec-latency-leak,
@@ -2388,7 +2388,7 @@ outperforms methods that use only one type of social content. Second, we present
2388 isbn = {978-1-59593-703-2}, 2388 isbn = {978-1-59593-703-2},
2389 doi = {10.1145/1315245.1315257}, 2389 doi = {10.1145/1315245.1315257},
2390 url = {http://portal.acm.org/citation.cfm?id=1315245.1315257}, 2390 url = {http://portal.acm.org/citation.cfm?id=1315245.1315257},
2391 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/tissec-latency-leak.pdf}, 2391 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/tissec-latency-leak.pdf},
2392 author = {Nicholas J. Hopper and Eugene Y. Vasserman and Eric Chan-Tin} 2392 author = {Nicholas J. Hopper and Eugene Y. Vasserman and Eric Chan-Tin}
2393} 2393}
2394@conference {DBLP:conf/tridentcom/NguyenRKFMB10, 2394@conference {DBLP:conf/tridentcom/NguyenRKFMB10,
@@ -2397,7 +2397,7 @@ outperforms methods that use only one type of social content. Second, we present
2397 year = {2010}, 2397 year = {2010},
2398 pages = {3--18}, 2398 pages = {3--18},
2399 www_section = {autonetkit, emulation, netkit, network, testbed, virtualization}, 2399 www_section = {autonetkit, emulation, netkit, network, testbed, virtualization},
2400 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/AutoNetkit_0.pdf}, 2400 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/AutoNetkit_0.pdf},
2401 url = {https://bibliography.gnunet.org}, 2401 url = {https://bibliography.gnunet.org},
2402 author = {Hung X. Nguyen and Roughan, Matthew and Knight, Simon and Nick Falkner and Maennel, Olaf and Randy Bush} 2402 author = {Hung X. Nguyen and Roughan, Matthew and Knight, Simon and Nick Falkner and Maennel, Olaf and Randy Bush}
2403} 2403}
@@ -2412,7 +2412,7 @@ outperforms methods that use only one type of social content. Second, we present
2412 abstract = {A well known problem in peer-to-peer overlays is that no single entity has control over the software, hardware and configuration of peers. Thus, each peer can selfishly adapt its behaviour to maximise its benefit from the overlay. This thesis is concerned with the modelling and design of incentive mechanisms for QoS-overlays: resource allocation protocols that provide strategic peers with participation incentives, while at the same time optimising the performance of the peer-to-peer distribution overlay. The contributions of this thesis are as follows. First, we present PledgeRoute, a novel contribution accounting system that can be used, along with a set of reciprocity policies, as an incentive mechanism to encourage peers to contribute resources even when users are not actively consuming overlay services. This mechanism uses a decentralised credit network, is resilient to sybil attacks, and allows peers to achieve time and space deferred contribution reciprocity. Then, we present a novel, QoS-aware resource allocation model based on Vickrey auctions that uses PledgeRoute as a substrate. It acts as an incentive mechanism by providing efficient overlay construction, while at the same time allocating increasing service quality to those peers that contribute more to the network. The model is then applied to lagsensitive chunk swarming, and some of its properties are explored for different peer delay distributions. When considering QoS overlays deployed over the best-effort Internet, the quality received by a client cannot be adjudicated completely to either its serving peer or the intervening network between them. By drawing parallels between this situation and well-known hidden action situations in microeconomics, we propose a novel scheme to ensure adherence to advertised QoS levels. We then apply it to delay-sensitive chunk distribution overlays and present the optimal contract payments required, along with a method for QoS contract enforcement through reciprocative strategies. We also present a probabilistic model for application-layer delay as a function of the prevailing network conditions. Finally, we address the incentives of managed overlays, and the prediction of their behaviour. We propose two novel models of multihoming managed overlay incentives in which overlays can freely allocate their traffic flows between different ISPs. One is obtained by optimising an overlay utility function with desired properties, while the other is designed for data-driven least-squares fitting of the cross elasticity of demand. This last model is then used to solve for ISP profit maximisation}, 2412 abstract = {A well known problem in peer-to-peer overlays is that no single entity has control over the software, hardware and configuration of peers. Thus, each peer can selfishly adapt its behaviour to maximise its benefit from the overlay. This thesis is concerned with the modelling and design of incentive mechanisms for QoS-overlays: resource allocation protocols that provide strategic peers with participation incentives, while at the same time optimising the performance of the peer-to-peer distribution overlay. The contributions of this thesis are as follows. First, we present PledgeRoute, a novel contribution accounting system that can be used, along with a set of reciprocity policies, as an incentive mechanism to encourage peers to contribute resources even when users are not actively consuming overlay services. This mechanism uses a decentralised credit network, is resilient to sybil attacks, and allows peers to achieve time and space deferred contribution reciprocity. Then, we present a novel, QoS-aware resource allocation model based on Vickrey auctions that uses PledgeRoute as a substrate. It acts as an incentive mechanism by providing efficient overlay construction, while at the same time allocating increasing service quality to those peers that contribute more to the network. The model is then applied to lagsensitive chunk swarming, and some of its properties are explored for different peer delay distributions. When considering QoS overlays deployed over the best-effort Internet, the quality received by a client cannot be adjudicated completely to either its serving peer or the intervening network between them. By drawing parallels between this situation and well-known hidden action situations in microeconomics, we propose a novel scheme to ensure adherence to advertised QoS levels. We then apply it to delay-sensitive chunk distribution overlays and present the optimal contract payments required, along with a method for QoS contract enforcement through reciprocative strategies. We also present a probabilistic model for application-layer delay as a function of the prevailing network conditions. Finally, we address the incentives of managed overlays, and the prediction of their behaviour. We propose two novel models of multihoming managed overlay incentives in which overlays can freely allocate their traffic flows between different ISPs. One is obtained by optimising an overlay utility function with desired properties, while the other is designed for data-driven least-squares fitting of the cross elasticity of demand. This last model is then used to solve for ISP profit maximisation},
2413 www_section = {BitTorrent, Freeloading, game theory, incentives, PeerLive, prices, QoS}, 2413 www_section = {BitTorrent, Freeloading, game theory, incentives, PeerLive, prices, QoS},
2414 url = {http://eprints.ucl.ac.uk/19490/}, 2414 url = {http://eprints.ucl.ac.uk/19490/},
2415 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/19490.pdf}, 2415 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/19490.pdf},
2416 author = {Raul Leonardo Landa Gamiochipi} 2416 author = {Raul Leonardo Landa Gamiochipi}
2417} 2417}
2418@article {2010_9, 2418@article {2010_9,
@@ -2423,7 +2423,7 @@ outperforms methods that use only one type of social content. Second, we present
2423 journal = {unknown}, 2423 journal = {unknown},
2424 doi = {10.1504/IJAHUC.2010.032995}, 2424 doi = {10.1504/IJAHUC.2010.032995},
2425 url = {http://www.ingentaconnect.com/content/ind/ijahuc/2010/00000005/00000004/art00002;jsessionid=kcpun0o76hoe.alexandra}, 2425 url = {http://www.ingentaconnect.com/content/ind/ijahuc/2010/00000005/00000004/art00002;jsessionid=kcpun0o76hoe.alexandra},
2426 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Malugo.pdf}, 2426 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Malugo.pdf},
2427 author = {Chan, Yu-Wei and Ho, Tsung-Hsuan and Shih, Po-Chi and Chung, Yeh-Ching} 2427 author = {Chan, Yu-Wei and Ho, Tsung-Hsuan and Shih, Po-Chi and Chung, Yeh-Ching}
2428} 2428}
2429@conference {DBLP:conf/tridentcom/AlbrechtH10, 2429@conference {DBLP:conf/tridentcom/AlbrechtH10,
@@ -2432,7 +2432,7 @@ outperforms methods that use only one type of social content. Second, we present
2432 year = {2010}, 2432 year = {2010},
2433 pages = {401--411}, 2433 pages = {401--411},
2434 www_section = {distributed applications, emulation, GENI, PlanetLab, testbed}, 2434 www_section = {distributed applications, emulation, GENI, PlanetLab, testbed},
2435 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/gush.pdf}, 2435 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/gush.pdf},
2436 url = {https://bibliography.gnunet.org}, 2436 url = {https://bibliography.gnunet.org},
2437 author = {Jeannie R. Albrecht and Danny Yuxing Huang} 2437 author = {Jeannie R. Albrecht and Danny Yuxing Huang}
2438} 2438}
@@ -2442,7 +2442,7 @@ outperforms methods that use only one type of social content. Second, we present
2442 year = {2010}, 2442 year = {2010},
2443 pages = {69--83}, 2443 pages = {69--83},
2444 www_section = {emulation, P2P, testbed}, 2444 www_section = {emulation, P2P, testbed},
2445 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/A_Novel_Testbed_for_P2P_Networks.pdf}, 2445 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/A_Novel_Testbed_for_P2P_Networks.pdf},
2446 url = {https://bibliography.gnunet.org}, 2446 url = {https://bibliography.gnunet.org},
2447 author = {Pekka H. J. Per{\"a}l{\"a} and Jori P. Paananen and Milton Mukhopadhyay and Jukka-Pekka Laulajainen} 2447 author = {Pekka H. J. Per{\"a}l{\"a} and Jori P. Paananen and Milton Mukhopadhyay and Jukka-Pekka Laulajainen}
2448} 2448}
@@ -2461,7 +2461,7 @@ outperforms methods that use only one type of social content. Second, we present
2461 isbn = {3-642-11321-4, 978-3-642-11321-5}, 2461 isbn = {3-642-11321-4, 978-3-642-11321-5},
2462 doi = {http://dx.doi.org/10.1007/978-3-642-11322-2_22}, 2462 doi = {http://dx.doi.org/10.1007/978-3-642-11322-2_22},
2463 url = {http://dl.acm.org/citation.cfm?id=2018057.2018085}, 2463 url = {http://dl.acm.org/citation.cfm?id=2018057.2018085},
2464 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ICDCN\%2710\%20-\%20Poisoning\%20the\%20Kad\%20Network.pdf}, 2464 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ICDCN\%2710\%20-\%20Poisoning\%20the\%20Kad\%20Network.pdf},
2465 author = {Thomas Locher and Mysicka, David and Stefan Schmid and Roger Wattenhofer} 2465 author = {Thomas Locher and Mysicka, David and Stefan Schmid and Roger Wattenhofer}
2466} 2466}
2467@conference {FessiIPTComm2010, 2467@conference {FessiIPTComm2010,
@@ -2471,7 +2471,7 @@ outperforms methods that use only one type of social content. Second, we present
2471 month = {August}, 2471 month = {August},
2472 pages = {141--152}, 2472 pages = {141--152},
2473 address = {Munich, Germany}, 2473 address = {Munich, Germany},
2474 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fessi_iptcomm_2010.pdf}, 2474 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fessi_iptcomm_2010.pdf},
2475 url = {https://bibliography.gnunet.org}, 2475 url = {https://bibliography.gnunet.org},
2476 www_section = unsorted, 2476 www_section = unsorted,
2477 author = {Fessi, Ali and Nathan S Evans and Heiko Niedermayer and Ralph Holz} 2477 author = {Fessi, Ali and Nathan S Evans and Heiko Niedermayer and Ralph Holz}
@@ -2489,7 +2489,7 @@ outperforms methods that use only one type of social content. Second, we present
2489 issn = {0146-4833}, 2489 issn = {0146-4833},
2490 doi = {10.1145/1851275.1851198}, 2490 doi = {10.1145/1851275.1851198},
2491 url = {http://doi.acm.org/10.1145/1851275.1851198}, 2491 url = {http://doi.acm.org/10.1145/1851275.1851198},
2492 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/oneswarm_SIGCOMM.pdf}, 2492 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/oneswarm_SIGCOMM.pdf},
2493 author = {Isdal, Tomas and Piatek, Michael and Krishnamurthy, Arvind and Anderson, Thomas} 2493 author = {Isdal, Tomas and Piatek, Michael and Krishnamurthy, Arvind and Anderson, Thomas}
2494} 2494}
2495@article {1667071, 2495@article {1667071,
@@ -2505,7 +2505,7 @@ outperforms methods that use only one type of social content. Second, we present
2505 www_section = {keywords, privacy, search, text mining}, 2505 www_section = {keywords, privacy, search, text mining},
2506 issn = {1533-5399}, 2506 issn = {1533-5399},
2507 doi = {http://doi.acm.org/10.1145/1667067.1667071}, 2507 doi = {http://doi.acm.org/10.1145/1667067.1667071},
2508 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/privacy_preserving_similarity.pdf}, 2508 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/privacy_preserving_similarity.pdf},
2509 url = {https://bibliography.gnunet.org}, 2509 url = {https://bibliography.gnunet.org},
2510 author = {Pang, Hweehwa and Shen, Jialie and Krishnan, Ramayya} 2510 author = {Pang, Hweehwa and Shen, Jialie and Krishnan, Ramayya}
2511} 2511}
@@ -2521,7 +2521,7 @@ outperforms methods that use only one type of social content. Second, we present
2521 isbn = {978-1-60558-945-9}, 2521 isbn = {978-1-60558-945-9},
2522 doi = {10.1145/1739041.1739059}, 2522 doi = {10.1145/1739041.1739059},
2523 url = {http://doi.acm.org/10.1145/1739041.1739059}, 2523 url = {http://doi.acm.org/10.1145/1739041.1739059},
2524 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PrivateRecordMatching2010Inan.pdf}, 2524 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PrivateRecordMatching2010Inan.pdf},
2525 author = {Inan, Ali and Kantarcioglu, Murat and Ghinita, Gabriel and Bertino, Elisa} 2525 author = {Inan, Ali and Kantarcioglu, Murat and Ghinita, Gabriel and Bertino, Elisa}
2526} 2526}
2527@conference {1827425, 2527@conference {1827425,
@@ -2537,7 +2537,7 @@ outperforms methods that use only one type of social content. Second, we present
2537 isbn = {978-1-60558-927-5}, 2537 isbn = {978-1-60558-927-5},
2538 doi = {10.1145/1827418.1827425}, 2538 doi = {10.1145/1827418.1827425},
2539 url = {http://portal.acm.org/citation.cfm?id=1827418.1827425\&coll=portal\&dl=GUIDE$\#$}, 2539 url = {http://portal.acm.org/citation.cfm?id=1827418.1827425\&coll=portal\&dl=GUIDE$\#$},
2540 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DIP_2872.pdf}, 2540 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DIP_2872.pdf},
2541 author = {Tariq, Muhammad Adnan and Boris Koldehofe and Altaweel, Ala and Kurt Rothermel} 2541 author = {Tariq, Muhammad Adnan and Boris Koldehofe and Altaweel, Ala and Kurt Rothermel}
2542} 2542}
2543@article {1672334, 2543@article {1672334,
@@ -2554,7 +2554,7 @@ outperforms methods that use only one type of social content. Second, we present
2554 issn = {0146-4833}, 2554 issn = {0146-4833},
2555 doi = {10.1145/1672308.1672334}, 2555 doi = {10.1145/1672308.1672334},
2556 url = {http://portal.acm.org/citation.cfm?doid=1672308.1672334$\#$}, 2556 url = {http://portal.acm.org/citation.cfm?doid=1672308.1672334$\#$},
2557 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p131-v40n1n-huebschA.pdf}, 2557 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p131-v40n1n-huebschA.pdf},
2558 author = {H{\"u}bsch, Christian and Mayer, Christoph P. and Sebastian Mies and Roland Bless and Oliver Waldhorst and Martina Zitterbart} 2558 author = {H{\"u}bsch, Christian and Mayer, Christoph P. and Sebastian Mies and Roland Bless and Oliver Waldhorst and Martina Zitterbart}
2559} 2559}
2560@conference {2010_11, 2560@conference {2010_11,
@@ -2593,7 +2593,7 @@ outperforms methods that use only one type of social content. Second, we present
2593 www_section = {privacy, secure multi-party computation, SMC}, 2593 www_section = {privacy, secure multi-party computation, SMC},
2594 isbn = {888-7-6666-5555-4}, 2594 isbn = {888-7-6666-5555-4},
2595 url = {http://dl.acm.org/citation.cfm?id=1929820.1929840}, 2595 url = {http://dl.acm.org/citation.cfm?id=1929820.1929840},
2596 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/USENIX\%20Security\%2710\%20-\%20SEPIA.pdf}, 2596 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/USENIX\%20Security\%2710\%20-\%20SEPIA.pdf},
2597 author = {Burkhart, Martin and Strasser, Mario and Many, Dilip and Dimitropoulos, Xenofontas} 2597 author = {Burkhart, Martin and Strasser, Mario and Many, Dilip and Dimitropoulos, Xenofontas}
2598} 2598}
2599@conference {Marks2010a, 2599@conference {Marks2010a,
@@ -2619,7 +2619,7 @@ This work was partially funded as part of the Spontaneous Virtual Networks (SpoV
2619 isbn = {978-3-642-12103-6}, 2619 isbn = {978-3-642-12103-6},
2620 doi = {10.1007/978-3-642-12104-3}, 2620 doi = {10.1007/978-3-642-12104-3},
2621 url = {http://www.springerlink.com/content/t6k421560103540n/}, 2621 url = {http://www.springerlink.com/content/t6k421560103540n/},
2622 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/User-Perceived\%20Performance\%20of\%20the\%20NICE\%20Application\%20Layer\%20Multicast\%20Protocol\%20in\%20Large\%20and\%20Highly\%20Dynamic\%20Groups_1.pdf}, 2622 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/User-Perceived\%20Performance\%20of\%20the\%20NICE\%20Application\%20Layer\%20Multicast\%20Protocol\%20in\%20Large\%20and\%20Highly\%20Dynamic\%20Groups_1.pdf},
2623 www_section = unsorted, 2623 www_section = unsorted,
2624 author = {H{\"u}bsch, Christian and Mayer, Christoph P. and Oliver Waldhorst} 2624 author = {H{\"u}bsch, Christian and Mayer, Christoph P. and Oliver Waldhorst}
2625} 2625}
@@ -2647,7 +2647,7 @@ Five years ago a previous study examined the AS-level threat against client and
2647 isbn = {978-1-60558-894-0}, 2647 isbn = {978-1-60558-894-0},
2648 doi = {10.1145/1653662.1653708}, 2648 doi = {10.1145/1653662.1653708},
2649 url = {http://portal.acm.org/citation.cfm?id=1653662.1653708}, 2649 url = {http://portal.acm.org/citation.cfm?id=1653662.1653708},
2650 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EdmanS09.pdf}, 2650 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EdmanS09.pdf},
2651 author = {Matthew Edman and Paul Syverson}, 2651 author = {Matthew Edman and Paul Syverson},
2652 editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis} 2652 editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis}
2653} 2653}
@@ -2680,7 +2680,7 @@ Five years ago a previous study examined the AS-level threat against client and
2680 isbn = {978-1-60558-894-0}, 2680 isbn = {978-1-60558-894-0},
2681 doi = {10.1145/1653662.1653707}, 2681 doi = {10.1145/1653662.1653707},
2682 url = {http://portal.acm.org/citation.cfm?id=1653662.1653707}, 2682 url = {http://portal.acm.org/citation.cfm?id=1653662.1653707},
2683 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/TroncosoD09.pdf}, 2683 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/TroncosoD09.pdf},
2684 author = {Carmela Troncoso and George Danezis}, 2684 author = {Carmela Troncoso and George Danezis},
2685 editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis} 2685 editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis}
2686} 2686}
@@ -2697,7 +2697,7 @@ Five years ago a previous study examined the AS-level threat against client and
2697 isbn = {978-1-60558-751-6}, 2697 isbn = {978-1-60558-751-6},
2698 doi = {10.1145/1658997.1659021}, 2698 doi = {10.1145/1658997.1659021},
2699 url = {http://portal.acm.org/citation.cfm?doid=1658997.1659021$\#$}, 2699 url = {http://portal.acm.org/citation.cfm?doid=1658997.1659021$\#$},
2700 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/conext09-phdworkshop-cameraready.pdf}, 2700 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/conext09-phdworkshop-cameraready.pdf},
2701 author = {Mayer, Christoph P.} 2701 author = {Mayer, Christoph P.}
2702} 2702}
2703@conference {Knoll:2009:BPS:1590968.1591829, 2703@conference {Knoll:2009:BPS:1590968.1591829,
@@ -2723,7 +2723,7 @@ Five years ago a previous study examined the AS-level threat against client and
2723 year = {2009}, 2723 year = {2009},
2724 month = {April}, 2724 month = {April},
2725 www_section = {Byzantine Resilient Sampling, Random Membership, random sampling}, 2725 www_section = {Byzantine Resilient Sampling, Random Membership, random sampling},
2726 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Brahms-Comnet-Mar09.pdf , https://gnunet.org/git/bibliography.git/plain/docs/Brahms-rps-mar09.pdf}, 2726 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Brahms-Comnet-Mar09.pdf , https://git.gnunet.org/bibliography.git/plain/docs/Brahms-rps-mar09.pdf},
2727 url = {https://bibliography.gnunet.org}, 2727 url = {https://bibliography.gnunet.org},
2728 author = {Edward Bortnikov and Maxim Gurevich and Idit Keidar and Gabriel Kliot and Alexander Shraer} 2728 author = {Edward Bortnikov and Maxim Gurevich and Idit Keidar and Gabriel Kliot and Alexander Shraer}
2729} 2729}
@@ -2753,7 +2753,7 @@ Five years ago a previous study examined the AS-level threat against client and
2753 abstract = {Private scalar product protocols have proved to be interesting in various applications such as data mining, data integration, trust computing, etc. In 2007, Yao et al. proposed a distributed scalar product protocol with application to privacy-preserving computation of trust [1]. This protocol is split in two phases: an homorphic encryption computation; and a private multi-party summation protocol. The summation protocol has two drawbacks: first, it generates a non-negligible communication overhead; and second, it introduces a security flaw. The contribution of this present paper is two-fold. We first prove that the protocol of [1] is not secure in the semi-honest model by showing that it is not resistant to collusion attacks and we give an example of a collusion attack, with only four participants. Second, we propose to use a superposed sending round as an alternative to the multi-party summation protocol, which results in better security properties and in a reduction of the communication costs. In particular, regarding security, we show that the previous scheme was vulnerable to collusions of three users whereas in our proposal we can t isin [1..n--1] and define a protocol resisting to collusions of up to t users}, 2753 abstract = {Private scalar product protocols have proved to be interesting in various applications such as data mining, data integration, trust computing, etc. In 2007, Yao et al. proposed a distributed scalar product protocol with application to privacy-preserving computation of trust [1]. This protocol is split in two phases: an homorphic encryption computation; and a private multi-party summation protocol. The summation protocol has two drawbacks: first, it generates a non-negligible communication overhead; and second, it introduces a security flaw. The contribution of this present paper is two-fold. We first prove that the protocol of [1] is not secure in the semi-honest model by showing that it is not resistant to collusion attacks and we give an example of a collusion attack, with only four participants. Second, we propose to use a superposed sending round as an alternative to the multi-party summation protocol, which results in better security properties and in a reduction of the communication costs. In particular, regarding security, we show that the previous scheme was vulnerable to collusions of three users whereas in our proposal we can t isin [1..n--1] and define a protocol resisting to collusions of up to t users},
2754 www_section = {collaboration, collusion-resistant distributed protocol, Computer applications, computer networks, cryptographic protocols, cryptography, data privacy, distributed computing, homorphic encryption computation, Laboratories, Portable media players, privacy-preserving computation, Privacy-preserving computation of trust, private multiparty summation protocol, scalar product protocol, secure multi-party computation, Secure scalar product, security, Superposed sending., Telephony, trust computation}, 2754 www_section = {collaboration, collusion-resistant distributed protocol, Computer applications, computer networks, cryptographic protocols, cryptography, data privacy, distributed computing, homorphic encryption computation, Laboratories, Portable media players, privacy-preserving computation, Privacy-preserving computation of trust, private multiparty summation protocol, scalar product protocol, secure multi-party computation, Secure scalar product, security, Superposed sending., Telephony, trust computation},
2755 doi = {10.1109/NCA.2009.48}, 2755 doi = {10.1109/NCA.2009.48},
2756 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CollusionResistant2009Melchor.pdf}, 2756 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CollusionResistant2009Melchor.pdf},
2757 url = {https://bibliography.gnunet.org}, 2757 url = {https://bibliography.gnunet.org},
2758 author = {Melchor, C.A. and Ait-Salem, B. and Gaborit, P.} 2758 author = {Melchor, C.A. and Ait-Salem, B. and Gaborit, P.}
2759} 2759}
@@ -2783,7 +2783,7 @@ Our de-anonymization algorithm is based purely on the network topology, does not
2783 www_section = {anonymity, network topology, privacy}, 2783 www_section = {anonymity, network topology, privacy},
2784 isbn = {978-0-7695-3633-0}, 2784 isbn = {978-0-7695-3633-0},
2785 url = {http://randomwalker.info/social-networks/}, 2785 url = {http://randomwalker.info/social-networks/},
2786 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NarayananS09.pdf}, 2786 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NarayananS09.pdf},
2787 author = {Arvind Narayanan and Vitaly Shmatikov} 2787 author = {Arvind Narayanan and Vitaly Shmatikov}
2788} 2788}
2789@article {Badishi:2009:DFC:1550962.1551186, 2789@article {Badishi:2009:DFC:1550962.1551186,
@@ -2800,7 +2800,7 @@ Our de-anonymization algorithm is based purely on the network topology, does not
2800 issn = {0743-7315}, 2800 issn = {0743-7315},
2801 doi = {10.1016/j.jpdc.2009.03.003}, 2801 doi = {10.1016/j.jpdc.2009.03.003},
2802 url = {http://dl.acm.org/citation.cfm?id=1550962.1551186}, 2802 url = {http://dl.acm.org/citation.cfm?id=1550962.1551186},
2803 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Journal\%20of\%20Parallel\%20\%26\%20Distributed\%20Computing\%20-\%20Deleting\%20files\%20in\%20the\%20Celeste\%20p2p\%20storage\%20systems.pdf}, 2803 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Journal\%20of\%20Parallel\%20\%26\%20Distributed\%20Computing\%20-\%20Deleting\%20files\%20in\%20the\%20Celeste\%20p2p\%20storage\%20systems.pdf},
2804 author = {Badishi, Gal and Caronni, Germano and Keidar, Idit and Rom, Raphael and Scott, Glenn} 2804 author = {Badishi, Gal and Caronni, Germano and Keidar, Idit and Rom, Raphael and Scott, Glenn}
2805} 2805}
2806@conference {2009_3, 2806@conference {2009_3,
@@ -2821,7 +2821,7 @@ We measure the empirical trade-off between accuracy and privacy in these adaptat
2821 isbn = {978-1-60558-495-9}, 2821 isbn = {978-1-60558-495-9},
2822 doi = {10.1145/1557019.1557090}, 2822 doi = {10.1145/1557019.1557090},
2823 url = {http://doi.acm.org/10.1145/1557019.1557090}, 2823 url = {http://doi.acm.org/10.1145/1557019.1557090},
2824 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PrivateRecommender2009McSherry.pdf}, 2824 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PrivateRecommender2009McSherry.pdf},
2825 author = {McSherry, Frank and Mironov, Ilya} 2825 author = {McSherry, Frank and Mironov, Ilya}
2826} 2826}
2827@conference {2009_4, 2827@conference {2009_4,
@@ -2831,7 +2831,7 @@ We measure the empirical trade-off between accuracy and privacy in these adaptat
2831 abstract = {Application Layer Multicast (ALM) is an attractive solution to overcome the deployment problems of IP-Multicast. We show how to cope with the challenges of incorporating wireless devices into ALM protocols. As a rst approach we extend the NICE protocol, significantly increasing its performance in scenarios with many devices connected through wireless LAN}, 2831 abstract = {Application Layer Multicast (ALM) is an attractive solution to overcome the deployment problems of IP-Multicast. We show how to cope with the challenges of incorporating wireless devices into ALM protocols. As a rst approach we extend the NICE protocol, significantly increasing its performance in scenarios with many devices connected through wireless LAN},
2832 www_section = {multicast}, 2832 www_section = {multicast},
2833 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.2935}, 2833 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.143.2935},
2834 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/nice-wli.pdf}, 2834 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/nice-wli.pdf},
2835 author = {H{\"u}bsch, Christian and Oliver Waldhorst} 2835 author = {H{\"u}bsch, Christian and Oliver Waldhorst}
2836} 2836}
2837@mastersthesis {2009_5, 2837@mastersthesis {2009_5,
@@ -2861,7 +2861,7 @@ We measure the empirical trade-off between accuracy and privacy in these adaptat
2861 isbn = {978-3-642-02626-3}, 2861 isbn = {978-3-642-02626-3},
2862 doi = {http://dx.doi.org/10.1007/978-3-642-02627-0_6}, 2862 doi = {http://dx.doi.org/10.1007/978-3-642-02627-0_6},
2863 url = {http://dx.doi.org/10.1007/978-3-642-02627-0_6}, 2863 url = {http://dx.doi.org/10.1007/978-3-642-02627-0_6},
2864 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/AIMS\%2709\%20-\%20Sybil\%20attacks\%20protection\%20schemes\%20in\%20KAD.pdf}, 2864 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/AIMS\%2709\%20-\%20Sybil\%20attacks\%20protection\%20schemes\%20in\%20KAD.pdf},
2865 author = {Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier} 2865 author = {Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier}
2866} 2866}
2867@book {Bogetoft:2009:SMC:1601990.1602018, 2867@book {Bogetoft:2009:SMC:1601990.1602018,
@@ -2881,7 +2881,7 @@ We measure the empirical trade-off between accuracy and privacy in these adaptat
2881 isbn = {978-3-642-03548-7}, 2881 isbn = {978-3-642-03548-7},
2882 doi = {10.1007/978-3-642-03549-4_20}, 2882 doi = {10.1007/978-3-642-03549-4_20},
2883 url = {http://dx.doi.org/10.1007/978-3-642-03549-4_20}, 2883 url = {http://dx.doi.org/10.1007/978-3-642-03549-4_20},
2884 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Bogetoft\%20et\%20al.\%20-\%20Secure\%20multiparty\%20computation\%20goes\%20live.pdf}, 2884 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Bogetoft\%20et\%20al.\%20-\%20Secure\%20multiparty\%20computation\%20goes\%20live.pdf},
2885 author = {Bogetoft, Peter and Christensen, Dan Lund and Damg{\'a}rd, Ivan and Geisler, Martin and Jakobsen, Thomas and Kr{\o}igaard, Mikkel and Nielsen, Janus Dam and Nielsen, Jesper Buus and Nielsen, Kurt and Pagter, Jakob and Schwartzbach, Michael and Toft, Tomas}, 2885 author = {Bogetoft, Peter and Christensen, Dan Lund and Damg{\'a}rd, Ivan and Geisler, Martin and Jakobsen, Thomas and Kr{\o}igaard, Mikkel and Nielsen, Janus Dam and Nielsen, Jesper Buus and Nielsen, Kurt and Pagter, Jakob and Schwartzbach, Michael and Toft, Tomas},
2886 editor = {Roger Dingledine and Philippe Golle} 2886 editor = {Roger Dingledine and Philippe Golle}
2887} 2887}
@@ -2897,7 +2897,7 @@ We measure the empirical trade-off between accuracy and privacy in these adaptat
2897 isbn = {978-1-60558-783-7}, 2897 isbn = {978-1-60558-783-7},
2898 doi = {10.1145/1655188.1655199}, 2898 doi = {10.1145/1655188.1655199},
2899 url = {http://portal.acm.org/citation.cfm?id=1655188.1655199}, 2899 url = {http://portal.acm.org/citation.cfm?id=1655188.1655199},
2900 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/wpes09-dht-attack.pdf}, 2900 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/wpes09-dht-attack.pdf},
2901 author = {Andrew Tran and Nicholas J. Hopper and Yongdae Kim} 2901 author = {Andrew Tran and Nicholas J. Hopper and Yongdae Kim}
2902} 2902}
2903@conference {1656984, 2903@conference {1656984,
@@ -2913,7 +2913,7 @@ We measure the empirical trade-off between accuracy and privacy in these adaptat
2913This paper presents HEAP, HEterogeneity-Aware gossip Protocol, where nodes dynamically adapt their contribution to the gossip dissemination according to their bandwidth capabilities. Using a continuous, itself gossip-based, approximation of relative bandwidth capabilities, HEAP dynamically leverages the most capable nodes by increasing their fanout, while decreasing by the same proportion that of less capable nodes. HEAP preserves the simple and proactive (churn adaptation) nature of gossip, while significantly improving its effectiveness. We extensively evaluate HEAP in the context of a video streaming application on a testbed of 270 PlanetLab nodes. Our results show that HEAP significantly improves the quality of the streaming over standard homogeneous gossip protocols, especially when the stream rate is close to the average available bandwidth}, 2913This paper presents HEAP, HEterogeneity-Aware gossip Protocol, where nodes dynamically adapt their contribution to the gossip dissemination according to their bandwidth capabilities. Using a continuous, itself gossip-based, approximation of relative bandwidth capabilities, HEAP dynamically leverages the most capable nodes by increasing their fanout, while decreasing by the same proportion that of less capable nodes. HEAP preserves the simple and proactive (churn adaptation) nature of gossip, while significantly improving its effectiveness. We extensively evaluate HEAP in the context of a video streaming application on a testbed of 270 PlanetLab nodes. Our results show that HEAP significantly improves the quality of the streaming over standard homogeneous gossip protocols, especially when the stream rate is close to the average available bandwidth},
2914 www_section = {heterogeneity, load balancing}, 2914 www_section = {heterogeneity, load balancing},
2915 url = {http://portal.acm.org/citation.cfm?id=1656984$\#$}, 2915 url = {http://portal.acm.org/citation.cfm?id=1656984$\#$},
2916 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/middleware-monod.pdf}, 2916 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/middleware-monod.pdf},
2917 author = {Frey, Davide and Rachid Guerraoui and Anne-Marie Kermarrec and Boris Koldehofe and Mogensen, Martin and Monod, Maxime and Qu{\'e}ma, Vivien} 2917 author = {Frey, Davide and Rachid Guerraoui and Anne-Marie Kermarrec and Boris Koldehofe and Mogensen, Martin and Monod, Maxime and Qu{\'e}ma, Vivien}
2918} 2918}
2919@article {EURECOM+2885, 2919@article {EURECOM+2885,
@@ -2926,7 +2926,7 @@ This paper presents HEAP, HEterogeneity-Aware gossip Protocol, where nodes dynam
2926 abstract = {Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs have been implemented in real systems and deployed on a large scale. One exception is KAD, a DHT based on Kademlia, which is part of eDonkey, a peer-to-peer file sharing system with several million simultaneous users. We have been crawling a representative subset of KAD every five minutes for six months and obtained information about geographical distribution of peers, session times, daily usage, and peer lifetime. We have found that session times are Weibull distributed and we show how this information can be exploited to make the publishing mechanism much more efficient. Peers are identified by the so-called KAD ID, which up to now was assumed to be persistent. However, we observed that a fraction of peers changes their KAD ID as frequently as once a session. This change of KAD IDs makes it difficult to characterize end-user behavior. For this reason we have been crawling the entire KAD network once a day for more than a year to track end-users with static IP addresses, which allows us to estimate end-user lifetime and the fraction of end-users changing their KAD ID}, 2926 abstract = {Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to organize peers in a DHT. However, very few DHTs have been implemented in real systems and deployed on a large scale. One exception is KAD, a DHT based on Kademlia, which is part of eDonkey, a peer-to-peer file sharing system with several million simultaneous users. We have been crawling a representative subset of KAD every five minutes for six months and obtained information about geographical distribution of peers, session times, daily usage, and peer lifetime. We have found that session times are Weibull distributed and we show how this information can be exploited to make the publishing mechanism much more efficient. Peers are identified by the so-called KAD ID, which up to now was assumed to be persistent. However, we observed that a fraction of peers changes their KAD ID as frequently as once a session. This change of KAD IDs makes it difficult to characterize end-user behavior. For this reason we have been crawling the entire KAD network once a day for more than a year to track end-users with static IP addresses, which allows us to estimate end-user lifetime and the fraction of end-users changing their KAD ID},
2927 www_section = {churn, distributed hash table, KAD, Kademlia}, 2927 www_section = {churn, distributed hash table, KAD, Kademlia},
2928 issn = {1063-6692}, 2928 issn = {1063-6692},
2929 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Long\%20Term\%20Study\%20of\%20Peer\%20Behavior\%20in\%20the\%20kad\%20DHT.pdf}, 2929 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Long\%20Term\%20Study\%20of\%20Peer\%20Behavior\%20in\%20the\%20kad\%20DHT.pdf},
2930 url = {https://bibliography.gnunet.org}, 2930 url = {https://bibliography.gnunet.org},
2931 author = {Steiner, Moritz and En-Najjary, Taoufik and E W Biersack} 2931 author = {Steiner, Moritz and En-Najjary, Taoufik and E W Biersack}
2932} 2932}
@@ -2958,7 +2958,7 @@ This paper presents HEAP, HEterogeneity-Aware gossip Protocol, where nodes dynam
2958 www_section = {distributed systems, game-theoretic, individual performance, mechanism design, payment, throughtput maximization}, 2958 www_section = {distributed systems, game-theoretic, individual performance, mechanism design, payment, throughtput maximization},
2959 isbn = {978-1-4244-3512-8 }, 2959 isbn = {978-1-4244-3512-8 },
2960 doi = {http://dx.doi.org/10.1109/INFCOM.2009.5062008}, 2960 doi = {http://dx.doi.org/10.1109/INFCOM.2009.5062008},
2961 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOMM\%2709\%20-\%20Mechanism\%20design\%20without\%20payments.pdf}, 2961 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOMM\%2709\%20-\%20Mechanism\%20design\%20without\%20payments.pdf},
2962 author = {Thomas Moscibroda and Stefan Schmid} 2962 author = {Thomas Moscibroda and Stefan Schmid}
2963} 2963}
2964@conference {DBLP:conf/ccs/VassermanJTHK09, 2964@conference {DBLP:conf/ccs/VassermanJTHK09,
@@ -2972,7 +2972,7 @@ This paper presents HEAP, HEterogeneity-Aware gossip Protocol, where nodes dynam
2972 isbn = {978-1-60558-894-0}, 2972 isbn = {978-1-60558-894-0},
2973 doi = {10.1145/1653662.1653709}, 2973 doi = {10.1145/1653662.1653709},
2974 url = {http://portal.acm.org/citation.cfm?id=1653662.1653709}, 2974 url = {http://portal.acm.org/citation.cfm?id=1653662.1653709},
2975 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/VassermanJTHK09.pdf}, 2975 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/VassermanJTHK09.pdf},
2976 author = {Eugene Y. Vasserman and Rob Jansen and James Tyra and Nicholas J. Hopper and Yongdae Kim}, 2976 author = {Eugene Y. Vasserman and Rob Jansen and James Tyra and Nicholas J. Hopper and Yongdae Kim},
2977 editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis} 2977 editor = {Ehab Al-Shaer and Somesh Jha and Angelos D. Keromytis}
2978} 2978}
@@ -2994,7 +2994,7 @@ Search gives a slight performance increase over standard Monte-Carlo search.
2994In addition, the most effective improvements appeared to be the application of 2994In addition, the most effective improvements appeared to be the application of
2995pseudo-random simulations and limiting simulation lengths, while other techniques have been shown to be less effective or even ineffective. Overall, when applying the best performing techniques, an AI with advanced playing strength has been created, such that further research is likely to push this performance to a strength of expert level}, 2995pseudo-random simulations and limiting simulation lengths, while other techniques have been shown to be less effective or even ineffective. Overall, when applying the best performing techniques, an AI with advanced playing strength has been created, such that further research is likely to push this performance to a strength of expert level},
2996 www_section = {artificial intelligence, MCTS, modern board game, Monte-Carlo Tree Search, search techniques}, 2996 www_section = {artificial intelligence, MCTS, modern board game, Monte-Carlo Tree Search, search techniques},
2997 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Thesis\%20-\%20F.Schadd.pdf}, 2997 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Thesis\%20-\%20F.Schadd.pdf},
2998 url = {https://bibliography.gnunet.org}, 2998 url = {https://bibliography.gnunet.org},
2999 author = {Frederik Christiaan Schadd} 2999 author = {Frederik Christiaan Schadd}
3000} 3000}
@@ -3012,7 +3012,7 @@ pseudo-random simulations and limiting simulation lengths, while other technique
3012 isbn = {978-3-642-10432-9}, 3012 isbn = {978-3-642-10432-9},
3013 doi = {10.1007/978-3-642-10433-6_2}, 3013 doi = {10.1007/978-3-642-10433-6_2},
3014 url = {http://dx.doi.org/10.1007/978-3-642-10433-6_2}, 3014 url = {http://dx.doi.org/10.1007/978-3-642-10433-6_2},
3015 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/MultiParty2009Narayanan.pdf}, 3015 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/MultiParty2009Narayanan.pdf},
3016 author = {Sathya Narayanan, G. and Aishwarya, T. and Agrawal, Anugrah and Patra, Arpita and Choudhary, Ashish and Pandu Rangan, C}, 3016 author = {Sathya Narayanan, G. and Aishwarya, T. and Agrawal, Anugrah and Patra, Arpita and Choudhary, Ashish and Pandu Rangan, C},
3017 editor = {Garay, JuanA. and Miyaji, Atsuko and Otsuka, Akira} 3017 editor = {Garay, JuanA. and Miyaji, Atsuko and Otsuka, Akira}
3018} 3018}
@@ -3026,7 +3026,7 @@ pseudo-random simulations and limiting simulation lengths, while other technique
3026 issn = {1545-5971}, 3026 issn = {1545-5971},
3027 doi = {10.1109/TDSC.2009.38}, 3027 doi = {10.1109/TDSC.2009.38},
3028 url = {http://www.computer.org/portal/web/csdl/doi/10.1109/TDSC.2009.38}, 3028 url = {http://www.computer.org/portal/web/csdl/doi/10.1109/TDSC.2009.38},
3029 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/nymble-tdsc.pdf}, 3029 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/nymble-tdsc.pdf},
3030 author = {Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean Smith} 3030 author = {Patrick P. Tsang and Apu Kapadia and Cory Cornelius and Sean Smith}
3031} 3031}
3032@book {2009_8, 3032@book {2009_8,
@@ -3043,7 +3043,7 @@ In this paper we establish the optimal trade-off between the round complexity an
3043 isbn = {978-3-642-00456-8}, 3043 isbn = {978-3-642-00456-8},
3044 doi = {10.1007/978-3-642-00457-5_1}, 3044 doi = {10.1007/978-3-642-00457-5_1},
3045 url = {http://dx.doi.org/10.1007/978-3-642-00457-5_1}, 3045 url = {http://dx.doi.org/10.1007/978-3-642-00457-5_1},
3046 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/OptimallyFairCoinToss2009Moran.pdf}, 3046 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/OptimallyFairCoinToss2009Moran.pdf},
3047 author = {Moran, Tal and Naor, Moni and Segev, Gil}, 3047 author = {Moran, Tal and Naor, Moni and Segev, Gil},
3048 editor = {Reingold, Omer} 3048 editor = {Reingold, Omer}
3049} 3049}
@@ -3055,7 +3055,7 @@ In this paper we establish the optimal trade-off between the round complexity an
3055 www_section = {distributed systems, P2P}, 3055 www_section = {distributed systems, P2P},
3056 author = {unknown}, 3056 author = {unknown},
3057 url = {http://www.net.in.tum.de/de/mitarbeiter/holz/}, 3057 url = {http://www.net.in.tum.de/de/mitarbeiter/holz/},
3058 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/unisono_kuvs-ngn.pdf} 3058 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/unisono_kuvs-ngn.pdf}
3059} 3059}
3060@conference {2009_10, 3060@conference {2009_10,
3061 title = {Peer Profiling and Selection in the I2P Anonymous Network}, 3061 title = {Peer Profiling and Selection in the I2P Anonymous Network},
@@ -3064,7 +3064,7 @@ In this paper we establish the optimal trade-off between the round complexity an
3064 month = mar, 3064 month = mar,
3065 address = {TU Dresden, Germany }, 3065 address = {TU Dresden, Germany },
3066 www_section = {I2P}, 3066 www_section = {I2P},
3067 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/I2P-PET-CON-2009.1.pdf}, 3067 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/I2P-PET-CON-2009.1.pdf},
3068 url = {https://bibliography.gnunet.org}, 3068 url = {https://bibliography.gnunet.org},
3069 author = {Lars Schimmer} 3069 author = {Lars Schimmer}
3070} 3070}
@@ -3080,7 +3080,7 @@ In this paper we establish the optimal trade-off between the round complexity an
3080 isbn = {978-1-4244-5066-4 }, 3080 isbn = {978-1-4244-5066-4 },
3081 doi = {http://dx.doi.org/10.1109/P2P.2009.5284506}, 3081 doi = {http://dx.doi.org/10.1109/P2P.2009.5284506},
3082 url = {http://peersim.sourceforge.net/}, 3082 url = {http://peersim.sourceforge.net/},
3083 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/P2P\%2709\%20-\%20PeerSim.pdf}, 3083 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/P2P\%2709\%20-\%20PeerSim.pdf},
3084 author = {Alberto Montresor and M{\'a}rk Jelasity and Gian Paolo Jesi and Spyros Voulgaris} 3084 author = {Alberto Montresor and M{\'a}rk Jelasity and Gian Paolo Jesi and Spyros Voulgaris}
3085} 3085}
3086@conference {Plank:2009:PEE:1525908.1525927, 3086@conference {Plank:2009:PEE:1525908.1525927,
@@ -3095,7 +3095,7 @@ In this paper we establish the optimal trade-off between the round complexity an
3095 abstract = {Over the past five years, large-scale storage installations have required fault-protection beyond RAID-5, leading to a flurry of research on and development of erasure codes for multiple disk failures. Numerous open-source implementations of various coding techniques are available to the general public. In this paper, we perform a head-to-head comparison of these implementations in encoding and decoding scenarios. Our goals are to compare codes and implementations, to discern whether theory matches practice, and to demonstrate how parameter selection, especially as it concerns memory, has a significant impact on a code's performance. Additional benefits are to give storage system designers an idea of what to expect in terms of coding performance when designing their storage systems, and to identify the places where further erasure coding research can have the most impact}, 3095 abstract = {Over the past five years, large-scale storage installations have required fault-protection beyond RAID-5, leading to a flurry of research on and development of erasure codes for multiple disk failures. Numerous open-source implementations of various coding techniques are available to the general public. In this paper, we perform a head-to-head comparison of these implementations in encoding and decoding scenarios. Our goals are to compare codes and implementations, to discern whether theory matches practice, and to demonstrate how parameter selection, especially as it concerns memory, has a significant impact on a code's performance. Additional benefits are to give storage system designers an idea of what to expect in terms of coding performance when designing their storage systems, and to identify the places where further erasure coding research can have the most impact},
3096 www_section = {erasure coding, libraries, open-source, storage}, 3096 www_section = {erasure coding, libraries, open-source, storage},
3097 url = {http://www.usenix.org/event/fast09/tech/full_papers/plank/plank_html/}, 3097 url = {http://www.usenix.org/event/fast09/tech/full_papers/plank/plank_html/},
3098 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/FAST\%2709\%20-\%20Open-source\%20erasure\%20coding\%20libraries\%20for\%20storage.pdf}, 3098 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/FAST\%2709\%20-\%20Open-source\%20erasure\%20coding\%20libraries\%20for\%20storage.pdf},
3099 author = {James S. Plank and Luo, Jianqiang and Schuman, Catherine D. and Lihao Xu and Wilcox-O'Hearn, Zooko} 3099 author = {James S. Plank and Luo, Jianqiang and Schuman, Catherine D. and Lihao Xu and Wilcox-O'Hearn, Zooko}
3100} 3100}
3101@conference {5328076, 3101@conference {5328076,
@@ -3107,7 +3107,7 @@ In this paper we establish the optimal trade-off between the round complexity an
3107 abstract = {Traffic models are the heart of any performance evaluation of telecommunication networks. Understanding the nature of traffic in high speed, high bandwidth communication system is essential for effective operation and performance evaluation of the networks. Many routing protocols reported in the literature for Mobile ad hoc networks(MANETS) have been primarily designed and analyzed under the assumption of CBR traffic models, which is unable to capture the statistical characteristics of the actual traffic. It is necessary to evaluate the performance properties of MANETs in the context of more realistic traffic models. In an effort towards this end, this paper evaluates the performance of adhoc on demand multipath distance vector (AOMDV) routing protocol in the presence of poisson and bursty self similar traffic and compares them with that of CBR traffic. Different metrics are considered in analyzing the performance of routing protocol including packet delivery ratio, throughput and end to end delay. Our simulation results indicate that the packet delivery fraction and throughput in AOMDV is increased in the presence of self similar traffic compared to other traffic. Moreover, it is observed that the end to end delay in the presence of self similar traffic is lesser than that of CBR and higher than that of poisson traffic}, 3107 abstract = {Traffic models are the heart of any performance evaluation of telecommunication networks. Understanding the nature of traffic in high speed, high bandwidth communication system is essential for effective operation and performance evaluation of the networks. Many routing protocols reported in the literature for Mobile ad hoc networks(MANETS) have been primarily designed and analyzed under the assumption of CBR traffic models, which is unable to capture the statistical characteristics of the actual traffic. It is necessary to evaluate the performance properties of MANETs in the context of more realistic traffic models. In an effort towards this end, this paper evaluates the performance of adhoc on demand multipath distance vector (AOMDV) routing protocol in the presence of poisson and bursty self similar traffic and compares them with that of CBR traffic. Different metrics are considered in analyzing the performance of routing protocol including packet delivery ratio, throughput and end to end delay. Our simulation results indicate that the packet delivery fraction and throughput in AOMDV is increased in the presence of self similar traffic compared to other traffic. Moreover, it is observed that the end to end delay in the presence of self similar traffic is lesser than that of CBR and higher than that of poisson traffic},
3108 www_section = {ad-hoc networks, AOMDV, distance vector, multi-path, performance}, 3108 www_section = {ad-hoc networks, AOMDV, distance vector, multi-path, performance},
3109 doi = {10.1109/ARTCom.2009.31}, 3109 doi = {10.1109/ARTCom.2009.31},
3110 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/multipath-dv-perf.pdf}, 3110 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/multipath-dv-perf.pdf},
3111 author = {Malarkodi, B. and Rakesh, P. and Venkataramani, B.} 3111 author = {Malarkodi, B. and Rakesh, P. and Venkataramani, B.}
3112} 3112}
3113@conference { evans2009tor, 3113@conference { evans2009tor,
@@ -3125,7 +3125,7 @@ false positives now that many other users are adding congestion at the same time
3125We then strengthen the original congestion attack by combining it with a novel bandwidth amplification attack based on a flaw in the Tor design that lets us build long circuits that loop back on themselves. We show that this new combination attack is practical and effective by demonstrating a working attack on today's deployed Tor network. By coming up with a model to better understand Tor's routing behavior under congestion, we further provide a statistical analysis characterizing how effective our attack is in each case}, 3125We then strengthen the original congestion attack by combining it with a novel bandwidth amplification attack based on a flaw in the Tor design that lets us build long circuits that loop back on themselves. We show that this new combination attack is practical and effective by demonstrating a working attack on today's deployed Tor network. By coming up with a model to better understand Tor's routing behavior under congestion, we further provide a statistical analysis characterizing how effective our attack is in each case},
3126 www_section = {anonymity, attack, denial-of-service, installation, Tor}, 3126 www_section = {anonymity, attack, denial-of-service, installation, Tor},
3127 url = {http://grothoff.org/christian/tor.pdf}, 3127 url = {http://grothoff.org/christian/tor.pdf},
3128 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/tor.pdf}, 3128 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/tor.pdf},
3129 author = {Nathan S Evans and Roger Dingledine and Christian Grothoff} 3129 author = {Nathan S Evans and Roger Dingledine and Christian Grothoff}
3130} 3130}
3131@conference {Duminuco:2009:PSR:1584339.1584602, 3131@conference {Duminuco:2009:PSR:1584339.1584602,
@@ -3143,7 +3143,7 @@ We then strengthen the original congestion attack by combining it with a novel b
3143 isbn = {978-0-7695-3659-0}, 3143 isbn = {978-0-7695-3659-0},
3144 doi = {http://dx.doi.org/10.1109/ICDCS.2009.14}, 3144 doi = {http://dx.doi.org/10.1109/ICDCS.2009.14},
3145 url = {http://dx.doi.org/10.1109/ICDCS.2009.14}, 3145 url = {http://dx.doi.org/10.1109/ICDCS.2009.14},
3146 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ICDCS\%2709\%20-\%20Regenerating\%20codes\%20for\%20p2p\%20backup\%20systems.pdf}, 3146 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ICDCS\%2709\%20-\%20Regenerating\%20codes\%20for\%20p2p\%20backup\%20systems.pdf},
3147 author = {Alessandro Duminuco and E W Biersack} 3147 author = {Alessandro Duminuco and E W Biersack}
3148} 3148}
3149@conference {2009_11, 3149@conference {2009_11,
@@ -3158,7 +3158,7 @@ We then strengthen the original congestion attack by combining it with a novel b
3158 isbn = {978-1-60558-551-2}, 3158 isbn = {978-1-60558-551-2},
3159 doi = {10.1145/1559845.1559850}, 3159 doi = {10.1145/1559845.1559850},
3160 url = {http://doi.acm.org.eaccess.ub.tum.de/10.1145/1559845.1559850}, 3160 url = {http://doi.acm.org.eaccess.ub.tum.de/10.1145/1559845.1559850},
3161 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PrivacyIntergratedQueries2009McSherry.pdf}, 3161 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PrivacyIntergratedQueries2009McSherry.pdf},
3162 author = {McSherry, Frank D.} 3162 author = {McSherry, Frank D.}
3163} 3163}
3164@conference {Tariqetal:2009:ProbLatencyBounds, 3164@conference {Tariqetal:2009:ProbLatencyBounds,
@@ -3173,7 +3173,7 @@ We then strengthen the original congestion attack by combining it with a novel b
3173 isbn = {978-3-540-92666-5}, 3173 isbn = {978-3-540-92666-5},
3174 doi = {10.1007/978-3-540-92666-5}, 3174 doi = {10.1007/978-3-540-92666-5},
3175 url = {http://www.springerlink.com/content/x36578745jv7wr88/}, 3175 url = {http://www.springerlink.com/content/x36578745jv7wr88/},
3176 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/QoS_pubsub.pdf}, 3176 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/QoS_pubsub.pdf},
3177 author = {Tariq, Muhammad Adnan and Boris Koldehofe and Gerald G. Koch and Kurt Rothermel} 3177 author = {Tariq, Muhammad Adnan and Boris Koldehofe and Gerald G. Koch and Kurt Rothermel}
3178} 3178}
3179@conference {conf/infocom/WuLR09, 3179@conference {conf/infocom/WuLR09,
@@ -3189,7 +3189,7 @@ We then strengthen the original congestion attack by combining it with a novel b
3189 www_section = {dblp, multi-channel, p2p streaming system}, 3189 www_section = {dblp, multi-channel, p2p streaming system},
3190 isbn = {978-1-4244-3512-8 }, 3190 isbn = {978-1-4244-3512-8 },
3191 doi = {http://dx.doi.org/10.1109/INFCOM.2009.5061908}, 3191 doi = {http://dx.doi.org/10.1109/INFCOM.2009.5061908},
3192 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2709\%20-\%20Queusing\%20models\%20for\%20p2p\%20streaming\%20systems.pdf}, 3192 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2709\%20-\%20Queusing\%20models\%20for\%20p2p\%20streaming\%20systems.pdf},
3193 author = {Wu, Di and Yong Liu and Keith W. Ross} 3193 author = {Wu, Di and Yong Liu and Keith W. Ross}
3194} 3194}
3195@conference {wpes09-bridge-attack, 3195@conference {wpes09-bridge-attack,
@@ -3204,7 +3204,7 @@ We then strengthen the original congestion attack by combining it with a novel b
3204 isbn = {978-1-60558-783-7}, 3204 isbn = {978-1-60558-783-7},
3205 doi = {10.1145/1655188.1655193}, 3205 doi = {10.1145/1655188.1655193},
3206 url = {http://portal.acm.org/citation.cfm?id=1655193}, 3206 url = {http://portal.acm.org/citation.cfm?id=1655193},
3207 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/wpes09-bridge-attack.pdf}, 3207 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/wpes09-bridge-attack.pdf},
3208 author = {Jon McLachlan and Nicholas J. Hopper} 3208 author = {Jon McLachlan and Nicholas J. Hopper}
3209} 3209}
3210@article {2009_12, 3210@article {2009_12,
@@ -3218,7 +3218,7 @@ We then strengthen the original congestion attack by combining it with a novel b
3218 issn = {0304-3975}, 3218 issn = {0304-3975},
3219 doi = {10.1016/j.tcs.2008.10.003}, 3219 doi = {10.1016/j.tcs.2008.10.003},
3220 url = {http://dx.doi.org/10.1016/j.tcs.2008.10.003}, 3220 url = {http://dx.doi.org/10.1016/j.tcs.2008.10.003},
3221 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/OPODIS-116b.pdf}, 3221 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/OPODIS-116b.pdf},
3222 author = {Awerbuch, Baruch and Scheideler, Christian} 3222 author = {Awerbuch, Baruch and Scheideler, Christian}
3223} 3223}
3224@conference {1658999, 3224@conference {1658999,
@@ -3236,7 +3236,7 @@ In this paper, we propose Scalable Landmark Flooding (SLF), a new routing protoc
3236 isbn = {978-1-60558-751-6}, 3236 isbn = {978-1-60558-751-6},
3237 doi = {10.1145/1658997.1658999}, 3237 doi = {10.1145/1658997.1658999},
3238 url = {http://portal.acm.org/citation.cfm?id=1658997.1658999$\#$}, 3238 url = {http://portal.acm.org/citation.cfm?id=1658997.1658999$\#$},
3239 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/di09slf.pdf}, 3239 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/di09slf.pdf},
3240 author = {Di, Pengfei and Thomas Fuhrmann} 3240 author = {Di, Pengfei and Thomas Fuhrmann}
3241} 3241}
3242@conference {ccs09-torsk, 3242@conference {ccs09-torsk,
@@ -3253,7 +3253,7 @@ Unlike previous proposals for P2P anonymity schemes, Torsk does not require all
3253 isbn = {978-1-60558-894-0}, 3253 isbn = {978-1-60558-894-0},
3254 doi = {10.1145/1653662.1653733}, 3254 doi = {10.1145/1653662.1653733},
3255 url = {http://portal.acm.org/citation.cfm?id=1653662.1653733}, 3255 url = {http://portal.acm.org/citation.cfm?id=1653662.1653733},
3256 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ccs09-torsk.pdf}, 3256 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ccs09-torsk.pdf},
3257 author = {Jon McLachlan and Andrew Tran and Nicholas J. Hopper and Yongdae Kim} 3257 author = {Jon McLachlan and Andrew Tran and Nicholas J. Hopper and Yongdae Kim}
3258} 3258}
3259@conference {2009_13, 3259@conference {2009_13,
@@ -3263,7 +3263,7 @@ Unlike previous proposals for P2P anonymity schemes, Torsk does not require all
3263 note = {http://eceasst.cs.tu-berlin.de/index.php/eceasst/article/download/208/205}, 3263 note = {http://eceasst.cs.tu-berlin.de/index.php/eceasst/article/download/208/205},
3264 abstract = {The future Internet of Things as an intelligent collaboration of miniaturized sensors poses new challenges to security and end-user privacy. The ITU has identified that the protection of data and privacy of users is one of the key challenges in the Internet of Things [Int05]: lack of confidence about privacy will result in decreased adoption among users and therefore is one of the driving factors in the success of the Internet of Things. This paper gives an overview, categorization, and analysis of security and privacy challenges in the Internet of Things}, 3264 abstract = {The future Internet of Things as an intelligent collaboration of miniaturized sensors poses new challenges to security and end-user privacy. The ITU has identified that the protection of data and privacy of users is one of the key challenges in the Internet of Things [Int05]: lack of confidence about privacy will result in decreased adoption among users and therefore is one of the driving factors in the success of the Internet of Things. This paper gives an overview, categorization, and analysis of security and privacy challenges in the Internet of Things},
3265 url = {http://doc.tm.uka.de/2009/security-gsn-camera-ready.pdf}, 3265 url = {http://doc.tm.uka.de/2009/security-gsn-camera-ready.pdf},
3266 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/gsn09-security-mayer.pdf}, 3266 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/gsn09-security-mayer.pdf},
3267 author = {Mayer, Christoph P.} 3267 author = {Mayer, Christoph P.}
3268} 3268}
3269@book {2009_14, 3269@book {2009_14,
@@ -3278,7 +3278,7 @@ Unlike previous proposals for P2P anonymity schemes, Torsk does not require all
3278 issn = {978-3-642-10864-8}, 3278 issn = {978-3-642-10864-8},
3279 doi = {10.1007/978-3-642-10865-5}, 3279 doi = {10.1007/978-3-642-10865-5},
3280 url = {http://www.springerlink.com/content/28660w27373vh408/}, 3280 url = {http://www.springerlink.com/content/28660w27373vh408/},
3281 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fulltext3.pdf}, 3281 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fulltext3.pdf},
3282 publisher = {unknown}, 3282 publisher = {unknown},
3283 author = {Yaser Houri and Manfred Jobmann and Thomas Fuhrmann} 3283 author = {Yaser Houri and Manfred Jobmann and Thomas Fuhrmann}
3284} 3284}
@@ -3314,7 +3314,7 @@ mous communication},
3314 isbn = {978-1-60558-894-0}, 3314 isbn = {978-1-60558-894-0},
3315 doi = {10.1145/1653662.1653683}, 3315 doi = {10.1145/1653662.1653683},
3316 url = {http://doi.acm.org/10.1145/1653662.1653683}, 3316 url = {http://doi.acm.org/10.1145/1653662.1653683},
3317 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/shadowwalker-ccs09.pdf}, 3317 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/shadowwalker-ccs09.pdf},
3318 author = {Mittal, Prateek and Borisov, Nikita} 3318 author = {Mittal, Prateek and Borisov, Nikita}
3319} 3319}
3320@article {2009_16, 3320@article {2009_16,
@@ -3327,7 +3327,7 @@ mous communication},
3327 author = {unknown}, 3327 author = {unknown},
3328 doi = {10.1155/2009/617203}, 3328 doi = {10.1155/2009/617203},
3329 url = {http://www.hindawi.com/journals/ijdmb/2009/617203.html}, 3329 url = {http://www.hindawi.com/journals/ijdmb/2009/617203.html},
3330 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/617203.pdf}, 3330 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/617203.pdf},
3331 editor = {Georg Acher and Detlef Fliegl and Thomas Fuhrmann} 3331 editor = {Georg Acher and Detlef Fliegl and Thomas Fuhrmann}
3332} 3332}
3333@mastersthesis {2009_17, 3333@mastersthesis {2009_17,
@@ -3345,7 +3345,7 @@ We will then present a new algorithm, Support-Based Distributed Search, develope
3345A number of modifications to this new algorithm are considered, and comparisons are made with existing algorithms, effectively demonstrating its place within the field. Empirical analysis is then conducted, and comparisons are made to state-of-the-art algorithms most able to handle large distributed constraint satisfaction problems. 3345A number of modifications to this new algorithm are considered, and comparisons are made with existing algorithms, effectively demonstrating its place within the field. Empirical analysis is then conducted, and comparisons are made to state-of-the-art algorithms most able to handle large distributed constraint satisfaction problems.
3346Finally, it is argued that any future development in distributed constraint satisfaction will necessitate changes in the algorithms used to solve small {\textquoteleft}embedded' constraint satisfaction problems. The impact on embedded constraint satisfaction problems is considered, with a brief presentation of an improved algorithm for hypertree decomposition}, 3346Finally, it is argued that any future development in distributed constraint satisfaction will necessitate changes in the algorithms used to solve small {\textquoteleft}embedded' constraint satisfaction problems. The impact on embedded constraint satisfaction problems is considered, with a brief presentation of an improved algorithm for hypertree decomposition},
3347 www_section = {algorithms, distributed constraint satisfaction}, 3347 www_section = {algorithms, distributed constraint satisfaction},
3348 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Thesis\%20-\%20P.Harvey.pdf}, 3348 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Thesis\%20-\%20P.Harvey.pdf},
3349 author = {Peter Harvey} 3349 author = {Peter Harvey}
3350} 3350}
3351@conference {DBLP:conf/sp/DanezisG09, 3351@conference {DBLP:conf/sp/DanezisG09,
@@ -3360,7 +3360,7 @@ Finally, it is argued that any future development in distributed constraint sati
3360 isbn = {978-0-7695-3633-0}, 3360 isbn = {978-0-7695-3633-0},
3361 doi = {10.1109/SP.2009.15}, 3361 doi = {10.1109/SP.2009.15},
3362 url = {http://portal.acm.org/citation.cfm?id=1607723.1608138}, 3362 url = {http://portal.acm.org/citation.cfm?id=1607723.1608138},
3363 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DanezisG09.pdf}, 3363 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DanezisG09.pdf},
3364 author = {George Danezis and Ian Goldberg} 3364 author = {George Danezis and Ian Goldberg}
3365} 3365}
3366@conference {2009_18, 3366@conference {2009_18,
@@ -3370,7 +3370,7 @@ Finally, it is argued that any future development in distributed constraint sati
3370 abstract = {Application deployment on Wireless Mesh Networks (WMNs) is a challenging issue. First it requires communication abstractions that allow for interoperation with Internet applications and second the offered solution should be sensitive to the available resources in the underlying network. Loosely coupled communication abstractions, like publish/subscribe, promote interoperability, but unfortunately are typically implemented at the application layer without considering the available resources at the underlay imposing a significant degradation of application performance in the setting of Wireless Mesh Networks. In this paper we present SPINE, a content-based publish/subscribe system, which considers the particular challenges of deploying application-level services in Wireless Mesh Networks. SPINE is designed to reduce the overhead which stems from both publications and reconfigurations, to cope with the inherent capacity limitations on communication links as well as with mobility of the wireless mesh-clients. We demonstrate the effectiveness of SPINE by comparison with traditional approaches in implementing content-based publish/subscribe}, 3370 abstract = {Application deployment on Wireless Mesh Networks (WMNs) is a challenging issue. First it requires communication abstractions that allow for interoperation with Internet applications and second the offered solution should be sensitive to the available resources in the underlying network. Loosely coupled communication abstractions, like publish/subscribe, promote interoperability, but unfortunately are typically implemented at the application layer without considering the available resources at the underlay imposing a significant degradation of application performance in the setting of Wireless Mesh Networks. In this paper we present SPINE, a content-based publish/subscribe system, which considers the particular challenges of deploying application-level services in Wireless Mesh Networks. SPINE is designed to reduce the overhead which stems from both publications and reconfigurations, to cope with the inherent capacity limitations on communication links as well as with mobility of the wireless mesh-clients. We demonstrate the effectiveness of SPINE by comparison with traditional approaches in implementing content-based publish/subscribe},
3371 www_section = {mesh networks, publish/subscribe}, 3371 www_section = {mesh networks, publish/subscribe},
3372 url = {http://studia.complexica.net/index.php?option=com_content\&view=article\&id=116\%3Aspine--adaptive-publishsubscribe-for-wireless-mesh-networks-pp-320-353\&catid=47\%3Anumber-3\&Itemid=89\&lang=fr}, 3372 url = {http://studia.complexica.net/index.php?option=com_content\&view=article\&id=116\%3Aspine--adaptive-publishsubscribe-for-wireless-mesh-networks-pp-320-353\&catid=47\%3Anumber-3\&Itemid=89\&lang=fr},
3373 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/RI070302.pdf}, 3373 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/RI070302.pdf},
3374 author = {Jorge Alfonso Briones-Garc{\i}a and Boris Koldehofe and Kurt Rothermel} 3374 author = {Jorge Alfonso Briones-Garc{\i}a and Boris Koldehofe and Kurt Rothermel}
3375} 3375}
3376@booklet {2009_19, 3376@booklet {2009_19,
@@ -3381,7 +3381,7 @@ Finally, it is argued that any future development in distributed constraint sati
3381 publisher = {Institute of Telematics, Universit{\"a}t Karlsruhe (TH)}, 3381 publisher = {Institute of Telematics, Universit{\"a}t Karlsruhe (TH)},
3382 type = {Telematics Technical Report}, 3382 type = {Telematics Technical Report},
3383 url = {http://doc.tm.uka.de/2009/TM-2009-3.pdf}, 3383 url = {http://doc.tm.uka.de/2009/TM-2009-3.pdf},
3384 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/TM-2009-3.pdf}, 3384 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/TM-2009-3.pdf},
3385 author = {Ralph Holz and Mayer, Christoph P. and Sebastian Mies and Heiko Niedermayer and Tariq, Muhammad Adnan} 3385 author = {Ralph Holz and Mayer, Christoph P. and Sebastian Mies and Heiko Niedermayer and Tariq, Muhammad Adnan}
3386} 3386}
3387@conference {DBLP:conf/infocom/LandaGCMR09, 3387@conference {DBLP:conf/infocom/LandaGCMR09,
@@ -3396,7 +3396,7 @@ Finally, it is argued that any future development in distributed constraint sati
3396 abstract = {Although direct reciprocity (Tit-for-Tat) contribution systems have been successful in reducing free-loading in peer-to-peer overlays, it has been shown that, unless the contribution network is dense, they tend to be slow (or may even fail) to converge [1]. On the other hand, current indirect reciprocity mechanisms based on reputation systems tend to be susceptible to sybil attacks, peer slander and whitewashing.In this paper we present PledgeRoute, an accounting mechanism for peer contributions that is based on social capital. This mechanism allows peers to contribute resources to one set of peers and use this contribution to obtain services from a different set of peers, at a different time. PledgeRoute is completely decentralised, can be implemented in both structured and unstructured peer-to-peer systems, and it is resistant to the three kinds of attacks mentioned above.To achieve this, we model contribution transitivity as a routing problem in the contribution network of the peer-to-peer overlay, and we present arguments for the routing behaviour and the sybilproofness of our contribution transfer procedures on this basis. Additionally, we present mechanisms for the seeding of the contribution network, and a combination of incentive mechanisms and reciprocation policies that motivate peers to adhere to the protocol and maximise their service contributions to the overlay}, 3396 abstract = {Although direct reciprocity (Tit-for-Tat) contribution systems have been successful in reducing free-loading in peer-to-peer overlays, it has been shown that, unless the contribution network is dense, they tend to be slow (or may even fail) to converge [1]. On the other hand, current indirect reciprocity mechanisms based on reputation systems tend to be susceptible to sybil attacks, peer slander and whitewashing.In this paper we present PledgeRoute, an accounting mechanism for peer contributions that is based on social capital. This mechanism allows peers to contribute resources to one set of peers and use this contribution to obtain services from a different set of peers, at a different time. PledgeRoute is completely decentralised, can be implemented in both structured and unstructured peer-to-peer systems, and it is resistant to the three kinds of attacks mentioned above.To achieve this, we model contribution transitivity as a routing problem in the contribution network of the peer-to-peer overlay, and we present arguments for the routing behaviour and the sybilproofness of our contribution transfer procedures on this basis. Additionally, we present mechanisms for the seeding of the contribution network, and a combination of incentive mechanisms and reciprocation policies that motivate peers to adhere to the protocol and maximise their service contributions to the overlay},
3397 www_section = {p2p network, reprocity mechanism, sybilproof}, 3397 www_section = {p2p network, reprocity mechanism, sybilproof},
3398 isbn = {978-1-4244-3512-8}, 3398 isbn = {978-1-4244-3512-8},
3399 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2709\%20-\%20Sybilproof\%20Indirect\%20Reprocity\%20Mechanism\%20for\%20P2P\%20Networks\%20.pdf}, 3399 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2709\%20-\%20Sybilproof\%20Indirect\%20Reprocity\%20Mechanism\%20for\%20P2P\%20Networks\%20.pdf},
3400 author = {Raul Leonardo Landa Gamiochipi and David Griffin and Richard G. Clegg and Eleni Mykoniati and Miguel Rio} 3400 author = {Raul Leonardo Landa Gamiochipi and David Griffin and Richard G. Clegg and Eleni Mykoniati and Miguel Rio}
3401} 3401}
3402@conference {Resnick:2009:STT:1566374.1566423, 3402@conference {Resnick:2009:STT:1566374.1566423,
@@ -3414,7 +3414,7 @@ Finally, it is argued that any future development in distributed constraint sati
3414 isbn = {978-1-60558-458-4}, 3414 isbn = {978-1-60558-458-4},
3415 doi = {http://doi.acm.org/10.1145/1566374.1566423}, 3415 doi = {http://doi.acm.org/10.1145/1566374.1566423},
3416 url = {http://doi.acm.org/10.1145/1566374.1566423}, 3416 url = {http://doi.acm.org/10.1145/1566374.1566423},
3417 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EC\%2709\%20-\%20Sybilproof\%20transitive\%20trust\%20protocols.pdf}, 3417 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EC\%2709\%20-\%20Sybilproof\%20transitive\%20trust\%20protocols.pdf},
3418 author = {Paul Resnick and Sami, Rahul} 3418 author = {Paul Resnick and Sami, Rahul}
3419} 3419}
3420@mastersthesis {Douglas-thesis, 3420@mastersthesis {Douglas-thesis,
@@ -3425,7 +3425,7 @@ Finally, it is argued that any future development in distributed constraint sati
3425 type = {phd}, 3425 type = {phd},
3426 abstract = {Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama's Cybersecurity Chief-elect feels challenged by the increasing sophistication of cyber attacks. Indeed, the rising quantity and ubiquity of new surveillance technologies in cyberspace enables instant, undetectable, and unsolicited information collection about entities. Hence, anonymity and privacy are becoming increasingly important issues. Anonymization enables entities to protect their data and systems from a diverse set of cyber attacks and preserve privacy. This research provides a systematic analysis of anonymity degradation, preservation and elimination in cyberspace to enchance the security of information assets. This includes discovery/obfuscation of identities and actions of/from potential adversaries. First, novel taxonomies are developed for classifying and comparing the wide variety of well-established and state-of-the-art anonymous networking protocols. These expand the classical definition of anonymity and are the first known to capture the peer-to-peer and mobile ad hoc anonymous protocol family relationships. Second, a unique synthesis of state-of-the-art anonymity metrics is provided. This significantly aids an entities ability to reliably measure changing anonymity levels; thereby, increasing their ability to defend against cyber attacks. Finally, a novel epistemic-based model is created to characterize how an adversary reasons with knowledge to degrade anonymity}, 3426 abstract = {Any entity operating in cyberspace is susceptible to debilitating attacks. With cyber attacks intended to gather intelligence and disrupt communications rapidly replacing the threat of conventional and nuclear attacks, a new age of warfare is at hand. In 2003, the United States acknowledged that the speed and anonymity of cyber attacks makes distinguishing among the actions of terrorists, criminals, and nation states difficult. Even President Obama's Cybersecurity Chief-elect feels challenged by the increasing sophistication of cyber attacks. Indeed, the rising quantity and ubiquity of new surveillance technologies in cyberspace enables instant, undetectable, and unsolicited information collection about entities. Hence, anonymity and privacy are becoming increasingly important issues. Anonymization enables entities to protect their data and systems from a diverse set of cyber attacks and preserve privacy. This research provides a systematic analysis of anonymity degradation, preservation and elimination in cyberspace to enchance the security of information assets. This includes discovery/obfuscation of identities and actions of/from potential adversaries. First, novel taxonomies are developed for classifying and comparing the wide variety of well-established and state-of-the-art anonymous networking protocols. These expand the classical definition of anonymity and are the first known to capture the peer-to-peer and mobile ad hoc anonymous protocol family relationships. Second, a unique synthesis of state-of-the-art anonymity metrics is provided. This significantly aids an entities ability to reliably measure changing anonymity levels; thereby, increasing their ability to defend against cyber attacks. Finally, a novel epistemic-based model is created to characterize how an adversary reasons with knowledge to degrade anonymity},
3427 url = {http://oai.dtic.mil/oai/oai?verb=getRecord\&metadataPrefix=html\&identifier=ADA495688}, 3427 url = {http://oai.dtic.mil/oai/oai?verb=getRecord\&metadataPrefix=html\&identifier=ADA495688},
3428 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Douglas-thesis.pdf}, 3428 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Douglas-thesis.pdf},
3429 author = {Douglas Kelly} 3429 author = {Douglas Kelly}
3430} 3430}
3431@conference {2009_20, 3431@conference {2009_20,
@@ -3452,7 +3452,7 @@ Finally, it is argued that any future development in distributed constraint sati
3452 www_section = {content distribution, traffic engineering}, 3452 www_section = {content distribution, traffic engineering},
3453 isbn = {978-1-4244-3512-8}, 3453 isbn = {978-1-4244-3512-8},
3454 doi = {10.1109/INFCOM.2009.5061960}, 3454 doi = {10.1109/INFCOM.2009.5061960},
3455 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2709\%20-\%20Traffic\%20Engineering\%20vs.\%20Content\%20Distribution.PDF}, 3455 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2709\%20-\%20Traffic\%20Engineering\%20vs.\%20Content\%20Distribution.PDF},
3456 author = {Dominic DiPalantino and Ramesh Johari} 3456 author = {Dominic DiPalantino and Ramesh Johari}
3457} 3457}
3458@conference {morphing09, 3458@conference {morphing09,
@@ -3467,7 +3467,7 @@ mitigating such threats is to pad packets to uniform sizes or to send packets at
3467algorithms by optimally morphing one class of traffic to look like another class. Through the use of convex optimization 3467algorithms by optimally morphing one class of traffic to look like another class. Through the use of convex optimization
3468techniques, we show how to optimally modify packets in real-time to reduce the accuracy of a variety of traffic classifiers while incurring much less overhead than padding. Our evaluation of this technique against two published traffic classifiers for VoIP [29] and web traffic [14] shows that morphing works well on a wide range of network data{\textemdash}in some cases, simultaneously providing better privacy and lower overhead than na{\textasciidieresis}{\i}ve defenses}, 3468techniques, we show how to optimally modify packets in real-time to reduce the accuracy of a variety of traffic classifiers while incurring much less overhead than padding. Our evaluation of this technique against two published traffic classifiers for VoIP [29] and web traffic [14] shows that morphing works well on a wide range of network data{\textemdash}in some cases, simultaneously providing better privacy and lower overhead than na{\textasciidieresis}{\i}ve defenses},
3469 www_section = {privacy, traffic analysis, VoIP}, 3469 www_section = {privacy, traffic analysis, VoIP},
3470 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/morphing09.pdf}, 3470 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/morphing09.pdf},
3471 author = {Charles Wright and Scott Coull and Fabian Monrose} 3471 author = {Charles Wright and Scott Coull and Fabian Monrose}
3472} 3472}
3473@book {2009_22, 3473@book {2009_22,
@@ -3482,7 +3482,7 @@ techniques, we show how to optimally modify packets in real-time to reduce the a
3482 issn = {0302-9743}, 3482 issn = {0302-9743},
3483 doi = {10.1007/978-3-642-10865-5}, 3483 doi = {10.1007/978-3-642-10865-5},
3484 url = {http://www.springerlink.com/content/h7r3q58251x72155/}, 3484 url = {http://www.springerlink.com/content/h7r3q58251x72155/},
3485 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fulltext.pdf}, 3485 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fulltext.pdf},
3486 publisher = {unknown}, 3486 publisher = {unknown},
3487 author = {Benedikt Elser and Andreas F{\"o}rschler and Thomas Fuhrmann} 3487 author = {Benedikt Elser and Andreas F{\"o}rschler and Thomas Fuhrmann}
3488} 3488}
@@ -3504,7 +3504,7 @@ We present simulation results which show the performance gain of the proposed im
3504 isbn = {978-1-60558-569-7}, 3504 isbn = {978-1-60558-569-7},
3505 doi = {10.1145/1582379.1582481}, 3505 doi = {10.1145/1582379.1582481},
3506 url = {http://portal.acm.org/citation.cfm?id=1582481$\#$}, 3506 url = {http://portal.acm.org/citation.cfm?id=1582481$\#$},
3507 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/di09broadcastssr.pdf}, 3507 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/di09broadcastssr.pdf},
3508 author = {Di, Pengfei and Thomas Fuhrmann} 3508 author = {Di, Pengfei and Thomas Fuhrmann}
3509} 3509}
3510@conference {ccsw09-fingerprinting, 3510@conference {ccsw09-fingerprinting,
@@ -3522,7 +3522,7 @@ We present a novel method that applies common text mining techniques to the norm
3522 isbn = {978-1-60558-784-4}, 3522 isbn = {978-1-60558-784-4},
3523 doi = {10.1145/1655008.1655013}, 3523 doi = {10.1145/1655008.1655013},
3524 url = {http://portal.acm.org/citation.cfm?id=1655013\&dl=GUIDE\&coll=GUIDE\&CFID=83763210\&CFTOKEN=75697565}, 3524 url = {http://portal.acm.org/citation.cfm?id=1655013\&dl=GUIDE\&coll=GUIDE\&CFID=83763210\&CFTOKEN=75697565},
3525 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ccsw09-fingerprinting.pdf}, 3525 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ccsw09-fingerprinting.pdf},
3526 author = {Dominik Herrmann and Rolf Wendolsky and Hannes Federrath} 3526 author = {Dominik Herrmann and Rolf Wendolsky and Hannes Federrath}
3527} 3527}
3528@conference {1590633, 3528@conference {1590633,
@@ -3554,7 +3554,7 @@ We present a novel method that applies common text mining techniques to the norm
3554 isbn = {978-3-642-04443-4}, 3554 isbn = {978-3-642-04443-4},
3555 doi = {10.1007/978-3-642-04444-1}, 3555 doi = {10.1007/978-3-642-04444-1},
3556 url = {http://www.springerlink.com/content/t6q86u137t4762k8/}, 3556 url = {http://www.springerlink.com/content/t6q86u137t4762k8/},
3557 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DanezisDKT09.pdf}, 3557 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DanezisDKT09.pdf},
3558 author = {George Danezis and Claudia Diaz and Emilia K{\"a}sper and Carmela Troncoso}, 3558 author = {George Danezis and Claudia Diaz and Emilia K{\"a}sper and Carmela Troncoso},
3559 editor = {Michael Backes and Peng Ning} 3559 editor = {Michael Backes and Peng Ning}
3560} 3560}
@@ -3572,7 +3572,7 @@ The solutions are efficient, with bandwidth and latency overheads of under 4\% a
3572 isbn = {978-1-60558-783-7 }, 3572 isbn = {978-1-60558-783-7 },
3573 doi = {10.1145/1655188.1655195}, 3573 doi = {10.1145/1655188.1655195},
3574 url = {http://portal.acm.org/citation.cfm?id=1655188.1655195}, 3574 url = {http://portal.acm.org/citation.cfm?id=1655188.1655195},
3575 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/wpes09-xpay.pdf}, 3575 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/wpes09-xpay.pdf},
3576 author = {Yao Chen and Radu Sion and Bogdan Carbunar} 3576 author = {Yao Chen and Radu Sion and Bogdan Carbunar}
3577} 3577}
3578@conference {2008_0, 3578@conference {2008_0,
@@ -3582,7 +3582,7 @@ The solutions are efficient, with bandwidth and latency overheads of under 4\% a
3582 month = jan, 3582 month = jan,
3583 abstract = {Ambient Intelligence pursues the vision that small networked computers will jointly perform tasks that create the illusion of an intelligent environment. One of the most pressing challenges in this context is the question how one could easily develop software for such highly complex, but resource-scarce systems. In this paper we present a snapshot of our ongoing work towards facilitating oftware development for Am- bient Intelligence systems. In particular, we present the AmbiComp [1] platform. It consists of small, modular hardware, a 3583 abstract = {Ambient Intelligence pursues the vision that small networked computers will jointly perform tasks that create the illusion of an intelligent environment. One of the most pressing challenges in this context is the question how one could easily develop software for such highly complex, but resource-scarce systems. In this paper we present a snapshot of our ongoing work towards facilitating oftware development for Am- bient Intelligence systems. In particular, we present the AmbiComp [1] platform. It consists of small, modular hardware, a
3584exible rmware including a Java Virtual Machine, and an Eclipse-based integrated development environment}, 3584exible rmware including a Java Virtual Machine, and an Eclipse-based integrated development environment},
3585 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/publ_2008_eickhold-fuhrmann-saballus-ua_ambicomp.pdf}, 3585 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/publ_2008_eickhold-fuhrmann-saballus-ua_ambicomp.pdf},
3586 author = {Johannes Eickhold and Thomas Fuhrmann and Bjoern Saballus and Sven Schlender and Thomas Suchy} 3586 author = {Johannes Eickhold and Thomas Fuhrmann and Bjoern Saballus and Sven Schlender and Thomas Suchy}
3587} 3587}
3588@conference {2008_1, 3588@conference {2008_1,
@@ -3609,7 +3609,7 @@ A general framework for implementing distributed local search algorithms for Dis
3609 www_section = {algorithms, BFS-Tree, DCOP, DisCOPs, framework}, 3609 www_section = {algorithms, BFS-Tree, DCOP, DisCOPs, framework},
3610 isbn = {978-0-9817381-2-3}, 3610 isbn = {978-0-9817381-2-3},
3611 url = {http://dl.acm.org/citation.cfm?id=1402821.1402895}, 3611 url = {http://dl.acm.org/citation.cfm?id=1402821.1402895},
3612 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/AAAI\%2708\%20-\%20Local\%20search\%20for\%20DCOP.pdf}, 3612 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/AAAI\%2708\%20-\%20Local\%20search\%20for\%20DCOP.pdf},
3613 author = {Zivan, Roie} 3613 author = {Zivan, Roie}
3614} 3614}
3615@booklet {WongSirer2008ApproximateMatching, 3615@booklet {WongSirer2008ApproximateMatching,
@@ -3635,7 +3635,7 @@ A general framework for implementing distributed local search algorithms for Dis
3635 isbn = {978-1-60558-179-8}, 3635 isbn = {978-1-60558-179-8},
3636 doi = {http://doi.acm.org/10.1145/1403027.1403032}, 3636 doi = {http://doi.acm.org/10.1145/1403027.1403032},
3637 url = {http://doi.acm.org/10.1145/1403027.1403032}, 3637 url = {http://doi.acm.org/10.1145/1403027.1403032},
3638 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NetEcon\%2708\%20-\%20Yang\%20-\%20Auction\%2C\%20but\%20don\%27t\%20block.pdf}, 3638 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NetEcon\%2708\%20-\%20Yang\%20-\%20Auction\%2C\%20but\%20don\%27t\%20block.pdf},
3639 author = {Yang, Xiaowei} 3639 author = {Yang, Xiaowei}
3640} 3640}
3641@conference {1387603, 3641@conference {1387603,
@@ -3653,7 +3653,7 @@ We present a simulation environment for such protocols that combines a declarati
3653We use the simulator to compare representative protocols under identical conditions and rapidly explore the effects of changes in the costs of crypto operations, workloads, network conditions and faults. For example, we show that Zyzzyva outperforms protocols like PBFT and Q/U undermost but not all conditions, indicating that one-size-fits-all protocols may be hard if not impossible to design in practice}, 3653We use the simulator to compare representative protocols under identical conditions and rapidly explore the effects of changes in the costs of crypto operations, workloads, network conditions and faults. For example, we show that Zyzzyva outperforms protocols like PBFT and Q/U undermost but not all conditions, indicating that one-size-fits-all protocols may be hard if not impossible to design in practice},
3654 isbn = {111-999-5555-22-1}, 3654 isbn = {111-999-5555-22-1},
3655 url = {http://portal.acm.org/citation.cfm?id=1387603$\#$}, 3655 url = {http://portal.acm.org/citation.cfm?id=1387603$\#$},
3656 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/BFTSim-nsdi08.pdf}, 3656 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/BFTSim-nsdi08.pdf},
3657 author = {Singh, Atul and Das, Tathagata and Maniatis, Petros and Peter Druschel and Roscoe, Timothy} 3657 author = {Singh, Atul and Das, Tathagata and Maniatis, Petros and Peter Druschel and Roscoe, Timothy}
3658} 3658}
3659@conference {bauer:alpaca2008, 3659@conference {bauer:alpaca2008,
@@ -3668,7 +3668,7 @@ We use the simulator to compare representative protocols under identical conditi
3668 www_section = {ad-hoc networks, anonymity, P2P, privacy}, 3668 www_section = {ad-hoc networks, anonymity, P2P, privacy},
3669 doi = {10.1145/1461464.1461465}, 3669 doi = {10.1145/1461464.1461465},
3670 url = {http://portal.acm.org/citation.cfm?id=1461465}, 3670 url = {http://portal.acm.org/citation.cfm?id=1461465},
3671 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/bauer-alpaca2008.pdf}, 3671 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/bauer-alpaca2008.pdf},
3672 author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Douglas Sicker} 3672 author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Douglas Sicker}
3673} 3673}
3674@article {Levin:2008:BAA:1402946.1402987, 3674@article {Levin:2008:BAA:1402946.1402987,
@@ -3685,7 +3685,7 @@ We use the simulator to compare representative protocols under identical conditi
3685 issn = {0146-4833}, 3685 issn = {0146-4833},
3686 doi = {http://doi.acm.org/10.1145/1402946.1402987}, 3686 doi = {http://doi.acm.org/10.1145/1402946.1402987},
3687 url = {http://doi.acm.org/10.1145/1402946.1402987}, 3687 url = {http://doi.acm.org/10.1145/1402946.1402987},
3688 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%20Comput.\%20Commun.\%20Rev.\%20-\%20BitTorrent\%20is\%20an\%20Auction.pdf}, 3688 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%20Comput.\%20Commun.\%20Rev.\%20-\%20BitTorrent\%20is\%20an\%20Auction.pdf},
3689 author = {Levin, Dave and LaCurts, Katrina and Spring, Neil and Bobby Bhattacharjee} 3689 author = {Levin, Dave and LaCurts, Katrina and Spring, Neil and Bobby Bhattacharjee}
3690} 3690}
3691@conference { bootstrap2008gauthierdickey, 3691@conference { bootstrap2008gauthierdickey,
@@ -3700,7 +3700,7 @@ We use the simulator to compare representative protocols under identical conditi
3700present experimental results demonstrating that with this approach it is efficient and practical to bootstrap Gnutella-sized peer-to-peer networks --- without the need for centralized services or the public exposure of end-user's private IP addresses}, 3700present experimental results demonstrating that with this approach it is efficient and practical to bootstrap Gnutella-sized peer-to-peer networks --- without the need for centralized services or the public exposure of end-user's private IP addresses},
3701 www_section = {bootstrapping, DNS, installation, P2P}, 3701 www_section = {bootstrapping, DNS, installation, P2P},
3702 url = {http://grothoff.org/christian/bootstrap.pdf}, 3702 url = {http://grothoff.org/christian/bootstrap.pdf},
3703 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/bootstrap.pdf}, 3703 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/bootstrap.pdf},
3704 author = {Chis GauthierDickey and Christian Grothoff} 3704 author = {Chis GauthierDickey and Christian Grothoff}
3705} 3705}
3706@conference {shimshock-pet2008, 3706@conference {shimshock-pet2008,
@@ -3717,7 +3717,7 @@ present experimental results demonstrating that with this approach it is efficie
3717 isbn = {978-3-540-70629-8}, 3717 isbn = {978-3-540-70629-8},
3718 doi = {10.1007/978-3-540-70630-4_7}, 3718 doi = {10.1007/978-3-540-70630-4_7},
3719 url = {http://portal.acm.org/citation.cfm?id=1428259.1428266}, 3719 url = {http://portal.acm.org/citation.cfm?id=1428259.1428266},
3720 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/shimshock-pet2008.pdf}, 3720 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/shimshock-pet2008.pdf},
3721 author = {Eric Shimshock and Matt Staats and Nicholas J. Hopper} 3721 author = {Eric Shimshock and Matt Staats and Nicholas J. Hopper}
3722} 3722}
3723@conference {danezis-pet2008, 3723@conference {danezis-pet2008,
@@ -3734,7 +3734,7 @@ present experimental results demonstrating that with this approach it is efficie
3734 isbn = {978-3-540-70629-8}, 3734 isbn = {978-3-540-70629-8},
3735 doi = {10.1007/978-3-540-70630-4}, 3735 doi = {10.1007/978-3-540-70630-4},
3736 url = {http://www.springerlink.com/content/q2r7g81286026576/}, 3736 url = {http://www.springerlink.com/content/q2r7g81286026576/},
3737 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/danezis-pet2008.pdf}, 3737 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/danezis-pet2008.pdf},
3738 author = {George Danezis and Paul Syverson}, 3738 author = {George Danezis and Paul Syverson},
3739 editor = {Borisov, Nikita and Ian Goldberg} 3739 editor = {Borisov, Nikita and Ian Goldberg}
3740} 3740}
@@ -3752,7 +3752,7 @@ present experimental results demonstrating that with this approach it is efficie
3752 issn = {1063-6692}, 3752 issn = {1063-6692},
3753 doi = {10.1109/TNET.2007.900406}, 3753 doi = {10.1109/TNET.2007.900406},
3754 url = {http://portal.acm.org/citation.cfm?id=1373992$\#$}, 3754 url = {http://portal.acm.org/citation.cfm?id=1373992$\#$},
3755 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/stutzbach.pdf}, 3755 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/stutzbach.pdf},
3756 author = {Stutzbach, Daniel and Rejaie, Reza and Sen, Subhabrata} 3756 author = {Stutzbach, Daniel and Rejaie, Reza and Sen, Subhabrata}
3757} 3757}
3758@conference {torspinISC08, 3758@conference {torspinISC08,
@@ -3769,7 +3769,7 @@ To evaluate our novel attack, we used a real-world anonymizing system, TOR. We s
3769 isbn = {978-3-540-85884-3}, 3769 isbn = {978-3-540-85884-3},
3770 doi = {10.1007/978-3-540-85886-7_11}, 3770 doi = {10.1007/978-3-540-85886-7_11},
3771 url = {http://portal.acm.org/citation.cfm?id=1432478.1432493}, 3771 url = {http://portal.acm.org/citation.cfm?id=1432478.1432493},
3772 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/torspinISC08.pdf}, 3772 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/torspinISC08.pdf},
3773 author = {Vasilis Pappas and Elias Athanasopoulos and Sotiris Ioannidis and Evangelos P. Markatos} 3773 author = {Vasilis Pappas and Elias Athanasopoulos and Sotiris Ioannidis and Evangelos P. Markatos}
3774} 3774}
3775@conference {MarPi08, 3775@conference {MarPi08,
@@ -3786,7 +3786,7 @@ To evaluate our novel attack, we used a real-world anonymizing system, TOR. We s
3786 isbn = {978-0-7695-3095-6}, 3786 isbn = {978-0-7695-3095-6},
3787 doi = {10.1109/AINA.2008.117}, 3787 doi = {10.1109/AINA.2008.117},
3788 url = {http://portal.acm.org/citation.cfm?id=1395079.1395235}, 3788 url = {http://portal.acm.org/citation.cfm?id=1395079.1395235},
3789 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/MarPi08.pdf}, 3789 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/MarPi08.pdf},
3790 author = {Igor Margasinski and Michal Pioro} 3790 author = {Igor Margasinski and Michal Pioro}
3791} 3791}
3792@conference {2008_2, 3792@conference {2008_2,
@@ -3794,7 +3794,7 @@ To evaluate our novel attack, we used a real-world anonymizing system, TOR. We s
3794 booktitle = { Proc. 1st Int.Workshop on Massively Multiuser Virtual Environments (MMVE'08)}, 3794 booktitle = { Proc. 1st Int.Workshop on Massively Multiuser Virtual Environments (MMVE'08)},
3795 year = {2008}, 3795 year = {2008},
3796 url = {http://www.spovnet.de/files/publications/MMVEConsistency.pdf/view}, 3796 url = {http://www.spovnet.de/files/publications/MMVEConsistency.pdf/view},
3797 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/MMVEConsistency.pdf}, 3797 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/MMVEConsistency.pdf},
3798 author = {Gregor Schiele and Richard S{\"u}selbeck and Arno Wacker and Triebel, Tonio and Christian Becker} 3798 author = {Gregor Schiele and Richard S{\"u}selbeck and Arno Wacker and Triebel, Tonio and Christian Becker}
3799} 3799}
3800@mastersthesis {2008_3, 3800@mastersthesis {2008_3,
@@ -3810,7 +3810,7 @@ To evaluate our novel attack, we used a real-world anonymizing system, TOR. We s
3810Often, part of the problem is to access large files in a share way. Until now, there are two often used approaches to allow this kind off access. Either the files are tranfered via FTP, e-mail or similar medium before the access happens, or a centralized server provides file services. The first alternative has the disadvantage that the entire file has to be transfered before the first access can be successful. If only small parts in the file have been changed compared to a previous version, the entire file has to be transfered anyway. The centralized approach has disadvantages regarding scalability and reliability. In both approaches authorization and authentication can be difficult in case users are seperated by untrusted network segements}, 3810Often, part of the problem is to access large files in a share way. Until now, there are two often used approaches to allow this kind off access. Either the files are tranfered via FTP, e-mail or similar medium before the access happens, or a centralized server provides file services. The first alternative has the disadvantage that the entire file has to be transfered before the first access can be successful. If only small parts in the file have been changed compared to a previous version, the entire file has to be transfered anyway. The centralized approach has disadvantages regarding scalability and reliability. In both approaches authorization and authentication can be difficult in case users are seperated by untrusted network segements},
3811 author = {unknown}, 3811 author = {unknown},
3812 url = {http://digbib.ubka.uni-karlsruhe.de/volltexte/1000009668}, 3812 url = {http://digbib.ubka.uni-karlsruhe.de/volltexte/1000009668},
3813 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Kutzner\%20-\%20The\%20descentralized\%20file\%20system\%20Igor-FS\%20as\%20an\%20application_0.pdf} 3813 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Kutzner\%20-\%20The\%20descentralized\%20file\%20system\%20Igor-FS\%20as\%20an\%20application_0.pdf}
3814} 3814}
3815@article { vrancx:decentralized, 3815@article { vrancx:decentralized,
3816 title = {Decentralized Learning in Markov Games}, 3816 title = {Decentralized Learning in Markov Games},
@@ -3821,7 +3821,7 @@ Often, part of the problem is to access large files in a share way. Until now, t
3821 pages = {976--981}, 3821 pages = {976--981},
3822 abstract = {Learning automata (LA) were recently shown to be valuable tools for designing multiagent reinforcement learning algorithms. One of the principal contributions of the LA theory is that a set of decentralized independent LA is able to control a finite Markov chain with unknown transition probabilities and rewards. In this paper, we propose to extend this algorithm to Markov games-a straightforward extension of single-agent Markov decision problems to distributed multiagent decision problems. We show that under the same ergodic assumptions of the original theorem, the extended algorithm will converge to a pure equilibrium point between agent policies}, 3822 abstract = {Learning automata (LA) were recently shown to be valuable tools for designing multiagent reinforcement learning algorithms. One of the principal contributions of the LA theory is that a set of decentralized independent LA is able to control a finite Markov chain with unknown transition probabilities and rewards. In this paper, we propose to extend this algorithm to Markov games-a straightforward extension of single-agent Markov decision problems to distributed multiagent decision problems. We show that under the same ergodic assumptions of the original theorem, the extended algorithm will converge to a pure equilibrium point between agent policies},
3823 www_section = {algorithms, descentralized learning, LA, learning automata}, 3823 www_section = {algorithms, descentralized learning, LA, learning automata},
3824 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IEEE\%20Transactions\%20on\%20Systems\%20-\%20Descentralized\%20learning.pdf}, 3824 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IEEE\%20Transactions\%20on\%20Systems\%20-\%20Descentralized\%20learning.pdf},
3825 author = {Peter Vrancx and Katja Verbeeck and Ann Now{\'e}} 3825 author = {Peter Vrancx and Katja Verbeeck and Ann Now{\'e}}
3826} 3826}
3827@conference {ccs2008:wang, 3827@conference {ccs2008:wang,
@@ -3838,7 +3838,7 @@ Often, part of the problem is to access large files in a share way. Until now, t
3838 isbn = {978-1-59593-810-7}, 3838 isbn = {978-1-59593-810-7},
3839 doi = {10.1145/1455770.1455812}, 3839 doi = {10.1145/1455770.1455812},
3840 url = {http://portal.acm.org/citation.cfm?id=1455812}, 3840 url = {http://portal.acm.org/citation.cfm?id=1455812},
3841 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Dependent\%20Link\%20Padding\%20Algorithms\%20for.pdf}, 3841 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Dependent\%20Link\%20Padding\%20Algorithms\%20for.pdf},
3842 author = {Wei Wang and Mehul Motani and Vikram Srinivasan}, 3842 author = {Wei Wang and Mehul Motani and Vikram Srinivasan},
3843 editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang} 3843 editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang}
3844} 3844}
@@ -3857,7 +3857,7 @@ Often, part of the problem is to access large files in a share way. Until now, t
3857 isbn = {978-1-60558-334-1}, 3857 isbn = {978-1-60558-334-1},
3858 doi = {http://doi.acm.org/10.1145/1452520.1452523}, 3858 doi = {http://doi.acm.org/10.1145/1452520.1452523},
3859 url = {http://doi.acm.org/10.1145/1452520.1452523}, 3859 url = {http://doi.acm.org/10.1145/1452520.1452523},
3860 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IMC\%2708\%20-\%20Detecting\%20BitTorrent\%20Blocking.pdf}, 3860 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IMC\%2708\%20-\%20Detecting\%20BitTorrent\%20Blocking.pdf},
3861 author = {Dischinger, Marcel and Mislove, Alan and Haeberlen, Andreas and P. Krishna Gummadi} 3861 author = {Dischinger, Marcel and Mislove, Alan and Haeberlen, Andreas and P. Krishna Gummadi}
3862} 3862}
3863@conference {clog-the-queue, 3863@conference {clog-the-queue,
@@ -3871,7 +3871,7 @@ Often, part of the problem is to access large files in a share way. Until now, t
3871 www_section = {anonymity, P2P, Tor}, 3871 www_section = {anonymity, P2P, Tor},
3872 doi = {10.1007/978-3-540-85230-8_3}, 3872 doi = {10.1007/978-3-540-85230-8_3},
3873 url = {http://portal.acm.org/citation.cfm?id=1428551}, 3873 url = {http://portal.acm.org/citation.cfm?id=1428551},
3874 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/clog-the-queue.pdf}, 3874 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/clog-the-queue.pdf},
3875 author = {Jon McLachlan and Nicholas J. Hopper} 3875 author = {Jon McLachlan and Nicholas J. Hopper}
3876} 3876}
3877@article {DBLP:journals/pvldb/Amer-YahiaBLS08, 3877@article {DBLP:journals/pvldb/Amer-YahiaBLS08,
@@ -3915,7 +3915,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
3915 issn = {1063-6692}, 3915 issn = {1063-6692},
3916 doi = {10.1109/TNET.2007.897962}, 3916 doi = {10.1109/TNET.2007.897962},
3917 url = {http://portal.acm.org/citation.cfm?id=1373458$\#$}, 3917 url = {http://portal.acm.org/citation.cfm?id=1373458$\#$},
3918 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.74.8097.pdf}, 3918 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.74.8097.pdf},
3919 author = {Spyropoulos, Thrasyvoulos and Psounis, Konstantinos and Raghavendra, Cauligi S.} 3919 author = {Spyropoulos, Thrasyvoulos and Psounis, Konstantinos and Raghavendra, Cauligi S.}
3920} 3920}
3921@conference {CoNext2008, 3921@conference {CoNext2008,
@@ -3926,7 +3926,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
3926 address = {Madrid, Spain}, 3926 address = {Madrid, Spain},
3927 abstract = {A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of connectivity management, i.e., folding new arrivals into an existing overlay, and re-wiring to cope with changing network conditions. Previous work has considered the problem from two perspectives: devising practical heuristics for specific applications designed to work well in real deployments, and providing abstractions for the underlying problem that are analytically tractable, especially via game-theoretic analysis. In this paper, we unify these two thrusts by using insights gleaned from novel, realistic theoretic models in the design of Egoist -- a distributed overlay routing system that we implemented, deployed, and evaluated on PlanetLab. Using extensive measurements of paths between nodes, we demonstrate that Egoist's neighbor selection primitives significantly outperform existing heuristics on a variety of performance metrics, including delay, available bandwidth, and node utilization. Moreover, we demonstrate that Egoist is competitive with an optimal, but unscalable full-mesh approach, remains highly effective under significant churn, is robust to cheating, and incurs minimal overhead. Finally, we use a multiplayer peer-to-peer game to demonstrate the value of Egoist to end-user applications}, 3927 abstract = {A foundational issue underlying many overlay network applications ranging from routing to peer-to-peer file sharing is that of connectivity management, i.e., folding new arrivals into an existing overlay, and re-wiring to cope with changing network conditions. Previous work has considered the problem from two perspectives: devising practical heuristics for specific applications designed to work well in real deployments, and providing abstractions for the underlying problem that are analytically tractable, especially via game-theoretic analysis. In this paper, we unify these two thrusts by using insights gleaned from novel, realistic theoretic models in the design of Egoist -- a distributed overlay routing system that we implemented, deployed, and evaluated on PlanetLab. Using extensive measurements of paths between nodes, we demonstrate that Egoist's neighbor selection primitives significantly outperform existing heuristics on a variety of performance metrics, including delay, available bandwidth, and node utilization. Moreover, we demonstrate that Egoist is competitive with an optimal, but unscalable full-mesh approach, remains highly effective under significant churn, is robust to cheating, and incurs minimal overhead. Finally, we use a multiplayer peer-to-peer game to demonstrate the value of Egoist to end-user applications},
3928 www_section = {EGOIST, game theory, overlay networks, routing, selfish neighbor selection}, 3928 www_section = {EGOIST, game theory, overlay networks, routing, selfish neighbor selection},
3929 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CoNEXT2008.pdf}, 3929 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CoNEXT2008.pdf},
3930 author = {Georgios Smaragdakis and Vassilis Lekakis and Nikolaos Laoutaris and Azer Bestavros and Byers, John W. and Mema Roussopoulos} 3930 author = {Georgios Smaragdakis and Vassilis Lekakis and Nikolaos Laoutaris and Azer Bestavros and Byers, John W. and Mema Roussopoulos}
3931} 3931}
3932@booklet {LOCEntropy2008, 3932@booklet {LOCEntropy2008,
@@ -3935,7 +3935,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
3935 year = {2008}, 3935 year = {2008},
3936 month = {October}, 3936 month = {October},
3937 publisher = {IACR}, 3937 publisher = {IACR},
3938 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/LOCEntropy2008.pdf}, 3938 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/LOCEntropy2008.pdf},
3939 author = {Luke O'Connor} 3939 author = {Luke O'Connor}
3940} 3940}
3941@book {2008_4, 3941@book {2008_4,
@@ -3951,7 +3951,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
3951 isbn = {978-0-387-09456-4}, 3951 isbn = {978-0-387-09456-4},
3952 issn = {978-0-387-09456-4}, 3952 issn = {978-0-387-09456-4},
3953 url = {http://eprints.adm.unipi.it/649/}, 3953 url = {http://eprints.adm.unipi.it/649/},
3954 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Grid\%20Computing\%20-\%20Estimating\%20The\%20Size\%20Of\%20Peer-To-Peer\%20Networks.pdf}, 3954 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Grid\%20Computing\%20-\%20Estimating\%20The\%20Size\%20Of\%20Peer-To-Peer\%20Networks.pdf},
3955 author = {Javier Bustos-Jim{\'e}nez and Nicol{\'a}s Bersano and Satu Elisa Schaeffer and Jos{\'e} Miguel Piquer and Alexandru Iosup and Augusto Ciuffoletti} 3955 author = {Javier Bustos-Jim{\'e}nez and Nicol{\'a}s Bersano and Satu Elisa Schaeffer and Jos{\'e} Miguel Piquer and Alexandru Iosup and Augusto Ciuffoletti}
3956} 3956}
3957@conference {Junges:2008:EPD:1402298.1402308, 3957@conference {Junges:2008:EPD:1402298.1402308,
@@ -3968,7 +3968,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
3968 www_section = {coordination, DCOP, distributed constraint optimization, traffic control}, 3968 www_section = {coordination, DCOP, distributed constraint optimization, traffic control},
3969 isbn = {978-0-9817381-1-6}, 3969 isbn = {978-0-9817381-1-6},
3970 url = {http://dl.acm.org/citation.cfm?id=1402298.1402308}, 3970 url = {http://dl.acm.org/citation.cfm?id=1402298.1402308},
3971 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/AAMAS08\%20-\%20DCOP\%20algorithms\%20in\%20a\%20real\%20world\%20problem.pdf}, 3971 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/AAMAS08\%20-\%20DCOP\%20algorithms\%20in\%20a\%20real\%20world\%20problem.pdf},
3972 author = {Junges, Robert and Bazzan, Ana L. C.} 3972 author = {Junges, Robert and Bazzan, Ana L. C.}
3973} 3973}
3974@conference {DBLP:conf/icc/ChenCLNC08, 3974@conference {DBLP:conf/icc/ChenCLNC08,
@@ -3984,7 +3984,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
3984 www_section = {BitTorrent, super-seeding}, 3984 www_section = {BitTorrent, super-seeding},
3985 isbn = {978-1-4244-2075-9}, 3985 isbn = {978-1-4244-2075-9},
3986 doi = {http://dx.doi.org/10.1109/ICC.2008.20}, 3986 doi = {http://dx.doi.org/10.1109/ICC.2008.20},
3987 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ICC\%2708\%20-\%20Super-Seeding\%20in\%20BitTorrent.PDF}, 3987 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ICC\%2708\%20-\%20Super-Seeding\%20in\%20BitTorrent.PDF},
3988 author = {Zhijia Chen and Yang Chen and Chuang Lin and Vaibhav Nivargi and Pei Cao} 3988 author = {Zhijia Chen and Yang Chen and Chuang Lin and Vaibhav Nivargi and Pei Cao}
3989} 3989}
3990@conference {Ben-David:2008:FSS:1455770.1455804, 3990@conference {Ben-David:2008:FSS:1455770.1455804,
@@ -4002,7 +4002,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
4002 isbn = {978-1-59593-810-7}, 4002 isbn = {978-1-59593-810-7},
4003 doi = {10.1145/1455770.1455804}, 4003 doi = {10.1145/1455770.1455804},
4004 url = {http://doi.acm.org/10.1145/1455770.1455804}, 4004 url = {http://doi.acm.org/10.1145/1455770.1455804},
4005 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CCS\%2708\%20-\%20FairplayMP.pdf}, 4005 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CCS\%2708\%20-\%20FairplayMP.pdf},
4006 author = {Ben-David, Assaf and Nisan, Noam and Pinkas, Benny} 4006 author = {Ben-David, Assaf and Nisan, Noam and Pinkas, Benny}
4007} 4007}
4008@article {2008_5, 4008@article {2008_5,
@@ -4016,7 +4016,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
4016 issn = {0020-0190}, 4016 issn = {0020-0190},
4017 doi = {10.1016/j.ipl.2008.05.018}, 4017 doi = {10.1016/j.ipl.2008.05.018},
4018 url = {http://dx.doi.org/10.1016/j.ipl.2008.05.018}, 4018 url = {http://dx.doi.org/10.1016/j.ipl.2008.05.018},
4019 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/FalsepositiverateBloomFilter2008Bose.pdf}, 4019 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/FalsepositiverateBloomFilter2008Bose.pdf},
4020 author = {Bose, Prosenjit and Guo, Hua and Kranakis, Evangelos and Maheshwari, Anil and Morin, Pat and Morrison, Jason and Smid, Michiel and Tang, Yihui} 4020 author = {Bose, Prosenjit and Guo, Hua and Kranakis, Evangelos and Maheshwari, Anil and Morin, Pat and Morrison, Jason and Smid, Michiel and Tang, Yihui}
4021} 4021}
4022@article {Wang:2008:GAI:1412757.1412971, 4022@article {Wang:2008:GAI:1412757.1412971,
@@ -4033,7 +4033,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
4033 issn = {1389-1286}, 4033 issn = {1389-1286},
4034 doi = {10.1016/j.comnet.2008.06.014}, 4034 doi = {10.1016/j.comnet.2008.06.014},
4035 url = {http://dl.acm.org/citation.cfm?id=1412757.1412971}, 4035 url = {http://dl.acm.org/citation.cfm?id=1412757.1412971},
4036 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Computer\%20Networks\%20-\%20Wang\%2C\%20Chiu\%20\%26\%20Lui\%20-\%20Overlay\%20network\%20traffic\%20on\%20ISP\%20peering.pdf}, 4036 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Computer\%20Networks\%20-\%20Wang\%2C\%20Chiu\%20\%26\%20Lui\%20-\%20Overlay\%20network\%20traffic\%20on\%20ISP\%20peering.pdf},
4037 author = {Wang, Jessie Hui and Chiu, Dah Ming and Lui, John C. S.} 4037 author = {Wang, Jessie Hui and Chiu, Dah Ming and Lui, John C. S.}
4038} 4038}
4039@conference {saballus08gaos, 4039@conference {saballus08gaos,
@@ -4046,7 +4046,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
4046 abstract = {As networked embedded sensors and actuators become more and more widespread, software developers encounter the difficulty to create applications that run distributed on these nodes: Typically, these nodes are heterogeneous, resource-limited, and there is no centralized control. The Ambicomp project tackles this problem. Its goal is to provide a distributed Java Virtual Machine (VM) that runs on the bare sensor node hardware. This VM creates a single system illusion across several nodes. Objects and threads can migrate freely between these nodes. In this paper, we address the problem of globally accessible objects. We describe how scalable source routing, a DHT-inspired routing protocol, can be used to allow access to objects regardless of their respective physical location and without any centralized component}, 4046 abstract = {As networked embedded sensors and actuators become more and more widespread, software developers encounter the difficulty to create applications that run distributed on these nodes: Typically, these nodes are heterogeneous, resource-limited, and there is no centralized control. The Ambicomp project tackles this problem. Its goal is to provide a distributed Java Virtual Machine (VM) that runs on the bare sensor node hardware. This VM creates a single system illusion across several nodes. Objects and threads can migrate freely between these nodes. In this paper, we address the problem of globally accessible objects. We describe how scalable source routing, a DHT-inspired routing protocol, can be used to allow access to objects regardless of their respective physical location and without any centralized component},
4047 www_section = {distributed hash table}, 4047 www_section = {distributed hash table},
4048 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 4048 url = {http://i30www.ira.uka.de/research/publications/p2p/},
4049 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/saballus08gaos.pdf}, 4049 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/saballus08gaos.pdf},
4050 author = {Bjoern Saballus and Johannes Eickhold and Thomas Fuhrmann} 4050 author = {Bjoern Saballus and Johannes Eickhold and Thomas Fuhrmann}
4051} 4051}
4052@booklet { back-hash, 4052@booklet { back-hash,
@@ -4054,7 +4054,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
4054 year = {2008}, 4054 year = {2008},
4055 abstract = {Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources such as email, and anonymous remailers in May 1997. Five years on, this paper captures in one place the various applications, improvements suggested and related subsequent publications, and describes initial experience from experiments using hashcash. The hashcash CPU cost-function computes a token which can be used as a proof-of-work. Interactive and non-interactive variants of cost-functions can be constructed which can be used in situations where the server can issue a challenge (connection oriented interactive protocol), and where it can not (where the communication is store--and--forward, or packet oriented) respectively}, 4055 abstract = {Hashcash was originally proposed as a mechanism to throttle systematic abuse of un-metered internet resources such as email, and anonymous remailers in May 1997. Five years on, this paper captures in one place the various applications, improvements suggested and related subsequent publications, and describes initial experience from experiments using hashcash. The hashcash CPU cost-function computes a token which can be used as a proof-of-work. Interactive and non-interactive variants of cost-functions can be constructed which can be used in situations where the server can issue a challenge (connection oriented interactive protocol), and where it can not (where the communication is store--and--forward, or packet oriented) respectively},
4056 url = {citeseer.ist.psu.edu/back02hashcash.html}, 4056 url = {citeseer.ist.psu.edu/back02hashcash.html},
4057 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/hashcash.pdf}, 4057 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/hashcash.pdf},
4058 author = {Adam Back} 4058 author = {Adam Back}
4059} 4059}
4060@conference {2008_6, 4060@conference {2008_6,
@@ -4063,7 +4063,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
4063 year = {2008}, 4063 year = {2008},
4064 abstract = {Distributed cooperative systems that use event notification for communication can benefit from event correlation within the notification network. In the presence of uncertain data, however, correlation results easily become unreliable. The handling of uncertainty is therefore an important challenge for event correlation in distributed event notification systems. In this paper, we present a generic correlation model that is aware of uncertainty. We propose uncertainty constraints that event correlation can take into account and show how they can lead to higher confidence in the correlation result. We demonstrate that the application of this model allows to obtain a qualitative description of event correlation}, 4064 abstract = {Distributed cooperative systems that use event notification for communication can benefit from event correlation within the notification network. In the presence of uncertain data, however, correlation results easily become unreliable. The handling of uncertainty is therefore an important challenge for event correlation in distributed event notification systems. In this paper, we present a generic correlation model that is aware of uncertainty. We propose uncertainty constraints that event correlation can take into account and show how they can lead to higher confidence in the correlation result. We demonstrate that the application of this model allows to obtain a qualitative description of event correlation},
4065 url = {http://www.citeulike.org/user/nmsx/article/4505416}, 4065 url = {http://www.citeulike.org/user/nmsx/article/4505416},
4066 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/koch08confidence.pdf}, 4066 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/koch08confidence.pdf},
4067 author = {Gerald G. Koch and Boris Koldehofe and Kurt Rothermel} 4067 author = {Gerald G. Koch and Boris Koldehofe and Kurt Rothermel}
4068} 4068}
4069@conference {sassaman-pet2008, 4069@conference {sassaman-pet2008,
@@ -4079,7 +4079,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
4079 isbn = {978-3-540-70629-8}, 4079 isbn = {978-3-540-70629-8},
4080 doi = {10.1007/978-3-540-70630-4}, 4080 doi = {10.1007/978-3-540-70630-4},
4081 url = {http://www.springerlink.com/content/179453h161722821/}, 4081 url = {http://www.springerlink.com/content/179453h161722821/},
4082 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/sassaman-pet2008.pdf}, 4082 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/sassaman-pet2008.pdf},
4083 author = {George Danezis and Len Sassaman}, 4083 author = {George Danezis and Len Sassaman},
4084 editor = {Borisov, Nikita and Ian Goldberg} 4084 editor = {Borisov, Nikita and Ian Goldberg}
4085} 4085}
@@ -4098,7 +4098,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
4098 isbn = {978-1-59593-810-7}, 4098 isbn = {978-1-59593-810-7},
4099 doi = {http://doi.acm.org/10.1145/1455770.1455823}, 4099 doi = {http://doi.acm.org/10.1145/1455770.1455823},
4100 url = {http://doi.acm.org/10.1145/1455770.1455823}, 4100 url = {http://doi.acm.org/10.1145/1455770.1455823},
4101 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CCS\%2708\%20-\%20Identity-based\%20encryption\%20with\%20efficient\%20revocation.pdf}, 4101 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CCS\%2708\%20-\%20Identity-based\%20encryption\%20with\%20efficient\%20revocation.pdf},
4102 author = {Boldyreva, Alexandra and Goyal, Vipul and Kumar, Virendra} 4102 author = {Boldyreva, Alexandra and Goyal, Vipul and Kumar, Virendra}
4103} 4103}
4104@conference {DBLP:conf/p2p/AmannEHF08, 4104@conference {DBLP:conf/p2p/AmannEHF08,
@@ -4110,7 +4110,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
4110 www_section = {distributed storage, P2P}, 4110 www_section = {distributed storage, P2P},
4111 doi = {10.1109/P2P.2008.19}, 4111 doi = {10.1109/P2P.2008.19},
4112 url = {http://www.pubzone.org/dblp/conf/p2p/AmannEHF08}, 4112 url = {http://www.pubzone.org/dblp/conf/p2p/AmannEHF08},
4113 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/amann08igorfs.pdf}, 4113 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/amann08igorfs.pdf},
4114 author = {Bernhard Amann and Benedikt Elser and Yaser Houri and Thomas Fuhrmann} 4114 author = {Bernhard Amann and Benedikt Elser and Yaser Houri and Thomas Fuhrmann}
4115} 4115}
4116@conference {diaz-pet2008, 4116@conference {diaz-pet2008,
@@ -4127,7 +4127,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
4127 isbn = {978-3-540-70629-8}, 4127 isbn = {978-3-540-70629-8},
4128 doi = {10.1007/978-3-540-70630-4_4}, 4128 doi = {10.1007/978-3-540-70630-4_4},
4129 url = {http://portal.acm.org/citation.cfm?id=1428263}, 4129 url = {http://portal.acm.org/citation.cfm?id=1428263},
4130 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/diaz-pet2008.pdf}, 4130 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/diaz-pet2008.pdf},
4131 author = {Claudia Diaz and Carmela Troncoso and Andrei Serjantov}, 4131 author = {Claudia Diaz and Carmela Troncoso and Andrei Serjantov},
4132 editor = {Borisov, Nikita and Ian Goldberg} 4132 editor = {Borisov, Nikita and Ian Goldberg}
4133} 4133}
@@ -4142,7 +4142,7 @@ To deal with such networks researchers have suggested to use flooding-based rout
4142 abstract = {The Tor anonymisation network allows services, such as web servers, to be operated under a pseudonym. In previous work Murdoch described a novel attack to reveal such hidden services by correlating clock skew changes with times of increased load, and hence temperature. Clock skew measurement suffers from two main sources of noise: network jitter and timestamp quantisation error. Depending on the target's clock frequency the quantisation noise can be orders of magnitude larger than the noise caused by typical network jitter. Quantisation noise limits the previous attacks to situations where a high frequency clock is available. It has been hypothesised that by synchronising measurements to the clock ticks, quantisation noise can be reduced. We show how such synchronisation can be achieved and maintained, despite network jitter. Our experiments show that synchronised sampling significantly reduces the quantisation error and the remaining noise only depends on the network jitter (but not clock frequency). Our improved skew estimates are up to two magnitudes more accurate for low-resolution timestamps and up to one magnitude more accurate for high-resolution timestamps, when compared to previous random sampling techniques. The improved accuracy not only allows previous attacks to be executed faster and with less network traffic but also opens the door to previously infeasible attacks on low-resolution clocks, including measuring skew of a HTTP server over the anonymous channel}, 4142 abstract = {The Tor anonymisation network allows services, such as web servers, to be operated under a pseudonym. In previous work Murdoch described a novel attack to reveal such hidden services by correlating clock skew changes with times of increased load, and hence temperature. Clock skew measurement suffers from two main sources of noise: network jitter and timestamp quantisation error. Depending on the target's clock frequency the quantisation noise can be orders of magnitude larger than the noise caused by typical network jitter. Quantisation noise limits the previous attacks to situations where a high frequency clock is available. It has been hypothesised that by synchronising measurements to the clock ticks, quantisation noise can be reduced. We show how such synchronisation can be achieved and maintained, despite network jitter. Our experiments show that synchronised sampling significantly reduces the quantisation error and the remaining noise only depends on the network jitter (but not clock frequency). Our improved skew estimates are up to two magnitudes more accurate for low-resolution timestamps and up to one magnitude more accurate for high-resolution timestamps, when compared to previous random sampling techniques. The improved accuracy not only allows previous attacks to be executed faster and with less network traffic but also opens the door to previously infeasible attacks on low-resolution clocks, including measuring skew of a HTTP server over the anonymous channel},
4143 www_section = {anonymity, pseudonym, Tor}, 4143 www_section = {anonymity, pseudonym, Tor},
4144 url = {http://portal.acm.org/citation.cfm?id=1496726}, 4144 url = {http://portal.acm.org/citation.cfm?id=1496726},
4145 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/improved-clockskew.pdf}, 4145 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/improved-clockskew.pdf},
4146 author = {Sebastian Zander and Steven J. Murdoch} 4146 author = {Sebastian Zander and Steven J. Murdoch}
4147} 4147}
4148@mastersthesis {reardon-thesis, 4148@mastersthesis {reardon-thesis,
@@ -4156,7 +4156,7 @@ traffic and computational latency to determine there is a substantial component
4156Tor multiplexes multiple streams of data over a single TCP connection. This is not a wise use of TCP, and as such results in the unfair application of congestion control. We illustrate an example of this occurrence on a Tor node on the live network and also illustrate how packet dropping and reordering cause interference between the multiplexed streams. 4156Tor multiplexes multiple streams of data over a single TCP connection. This is not a wise use of TCP, and as such results in the unfair application of congestion control. We illustrate an example of this occurrence on a Tor node on the live network and also illustrate how packet dropping and reordering cause interference between the multiplexed streams.
4157Our solution is to use a TCP-over-DTLS (Datagram Transport Layer Security) transport between routers, and give each stream of data its own TCP connection. We give our design for our proposal, and details about its implementation. Finally, we perform experiments on our implemented version to illustrate that our proposal has in fact resolved the multiplexing issues discovered in our system performance analysis. The future work gives a number of steps towards optimizing and improving our work, along with some tangential ideas that were discovered during research. 4157Our solution is to use a TCP-over-DTLS (Datagram Transport Layer Security) transport between routers, and give each stream of data its own TCP connection. We give our design for our proposal, and details about its implementation. Finally, we perform experiments on our implemented version to illustrate that our proposal has in fact resolved the multiplexing issues discovered in our system performance analysis. The future work gives a number of steps towards optimizing and improving our work, along with some tangential ideas that were discovered during research.
4158Additionally, the open-source software projects latency proxy and libspe, which were designed for our purposes but programmed for universal applicability, are discussed}, 4158Additionally, the open-source software projects latency proxy and libspe, which were designed for our purposes but programmed for universal applicability, are discussed},
4159 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/reardon-thesis.pdf}, 4159 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/reardon-thesis.pdf},
4160 author = {Reardon, Joel} 4160 author = {Reardon, Joel}
4161} 4161}
4162@conference {2008_7, 4162@conference {2008_7,
@@ -4170,7 +4170,7 @@ Additionally, the open-source software projects latency proxy and libspe, which
4170 abstract = {Despite recent improvements, P2P systems are still plagued by fundamental issues such as overlay/underlay topological and routing mismatch, which affects their performance and causes traffic strains on the ISPs. In this work, we aim to improve overall system performance for ISPs as well as P2P systems by means of traffic localization through improved collaboration between ISPs and P2P systems. More specifically, we study the effects of different ISP/P2P topologies as well as a broad range of influential user behavior characteristics, namely content availability, churn, and query patterns, on end-user and ISP experience. We show that ISP-aided P2P locality benefits both P2P users and ISPs, measured in terms of improved content download times, increased network locality of query responses and desired content, and overall reduction in P2P traffic}, 4170 abstract = {Despite recent improvements, P2P systems are still plagued by fundamental issues such as overlay/underlay topological and routing mismatch, which affects their performance and causes traffic strains on the ISPs. In this work, we aim to improve overall system performance for ISPs as well as P2P systems by means of traffic localization through improved collaboration between ISPs and P2P systems. More specifically, we study the effects of different ISP/P2P topologies as well as a broad range of influential user behavior characteristics, namely content availability, churn, and query patterns, on end-user and ISP experience. We show that ISP-aided P2P locality benefits both P2P users and ISPs, measured in terms of improved content download times, increased network locality of query responses and desired content, and overall reduction in P2P traffic},
4171 www_section = {isp, P2P}, 4171 www_section = {isp, P2P},
4172 isbn = {978-1-4244-2219-7 }, 4172 isbn = {978-1-4244-2219-7 },
4173 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/isp-aidedp2p.PDF}, 4173 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/isp-aidedp2p.PDF},
4174 author = {Vinay Aggarwal and Obi Akonjang and Feldmann, Anja} 4174 author = {Vinay Aggarwal and Obi Akonjang and Feldmann, Anja}
4175} 4175}
4176@conference {ccs2008:mittal, 4176@conference {ccs2008:mittal,
@@ -4189,7 +4189,7 @@ We study this trade-off in two P2P anonymous systems, Salsa and AP3. In both cas
4189 isbn = {978-1-59593-810-7}, 4189 isbn = {978-1-59593-810-7},
4190 doi = {10.1145/1455770.1455805}, 4190 doi = {10.1145/1455770.1455805},
4191 url = {http://portal.acm.org/citation.cfm?id=1455805}, 4191 url = {http://portal.acm.org/citation.cfm?id=1455805},
4192 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ccs2008-mittal.pdf}, 4192 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ccs2008-mittal.pdf},
4193 author = {Prateek Mittal and Borisov, Nikita}, 4193 author = {Prateek Mittal and Borisov, Nikita},
4194 editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang} 4194 editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang}
4195} 4195}
@@ -4207,7 +4207,7 @@ We study this trade-off in two P2P anonymous systems, Salsa and AP3. In both cas
4207 issn = {0920-8542}, 4207 issn = {0920-8542},
4208 doi = {10.1007/s11227-007-0126-4}, 4208 doi = {10.1007/s11227-007-0126-4},
4209 url = {http://dl.acm.org/citation.cfm?id=1331483.1331515}, 4209 url = {http://dl.acm.org/citation.cfm?id=1331483.1331515},
4210 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Journal\%20of\%20Supercomputing\%20-\%20Insight\%20into\%20redundancy\%20schemes\%20in\%20DHTs.pdf}, 4210 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Journal\%20of\%20Supercomputing\%20-\%20Insight\%20into\%20redundancy\%20schemes\%20in\%20DHTs.pdf},
4211 author = {Chen, Guihai and Qiu, Tongqing and Wu, Fan} 4211 author = {Chen, Guihai and Qiu, Tongqing and Wu, Fan}
4212} 4212}
4213@conference {DBLP:conf/usenix/HiblerRSDGSWL08, 4213@conference {DBLP:conf/usenix/HiblerRSDGSWL08,
@@ -4216,7 +4216,7 @@ We study this trade-off in two P2P anonymous systems, Salsa and AP3. In both cas
4216 year = {2008}, 4216 year = {2008},
4217 pages = {113--128}, 4217 pages = {113--128},
4218 www_section = {emulab, emulation, testbed, virtualization}, 4218 www_section = {emulab, emulation, testbed, virtualization},
4219 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/emulab.pdf}, 4219 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/emulab.pdf},
4220 author = {Mike Hibler and Robert Ricci and Leigh Stoller and Jonathon Duerig and Shashi Guruprasad and Tim Stack and Kirk Webb and Jay Lepreau} 4220 author = {Mike Hibler and Robert Ricci and Leigh Stoller and Jonathon Duerig and Shashi Guruprasad and Tim Stack and Kirk Webb and Jay Lepreau}
4221} 4221}
4222@article {nussbaum2008p2plab, 4222@article {nussbaum2008p2plab,
@@ -4231,7 +4231,7 @@ We study this trade-off in two P2P anonymous systems, Salsa and AP3. In both cas
4231 issn = {1532-0634}, 4231 issn = {1532-0634},
4232 doi = {10.1002/cpe.1242}, 4232 doi = {10.1002/cpe.1242},
4233 url = {http://dx.doi.org/10.1002/cpe.1242}, 4233 url = {http://dx.doi.org/10.1002/cpe.1242},
4234 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p2plab-cpe.pdf}, 4234 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p2plab-cpe.pdf},
4235 author = {Nussbaum, Lucas and Richard, Olivier} 4235 author = {Nussbaum, Lucas and Richard, Olivier}
4236} 4236}
4237@article {1390683, 4237@article {1390683,
@@ -4246,7 +4246,7 @@ We study this trade-off in two P2P anonymous systems, Salsa and AP3. In both cas
4246Experiments on data sets from bioinformatics, text processing and computer security illustrate the efficiency of the proposed algorithms---enabling peak performances of up to 106 pairwise comparisons per second. The utility of distances and non-metric similarity measures for sequences as alternatives to string kernels is demonstrated in applications of text categorization, network intrusion detection and transcription site recognition in DNA}, 4246Experiments on data sets from bioinformatics, text processing and computer security illustrate the efficiency of the proposed algorithms---enabling peak performances of up to 106 pairwise comparisons per second. The utility of distances and non-metric similarity measures for sequences as alternatives to string kernels is demonstrated in applications of text categorization, network intrusion detection and transcription site recognition in DNA},
4247 issn = {1532-4435}, 4247 issn = {1532-4435},
4248 url = {http://portal.acm.org/citation.cfm?id=1390683$\#$}, 4248 url = {http://portal.acm.org/citation.cfm?id=1390683$\#$},
4249 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/jmlr08.pdf}, 4249 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/jmlr08.pdf},
4250 author = {Rieck, Konrad and Laskov, Pavel} 4250 author = {Rieck, Konrad and Laskov, Pavel}
4251} 4251}
4252@article {1358311, 4252@article {1358311,
@@ -4278,7 +4278,7 @@ Experiments on data sets from bioinformatics, text processing and computer secur
4278 isbn = {978-3-540-70629-8}, 4278 isbn = {978-3-540-70629-8},
4279 doi = {10.1007/978-3-540-70630-4_8}, 4279 doi = {10.1007/978-3-540-70630-4_8},
4280 url = {http://portal.acm.org/citation.cfm?id=1428259.1428267}, 4280 url = {http://portal.acm.org/citation.cfm?id=1428259.1428267},
4281 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/murdoch-pet2008.pdf}, 4281 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/murdoch-pet2008.pdf},
4282 author = {Steven J. Murdoch and Robert N. M. Watson}, 4282 author = {Steven J. Murdoch and Robert N. M. Watson},
4283 editor = {Borisov, Nikita and Ian Goldberg} 4283 editor = {Borisov, Nikita and Ian Goldberg}
4284} 4284}
@@ -4294,7 +4294,7 @@ Experiments on data sets from bioinformatics, text processing and computer secur
4294 www_section = {network emulation, routing, user-mode Linux, virtual laboratories}, 4294 www_section = {network emulation, routing, user-mode Linux, virtual laboratories},
4295 isbn = {978-963-9799-24-0}, 4295 isbn = {978-963-9799-24-0},
4296 url = {http://dl.acm.org/citation.cfm?id=1390576.1390585}, 4296 url = {http://dl.acm.org/citation.cfm?id=1390576.1390585},
4297 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/a7-pizzonia.pdf}, 4297 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/a7-pizzonia.pdf},
4298 author = {Pizzonia, Maurizio and Rimondini, Massimo} 4298 author = {Pizzonia, Maurizio and Rimondini, Massimo}
4299} 4299}
4300@article {1341892, 4300@article {1341892,
@@ -4311,7 +4311,7 @@ Experiments on data sets from bioinformatics, text processing and computer secur
4311 issn = {1094-9224}, 4311 issn = {1094-9224},
4312 doi = {10.1145/1284680.1341892}, 4312 doi = {10.1145/1284680.1341892},
4313 url = {http://portal.acm.org/citation.cfm?id=1284680.1341892$\#$}, 4313 url = {http://portal.acm.org/citation.cfm?id=1284680.1341892$\#$},
4314 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ODSBR-TISSEC.pdf}, 4314 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ODSBR-TISSEC.pdf},
4315 author = {Awerbuch, Baruch and Curtmola, Reza and Holmer, David and Nita-Rotaru, Cristina and Rubens, Herbert} 4315 author = {Awerbuch, Baruch and Curtmola, Reza and Holmer, David and Nita-Rotaru, Cristina and Rubens, Herbert}
4316} 4316}
4317@conference {Hartline:2008:OMD:1374376.1374390, 4317@conference {Hartline:2008:OMD:1374376.1374390,
@@ -4329,7 +4329,7 @@ Experiments on data sets from bioinformatics, text processing and computer secur
4329 isbn = {978-1-60558-047-0}, 4329 isbn = {978-1-60558-047-0},
4330 doi = {http://doi.acm.org/10.1145/1374376.1374390}, 4330 doi = {http://doi.acm.org/10.1145/1374376.1374390},
4331 url = {http://doi.acm.org/10.1145/1374376.1374390}, 4331 url = {http://doi.acm.org/10.1145/1374376.1374390},
4332 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/STOC\%2708\%20-\%20Optimal\%20mechanism\%20design\%20and\%20money\%20burning.pdf}, 4332 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/STOC\%2708\%20-\%20Optimal\%20mechanism\%20design\%20and\%20money\%20burning.pdf},
4333 author = {Jason D. Hartline and Roughgarden, Tim} 4333 author = {Jason D. Hartline and Roughgarden, Tim}
4334} 4334}
4335@article {Xie:2008:PPP:1402946.1402999, 4335@article {Xie:2008:PPP:1402946.1402999,
@@ -4346,7 +4346,7 @@ Experiments on data sets from bioinformatics, text processing and computer secur
4346 issn = {0146-4833}, 4346 issn = {0146-4833},
4347 doi = {http://doi.acm.org/10.1145/1402946.1402999}, 4347 doi = {http://doi.acm.org/10.1145/1402946.1402999},
4348 url = {http://doi.acm.org/10.1145/1402946.1402999}, 4348 url = {http://doi.acm.org/10.1145/1402946.1402999},
4349 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%20Comput.\%20Commun.\%20Rev.\%20-\%20P4P\%3A\%20Provider\%20Portal\%20for\%20Applications.pdf}, 4349 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%20Comput.\%20Commun.\%20Rev.\%20-\%20P4P\%3A\%20Provider\%20Portal\%20for\%20Applications.pdf},
4350 author = {Xie, Haiyong and Yang, Y. Richard and Krishnamurthy, Arvind and Liu, Yanbin Grace and Silberschatz, Abraham} 4350 author = {Xie, Haiyong and Yang, Y. Richard and Krishnamurthy, Arvind and Liu, Yanbin Grace and Silberschatz, Abraham}
4351} 4351}
4352@conference {raykova-pet2008, 4352@conference {raykova-pet2008,
@@ -4363,7 +4363,7 @@ In this paper, we demonstrate a payment scheme that can be used to compensate no
4363 www_section = {anonymity, onion routing, Tor}, 4363 www_section = {anonymity, onion routing, Tor},
4364 doi = {10.1007/978-3-540-70630-4}, 4364 doi = {10.1007/978-3-540-70630-4},
4365 url = {http://www.springerlink.com/content/r1h1046823587382/}, 4365 url = {http://www.springerlink.com/content/r1h1046823587382/},
4366 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/raykova-pet2008.pdf}, 4366 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/raykova-pet2008.pdf},
4367 author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin}, 4367 author = {Elli Androulaki and Mariana Raykova and Shreyas Srivatsan and Angelos Stavrou and Steven M. Bellovin},
4368 editor = {Borisov, Nikita and Ian Goldberg} 4368 editor = {Borisov, Nikita and Ian Goldberg}
4369} 4369}
@@ -4380,7 +4380,7 @@ In this paper, we demonstrate a payment scheme that can be used to compensate no
4380 isbn = {978-1-59593-810-7}, 4380 isbn = {978-1-59593-810-7},
4381 doi = {10.1145/1455770.1455813}, 4381 doi = {10.1145/1455770.1455813},
4382 url = {http://portal.acm.org/citation.cfm?id=1455813}, 4382 url = {http://portal.acm.org/citation.cfm?id=1455813},
4383 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/perea-ccs08.pdf}, 4383 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/perea-ccs08.pdf},
4384 author = {Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith}, 4384 author = {Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith},
4385 editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang} 4385 editor = {Paul Syverson and Somesh Jha and Xiaolan Zhang}
4386} 4386}
@@ -4396,7 +4396,7 @@ In this paper, we demonstrate a payment scheme that can be used to compensate no
4396 abstract = {Traffic analysis is the best known approach to uncover relationships amongst users of anonymous communication systems, such as mix networks. Surprisingly, all previously published techniques require very specific user behavior to break the anonymity provided by mixes. At the same time, it is also well known that none of the considered user models reflects realistic behavior which casts some doubt on previous work with respect to real-life scenarios. We first present a user behavior model that, to the best of our knowledge, is the least restrictive scheme considered so far. Second, we develop the Perfect Matching Disclosure Attack, an efficient attack based on graph theory that operates without any assumption on user behavior. The attack is highly effective when de-anonymizing mixing rounds because it considers all users in a round at once, rather than single users iteratively. Furthermore, the extracted sender-receiver relationships can be used to enhance user profile estimations. We extensively study the effectiveness and efficiency of our attack and previous work when de-anonymizing users communicating through a threshold mix. Empirical results show the advantage of our proposal. We also show how the attack can be refined and adapted to different scenarios including pool mixes, and how precision can be traded in for speed, which might be desirable in certain cases }, 4396 abstract = {Traffic analysis is the best known approach to uncover relationships amongst users of anonymous communication systems, such as mix networks. Surprisingly, all previously published techniques require very specific user behavior to break the anonymity provided by mixes. At the same time, it is also well known that none of the considered user models reflects realistic behavior which casts some doubt on previous work with respect to real-life scenarios. We first present a user behavior model that, to the best of our knowledge, is the least restrictive scheme considered so far. Second, we develop the Perfect Matching Disclosure Attack, an efficient attack based on graph theory that operates without any assumption on user behavior. The attack is highly effective when de-anonymizing mixing rounds because it considers all users in a round at once, rather than single users iteratively. Furthermore, the extracted sender-receiver relationships can be used to enhance user profile estimations. We extensively study the effectiveness and efficiency of our attack and previous work when de-anonymizing users communicating through a threshold mix. Empirical results show the advantage of our proposal. We also show how the attack can be refined and adapted to different scenarios including pool mixes, and how precision can be traded in for speed, which might be desirable in certain cases },
4397 www_section = {mix, traffic analysis}, 4397 www_section = {mix, traffic analysis},
4398 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.4953}, 4398 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.147.4953},
4399 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/troncoso-pet2008.pdf}, 4399 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/troncoso-pet2008.pdf},
4400 author = {Carmela Troncoso and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede}, 4400 author = {Carmela Troncoso and Benedikt Gierlichs and Bart Preneel and Ingrid Verbauwhede},
4401 editor = {Borisov, Nikita and Ian Goldberg} 4401 editor = {Borisov, Nikita and Ian Goldberg}
4402} 4402}
@@ -4413,7 +4413,7 @@ In this paper, we demonstrate a payment scheme that can be used to compensate no
4413 isbn = {978-0-7695-3297-4}, 4413 isbn = {978-0-7695-3297-4},
4414 doi = {10.1109/SAINT.2008.69}, 4414 doi = {10.1109/SAINT.2008.69},
4415 url = {http://portal.acm.org/citation.cfm?id=1441426.1441996}, 4415 url = {http://portal.acm.org/citation.cfm?id=1441426.1441996},
4416 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/loesing2008performance.pdf}, 4416 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/loesing2008performance.pdf},
4417 author = {Karsten Loesing and Werner Sandmann and Christian Wilms and Guido Wirtz} 4417 author = {Karsten Loesing and Werner Sandmann and Christian Wilms and Guido Wirtz}
4418} 4418}
4419@conference {Shafaat:2008:PAN:1485753.1485763, 4419@conference {Shafaat:2008:PAN:1485753.1485763,
@@ -4432,7 +4432,7 @@ In this paper, we demonstrate a payment scheme that can be used to compensate no
4432 isbn = {978-3-540-92156-1}, 4432 isbn = {978-3-540-92156-1},
4433 doi = {http://dx.doi.org/10.1007/978-3-540-92157-8_7}, 4433 doi = {http://dx.doi.org/10.1007/978-3-540-92157-8_7},
4434 url = {http://dx.doi.org/10.1007/978-3-540-92157-8_7}, 4434 url = {http://dx.doi.org/10.1007/978-3-540-92157-8_7},
4435 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IWSOS\%2708\%20-\%20Network\%20Size\%20Estimation\%20for\%20Structured\%20Overlays.pdf}, 4435 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IWSOS\%2708\%20-\%20Network\%20Size\%20Estimation\%20for\%20Structured\%20Overlays.pdf},
4436 author = {Shafaat, Tallat M. and Ali Ghodsi and Seif Haridi} 4436 author = {Shafaat, Tallat M. and Ali Ghodsi and Seif Haridi}
4437} 4437}
4438@article {2008_8, 4438@article {2008_8,
@@ -4446,7 +4446,7 @@ In this paper, we demonstrate a payment scheme that can be used to compensate no
4446 abstract = {Abstract. In Distributed Constraint Satisfaction Problems, agents often desire to find a solution while revealing as little as possible about their variables and constraints. So far, most algorithms for DisCSP do not guarantee privacy of this information. This paper describes some simple obfuscation techniques that can be used with DisCSP algorithms such as DPOP, and provide sensible privacy guarantees based on the distributed solving process without sacrificing its efficiency}, 4446 abstract = {Abstract. In Distributed Constraint Satisfaction Problems, agents often desire to find a solution while revealing as little as possible about their variables and constraints. So far, most algorithms for DisCSP do not guarantee privacy of this information. This paper describes some simple obfuscation techniques that can be used with DisCSP algorithms such as DPOP, and provide sensible privacy guarantees based on the distributed solving process without sacrificing its efficiency},
4447 www_section = {algorithms, DisCSP algorithm, distributed constraint satisfaction, optimization, privacy, SMC}, 4447 www_section = {algorithms, DisCSP algorithm, distributed constraint satisfaction, optimization, privacy, SMC},
4448 journal = {unknown}, 4448 journal = {unknown},
4449 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Tech\%20Report\%20-\%20Privacy\%20guarantees\%20through\%20DCS.pdf}, 4449 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Tech\%20Report\%20-\%20Privacy\%20guarantees\%20through\%20DCS.pdf},
4450 author = {Boi Faltings and Thomas Leaute and Adrian Petcu} 4450 author = {Boi Faltings and Thomas Leaute and Adrian Petcu}
4451} 4451}
4452@book {springerlink:10.1007/978-0-387-70992-5, 4452@book {springerlink:10.1007/978-0-387-70992-5,
@@ -4468,7 +4468,7 @@ In this paper, we demonstrate a payment scheme that can be used to compensate no
4468 abstract = {Monte-Carlo Tree Search (MCTS) is a new best-first search guided by the results of Monte-Carlo simulations. In this article, we introduce two progressive strategies for MCTS, called progressive bias and progressive unpruning. They enable the use of relatively time-expensive heuristic knowledge without speed reduction. Progressive bias directs the search according to heuristic knowledge. Progressive unpruning first reduces the branching factor, and then increases it gradually again. Experiments assess that the two progressive strategies significantly improve the level of our Go program Mango. Moreover, we see that the combination of both strategies performs even better on larger board sizes}, 4468 abstract = {Monte-Carlo Tree Search (MCTS) is a new best-first search guided by the results of Monte-Carlo simulations. In this article, we introduce two progressive strategies for MCTS, called progressive bias and progressive unpruning. They enable the use of relatively time-expensive heuristic knowledge without speed reduction. Progressive bias directs the search according to heuristic knowledge. Progressive unpruning first reduces the branching factor, and then increases it gradually again. Experiments assess that the two progressive strategies significantly improve the level of our Go program Mango. Moreover, we see that the combination of both strategies performs even better on larger board sizes},
4469 www_section = {computer go, MCTS heuristic search, Monte-Carlo Tree Search}, 4469 www_section = {computer go, MCTS heuristic search, Monte-Carlo Tree Search},
4470 doi = {10.1142/S1793005708001094}, 4470 doi = {10.1142/S1793005708001094},
4471 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NMNC\%20-\%20Progressive\%20strategies\%20for\%20MCTS.pdf}, 4471 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NMNC\%20-\%20Progressive\%20strategies\%20for\%20MCTS.pdf},
4472 author = {Guillaume M. J-B. Chaslot and Mark H. M. Winands and H. Jaap van den Herik and Jos W. H. M. Uiterwijk and Bruno Bouzy} 4472 author = {Guillaume M. J-B. Chaslot and Mark H. M. Winands and H. Jaap van den Herik and Jos W. H. M. Uiterwijk and Bruno Bouzy}
4473} 4473}
4474@conference {di08iptps, 4474@conference {di08iptps,
@@ -4480,7 +4480,7 @@ In this paper, we demonstrate a payment scheme that can be used to compensate no
4480 abstract = {Key based routing (KBR) enables peer-to-peer applications to create and use distributed services. KBR is more flexible than distributed hash tables (DHT). However, the broader the application area, the more important become performance issues for a KBR service. In this paper, we present a novel approach to provide a generic KBR service. Its key idea is to use a predictable address assignment scheme. This scheme allows peers to calculate the overlay address of the node that is responsible for a given key and application ID. A public DHT service such as OpenDHT can then resolve this overlay address to the transport address of the respective peer. We compare our solution to alternative proposals such as ReDiR and Diminished Chord. We conclude that our solution has a better worst case complexity for some important KBR operations and the required state. In particular, unlike ReDiR, our solution can guarantee a low latency for KBR route operations }, 4480 abstract = {Key based routing (KBR) enables peer-to-peer applications to create and use distributed services. KBR is more flexible than distributed hash tables (DHT). However, the broader the application area, the more important become performance issues for a KBR service. In this paper, we present a novel approach to provide a generic KBR service. Its key idea is to use a predictable address assignment scheme. This scheme allows peers to calculate the overlay address of the node that is responsible for a given key and application ID. A public DHT service such as OpenDHT can then resolve this overlay address to the transport address of the respective peer. We compare our solution to alternative proposals such as ReDiR and Diminished Chord. We conclude that our solution has a better worst case complexity for some important KBR operations and the required state. In particular, unlike ReDiR, our solution can guarantee a low latency for KBR route operations },
4481 www_section = {distributed hash table, P2P}, 4481 www_section = {distributed hash table, P2P},
4482 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 4482 url = {http://i30www.ira.uka.de/research/publications/p2p/},
4483 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/di08iptps.pdf}, 4483 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/di08iptps.pdf},
4484 author = {Di, Pengfei and Kendy Kutzner and Thomas Fuhrmann} 4484 author = {Di, Pengfei and Kendy Kutzner and Thomas Fuhrmann}
4485} 4485}
4486@conference {quant-adhoc, 4486@conference {quant-adhoc,
@@ -4496,7 +4496,7 @@ In this paper, we demonstrate a payment scheme that can be used to compensate no
4496 www_section = {ad-hoc networks, anonymity, routing, security model}, 4496 www_section = {ad-hoc networks, anonymity, routing, security model},
4497 doi = {10.1016/j.entcs.2009.07.041}, 4497 doi = {10.1016/j.entcs.2009.07.041},
4498 url = {http://portal.acm.org/citation.cfm?id=1619033}, 4498 url = {http://portal.acm.org/citation.cfm?id=1619033},
4499 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/quant-adhoc.pdf}, 4499 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/quant-adhoc.pdf},
4500 author = {Marie Elisabeth Gaup Moe} 4500 author = {Marie Elisabeth Gaup Moe}
4501} 4501}
4502@conference {Goldberg:2008:RTA:1402958.1402989, 4502@conference {Goldberg:2008:RTA:1402958.1402989,
@@ -4514,7 +4514,7 @@ In this paper, we demonstrate a payment scheme that can be used to compensate no
4514 isbn = {978-1-60558-175-0}, 4514 isbn = {978-1-60558-175-0},
4515 doi = {http://doi.acm.org/10.1145/1402958.1402989}, 4515 doi = {http://doi.acm.org/10.1145/1402958.1402989},
4516 url = {http://doi.acm.org/10.1145/1402958.1402989}, 4516 url = {http://doi.acm.org/10.1145/1402958.1402989},
4517 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%2708\%20-\%20Rationality\%20and\%20traffic\%20attraction.pdf}, 4517 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%2708\%20-\%20Rationality\%20and\%20traffic\%20attraction.pdf},
4518 author = {Goldberg, Sharon and Halevi, Shai and Jaggard, Aaron D. and Ramachandran, Vijay and Wright, Rebecca N.} 4518 author = {Goldberg, Sharon and Halevi, Shai and Jaggard, Aaron D. and Ramachandran, Vijay and Wright, Rebecca N.}
4519} 4519}
4520@conference {androulaki-pet2008, 4520@conference {androulaki-pet2008,
@@ -4531,7 +4531,7 @@ In this paper, we demonstrate a payment scheme that can be used to compensate no
4531 isbn = {978-3-540-70629-8}, 4531 isbn = {978-3-540-70629-8},
4532 doi = {10.1007/978-3-540-70630-4_13}, 4532 doi = {10.1007/978-3-540-70630-4_13},
4533 url = {http://portal.acm.org/citation.cfm?id=1428259.1428272}, 4533 url = {http://portal.acm.org/citation.cfm?id=1428259.1428272},
4534 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/getTechreport.pdf}, 4534 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/getTechreport.pdf},
4535 author = {Elli Androulaki and Seung Geol Choi and Steven M. Bellovin and Tal Malkin}, 4535 author = {Elli Androulaki and Seung Geol Choi and Steven M. Bellovin and Tal Malkin},
4536 editor = {Borisov, Nikita and Ian Goldberg} 4536 editor = {Borisov, Nikita and Ian Goldberg}
4537} 4537}
@@ -4547,7 +4547,7 @@ In this paper, we demonstrate a payment scheme that can be used to compensate no
4547 isbn = {978-0-7695-3168-7}, 4547 isbn = {978-0-7695-3168-7},
4548 doi = {10.1109/SP.2008.33}, 4548 doi = {10.1109/SP.2008.33},
4549 url = {http://dx.doi.org/10.1109/SP.2008.33}, 4549 url = {http://dx.doi.org/10.1109/SP.2008.33},
4550 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Deanonymization2008narayanan.pdf}, 4550 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Deanonymization2008narayanan.pdf},
4551 author = {Narayanan, Arvind and Shmatikov, Vitaly} 4551 author = {Narayanan, Arvind and Shmatikov, Vitaly}
4552} 4552}
4553@conference {mccoy-pet2008, 4553@conference {mccoy-pet2008,
@@ -4566,7 +4566,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4566 isbn = {978-3-540-70629-8}, 4566 isbn = {978-3-540-70629-8},
4567 doi = {10.1007/978-3-540-70630-4_5}, 4567 doi = {10.1007/978-3-540-70630-4_5},
4568 url = {http://portal.acm.org/citation.cfm?id=1428264}, 4568 url = {http://portal.acm.org/citation.cfm?id=1428264},
4569 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mccoy-pet2008.pdf}, 4569 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/mccoy-pet2008.pdf},
4570 author = {Damon McCoy and Kevin Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker}, 4570 author = {Damon McCoy and Kevin Bauer and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker},
4571 editor = {Borisov, Nikita and Ian Goldberg} 4571 editor = {Borisov, Nikita and Ian Goldberg}
4572} 4572}
@@ -4606,7 +4606,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4606 www_section = {peer-to-peer live video streaming, stable peer}, 4606 www_section = {peer-to-peer live video streaming, stable peer},
4607 isbn = {978-1-4244-2025-4 }, 4607 isbn = {978-1-4244-2025-4 },
4608 doi = {http://dx.doi.org/10.1109/INFOCOM.2008.194}, 4608 doi = {http://dx.doi.org/10.1109/INFOCOM.2008.194},
4609 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2708\%20-\%20Stable\%20peers.PDF}, 4609 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2708\%20-\%20Stable\%20peers.PDF},
4610 author = {Wang, Feng and Liu, Jiangchuan and Xiong, Yongqiang} 4610 author = {Wang, Feng and Liu, Jiangchuan and Xiong, Yongqiang}
4611} 4611}
4612@booklet {DD08Survey, 4612@booklet {DD08Survey,
@@ -4618,7 +4618,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4618 abstract = {We present an overview of the field of anonymous communications, from its establishment in 1981 from David Chaum to today. Key systems are presented categorized according to their underlying principles: semi-trusted relays, mix systems, remailers, onion routing, and systems to provide robust mixing. We include extended discussions of the threat models and usage models that different schemes provide, and the trade-offs between the security properties offered and the communication characteristics different systems support}, 4618 abstract = {We present an overview of the field of anonymous communications, from its establishment in 1981 from David Chaum to today. Key systems are presented categorized according to their underlying principles: semi-trusted relays, mix systems, remailers, onion routing, and systems to provide robust mixing. We include extended discussions of the threat models and usage models that different schemes provide, and the trade-offs between the security properties offered and the communication characteristics different systems support},
4619 www_section = {onion routing, robustness}, 4619 www_section = {onion routing, robustness},
4620 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.7951}, 4620 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.138.7951},
4621 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DD08Survey.pdf}, 4621 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DD08Survey.pdf},
4622 author = {George Danezis and Claudia Diaz} 4622 author = {George Danezis and Claudia Diaz}
4623} 4623}
4624@conference {Infocom2008, 4624@conference {Infocom2008,
@@ -4629,7 +4629,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4629 address = {Phoenix, AZ}, 4629 address = {Phoenix, AZ},
4630 abstract = {In an n-way broadcast application each one of n overlay nodes wants to push its own distinct large data file to all other n-1 destinations as well as download their respective data files. BitTorrent-like swarming protocols are ideal choices for handling such massive data volume transfers. The original BitTorrent targets one-to-many broadcasts of a single file to a very large number of receivers and thus, by necessity, employs an almost random overlay topology. n-way broadcast applications on the other hand, owing to their inherent n-squared nature, are realizable only in small to medium scale networks. In this paper, we show that we can leverage this scale constraint to construct optimized overlay topologies that take into consideration the end-to-end characteristics of the network and as a consequence deliver far superior performance compared to random and myopic (local) approaches. We present the Max-Min and Max- Sum peer-selection policies used by individual nodes to select their neighbors. The first one strives to maximize the available bandwidth to the slowest destination, while the second maximizes the aggregate output rate. We design a swarming protocol suitable for n-way broadcast and operate it on top of overlay graphs formed by nodes that employ Max-Min or Max-Sum policies. Using trace-driven simulation and measurements from a PlanetLab prototype implementation, we demonstrate that the performance of swarming on top of our constructed topologies is far superior to the performance of random and myopic overlays. Moreover, we show how to modify our swarming protocol to allow it to accommodate selfish nodes}, 4630 abstract = {In an n-way broadcast application each one of n overlay nodes wants to push its own distinct large data file to all other n-1 destinations as well as download their respective data files. BitTorrent-like swarming protocols are ideal choices for handling such massive data volume transfers. The original BitTorrent targets one-to-many broadcasts of a single file to a very large number of receivers and thus, by necessity, employs an almost random overlay topology. n-way broadcast applications on the other hand, owing to their inherent n-squared nature, are realizable only in small to medium scale networks. In this paper, we show that we can leverage this scale constraint to construct optimized overlay topologies that take into consideration the end-to-end characteristics of the network and as a consequence deliver far superior performance compared to random and myopic (local) approaches. We present the Max-Min and Max- Sum peer-selection policies used by individual nodes to select their neighbors. The first one strives to maximize the available bandwidth to the slowest destination, while the second maximizes the aggregate output rate. We design a swarming protocol suitable for n-way broadcast and operate it on top of overlay graphs formed by nodes that employ Max-Min or Max-Sum policies. Using trace-driven simulation and measurements from a PlanetLab prototype implementation, we demonstrate that the performance of swarming on top of our constructed topologies is far superior to the performance of random and myopic overlays. Moreover, we show how to modify our swarming protocol to allow it to accommodate selfish nodes},
4631 www_section = {EGOIST, game theory, routing}, 4631 www_section = {EGOIST, game theory, routing},
4632 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Infocom2008.pdf}, 4632 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Infocom2008.pdf},
4633 author = {Georgios Smaragdakis and Nikolaos Laoutaris and Pietro Michiardi and Azer Bestavros and Byers, John W. and Mema Roussopoulos} 4633 author = {Georgios Smaragdakis and Nikolaos Laoutaris and Pietro Michiardi and Azer Bestavros and Byers, John W. and Mema Roussopoulos}
4634} 4634}
4635@conference {1456474, 4635@conference {1456474,
@@ -4645,7 +4645,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4645 isbn = {978-1-60558-299-3}, 4645 isbn = {978-1-60558-299-3},
4646 doi = {10.1145/1456469.1456474}, 4646 doi = {10.1145/1456469.1456474},
4647 url = {http://portal.acm.org/citation.cfm?id=1456474$\#$}, 4647 url = {http://portal.acm.org/citation.cfm?id=1456474$\#$},
4648 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/lafs.pdf}, 4648 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/lafs.pdf},
4649 author = {Wilcox-O'Hearn, Zooko and Warner, Brian} 4649 author = {Wilcox-O'Hearn, Zooko and Warner, Brian}
4650} 4650}
4651@booklet {fuhrmann08comparable, 4651@booklet {fuhrmann08comparable,
@@ -4657,7 +4657,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4657 type = {Interner Bericht}, 4657 type = {Interner Bericht},
4658 abstract = {Simulations have been a valuable and much used tool in networking research for decades. New protocols are evaluated by simulations. Often, competing designs are judged by their respective performance in simulations. Despite this great importance the state-of-the-art in network simulations is nevertheless still low. A recent survey showed that most publications in a top conference did not even give enough details to repeat the simulations. In this paper we go beyond repeatability and ask: Are different simulations comparable? We study various implementations of the IEEE 802.11 media access layer in ns-2 and OMNeT++ and report some dramatic differences. These findings indicate that two protocols cannot be compared meaningfully unless they are compared in the very same simulation environment. We claim that this problem limits the value of the respective publications because readers are forced to re-implement the work that is described in the paper rather than building on its results. Facing the additional problem that not all authors will agree on one simulator, we address ways of making different simulators comparable}, 4658 abstract = {Simulations have been a valuable and much used tool in networking research for decades. New protocols are evaluated by simulations. Often, competing designs are judged by their respective performance in simulations. Despite this great importance the state-of-the-art in network simulations is nevertheless still low. A recent survey showed that most publications in a top conference did not even give enough details to repeat the simulations. In this paper we go beyond repeatability and ask: Are different simulations comparable? We study various implementations of the IEEE 802.11 media access layer in ns-2 and OMNeT++ and report some dramatic differences. These findings indicate that two protocols cannot be compared meaningfully unless they are compared in the very same simulation environment. We claim that this problem limits the value of the respective publications because readers are forced to re-implement the work that is described in the paper rather than building on its results. Facing the additional problem that not all authors will agree on one simulator, we address ways of making different simulators comparable},
4659 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 4659 url = {http://i30www.ira.uka.de/research/publications/p2p/},
4660 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/towards_comparable_network_simulations.pdf}, 4660 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/towards_comparable_network_simulations.pdf},
4661 author = {Di, Pengfei and Yaser Houri and Kendy Kutzner and Thomas Fuhrmann} 4661 author = {Di, Pengfei and Yaser Houri and Kendy Kutzner and Thomas Fuhrmann}
4662} 4662}
4663@conference {2008_12, 4663@conference {2008_12,
@@ -4668,7 +4668,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4668 abstract = {Privacy is ultimately important, and there is a fair amount of research about it. However, few empirical studies about the cost of privacy are conducted. In the area of secure multiparty computation, the scalar product has long been reckoned as one of the most promising building blocks in place of the classic logic gates. The reason is not only the scalar product complete, which is as good as logic gates, but also the scalar product is much more efficient than logic gates. As a result, we set to study the computation and communication resources needed for some of the most well-known and frequently referred secure scalar-product protocols, including the composite-residuosity, the invertible-matrix, the polynomial-sharing, and the commodity-based approaches. Besides the implementation remarks of these approaches, we analyze and compare their execution time, computation time, and random number consumption, which are the most concerned resources when talking about secure protocols. Moreover, Fairplay the benchmark approach implementing Yao's famous circuit evaluation protocol, is included in our experiments in order to demonstrate the potential for the scalar product to replace logic gates}, 4668 abstract = {Privacy is ultimately important, and there is a fair amount of research about it. However, few empirical studies about the cost of privacy are conducted. In the area of secure multiparty computation, the scalar product has long been reckoned as one of the most promising building blocks in place of the classic logic gates. The reason is not only the scalar product complete, which is as good as logic gates, but also the scalar product is much more efficient than logic gates. As a result, we set to study the computation and communication resources needed for some of the most well-known and frequently referred secure scalar-product protocols, including the composite-residuosity, the invertible-matrix, the polynomial-sharing, and the commodity-based approaches. Besides the implementation remarks of these approaches, we analyze and compare their execution time, computation time, and random number consumption, which are the most concerned resources when talking about secure protocols. Moreover, Fairplay the benchmark approach implementing Yao's famous circuit evaluation protocol, is included in our experiments in order to demonstrate the potential for the scalar product to replace logic gates},
4669 www_section = {circuit evaluation protocol, Circuits, commodity-based, composite residuosity, composite-residuosity, Computational efficiency, Costs, data privacy, empirical survey, Information science, information security, invertible-matrix, logic gates, polynomial-sharing, Polynomials, privacy, Proposals, protocols, scalar-product, secure multiparty computation, secure protocols, Secure scalar product, secure scalar-product protocols}, 4669 www_section = {circuit evaluation protocol, Circuits, commodity-based, composite residuosity, composite-residuosity, Computational efficiency, Costs, data privacy, empirical survey, Information science, information security, invertible-matrix, logic gates, polynomial-sharing, Polynomials, privacy, Proposals, protocols, scalar-product, secure multiparty computation, secure protocols, Secure scalar product, secure scalar-product protocols},
4670 doi = {10.1109/ISA.2008.78}, 4670 doi = {10.1109/ISA.2008.78},
4671 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EmpiricalAspects2009Wang.pdf}, 4671 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EmpiricalAspects2009Wang.pdf},
4672 author = {I-Cheng Wang and Chih-Hao Shen and Tsan-sheng Hsu and Churn-Chung Liao and Da-Wei Wang and Zhan, J.} 4672 author = {I-Cheng Wang and Chih-Hao Shen and Tsan-sheng Hsu and Churn-Chung Liao and Da-Wei Wang and Zhan, J.}
4673} 4673}
4674@article {Pouwelse:2008:TSP:1331115.1331119, 4674@article {Pouwelse:2008:TSP:1331115.1331119,
@@ -4685,7 +4685,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4685 issn = {1532-0626}, 4685 issn = {1532-0626},
4686 doi = {http://dx.doi.org/10.1002/cpe.v20:2}, 4686 doi = {http://dx.doi.org/10.1002/cpe.v20:2},
4687 url = {http://dl.acm.org/citation.cfm?id=1331115.1331119}, 4687 url = {http://dl.acm.org/citation.cfm?id=1331115.1331119},
4688 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Concurrency\%20and\%20Computation\%20-\%20TRIBLER.pdf}, 4688 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Concurrency\%20and\%20Computation\%20-\%20TRIBLER.pdf},
4689 author = {Johan Pouwelse and Garbacki, Pawel and Jun Wang and Arno Bakker and Jie Yang and Alexandru Iosup and Epema, Dick H. J. and Marcel J. T. Reinders and van Steen, Maarten and Henk J. Sips} 4689 author = {Johan Pouwelse and Garbacki, Pawel and Jun Wang and Arno Bakker and Jie Yang and Alexandru Iosup and Epema, Dick H. J. and Marcel J. T. Reinders and van Steen, Maarten and Henk J. Sips}
4690} 4690}
4691@conference {1424615, 4691@conference {1424615,
@@ -4701,7 +4701,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4701 isbn = {978-3-540-69484-7}, 4701 isbn = {978-3-540-69484-7},
4702 doi = {10.1007/978-3-540-69485-4}, 4702 doi = {10.1007/978-3-540-69485-4},
4703 url = {http://www.springerlink.com/content/k6786282r5378k42/}, 4703 url = {http://www.springerlink.com/content/k6786282r5378k42/},
4704 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/AuthenticationEuroPKI2008.pdf}, 4704 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/AuthenticationEuroPKI2008.pdf},
4705 author = {Ralph Holz and Heiko Niedermayer and Hauck, Peter and Carle, Georg} 4705 author = {Ralph Holz and Heiko Niedermayer and Hauck, Peter and Carle, Georg}
4706} 4706}
4707@conference {snader08, 4707@conference {snader08,
@@ -4715,7 +4715,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4715 www_section = {anonymity, Tor}, 4715 www_section = {anonymity, Tor},
4716 doi = {10.1109/NCM.2009.205}, 4716 doi = {10.1109/NCM.2009.205},
4717 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.7368}, 4717 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.140.7368},
4718 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/snader08.pdf}, 4718 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/snader08.pdf},
4719 author = {Robin Snader and Borisov, Nikita} 4719 author = {Robin Snader and Borisov, Nikita}
4720} 4720}
4721@conference {2008_13, 4721@conference {2008_13,
@@ -4727,7 +4727,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4727 abstract = {Next generation networks will combine many heterogeneous access technologies to provide services to a large number of highly mobile users while meeting their demands for quality of service, robustness, and security. Obviously, this is not a trivial task and many protocols fulfilling some combination of these requirements have been proposed. However, non of the current proposals meets all requirements, and the deployment of new applications and services is hindered by a patchwork of protocols. This paper presents Spontaneous Virtual Networks (SpoVNet), an architecture that fosters the creation of new applications and services for next generation networks by providing an underlay abstraction layer. This layer applies an overlay-based approach to cope with mobility, multi-homing, and heterogeneity. For coping with network mobility, it uses a SpoVNet-specific addressing scheme, splitting node identifiers from network locators and providing persistent connections by transparently switching locators. To deal with multihoming it transparently chooses the most appropriate pair of network locators for each connection. To cope with network and protocol heterogeneity, it uses dedicated overlay nodes, e.g., for relaying between IPv4 and IPv6 hosts}, 4727 abstract = {Next generation networks will combine many heterogeneous access technologies to provide services to a large number of highly mobile users while meeting their demands for quality of service, robustness, and security. Obviously, this is not a trivial task and many protocols fulfilling some combination of these requirements have been proposed. However, non of the current proposals meets all requirements, and the deployment of new applications and services is hindered by a patchwork of protocols. This paper presents Spontaneous Virtual Networks (SpoVNet), an architecture that fosters the creation of new applications and services for next generation networks by providing an underlay abstraction layer. This layer applies an overlay-based approach to cope with mobility, multi-homing, and heterogeneity. For coping with network mobility, it uses a SpoVNet-specific addressing scheme, splitting node identifiers from network locators and providing persistent connections by transparently switching locators. To deal with multihoming it transparently chooses the most appropriate pair of network locators for each connection. To cope with network and protocol heterogeneity, it uses dedicated overlay nodes, e.g., for relaying between IPv4 and IPv6 hosts},
4728 www_section = {heterogeneity, robustness}, 4728 www_section = {heterogeneity, robustness},
4729 url = {http://www.tm.uka.de/itm/WebMan/view.php?view=publikationen_detail\&id=283}, 4729 url = {http://www.tm.uka.de/itm/WebMan/view.php?view=publikationen_detail\&id=283},
4730 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/underlayabs-ngi08-final.pdf}, 4730 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/underlayabs-ngi08-final.pdf},
4731 author = {Roland Bless and H{\"u}bsch, Christian and Sebastian Mies and Oliver Waldhorst} 4731 author = {Roland Bless and H{\"u}bsch, Christian and Sebastian Mies and Oliver Waldhorst}
4732} 4732}
4733@article {2008_14, 4733@article {2008_14,
@@ -4744,7 +4744,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4744 volume = {abs/0803.0924}, 4744 volume = {abs/0803.0924},
4745 year = {2008}, 4745 year = {2008},
4746 abstract = {Learning problems form an important category of computational tasks that generalizes many of the computations researchers apply to large real-life data sets. We ask: what concept classes can be learned privately, namely, by an algorithm whose output does not depend too heavily on any one input or specific training example? More precisely, we investigate learning algorithms that satisfy differential privacy, a notion that provides strong confidentiality guarantees in contexts where aggregate information is released about a database containing sensitive information about individuals. We demonstrate that, ignoring computational constraints, it is possible to privately agnostically learn any concept class using a sample size approximately logarithmic in the cardinality of the concept class. Therefore, almost anything learnable is learnable privately: specifically, if a concept class is learnable by a (non-private) algorithm with polynomial sample complexity and output size, then it can be learned privately using a polynomial number of samples. We also present a computationally efficient private PAC learner for the class of parity functions. Local (or randomized response) algorithms are a practical class of private algorithms that have received extensive investigation. We provide a precise characterization of local private learning algorithms. We show that a concept class is learnable by a local algorithm if and only if it is learnable in the statistical query (SQ) model. Finally, we present a separation between the power of interactive and noninteractive local learning algorithms}, 4746 abstract = {Learning problems form an important category of computational tasks that generalizes many of the computations researchers apply to large real-life data sets. We ask: what concept classes can be learned privately, namely, by an algorithm whose output does not depend too heavily on any one input or specific training example? More precisely, we investigate learning algorithms that satisfy differential privacy, a notion that provides strong confidentiality guarantees in contexts where aggregate information is released about a database containing sensitive information about individuals. We demonstrate that, ignoring computational constraints, it is possible to privately agnostically learn any concept class using a sample size approximately logarithmic in the cardinality of the concept class. Therefore, almost anything learnable is learnable privately: specifically, if a concept class is learnable by a (non-private) algorithm with polynomial sample complexity and output size, then it can be learned privately using a polynomial number of samples. We also present a computationally efficient private PAC learner for the class of parity functions. Local (or randomized response) algorithms are a practical class of private algorithms that have received extensive investigation. We provide a precise characterization of local private learning algorithms. We show that a concept class is learnable by a local algorithm if and only if it is learnable in the statistical query (SQ) model. Finally, we present a separation between the power of interactive and noninteractive local learning algorithms},
4747 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WhatCanWeLearnPrivately2008Kasiviswanthan.pdf}, 4747 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WhatCanWeLearnPrivately2008Kasiviswanthan.pdf},
4748 author = {Shiva Prasad Kasiviswanathan and Homin K. Lee and Kobbi Nissim and Sofya Raskhodnikova and Adam Smith} 4748 author = {Shiva Prasad Kasiviswanathan and Homin K. Lee and Kobbi Nissim and Sofya Raskhodnikova and Adam Smith}
4749} 4749}
4750@conference {Jian:2008:WSP:1409540.1409546, 4750@conference {Jian:2008:WSP:1409540.1409546,
@@ -4762,7 +4762,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4762 isbn = {978-1-60558-075-3}, 4762 isbn = {978-1-60558-075-3},
4763 doi = {http://doi.acm.org/10.1145/1409540.1409546}, 4763 doi = {http://doi.acm.org/10.1145/1409540.1409546},
4764 url = {http://doi.acm.org/10.1145/1409540.1409546}, 4764 url = {http://doi.acm.org/10.1145/1409540.1409546},
4765 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EC\%2708\%20-\%20Why\%20share\%20in\%20peer-to-peer\%20networks.pdf}, 4765 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EC\%2708\%20-\%20Why\%20share\%20in\%20peer-to-peer\%20networks.pdf},
4766 author = {Jian, Lian and MacKie-Mason, Jeffrey K.} 4766 author = {Jian, Lian and MacKie-Mason, Jeffrey K.}
4767} 4767}
4768@conference {Garbacki:2007:ATP:1270401.1271766_0, 4768@conference {Garbacki:2007:ATP:1270401.1271766_0,
@@ -4780,7 +4780,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4780 isbn = {0-7695-2906-2}, 4780 isbn = {0-7695-2906-2},
4781 doi = {http://dx.doi.org/10.1109/SASO.2007.9}, 4781 doi = {http://dx.doi.org/10.1109/SASO.2007.9},
4782 url = {http://dx.doi.org/10.1109/SASO.2007.9}, 4782 url = {http://dx.doi.org/10.1109/SASO.2007.9},
4783 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SASO\%2707\%20-\%20Garbacki\%2C\%20Epema\%20\%26\%20van\%20Steen.pdf}, 4783 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SASO\%2707\%20-\%20Garbacki\%2C\%20Epema\%20\%26\%20van\%20Steen.pdf},
4784 author = {Garbacki, Pawel and Epema, Dick H. J. and van Steen, Maarten} 4784 author = {Garbacki, Pawel and Epema, Dick H. J. and van Steen, Maarten}
4785} 4785}
4786@conference {Garbacki:2007:ATP:1270401.1271766, 4786@conference {Garbacki:2007:ATP:1270401.1271766,
@@ -4797,7 +4797,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4797 isbn = {0-7695-2906-2}, 4797 isbn = {0-7695-2906-2},
4798 doi = {http://dx.doi.org/10.1109/SASO.2007.9}, 4798 doi = {http://dx.doi.org/10.1109/SASO.2007.9},
4799 url = {http://dx.doi.org/10.1109/SASO.2007.9}, 4799 url = {http://dx.doi.org/10.1109/SASO.2007.9},
4800 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SASO\%2707\%20-\%20Garbacki\%2C\%20Epema\%20\%26\%20van\%20Steen.pdf}, 4800 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SASO\%2707\%20-\%20Garbacki\%2C\%20Epema\%20\%26\%20van\%20Steen.pdf},
4801 author = {Garbacki, Pawel and Epema, Dick H. J. and van Steen, Maarten} 4801 author = {Garbacki, Pawel and Epema, Dick H. J. and van Steen, Maarten}
4802} 4802}
4803@article {2007_0, 4803@article {2007_0,
@@ -4813,7 +4813,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4813 journal = {unknown}, 4813 journal = {unknown},
4814 issn = {RR-07-205}, 4814 issn = {RR-07-205},
4815 url = {http://www.eurecom.fr/~btroup/kadtraces/}, 4815 url = {http://www.eurecom.fr/~btroup/kadtraces/},
4816 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Tech\%20Report\%20-\%20Analyzing\%20peer\%20behavior\%20in\%20KAD.pdf}, 4816 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Tech\%20Report\%20-\%20Analyzing\%20peer\%20behavior\%20in\%20KAD.pdf},
4817 author = {Steiner, Moritz and En-Najjary, Taoufik and E W Biersack} 4817 author = {Steiner, Moritz and En-Najjary, Taoufik and E W Biersack}
4818} 4818}
4819@booklet {VenHeTon07, 4819@booklet {VenHeTon07,
@@ -4823,7 +4823,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4823 abstract = {The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of "anonymity" of routes in eavesdropped networks is proposed using the information-theoretic equivocation. For a physical layer with orthogonal transmitter directed signaling, scheduling and relaying techniques are designed to maximize achievable network performance for any desired level of anonymity. The network performance is measured by the total rate of packets delivered from the sources to destinations under strict latency and medium access constraints. In particular, analytical results are presented for two scenarios: For a single relay that forwards packets from m users, relaying strategies are provided that minimize the packet drops when the source nodes and the relay generate independent transmission schedules. A relay using such an independent scheduling strategy is undetectable by an eavesdropper and is referred to as a covert relay. Achievable rate regions are characterized under strict and average delay constraints on the traffic, when schedules are independent Poisson processes. For a multihop network with an arbitrary anonymity requirement, the problem of maximizing the sum-rate of flows (network throughput) is considered. A randomized selection strategy to choose covert relays as a function of the routes is designed for this purpose. Using the analytical results for a single covert relay, the strategy is optimized to obtain the maximum achievable throughput as a function of the desired level of anonymity. In particular, the throughput-anonymity relation for the proposed strategy is shown to be equivalent to an information-theoretic rate-distortion function}, 4823 abstract = {The problem of security against packet timing based traffic analysis in wireless networks is considered in this work. An analytical measure of "anonymity" of routes in eavesdropped networks is proposed using the information-theoretic equivocation. For a physical layer with orthogonal transmitter directed signaling, scheduling and relaying techniques are designed to maximize achievable network performance for any desired level of anonymity. The network performance is measured by the total rate of packets delivered from the sources to destinations under strict latency and medium access constraints. In particular, analytical results are presented for two scenarios: For a single relay that forwards packets from m users, relaying strategies are provided that minimize the packet drops when the source nodes and the relay generate independent transmission schedules. A relay using such an independent scheduling strategy is undetectable by an eavesdropper and is referred to as a covert relay. Achievable rate regions are characterized under strict and average delay constraints on the traffic, when schedules are independent Poisson processes. For a multihop network with an arbitrary anonymity requirement, the problem of maximizing the sum-rate of flows (network throughput) is considered. A randomized selection strategy to choose covert relays as a function of the routes is designed for this purpose. Using the analytical results for a single covert relay, the strategy is optimized to obtain the maximum achievable throughput as a function of the desired level of anonymity. In particular, the throughput-anonymity relation for the proposed strategy is shown to be equivalent to an information-theoretic rate-distortion function},
4824 www_section = {Rate-Distortion, secrecy, traffic analysis}, 4824 www_section = {Rate-Distortion, secrecy, traffic analysis},
4825 url = {http://cat.inist.fr/?aModele=afficheN\&cpsidt=20411836}, 4825 url = {http://cat.inist.fr/?aModele=afficheN\&cpsidt=20411836},
4826 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/0710.4903v1.pdf}, 4826 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/0710.4903v1.pdf},
4827 author = {Parvathinathan Venkitasubramaniam and Ting He and Lang Tong} 4827 author = {Parvathinathan Venkitasubramaniam and Ting He and Lang Tong}
4828} 4828}
4829@conference {di07mass, 4829@conference {di07mass,
@@ -4836,7 +4836,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4836 www_section = {distributed hash table, scalable source routing}, 4836 www_section = {distributed hash table, scalable source routing},
4837 isbn = {978-1-4244-1454-3}, 4837 isbn = {978-1-4244-1454-3},
4838 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 4838 url = {http://i30www.ira.uka.de/research/publications/p2p/},
4839 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/di07mass.pdf}, 4839 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/di07mass.pdf},
4840 author = {Di, Pengfei and Yaser Houri and Qing Wei and J{\"o}rg Widmer and Thomas Fuhrmann} 4840 author = {Di, Pengfei and Yaser Houri and Qing Wei and J{\"o}rg Widmer and Thomas Fuhrmann}
4841} 4841}
4842@conference {Ostrovsky:2007:AEN:1315245.1315270, 4842@conference {Ostrovsky:2007:AEN:1315245.1315270,
@@ -4854,7 +4854,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4854 isbn = {978-1-59593-703-2}, 4854 isbn = {978-1-59593-703-2},
4855 doi = {http://doi.acm.org/10.1145/1315245.1315270}, 4855 doi = {http://doi.acm.org/10.1145/1315245.1315270},
4856 url = {http://doi.acm.org/10.1145/1315245.1315270}, 4856 url = {http://doi.acm.org/10.1145/1315245.1315270},
4857 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CCS\%2707\%20-\%20ABE\%20with\%20non-monotonic\%20access\%20structures.pdf}, 4857 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CCS\%2707\%20-\%20ABE\%20with\%20non-monotonic\%20access\%20structures.pdf},
4858 publisher = {unknown}, 4858 publisher = {unknown},
4859 author = {Rafail Ostrovsky and Amit Sahai and Waters, Brent} 4859 author = {Rafail Ostrovsky and Amit Sahai and Waters, Brent}
4860} 4860}
@@ -4862,7 +4862,7 @@ To sample the results, we show that web traffic makes up the majority of the con
4862 title = {B.A.T.M.A.N Status Report}, 4862 title = {B.A.T.M.A.N Status Report},
4863 year = {2007}, 4863 year = {2007},
4864 abstract = {This report documents the current status of the development and implementation of the B.A.T.M.A.N (better approach to mobile ad-hoc networking) routing protocol. B.A.T.M.A.N uses a simple and robust algorithm for establishing multi-hop routes in mobile ad-hoc networks.It ensures highly adaptive and loop-free routing while causing only low processing and traffic cost}, 4864 abstract = {This report documents the current status of the development and implementation of the B.A.T.M.A.N (better approach to mobile ad-hoc networking) routing protocol. B.A.T.M.A.N uses a simple and robust algorithm for establishing multi-hop routes in mobile ad-hoc networks.It ensures highly adaptive and loop-free routing while causing only low processing and traffic cost},
4865 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/batman-status.pdf}, 4865 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/batman-status.pdf},
4866 publisher = {unknown}, 4866 publisher = {unknown},
4867 author = {Axel Neumann and Corinna Elektra Aichele and Marek Lindner} 4867 author = {Axel Neumann and Corinna Elektra Aichele and Marek Lindner}
4868} 4868}
@@ -4880,7 +4880,7 @@ We present the first anonymous credential system in which services can "blacklis
4880 isbn = {978-1-59593-703-2}, 4880 isbn = {978-1-59593-703-2},
4881 doi = {10.1145/1315245.1315256}, 4881 doi = {10.1145/1315245.1315256},
4882 url = {http://portal.acm.org/citation.cfm?id=1315245.1315256}, 4882 url = {http://portal.acm.org/citation.cfm?id=1315245.1315256},
4883 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ccs07-blac.pdf}, 4883 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ccs07-blac.pdf},
4884 author = {Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith} 4884 author = {Patrick P. Tsang and Man Ho Au and Apu Kapadia and Sean Smith}
4885} 4885}
4886@article {Terpstra:2007:BRP:1282427.1282387, 4886@article {Terpstra:2007:BRP:1282427.1282387,
@@ -4901,7 +4901,7 @@ For validation, we simulate a network with one million low-end peers and show Bu
4901 issn = {0146-4833}, 4901 issn = {0146-4833},
4902 doi = {http://doi.acm.org/10.1145/1282427.1282387}, 4902 doi = {http://doi.acm.org/10.1145/1282427.1282387},
4903 url = {http://doi.acm.org/10.1145/1282427.1282387}, 4903 url = {http://doi.acm.org/10.1145/1282427.1282387},
4904 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%20Computers\%20Communication\%20Review\%20-\%20Bubblestorm.pdf}, 4904 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%20Computers\%20Communication\%20Review\%20-\%20Bubblestorm.pdf},
4905 author = {Terpstra, Wesley W. and Jussi Kangasharju and Leng, Christof and Buchmann, Alejandro P.} 4905 author = {Terpstra, Wesley W. and Jussi Kangasharju and Leng, Christof and Buchmann, Alejandro P.}
4906} 4906}
4907@booklet {cosic-2007-001, 4907@booklet {cosic-2007-001,
@@ -4913,7 +4913,7 @@ For validation, we simulate a network with one million low-end peers and show Bu
4913 abstract = {Over the last several decades, there have been numerous proposals for systems which can preserve the anonymity of the recipient of some data. Some have involved trusted third-parties or trusted hardware; others have been constructed on top of link-layer anonymity systems or mix-nets. In this paper, we evaluate a pseudonymous message system which takes the different approach of using Private Information Retrieval (PIR) as its basis. We expose a flaw in the system as presented: it fails to identify Byzantine servers. We provide suggestions on correcting the flaw, while observing the security and performance trade-offs our suggestions require}, 4913 abstract = {Over the last several decades, there have been numerous proposals for systems which can preserve the anonymity of the recipient of some data. Some have involved trusted third-parties or trusted hardware; others have been constructed on top of link-layer anonymity systems or mix-nets. In this paper, we evaluate a pseudonymous message system which takes the different approach of using Private Information Retrieval (PIR) as its basis. We expose a flaw in the system as presented: it fails to identify Byzantine servers. We provide suggestions on correcting the flaw, while observing the security and performance trade-offs our suggestions require},
4914 www_section = {anonymity, private information retrieval, pseudonym}, 4914 www_section = {anonymity, private information retrieval, pseudonym},
4915 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.1013}, 4915 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.1013},
4916 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cosic-2007-001.pdf}, 4916 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cosic-2007-001.pdf},
4917 author = {Len Sassaman and Bart Preneel} 4917 author = {Len Sassaman and Bart Preneel}
4918} 4918}
4919@conference {1759877, 4919@conference {1759877,
@@ -4928,7 +4928,7 @@ For validation, we simulate a network with one million low-end peers and show Bu
4928 www_section = {P2P, storage}, 4928 www_section = {P2P, storage},
4929 isbn = {978-3-540-72359-2}, 4929 isbn = {978-3-540-72359-2},
4930 url = {http://portal.acm.org/citation.cfm?id=1759877\&dl=GUIDE\&coll=GUIDE$\#$}, 4930 url = {http://portal.acm.org/citation.cfm?id=1759877\&dl=GUIDE\&coll=GUIDE$\#$},
4931 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.108.7110.pdf}, 4931 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.108.7110.pdf},
4932 author = {Lin, Meng-Ru and Lu, Ssu-Hsuan and Ho, Tsung-Hsuan and Lin, Peter and Chung, Yeh-Ching} 4932 author = {Lin, Meng-Ru and Lu, Ssu-Hsuan and Ho, Tsung-Hsuan and Lin, Peter and Chung, Yeh-Ching}
4933} 4933}
4934@mastersthesis {1329865, 4934@mastersthesis {1329865,
@@ -4974,7 +4974,7 @@ We develop our solution in two parts: a cheat-proof and real-time event ordering
4974 isbn = {0-7695-3060-5}, 4974 isbn = {0-7695-3060-5},
4975 doi = {10.1109/ACSAC.2007.34}, 4975 doi = {10.1109/ACSAC.2007.34},
4976 url = {http://www.computer.org/portal/web/csdl/doi/10.1109/ACSAC.2007.34}, 4976 url = {http://www.computer.org/portal/web/csdl/doi/10.1109/ACSAC.2007.34},
4977 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ADC07.pdf}, 4977 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ADC07.pdf},
4978 author = {Carlos Aguilar Melchor and Yves Deswarte and Julien Iguchi-Cartigny} 4978 author = {Carlos Aguilar Melchor and Yves Deswarte and Julien Iguchi-Cartigny}
4979} 4979}
4980@article {EdmanSY07, 4980@article {EdmanSY07,
@@ -4988,7 +4988,7 @@ We develop our solution in two parts: a cheat-proof and real-time event ordering
4988 isbn = {142441329X}, 4988 isbn = {142441329X},
4989 doi = {10.1109/ISI.2007.379497}, 4989 doi = {10.1109/ISI.2007.379497},
4990 url = {http://www.mendeley.com/research/a-combinatorial-approach-to-measuring-anonymity/}, 4990 url = {http://www.mendeley.com/research/a-combinatorial-approach-to-measuring-anonymity/},
4991 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EdmanSY07.pdf}, 4991 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EdmanSY07.pdf},
4992 author = {Matthew Edman and Fikret Sivrikaya and B{\"u}lent Yener} 4992 author = {Matthew Edman and Fikret Sivrikaya and B{\"u}lent Yener}
4993} 4993}
4994@article {1273450, 4994@article {1273450,
@@ -5007,7 +5007,7 @@ In this paper, we demonstrate that in view of recent results in compact routing
5007 issn = {0146-4833}, 5007 issn = {0146-4833},
5008 doi = {10.1145/1273445.1273450}, 5008 doi = {10.1145/1273445.1273450},
5009 url = {http://portal.acm.org/citation.cfm?id=1273450$\#$}, 5009 url = {http://portal.acm.org/citation.cfm?id=1273450$\#$},
5010 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.102.5763.pdf}, 5010 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.102.5763.pdf},
5011 author = {Krioukov, Dmitri and Fall, Kevin and Brady, Arthur} 5011 author = {Krioukov, Dmitri and Fall, Kevin and Brady, Arthur}
5012} 5012}
5013@mastersthesis {2007_2, 5013@mastersthesis {2007_2,
@@ -5018,7 +5018,7 @@ In this paper, we demonstrate that in view of recent results in compact routing
5018 abstract = {Mobile devices such as laptops, PDAs and cell phones are increasingly relied on but are used in contexts that put them at risk of physical damage, loss or theft. However, few mechanisms are available to reduce the risk of losing the data stored on these devices. In this dissertation, we try to address this concern by designing a cooperative backup service for mobile devices. The service leverages encounters and spontaneous interactions among participating devices, such that each device stores data on behalf of other devices. We first provide an analytical evaluation of the dependability gains of the proposed service. Distributed storage mechanisms are explored and evaluated. Security concerns arising from thecooperation among mutually suspicious principals are identified, and core mechanisms are proposed to allow them to be addressed. Finally, we present our prototype implementation of the cooperative backup service}, 5018 abstract = {Mobile devices such as laptops, PDAs and cell phones are increasingly relied on but are used in contexts that put them at risk of physical damage, loss or theft. However, few mechanisms are available to reduce the risk of losing the data stored on these devices. In this dissertation, we try to address this concern by designing a cooperative backup service for mobile devices. The service leverages encounters and spontaneous interactions among participating devices, such that each device stores data on behalf of other devices. We first provide an analytical evaluation of the dependability gains of the proposed service. Distributed storage mechanisms are explored and evaluated. Security concerns arising from thecooperation among mutually suspicious principals are identified, and core mechanisms are proposed to allow them to be addressed. Finally, we present our prototype implementation of the cooperative backup service},
5019 www_section = {backup, dependability, P2P, ubiquitous computing}, 5019 www_section = {backup, dependability, P2P, ubiquitous computing},
5020 url = {http://ethesis.inp-toulouse.fr/archive/00000544/}, 5020 url = {http://ethesis.inp-toulouse.fr/archive/00000544/},
5021 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/phd-thesis.fr_en.pdf}, 5021 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/phd-thesis.fr_en.pdf},
5022 author = {Ludovic Court{\`e}s} 5022 author = {Ludovic Court{\`e}s}
5023} 5023}
5024@conference {fessi-iptcomm2007, 5024@conference {fessi-iptcomm2007,
@@ -5047,7 +5047,7 @@ In this paper, we demonstrate that in view of recent results in compact routing
5047 isbn = {978-3-540-74834-2}, 5047 isbn = {978-3-540-74834-2},
5048 doi = {10.1007/978-3-540-74835-9}, 5048 doi = {10.1007/978-3-540-74835-9},
5049 url = {http://www.springerlink.com/content/k2146538700m71v7/}, 5049 url = {http://www.springerlink.com/content/k2146538700m71v7/},
5050 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/MalleshW07.pdf}, 5050 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/MalleshW07.pdf},
5051 author = {Nayantara Mallesh and Matthew Wright}, 5051 author = {Nayantara Mallesh and Matthew Wright},
5052 editor = {Joachim Biskup and Javier Lopez} 5052 editor = {Joachim Biskup and Javier Lopez}
5053} 5053}
@@ -5064,7 +5064,7 @@ I show how side channels (unintended information leakage) in anonymity networks
5064Finally, I introduce novel covert and side channels which exploit thermal effects. Changes in temperature can be remotely induced through CPU load and measured by their effects on crystal clock skew. Experiments show this to be an effective attack against Tor. This side channel may also be usable for geolocation and, as a covert channel, can cross supposedly infallible air-gap security boundaries. 5064Finally, I introduce novel covert and side channels which exploit thermal effects. Changes in temperature can be remotely induced through CPU load and measured by their effects on crystal clock skew. Experiments show this to be an effective attack against Tor. This side channel may also be usable for geolocation and, as a covert channel, can cross supposedly infallible air-gap security boundaries.
5065This thesis demonstrates how theoretical models and generic methodologies relating to covert channels may be applied to find practical solutions to problems in real-world anonymity systems. These findings confirm the existing hypothesis that covert channel analysis, vulnerabilities and defences developed for multilevel secure systems apply equally well to anonymity systems}, 5065This thesis demonstrates how theoretical models and generic methodologies relating to covert channels may be applied to find practical solutions to problems in real-world anonymity systems. These findings confirm the existing hypothesis that covert channel analysis, vulnerabilities and defences developed for multilevel secure systems apply equally well to anonymity systems},
5066 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.5142}, 5066 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.62.5142},
5067 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/steven-thesis.pdf}, 5067 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/steven-thesis.pdf},
5068 author = {Steven J. Murdoch} 5068 author = {Steven J. Murdoch}
5069} 5069}
5070@conference {ccs07-doa, 5070@conference {ccs07-doa,
@@ -5079,7 +5079,7 @@ This thesis demonstrates how theoretical models and generic methodologies relati
5079 isbn = {978-1-59593-703-2}, 5079 isbn = {978-1-59593-703-2},
5080 doi = {10.1145/1315245.1315258}, 5080 doi = {10.1145/1315245.1315258},
5081 url = {http://portal.acm.org/citation.cfm?id=1315258}, 5081 url = {http://portal.acm.org/citation.cfm?id=1315258},
5082 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ccs07-doa.pdf}, 5082 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ccs07-doa.pdf},
5083 author = {Borisov, Nikita and George Danezis and Prateek Mittal and Parisa Tabriz} 5083 author = {Borisov, Nikita and George Danezis and Prateek Mittal and Parisa Tabriz}
5084} 5084}
5085@conference {1345798, 5085@conference {1345798,
@@ -5094,7 +5094,7 @@ This thesis demonstrates how theoretical models and generic methodologies relati
5094 isbn = {0-7695-3054-0}, 5094 isbn = {0-7695-3054-0},
5095 doi = {10.1109/PRDC.2007.29}, 5095 doi = {10.1109/PRDC.2007.29},
5096 url = {http://portal.acm.org/citation.cfm?id=1345534.1345798$\#$}, 5096 url = {http://portal.acm.org/citation.cfm?id=1345534.1345798$\#$},
5097 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.65.8269_0.pdf}, 5097 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.65.8269_0.pdf},
5098 author = {Ludovic Court{\`e}s and Hamouda, Ossama and Kaaniche, Mohamed and Killijian, Marc-Olivier and Powell, David} 5098 author = {Ludovic Court{\`e}s and Hamouda, Ossama and Kaaniche, Mohamed and Killijian, Marc-Olivier and Powell, David}
5099} 5099}
5100@conference {wiangsripanawan-acsw07, 5100@conference {wiangsripanawan-acsw07,
@@ -5111,7 +5111,7 @@ In this paper, we investigate this claim against other low latency anonymous net
5111 www_section = {anonymity, latency, Morphmix, Tarzan, timing attack, Tor}, 5111 www_section = {anonymity, latency, Morphmix, Tarzan, timing attack, Tor},
5112 isbn = {1-920-68285-X}, 5112 isbn = {1-920-68285-X},
5113 url = {http://portal.acm.org/citation.cfm?id=1274553}, 5113 url = {http://portal.acm.org/citation.cfm?id=1274553},
5114 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/wiangsripanawan-acsw07.pdf}, 5114 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/wiangsripanawan-acsw07.pdf},
5115 author = {Rungrat Wiangsripanawan and Willy Susilo and Rei Safavi-Naini} 5115 author = {Rungrat Wiangsripanawan and Willy Susilo and Rei Safavi-Naini}
5116} 5116}
5117@conference {Piatek:2007:IBR:1973430.1973431_0, 5117@conference {Piatek:2007:IBR:1973430.1973431_0,
@@ -5127,7 +5127,7 @@ In this paper, we investigate this claim against other low latency anonymous net
5127 abstract = {A fundamental problem with many peer-to-peer systems is the tendency for users to "free ride"--to consume resources without contributing to the system. The popular file distribution tool BitTorrent was explicitly designed to address this problem, using a tit-for-tat reciprocity strategy to provide positive incentives for nodes to contribute resources to the swarm. While BitTorrent has been extremely successful, we show that its incentive mechanism is not robust to strategic clients. Through performance modeling parameterized by real world traces, we demonstrate that all peers contribute resources that do not directly improve their performance. We use these results to drive the design and implementation of BitTyrant, a strategic BitTorrent client that provides a median 70\% performance gain for a 1 Mbit client on live Internet swarms. We further show that when applied universally, strategic clients can hurt average per-swarm performance compared to today's BitTorrent client implementations}, 5127 abstract = {A fundamental problem with many peer-to-peer systems is the tendency for users to "free ride"--to consume resources without contributing to the system. The popular file distribution tool BitTorrent was explicitly designed to address this problem, using a tit-for-tat reciprocity strategy to provide positive incentives for nodes to contribute resources to the swarm. While BitTorrent has been extremely successful, we show that its incentive mechanism is not robust to strategic clients. Through performance modeling parameterized by real world traces, we demonstrate that all peers contribute resources that do not directly improve their performance. We use these results to drive the design and implementation of BitTyrant, a strategic BitTorrent client that provides a median 70\% performance gain for a 1 Mbit client on live Internet swarms. We further show that when applied universally, strategic clients can hurt average per-swarm performance compared to today's BitTorrent client implementations},
5128 www_section = {BitTorrent, free riding, incentives, peer-to-peer networking}, 5128 www_section = {BitTorrent, free riding, incentives, peer-to-peer networking},
5129 url = {http://dl.acm.org/citation.cfm?id=1973430.1973431}, 5129 url = {http://dl.acm.org/citation.cfm?id=1973430.1973431},
5130 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NSDI\%2707\%20-\%20Do\%20incentives\%20build\%20robustness\%20in\%20BitTorrent.pdf}, 5130 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NSDI\%2707\%20-\%20Do\%20incentives\%20build\%20robustness\%20in\%20BitTorrent.pdf},
5131 author = {Piatek, Michael and Isdal, Tomas and Anderson, Thomas and Krishnamurthy, Arvind and Venkataramani, Arun} 5131 author = {Piatek, Michael and Isdal, Tomas and Anderson, Thomas and Krishnamurthy, Arvind and Venkataramani, Arun}
5132} 5132}
5133@conference {Piatek:2007:IBR:1973430.1973431, 5133@conference {Piatek:2007:IBR:1973430.1973431,
@@ -5142,7 +5142,7 @@ In this paper, we investigate this claim against other low latency anonymous net
5142 address = {Cambridge, MA, USA}, 5142 address = {Cambridge, MA, USA},
5143 abstract = {A fundamental problem with many peer-to-peer systems is the tendency for users to "free ride"--to consume resources without contributing to the system. The popular file distribution tool BitTorrent was explicitly designed to address this problem, using a tit-for-tat reciprocity strategy to provide positive incentives for nodes to contribute resources to the swarm. While BitTorrent has been extremely successful, we show that its incentive mechanism is not robust to strategic clients. Through performance modeling parameterized by real world traces, we demonstrate that all peers contribute resources that do not directly improve their performance. We use these results to drive the design and implementation of BitTyrant, a strategic BitTorrent client that provides a median 70\% performance gain for a 1 Mbit client on live Internet swarms. We further show that when applied universally, strategic clients can hurt average per-swarm performance compared to today's BitTorrent client implementations}, 5143 abstract = {A fundamental problem with many peer-to-peer systems is the tendency for users to "free ride"--to consume resources without contributing to the system. The popular file distribution tool BitTorrent was explicitly designed to address this problem, using a tit-for-tat reciprocity strategy to provide positive incentives for nodes to contribute resources to the swarm. While BitTorrent has been extremely successful, we show that its incentive mechanism is not robust to strategic clients. Through performance modeling parameterized by real world traces, we demonstrate that all peers contribute resources that do not directly improve their performance. We use these results to drive the design and implementation of BitTyrant, a strategic BitTorrent client that provides a median 70\% performance gain for a 1 Mbit client on live Internet swarms. We further show that when applied universally, strategic clients can hurt average per-swarm performance compared to today's BitTorrent client implementations},
5144 url = {http://dl.acm.org/citation.cfm?id=1973430.1973431}, 5144 url = {http://dl.acm.org/citation.cfm?id=1973430.1973431},
5145 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NSDI\%2707\%20-\%20Do\%20incentives\%20build\%20robustness\%20in\%20BitTorrent.pdf}, 5145 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NSDI\%2707\%20-\%20Do\%20incentives\%20build\%20robustness\%20in\%20BitTorrent.pdf},
5146 author = {Piatek, Michael and Isdal, Tomas and Anderson, Thomas and Krishnamurthy, Arvind and Venkataramani, Arun} 5146 author = {Piatek, Michael and Isdal, Tomas and Anderson, Thomas and Krishnamurthy, Arvind and Venkataramani, Arun}
5147} 5147}
5148@conference {diaz-wpes2007, 5148@conference {diaz-wpes2007,
@@ -5159,7 +5159,7 @@ In this paper, we investigate this claim against other low latency anonymous net
5159 isbn = {978-1-59593-883-1}, 5159 isbn = {978-1-59593-883-1},
5160 doi = {10.1145/1314333.1314347}, 5160 doi = {10.1145/1314333.1314347},
5161 url = {http://portal.acm.org/citation.cfm?id=1314333.1314347}, 5161 url = {http://portal.acm.org/citation.cfm?id=1314333.1314347},
5162 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/diaz-wpes2007.pdf}, 5162 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/diaz-wpes2007.pdf},
5163 author = {Claudia Diaz and Carmela Troncoso and George Danezis}, 5163 author = {Claudia Diaz and Carmela Troncoso and George Danezis},
5164 editor = {Ting Yu} 5164 editor = {Ting Yu}
5165} 5165}
@@ -5185,7 +5185,7 @@ In this paper, we investigate this claim against other low latency anonymous net
5185 www_section = {framework, MCTS, Monte-Carlo Tree Search}, 5185 www_section = {framework, MCTS, Monte-Carlo Tree Search},
5186 isbn = {3-540-75537-3, 978-3-540-75537-1}, 5186 isbn = {3-540-75537-3, 978-3-540-75537-1},
5187 url = {http://dl.acm.org/citation.cfm?id=1777826.1777833}, 5187 url = {http://dl.acm.org/citation.cfm?id=1777826.1777833},
5188 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CG\%2706\%20-\%20Selectivity\%20and\%20backup\%20operators\%20in\%20MCTS.pdf}, 5188 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CG\%2706\%20-\%20Selectivity\%20and\%20backup\%20operators\%20in\%20MCTS.pdf},
5189 author = {Coulom, R{\'e}mi} 5189 author = {Coulom, R{\'e}mi}
5190} 5190}
5191@article {Machanavajjhala2007, 5191@article {Machanavajjhala2007,
@@ -5210,7 +5210,7 @@ In this paper, we investigate this claim against other low latency anonymous net
5210 isbn = {0-7695-2805-8}, 5210 isbn = {0-7695-2805-8},
5211 doi = {10.1109/ICN.2007.40}, 5211 doi = {10.1109/ICN.2007.40},
5212 url = {http://dl.acm.org/citation.cfm?id=1260204.1260647}, 5212 url = {http://dl.acm.org/citation.cfm?id=1260204.1260647},
5213 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ICN\%2707\%20-\%20PlanetLab.pdf}, 5213 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ICN\%2707\%20-\%20PlanetLab.pdf},
5214 author = {Tang, Li and Chen, Yin and Li, Fei and Zhang, Hui and Li, Jun} 5214 author = {Tang, Li and Chen, Yin and Li, Fei and Zhang, Hui and Li, Jun}
5215} 5215}
5216@article {Member_enablingadaptive, 5216@article {Member_enablingadaptive,
@@ -5223,7 +5223,7 @@ In this paper, we investigate this claim against other low latency anonymous net
5223 www_section = {distributed packet scheduling, flexible media encoding, path diversity, peer-to-peer networking}, 5223 www_section = {distributed packet scheduling, flexible media encoding, path diversity, peer-to-peer networking},
5224 issn = {0163-6804}, 5224 issn = {0163-6804},
5225 doi = {10.1109/MCOM.2007.374427 }, 5225 doi = {10.1109/MCOM.2007.374427 },
5226 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IEEE\%20Communications\%20Magazine\%20-\%20Video\%20Streaming\%20in\%20P2P\%20Systems.pdf}, 5226 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IEEE\%20Communications\%20Magazine\%20-\%20Video\%20Streaming\%20in\%20P2P\%20Systems.pdf},
5227 author = {Dan Jurca and Jacob Chakareski and Jean-Paul Wagner and Pascal Frossard} 5227 author = {Dan Jurca and Jacob Chakareski and Jean-Paul Wagner and Pascal Frossard}
5228} 5228}
5229@conference {Stathopoulos07end-to-endrouting, 5229@conference {Stathopoulos07end-to-endrouting,
@@ -5234,7 +5234,7 @@ In this paper, we investigate this claim against other low latency anonymous net
5234 abstract = {Dual-radio, dual-processor nodes are an emerging class of Wireless Sensor Network devices that provide both lowenergy operation as well as substantially increased computational performance and communication bandwidth for applications. In such systems, the secondary radio and processor operates with sufficiently low power that it may remain always vigilant, while the the main processor and primary, high-bandwidth radio remain off until triggered by the application. By exploiting the high energy efficiency of the main processor and primary radio along with proper usage, net operating energy benefits are enabled for applications. The secondary radio provides a constantly available multi-hop network, while paths in the primary network exist only when required. This paper describes a topology control mechanism for establishing an end-to-end path in a network of dual-radio nodes using the secondary radios as a control channel to selectively wake up nodes along the required end-to-end path. Using numerical models as well as testbed experimentation, we show that our proposed mechanism provides significant energy savings of more than 60 \% compared to alternative approaches, and that it incurs only moderately greater application latency}, 5234 abstract = {Dual-radio, dual-processor nodes are an emerging class of Wireless Sensor Network devices that provide both lowenergy operation as well as substantially increased computational performance and communication bandwidth for applications. In such systems, the secondary radio and processor operates with sufficiently low power that it may remain always vigilant, while the the main processor and primary, high-bandwidth radio remain off until triggered by the application. By exploiting the high energy efficiency of the main processor and primary radio along with proper usage, net operating energy benefits are enabled for applications. The secondary radio provides a constantly available multi-hop network, while paths in the primary network exist only when required. This paper describes a topology control mechanism for establishing an end-to-end path in a network of dual-radio nodes using the secondary radios as a control channel to selectively wake up nodes along the required end-to-end path. Using numerical models as well as testbed experimentation, we show that our proposed mechanism provides significant energy savings of more than 60 \% compared to alternative approaches, and that it incurs only moderately greater application latency},
5235 www_section = {routing, wireless sensor network}, 5235 www_section = {routing, wireless sensor network},
5236 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.8984}, 5236 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.87.8984},
5237 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Stathopoulos07a.pdf}, 5237 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Stathopoulos07a.pdf},
5238 author = {Thanos Stathopoulos and Heidemann, John and Martin Lukac and Deborah Estrin and William J. Kaiser} 5238 author = {Thanos Stathopoulos and Heidemann, John and Martin Lukac and Deborah Estrin and William J. Kaiser}
5239} 5239}
5240@conference {Binzenhofer:2007:ECS:1769187.1769257, 5240@conference {Binzenhofer:2007:ECS:1769187.1769257,
@@ -5251,7 +5251,7 @@ In this paper, we investigate this claim against other low latency anonymous net
5251 www_section = {churn, distributed hash table, P2P, peer-to-peer networking}, 5251 www_section = {churn, distributed hash table, P2P, peer-to-peer networking},
5252 isbn = {978-3-540-72989-1}, 5252 isbn = {978-3-540-72989-1},
5253 url = {http://dl.acm.org/citation.cfm?id=1769187.1769257}, 5253 url = {http://dl.acm.org/citation.cfm?id=1769187.1769257},
5254 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ITC-20\%2707\%20-\%20Estimating\%20churn\%20in\%20structured\%20p2p\%20networks.pdf}, 5254 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ITC-20\%2707\%20-\%20Estimating\%20churn\%20in\%20structured\%20p2p\%20networks.pdf},
5255 author = {Binzenh{\"o}fer, Andreas and Leibnitz, Kenji} 5255 author = {Binzenh{\"o}fer, Andreas and Leibnitz, Kenji}
5256} 5256}
5257@article {10.1109/WOWMOM.2007.4351805, 5257@article {10.1109/WOWMOM.2007.4351805,
@@ -5266,7 +5266,7 @@ In this paper, we investigate this claim against other low latency anonymous net
5266 isbn = {978-1-4244-0992-1}, 5266 isbn = {978-1-4244-0992-1},
5267 doi = {10.1109/WOWMOM.2007.4351805}, 5267 doi = {10.1109/WOWMOM.2007.4351805},
5268 url = {http://www.computer.org/portal/web/csdl/doi/10.1109/WOWMOM.2007.4351805}, 5268 url = {http://www.computer.org/portal/web/csdl/doi/10.1109/WOWMOM.2007.4351805},
5269 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/oualno-070618.pdf}, 5269 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/oualno-070618.pdf},
5270 author = {Nouha Oualha and Pietro Michiardi and Yves Roudier} 5270 author = {Nouha Oualha and Pietro Michiardi and Yves Roudier}
5271} 5271}
5272@conference {AthanRAM07, 5272@conference {AthanRAM07,
@@ -5280,7 +5280,7 @@ In this paper, we investigate this claim against other low latency anonymous net
5280 isbn = {978-3-540-75650-7}, 5280 isbn = {978-3-540-75650-7},
5281 doi = {10.1007/978-3-540-75651-4}, 5281 doi = {10.1007/978-3-540-75651-4},
5282 url = {http://www.springerlink.com/content/8120788t0l354vj6/}, 5282 url = {http://www.springerlink.com/content/8120788t0l354vj6/},
5283 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/AthanRAM07.pdf}, 5283 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/AthanRAM07.pdf},
5284 author = {Elias Athanasopoulos and Mema Roussopoulos and Kostas G. Anagnostakis and Evangelos P. Markatos} 5284 author = {Elias Athanasopoulos and Mema Roussopoulos and Kostas G. Anagnostakis and Evangelos P. Markatos}
5285} 5285}
5286@conference {Steiner:2007:GVK:1298306.1298323, 5286@conference {Steiner:2007:GVK:1298306.1298323,
@@ -5300,7 +5300,7 @@ Peers are identified by the so called KAD ID, which was up to now assumed to rem
5300 isbn = {978-1-59593-908-1}, 5300 isbn = {978-1-59593-908-1},
5301 doi = {http://doi.acm.org/10.1145/1298306.1298323}, 5301 doi = {http://doi.acm.org/10.1145/1298306.1298323},
5302 url = {http://doi.acm.org/10.1145/1298306.1298323}, 5302 url = {http://doi.acm.org/10.1145/1298306.1298323},
5303 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IMC\%2707\%20-\%20A\%20global\%20view\%20of\%20KAD.pdf}, 5303 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IMC\%2707\%20-\%20A\%20global\%20view\%20of\%20KAD.pdf},
5304 author = {Steiner, Moritz and En-Najjary, Taoufik and E W Biersack} 5304 author = {Steiner, Moritz and En-Najjary, Taoufik and E W Biersack}
5305} 5305}
5306@article {2007_3, 5306@article {2007_3,
@@ -5313,7 +5313,7 @@ Peers are identified by the so called KAD ID, which was up to now assumed to rem
5313 issn = {0734-2071}, 5313 issn = {0734-2071},
5314 doi = {10.1145/1275517.1275520}, 5314 doi = {10.1145/1275517.1275520},
5315 url = {http://doi.acm.org/10.1145/1275517.1275520}, 5315 url = {http://doi.acm.org/10.1145/1275517.1275520},
5316 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/GossipPeerSampling2007Jelasity.pdf}, 5316 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/GossipPeerSampling2007Jelasity.pdf},
5317 author = {Jelasity, M{\'a}rk and Voulgaris, Spyros and Guerraoui, Rachid and Kermarrec, Anne-Marie and van Steen, Maarten} 5317 author = {Jelasity, M{\'a}rk and Voulgaris, Spyros and Guerraoui, Rachid and Kermarrec, Anne-Marie and van Steen, Maarten}
5318} 5318}
5319@article {2007_4, 5319@article {2007_4,
@@ -5326,7 +5326,7 @@ Peers are identified by the so called KAD ID, which was up to now assumed to rem
5326 issn = {0163-5980}, 5326 issn = {0163-5980},
5327 doi = {10.1145/1317379.1317381}, 5327 doi = {10.1145/1317379.1317381},
5328 url = {http://doi.acm.org/10.1145/1317379.1317381}, 5328 url = {http://doi.acm.org/10.1145/1317379.1317381},
5329 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Gossiping2007Kermarrrec.pdf}, 5329 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Gossiping2007Kermarrrec.pdf},
5330 author = {Kermarrec, Anne-Marie and van Steen, Maarten} 5330 author = {Kermarrec, Anne-Marie and van Steen, Maarten}
5331} 5331}
5332@article { feldman:hidden-action, 5332@article { feldman:hidden-action,
@@ -5340,7 +5340,7 @@ Peers are identified by the so called KAD ID, which was up to now assumed to rem
5340 www_section = {action, communication network, hidden action, network routing}, 5340 www_section = {action, communication network, hidden action, network routing},
5341 issn = {0733-8716 }, 5341 issn = {0733-8716 },
5342 doi = {10.1109/JSAC.2007.070810}, 5342 doi = {10.1109/JSAC.2007.070810},
5343 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IEEE\%20Journal\%20\%2825\%29\%20-\%20Hidden-action\%20in\%20network\%20routing.pdf}, 5343 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IEEE\%20Journal\%20\%2825\%29\%20-\%20Hidden-action\%20in\%20network\%20routing.pdf},
5344 author = {Michal Feldman and John Chuang and Ion Stoica and S Shenker} 5344 author = {Michal Feldman and John Chuang and Ion Stoica and S Shenker}
5345} 5345}
5346@article {so64132, 5346@article {so64132,
@@ -5357,7 +5357,7 @@ Peers are identified by the so called KAD ID, which was up to now assumed to rem
5357 issn = {0163-5980}, 5357 issn = {0163-5980},
5358 doi = {10.1145/1317379.1317383}, 5358 doi = {10.1145/1317379.1317383},
5359 url = {http://doc.utwente.nl/64132/}, 5359 url = {http://doc.utwente.nl/64132/},
5360 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/robustgossip-final.pdf}, 5360 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/robustgossip-final.pdf},
5361 author = {Lorenzo Alvisi and Jeroen Doumen and Rachid Guerraoui and Boris Koldehofe and Harry Li and Robbert Van Renesse and Gilles Tredan} 5361 author = {Lorenzo Alvisi and Jeroen Doumen and Rachid Guerraoui and Boris Koldehofe and Harry Li and Robbert Van Renesse and Gilles Tredan}
5362} 5362}
5363@conference {adida07, 5363@conference {adida07,
@@ -5374,7 +5374,7 @@ Finally, we give a distributed protocol for sampling and obfuscating each of the
5374 isbn = {978-3-540-70935-0}, 5374 isbn = {978-3-540-70935-0},
5375 doi = {10.1007/978-3-540-70936-7}, 5375 doi = {10.1007/978-3-540-70936-7},
5376 url = {http://www.springerlink.com/content/j6p730488x602r28/}, 5376 url = {http://www.springerlink.com/content/j6p730488x602r28/},
5377 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/adida07.pdf}, 5377 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/adida07.pdf},
5378 author = {Ben Adida and Douglas Wikstr{\"o}m} 5378 author = {Ben Adida and Douglas Wikstr{\"o}m}
5379} 5379}
5380@conference {Delerablee:2007:IBE:1781454.1781471, 5380@conference {Delerablee:2007:IBE:1781454.1781471,
@@ -5391,7 +5391,7 @@ Finally, we give a distributed protocol for sampling and obfuscating each of the
5391 www_section = {ciphertext, encryption, IBBE, private key}, 5391 www_section = {ciphertext, encryption, IBBE, private key},
5392 isbn = {3-540-76899-8, 978-3-540-76899-9}, 5392 isbn = {3-540-76899-8, 978-3-540-76899-9},
5393 url = {http://dl.acm.org/citation.cfm?id=1781454.1781471}, 5393 url = {http://dl.acm.org/citation.cfm?id=1781454.1781471},
5394 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ASIACRYPT\%2707\%20-\%20IBBE\%20with\%20constant\%20size\%20ciphertexts\%20and\%20private\%20keys.pdf}, 5394 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ASIACRYPT\%2707\%20-\%20IBBE\%20with\%20constant\%20size\%20ciphertexts\%20and\%20private\%20keys.pdf},
5395 author = {Delerabl{\'e}e, C{\'e}cile} 5395 author = {Delerabl{\'e}e, C{\'e}cile}
5396} 5396}
5397@article {KongHG07, 5397@article {KongHG07,
@@ -5408,7 +5408,7 @@ Finally, we give a distributed protocol for sampling and obfuscating each of the
5408 issn = {1536-1233}, 5408 issn = {1536-1233},
5409 doi = {10.1109/TMC.2007.1021}, 5409 doi = {10.1109/TMC.2007.1021},
5410 url = {http://portal.acm.org/citation.cfm?id=1272127}, 5410 url = {http://portal.acm.org/citation.cfm?id=1272127},
5411 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/KongHG07.pdf}, 5411 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/KongHG07.pdf},
5412 author = {Jiejun Kong and Xiaoyan Hong and Mario Gerla} 5412 author = {Jiejun Kong and Xiaoyan Hong and Mario Gerla}
5413} 5413}
5414@conference {Infocom2007-SNS, 5414@conference {Infocom2007-SNS,
@@ -5419,7 +5419,7 @@ Finally, we give a distributed protocol for sampling and obfuscating each of the
5419 address = {Anchorage, AK}, 5419 address = {Anchorage, AK},
5420 www_section = {EGOIST, game theory, routing}, 5420 www_section = {EGOIST, game theory, routing},
5421 url = {www.cs.bu.edu/techreports/pdf/2006-019-selfish-neighbor-selection.pdf}, 5421 url = {www.cs.bu.edu/techreports/pdf/2006-019-selfish-neighbor-selection.pdf},
5422 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Infocom2007-sns.pdf}, 5422 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Infocom2007-sns.pdf},
5423 author = {Nikolaos Laoutaris and Georgios Smaragdakis and Azer Bestavros and Byers, John W.} 5423 author = {Nikolaos Laoutaris and Georgios Smaragdakis and Azer Bestavros and Byers, John W.}
5424} 5424}
5425@conference {overlier-pet2007, 5425@conference {overlier-pet2007,
@@ -5434,7 +5434,7 @@ Finally, we give a distributed protocol for sampling and obfuscating each of the
5434 www_section = {public key cryptography}, 5434 www_section = {public key cryptography},
5435 doi = {10.1007/978-3-540-75551-7}, 5435 doi = {10.1007/978-3-540-75551-7},
5436 url = {http://www.springerlink.com/content/j68v312681l8v874/}, 5436 url = {http://www.springerlink.com/content/j68v312681l8v874/},
5437 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/overlier-pet2007.pdf}, 5437 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/overlier-pet2007.pdf},
5438 author = {Lasse {\O}verlier and Paul Syverson}, 5438 author = {Lasse {\O}verlier and Paul Syverson},
5439 editor = {Borisov, Nikita and Philippe Golle} 5439 editor = {Borisov, Nikita and Philippe Golle}
5440} 5440}
@@ -5466,7 +5466,7 @@ Finally, we give a distributed protocol for sampling and obfuscating each of the
5466 isbn = {0-7695-2848-1}, 5466 isbn = {0-7695-2848-1},
5467 doi = {10.1109/SP.2007.23}, 5467 doi = {10.1109/SP.2007.23},
5468 url = {http://portal.acm.org/citation.cfm?id=1264203}, 5468 url = {http://portal.acm.org/citation.cfm?id=1264203},
5469 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/goldberg-2007.pdf}, 5469 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/goldberg-2007.pdf},
5470 author = {Ian Goldberg} 5470 author = {Ian Goldberg}
5471} 5471}
5472@conference {slicing07, 5472@conference {slicing07,
@@ -5477,7 +5477,7 @@ Finally, we give a distributed protocol for sampling and obfuscating each of the
5477 abstract = {This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the public keys of the nodes along the path. Instead, our approach scrambles the message, divides it into pieces, and sends the pieces along disjoint paths. We show that information slicing addresses message confidentiality as well as source and destination anonymity. Surprisingly, it does not need any public key cryptography. Further, our approach naturally addresses the problem of node failures. These characteristics make it a good fit for use over dynamic peer-to-peer overlays. We evaluate the anonymity ofinformation slicing via analysis and simulations. Our prototype implementation on PlanetLab shows that it achieves higher throughput than onion routing and effectively copes with node churn}, 5477 abstract = {This paper proposes a new approach to anonymous communication called information slicing. Typically, anonymizers use onion routing, where a message is encrypted in layers with the public keys of the nodes along the path. Instead, our approach scrambles the message, divides it into pieces, and sends the pieces along disjoint paths. We show that information slicing addresses message confidentiality as well as source and destination anonymity. Surprisingly, it does not need any public key cryptography. Further, our approach naturally addresses the problem of node failures. These characteristics make it a good fit for use over dynamic peer-to-peer overlays. We evaluate the anonymity ofinformation slicing via analysis and simulations. Our prototype implementation on PlanetLab shows that it achieves higher throughput than onion routing and effectively copes with node churn},
5478 www_section = {anonymity, onion routing, P2P, privacy}, 5478 www_section = {anonymity, onion routing, P2P, privacy},
5479 url = {http://dspace.mit.edu/handle/1721.1/36344a}, 5479 url = {http://dspace.mit.edu/handle/1721.1/36344a},
5480 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/slicing07.pdf}, 5480 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/slicing07.pdf},
5481 author = {Sachin Katti and Jeffery Cohen and Dina Katabi} 5481 author = {Sachin Katti and Jeffery Cohen and Dina Katabi}
5482} 5482}
5483@book {2007_5, 5483@book {2007_5,
@@ -5501,7 +5501,7 @@ Finally, we give a distributed protocol for sampling and obfuscating each of the
5501 abstract = {has been made resistant to jamming by the use of a secret key that is shared by the sender and receiver. There are no known methods for achieving jam resistance without that shared key. Unfortunately, wireless communication is now reaching a scale and a level of importance where such secret-key systems are becoming impractical. For example, the civilian side of the Global Positioning System (GPS) cannot use a shared secret, since that secret would have to be given to all 6.5 billion potential users, and so would no longer be secret. So civilian GPS cannot currently be protected from jamming. But the FAA has stated that the civilian airline industry will transition to using GPS for all navigational aids, even during landings. A terrorist with a simple jamming system could wreak havoc at a major airport. No existing system can solve this problem, and the problem itself has not even been widely discussed. The problem of keyless jam resistance is important. There is a great need for a system that can broadcast messages without any prior secret shared between the sender and receiver. We propose the first system for keyless jam resistance: the BBC algorithm. We describe the encoding, decoding, and broadcast algorithms. We then analyze it for expected resistance to jamming and error rates. We show that BBC can achieve the same level of jam resistance as traditional spread spectrum systems, at just under half the bit rate, and with no shared secret. Furthermore, a hybrid system can achieve the same average bit rate as traditional systems}, 5501 abstract = {has been made resistant to jamming by the use of a secret key that is shared by the sender and receiver. There are no known methods for achieving jam resistance without that shared key. Unfortunately, wireless communication is now reaching a scale and a level of importance where such secret-key systems are becoming impractical. For example, the civilian side of the Global Positioning System (GPS) cannot use a shared secret, since that secret would have to be given to all 6.5 billion potential users, and so would no longer be secret. So civilian GPS cannot currently be protected from jamming. But the FAA has stated that the civilian airline industry will transition to using GPS for all navigational aids, even during landings. A terrorist with a simple jamming system could wreak havoc at a major airport. No existing system can solve this problem, and the problem itself has not even been widely discussed. The problem of keyless jam resistance is important. There is a great need for a system that can broadcast messages without any prior secret shared between the sender and receiver. We propose the first system for keyless jam resistance: the BBC algorithm. We describe the encoding, decoding, and broadcast algorithms. We then analyze it for expected resistance to jamming and error rates. We show that BBC can achieve the same level of jam resistance as traditional spread spectrum systems, at just under half the bit rate, and with no shared secret. Furthermore, a hybrid system can achieve the same average bit rate as traditional systems},
5502 www_section = {GPS}, 5502 www_section = {GPS},
5503 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.8217}, 5503 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.91.8217},
5504 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.91.8217.pdf}, 5504 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.91.8217.pdf},
5505 author = {Leemon C. Baird and William L. Bahn and Michael D. Collins and Martin C. Carlisle and Sean C. Butler} 5505 author = {Leemon C. Baird and William L. Bahn and Michael D. Collins and Martin C. Carlisle and Sean C. Butler}
5506} 5506}
5507@conference {DBLP:conf/saint/SaitoMSSM07, 5507@conference {DBLP:conf/saint/SaitoMSSM07,
@@ -5519,7 +5519,7 @@ This translates itself into a design based on the philosophy of Local Production
5519This paper attempts to put existing works of P2P designs into the perspective of the five-layer architecture model to realize LPLC, and proposes future research directions toward integration of P2P studies for actualization of a dependable and sustainable social infrastructure}, 5519This paper attempts to put existing works of P2P designs into the perspective of the five-layer architecture model to realize LPLC, and proposes future research directions toward integration of P2P studies for actualization of a dependable and sustainable social infrastructure},
5520 www_section = {LPLC, P2P, peer-to-peer networking}, 5520 www_section = {LPLC, P2P, peer-to-peer networking},
5521 doi = {http://doi.ieeecomputersociety.org/10.1109/SAINT-W.2007.59}, 5521 doi = {http://doi.ieeecomputersociety.org/10.1109/SAINT-W.2007.59},
5522 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SAINT\%2707\%20-\%20Local\%20production\%2C\%20local\%20consumption\%20p2p\%20architecture.pdf}, 5522 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SAINT\%2707\%20-\%20Local\%20production\%2C\%20local\%20consumption\%20p2p\%20architecture.pdf},
5523 author = {Saito, Kenji and Morino, Eiichi and Yoshihiko Suko and Takaaki Suzuki and Murai, Jun} 5523 author = {Saito, Kenji and Morino, Eiichi and Yoshihiko Suko and Takaaki Suzuki and Murai, Jun}
5524} 5524}
5525@conference {bauer:wpes2007, 5525@conference {bauer:wpes2007,
@@ -5536,7 +5536,7 @@ We investigate how Tor{\^a}€™s routing optimizations impact its ability to pro
5536 isbn = {978-1-59593-883-1}, 5536 isbn = {978-1-59593-883-1},
5537 doi = {10.1145/1314333.1314336}, 5537 doi = {10.1145/1314333.1314336},
5538 url = {http://portal.acm.org/citation.cfm?id=1314336}, 5538 url = {http://portal.acm.org/citation.cfm?id=1314336},
5539 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/bauer-wpes2007.pdf}, 5539 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/bauer-wpes2007.pdf},
5540 author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker} 5540 author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and Tadayoshi Kohno and Douglas Sicker}
5541} 5541}
5542@article {2007_6, 5542@article {2007_6,
@@ -5561,7 +5561,7 @@ be made without any modification. This paper provides
5561a solution to the open problem posed in [7] concerning 5561a solution to the open problem posed in [7] concerning
5562the creation of a deterministic method to map arbitrary 5562the creation of a deterministic method to map arbitrary
5563message to an elliptic curve}, 5563message to an elliptic curve},
5564 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ijns-2009-v8-n2-p169-176.pdf}, 5564 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ijns-2009-v8-n2-p169-176.pdf},
5565 author = {Brian King} 5565 author = {Brian King}
5566} 5566}
5567@conference {DBLP:conf/infocom/ZhangCY07, 5567@conference {DBLP:conf/infocom/ZhangCY07,
@@ -5577,7 +5577,7 @@ message to an elliptic curve},
5577 www_section = {march}, 5577 www_section = {march},
5578 isbn = {1-4244-1047-9 }, 5578 isbn = {1-4244-1047-9 },
5579 doi = {http://dx.doi.org/10.1109/INFCOM.2007.131}, 5579 doi = {http://dx.doi.org/10.1109/INFCOM.2007.131},
5580 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2707\%20-\%20MARCH.pdf}, 5580 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2707\%20-\%20MARCH.pdf},
5581 author = {Zhan Zhang and Shigang Chen and MyungKeun Yoon} 5581 author = {Zhan Zhang and Shigang Chen and MyungKeun Yoon}
5582} 5582}
5583@conference {Magharei07meshor, 5583@conference {Magharei07meshor,
@@ -5593,7 +5593,7 @@ message to an elliptic curve},
5593 www_section = {mesh, multple tree, overlay, P2P, peer-to-peer networking}, 5593 www_section = {mesh, multple tree, overlay, P2P, peer-to-peer networking},
5594 isbn = {1-4244-1047-9 }, 5594 isbn = {1-4244-1047-9 },
5595 doi = {http://dx.doi.org/10.1109/INFCOM.2007.168}, 5595 doi = {http://dx.doi.org/10.1109/INFCOM.2007.168},
5596 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2707\%20-\%20Mesh\%20or\%20multiple-tree.pdf}, 5596 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2707\%20-\%20Mesh\%20or\%20multiple-tree.pdf},
5597 author = {Magharei, Nazanin and Rejaie, Reza} 5597 author = {Magharei, Nazanin and Rejaie, Reza}
5598} 5598}
5599@book {2007_7, 5599@book {2007_7,
@@ -5612,7 +5612,7 @@ The realized protocols as well as the original protocol are constant-round and r
5612 isbn = {978-3-540-71676-1}, 5612 isbn = {978-3-540-71676-1},
5613 doi = {10.1007/978-3-540-71677-8_23}, 5613 doi = {10.1007/978-3-540-71677-8_23},
5614 url = {http://dx.doi.org/10.1007/978-3-540-71677-8_23}, 5614 url = {http://dx.doi.org/10.1007/978-3-540-71677-8_23},
5615 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/MultiPartyComputation2007Nishide.pdf}, 5615 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/MultiPartyComputation2007Nishide.pdf},
5616 author = {Nishide, Takashi and Ohta, Kazuo}, 5616 author = {Nishide, Takashi and Ohta, Kazuo},
5617 editor = {Okamoto, Tatsuaki and Wang, Xiaoyun} 5617 editor = {Okamoto, Tatsuaki and Wang, Xiaoyun}
5618} 5618}
@@ -5630,7 +5630,7 @@ The realized protocols as well as the original protocol are constant-round and r
5630 issn = {1063-6692}, 5630 issn = {1063-6692},
5631 doi = {http://dx.doi.org/10.1109/TNET.2007.892850}, 5631 doi = {http://dx.doi.org/10.1109/TNET.2007.892850},
5632 url = {http://dx.doi.org/10.1109/TNET.2007.892850}, 5632 url = {http://dx.doi.org/10.1109/TNET.2007.892850},
5633 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IEEE\%E2\%81\%84ACM\%20Banner\%20\%26\%20Orda.pdf}, 5633 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IEEE\%E2\%81\%84ACM\%20Banner\%20\%26\%20Orda.pdf},
5634 author = {Banner, Ron and Orda, Ariel} 5634 author = {Banner, Ron and Orda, Ariel}
5635} 5635}
5636@conference {Dimakis:2010:NCD:1861840.1861868, 5636@conference {Dimakis:2010:NCD:1861840.1861868,
@@ -5648,7 +5648,7 @@ The realized protocols as well as the original protocol are constant-round and r
5648 issn = {0018-9448}, 5648 issn = {0018-9448},
5649 doi = {http://dx.doi.org/10.1109/TIT.2010.2054295}, 5649 doi = {http://dx.doi.org/10.1109/TIT.2010.2054295},
5650 url = {http://dx.doi.org/10.1109/TIT.2010.2054295}, 5650 url = {http://dx.doi.org/10.1109/TIT.2010.2054295},
5651 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2707\%20-\%20Network\%20coding\%20for\%20distributed\%20storage\%20systems.pdf}, 5651 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2707\%20-\%20Network\%20coding\%20for\%20distributed\%20storage\%20systems.pdf},
5652 author = {Dimakis, Alexandros G. and Godfrey, Brighten and Wu, Yunnan and Wainwright, Martin J. and Ramchandran, Kannan} 5652 author = {Dimakis, Alexandros G. and Godfrey, Brighten and Wu, Yunnan and Wainwright, Martin J. and Ramchandran, Kannan}
5653} 5653}
5654@conference {2007_8, 5654@conference {2007_8,
@@ -5666,7 +5666,7 @@ Although several solutions exist in the relevant literature for this problem, th
5666 www_section = {privacy preserving data mining}, 5666 www_section = {privacy preserving data mining},
5667 isbn = {978-1-920682-51-4}, 5667 isbn = {978-1-920682-51-4},
5668 url = {http://dl.acm.org/citation.cfm?id=1378245.1378274}, 5668 url = {http://dl.acm.org/citation.cfm?id=1378245.1378274},
5669 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PrivacyPreserving2007Ambirbekyan.pdf}, 5669 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PrivacyPreserving2007Ambirbekyan.pdf},
5670 author = {Amirbekyan, Artak and Estivill-Castro, Vladimir} 5670 author = {Amirbekyan, Artak and Estivill-Castro, Vladimir}
5671} 5671}
5672@conference {2007_9, 5672@conference {2007_9,
@@ -5677,7 +5677,7 @@ Although several solutions exist in the relevant literature for this problem, th
5677 abstract = {Networks characterized by challenges, such as intermittent connectivity, network heterogeneity, and large delays, are called "challenged networks". We propose a novel network architecture for challenged networks dubbed Parallel Networks, or, ParaNets. The vision behind ParaNets is to have challenged network protocols operate over multiple heterogenous networks, simultaneously available, through one or more devices. We present the ParaNets architecture and discuss its short-term challenges and longterm implications. We also argue, based on current research trends and the ParaNets architecture, for the evolution of the conventional protocol stack to a more flexible cross-layered protocol tree. To demonstrate the potential impact of ParaNets, we use Delay Tolerant Mobile Networks (DTMNs) as a representative challenged network over which we evaluate ParaNets. Our ultimate goal in this paper is to open the way for further work in challenged networks using ParaNets as the underlying architecture}, 5677 abstract = {Networks characterized by challenges, such as intermittent connectivity, network heterogeneity, and large delays, are called "challenged networks". We propose a novel network architecture for challenged networks dubbed Parallel Networks, or, ParaNets. The vision behind ParaNets is to have challenged network protocols operate over multiple heterogenous networks, simultaneously available, through one or more devices. We present the ParaNets architecture and discuss its short-term challenges and longterm implications. We also argue, based on current research trends and the ParaNets architecture, for the evolution of the conventional protocol stack to a more flexible cross-layered protocol tree. To demonstrate the potential impact of ParaNets, we use Delay Tolerant Mobile Networks (DTMNs) as a representative challenged network over which we evaluate ParaNets. Our ultimate goal in this paper is to open the way for further work in challenged networks using ParaNets as the underlying architecture},
5678 isbn = {978-0-7695-3001-7}, 5678 isbn = {978-0-7695-3001-7},
5679 url = {http://ieeexplore.ieee.org/Xplore/login.jsp?reload=true\&url=http\%3A\%2F\%2Fieeexplore.ieee.org\%2Fiel5\%2F4389542\%2F4389543\%2F04389561.pdf\%3Farnumber\%3D4389561\&authDecision=-203}, 5679 url = {http://ieeexplore.ieee.org/Xplore/login.jsp?reload=true\&url=http\%3A\%2F\%2Fieeexplore.ieee.org\%2Fiel5\%2F4389542\%2F4389543\%2F04389561.pdf\%3Farnumber\%3D4389561\&authDecision=-203},
5680 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/hotmobile07.pdf}, 5680 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/hotmobile07.pdf},
5681 author = {Khaled A. Harras and Mike P. Wittie and Kevin C. Almeroth and Elizabeth M. Belding} 5681 author = {Khaled A. Harras and Mike P. Wittie and Kevin C. Almeroth and Elizabeth M. Belding}
5682} 5682}
5683@conference {Petcu:2007:PNP:1625275.1625301, 5683@conference {Petcu:2007:PNP:1625275.1625301,
@@ -5699,7 +5699,7 @@ Unlike OptAPO, PC-DPOP allows for a priory, exact predictions about privacy loss
5699We also report strong efficiency gains over OptAPO in experiments on three problem domains}, 5699We also report strong efficiency gains over OptAPO in experiments on three problem domains},
5700 www_section = {algorithms, distributed constraint optimization, DPOP, OptAPO, partial centralization technique}, 5700 www_section = {algorithms, distributed constraint optimization, DPOP, OptAPO, partial centralization technique},
5701 url = {http://dl.acm.org/citation.cfm?id=1625275.1625301}, 5701 url = {http://dl.acm.org/citation.cfm?id=1625275.1625301},
5702 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IJCAI\%2707\%20-\%20PC-DPOP.pdf}, 5702 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IJCAI\%2707\%20-\%20PC-DPOP.pdf},
5703 author = {Adrian Petcu and Boi Faltings and Mailler, Roger} 5703 author = {Adrian Petcu and Boi Faltings and Mailler, Roger}
5704} 5704}
5705@conference {fuhrmann07wons, 5705@conference {fuhrmann07wons,
@@ -5712,7 +5712,7 @@ We also report strong efficiency gains over OptAPO in experiments on three probl
5712 abstract = {Scalable source routing (SSR) is a novel routing approach for large unstructured networks such as mobile ad hoc networks, mesh networks, or sensor-actuator networks. It is especially suited for organically growing networks of many resource-limited mobile devices supported by a few fixed-wired nodes. SSR is a full-fledged network layer routing protocol that directly provides the semantics of a structured peer-to-peer network. Hence, it can serve as an efficient basis for fully decentralized applications on mobile devices. SSR combines source routing in the physical network with Chord-like routing in the virtual ring formed by the address space. Message forwarding greedily decreases the distance in the virtual ring while preferring physically short paths. Thereby, scalability is achieved without imposing artificial hierarchies or assigning location-dependent addresses}, 5712 abstract = {Scalable source routing (SSR) is a novel routing approach for large unstructured networks such as mobile ad hoc networks, mesh networks, or sensor-actuator networks. It is especially suited for organically growing networks of many resource-limited mobile devices supported by a few fixed-wired nodes. SSR is a full-fledged network layer routing protocol that directly provides the semantics of a structured peer-to-peer network. Hence, it can serve as an efficient basis for fully decentralized applications on mobile devices. SSR combines source routing in the physical network with Chord-like routing in the virtual ring formed by the address space. Message forwarding greedily decreases the distance in the virtual ring while preferring physically short paths. Thereby, scalability is achieved without imposing artificial hierarchies or assigning location-dependent addresses},
5713 www_section = {mobile Ad-hoc networks, P2P, scalable source routing}, 5713 www_section = {mobile Ad-hoc networks, P2P, scalable source routing},
5714 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 5714 url = {http://i30www.ira.uka.de/research/publications/p2p/},
5715 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fuhrmann07wons.pdf}, 5715 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fuhrmann07wons.pdf},
5716 author = {Thomas Fuhrmann} 5716 author = {Thomas Fuhrmann}
5717} 5717}
5718@book {2007_10, 5718@book {2007_10,
@@ -5731,7 +5731,7 @@ In this paper, our focus is on the two-party case, although most of our results
5731 isbn = {978-3-540-71676-1}, 5731 isbn = {978-3-540-71676-1},
5732 doi = {10.1007/978-3-540-71677-8_22}, 5732 doi = {10.1007/978-3-540-71677-8_22},
5733 url = {http://dx.doi.org/10.1007/978-3-540-71677-8_22}, 5733 url = {http://dx.doi.org/10.1007/978-3-540-71677-8_22},
5734 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IntegerComparisonSolution2007Garay.pdf}, 5734 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IntegerComparisonSolution2007Garay.pdf},
5735 author = {Garay, Juan and Schoenmakers, Berry and Villegas, Jos{\'e}}, 5735 author = {Garay, Juan and Schoenmakers, Berry and Villegas, Jos{\'e}},
5736 editor = {Okamoto, Tatsuaki and Wang, Xiaoyun} 5736 editor = {Okamoto, Tatsuaki and Wang, Xiaoyun}
5737} 5737}
@@ -5759,7 +5759,7 @@ In this paper, we follow a performance-driven approach to design PRIME, a scalab
5759 issn = {1063-6692}, 5759 issn = {1063-6692},
5760 doi = {http://dx.doi.org/10.1109/TNET.2008.2007434}, 5760 doi = {http://dx.doi.org/10.1109/TNET.2008.2007434},
5761 url = {http://dx.doi.org/10.1109/TNET.2008.2007434}, 5761 url = {http://dx.doi.org/10.1109/TNET.2008.2007434},
5762 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2707\%20-\%20PRIME.pdf}, 5762 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2707\%20-\%20PRIME.pdf},
5763 author = {Magharei, Nazanin and Rejaie, Reza} 5763 author = {Magharei, Nazanin and Rejaie, Reza}
5764} 5764}
5765@article {1273222, 5765@article {1273222,
@@ -5775,7 +5775,7 @@ In this paper, we follow a performance-driven approach to design PRIME, a scalab
5775 www_section = {privacy, search}, 5775 www_section = {privacy, search},
5776 issn = {0163-5840}, 5776 issn = {0163-5840},
5777 doi = {http://doi.acm.org/10.1145/1273221.1273222}, 5777 doi = {http://doi.acm.org/10.1145/1273221.1273222},
5778 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/2007j_sigirforum_shen.pdf}, 5778 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/2007j_sigirforum_shen.pdf},
5779 author = {Shen, Xuehua and Tan, Bin and Zhai, ChengXiang} 5779 author = {Shen, Xuehua and Tan, Bin and Zhai, ChengXiang}
5780} 5780}
5781@booklet {Bellovin2007, 5781@booklet {Bellovin2007,
@@ -5798,7 +5798,7 @@ In this paper, we follow a performance-driven approach to design PRIME, a scalab
5798 www_section = {keywords, privacy, private information retrieval, search, streaming}, 5798 www_section = {keywords, privacy, private information retrieval, search, streaming},
5799 issn = {0933-2790}, 5799 issn = {0933-2790},
5800 doi = {http://dx.doi.org/10.1007/s00145-007-0565-3}, 5800 doi = {http://dx.doi.org/10.1007/s00145-007-0565-3},
5801 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Ostrovsky-Skeith.pdf}, 5801 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Ostrovsky-Skeith.pdf},
5802 author = {Rafail Ostrovsky and William E. Skeith} 5802 author = {Rafail Ostrovsky and William E. Skeith}
5803} 5803}
5804@mastersthesis {kostas-thesis, 5804@mastersthesis {kostas-thesis,
@@ -5815,7 +5815,7 @@ Then we aim at quantitative definitions of anonymity. We view protocols as noisy
5815 5815
5816Finally we study a problem that arises when we combine probabilities with nondeterminism, where the scheduler is too powerful even for trivially secure protocols. We propose a process calculus which allows to express restrictions to the scheduler, and we use it in the analysis of an anonymity and a contract-signing protocol}, 5816Finally we study a problem that arises when we combine probabilities with nondeterminism, where the scheduler is too powerful even for trivially secure protocols. We propose a process calculus which allows to express restrictions to the scheduler, and we use it in the analysis of an anonymity and a contract-signing protocol},
5817 url = {http://www.win.tue.nl/~kostas/these/}, 5817 url = {http://www.win.tue.nl/~kostas/these/},
5818 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/kostas-thesis.pdf}, 5818 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/kostas-thesis.pdf},
5819 author = {Konstantinos Chatzikokolakis} 5819 author = {Konstantinos Chatzikokolakis}
5820} 5820}
5821@conference {ChatziPP07, 5821@conference {ChatziPP07,
@@ -5827,7 +5827,7 @@ Finally we study a problem that arises when we combine probabilities with nondet
5827 isbn = {0-7695-2819-8}, 5827 isbn = {0-7695-2819-8},
5828 doi = {10.1109/CSF.2007.27}, 5828 doi = {10.1109/CSF.2007.27},
5829 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.2620}, 5829 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.79.2620},
5830 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ChatziPP07.pdf}, 5830 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ChatziPP07.pdf},
5831 author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden} 5831 author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}
5832} 5832}
5833@proceedings {DBLP:conf/stoc/2007, 5833@proceedings {DBLP:conf/stoc/2007,
@@ -5854,7 +5854,7 @@ There exist two main strategies to reduce latency in the query routing process:
5854Exemplary analysis show that Merivaldi means only a modest burden for the network. Merivaldi uses O(log N) CND-hops at maximum to recognize a closest node, where N is the number of nodes. Empirical tests demonstrate this analysis. Analysis shows, the overhead for a Merivaldi-node is modest. It is shown that Merivaldi's Vivaldi works with high quality with the used PING-message type}, 5854Exemplary analysis show that Merivaldi means only a modest burden for the network. Merivaldi uses O(log N) CND-hops at maximum to recognize a closest node, where N is the number of nodes. Empirical tests demonstrate this analysis. Analysis shows, the overhead for a Merivaldi-node is modest. It is shown that Merivaldi's Vivaldi works with high quality with the used PING-message type},
5855 www_section = {IGOR, neighbor selection, overlay-network, proximity route selection}, 5855 www_section = {IGOR, neighbor selection, overlay-network, proximity route selection},
5856 url = {http://i30www.ira.uka.de/teaching/theses/pasttheses/}, 5856 url = {http://i30www.ira.uka.de/teaching/theses/pasttheses/},
5857 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Kising\%20-\%20Proximity\%20Neighbor\%20Selection\%20for\%20IGOR.pdf}, 5857 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Kising\%20-\%20Proximity\%20Neighbor\%20Selection\%20for\%20IGOR.pdf},
5858 author = {Yves Philippe Kising} 5858 author = {Yves Philippe Kising}
5859} 5859}
5860@conference {1361410, 5860@conference {1361410,
@@ -5867,7 +5867,7 @@ Exemplary analysis show that Merivaldi means only a modest burden for the networ
5867 address = {Berkeley, CA, USA}, 5867 address = {Berkeley, CA, USA},
5868 abstract = {System configuration management is difficult because systems evolve in an undisciplined way: packages are upgraded, configuration files are edited, and so on. The management of existing operating systems is strongly imperative in nature, since software packages and configuration data (e.g., /bin and /etc in Unix) can be seen as imperative data structures: they are updated in-place by system administration actions. In this paper we present an alternative approach to system configuration management: a purely functional method, analogous to languages like Haskell. In this approach, the static parts of a configuration -- software packages, configuration files, control scripts -- are built from pure functions, i.e., the results depend solely on the specified inputs of the function and are immutable. As a result, realising a system configuration becomes deterministic and reproducible. Upgrading to a new configuration is mostly atomic and doesn't overwrite anything of the old configuration, thus enabling rollbacks. We have implemented the purely functional model in a small but realistic Linux-based operating system distribution called NixOS}, 5868 abstract = {System configuration management is difficult because systems evolve in an undisciplined way: packages are upgraded, configuration files are edited, and so on. The management of existing operating systems is strongly imperative in nature, since software packages and configuration data (e.g., /bin and /etc in Unix) can be seen as imperative data structures: they are updated in-place by system administration actions. In this paper we present an alternative approach to system configuration management: a purely functional method, analogous to languages like Haskell. In this approach, the static parts of a configuration -- software packages, configuration files, control scripts -- are built from pure functions, i.e., the results depend solely on the specified inputs of the function and are immutable. As a result, realising a system configuration becomes deterministic and reproducible. Upgrading to a new configuration is mostly atomic and doesn't overwrite anything of the old configuration, thus enabling rollbacks. We have implemented the purely functional model in a small but realistic Linux-based operating system distribution called NixOS},
5869 url = {http://portal.acm.org/citation.cfm?id=1361410$\#$}, 5869 url = {http://portal.acm.org/citation.cfm?id=1361410$\#$},
5870 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/dolstra.pdf}, 5870 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/dolstra.pdf},
5871 author = {Dolstra, Eelco and Hemel, Armijn} 5871 author = {Dolstra, Eelco and Hemel, Armijn}
5872} 5872}
5873@conference { pitchblack, 5873@conference { pitchblack,
@@ -5886,7 +5886,7 @@ in a testbed of 800 nodes using minor modifications to Clarke and Sandberg's imp
5886We also discuss various proposed countermeasures designed to detect, thwart or limit the attack. While we were unable to find effective countermeasures, we hope that the presented analysis will be a first step towards the design of secure distributed routing algorithms for restricted-route topologies}, 5886We also discuss various proposed countermeasures designed to detect, thwart or limit the attack. While we were unable to find effective countermeasures, we hope that the presented analysis will be a first step towards the design of secure distributed routing algorithms for restricted-route topologies},
5887 www_section = {denial-of-service, Freenet, installation, routing}, 5887 www_section = {denial-of-service, Freenet, installation, routing},
5888 url = {http://grothoff.org/christian/pitchblack.pdf}, 5888 url = {http://grothoff.org/christian/pitchblack.pdf},
5889 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/pitchblack.pdf}, 5889 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/pitchblack.pdf},
5890 author = {Nathan S Evans and Chis GauthierDickey and Christian Grothoff} 5890 author = {Nathan S Evans and Chis GauthierDickey and Christian Grothoff}
5891} 5891}
5892@conference {murdoch-pet2007, 5892@conference {murdoch-pet2007,
@@ -5899,7 +5899,7 @@ We also discuss various proposed countermeasures designed to detect, thwart or l
5899 address = {Ottawa, Canada}, 5899 address = {Ottawa, Canada},
5900 abstract = {Existing low-latency anonymity networks are vulnerable to traffic analysis, so location diversity of nodes is essential to defend against attacks. Previous work has shown that simply ensuring geographical diversity of nodes does not resist, and in some cases exacerbates, the risk of traffic analysis by ISPs. Ensuring high autonomous-system (AS) diversity can resist this weakness. However, ISPs commonly connect to many other ISPs in a single location, known as an Internet eXchange (IX). This paper shows that IXes are a single point where traffic analysis can be performed. We examine to what extent this is true, through a case study of Tor nodes in the UK. Also, some IXes sample packets flowing through them for performance analysis reasons, and this data could be exploited to de-anonymize traffic. We then develop and evaluate Bayesian traffic analysis techniques capable of processing this sampled data}, 5900 abstract = {Existing low-latency anonymity networks are vulnerable to traffic analysis, so location diversity of nodes is essential to defend against attacks. Previous work has shown that simply ensuring geographical diversity of nodes does not resist, and in some cases exacerbates, the risk of traffic analysis by ISPs. Ensuring high autonomous-system (AS) diversity can resist this weakness. However, ISPs commonly connect to many other ISPs in a single location, known as an Internet eXchange (IX). This paper shows that IXes are a single point where traffic analysis can be performed. We examine to what extent this is true, through a case study of Tor nodes in the UK. Also, some IXes sample packets flowing through them for performance analysis reasons, and this data could be exploited to de-anonymize traffic. We then develop and evaluate Bayesian traffic analysis techniques capable of processing this sampled data},
5901 www_section = {anonymity, Internet exchange, traffic analysis}, 5901 www_section = {anonymity, Internet exchange, traffic analysis},
5902 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/murdoch-pet2007.pdf}, 5902 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/murdoch-pet2007.pdf},
5903 author = {Steven J. Murdoch and Piotr Zieli{\'n}ski}, 5903 author = {Steven J. Murdoch and Piotr Zieli{\'n}ski},
5904 editor = {Borisov, Nikita and Philippe Golle} 5904 editor = {Borisov, Nikita and Philippe Golle}
5905} 5905}
@@ -5917,7 +5917,7 @@ The System Architecture Group at the University of Karlsruhe in Germany has deve
5917One problem with this approach is, that each file system can only be accessed with the help of an identifier, which changes whenever a file system is modified. All clients have to be notified of the new identifier in a secure, fast and reliable way. 5917One problem with this approach is, that each file system can only be accessed with the help of an identifier, which changes whenever a file system is modified. All clients have to be notified of the new identifier in a secure, fast and reliable way.
5918Usually the strategy to solve this type of problem is an encrypted multicast. This thesis presents and analyses several strategies of using multicast distributions to solve this problem and then unveils our final solution based on the Subset Difference method proposed by Naor et al}, 5918Usually the strategy to solve this type of problem is an encrypted multicast. This thesis presents and analyses several strategies of using multicast distributions to solve this problem and then unveils our final solution based on the Subset Difference method proposed by Naor et al},
5919 www_section = {distributed file system, distributed hash table, peer-to-peer networking, store information}, 5919 www_section = {distributed file system, distributed hash table, peer-to-peer networking, store information},
5920 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Amann\%20-\%20Secure\%20asynchronous\%20change\%20notifications.pdf}, 5920 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Amann\%20-\%20Secure\%20asynchronous\%20change\%20notifications.pdf},
5921 author = {Bernhard Amann} 5921 author = {Bernhard Amann}
5922} 5922}
5923@conference {saballus07secure, 5923@conference {saballus07secure,
@@ -5933,7 +5933,7 @@ Usually the strategy to solve this type of problem is an encrypted multicast. Th
5933 www_section = {ad-hoc networks}, 5933 www_section = {ad-hoc networks},
5934 isbn = {978-3-8007-2980-7}, 5934 isbn = {978-3-8007-2980-7},
5935 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.9413}, 5935 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.9413},
5936 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/saballus07secure.pdf}, 5936 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/saballus07secure.pdf},
5937 author = {Bjoern Saballus and Sebastian Wallner and Markus Volkmer} 5937 author = {Bjoern Saballus and Sebastian Wallner and Markus Volkmer}
5938} 5938}
5939@article {Kaafar:2007:SIC:1282427.1282388, 5939@article {Kaafar:2007:SIC:1282427.1282388,
@@ -5950,7 +5950,7 @@ Usually the strategy to solve this type of problem is an encrypted multicast. Th
5950 issn = {0146-4833}, 5950 issn = {0146-4833},
5951 doi = {http://doi.acm.org/10.1145/1282427.1282388}, 5951 doi = {http://doi.acm.org/10.1145/1282427.1282388},
5952 url = {http://doi.acm.org/10.1145/1282427.1282388}, 5952 url = {http://doi.acm.org/10.1145/1282427.1282388},
5953 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%20Comput.\%20Commun.\%20Rev.\%20-\%20Securing\%20Internet\%20Coordinate\%20Embedding\%20Systems.pdf}, 5953 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%20Comput.\%20Commun.\%20Rev.\%20-\%20Securing\%20Internet\%20Coordinate\%20Embedding\%20Systems.pdf},
5954 author = {Kaafar, Mohamed Ali and Laurent Mathy and Barakat, Chadi and Salamatian, Kave and Turletti, Thierry and Dabbous, Walid} 5954 author = {Kaafar, Mohamed Ali and Laurent Mathy and Barakat, Chadi and Salamatian, Kave and Turletti, Thierry and Dabbous, Walid}
5955} 5955}
5956@conference {Conner:2007:SPM:1377934.1377937, 5956@conference {Conner:2007:SPM:1377934.1377937,
@@ -5969,7 +5969,7 @@ Usually the strategy to solve this type of problem is an encrypted multicast. Th
5969 isbn = {978-1-59593-933-3}, 5969 isbn = {978-1-59593-933-3},
5970 doi = {http://doi.acm.org/10.1145/1377934.1377937}, 5970 doi = {http://doi.acm.org/10.1145/1377934.1377937},
5971 url = {http://doi.acm.org/10.1145/1377934.1377937}, 5971 url = {http://doi.acm.org/10.1145/1377934.1377937},
5972 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/MDS\%2707\%20-\%20Conner\%20\%26\%20Nahrstedt\%20-\%20Securing\%20peer-to-peer\%20media\%20streaming\%20systems.pdf}, 5972 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/MDS\%2707\%20-\%20Conner\%20\%26\%20Nahrstedt\%20-\%20Securing\%20peer-to-peer\%20media\%20streaming\%20systems.pdf},
5973 author = {Conner, William and Nahrstedt, Klara} 5973 author = {Conner, William and Nahrstedt, Klara}
5974} 5974}
5975@conference {DBLP:conf/ladc/CourtesKP07, 5975@conference {DBLP:conf/ladc/CourtesKP07,
@@ -5981,7 +5981,7 @@ Usually the strategy to solve this type of problem is an encrypted multicast. Th
5981 www_section = {backup, reputation, self-organization}, 5981 www_section = {backup, reputation, self-organization},
5982 doi = {10.1007/978-3-540-75294-3}, 5982 doi = {10.1007/978-3-540-75294-3},
5983 url = {http://www.springerlink.com/content/p210q274g22j8g77/}, 5983 url = {http://www.springerlink.com/content/p210q274g22j8g77/},
5984 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.106.5673.pdf}, 5984 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.106.5673.pdf},
5985 author = {Ludovic Court{\`e}s and Killijian, Marc-Olivier and Powell, David} 5985 author = {Ludovic Court{\`e}s and Killijian, Marc-Olivier and Powell, David}
5986} 5986}
5987@conference {1396915, 5987@conference {1396915,
@@ -5996,7 +5996,7 @@ Usually the strategy to solve this type of problem is an encrypted multicast. Th
5996 isbn = {978-1-4244-1889-3}, 5996 isbn = {978-1-4244-1889-3},
5997 doi = {10.1109/ICPADS.2007.4447808}, 5997 doi = {10.1109/ICPADS.2007.4447808},
5998 url = {http://portal.acm.org/citation.cfm?id=1396915$\#$}, 5998 url = {http://portal.acm.org/citation.cfm?id=1396915$\#$},
5999 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SKademlia2007.pdf}, 5999 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SKademlia2007.pdf},
6000 author = {Baumgart, Ingmar and Sebastian Mies} 6000 author = {Baumgart, Ingmar and Sebastian Mies}
6001} 6001}
6002@conference {1326260, 6002@conference {1326260,
@@ -6012,7 +6012,7 @@ Usually the strategy to solve this type of problem is an encrypted multicast. Th
6012 isbn = {978-0-9804460-0-5}, 6012 isbn = {978-0-9804460-0-5},
6013 doi = {10.1145/1326257.1326260}, 6013 doi = {10.1145/1326257.1326260},
6014 url = {http://portal.acm.org/citation.cfm?id=1326260$\#$}, 6014 url = {http://portal.acm.org/citation.cfm?id=1326260$\#$},
6015 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Triebel2007a.pdf}, 6015 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Triebel2007a.pdf},
6016 author = {Triebel, Tonio and Guthier, Benjamin and Effelsberg, Wolfgang} 6016 author = {Triebel, Tonio and Guthier, Benjamin and Effelsberg, Wolfgang}
6017} 6017}
6018@conference {space-efficient, 6018@conference {space-efficient,
@@ -6026,7 +6026,7 @@ Usually the strategy to solve this type of problem is an encrypted multicast. Th
6026 abstract = {Private keyword search is a technique that allows for searching and retrieving documents matching certain keywords without revealing the search criteria. We improve the space efficiency of the Ostrovsky et al. Private Search [9] scheme, by describing methods that require considerably shorter buffers for returning the results of the search. Our basic decoding scheme recursive extraction, requires buffers of length less than twice the number of returned results and is still simple and highly efficient. Our extended decoding schemes rely on solving systems of simultaneous equations, and in special cases can uncover documents in buffers that are close to 95 \% full. Finally we note the similarity between our decoding techniques and the ones used to decode rateless codes, and show how such codes can be extracted from encrypted documents }, 6026 abstract = {Private keyword search is a technique that allows for searching and retrieving documents matching certain keywords without revealing the search criteria. We improve the space efficiency of the Ostrovsky et al. Private Search [9] scheme, by describing methods that require considerably shorter buffers for returning the results of the search. Our basic decoding scheme recursive extraction, requires buffers of length less than twice the number of returned results and is still simple and highly efficient. Our extended decoding schemes rely on solving systems of simultaneous equations, and in special cases can uncover documents in buffers that are close to 95 \% full. Finally we note the similarity between our decoding techniques and the ones used to decode rateless codes, and show how such codes can be extracted from encrypted documents },
6027 www_section = {keywords, privacy}, 6027 www_section = {keywords, privacy},
6028 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.7014}, 6028 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.130.7014},
6029 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/privsearch-aeolus.pdf}, 6029 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/privsearch-aeolus.pdf},
6030 author = {George Danezis and Claudia Diaz} 6030 author = {George Danezis and Claudia Diaz}
6031} 6031}
6032@conference {2007_12, 6032@conference {2007_12,
@@ -6036,7 +6036,7 @@ Usually the strategy to solve this type of problem is an encrypted multicast. Th
6036 address = {W{\"u}rzburg, Germany}, 6036 address = {W{\"u}rzburg, Germany},
6037 abstract = {This talk presents an approach for providing Spontaneous Virtual Networks (SpoVNets) that enable flexible, adaptive, and spontaneous provisioning of application-oriented and network-oriented services on top of heterogeneous networks. SpoVNets supply new and uniform communication abstrac-tions for future Internet applications so applications can make use of advanced services not supported by today's Internet. We expect that many functions, which are currently provided by SpoVNet on the application layer will become an integral part of future networks. Thus, SpoVNet will transparently use advanced services from the underlying network infrastructure as they become available (e.g., QoS-support in access networks or multicast in certain ISPs), enabling a seamless transition from current to future genera-tion networks without modifying the applications}, 6037 abstract = {This talk presents an approach for providing Spontaneous Virtual Networks (SpoVNets) that enable flexible, adaptive, and spontaneous provisioning of application-oriented and network-oriented services on top of heterogeneous networks. SpoVNets supply new and uniform communication abstrac-tions for future Internet applications so applications can make use of advanced services not supported by today's Internet. We expect that many functions, which are currently provided by SpoVNet on the application layer will become an integral part of future networks. Thus, SpoVNet will transparently use advanced services from the underlying network infrastructure as they become available (e.g., QoS-support in access networks or multicast in certain ISPs), enabling a seamless transition from current to future genera-tion networks without modifying the applications},
6038 url = {http://www.tm.uka.de/itm/publications.php?bib=257}, 6038 url = {http://www.tm.uka.de/itm/publications.php?bib=257},
6039 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SpoVNet.pdf , https://gnunet.org/git/bibliography.git/plain/docs/Mies\%20-\%20SpoVNet.pdf}, 6039 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SpoVNet.pdf , https://git.gnunet.org/bibliography.git/plain/docs/Mies\%20-\%20SpoVNet.pdf},
6040 author = {Sebastian Mies} 6040 author = {Sebastian Mies}
6041} 6041}
6042@conference {ringstwice07, 6042@conference {ringstwice07,
@@ -6049,7 +6049,7 @@ Usually the strategy to solve this type of problem is an encrypted multicast. Th
6049 abstract = {Information-theoretic private information retrieval (PIR) protocols, such as those described by Chor et al. [5], provide a mechanism by which users can retrieve information from a database distributed across multiple servers in such a way that neither the servers nor an outside observer can determine the contents of the data being retrieved. More recent PIR protocols also provide protection against Byzantine servers, such that a user can detect when one or more servers have attempted to tamper with the data he has requested. In some cases (as in the protocols presented by Beimel and Stahl [1]), the user can still recover his data and protect the contents of his query if the number of Byzantine servers is below a certain threshold; this property is referred to as Byzantine-recovery. However, tampering with a user's data is not the only goal a Byzantine server might have. We present a scenario in which an arbitrarily sized coalition of Byzantine servers transforms the userbase of a PIR network into a signaling framework with varying levels of detectability by means of a subliminal channel [11]. We describe several such subliminal channel techniques, illustrate several use-cases for this subliminal channel, and demonstrate its applicability to a wide variety of PIR protocols}, 6049 abstract = {Information-theoretic private information retrieval (PIR) protocols, such as those described by Chor et al. [5], provide a mechanism by which users can retrieve information from a database distributed across multiple servers in such a way that neither the servers nor an outside observer can determine the contents of the data being retrieved. More recent PIR protocols also provide protection against Byzantine servers, such that a user can detect when one or more servers have attempted to tamper with the data he has requested. In some cases (as in the protocols presented by Beimel and Stahl [1]), the user can still recover his data and protect the contents of his query if the number of Byzantine servers is below a certain threshold; this property is referred to as Byzantine-recovery. However, tampering with a user's data is not the only goal a Byzantine server might have. We present a scenario in which an arbitrarily sized coalition of Byzantine servers transforms the userbase of a PIR network into a signaling framework with varying levels of detectability by means of a subliminal channel [11]. We describe several such subliminal channel techniques, illustrate several use-cases for this subliminal channel, and demonstrate its applicability to a wide variety of PIR protocols},
6050 www_section = {private information retrieval}, 6050 www_section = {private information retrieval},
6051 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.9190}, 6051 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.9190},
6052 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ringstwice07.pdf}, 6052 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ringstwice07.pdf},
6053 author = {Meredith L. Patterson and Len Sassaman} 6053 author = {Meredith L. Patterson and Len Sassaman}
6054} 6054}
6055@conference {Li2007-tcloseness, 6055@conference {Li2007-tcloseness,
@@ -6068,7 +6068,7 @@ Usually the strategy to solve this type of problem is an encrypted multicast. Th
6068 abstract = {One of the major drawbacks of small embedded systems such as sensor nodes is the need to program in a low level programming language like C or assembler. The resulting code is often unportable, system specific and demands deep knowledge of the hardware details. This paper motivates the use of Java as an alternative programming language. We focus on the tiny AmbiComp Virtual Machine (ACVM) which we currently develop as the main part of a more general Java based development platform for interconnected sensor nodes. This VM is designed to run on different small embedded devices in a distributed network. It uses the novel scalable source routing (SSR) algorithm to distribute and share data and workload. SSR provides key based routing which enables distributed hash table (DHT) structures as a substrate for the VM to disseminate and access remote code and objects. This approach allows all VMs in the network to collaborate. The result looks like one large, distributed VM which supports a subset of the Java language. The ACVM substitutes functionality of an operating system which is missing on the target platform. As this development is work in progress, we outline the ideas behind this approach to provide first insights into the upcoming problems}, 6068 abstract = {One of the major drawbacks of small embedded systems such as sensor nodes is the need to program in a low level programming language like C or assembler. The resulting code is often unportable, system specific and demands deep knowledge of the hardware details. This paper motivates the use of Java as an alternative programming language. We focus on the tiny AmbiComp Virtual Machine (ACVM) which we currently develop as the main part of a more general Java based development platform for interconnected sensor nodes. This VM is designed to run on different small embedded devices in a distributed network. It uses the novel scalable source routing (SSR) algorithm to distribute and share data and workload. SSR provides key based routing which enables distributed hash table (DHT) structures as a substrate for the VM to disseminate and access remote code and objects. This approach allows all VMs in the network to collaborate. The result looks like one large, distributed VM which supports a subset of the Java language. The ACVM substitutes functionality of an operating system which is missing on the target platform. As this development is work in progress, we outline the ideas behind this approach to provide first insights into the upcoming problems},
6069 www_section = {distributed hash table, scalable source routing}, 6069 www_section = {distributed hash table, scalable source routing},
6070 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.7724}, 6070 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.70.7724},
6071 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/saballus07distributed.pdf}, 6071 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/saballus07distributed.pdf},
6072 author = {Bjoern Saballus and Johannes Eickhold and Thomas Fuhrmann} 6072 author = {Bjoern Saballus and Johannes Eickhold and Thomas Fuhrmann}
6073} 6073}
6074@conference {Sherr07towardsapplication-aware, 6074@conference {Sherr07towardsapplication-aware,
@@ -6082,7 +6082,7 @@ Usually the strategy to solve this type of problem is an encrypted multicast. Th
6082We pose a grand challenge for anonymity: the development of a network architecture that enables applications to customize routes that tradeoff between anonymity and performance. Towards this challenge, we present the Application-Aware Anonymity (A3) routing service. We envision that A3 will serve as a powerful and flexible anonymous communications layer that will spur the future development of anonymity services}, 6082We pose a grand challenge for anonymity: the development of a network architecture that enables applications to customize routes that tradeoff between anonymity and performance. Towards this challenge, we present the Application-Aware Anonymity (A3) routing service. We envision that A3 will serve as a powerful and flexible anonymous communications layer that will spur the future development of anonymity services},
6083 www_section = {anonymity, routing}, 6083 www_section = {anonymity, routing},
6084 url = {http://portal.acm.org/citation.cfm?id=1361423}, 6084 url = {http://portal.acm.org/citation.cfm?id=1361423},
6085 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/a3.pdf}, 6085 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/a3.pdf},
6086 author = {Micah Sherr and Boon Thau and Matt Blaze} 6086 author = {Micah Sherr and Boon Thau and Matt Blaze}
6087} 6087}
6088@conference {1270971, 6088@conference {1270971,
@@ -6097,7 +6097,7 @@ We pose a grand challenge for anonymity: the development of a network architectu
6097 isbn = {0-7695-2838-4}, 6097 isbn = {0-7695-2838-4},
6098 doi = {10.1109/ICDCSW.2007.83}, 6098 doi = {10.1109/ICDCSW.2007.83},
6099 url = {http://portal.acm.org/citation.cfm?id=1270388.1270971$\#$}, 6099 url = {http://portal.acm.org/citation.cfm?id=1270388.1270971$\#$},
6100 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.90.9758.pdf}, 6100 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.90.9758.pdf},
6101 author = {Baehni, Sebastien and Rachid Guerraoui and Boris Koldehofe and Monod, Maxime} 6101 author = {Baehni, Sebastien and Rachid Guerraoui and Boris Koldehofe and Monod, Maxime}
6102} 6102}
6103@conference {troncoso-ih2007, 6103@conference {troncoso-ih2007,
@@ -6116,7 +6116,7 @@ We pose a grand challenge for anonymity: the development of a network architectu
6116 isbn = {978-3-540-77369-6}, 6116 isbn = {978-3-540-77369-6},
6117 doi = {10.1007/978-3-540-77370-2}, 6117 doi = {10.1007/978-3-540-77370-2},
6118 url = {http://www.springerlink.com/content/h5r4j539833k1k78/}, 6118 url = {http://www.springerlink.com/content/h5r4j539833k1k78/},
6119 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/troncoso-ih2007.pdf}, 6119 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/troncoso-ih2007.pdf},
6120 author = {Carmela Troncoso and Claudia Diaz and Orr Dunkelman and Bart Preneel} 6120 author = {Carmela Troncoso and Claudia Diaz and Orr Dunkelman and Bart Preneel}
6121} 6121}
6122@conference {danezis-pet2007, 6122@conference {danezis-pet2007,
@@ -6130,7 +6130,7 @@ We pose a grand challenge for anonymity: the development of a network architectu
6130 abstract = { We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries to uncover the receivers of messages sent through an anonymizing network supporting anonymous replies. We provide an abstract model of an anonymity system with users that reply to messages. Based on this model, we propose a linear approximation describing the likely receivers of sent messages. Using simulations, we evaluate the new attack given different traffic characteristics and we show that it is superior to previous attacks when replies are routed in the system }, 6130 abstract = { We introduce a new traffic analysis attack: the Two-sided Statistical Disclosure Attack, that tries to uncover the receivers of messages sent through an anonymizing network supporting anonymous replies. We provide an abstract model of an anonymity system with users that reply to messages. Based on this model, we propose a linear approximation describing the likely receivers of sent messages. Using simulations, we evaluate the new attack given different traffic characteristics and we show that it is superior to previous attacks when replies are routed in the system },
6131 www_section = {anonymity, traffic analysis}, 6131 www_section = {anonymity, traffic analysis},
6132 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.7347}, 6132 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.78.7347},
6133 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/danezis-pet2007.pdf}, 6133 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/danezis-pet2007.pdf},
6134 author = {George Danezis and Claudia Diaz and Carmela Troncoso}, 6134 author = {George Danezis and Claudia Diaz and Carmela Troncoso},
6135 editor = {Borisov, Nikita and Philippe Golle} 6135 editor = {Borisov, Nikita and Philippe Golle}
6136} 6136}
@@ -6146,7 +6146,7 @@ We pose a grand challenge for anonymity: the development of a network architectu
6146 isbn = {978-3-540-72737-8}, 6146 isbn = {978-3-540-72737-8},
6147 doi = {10.1007/978-3-540-72738-5_15}, 6147 doi = {10.1007/978-3-540-72738-5_15},
6148 url = {http://dx.doi.org/10.1007/978-3-540-72738-5_15}, 6148 url = {http://dx.doi.org/10.1007/978-3-540-72738-5_15},
6149 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/UnconditionallySecureProtocol2007Li.pdf}, 6149 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/UnconditionallySecureProtocol2007Li.pdf},
6150 author = {Li, Ronghua and Wu, Chuankun} 6150 author = {Li, Ronghua and Wu, Chuankun}
6151} 6151}
6152@conference {tor-soups07, 6152@conference {tor-soups07,
@@ -6163,7 +6163,7 @@ We pose a grand challenge for anonymity: the development of a network architectu
6163 isbn = {978-1-59593-801-5}, 6163 isbn = {978-1-59593-801-5},
6164 doi = {10.1145/1280680.1280687}, 6164 doi = {10.1145/1280680.1280687},
6165 url = {http://portal.acm.org/citation.cfm?id=1280680.1280687}, 6165 url = {http://portal.acm.org/citation.cfm?id=1280680.1280687},
6166 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/tor-soups07.pdf}, 6166 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/tor-soups07.pdf},
6167 author = {Jeremy Clark and Paul C. van Oorschot and Carlisle Adams} 6167 author = {Jeremy Clark and Paul C. van Oorschot and Carlisle Adams}
6168} 6168}
6169@conference {kutzner07linearization, 6169@conference {kutzner07linearization,
@@ -6175,7 +6175,7 @@ We pose a grand challenge for anonymity: the development of a network architectu
6175 abstract = {Novel routing algorithms such as scalable source routing (SSR) and virtual ring routing (VRR) need to set up and maintain a virtual ring structure among all the nodes in the network. The iterative successor pointer rewiring protocol (ISPRP) is one way to bootstrap such a network. Like its VRR-analogon, ISPRP requires one of the nodes to flood the network to guarantee consistency. Recent results on self-stabilizing algorithms now suggest a new approach to bootstrap the virtual rings of SSR and VRR. This so-called linearization method does not require any flooding at all. Moreover, it has been shown that linearization with shortcut neighbors has on average polylogarithmic convergence time, only}, 6175 abstract = {Novel routing algorithms such as scalable source routing (SSR) and virtual ring routing (VRR) need to set up and maintain a virtual ring structure among all the nodes in the network. The iterative successor pointer rewiring protocol (ISPRP) is one way to bootstrap such a network. Like its VRR-analogon, ISPRP requires one of the nodes to flood the network to guarantee consistency. Recent results on self-stabilizing algorithms now suggest a new approach to bootstrap the virtual rings of SSR and VRR. This so-called linearization method does not require any flooding at all. Moreover, it has been shown that linearization with shortcut neighbors has on average polylogarithmic convergence time, only},
6176 www_section = {scalable source routing}, 6176 www_section = {scalable source routing},
6177 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 6177 url = {http://i30www.ira.uka.de/research/publications/p2p/},
6178 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/kutzner07linearization.pdf}, 6178 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/kutzner07linearization.pdf},
6179 author = {Kendy Kutzner and Thomas Fuhrmann} 6179 author = {Kendy Kutzner and Thomas Fuhrmann}
6180} 6180}
6181@article {1250746, 6181@article {1250746,
@@ -6194,7 +6194,7 @@ In this paper we describe Valgrind, a DBI framework designed for building heavyw
6194 issn = {0362-1340}, 6194 issn = {0362-1340},
6195 doi = {10.1145/1273442.1250746}, 6195 doi = {10.1145/1273442.1250746},
6196 url = {http://portal.acm.org/citation.cfm?id=1250746}, 6196 url = {http://portal.acm.org/citation.cfm?id=1250746},
6197 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.108.4263.pdf}, 6197 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.108.4263.pdf},
6198 author = {Nethercote, Nicholas and Seward, Julian} 6198 author = {Nethercote, Nicholas and Seward, Julian}
6199} 6199}
6200@article {2007_14, 6200@article {2007_14,
@@ -6219,7 +6219,7 @@ In this paper we describe Valgrind, a DBI framework designed for building heavyw
6219 isbn = {0-7695-2679-9 }, 6219 isbn = {0-7695-2679-9 },
6220 doi = {10.1109/P2P.2006.1 }, 6220 doi = {10.1109/P2P.2006.1 },
6221 url = {http://www.arnetminer.org/viewpub.do?pid=525534}, 6221 url = {http://www.arnetminer.org/viewpub.do?pid=525534},
6222 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IEEE\%20Computer\%20Society\%20-\%202Fast.pdf}, 6222 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IEEE\%20Computer\%20Society\%20-\%202Fast.pdf},
6223 author = {Garbacki, Pawel and Alexandru Iosup and Epema, Dick H. J. and van Steen, Maarten} 6223 author = {Garbacki, Pawel and Alexandru Iosup and Epema, Dick H. J. and van Steen, Maarten}
6224} 6224}
6225@mastersthesis {2006_0, 6225@mastersthesis {2006_0,
@@ -6275,7 +6275,7 @@ In this paper we describe Valgrind, a DBI framework designed for building heavyw
6275In this position paper we focus on the network effects of usability on privacy and security: usability is a factor as before, but the size of the user base also becomes a factor. We show that in anonymizing networks, even if you were smart enough and had enough time to use every system perfectly, you would nevertheless be right to choose your system based in part on its usability for other users}, 6275In this position paper we focus on the network effects of usability on privacy and security: usability is a factor as before, but the size of the user base also becomes a factor. We show that in anonymizing networks, even if you were smart enough and had enough time to use every system perfectly, you would nevertheless be right to choose your system based in part on its usability for other users},
6276 www_section = {anonymity, privacy}, 6276 www_section = {anonymity, privacy},
6277 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.510}, 6277 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.510},
6278 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/usability-weis2006.pdf}, 6278 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/usability-weis2006.pdf},
6279 author = {Roger Dingledine and Nick Mathewson}, 6279 author = {Roger Dingledine and Nick Mathewson},
6280 editor = {Ross Anderson} 6280 editor = {Ross Anderson}
6281} 6281}
@@ -6292,7 +6292,7 @@ This work has been partially supported by the INRIA DREI {\'E}quipe Associ{\'e}e
6292 issn = {0302-9743}, 6292 issn = {0302-9743},
6293 doi = {10.1007/978-3-540-75336-0}, 6293 doi = {10.1007/978-3-540-75336-0},
6294 url = {http://www.springerlink.com/content/04247873k1719274/}, 6294 url = {http://www.springerlink.com/content/04247873k1719274/},
6295 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.79.4460.pdf}, 6295 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.79.4460.pdf},
6296 author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden} 6296 author = {Konstantinos Chatzikokolakis and Catuscia Palamidessi and Prakash Panangaden}
6297} 6297}
6298@conference {Goyal:2006:AEF:1180405.1180418, 6298@conference {Goyal:2006:AEF:1180405.1180418,
@@ -6310,7 +6310,7 @@ This work has been partially supported by the INRIA DREI {\'E}quipe Associ{\'e}e
6310 isbn = {1-59593-518-5}, 6310 isbn = {1-59593-518-5},
6311 doi = {http://doi.acm.org/10.1145/1180405.1180418}, 6311 doi = {http://doi.acm.org/10.1145/1180405.1180418},
6312 url = {http://doi.acm.org/10.1145/1180405.1180418}, 6312 url = {http://doi.acm.org/10.1145/1180405.1180418},
6313 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CCS\%2706\%20-\%20Attributed-based\%20encryption\%20for\%20fine-grained\%20access\%20control\%20of\%20encrypted\%20data.pdf}, 6313 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CCS\%2706\%20-\%20Attributed-based\%20encryption\%20for\%20fine-grained\%20access\%20control\%20of\%20encrypted\%20data.pdf},
6314 author = {Goyal, Vipul and Pandey, Omkant and Amit Sahai and Waters, Brent} 6314 author = {Goyal, Vipul and Pandey, Omkant and Amit Sahai and Waters, Brent}
6315} 6315}
6316@conference {alpha-mixing:pet2006, 6316@conference {alpha-mixing:pet2006,
@@ -6328,7 +6328,7 @@ Alpha-mixing is an approach that can be added to traditional batching strategies
6328 isbn = {978-3-540-68790-0}, 6328 isbn = {978-3-540-68790-0},
6329 doi = {10.1007/11957454}, 6329 doi = {10.1007/11957454},
6330 url = {http://www.springerlink.com/content/m23510526727k317/}, 6330 url = {http://www.springerlink.com/content/m23510526727k317/},
6331 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/alpha-mixing-pet2006.pdf}, 6331 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/alpha-mixing-pet2006.pdf},
6332 author = {Roger Dingledine and Andrei Serjantov and Paul Syverson}, 6332 author = {Roger Dingledine and Andrei Serjantov and Paul Syverson},
6333 editor = {George Danezis and Philippe Golle} 6333 editor = {George Danezis and Philippe Golle}
6334} 6334}
@@ -6342,7 +6342,7 @@ Alpha-mixing is an approach that can be added to traditional batching strategies
6342 www_section = {ad-hoc networks, overlay networks, traffic analysis}, 6342 www_section = {ad-hoc networks, overlay networks, traffic analysis},
6343 doi = {10.1109/PERCOMW.2006.28}, 6343 doi = {10.1109/PERCOMW.2006.28},
6344 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 6344 url = {http://i30www.ira.uka.de/research/publications/p2p/},
6345 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cramer06bootstrapping.pdf}, 6345 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cramer06bootstrapping.pdf},
6346 author = {Cramer, Curt and Thomas Fuhrmann} 6346 author = {Cramer, Curt and Thomas Fuhrmann}
6347} 6347}
6348@conference {UREbreak06, 6348@conference {UREbreak06,
@@ -6356,7 +6356,7 @@ Alpha-mixing is an approach that can be added to traditional batching strategies
6356 www_section = {traffic analysis, universal re-encryption}, 6356 www_section = {traffic analysis, universal re-encryption},
6357 doi = {10.1007/s10207-007-0033-y}, 6357 doi = {10.1007/s10207-007-0033-y},
6358 url = {http://www.springerlink.com/content/x038u85171776236/}, 6358 url = {http://www.springerlink.com/content/x038u85171776236/},
6359 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/UREbreak06.pdf}, 6359 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/UREbreak06.pdf},
6360 author = {George Danezis} 6360 author = {George Danezis}
6361} 6361}
6362@conference {morphmix:pet2006, 6362@conference {morphmix:pet2006,
@@ -6373,7 +6373,7 @@ Alpha-mixing is an approach that can be added to traditional batching strategies
6373 isbn = {978-3-540-68790-0}, 6373 isbn = {978-3-540-68790-0},
6374 doi = {10.1007/11957454}, 6374 doi = {10.1007/11957454},
6375 url = {http://www.springerlink.com/content/p2612108665331n7/}, 6375 url = {http://www.springerlink.com/content/p2612108665331n7/},
6376 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/morphmix-pet2006.pdf}, 6376 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/morphmix-pet2006.pdf},
6377 author = {Parisa Tabriz and Borisov, Nikita}, 6377 author = {Parisa Tabriz and Borisov, Nikita},
6378 editor = {George Danezis and Philippe Golle} 6378 editor = {George Danezis and Philippe Golle}
6379} 6379}
@@ -6391,7 +6391,7 @@ Alpha-mixing is an approach that can be added to traditional batching strategies
6391 issn = {0146-4833}, 6391 issn = {0146-4833},
6392 doi = {10.1145/1151659.1159937}, 6392 doi = {10.1145/1151659.1159937},
6393 url = {http://portal.acm.org/citation.cfm?id=1159937$\#$}, 6393 url = {http://portal.acm.org/citation.cfm?id=1159937$\#$},
6394 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/BuildingAnASTopologyModel.pdf}, 6394 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/BuildingAnASTopologyModel.pdf},
6395 author = {M{\"u}hlbauer, Wolfgang and Feldmann, Anja and Maennel, Olaf and Roughan, Matthew and Uhlig, Steve} 6395 author = {M{\"u}hlbauer, Wolfgang and Feldmann, Anja and Maennel, Olaf and Roughan, Matthew and Uhlig, Steve}
6396} 6396}
6397@conference {thiele06debruijn, 6397@conference {thiele06debruijn,
@@ -6403,7 +6403,7 @@ Alpha-mixing is an approach that can be added to traditional batching strategies
6403 abstract = {Wireless on demand systems typically need authentication, authorization and accounting (AAA) services. In a peer-to-peer (P2P) environment these AAA-services need to be provided in a fully decentralized manner. This excludes many cryptographic approaches since they need and rely on a central trusted instance. One way to accomplish AAA in a P2P manner are de Bruijn-networks, since there data can be routed over multiple non-overlapping paths, thereby hampering malicious nodes from manipulation that data. Originally, de Bruijn-networks required a rather fixed network structure which made them unsuitable for wireless networks. In this paper we generalize de Bruijn-networks to an arbitrary number of nodes while keeping all their desired properties. This is achieved by decoupling link degree and character set of the native de Bruijn graph. Furthermore we describe how this makes the resulting network resistant against node churn}, 6403 abstract = {Wireless on demand systems typically need authentication, authorization and accounting (AAA) services. In a peer-to-peer (P2P) environment these AAA-services need to be provided in a fully decentralized manner. This excludes many cryptographic approaches since they need and rely on a central trusted instance. One way to accomplish AAA in a P2P manner are de Bruijn-networks, since there data can be routed over multiple non-overlapping paths, thereby hampering malicious nodes from manipulation that data. Originally, de Bruijn-networks required a rather fixed network structure which made them unsuitable for wireless networks. In this paper we generalize de Bruijn-networks to an arbitrary number of nodes while keeping all their desired properties. This is achieved by decoupling link degree and character set of the native de Bruijn graph. Furthermore we describe how this makes the resulting network resistant against node churn},
6404 www_section = {authentication, P2P}, 6404 www_section = {authentication, P2P},
6405 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 6405 url = {http://i30www.ira.uka.de/research/publications/p2p/},
6406 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/thiele06debruijn.pdf}, 6406 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/thiele06debruijn.pdf},
6407 author = {Manuel Thiele and Kendy Kutzner and Thomas Fuhrmann} 6407 author = {Manuel Thiele and Kendy Kutzner and Thomas Fuhrmann}
6408} 6408}
6409@article {adams06, 6409@article {adams06,
@@ -6415,7 +6415,7 @@ Alpha-mixing is an approach that can be added to traditional batching strategies
6415 abstract = {This paper proposes a classification for techniques that encourage, preserve, or enhance privacy in online environments. This classification encompasses both automated mechanisms (those that exclusively or primarily use computers and software to implement privacy techniques) and nonautomated mechanisms (those that exclusively or primarily use human means to implement privacy techniques). We give examples of various techniques and show where they fit within this classification. The importance of such a classification is discussed along with its use as a tool for the comparison and evaluation of privacy techniques}, 6415 abstract = {This paper proposes a classification for techniques that encourage, preserve, or enhance privacy in online environments. This classification encompasses both automated mechanisms (those that exclusively or primarily use computers and software to implement privacy techniques) and nonautomated mechanisms (those that exclusively or primarily use human means to implement privacy techniques). We give examples of various techniques and show where they fit within this classification. The importance of such a classification is discussed along with its use as a tool for the comparison and evaluation of privacy techniques},
6416 www_section = {privacy}, 6416 www_section = {privacy},
6417 url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=999672}, 6417 url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=999672},
6418 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/adams06.pdf}, 6418 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/adams06.pdf},
6419 author = {Carlisle Adams} 6419 author = {Carlisle Adams}
6420} 6420}
6421@conference {2006_1, 6421@conference {2006_1,
@@ -6431,7 +6431,7 @@ Alpha-mixing is an approach that can be added to traditional batching strategies
6431 www_section = {cooperation, hidden action, unstructured peer-to-peer system}, 6431 www_section = {cooperation, hidden action, unstructured peer-to-peer system},
6432 isbn = {1-4244-0463-0 }, 6432 isbn = {1-4244-0463-0 },
6433 doi = {http://dx.doi.org/10.1109/CHINACOM.2006.344762}, 6433 doi = {http://dx.doi.org/10.1109/CHINACOM.2006.344762},
6434 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ChinaCom\%2706\%20-\%20Combating\%20hidden\%20action\%20in\%20unstructured\%20p2p\%20systems.pdf}, 6434 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ChinaCom\%2706\%20-\%20Combating\%20hidden\%20action\%20in\%20unstructured\%20p2p\%20systems.pdf},
6435 author = {Qi Zhao and Jianzhong Zhang and Jingdong Xu} 6435 author = {Qi Zhao and Jianzhong Zhang and Jingdong Xu}
6436} 6436}
6437@book {2006_2, 6437@book {2006_2,
@@ -6460,7 +6460,7 @@ In this paper we review SSR's self-organizing features and demonstrate how the c
6460 issn = {978-3-540-37658-3}, 6460 issn = {978-3-540-37658-3},
6461 doi = {10.1007/11822035}, 6461 doi = {10.1007/11822035},
6462 url = {http://www.springerlink.com/content/4540535t4v2g2548/}, 6462 url = {http://www.springerlink.com/content/4540535t4v2g2548/},
6463 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Combining\%20Virtual\%20and\%20Physical\%20Structures\%20for\%20Self-organized\%20Routing_0.pdf}, 6463 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Combining\%20Virtual\%20and\%20Physical\%20Structures\%20for\%20Self-organized\%20Routing_0.pdf},
6464 publisher = {unknown}, 6464 publisher = {unknown},
6465 author = {Thomas Fuhrmann} 6465 author = {Thomas Fuhrmann}
6466} 6466}
@@ -6483,7 +6483,7 @@ In this paper we review SSR's self-organizing features and demonstrate how the c
6483 address = {Berkeley, CA, USA}, 6483 address = {Berkeley, CA, USA},
6484 abstract = {Compare-by-hash is the now-common practice used by systems designers who assume that when the digest of a cryptographic hash function is equal on two distinct files, then those files are identical. This approach has been used in both real projects and in research efforts (for example rysnc [16] and LBFS [12]). A recent paper by Henson criticized this practice [8]. The present paper revisits the topic from an advocate's standpoint: we claim that compare-by-hash is completely reasonable, and we offer various arguments in support of this viewpoint in addition to addressing concerns raised by Henson}, 6484 abstract = {Compare-by-hash is the now-common practice used by systems designers who assume that when the digest of a cryptographic hash function is equal on two distinct files, then those files are identical. This approach has been used in both real projects and in research efforts (for example rysnc [16] and LBFS [12]). A recent paper by Henson criticized this practice [8]. The present paper revisits the topic from an advocate's standpoint: we claim that compare-by-hash is completely reasonable, and we offer various arguments in support of this viewpoint in addition to addressing concerns raised by Henson},
6485 url = {http://portal.acm.org/citation.cfm?id=1267366$\#$}, 6485 url = {http://portal.acm.org/citation.cfm?id=1267366$\#$},
6486 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.125.4474.pdf}, 6486 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.125.4474.pdf},
6487 author = {Black, John} 6487 author = {Black, John}
6488} 6488}
6489@article {2006_5, 6489@article {2006_5,
@@ -6496,7 +6496,7 @@ In this paper we review SSR's self-organizing features and demonstrate how the c
6496 abstract = {The WAT system, as used in Japan, allows for businesses to issue their own tickets (IOU's) which can circulate as a complementary currency within a community. This paper proposes a variation on that model, where the issuer of a ticket can offer a guarantee, in the form of some goods or services. The difference in value, along with a reasonable acceptance that the issuer is capable of delivering the service or goods, allows for a higher degree of confidence in the ticket, and therefore a greater liquidity}, 6496 abstract = {The WAT system, as used in Japan, allows for businesses to issue their own tickets (IOU's) which can circulate as a complementary currency within a community. This paper proposes a variation on that model, where the issuer of a ticket can offer a guarantee, in the form of some goods or services. The difference in value, along with a reasonable acceptance that the issuer is capable of delivering the service or goods, allows for a higher degree of confidence in the ticket, and therefore a greater liquidity},
6497 www_section = {guarantee, peer-to-peer currencies}, 6497 www_section = {guarantee, peer-to-peer currencies},
6498 issn = {1325-9547}, 6498 issn = {1325-9547},
6499 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IJCCR\%20vol\%2010\%20\%282006\%29\%201\%20Ardron\%20and\%20Lietaer.pdf}, 6499 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IJCCR\%20vol\%2010\%20\%282006\%29\%201\%20Ardron\%20and\%20Lietaer.pdf},
6500 author = {Mitra Ardron and Bernard Lietaer} 6500 author = {Mitra Ardron and Bernard Lietaer}
6501} 6501}
6502@article {ishai2006ca, 6502@article {ishai2006ca,
@@ -6511,7 +6511,7 @@ In this paper we review SSR's self-organizing features and demonstrate how the c
6511 issn = {0272-5428}, 6511 issn = {0272-5428},
6512 doi = {10.1109/FOCS.2006.25}, 6512 doi = {10.1109/FOCS.2006.25},
6513 url = {http://portal.acm.org/citation.cfm?id=1170505}, 6513 url = {http://portal.acm.org/citation.cfm?id=1170505},
6514 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ishai2006ca.pdf}, 6514 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ishai2006ca.pdf},
6515 author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai} 6515 author = {Yuval Ishai and Eyal Kushilevitz and Rafail Ostrovsky and Amit Sahai}
6516} 6516}
6517@conference {Grolimund:2006:CFT:1173705.1174355, 6517@conference {Grolimund:2006:CFT:1173705.1174355,
@@ -6528,7 +6528,7 @@ In this paper we review SSR's self-organizing features and demonstrate how the c
6528 isbn = {0-7695-2677-2}, 6528 isbn = {0-7695-2677-2},
6529 doi = {http://dx.doi.org/10.1109/SRDS.2006.15}, 6529 doi = {http://dx.doi.org/10.1109/SRDS.2006.15},
6530 url = {http://dl.acm.org/citation.cfm?id=1173705.1174355}, 6530 url = {http://dl.acm.org/citation.cfm?id=1173705.1174355},
6531 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SRDS\%2706\%20-\%20Cryptree.pdf}, 6531 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SRDS\%2706\%20-\%20Cryptree.pdf},
6532 author = {Dominik Grolimund and Luzius Meisser and Stefan Schmid and Roger Wattenhofer} 6532 author = {Dominik Grolimund and Luzius Meisser and Stefan Schmid and Roger Wattenhofer}
6533} 6533}
6534@conference {2006_6, 6534@conference {2006_6,
@@ -6537,7 +6537,7 @@ In this paper we review SSR's self-organizing features and demonstrate how the c
6537 year = {2006}, 6537 year = {2006},
6538 month = feb, 6538 month = feb,
6539 www_section = {Curve25519, ECC, ECDH, GNUnet}, 6539 www_section = {Curve25519, ECC, ECDH, GNUnet},
6540 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/curve25519-20060209.pdf}, 6540 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/curve25519-20060209.pdf},
6541 author = {Daniel J. Bernstein} 6541 author = {Daniel J. Bernstein}
6542} 6542}
6543@booklet {200, 6543@booklet {200,
@@ -6549,7 +6549,7 @@ In this paper we review SSR's self-organizing features and demonstrate how the c
6549 abstract = {The robustness of Peer-to-Peer (P2P) networks, in particular of DHT-based overlay networks, suffers significantly when a Sybil attack is performed. We tackle the issue of Sybil attacks from two sides. First, we clarify, analyze, and classify the P2P identifier assignment process. By clearly separating network participants from network nodes, two challenges of P2P networks under a Sybil attack become obvious: i) stability over time, and ii) identity differentiation. Second, as a starting point for a quantitative analysis of time-stability of P2P networks under Sybil attacks and under some assumptions with respect to identity differentiation, we propose an identity registration procedure called self-registration that makes use of the inherent distribution mechanisms of a P2P network}, 6549 abstract = {The robustness of Peer-to-Peer (P2P) networks, in particular of DHT-based overlay networks, suffers significantly when a Sybil attack is performed. We tackle the issue of Sybil attacks from two sides. First, we clarify, analyze, and classify the P2P identifier assignment process. By clearly separating network participants from network nodes, two challenges of P2P networks under a Sybil attack become obvious: i) stability over time, and ii) identity differentiation. Second, as a starting point for a quantitative analysis of time-stability of P2P networks under Sybil attacks and under some assumptions with respect to identity differentiation, we propose an identity registration procedure called self-registration that makes use of the inherent distribution mechanisms of a P2P network},
6550 www_section = {attack, P2P, robustness}, 6550 www_section = {attack, P2P, robustness},
6551 url = {http://dsn.tm.uni-karlsruhe.de/medien/publication-confs/dinger_dasp2p06_sybil.pdf}, 6551 url = {http://dsn.tm.uni-karlsruhe.de/medien/publication-confs/dinger_dasp2p06_sybil.pdf},
6552 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.60.8756.pdf}, 6552 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.60.8756.pdf},
6553 author = {Jochen Dinger and Hannes Hartenstein} 6553 author = {Jochen Dinger and Hannes Hartenstein}
6554} 6554}
6555@book {2006_7, 6555@book {2006_7,
@@ -6577,7 +6577,7 @@ In this paper we review SSR's self-organizing features and demonstrate how the c
6577 www_section = {anonymity measurement, privacy, re-encryption}, 6577 www_section = {anonymity measurement, privacy, re-encryption},
6578 doi = {10.1145/1698750.1698758}, 6578 doi = {10.1145/1698750.1698758},
6579 url = {http://portal.acm.org/citation.cfm?id=1698750.1698758}, 6579 url = {http://portal.acm.org/citation.cfm?id=1698750.1698758},
6580 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Golle-sp2006.pdf}, 6580 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Golle-sp2006.pdf},
6581 author = {Philippe Golle and XiaoFeng Wang and Jakobsson, Markus and Alex Tsow} 6581 author = {Philippe Golle and XiaoFeng Wang and Jakobsson, Markus and Alex Tsow}
6582} 6582}
6583@book {2006_8, 6583@book {2006_8,
@@ -6593,7 +6593,7 @@ In this paper we review SSR's self-organizing features and demonstrate how the c
6593 isbn = {978-3-540-35907-4}, 6593 isbn = {978-3-540-35907-4},
6594 doi = {10.1007/11787006_1}, 6594 doi = {10.1007/11787006_1},
6595 url = {http://dx.doi.org/10.1007/11787006_1}, 6595 url = {http://dx.doi.org/10.1007/11787006_1},
6596 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DifferentialPrivacy2006Dwork_0.pdf}, 6596 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DifferentialPrivacy2006Dwork_0.pdf},
6597 author = {Dwork, Cynthia}, 6597 author = {Dwork, Cynthia},
6598 editor = {Bugliesi, Michele and Preneel, Bart and Sassone, Vladimiro and Wegener, Ingo} 6598 editor = {Bugliesi, Michele and Preneel, Bart and Sassone, Vladimiro and Wegener, Ingo}
6599} 6599}
@@ -6610,7 +6610,7 @@ In this paper we review SSR's self-organizing features and demonstrate how the c
6610 isbn = {1-59593-306-9}, 6610 isbn = {1-59593-306-9},
6611 doi = {10.1145/1143549.1143821}, 6611 doi = {10.1145/1143549.1143821},
6612 url = {http://portal.acm.org/citation.cfm?id=1143821$\#$}, 6612 url = {http://portal.acm.org/citation.cfm?id=1143821$\#$},
6613 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.103.426.pdf}, 6613 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.103.426.pdf},
6614 author = {Wang, Ying-Hong and Chao, Chih-Feng and Lin, Shih-Wei and Chen, Wei-Ting} 6614 author = {Wang, Ying-Hong and Chao, Chih-Feng and Lin, Shih-Wei and Chen, Wei-Ting}
6615} 6615}
6616@mastersthesis {2006_9, 6616@mastersthesis {2006_9,
@@ -6634,7 +6634,7 @@ Several group communication algorithms for structured overlay networks are prese
6634The algorithms have been implemented in a middleware called the Distributed k-ary System (DKS), which is briefly described}, 6634The algorithms have been implemented in a middleware called the Distributed k-ary System (DKS), which is briefly described},
6635 www_section = {distributed hash table, distributed k-ary system, DKS}, 6635 www_section = {distributed hash table, distributed k-ary system, DKS},
6636 url = {http://eprints.sics.se/516/}, 6636 url = {http://eprints.sics.se/516/},
6637 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Ghodsi\%20-\%20Distributed\%20k-ary\%20System.pdf}, 6637 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Ghodsi\%20-\%20Distributed\%20k-ary\%20System.pdf},
6638 author = {Ali Ghodsi} 6638 author = {Ali Ghodsi}
6639} 6639}
6640@conference {AhmedBoutaba2006DistributedPatternMatching, 6640@conference {AhmedBoutaba2006DistributedPatternMatching,
@@ -6660,7 +6660,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6660 abstract = {Theoretical basis for the routing protocol of Freenet 0.7 }, 6660 abstract = {Theoretical basis for the routing protocol of Freenet 0.7 },
6661 www_section = {small-world}, 6661 www_section = {small-world},
6662 url = {http://www.math.chalmers.se/~ossa/wrt.html}, 6662 url = {http://www.math.chalmers.se/~ossa/wrt.html},
6663 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/swroute.pdf}, 6663 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/swroute.pdf},
6664 author = {Sandberg, Oskar} 6664 author = {Sandberg, Oskar}
6665} 6665}
6666@book {2006_10, 6666@book {2006_10,
@@ -6687,7 +6687,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6687 www_section = {ad-hoc networks, anonymity, routing}, 6687 www_section = {ad-hoc networks, anonymity, routing},
6688 doi = {10.1007/978-3-540-71789-8}, 6688 doi = {10.1007/978-3-540-71789-8},
6689 url = {http://www.springerlink.com/content/g6334148068w1254/}, 6689 url = {http://www.springerlink.com/content/g6334148068w1254/},
6690 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.74.1585.pdf}, 6690 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.74.1585.pdf},
6691 author = {Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo} 6691 author = {Sk. Md. Mizanur Rahman and Atsuo Inomata and Takeshi Okamoto and Masahiro Mambo}
6692} 6692}
6693@conference {danezis:weis2006, 6693@conference {danezis:weis2006,
@@ -6698,7 +6698,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6698 address = {Cambridge, UK}, 6698 address = {Cambridge, UK},
6699 abstract = {We present a model of surveillance based on social network theory, where observing one participant also leaks some information about third parties. We examine how many nodes an adversary has to observe in order to extract information about the network, but also how the method for choosing these nodes (target selection) greatly influences the resulting intelligence. Our results provide important insights into the actual security of anonymous communication, and their ability to minimise surveillance and disruption in a social network. They also allow us to draw interesting policy conclusions from published interception figures, and get a better estimate of the amount of privacy invasion and the actual volume of surveillance taking place}, 6699 abstract = {We present a model of surveillance based on social network theory, where observing one participant also leaks some information about third parties. We examine how many nodes an adversary has to observe in order to extract information about the network, but also how the method for choosing these nodes (target selection) greatly influences the resulting intelligence. Our results provide important insights into the actual security of anonymous communication, and their ability to minimise surveillance and disruption in a social network. They also allow us to draw interesting policy conclusions from published interception figures, and get a better estimate of the amount of privacy invasion and the actual volume of surveillance taking place},
6700 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.9384}, 6700 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.9384},
6701 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/danezis-weis2006.pdf}, 6701 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/danezis-weis2006.pdf},
6702 author = {George Danezis and Bettina Wittneben}, 6702 author = {George Danezis and Bettina Wittneben},
6703 editor = {Ross Anderson} 6703 editor = {Ross Anderson}
6704} 6704}
@@ -6732,7 +6732,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6732 isbn = {1-59593-306-9}, 6732 isbn = {1-59593-306-9},
6733 doi = {10.1145/1143549.1143660}, 6733 doi = {10.1145/1143549.1143660},
6734 url = {http://portal.acm.org/citation.cfm?id=1143549.1143660$\#$}, 6734 url = {http://portal.acm.org/citation.cfm?id=1143549.1143660$\#$},
6735 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.61.249.pdf}, 6735 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.61.249.pdf},
6736 author = {Liao, Yong and Tan, Kun and Zhang, Zhensheng and Gao, Lixin} 6736 author = {Liao, Yong and Tan, Kun and Zhang, Zhensheng and Gao, Lixin}
6737} 6737}
6738@article {1217950, 6738@article {1217950,
@@ -6749,7 +6749,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6749 issn = {0163-5980}, 6749 issn = {0163-5980},
6750 doi = {10.1145/1218063.1217950}, 6750 doi = {10.1145/1218063.1217950},
6751 url = {http://portal.acm.org/citation.cfm?id=1218063.1217950$\#$}, 6751 url = {http://portal.acm.org/citation.cfm?id=1218063.1217950$\#$},
6752 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/epost-eurosys2006.pdf}, 6752 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/epost-eurosys2006.pdf},
6753 author = {Mislove, Alan and Post, Ansley and Haeberlen, Andreas and Peter Druschel} 6753 author = {Mislove, Alan and Post, Ansley and Haeberlen, Andreas and Peter Druschel}
6754} 6754}
6755@conference {guha6ess, 6755@conference {guha6ess,
@@ -6762,7 +6762,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6762 abstract = {Despite its popularity, relatively little is known about the traf- fic characteristics of the Skype VoIP system and how they differ from other P2P systems. We describe an experimental study of Skype VoIP traffic conducted over a one month period, where over 30 million datapoints were collected regarding the population of online clients, the number of supernodes, and their traffic characteristics. The results indicate that although the structure of the Skype system appears to be similar to other P2P systems, particularly KaZaA, there are several significant differences in traffic. The number of active clients shows diurnal and work-week behavior, correlating with normal working hours regardless of geography. The population of supernodes in the system tends to be relatively stable; thus node churn, a significant concern in other systems, seems less problematic in Skype. The typical bandwidth load on a supernode is relatively low, even if the supernode is relaying VoIP traffic. The paper aims to aid further understanding of a signifi- cant, successful P2P VoIP system, as well as provide experimental data that may be useful for design and modeling of such systems. These results also imply that the nature of a VoIP P2P system like Skype differs fundamentally from earlier P2P systems that are oriented toward file-sharing, and music and video download applications, and deserves more attention from the research community}, 6762 abstract = {Despite its popularity, relatively little is known about the traf- fic characteristics of the Skype VoIP system and how they differ from other P2P systems. We describe an experimental study of Skype VoIP traffic conducted over a one month period, where over 30 million datapoints were collected regarding the population of online clients, the number of supernodes, and their traffic characteristics. The results indicate that although the structure of the Skype system appears to be similar to other P2P systems, particularly KaZaA, there are several significant differences in traffic. The number of active clients shows diurnal and work-week behavior, correlating with normal working hours regardless of geography. The population of supernodes in the system tends to be relatively stable; thus node churn, a significant concern in other systems, seems less problematic in Skype. The typical bandwidth load on a supernode is relatively low, even if the supernode is relaying VoIP traffic. The paper aims to aid further understanding of a signifi- cant, successful P2P VoIP system, as well as provide experimental data that may be useful for design and modeling of such systems. These results also imply that the nature of a VoIP P2P system like Skype differs fundamentally from earlier P2P systems that are oriented toward file-sharing, and music and video download applications, and deserves more attention from the research community},
6763 www_section = {decentralized, indexing, overlay, P2P, skype, unstructured}, 6763 www_section = {decentralized, indexing, overlay, P2P, skype, unstructured},
6764 url = {http://saikat.guha.cc/pub/iptps06-skype/}, 6764 url = {http://saikat.guha.cc/pub/iptps06-skype/},
6765 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IPTPS\%2706\%20-\%20Skype\%20p2p\%20VoIP\%20System.pdf}, 6765 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IPTPS\%2706\%20-\%20Skype\%20p2p\%20VoIP\%20System.pdf},
6766 author = {Saikat Guha and Daswani, Neil and Jain, Ravi} 6766 author = {Saikat Guha and Daswani, Neil and Jain, Ravi}
6767} 6767}
6768@conference {Saito:2006:FTI:1130897.1131000_0, 6768@conference {Saito:2006:FTI:1130897.1131000_0,
@@ -6779,7 +6779,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6779 isbn = {0-7695-2567-9}, 6779 isbn = {0-7695-2567-9},
6780 doi = {10.1109/ARES.2006.62}, 6780 doi = {10.1109/ARES.2006.62},
6781 url = {http://dl.acm.org/citation.cfm?id=1130897.1131000}, 6781 url = {http://dl.acm.org/citation.cfm?id=1130897.1131000},
6782 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ARES\%2706\%20-\%20Fair\%20Trading\%20of\%20Information.pdf}, 6782 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ARES\%2706\%20-\%20Fair\%20Trading\%20of\%20Information.pdf},
6783 author = {Saito, Kenji and Morino, Eiichi and Murai, Jun} 6783 author = {Saito, Kenji and Morino, Eiichi and Murai, Jun}
6784} 6784}
6785@conference {Saito:2006:FTI:1130897.1131000, 6785@conference {Saito:2006:FTI:1130897.1131000,
@@ -6795,7 +6795,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6795 isbn = {0-7695-2567-9}, 6795 isbn = {0-7695-2567-9},
6796 doi = {10.1109/ARES.2006.62}, 6796 doi = {10.1109/ARES.2006.62},
6797 url = {http://dl.acm.org/citation.cfm?id=1130897.1131000}, 6797 url = {http://dl.acm.org/citation.cfm?id=1130897.1131000},
6798 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ARES\%2706\%20-\%20Fair\%20Trading\%20of\%20Information.pdf}, 6798 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ARES\%2706\%20-\%20Fair\%20Trading\%20of\%20Information.pdf},
6799 author = {Saito, Kenji and Morino, Eiichi and Murai, Jun} 6799 author = {Saito, Kenji and Morino, Eiichi and Murai, Jun}
6800} 6800}
6801@article {1217937, 6801@article {1217937,
@@ -6811,7 +6811,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6811 issn = {0163-5980}, 6811 issn = {0163-5980},
6812 doi = {10.1145/1218063.1217937}, 6812 doi = {10.1145/1218063.1217937},
6813 url = {http://portal.acm.org/citation.cfm?id=1218063.1217937$\#$}, 6813 url = {http://portal.acm.org/citation.cfm?id=1218063.1217937$\#$},
6814 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Fireflies.pdf}, 6814 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Fireflies.pdf},
6815 author = {H{\r a}vard Johansen and Allavena, Andr{\'e} and Robbert Van Renesse} 6815 author = {H{\r a}vard Johansen and Allavena, Andr{\'e} and Robbert Van Renesse}
6816} 6816}
6817@conference {Locher06freeriding, 6817@conference {Locher06freeriding,
@@ -6821,7 +6821,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6821 abstract = {While it is well-known that BitTorrent is vulnerable to selfish behavior, this paper demonstrates that even entire files can be downloaded without reciprocating at all in BitTorrent. To this end, we present BitThief, a free riding client that never contributes any real data. First, we show that simple tricks suffice in order to achieve high download rates, even in the absence of seeders. We also illustrate how peers in a swarm react to various sophisticated attacks. Moreover, our analysis reveals that sharing communities{\textemdash}communities originally intended to offer downloads of good quality and to promote cooperation among peers{\textemdash}provide many incentives to cheat}, 6821 abstract = {While it is well-known that BitTorrent is vulnerable to selfish behavior, this paper demonstrates that even entire files can be downloaded without reciprocating at all in BitTorrent. To this end, we present BitThief, a free riding client that never contributes any real data. First, we show that simple tricks suffice in order to achieve high download rates, even in the absence of seeders. We also illustrate how peers in a swarm react to various sophisticated attacks. Moreover, our analysis reveals that sharing communities{\textemdash}communities originally intended to offer downloads of good quality and to promote cooperation among peers{\textemdash}provide many incentives to cheat},
6822 www_section = {BitTorrent}, 6822 www_section = {BitTorrent},
6823 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.67.9307}, 6823 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.67.9307},
6824 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.67.9307.pdf}, 6824 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.67.9307.pdf},
6825 author = {Thomas Locher and Patrick Moor and Stefan Schmid and Roger Wattenhofer} 6825 author = {Thomas Locher and Patrick Moor and Stefan Schmid and Roger Wattenhofer}
6826} 6826}
6827@conference {Grolimund06havelaar:a, 6827@conference {Grolimund06havelaar:a,
@@ -6832,7 +6832,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6832 address = {Ann Arbor, Michigan}, 6832 address = {Ann Arbor, Michigan},
6833 abstract = {Peer-to-peer (p2p) systems have the potential to harness huge amounts of resources. Unfortunately, however, it has been shown that most of today's p2p networks suffer from a large fraction of free-riders, which mostly consume resources without contributing much to the system themselves. This results in an overall performance degradation. One particularly interesting resource is bandwidth. Thereby, a service differentiation approach seems appropriate, where peers contributing higher upload bandwidth are rewarded with higher download bandwidth in return. Keeping track of the contribution of each peer in an open, decentralized environment, however, is not trivial; many systems which have been proposed are susceptible to false reports. Besides being prone to attacks, some solutions have a large communication and computation overhead, which can even be linear in the number of transactions{\textemdash}an unacceptable burden in practical and active systems. In this paper, we propose a reputation system which overcomes this scaling problem. Our analytical and simulation results are promising, indicating that the mechanism is accurate and efficient, especially when applied to systems where there are lots of transactions (e.g., due to erasure coding)}, 6833 abstract = {Peer-to-peer (p2p) systems have the potential to harness huge amounts of resources. Unfortunately, however, it has been shown that most of today's p2p networks suffer from a large fraction of free-riders, which mostly consume resources without contributing much to the system themselves. This results in an overall performance degradation. One particularly interesting resource is bandwidth. Thereby, a service differentiation approach seems appropriate, where peers contributing higher upload bandwidth are rewarded with higher download bandwidth in return. Keeping track of the contribution of each peer in an open, decentralized environment, however, is not trivial; many systems which have been proposed are susceptible to false reports. Besides being prone to attacks, some solutions have a large communication and computation overhead, which can even be linear in the number of transactions{\textemdash}an unacceptable burden in practical and active systems. In this paper, we propose a reputation system which overcomes this scaling problem. Our analytical and simulation results are promising, indicating that the mechanism is accurate and efficient, especially when applied to systems where there are lots of transactions (e.g., due to erasure coding)},
6834 www_section = {free-riding, harvelaar, P2P, peer-to-peer networking, performance degradation, reputation system}, 6834 www_section = {free-riding, harvelaar, P2P, peer-to-peer networking, performance degradation, reputation system},
6835 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NetEcon\%2706\%20-\%20Harvelaar.pdf}, 6835 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NetEcon\%2706\%20-\%20Harvelaar.pdf},
6836 author = {Dominik Grolimund and Luzius Meisser and Stefan Schmid and Roger Wattenhofer} 6836 author = {Dominik Grolimund and Luzius Meisser and Stefan Schmid and Roger Wattenhofer}
6837} 6837}
6838@conference {HotOrNot, 6838@conference {HotOrNot,
@@ -6847,7 +6847,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6847 isbn = {1-59593-518-5}, 6847 isbn = {1-59593-518-5},
6848 doi = {10.1145/1180405.1180410}, 6848 doi = {10.1145/1180405.1180410},
6849 url = {http://portal.acm.org/citation.cfm?id=1180410}, 6849 url = {http://portal.acm.org/citation.cfm?id=1180410},
6850 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/HotOrNot.pdf}, 6850 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/HotOrNot.pdf},
6851 author = {Steven J. Murdoch} 6851 author = {Steven J. Murdoch}
6852} 6852}
6853@conference {clonewars, 6853@conference {clonewars,
@@ -6863,7 +6863,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6863 isbn = {1-59593-518-5}, 6863 isbn = {1-59593-518-5},
6864 doi = {10.1145/1180405.1180431}, 6864 doi = {10.1145/1180405.1180431},
6865 url = {http://portal.acm.org/citation.cfm?id=1180431}, 6865 url = {http://portal.acm.org/citation.cfm?id=1180431},
6866 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/clonewars.pdf}, 6866 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/clonewars.pdf},
6867 author = {Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya and Mira Meyerovich} 6867 author = {Jan Camenisch and Susan Hohenberger and Markulf Kohlweiss and Anna Lysyanskaya and Mira Meyerovich}
6868} 6868}
6869@conference {1157518, 6869@conference {1157518,
@@ -6879,7 +6879,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6879 isbn = {0-7695-2612-8}, 6879 isbn = {0-7695-2612-8},
6880 doi = {10.1109/ICPADS.2006.52}, 6880 doi = {10.1109/ICPADS.2006.52},
6881 url = {http://portal.acm.org/citation.cfm?id=1156431.1157518$\#$}, 6881 url = {http://portal.acm.org/citation.cfm?id=1156431.1157518$\#$},
6882 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.94.4826.pdf}, 6882 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.94.4826.pdf},
6883 author = {Morcos, Faruck and Chantem, Thidapat and Little, Philip and Gasiba, Tiago and Thain, Douglas} 6883 author = {Morcos, Faruck and Chantem, Thidapat and Little, Philip and Gasiba, Tiago and Thain, Douglas}
6884} 6884}
6885@conference {clayton:pet2006, 6885@conference {clayton:pet2006,
@@ -6895,7 +6895,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6895 isbn = {978-3-540-68790-0}, 6895 isbn = {978-3-540-68790-0},
6896 doi = {10.1007/11957454}, 6896 doi = {10.1007/11957454},
6897 url = {http://www.springerlink.com/content/7224582654260k03/}, 6897 url = {http://www.springerlink.com/content/7224582654260k03/},
6898 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/clayton-pet2006.pdf}, 6898 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/clayton-pet2006.pdf},
6899 author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson}, 6899 author = {Richard Clayton and Steven J. Murdoch and Robert N. M. Watson},
6900 editor = {George Danezis and Philippe Golle} 6900 editor = {George Danezis and Philippe Golle}
6901} 6901}
@@ -6909,7 +6909,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6909 isbn = {83-915141-7-X}, 6909 isbn = {83-915141-7-X},
6910 affiliation = {University of Karlsruhe, Germany}, 6910 affiliation = {University of Karlsruhe, Germany},
6911 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.1091}, 6911 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.1091},
6912 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/kutzner06igor.pdf}, 6912 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/kutzner06igor.pdf},
6913 author = {Kendy Kutzner and Thomas Fuhrmann} 6913 author = {Kendy Kutzner and Thomas Fuhrmann}
6914} 6914}
6915@conference {conf/infocom/StutzbachR06, 6915@conference {conf/infocom/StutzbachR06,
@@ -6921,7 +6921,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6921 abstract = {During recent years, Distributed Hash Tables (DHTs) have been extensively studied through simulation and analysis. However, due to their limited deployment, it has not been possible to observe the behavior of a widely-deployed DHT in practice. Recently, the popular eMule file-sharing software incorporated a Kademlia-based DHT, called Kad, which currently has around one million simultaneous users. In this paper, we empirically study the performance of the key DHT operation, lookup, over Kad. First, we analytically derive the benefits of different ways to increase the richness of routing tables in Kademlia-based DHTs. Second, we empirically characterize two aspects of the accuracy of routing tables in Kad, namely completeness and freshness, and characterize their impact on Kad's lookup performance. Finally, we investigate how the efficiency and consistency of lookup in Kad can be improved by performing parallel lookup and maintaining multiple replicas, respectively. Our results pinpoint the best operating point for the degree of lookup parallelism and the degree of replication for Kad}, 6921 abstract = {During recent years, Distributed Hash Tables (DHTs) have been extensively studied through simulation and analysis. However, due to their limited deployment, it has not been possible to observe the behavior of a widely-deployed DHT in practice. Recently, the popular eMule file-sharing software incorporated a Kademlia-based DHT, called Kad, which currently has around one million simultaneous users. In this paper, we empirically study the performance of the key DHT operation, lookup, over Kad. First, we analytically derive the benefits of different ways to increase the richness of routing tables in Kademlia-based DHTs. Second, we empirically characterize two aspects of the accuracy of routing tables in Kad, namely completeness and freshness, and characterize their impact on Kad's lookup performance. Finally, we investigate how the efficiency and consistency of lookup in Kad can be improved by performing parallel lookup and maintaining multiple replicas, respectively. Our results pinpoint the best operating point for the degree of lookup parallelism and the degree of replication for Kad},
6922 www_section = {distributed hash table, redundancy}, 6922 www_section = {distributed hash table, redundancy},
6923 url = {http://dblp.uni-trier.de/db/conf/infocom/infocom2006.html$\#$StutzbachR06}, 6923 url = {http://dblp.uni-trier.de/db/conf/infocom/infocom2006.html$\#$StutzbachR06},
6924 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/infocom06-kad.pdf}, 6924 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/infocom06-kad.pdf},
6925 author = {Stutzbach, Daniel and Rejaie, Reza} 6925 author = {Stutzbach, Daniel and Rejaie, Reza}
6926} 6926}
6927@conference {Pai06improvingrobustness, 6927@conference {Pai06improvingrobustness,
@@ -6934,7 +6934,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6934 address = {Ann Arbor, Michigan, USA}, 6934 address = {Ann Arbor, Michigan, USA},
6935 abstract = {In this paper we argue that a robust incentive mechanism is important in a real-world peer-to-peer streaming system to ensure that nodes contribute as much upload bandwidth as they can. We show that simple tit-for-tat mechanisms which work well in file-sharing systems like BitTorrent do not perform well given the additional delay and bandwidth constraints imposed by live streaming. We present preliminary experimental results for an incentive mechanism based on the Iterated Prisoner's Dilemma problem that allows all nodes to download with low packet loss when there is sufficient capacity in the system, but when the system is resource-starved, nodes that contribute upload bandwidth receive better service than those that do not. Moreover, our algorithm does not require nodes to rely on any information other than direct observations of its neighbors ' behavior towards it }, 6935 abstract = {In this paper we argue that a robust incentive mechanism is important in a real-world peer-to-peer streaming system to ensure that nodes contribute as much upload bandwidth as they can. We show that simple tit-for-tat mechanisms which work well in file-sharing systems like BitTorrent do not perform well given the additional delay and bandwidth constraints imposed by live streaming. We present preliminary experimental results for an incentive mechanism based on the Iterated Prisoner's Dilemma problem that allows all nodes to download with low packet loss when there is sufficient capacity in the system, but when the system is resource-starved, nodes that contribute upload bandwidth receive better service than those that do not. Moreover, our algorithm does not require nodes to rely on any information other than direct observations of its neighbors ' behavior towards it },
6936 www_section = {peer-to-peer streaming, tit-for-tat}, 6936 www_section = {peer-to-peer streaming, tit-for-tat},
6937 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NetEcon\%2706\%20-\%20Improving\%20robustness\%20of\%20p2p\%20streaming.pdf}, 6937 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NetEcon\%2706\%20-\%20Improving\%20robustness\%20of\%20p2p\%20streaming.pdf},
6938 author = {Vinay Pai and Alexander E. Mohr} 6938 author = {Vinay Pai and Alexander E. Mohr}
6939} 6939}
6940@conference {ciaccio:pet2006, 6940@conference {ciaccio:pet2006,
@@ -6951,7 +6951,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6951 isbn = {978-3-540-68790-0}, 6951 isbn = {978-3-540-68790-0},
6952 doi = {10.1007/11957454}, 6952 doi = {10.1007/11957454},
6953 url = {http://www.springerlink.com/content/v473127846n07255/}, 6953 url = {http://www.springerlink.com/content/v473127846n07255/},
6954 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ciaccio-pet2006.pdf}, 6954 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ciaccio-pet2006.pdf},
6955 author = {Giuseppe Ciaccio}, 6955 author = {Giuseppe Ciaccio},
6956 editor = {George Danezis and Philippe Golle} 6956 editor = {George Danezis and Philippe Golle}
6957} 6957}
@@ -6969,7 +6969,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6969 isbn = { 0-7695-2540-7}, 6969 isbn = { 0-7695-2540-7},
6970 issn = {1063-6927}, 6970 issn = {1063-6927},
6971 doi = {10.1109/ICDCS.2006.48 }, 6971 doi = {10.1109/ICDCS.2006.48 },
6972 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ICDCS\%2706\%20-\%20Improving\%20traffic\%20locality\%20in\%20BitTorrent.pdf}, 6972 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ICDCS\%2706\%20-\%20Improving\%20traffic\%20locality\%20in\%20BitTorrent.pdf},
6973 author = {Ruchir Bindal and Pei Cao and William Chan and Jan Medved and George Suwala and Tony Bates and Amy Zhang} 6973 author = {Ruchir Bindal and Pei Cao and William Chan and Jan Medved and George Suwala and Tony Bates and Amy Zhang}
6974} 6974}
6975@conference {Feigenbaum:2006:IIR:1134707.1134722, 6975@conference {Feigenbaum:2006:IIR:1134707.1134722,
@@ -6987,7 +6987,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6987 isbn = {1-59593-236-4}, 6987 isbn = {1-59593-236-4},
6988 doi = {http://doi.acm.org/10.1145/1134707.1134722}, 6988 doi = {http://doi.acm.org/10.1145/1134707.1134722},
6989 url = {http://doi.acm.org/10.1145/1134707.1134722}, 6989 url = {http://doi.acm.org/10.1145/1134707.1134722},
6990 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EC\%2706\%20-\%20Incentive-compatible\%20interdomain\%20routing.pdf}, 6990 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EC\%2706\%20-\%20Incentive-compatible\%20interdomain\%20routing.pdf},
6991 author = {Feigenbaum, Joan and Ramachandran, Vijay and Schapira, Michael} 6991 author = {Feigenbaum, Joan and Ramachandran, Vijay and Schapira, Michael}
6992} 6992}
6993@article {DBLP:journals/corr/abs-cs-0611016, 6993@article {DBLP:journals/corr/abs-cs-0611016,
@@ -6997,7 +6997,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
6997 year = {2006}, 6997 year = {2006},
6998 abstract = {Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact list back. To avoid data loss when losing or destroying a mobile device like a PDA or a cell phone, data is usually backed-up to a fixed station. However, in the time between the last backup and the failure, important data can have been produced and then lost. To handle this issue, we propose a transparent collaborative backup system. Indeed, by saving data on other mobile devices between two connections to a global infrastructure, we can resist to such scenarios. In this paper, after a general description of such a system, we present a way to replicate data on mobile devices to attain a prerequired resilience for the backup}, 6998 abstract = {Whoever has had his cell phone stolen knows how frustrating it is to be unable to get his contact list back. To avoid data loss when losing or destroying a mobile device like a PDA or a cell phone, data is usually backed-up to a fixed station. However, in the time between the last backup and the failure, important data can have been produced and then lost. To handle this issue, we propose a transparent collaborative backup system. Indeed, by saving data on other mobile devices between two connections to a global infrastructure, we can resist to such scenarios. In this paper, after a general description of such a system, we present a way to replicate data on mobile devices to attain a prerequired resilience for the backup},
6999 url = {http://www.pubzone.org/dblp/journals/corr/abs-cs-0611016}, 6999 url = {http://www.pubzone.org/dblp/journals/corr/abs-cs-0611016},
7000 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/0611016v1.pdf}, 7000 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/0611016v1.pdf},
7001 author = {Damien Martin-Guillerez and Michel Ban{\^a}tre and Paul Couderc} 7001 author = {Damien Martin-Guillerez and Michel Ban{\^a}tre and Paul Couderc}
7002} 7002}
7003@article {WrightMM06, 7003@article {WrightMM06,
@@ -7012,7 +7012,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7012 www_section = {hidden Markov models, traffic classification}, 7012 www_section = {hidden Markov models, traffic classification},
7013 issn = {1533-7928}, 7013 issn = {1533-7928},
7014 url = {http://portal.acm.org/citation.cfm?id=1248647}, 7014 url = {http://portal.acm.org/citation.cfm?id=1248647},
7015 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WrightMM06.pdf}, 7015 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WrightMM06.pdf},
7016 author = {Charles Wright and Fabian Monrose and Gerald M. Masson} 7016 author = {Charles Wright and Fabian Monrose and Gerald M. Masson}
7017} 7017}
7018@conference {Liberatore:2006, 7018@conference {Liberatore:2006,
@@ -7028,7 +7028,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7028 isbn = {1-59593-518-5}, 7028 isbn = {1-59593-518-5},
7029 doi = {10.1145/1180405.1180437}, 7029 doi = {10.1145/1180405.1180437},
7030 url = {http://portal.acm.org/citation.cfm?id=1180437}, 7030 url = {http://portal.acm.org/citation.cfm?id=1180437},
7031 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Liberatore-2006.pdf}, 7031 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Liberatore-2006.pdf},
7032 author = {Marc Liberatore and Brian Neil Levine} 7032 author = {Marc Liberatore and Brian Neil Levine}
7033} 7033}
7034@mastersthesis {Saito:2004:MTP:968884.969522, 7034@mastersthesis {Saito:2004:MTP:968884.969522,
@@ -7041,7 +7041,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7041 address = {Washington, DC, USA}, 7041 address = {Washington, DC, USA},
7042 keywords = {i-WAT, OpenPGP, WAT system}, 7042 keywords = {i-WAT, OpenPGP, WAT system},
7043 url = {http://www.sfc.wide.ad.jp/dissertation/ks91_e.html}, 7043 url = {http://www.sfc.wide.ad.jp/dissertation/ks91_e.html},
7044 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Saito\%20-\%20i-WAT\%20Dissertation.pdf}, 7044 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Saito\%20-\%20i-WAT\%20Dissertation.pdf},
7045 author = {Saito, Kenji} 7045 author = {Saito, Kenji}
7046} 7046}
7047@book {2006_12, 7047@book {2006_12,
@@ -7057,7 +7057,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7057 isbn = {978-3-540-38875-3}, 7057 isbn = {978-3-540-38875-3},
7058 doi = {10.1007/11841036_42}, 7058 doi = {10.1007/11841036_42},
7059 url = {http://dx.doi.org/10.1007/11841036_42}, 7059 url = {http://dx.doi.org/10.1007/11841036_42},
7060 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/LessHashing2006Kirsch.pdf}, 7060 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/LessHashing2006Kirsch.pdf},
7061 author = {Kirsch, Adam and Mitzenmacher, Michael}, 7061 author = {Kirsch, Adam and Mitzenmacher, Michael},
7062 editor = {Azar, Yossi and Erlebach, Thomas} 7062 editor = {Azar, Yossi and Erlebach, Thomas}
7063} 7063}
@@ -7075,7 +7075,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7075 isbn = {978-3-540-68790-0}, 7075 isbn = {978-3-540-68790-0},
7076 doi = {10.1007/11957454}, 7076 doi = {10.1007/11957454},
7077 url = {http://www.springerlink.com/content/y6l6412387663581/}, 7077 url = {http://www.springerlink.com/content/y6l6412387663581/},
7078 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cview-pet2006.pdf}, 7078 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cview-pet2006.pdf},
7079 author = {Andreas Pashalidis and Bernd Meyer}, 7079 author = {Andreas Pashalidis and Bernd Meyer},
7080 editor = {George Danezis and Philippe Golle} 7080 editor = {George Danezis and Philippe Golle}
7081} 7081}
@@ -7089,7 +7089,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7089 www_section = {scalable source routing}, 7089 www_section = {scalable source routing},
7090 isbn = {1-4244-0054-6}, 7090 isbn = {1-4244-0054-6},
7091 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 7091 url = {http://i30www.ira.uka.de/research/publications/p2p/},
7092 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/di06linyphi.pdf}, 7092 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/di06linyphi.pdf},
7093 author = {Di, Pengfei and Massimiliano Marcon and Thomas Fuhrmann} 7093 author = {Di, Pengfei and Massimiliano Marcon and Thomas Fuhrmann}
7094} 7094}
7095@conference {hs-attack06, 7095@conference {hs-attack06,
@@ -7104,7 +7104,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7104 isbn = {0-7695-2574-1}, 7104 isbn = {0-7695-2574-1},
7105 doi = {10.1109/SP.2006.24}, 7105 doi = {10.1109/SP.2006.24},
7106 url = {http://portal.acm.org/citation.cfm?id=1130366}, 7106 url = {http://portal.acm.org/citation.cfm?id=1130366},
7107 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/hs-attack06.pdf}, 7107 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/hs-attack06.pdf},
7108 author = {Lasse {\O}verlier and Paul Syverson} 7108 author = {Lasse {\O}verlier and Paul Syverson}
7109} 7109}
7110@conference {icdcs2006:m2, 7110@conference {icdcs2006:m2,
@@ -7117,7 +7117,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7117 isbn = {0-7695-2540-7 }, 7117 isbn = {0-7695-2540-7 },
7118 doi = {10.1109/ICDCS.2006.53 }, 7118 doi = {10.1109/ICDCS.2006.53 },
7119 url = {http://ieeexplore.ieee.org/Xplore/login.jsp?url=http\%3A\%2F\%2Fieeexplore.ieee.org\%2Fiel5\%2F10967\%2F34569\%2F01648846.pdf\%3Ftp\%3D\%26isnumber\%3D\%26arnumber\%3D1648846\&authDecision=-203}, 7119 url = {http://ieeexplore.ieee.org/Xplore/login.jsp?url=http\%3A\%2F\%2Fieeexplore.ieee.org\%2Fiel5\%2F10967\%2F34569\%2F01648846.pdf\%3Ftp\%3D\%26isnumber\%3D\%26arnumber\%3D1648846\&authDecision=-203},
7120 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/icdcs2006-m2.pdf}, 7120 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/icdcs2006-m2.pdf},
7121 author = {Ginger Perng and Michael K. Reiter and Chenxi Wang} 7121 author = {Ginger Perng and Michael K. Reiter and Chenxi Wang}
7122} 7122}
7123@conference {ShWa-Relationship, 7123@conference {ShWa-Relationship,
@@ -7132,7 +7132,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7132 isbn = {1-59593-556-8}, 7132 isbn = {1-59593-556-8},
7133 doi = {10.1145/1179601.1179611}, 7133 doi = {10.1145/1179601.1179611},
7134 url = {http://portal.acm.org/citation.cfm?id=1179611}, 7134 url = {http://portal.acm.org/citation.cfm?id=1179611},
7135 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ShWa-Relationship.pdf}, 7135 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ShWa-Relationship.pdf},
7136 author = {Vitaly Shmatikov and Ming-Hsui Wang} 7136 author = {Vitaly Shmatikov and Ming-Hsui Wang}
7137} 7137}
7138@article {Godfrey:2006:MCD:1151659.1159931, 7138@article {Godfrey:2006:MCD:1151659.1159931,
@@ -7149,7 +7149,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7149 issn = {0146-4833}, 7149 issn = {0146-4833},
7150 doi = {http://doi.acm.org/10.1145/1151659.1159931}, 7150 doi = {http://doi.acm.org/10.1145/1151659.1159931},
7151 url = {http://doi.acm.org/10.1145/1151659.1159931}, 7151 url = {http://doi.acm.org/10.1145/1151659.1159931},
7152 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%20Comp.\%20Comm.\%20Rev.\%20-\%20Minimizing\%20churn\%20in\%20distributed\%20systems.pdf}, 7152 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%20Comp.\%20Comm.\%20Rev.\%20-\%20Minimizing\%20churn\%20in\%20distributed\%20systems.pdf},
7153 author = {Godfrey, Brighten and S Shenker and Ion Stoica} 7153 author = {Godfrey, Brighten and S Shenker and Ion Stoica}
7154} 7154}
7155@booklet {Stefansson06myriadstore, 7155@booklet {Stefansson06myriadstore,
@@ -7158,7 +7158,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7158 abstract = {Traditional backup methods are error prone, cumbersome and expensive. Distributed backup applications have emerged as promising tools able to avoid these disadvantages, by exploiting unused disk space of remote computers. In this paper we propose MyriadStore, a distributed peer-to-peer backup system. MyriadStore makes use of a trading scheme that ensures that a user has as much available storage space in the system as the one he/she contributes to it. A mechanism for making challenges between the system's nodes ensures that this restriction is fulfilled. Furthermore, MyriadStore minimizes bandwidth requirements and migration costs by treating separately the storage of the system's meta-data and the storage of the backed up data. This approach also offers great flexibility on the placement of the backed up data, a property that facilitates the deployment of the trading scheme}, 7158 abstract = {Traditional backup methods are error prone, cumbersome and expensive. Distributed backup applications have emerged as promising tools able to avoid these disadvantages, by exploiting unused disk space of remote computers. In this paper we propose MyriadStore, a distributed peer-to-peer backup system. MyriadStore makes use of a trading scheme that ensures that a user has as much available storage space in the system as the one he/she contributes to it. A mechanism for making challenges between the system's nodes ensures that this restriction is fulfilled. Furthermore, MyriadStore minimizes bandwidth requirements and migration costs by treating separately the storage of the system's meta-data and the storage of the backed up data. This approach also offers great flexibility on the placement of the backed up data, a property that facilitates the deployment of the trading scheme},
7159 www_section = {backup, P2P}, 7159 www_section = {backup, P2P},
7160 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.6985}, 7160 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.6985},
7161 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.126.5915.pdf}, 7161 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.126.5915.pdf},
7162 author = {Birgir Stefansson and Antonios Thodis and Ali Ghodsi and Seif Haridi} 7162 author = {Birgir Stefansson and Antonios Thodis and Ali Ghodsi and Seif Haridi}
7163} 7163}
7164@article {Fragouli:2006:NCI:1111322.1111337, 7164@article {Fragouli:2006:NCI:1111322.1111337,
@@ -7175,7 +7175,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7175 issn = {0146-4833}, 7175 issn = {0146-4833},
7176 doi = {http://doi.acm.org/10.1145/1111322.1111337}, 7176 doi = {http://doi.acm.org/10.1145/1111322.1111337},
7177 url = {http://doi.acm.org/10.1145/1111322.1111337}, 7177 url = {http://doi.acm.org/10.1145/1111322.1111337},
7178 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%20Comput.\%20Commun.\%20Rev\%20-\%20Network\%20Coding\%3A\%20an\%20Instant\%20Primer.pdf}, 7178 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%20Comput.\%20Commun.\%20Rev\%20-\%20Network\%20Coding\%3A\%20an\%20Instant\%20Primer.pdf},
7179 author = {Fragouli, Christina and Jean-Yves Le Boudec and J{\"o}rg Widmer} 7179 author = {Fragouli, Christina and Jean-Yves Le Boudec and J{\"o}rg Widmer}
7180} 7180}
7181@conference {wpes06:heydt-benjamin, 7181@conference {wpes06:heydt-benjamin,
@@ -7191,7 +7191,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7191 isbn = {1-59593-556-8}, 7191 isbn = {1-59593-556-8},
7192 doi = {10.1145/1179601.1179603 }, 7192 doi = {10.1145/1179601.1179603 },
7193 url = {http://portal.acm.org/citation.cfm?id=1179601.1179603}, 7193 url = {http://portal.acm.org/citation.cfm?id=1179601.1179603},
7194 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/wpes06-heydt-benjamin.pdf}, 7194 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/wpes06-heydt-benjamin.pdf},
7195 author = {Andrei Serjantov and Benessa Defend} 7195 author = {Andrei Serjantov and Benessa Defend}
7196} 7196}
7197@conference {Tati06onobject, 7197@conference {Tati06onobject,
@@ -7202,7 +7202,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7202 address = {Santa Barbara, CA, USA}, 7202 address = {Santa Barbara, CA, USA},
7203 abstract = {This paper, we revisit object maintenance in peer-to-peer systems, focusing on how temporary and permanent churn impact the overheads associated with object maintenance. We have a number of goals: to highlight how different environments exhibit different degrees of temporary and permanent churn; to provide further insight into how churn in different environments affects the tuning of object maintenance strategies; and to examinehow object maintenance and churn interact with other constraints such as storage capacity. When possible, we highlight behavior independent of particular object maintenance strategies. When an issue depends on a particular strategy, though, we explore it in the context of a strategy in essence similar to TotalRecall, which uses erasure coding, lazy repair of data blocks, and random indirect placement (we also assume that repairs incorporate remaining blocks rather than regenerating redundancy from scratch)}, 7203 abstract = {This paper, we revisit object maintenance in peer-to-peer systems, focusing on how temporary and permanent churn impact the overheads associated with object maintenance. We have a number of goals: to highlight how different environments exhibit different degrees of temporary and permanent churn; to provide further insight into how churn in different environments affects the tuning of object maintenance strategies; and to examinehow object maintenance and churn interact with other constraints such as storage capacity. When possible, we highlight behavior independent of particular object maintenance strategies. When an issue depends on a particular strategy, though, we explore it in the context of a strategy in essence similar to TotalRecall, which uses erasure coding, lazy repair of data blocks, and random indirect placement (we also assume that repairs incorporate remaining blocks rather than regenerating redundancy from scratch)},
7204 www_section = {churn, P2P, peer-to-peer networking}, 7204 www_section = {churn, P2P, peer-to-peer networking},
7205 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IPTPS\%2706\%20-\%20On\%20object\%20maintenance\%20in\%20p2p\%20systems.pdf}, 7205 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IPTPS\%2706\%20-\%20On\%20object\%20maintenance\%20in\%20p2p\%20systems.pdf},
7206 author = {Kiran Tati and Geoffrey M. Voelker} 7206 author = {Kiran Tati and Geoffrey M. Voelker}
7207} 7207}
7208@conference {1128335, 7208@conference {1128335,
@@ -7217,7 +7217,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7217 isbn = {0-7695-2518-0}, 7217 isbn = {0-7695-2518-0},
7218 doi = {10.1109/PERCOM.2006.40}, 7218 doi = {10.1109/PERCOM.2006.40},
7219 url = {http://portal.acm.org/citation.cfm?id=1128335$\#$}, 7219 url = {http://portal.acm.org/citation.cfm?id=1128335$\#$},
7220 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.96.4283.pdf}, 7220 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.96.4283.pdf},
7221 author = {Alexandros Karypidis and Spyros Lalis} 7221 author = {Alexandros Karypidis and Spyros Lalis}
7222} 7222}
7223@conference {Fitzi:2006:OEM:1146381.1146407, 7223@conference {Fitzi:2006:OEM:1146381.1146407,
@@ -7233,7 +7233,7 @@ The algorithms have been implemented in a middleware called the Distributed k-ar
7233 isbn = {1-59593-384-0}, 7233 isbn = {1-59593-384-0},
7234 doi = {10.1145/1146381.1146407}, 7234 doi = {10.1145/1146381.1146407},
7235 url = {http://doi.acm.org/10.1145/1146381.1146407}, 7235 url = {http://doi.acm.org/10.1145/1146381.1146407},
7236 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/FitHir06.pdf}, 7236 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/FitHir06.pdf},
7237 author = {Fitzi, Matthias and Hirt, Martin} 7237 author = {Fitzi, Matthias and Hirt, Martin}
7238} 7238}
7239@conference {2006_13, 7239@conference {2006_13,
@@ -7251,7 +7251,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7251 isbn = {3-540-34546-9, 978-3-540-34546-6}, 7251 isbn = {3-540-34546-9, 978-3-540-34546-6},
7252 doi = {10.1007/11761679_29}, 7252 doi = {10.1007/11761679_29},
7253 url = {http://dx.doi.org/10.1007/11761679_29}, 7253 url = {http://dx.doi.org/10.1007/11761679_29},
7254 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/OurData2006Dwork.pdf}, 7254 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/OurData2006Dwork.pdf},
7255 author = {Dwork, Cynthia and Kenthapadi, Krishnaram and McSherry, Frank and Mironov, Ilya and Naor, Moni} 7255 author = {Dwork, Cynthia and Kenthapadi, Krishnaram and McSherry, Frank and Mironov, Ilya and Naor, Moni}
7256} 7256}
7257@booklet {Aad06packetcoding, 7257@booklet {Aad06packetcoding,
@@ -7260,7 +7260,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7260 abstract = {Several techniques to improve anonymity have been proposed in the literature. They rely basically on multicast or on onion routing to thwart global attackers or local attackers respectively. None of the techniques provide a combined solution due to the incompatibility between the two components, as we show in this paper. We propose novel packet coding techniques that make the combination possible, thus integrating the advantages in a more complete and robust solution}, 7260 abstract = {Several techniques to improve anonymity have been proposed in the literature. They rely basically on multicast or on onion routing to thwart global attackers or local attackers respectively. None of the techniques provide a combined solution due to the incompatibility between the two components, as we show in this paper. We propose novel packet coding techniques that make the combination possible, thus integrating the advantages in a more complete and robust solution},
7261 www_section = {anonymity, onion routing, robustness}, 7261 www_section = {anonymity, onion routing, robustness},
7262 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.2407}, 7262 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.88.2407},
7263 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.88.2407_0.pdf}, 7263 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.88.2407_0.pdf},
7264 author = {Imad Aad and Claude Castelluccia and Jean-Pierre Hubaux} 7264 author = {Imad Aad and Claude Castelluccia and Jean-Pierre Hubaux}
7265} 7265}
7266@article {Marx:2006:PGS:1140638.1140647, 7266@article {Marx:2006:PGS:1140638.1140647,
@@ -7277,7 +7277,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7277 issn = {0304-3975}, 7277 issn = {0304-3975},
7278 doi = {10.1016/j.tcs.2005.10.007}, 7278 doi = {10.1016/j.tcs.2005.10.007},
7279 url = {http://dl.acm.org/citation.cfm?id=1140638.1140647}, 7279 url = {http://dl.acm.org/citation.cfm?id=1140638.1140647},
7280 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Marx\%20-\%20Parameterized\%20graph\%20separation\%20problems.pdf}, 7280 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Marx\%20-\%20Parameterized\%20graph\%20separation\%20problems.pdf},
7281 author = {Marx, D{\'a}niel} 7281 author = {Marx, D{\'a}niel}
7282} 7282}
7283@conference {Aekaterinidis2006PastryStrings, 7283@conference {Aekaterinidis2006PastryStrings,
@@ -7309,7 +7309,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7309 isbn = {1-59593-384-0}, 7309 isbn = {1-59593-384-0},
7310 doi = {http://doi.acm.org/10.1145/1146381.1146402}, 7310 doi = {http://doi.acm.org/10.1145/1146381.1146402},
7311 url = {http://doi.acm.org/10.1145/1146381.1146402}, 7311 url = {http://doi.acm.org/10.1145/1146381.1146402},
7312 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PODC\%2706\%20-\%20Peer\%20counting\%20and\%20sampling\%20in\%20overlay\%20networks.pdf}, 7312 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PODC\%2706\%20-\%20Peer\%20counting\%20and\%20sampling\%20in\%20overlay\%20networks.pdf},
7313 author = {Massouli{\'e}, Laurent and Erwan Le Merrer and Anne-Marie Kermarrec and Ganesh, Ayalvadi} 7313 author = {Massouli{\'e}, Laurent and Erwan Le Merrer and Anne-Marie Kermarrec and Ganesh, Ayalvadi}
7314} 7314}
7315@conference {2006_14, 7315@conference {2006_14,
@@ -7324,7 +7324,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7324 www_section = {comparison, counting, network size estimation, peer to peer}, 7324 www_section = {comparison, counting, network size estimation, peer to peer},
7325 isbn = {1-4244-0307-3 }, 7325 isbn = {1-4244-0307-3 },
7326 doi = {http://dx.doi.org/10.1109/HPDC.2006.1652131}, 7326 doi = {http://dx.doi.org/10.1109/HPDC.2006.1652131},
7327 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/HPDC\%2706\%20-\%20Peer\%20to\%20peer\%20size\%20estimation\%20in\%20large\%20and\%20dynamic\%20networks.pdf}, 7327 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/HPDC\%2706\%20-\%20Peer\%20to\%20peer\%20size\%20estimation\%20in\%20large\%20and\%20dynamic\%20networks.pdf},
7328 author = {Erwan Le Merrer and Anne-Marie Kermarrec and Massouli{\'e}, Laurent} 7328 author = {Erwan Le Merrer and Anne-Marie Kermarrec and Massouli{\'e}, Laurent}
7329} 7329}
7330@conference {1161264, 7330@conference {1161264,
@@ -7340,7 +7340,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7340 isbn = {1-59593-558-4}, 7340 isbn = {1-59593-558-4},
7341 doi = {10.1145/1161252.1161264}, 7341 doi = {10.1145/1161252.1161264},
7342 url = {http://portal.acm.org/citation.cfm?id=1161264$\#$}, 7342 url = {http://portal.acm.org/citation.cfm?id=1161264$\#$},
7343 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p48-cramer_ACM2006.pdf}, 7343 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p48-cramer_ACM2006.pdf},
7344 author = {Cramer, Curt and Thomas Fuhrmann} 7344 author = {Cramer, Curt and Thomas Fuhrmann}
7345} 7345}
7346@article {albrecht2006planetlab, 7346@article {albrecht2006planetlab,
@@ -7352,7 +7352,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7352 pages = {33--40}, 7352 pages = {33--40},
7353 publisher = {ACM}, 7353 publisher = {ACM},
7354 www_section = {application management, PlanetLab, plush, resource allocation, resource discovery}, 7354 www_section = {application management, PlanetLab, plush, resource allocation, resource discovery},
7355 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/plush.pdf}, 7355 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/plush.pdf},
7356 author = {Albrecht, J. and Tuttle, C. and Snoeren, A.C. and Vahdat, A.} 7356 author = {Albrecht, J. and Tuttle, C. and Snoeren, A.C. and Vahdat, A.}
7357} 7357}
7358@conference {heydt-benjamin:pet2006, 7358@conference {heydt-benjamin:pet2006,
@@ -7369,7 +7369,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7369 isbn = {978-3-540-68790-0}, 7369 isbn = {978-3-540-68790-0},
7370 doi = {10.1007/11957454}, 7370 doi = {10.1007/11957454},
7371 url = {http://www.springerlink.com/content/c75053mr42n82wv5/}, 7371 url = {http://www.springerlink.com/content/c75053mr42n82wv5/},
7372 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/heydt-benjamin-pet2006.pdf}, 7372 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/heydt-benjamin-pet2006.pdf},
7373 author = {Thomas S. Heydt-Benjamin and Hee-Jin Chae and Benessa Defend and Kevin Fu}, 7373 author = {Thomas S. Heydt-Benjamin and Hee-Jin Chae and Benessa Defend and Kevin Fu},
7374 editor = {George Danezis and Philippe Golle} 7374 editor = {George Danezis and Philippe Golle}
7375} 7375}
@@ -7381,7 +7381,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7381 abstract = {Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privacy laws (e.g. HIPAA) or policies. Privacy preserving data mining techniques have been developed to address this issue by providing mechanisms to mine the data while giving certain privacy guarantees. In this work we address the issue of privacy preserving nearest neighbor search, which forms the kernel of many data mining applications. To this end, we present a novel algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data. We show how this algorithm can be used in three important data mining algorithms, namely LOF outlier detection, SNN clustering, and kNN classification}, 7381 abstract = {Data mining is frequently obstructed by privacy concerns. In many cases data is distributed, and bringing the data together in one place for analysis is not possible due to privacy laws (e.g. HIPAA) or policies. Privacy preserving data mining techniques have been developed to address this issue by providing mechanisms to mine the data while giving certain privacy guarantees. In this work we address the issue of privacy preserving nearest neighbor search, which forms the kernel of many data mining applications. To this end, we present a novel algorithm based on secure multiparty computation primitives to compute the nearest neighbors of records in horizontally distributed data. We show how this algorithm can be used in three important data mining algorithms, namely LOF outlier detection, SNN clustering, and kNN classification},
7382 www_section = {Clustering algorithms, Computer science, Conferences, cryptography, Data mining, data privacy, distributed computing, Kernel, kNN classification, LOF outlier detection, Medical diagnostic imaging, multiparty computation primitives, nearest neighbor search, Nearest neighbor searches, pattern clustering, privacy preservation, SNN clustering}, 7382 www_section = {Clustering algorithms, Computer science, Conferences, cryptography, Data mining, data privacy, distributed computing, Kernel, kNN classification, LOF outlier detection, Medical diagnostic imaging, multiparty computation primitives, nearest neighbor search, Nearest neighbor searches, pattern clustering, privacy preservation, SNN clustering},
7383 doi = {10.1109/ICDMW.2006.133}, 7383 doi = {10.1109/ICDMW.2006.133},
7384 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PrivacyPreserving2006Shaneck.pdf}, 7384 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PrivacyPreserving2006Shaneck.pdf},
7385 author = {Shaneck, M. and Yongdae Kim and Kumar, V.} 7385 author = {Shaneck, M. and Yongdae Kim and Kumar, V.}
7386} 7386}
7387@conference { pianese:pulse, 7387@conference { pianese:pulse,
@@ -7397,7 +7397,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7397 www_section = {peer-to-peer networking, pulse}, 7397 www_section = {peer-to-peer networking, pulse},
7398 isbn = {1-4244-0221-2 }, 7398 isbn = {1-4244-0221-2 },
7399 doi = {http://dx.doi.org/10.1109/INFOCOM.2006.42}, 7399 doi = {http://dx.doi.org/10.1109/INFOCOM.2006.42},
7400 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2706\%20-\%20Pianese\%2C\%20Keller\%20\%26\%20Biersack\%20-\%20PULSE.pdf}, 7400 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2706\%20-\%20Pianese\%2C\%20Keller\%20\%26\%20Biersack\%20-\%20PULSE.pdf},
7401 author = {Fabio Pianese and Joaqu{\'\i}n Keller and E W Biersack} 7401 author = {Fabio Pianese and Joaqu{\'\i}n Keller and E W Biersack}
7402} 7402}
7403@booklet {fuhrmann06pushing-tr, 7403@booklet {fuhrmann06pushing-tr,
@@ -7408,7 +7408,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7408 type = {Interner Bericht}, 7408 type = {Interner Bericht},
7409 abstract = {SCALABLE SOURCE ROUTING is a novel routing approach for large unstructured networks, for example hybrid mobile ad hoc networks (MANETs), mesh networks, or sensor-actuator networks. It is especially suited for organically growing networks of many resource-limited mobile devices supported by a few fixed-wired nodes. SCALABLE SOURCE ROUTING is a full-fledged routing protocol that directly provides the semantics of a structured peer-to-peer overlay. Hence, it can serve as an efficient basis for fully decentralized applications on mobile devices. SCALABLE SOURCE ROUTING combines source routing in the physical network with Chord-like routing in the virtual ring formed by the address space. Message forwarding greedily decreases the distance in the virtual ring while preferring physically short paths. Unlike previous approaches, scalability is achieved without imposing artificial hierarchies or assigning location-dependent addresses. SCALABLE SOURCE ROUTING enables any-to-any communication in a flat address space without maintaining any-to-any routes. Each node proactively discovers its virtual vicinity using an iterative process. Additionally, it passively caches a limited amount of additional paths. By means of extensive simulation, we show that SCALABLE SOURCE ROUTING is resource-efficient and scalable well beyond 10,000 nodes}, 7409 abstract = {SCALABLE SOURCE ROUTING is a novel routing approach for large unstructured networks, for example hybrid mobile ad hoc networks (MANETs), mesh networks, or sensor-actuator networks. It is especially suited for organically growing networks of many resource-limited mobile devices supported by a few fixed-wired nodes. SCALABLE SOURCE ROUTING is a full-fledged routing protocol that directly provides the semantics of a structured peer-to-peer overlay. Hence, it can serve as an efficient basis for fully decentralized applications on mobile devices. SCALABLE SOURCE ROUTING combines source routing in the physical network with Chord-like routing in the virtual ring formed by the address space. Message forwarding greedily decreases the distance in the virtual ring while preferring physically short paths. Unlike previous approaches, scalability is achieved without imposing artificial hierarchies or assigning location-dependent addresses. SCALABLE SOURCE ROUTING enables any-to-any communication in a flat address space without maintaining any-to-any routes. Each node proactively discovers its virtual vicinity using an iterative process. Additionally, it passively caches a limited amount of additional paths. By means of extensive simulation, we show that SCALABLE SOURCE ROUTING is resource-efficient and scalable well beyond 10,000 nodes},
7410 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 7410 url = {http://i30www.ira.uka.de/research/publications/p2p/},
7411 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fuhrmann06pushing.pdf}, 7411 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fuhrmann06pushing.pdf},
7412 author = {Thomas Fuhrmann and Di, Pengfei and Kendy Kutzner and Cramer, Curt} 7412 author = {Thomas Fuhrmann and Di, Pengfei and Kendy Kutzner and Cramer, Curt}
7413} 7413}
7414@conference {1109601, 7414@conference {1109601,
@@ -7423,7 +7423,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7423 www_section = {distributed hash table, Hydra, rainbow, RSG, skip graph, SkipNet}, 7423 www_section = {distributed hash table, Hydra, rainbow, RSG, skip graph, SkipNet},
7424 isbn = {0-89871-605-5}, 7424 isbn = {0-89871-605-5},
7425 doi = {http://doi.acm.org/10.1145/1109557.1109601}, 7425 doi = {http://doi.acm.org/10.1145/1109557.1109601},
7426 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/rainbow.pdf}, 7426 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/rainbow.pdf},
7427 author = {Goodrich, Michael T. and Nelson, Michael J. and Sun, Jonathan Z.} 7427 author = {Goodrich, Michael T. and Nelson, Michael J. and Sun, Jonathan Z.}
7428} 7428}
7429@article {1148681, 7429@article {1148681,
@@ -7438,7 +7438,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7438 abstract = {LT-codes are a new class of codes introduced by Luby for the purpose of scalable and fault-tolerant distribution of data over computer networks. In this paper, we introduce Raptor codes, an extension of LT-codes with linear time encoding and decoding. We will exhibit a class of universal Raptor codes: for a given integer k and any real {\epsilon} > 0, Raptor codes in this class produce a potentially infinite stream of symbols such that any subset of symbols of size k(1 + {\epsilon}) is sufficient to recover the original k symbols with high probability. Each output symbol is generated using O(log(1/ {\epsilon})) operations, and the original symbols are recovered from the collected ones with O(k log(1/{\epsilon})) operations.We will also introduce novel techniques for the analysis of the error probability of the decoder for finite length Raptor codes. Moreover, we will introduce and analyze systematic versions of Raptor codes, i.e., versions in which the first output elements of the coding system coincide with the original k elements}, 7438 abstract = {LT-codes are a new class of codes introduced by Luby for the purpose of scalable and fault-tolerant distribution of data over computer networks. In this paper, we introduce Raptor codes, an extension of LT-codes with linear time encoding and decoding. We will exhibit a class of universal Raptor codes: for a given integer k and any real {\epsilon} > 0, Raptor codes in this class produce a potentially infinite stream of symbols such that any subset of symbols of size k(1 + {\epsilon}) is sufficient to recover the original k symbols with high probability. Each output symbol is generated using O(log(1/ {\epsilon})) operations, and the original symbols are recovered from the collected ones with O(k log(1/{\epsilon})) operations.We will also introduce novel techniques for the analysis of the error probability of the decoder for finite length Raptor codes. Moreover, we will introduce and analyze systematic versions of Raptor codes, i.e., versions in which the first output elements of the coding system coincide with the original k elements},
7439 www_section = {802.11, encoding, erasure coding}, 7439 www_section = {802.11, encoding, erasure coding},
7440 issn = {1063-6692}, 7440 issn = {1063-6692},
7441 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/raptor.pdf}, 7441 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/raptor.pdf},
7442 author = {M. Amin Shokrollahi} 7442 author = {M. Amin Shokrollahi}
7443} 7443}
7444@article {2006_16, 7444@article {2006_16,
@@ -7478,7 +7478,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7478 publisher = {Elsevier}, 7478 publisher = {Elsevier},
7479 organization = {Elsevier}, 7479 organization = {Elsevier},
7480 www_section = {online marketplace, reputation mechanism}, 7480 www_section = {online marketplace, reputation mechanism},
7481 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Dellarocas\%20-\%20Reputation\%20Mechanisms.pdf}, 7481 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Dellarocas\%20-\%20Reputation\%20Mechanisms.pdf},
7482 author = {Chrysanthos Dellarocas} 7482 author = {Chrysanthos Dellarocas}
7483} 7483}
7484@booklet {Miller06robustcomposition:, 7484@booklet {Miller06robustcomposition:,
@@ -7487,7 +7487,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7487 abstract = {Permission is hereby granted to make and distribute verbatim copies of this document without royalty or fee. Permission is granted to quote excerpts from this documented provided the original source is properly cited. ii When separately written programs are composed so that they may cooperate, they may instead destructively interfere in unanticipated ways. These hazards limit the scale and functionality of the software systems we can successfully compose. This dissertation presents a framework for enabling those interactions between components needed for the cooperation we intend, while minimizing the hazards of destructive interference. Great progress on the composition problem has been made within the object paradigm, chiefly in the context of sequential, single-machine programming among benign components. We show how to extend this success to support robust composition of concurrent and potentially malicious components distributed over potentially malicious machines. We present E, a distributed, persistent, secure programming language, and CapDesk, a virus-safe desktop built in E, as embodiments of the techniques we explain}, 7487 abstract = {Permission is hereby granted to make and distribute verbatim copies of this document without royalty or fee. Permission is granted to quote excerpts from this documented provided the original source is properly cited. ii When separately written programs are composed so that they may cooperate, they may instead destructively interfere in unanticipated ways. These hazards limit the scale and functionality of the software systems we can successfully compose. This dissertation presents a framework for enabling those interactions between components needed for the cooperation we intend, while minimizing the hazards of destructive interference. Great progress on the composition problem has been made within the object paradigm, chiefly in the context of sequential, single-machine programming among benign components. We show how to extend this success to support robust composition of concurrent and potentially malicious components distributed over potentially malicious machines. We present E, a distributed, persistent, secure programming language, and CapDesk, a virus-safe desktop built in E, as embodiments of the techniques we explain},
7488 www_section = {robustness}, 7488 www_section = {robustness},
7489 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.4674}, 7489 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.4674},
7490 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.101.4674.pdf}, 7490 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.101.4674.pdf},
7491 author = {Mark Samuel Miller} 7491 author = {Mark Samuel Miller}
7492} 7492}
7493@conference {Salsa, 7493@conference {Salsa,
@@ -7502,7 +7502,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7502 isbn = {1-59593-518-5}, 7502 isbn = {1-59593-518-5},
7503 doi = {10.1145/1180405.1180409}, 7503 doi = {10.1145/1180405.1180409},
7504 url = {http://portal.acm.org/citation.cfm?id=1180409}, 7504 url = {http://portal.acm.org/citation.cfm?id=1180409},
7505 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Salsa.pdf}, 7505 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Salsa.pdf},
7506 author = {Arjun Nambiar} 7506 author = {Arjun Nambiar}
7507} 7507}
7508@conference {2006_18, 7508@conference {2006_18,
@@ -7527,7 +7527,7 @@ two shallow circuits: one for generating many arbitrarily but identically biased
7527This paper uses techniques from Secure Multiparty Computation (SMC) to develop {\textquotedblleft}secure protocols{\textquotedblright} for the CPFR (Collaborative Planning, Forecasting, and Replenishment) business process. The result is a process that permits supply-chain partners to capture all of the benefits of information-sharing and collaborative decision-making, but without disclosing their {\textquotedblleft}private{\textquotedblright} demandsignal (e.g., promotions) and cost information to one another. In our collaborative CPFR) scenario, the retailer and supplier engage in SMC protocols that result in: (1) a forecast that uses both the retailers and the suppliers observed demand signals to better forecast demand; and (2) prescribed order/shipment quantities based on system-wide costs and inventory levels (and on the joint forecasts) that minimize supply-chain expected cost/period. Our contributions are as follows: (1) we demonstrate that CPFR can be securely implemented without disclosing the private information of either partner; (2) we show that the CPFR business process is not incentive compatible without transfer payments and develop an incentive-compatible linear transfer-payment scheme for 7527This paper uses techniques from Secure Multiparty Computation (SMC) to develop {\textquotedblleft}secure protocols{\textquotedblright} for the CPFR (Collaborative Planning, Forecasting, and Replenishment) business process. The result is a process that permits supply-chain partners to capture all of the benefits of information-sharing and collaborative decision-making, but without disclosing their {\textquotedblleft}private{\textquotedblright} demandsignal (e.g., promotions) and cost information to one another. In our collaborative CPFR) scenario, the retailer and supplier engage in SMC protocols that result in: (1) a forecast that uses both the retailers and the suppliers observed demand signals to better forecast demand; and (2) prescribed order/shipment quantities based on system-wide costs and inventory levels (and on the joint forecasts) that minimize supply-chain expected cost/period. Our contributions are as follows: (1) we demonstrate that CPFR can be securely implemented without disclosing the private information of either partner; (2) we show that the CPFR business process is not incentive compatible without transfer payments and develop an incentive-compatible linear transfer-payment scheme for
7528collaborative forecasting; (3) we demonstrate that our protocols are not only secure (i.e., privacy preserving), but that neither partner is able to make accurate inferences about the others future demand signals from the outputs of the protocols; and (4) we illustrate the benefits of secure collaboration using simulation}, 7528collaborative forecasting; (3) we demonstrate that our protocols are not only secure (i.e., privacy preserving), but that neither partner is able to make accurate inferences about the others future demand signals from the outputs of the protocols; and (4) we illustrate the benefits of secure collaboration using simulation},
7529 www_section = {chain computation management, CPFR, privacy, secure multi-party computation, secure supply, security, SMC}, 7529 www_section = {chain computation management, CPFR, privacy, secure multi-party computation, secure supply, security, SMC},
7530 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Secure\%20Collaborative\%20Planning\%20Forecasting\%20and\%20Replenishment.pdf}, 7530 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Secure\%20Collaborative\%20Planning\%20Forecasting\%20and\%20Replenishment.pdf},
7531 author = {Atallah, Mikhail and Marina Blanton and Vinayak Deshpand and Frikken, Keith and Li, Jiangtao and Leroy Schwarz} 7531 author = {Atallah, Mikhail and Marina Blanton and Vinayak Deshpand and Frikken, Keith and Li, Jiangtao and Leroy Schwarz}
7532} 7532}
7533@article {brands06, 7533@article {brands06,
@@ -7539,7 +7539,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se
7539 abstract = {Individuals are increasingly confronted with requests to identify themselves when accessing services provided by government organizations, companies, and other service providers. At the same time, traditional transaction mechanisms are increasingly being replaced by electronic mechanisms that underneath their hood automatically capture and record globally unique identifiers. Taken together, these interrelated trends are currently eroding the privacy and security of individuals in a manner unimaginable just a few decades ago. Privacy activists are facing an increasingly hopeless battle against new privacy-invasive identification initiatives: the cost of computerized identification systems is rapidly going down, their accuracy and efficiency is improving all the time, much of the required data communication infrastructure is now in place, forgery of non-electronic user credentials is getting easier all the time, and data sharing imperatives have gone up dramatically. This paper argues that the privacy vs. identification debate should be moved into less polarized territory. Contrary to popular misbelief, identification and privacy are not opposite interests that need to be balanced: the same technological advances that threaten to annihilate privacy can be exploited to save privacy in an electronic age. The aim of this paper is to clarify that premise on the basis of a careful analysis of the concept of user identification itself. Following an examination of user identifiers and its purposes, I classify identification technologies in a manner that enables their privacy and security implications to be clearly articulated and contrasted. I also include an overview of a modern privacy-preserving approach to user identification}, 7539 abstract = {Individuals are increasingly confronted with requests to identify themselves when accessing services provided by government organizations, companies, and other service providers. At the same time, traditional transaction mechanisms are increasingly being replaced by electronic mechanisms that underneath their hood automatically capture and record globally unique identifiers. Taken together, these interrelated trends are currently eroding the privacy and security of individuals in a manner unimaginable just a few decades ago. Privacy activists are facing an increasingly hopeless battle against new privacy-invasive identification initiatives: the cost of computerized identification systems is rapidly going down, their accuracy and efficiency is improving all the time, much of the required data communication infrastructure is now in place, forgery of non-electronic user credentials is getting easier all the time, and data sharing imperatives have gone up dramatically. This paper argues that the privacy vs. identification debate should be moved into less polarized territory. Contrary to popular misbelief, identification and privacy are not opposite interests that need to be balanced: the same technological advances that threaten to annihilate privacy can be exploited to save privacy in an electronic age. The aim of this paper is to clarify that premise on the basis of a careful analysis of the concept of user identification itself. Following an examination of user identifiers and its purposes, I classify identification technologies in a manner that enables their privacy and security implications to be clearly articulated and contrasted. I also include an overview of a modern privacy-preserving approach to user identification},
7540 www_section = {authentication, cryptography, data sharing, privacy}, 7540 www_section = {authentication, cryptography, data sharing, privacy},
7541 url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=999695}, 7541 url = {http://papers.ssrn.com/sol3/papers.cfm?abstract_id=999695},
7542 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/brands06.pdf}, 7542 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/brands06.pdf},
7543 author = {Stefan Brands} 7543 author = {Stefan Brands}
7544} 7544}
7545@conference {kutzner06securessr, 7545@conference {kutzner06securessr,
@@ -7551,7 +7551,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se
7551 abstract = {The Scalable Source Routing (SSR) protocol combines overlay-like routing in a virtual network structure with source routing in the physical network to a single cross-layer architecture. Thereby, it can provide indirect routing in networks that lack a well-crafted structure. SSR is well suited for mobile ad hoc networks, sensor-actuator networks, and especially for mesh networks. Moreover, SSR directly provides the routing semantics of a structured routing overlay, making it an efficient basis for the scalable implementation of fully decentralized applications. In this paper we analyze SSR with regard to security: We show where SSR is prone to attacks, and we describe protocol modifications that make SSR robust in the presence of malicious nodes. The core idea is to introduce cryptographic certificates that allow nodes to discover forged protocol messages. We evaluate our proposed modifications by means of simulations, and thus demonstrate that they are both effective and efficient}, 7551 abstract = {The Scalable Source Routing (SSR) protocol combines overlay-like routing in a virtual network structure with source routing in the physical network to a single cross-layer architecture. Thereby, it can provide indirect routing in networks that lack a well-crafted structure. SSR is well suited for mobile ad hoc networks, sensor-actuator networks, and especially for mesh networks. Moreover, SSR directly provides the routing semantics of a structured routing overlay, making it an efficient basis for the scalable implementation of fully decentralized applications. In this paper we analyze SSR with regard to security: We show where SSR is prone to attacks, and we describe protocol modifications that make SSR robust in the presence of malicious nodes. The core idea is to introduce cryptographic certificates that allow nodes to discover forged protocol messages. We evaluate our proposed modifications by means of simulations, and thus demonstrate that they are both effective and efficient},
7552 www_section = {cryptography, scalable source routing, sensor networks}, 7552 www_section = {cryptography, scalable source routing, sensor networks},
7553 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 7553 url = {http://i30www.ira.uka.de/research/publications/p2p/},
7554 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/kutzner06securessr.pdf}, 7554 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/kutzner06securessr.pdf},
7555 author = {Kendy Kutzner and Christian Wallenta and Thomas Fuhrmann} 7555 author = {Kendy Kutzner and Christian Wallenta and Thomas Fuhrmann}
7556} 7556}
7557@conference {1158641, 7557@conference {1158641,
@@ -7582,7 +7582,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se
7582 isbn = {978-3-540-68790-0}, 7582 isbn = {978-3-540-68790-0},
7583 doi = {10.1007/11957454}, 7583 doi = {10.1007/11957454},
7584 url = {http://www.springerlink.com/content/n77w19002743xu51/}, 7584 url = {http://www.springerlink.com/content/n77w19002743xu51/},
7585 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/tap-pet2006.pdf}, 7585 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/tap-pet2006.pdf},
7586 author = {Ian Goldberg}, 7586 author = {Ian Goldberg},
7587 editor = {George Danezis and Philippe Golle} 7587 editor = {George Danezis and Philippe Golle}
7588} 7588}
@@ -7605,7 +7605,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se
7605 year = {2006}, 7605 year = {2006},
7606 abstract = {AmbiComp is a new research project that will invest about 30 person years into the development of a new and simple software engineering approach for mobile embedded interactive systems. In order to achieve its ambitious goals, it will combine research from different fields such as mobile peer-to-peer networks and operating systems. As a result, developing applications across multiple embedded devices shall be greatly facilitated}, 7606 abstract = {AmbiComp is a new research project that will invest about 30 person years into the development of a new and simple software engineering approach for mobile embedded interactive systems. In order to achieve its ambitious goals, it will combine research from different fields such as mobile peer-to-peer networks and operating systems. As a result, developing applications across multiple embedded devices shall be greatly facilitated},
7607 www_section = {P2P}, 7607 www_section = {P2P},
7608 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/meis-paper04.pdf}, 7608 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/meis-paper04.pdf},
7609 editor = {unknown}, 7609 editor = {unknown},
7610 author = {Thomas Fuhrmann} 7610 author = {Thomas Fuhrmann}
7611} 7611}
@@ -7621,7 +7621,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se
7621 isbn = {0-7695-2648-9}, 7621 isbn = {0-7695-2648-9},
7622 doi = {10.1109/EDCC.2006.26}, 7622 doi = {10.1109/EDCC.2006.26},
7623 url = {http://portal.acm.org/citation.cfm?id=1170307$\#$}, 7623 url = {http://portal.acm.org/citation.cfm?id=1170307$\#$},
7624 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/slides.pdf}, 7624 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/slides.pdf},
7625 author = {Ludovic Court{\`e}s and Killijian, Marc-Olivier and Powell, David} 7625 author = {Ludovic Court{\`e}s and Killijian, Marc-Olivier and Powell, David}
7626} 7626}
7627@article {Levine:2006, 7627@article {Levine:2006,
@@ -7636,7 +7636,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se
7636 journal = {unknown}, 7636 journal = {unknown},
7637 www_section = {anonymity, security, Sybil attack}, 7637 www_section = {anonymity, security, Sybil attack},
7638 url = {http://prisms.cs.umass.edu/brian/pubs/levine.sybil.tr.2006.pdf}, 7638 url = {http://prisms.cs.umass.edu/brian/pubs/levine.sybil.tr.2006.pdf},
7639 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Tech\%20Report\%20-\%20A\%20Survey\%20of\%20Solutions\%20to\%20the\%20Sybil\%20Attack.pdf}, 7639 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Tech\%20Report\%20-\%20A\%20Survey\%20of\%20Solutions\%20to\%20the\%20Sybil\%20Attack.pdf},
7640 author = {Brian Neil Levine and Clay Shields and Margolin, N. Boris} 7640 author = {Brian Neil Levine and Clay Shields and Margolin, N. Boris}
7641} 7641}
7642@article {2006_20, 7642@article {2006_20,
@@ -7650,7 +7650,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se
7650 abstract = {In this survey, we summarize different modeling and solution concepts of networking games, as well as a number of different applications in telecommunications that make use of or can make use of networking games. We identify some of the mathematical challenges and methodologies that are involved in these problems. We include here work that has relevance to networking games in telecommunications from other areas, in particular from transportation planning}, 7650 abstract = {In this survey, we summarize different modeling and solution concepts of networking games, as well as a number of different applications in telecommunications that make use of or can make use of networking games. We identify some of the mathematical challenges and methodologies that are involved in these problems. We include here work that has relevance to networking games in telecommunications from other areas, in particular from transportation planning},
7651 www_section = {communication network, game theory}, 7651 www_section = {communication network, game theory},
7652 doi = {10.1016/j.cor.2004.06.005}, 7652 doi = {10.1016/j.cor.2004.06.005},
7653 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/netgames.pdf}, 7653 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/netgames.pdf},
7654 author = {Eitan Altman and Thomas Boulogne and Rachid El-Azouzi and Tania Jim{\'e}nez and Laura Wynter} 7654 author = {Eitan Altman and Thomas Boulogne and Rachid El-Azouzi and Tania Jim{\'e}nez and Laura Wynter}
7655} 7655}
7656@conference {Yu:2006:SDA:1159913.1159945, 7656@conference {Yu:2006:SDA:1159913.1159945,
@@ -7668,7 +7668,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se
7668 isbn = {1-59593-308-5}, 7668 isbn = {1-59593-308-5},
7669 doi = {http://doi.acm.org/10.1145/1159913.1159945}, 7669 doi = {http://doi.acm.org/10.1145/1159913.1159945},
7670 url = {http://doi.acm.org/10.1145/1159913.1159945}, 7670 url = {http://doi.acm.org/10.1145/1159913.1159945},
7671 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%2706\%20-\%20SybilGuard.pdf}, 7671 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%2706\%20-\%20SybilGuard.pdf},
7672 author = {Yu, Haifeng and Kaminsky, Michael and Gibbons, Phillip B. and Flaxman, Abraham} 7672 author = {Yu, Haifeng and Kaminsky, Michael and Gibbons, Phillip B. and Flaxman, Abraham}
7673} 7673}
7674@article {citeulike:530977, 7674@article {citeulike:530977,
@@ -7683,7 +7683,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se
7683 www_section = {P2P, trust}, 7683 www_section = {P2P, trust},
7684 doi = {10.1016/j.comnet.2005.07.011}, 7684 doi = {10.1016/j.comnet.2005.07.011},
7685 url = {http://portal.acm.org/citation.cfm?id=1139713}, 7685 url = {http://portal.acm.org/citation.cfm?id=1139713},
7686 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Marti-ElsevierScienceSubmitted05_0.pdf}, 7686 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Marti-ElsevierScienceSubmitted05_0.pdf},
7687 author = {Marti, Sergio and Hector Garcia-Molina} 7687 author = {Marti, Sergio and Hector Garcia-Molina}
7688} 7688}
7689@conference {ShWa-Timing06, 7689@conference {ShWa-Timing06,
@@ -7698,7 +7698,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se
7698 isbn = {978-3-540-44601-9}, 7698 isbn = {978-3-540-44601-9},
7699 doi = {10.1007/11863908}, 7699 doi = {10.1007/11863908},
7700 url = {http://www.springerlink.com/content/3n136578m4211484/}, 7700 url = {http://www.springerlink.com/content/3n136578m4211484/},
7701 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ShWa-Timing06.pdf}, 7701 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ShWa-Timing06.pdf},
7702 author = {Vitaly Shmatikov and Ming-Hsui Wang} 7702 author = {Vitaly Shmatikov and Ming-Hsui Wang}
7703} 7703}
7704@conference {conf/infocom/SunHYL06, 7704@conference {conf/infocom/SunHYL06,
@@ -7712,7 +7712,7 @@ collaborative forecasting; (3) we demonstrate that our protocols are not only se
7712 isbn = {1-4244-0349-9 }, 7712 isbn = {1-4244-0349-9 },
7713 doi = {10.1109/CISS.2006.286695 }, 7713 doi = {10.1109/CISS.2006.286695 },
7714 url = {http://dblp.uni-trier.de/db/conf/infocom/infocom2006.html$\#$SunHYL06}, 7714 url = {http://dblp.uni-trier.de/db/conf/infocom/infocom2006.html$\#$SunHYL06},
7715 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Trust_infocom06_v4.pdf}, 7715 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Trust_infocom06_v4.pdf},
7716 author = {Yan L. Sun and Zhu Han and Wei Yu and K. J. Ray Liu} 7716 author = {Yan L. Sun and Zhu Han and Wei Yu and K. J. Ray Liu}
7717} 7717}
7718@book {2006_21, 7718@book {2006_21,
@@ -7729,7 +7729,7 @@ This result immediately implies solutions to other long-standing open problems s
7729 isbn = {978-3-540-32731-8}, 7729 isbn = {978-3-540-32731-8},
7730 doi = {10.1007/11681878_15}, 7730 doi = {10.1007/11681878_15},
7731 url = {http://dx.doi.org/10.1007/11681878_15}, 7731 url = {http://dx.doi.org/10.1007/11681878_15},
7732 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/UnconditionallySecure2006Damgard.pdf}, 7732 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/UnconditionallySecure2006Damgard.pdf},
7733 author = {Damg{\'a}rd, Ivan and Fitzi, Matthias and Kiltz, Eike and Nielsen, JesperBuus and Toft, Tomas}, 7733 author = {Damg{\'a}rd, Ivan and Fitzi, Matthias and Kiltz, Eike and Nielsen, JesperBuus and Toft, Tomas},
7734 editor = {Halevi, Shai and Rabin, Tal} 7734 editor = {Halevi, Shai and Rabin, Tal}
7735} 7735}
@@ -7748,7 +7748,7 @@ This result immediately implies solutions to other long-standing open problems s
7748 isbn = {1-59593-561-4}, 7748 isbn = {1-59593-561-4},
7749 doi = {http://doi.acm.org/10.1145/1177080.1177105}, 7749 doi = {http://doi.acm.org/10.1145/1177080.1177105},
7750 url = {http://doi.acm.org/10.1145/1177080.1177105}, 7750 url = {http://doi.acm.org/10.1145/1177080.1177105},
7751 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IMC\%2706\%20-\%20Understanding\%20churn\%20in\%20p2p\%20networks.pdf}, 7751 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IMC\%2706\%20-\%20Understanding\%20churn\%20in\%20p2p\%20networks.pdf},
7752 author = {Stutzbach, Daniel and Rejaie, Reza} 7752 author = {Stutzbach, Daniel and Rejaie, Reza}
7753} 7753}
7754@conference {valet:pet2006, 7754@conference {valet:pet2006,
@@ -7765,7 +7765,7 @@ This result immediately implies solutions to other long-standing open problems s
7765 isbn = {978-3-540-68790-0}, 7765 isbn = {978-3-540-68790-0},
7766 doi = {10.1007/11957454}, 7766 doi = {10.1007/11957454},
7767 url = {http://www.springerlink.com/content/d58607007777r8l1/}, 7767 url = {http://www.springerlink.com/content/d58607007777r8l1/},
7768 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/valet-pet2006.pdf}, 7768 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/valet-pet2006.pdf},
7769 author = {Lasse {\O}verlier and Paul Syverson}, 7769 author = {Lasse {\O}verlier and Paul Syverson},
7770 editor = {George Danezis and Philippe Golle} 7770 editor = {George Danezis and Philippe Golle}
7771} 7771}
@@ -7792,7 +7792,7 @@ This result immediately implies solutions to other long-standing open problems s
7792 isbn = {1-59593-026-4}, 7792 isbn = {1-59593-026-4},
7793 doi = {10.1145/1080139.1080147}, 7793 doi = {10.1145/1080139.1080147},
7794 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.5368}, 7794 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.102.5368},
7795 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.102.5368.pdf}, 7795 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.102.5368.pdf},
7796 author = {J{\"o}rg Widmer} 7796 author = {J{\"o}rg Widmer}
7797} 7797}
7798@conference {pet05-borisov, 7798@conference {pet05-borisov,
@@ -7808,7 +7808,7 @@ This result immediately implies solutions to other long-standing open problems s
7808 isbn = {978-3-540-34745-3}, 7808 isbn = {978-3-540-34745-3},
7809 doi = {10.1007/11767831}, 7809 doi = {10.1007/11767831},
7810 url = {http://www.springerlink.com/content/b0t0714165846m42/}, 7810 url = {http://www.springerlink.com/content/b0t0714165846m42/},
7811 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/pet05-borisov.pdf}, 7811 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/pet05-borisov.pdf},
7812 author = {Borisov, Nikita} 7812 author = {Borisov, Nikita}
7813} 7813}
7814@mastersthesis {DiazThesis05, 7814@mastersthesis {DiazThesis05,
@@ -7818,7 +7818,7 @@ This result immediately implies solutions to other long-standing open problems s
7818 school = {Katholieke Universiteit Leuven}, 7818 school = {Katholieke Universiteit Leuven},
7819 type = {phd}, 7819 type = {phd},
7820 address = {Leuven, Belgium}, 7820 address = {Leuven, Belgium},
7821 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DiazThesis05.pdf}, 7821 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DiazThesis05.pdf},
7822 author = {Claudia Diaz} 7822 author = {Claudia Diaz}
7823} 7823}
7824@booklet {Borisov:CSD-05-1390, 7824@booklet {Borisov:CSD-05-1390,
@@ -7829,7 +7829,7 @@ This result immediately implies solutions to other long-standing open problems s
7829 publisher = {EECS Department, University of California, Berkeley}, 7829 publisher = {EECS Department, University of California, Berkeley},
7830 abstract = {Existing peer-to-peer systems that aim to provide anonymity to its users are based on networks with unstructured or loosely-structured routing algorithms. Structured routing offers performance and robustness guarantees that these systems are unable to achieve. We therefore investigate adding anonymity support to structured peer-to-peer networks. We apply an entropy-based anonymity metric to Chord and use this metric to quantify the improvements in anonymity afforded by several possible extensions. We identify particular properties of Chord that have the strongest effect on anonymity and propose a routing extension that allows a general trade-off between anonymity and performance. Our results should be applicable to other structured peer-to-peer systems}, 7830 abstract = {Existing peer-to-peer systems that aim to provide anonymity to its users are based on networks with unstructured or loosely-structured routing algorithms. Structured routing offers performance and robustness guarantees that these systems are unable to achieve. We therefore investigate adding anonymity support to structured peer-to-peer networks. We apply an entropy-based anonymity metric to Chord and use this metric to quantify the improvements in anonymity afforded by several possible extensions. We identify particular properties of Chord that have the strongest effect on anonymity and propose a routing extension that allows a general trade-off between anonymity and performance. Our results should be applicable to other structured peer-to-peer systems},
7831 url = {http://www.eecs.berkeley.edu/Pubs/TechRpts/2005/6509.html}, 7831 url = {http://www.eecs.berkeley.edu/Pubs/TechRpts/2005/6509.html},
7832 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CSD-05-1390.pdf}, 7832 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CSD-05-1390.pdf},
7833 author = {Borisov, Nikita and Waddle, Jason} 7833 author = {Borisov, Nikita and Waddle, Jason}
7834} 7834}
7835@conference {sofem05-Klonowski, 7835@conference {sofem05-Klonowski,
@@ -7845,7 +7845,7 @@ We show that applying encoding based on universal re-encryption can solve many o
7845 isbn = {978-3-540-24302-1}, 7845 isbn = {978-3-540-24302-1},
7846 doi = {10.1007/b105088}, 7846 doi = {10.1007/b105088},
7847 url = {http://www.springerlink.com/content/9023b6ad0thaf51p/}, 7847 url = {http://www.springerlink.com/content/9023b6ad0thaf51p/},
7848 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/sofem05-Klonowski.pdf}, 7848 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/sofem05-Klonowski.pdf},
7849 author = {Marek Klonowski and Miroslaw Kutylowski and Filip Zagorski} 7849 author = {Marek Klonowski and Miroslaw Kutylowski and Filip Zagorski}
7850} 7850}
7851@conference {1080833, 7851@conference {1080833,
@@ -7861,7 +7861,7 @@ We show that applying encoding based on universal re-encryption can solve many o
7861 isbn = {1-59593-020-5}, 7861 isbn = {1-59593-020-5},
7862 doi = {10.1145/1080829.1080833}, 7862 doi = {10.1145/1080829.1080833},
7863 url = {http://portal.acm.org/citation.cfm?id=1080833$\#$}, 7863 url = {http://portal.acm.org/citation.cfm?id=1080833$\#$},
7864 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.62.3119.pdf}, 7864 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.62.3119.pdf},
7865 author = {Bicket, John and Aguayo, Daniel and Biswas, Sanjit and Robert Morris} 7865 author = {Bicket, John and Aguayo, Daniel and Biswas, Sanjit and Robert Morris}
7866} 7866}
7867@article {1095816, 7867@article {1095816,
@@ -7878,7 +7878,7 @@ We show that applying encoding based on universal re-encryption can solve many o
7878 issn = {0163-5980}, 7878 issn = {0163-5980},
7879 doi = {10.1145/1095809.1095816}, 7879 doi = {10.1145/1095809.1095816},
7880 url = {http://portal.acm.org/citation.cfm?id=1095816$\#$}, 7880 url = {http://portal.acm.org/citation.cfm?id=1095816$\#$},
7881 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.80.713.pdf}, 7881 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.80.713.pdf},
7882 author = {Aiyer, Amitanand S. and Lorenzo Alvisi and Clement, Allen and Dahlin, Mike and Martin, Jean-Philippe and Porth, Carl} 7882 author = {Aiyer, Amitanand S. and Lorenzo Alvisi and Clement, Allen and Dahlin, Mike and Martin, Jean-Philippe and Porth, Carl}
7883} 7883}
7884@conference {Pouwelse05thebittorrent, 7884@conference {Pouwelse05thebittorrent,
@@ -7895,7 +7895,7 @@ We show that applying encoding based on universal re-encryption can solve many o
7895 abstract = {Of the many P2P file-sharing prototypes in existence, BitTorrent is one of the few that has managed to attract millions of users. BitTorrent relies on other (global) components for file search, employs a moderator system to ensure the integrity of file data, and uses a bartering technique for downloading in order to prevent users from freeriding. In this paper we present a measurement study of BitTorrent in which we focus on four issues, viz. availability, integrity, flashcrowd handling, and download performance. The purpose of this paper is to aid in the understanding of a real P2P system that apparently has the right mechanisms to attract a large user community, to provide measurement data that may be useful in modeling P2P systems, and to identify design issues in such systems}, 7895 abstract = {Of the many P2P file-sharing prototypes in existence, BitTorrent is one of the few that has managed to attract millions of users. BitTorrent relies on other (global) components for file search, employs a moderator system to ensure the integrity of file data, and uses a bartering technique for downloading in order to prevent users from freeriding. In this paper we present a measurement study of BitTorrent in which we focus on four issues, viz. availability, integrity, flashcrowd handling, and download performance. The purpose of this paper is to aid in the understanding of a real P2P system that apparently has the right mechanisms to attract a large user community, to provide measurement data that may be useful in modeling P2P systems, and to identify design issues in such systems},
7896 www_section = {BitTorrent, file-sharing}, 7896 www_section = {BitTorrent, file-sharing},
7897 doi = {10.1007/11558989_19}, 7897 doi = {10.1007/11558989_19},
7898 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IPTPS\%2705\%20-\%20The\%20BitTorrent\%3A\%20measurements\%20and\%20analysis.pdf}, 7898 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IPTPS\%2705\%20-\%20The\%20BitTorrent\%3A\%20measurements\%20and\%20analysis.pdf},
7899 author = {Johan Pouwelse and Garbacki, Pawel and Epema, Dick H. J. and Henk J. Sips} 7899 author = {Johan Pouwelse and Garbacki, Pawel and Epema, Dick H. J. and Henk J. Sips}
7900} 7900}
7901@conference {ih05-Luke, 7901@conference {ih05-Luke,
@@ -7911,7 +7911,7 @@ We show that applying encoding based on universal re-encryption can solve many o
7911 isbn = {978-3-540-29039-1}, 7911 isbn = {978-3-540-29039-1},
7912 doi = {10.1007/11558859}, 7912 doi = {10.1007/11558859},
7913 url = {http://www.springerlink.com/index/y78350424h77u578.pdf}, 7913 url = {http://www.springerlink.com/index/y78350424h77u578.pdf},
7914 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ih05-Luke.pdf}, 7914 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ih05-Luke.pdf},
7915 author = {Luke O'Connor} 7915 author = {Luke O'Connor}
7916} 7916}
7917@conference {1108067, 7917@conference {1108067,
@@ -7940,7 +7940,7 @@ We show that applying encoding based on universal re-encryption can solve many o
7940 isbn = {0-7803-8280-3 }, 7940 isbn = {0-7803-8280-3 },
7941 doi = {10.1109/ISIT.2004.1365246 }, 7941 doi = {10.1109/ISIT.2004.1365246 },
7942 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.3798}, 7942 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.90.3798},
7943 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/0409026v1.pdf}, 7943 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/0409026v1.pdf},
7944 author = {Henry D. Pfister and Igal Sason and R{\"u}diger L. Urbanke} 7944 author = {Henry D. Pfister and Igal Sason and R{\"u}diger L. Urbanke}
7945} 7945}
7946@conference {Zhuang05cashmere:resilient, 7946@conference {Zhuang05cashmere:resilient,
@@ -7951,7 +7951,7 @@ We show that applying encoding based on universal re-encryption can solve many o
7951 organization = {ACM/USENIX}, 7951 organization = {ACM/USENIX},
7952 abstract = {Anonymous routing protects user communication from identification by third-party observers. Existing anonymous routing layers utilize Chaum-Mixes for anonymity by relaying traffic through relay nodes called mixes. The source defines a static forwarding path through which traffic is relayed to the destination. The resulting path is fragile and shortlived: failure of one mix in the path breaks the forwarding path and results in data loss and jitter before a new path is constructed. In this paper, we propose Cashmere, a resilient anonymous routing layer built on a structured peer-to-peer overlay. Instead of single-node mixes, Cashmere selects regions in the overlay namespace as mixes. Any node in a region can act as the MIX, drastically reducing the probability of a mix failure. We analyze Cashmere's anonymity and measure its performance through simulation and measurements, and show that it maintains high anonymity while providing orders of magnitude improvement in resilience to network dynamics and node failures}, 7952 abstract = {Anonymous routing protects user communication from identification by third-party observers. Existing anonymous routing layers utilize Chaum-Mixes for anonymity by relaying traffic through relay nodes called mixes. The source defines a static forwarding path through which traffic is relayed to the destination. The resulting path is fragile and shortlived: failure of one mix in the path breaks the forwarding path and results in data loss and jitter before a new path is constructed. In this paper, we propose Cashmere, a resilient anonymous routing layer built on a structured peer-to-peer overlay. Instead of single-node mixes, Cashmere selects regions in the overlay namespace as mixes. Any node in a region can act as the MIX, drastically reducing the probability of a mix failure. We analyze Cashmere's anonymity and measure its performance through simulation and measurements, and show that it maintains high anonymity while providing orders of magnitude improvement in resilience to network dynamics and node failures},
7953 url = {http://portal.acm.org/citation.cfm?id=1251203.1251225$\#$}, 7953 url = {http://portal.acm.org/citation.cfm?id=1251203.1251225$\#$},
7954 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cashmere.pdf}, 7954 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cashmere.pdf},
7955 author = {Li Zhuang and Feng Zhou and Ben Y. Zhao and Antony Rowstron} 7955 author = {Li Zhuang and Feng Zhou and Ben Y. Zhao and Antony Rowstron}
7956} 7956}
7957@conference {ih05-csispir, 7957@conference {ih05-csispir,
@@ -7967,7 +7967,7 @@ We show that applying encoding based on universal re-encryption can solve many o
7967 isbn = {978-3-540-29039-1}, 7967 isbn = {978-3-540-29039-1},
7968 doi = {10.1007/11558859}, 7968 doi = {10.1007/11558859},
7969 url = {http://www.springerlink.com/content/f08707qw34614340/}, 7969 url = {http://www.springerlink.com/content/f08707qw34614340/},
7970 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ih05-csispir.pdf}, 7970 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ih05-csispir.pdf},
7971 author = {Ginger Perng and Michael K. Reiter and Chenxi Wang} 7971 author = {Ginger Perng and Michael K. Reiter and Chenxi Wang}
7972} 7972}
7973@conference {2005_0, 7973@conference {2005_0,
@@ -7987,7 +7987,7 @@ We show that applying encoding based on universal re-encryption can solve many o
7987 issn = {1611-3349 (Online)}, 7987 issn = {1611-3349 (Online)},
7988 doi = {10.1007/11558989}, 7988 doi = {10.1007/11558989},
7989 url = {http://www.springerlink.com/content/l13550223q12l65v/about/}, 7989 url = {http://www.springerlink.com/content/l13550223q12l65v/about/},
7990 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/chainsaw.pdf}, 7990 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/chainsaw.pdf},
7991 author = {Vinay Pai and Kapil Kumar and Karthik Tamilmani and Vinay Sambamurthy and Alexander E. Mohr}, 7991 author = {Vinay Pai and Kapil Kumar and Karthik Tamilmani and Vinay Sambamurthy and Alexander E. Mohr},
7992 editor = {Miguel Castro and Robbert Van Renesse} 7992 editor = {Miguel Castro and Robbert Van Renesse}
7993} 7993}
@@ -7997,7 +7997,7 @@ We show that applying encoding based on universal re-encryption can solve many o
7997 abstract = {In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because of the asymmetric nature of TCP connection establishment, however, NAT traversal of TCP is more difficult. Researchers have recently proposed a variety of promising approaches for TCP NAT traversal. The success of these approaches, however, depend on how NAT boxes respond to various sequences of TCP (and ICMP) packets. This paper presents the first broad study of NAT behavior for a comprehensive set of TCP NAT traversal techniques over a wide range of commercial NAT products. We developed a publicly available software test suite that measures the NAT's responses both to a variety of isolated probes and to complete TCP connection establishments. We test sixteen NAT products in the lab, and 93 home NATs in the wild. Using these results, as well as market data for NAT products, we estimate the likelihood of successful NAT traversal for home networks. The insights gained from this paper can be used to guide both design of TCP NAT traversal protocols and the standardization of NAT/firewall behavior, including the IPv4-IPv6 translating NATs critical for IPv6 transition}, 7997 abstract = {In recent years, the standards community has developed techniques for traversing NAT/firewall boxes with UDP (that is, establishing UDP flows between hosts behind NATs). Because of the asymmetric nature of TCP connection establishment, however, NAT traversal of TCP is more difficult. Researchers have recently proposed a variety of promising approaches for TCP NAT traversal. The success of these approaches, however, depend on how NAT boxes respond to various sequences of TCP (and ICMP) packets. This paper presents the first broad study of NAT behavior for a comprehensive set of TCP NAT traversal techniques over a wide range of commercial NAT products. We developed a publicly available software test suite that measures the NAT's responses both to a variety of isolated probes and to complete TCP connection establishments. We test sixteen NAT products in the lab, and 93 home NATs in the wild. Using these results, as well as market data for NAT products, we estimate the likelihood of successful NAT traversal for home networks. The insights gained from this paper can be used to guide both design of TCP NAT traversal protocols and the standardization of NAT/firewall behavior, including the IPv4-IPv6 translating NATs critical for IPv6 transition},
7998 www_section = {firewall, NAT}, 7998 www_section = {firewall, NAT},
7999 url = {http://portal.acm.org/citation.cfm?id=1251086.1251104}, 7999 url = {http://portal.acm.org/citation.cfm?id=1251086.1251104},
8000 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/imc05-tcpnat.pdf}, 8000 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/imc05-tcpnat.pdf},
8001 author = {Saikat Guha and Paul Francis} 8001 author = {Saikat Guha and Paul Francis}
8002} 8002}
8003@conference {chl05-full:eurocrypt2005, 8003@conference {chl05-full:eurocrypt2005,
@@ -8015,7 +8015,7 @@ We then extend our scheme to our second result, the first e-cash scheme that pro
8015 isbn = {3-540-25910-4}, 8015 isbn = {3-540-25910-4},
8016 doi = {10.1007/b136415}, 8016 doi = {10.1007/b136415},
8017 url = {http://www.springerlink.com/content/vwkgkfpdmrdky5a8/}, 8017 url = {http://www.springerlink.com/content/vwkgkfpdmrdky5a8/},
8018 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/chl05-full-eurocrypt2005.pdf}, 8018 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/chl05-full-eurocrypt2005.pdf},
8019 author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya}, 8019 author = {Jan Camenisch and Susan Hohenberger and Anna Lysyanskaya},
8020 editor = {Ronald Cramer} 8020 editor = {Ronald Cramer}
8021} 8021}
@@ -8032,7 +8032,7 @@ We then extend our scheme to our second result, the first e-cash scheme that pro
8032 isbn = {978-3-540-29039-1}, 8032 isbn = {978-3-540-29039-1},
8033 doi = {10.1007/11558859}, 8033 doi = {10.1007/11558859},
8034 url = {http://www.springerlink.com/content/74461772r675l828/}, 8034 url = {http://www.springerlink.com/content/74461772r675l828/},
8035 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ih05-danezisclulow.pdf}, 8035 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ih05-danezisclulow.pdf},
8036 author = {George Danezis and Jolyon Clulow} 8036 author = {George Danezis and Jolyon Clulow}
8037} 8037}
8038@article {2005_1, 8038@article {2005_1,
@@ -8046,7 +8046,7 @@ We then extend our scheme to our second result, the first e-cash scheme that pro
8046 www_section = {cooperation, experimental economics, reputation}, 8046 www_section = {cooperation, experimental economics, reputation},
8047 doi = {doi:10.1016/j.jpubeco.2004.03.008}, 8047 doi = {doi:10.1016/j.jpubeco.2004.03.008},
8048 url = {doi:10.1016/j.jpubeco.2004.03.008}, 8048 url = {doi:10.1016/j.jpubeco.2004.03.008},
8049 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Journal\%20of\%20Public\%20Economics\%20-\%20Bolton\%2C\%20Katok\%20\%26\%20Ockenfels.pdf}, 8049 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Journal\%20of\%20Public\%20Economics\%20-\%20Bolton\%2C\%20Katok\%20\%26\%20Ockenfels.pdf},
8050 author = {Gary E. Bolton and Elena Katok and Axel Ockenfels} 8050 author = {Gary E. Bolton and Elena Katok and Axel Ockenfels}
8051} 8051}
8052@conference {2005_2, 8052@conference {2005_2,
@@ -8055,7 +8055,7 @@ We then extend our scheme to our second result, the first e-cash scheme that pro
8055 year = {2005}, 8055 year = {2005},
8056 publisher = {ACM}, 8056 publisher = {ACM},
8057 organization = {ACM}, 8057 organization = {ACM},
8058 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/gossip-podc05.pdf}, 8058 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/gossip-podc05.pdf},
8059 author = {Andre Allavena and Alan Demers and John E. Hopcroft} 8059 author = {Andre Allavena and Alan Demers and John E. Hopcroft}
8060} 8060}
8061@conference {Moore05counteringhidden-action, 8061@conference {Moore05counteringhidden-action,
@@ -8067,7 +8067,7 @@ We then extend our scheme to our second result, the first e-cash scheme that pro
8067 abstract = {We define an economic category of hidden-action attacks: actions made attractive by a lack of observation. We then consider its implications for computer systems. Rather than structure contracts to compensate for incentive problems, we rely on insights from social capital theory to design network topologies and interactions that undermine the potential for hidden-action attacks}, 8067 abstract = {We define an economic category of hidden-action attacks: actions made attractive by a lack of observation. We then consider its implications for computer systems. Rather than structure contracts to compensate for incentive problems, we rely on insights from social capital theory to design network topologies and interactions that undermine the potential for hidden-action attacks},
8068 www_section = {asymmetric information, computer security, decentralized, economics, information security, moral hazard, social capital}, 8068 www_section = {asymmetric information, computer security, decentralized, economics, information security, moral hazard, social capital},
8069 doi = {10.1.1.119.8132}, 8069 doi = {10.1.1.119.8132},
8070 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WEIS\%2705\%20-\%20Moore\%20-\%20Counterin\%20hidden-action\%20attacks.pdf}, 8070 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WEIS\%2705\%20-\%20Moore\%20-\%20Counterin\%20hidden-action\%20attacks.pdf},
8071 author = {Tyler Moore} 8071 author = {Tyler Moore}
8072} 8072}
8073@conference {Massoulie:2005:CRS:1064212.1064215, 8073@conference {Massoulie:2005:CRS:1064212.1064215,
@@ -8085,7 +8085,7 @@ We then extend our scheme to our second result, the first e-cash scheme that pro
8085 isbn = {1-59593-022-1}, 8085 isbn = {1-59593-022-1},
8086 doi = {http://doi.acm.org/10.1145/1064212.1064215}, 8086 doi = {http://doi.acm.org/10.1145/1064212.1064215},
8087 url = {http://doi.acm.org/10.1145/1064212.1064215}, 8087 url = {http://doi.acm.org/10.1145/1064212.1064215},
8088 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGMETRICS\%2705\%20-\%20Coupon\%20replication\%20systems.pdf}, 8088 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGMETRICS\%2705\%20-\%20Coupon\%20replication\%20systems.pdf},
8089 author = {Massouli{\'e}, Laurent and Vojnovi{\'c}, Milan} 8089 author = {Massouli{\'e}, Laurent and Vojnovi{\'c}, Milan}
8090} 8090}
8091@conference {Kostoulas:2005:DSS:1097873.1098292, 8091@conference {Kostoulas:2005:DSS:1097873.1098292,
@@ -8102,7 +8102,7 @@ We then extend our scheme to our second result, the first e-cash scheme that pro
8102 isbn = {0-7695-2326-9}, 8102 isbn = {0-7695-2326-9},
8103 doi = {10.1109/NCA.2005.15}, 8103 doi = {10.1109/NCA.2005.15},
8104 url = {http://dl.acm.org/citation.cfm?id=1097873.1098292}, 8104 url = {http://dl.acm.org/citation.cfm?id=1097873.1098292},
8105 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NCA\%2705\%20-\%20Decentralized\%20Schemes\%20for\%20Size\%20Estimation\%20in\%20Large\%20and\%20Dynamic\%20Groups.pdf}, 8105 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NCA\%2705\%20-\%20Decentralized\%20Schemes\%20for\%20Size\%20Estimation\%20in\%20Large\%20and\%20Dynamic\%20Groups.pdf},
8106 author = {Kostoulas, Dionysios and Psaltoulis, Dimitrios and Indranil Gupta and Kenneth P. Birman and Alan Demers} 8106 author = {Kostoulas, Dionysios and Psaltoulis, Dimitrios and Indranil Gupta and Kenneth P. Birman and Alan Demers}
8107} 8107}
8108@conference {You05deepstore:, 8108@conference {You05deepstore:,
@@ -8117,7 +8117,7 @@ We then extend our scheme to our second result, the first e-cash scheme that pro
8117 isbn = {0-7695-2285-8}, 8117 isbn = {0-7695-2285-8},
8118 doi = {10.1109/ICDE.2005.47}, 8118 doi = {10.1109/ICDE.2005.47},
8119 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.66.6928}, 8119 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.66.6928},
8120 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.76.5241.pdf}, 8120 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.76.5241.pdf},
8121 author = {Lawrence L. You and Kristal T. Pollack and Darrell D. E. Long} 8121 author = {Lawrence L. You and Kristal T. Pollack and Darrell D. E. Long}
8122} 8122}
8123@conference {Electrical04designingincentives, 8123@conference {Electrical04designingincentives,
@@ -8135,7 +8135,7 @@ We then extend our scheme to our second result, the first e-cash scheme that pro
8135 isbn = {0743-166X }, 8135 isbn = {0743-166X },
8136 issn = {0-7803-8968-9 }, 8136 issn = {0-7803-8968-9 },
8137 doi = {10.1109/INFCOM.2005.1497907 }, 8137 doi = {10.1109/INFCOM.2005.1497907 },
8138 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2705\%20-\%20Designing\%20incentives\%20for\%20peer-to-peer\%20routing.pdf}, 8138 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2705\%20-\%20Designing\%20incentives\%20for\%20peer-to-peer\%20routing.pdf},
8139 author = {Alberto Blanc and Yi-Kai Liu and Vahdat, Amin} 8139 author = {Alberto Blanc and Yi-Kai Liu and Vahdat, Amin}
8140} 8140}
8141@conference {1251207, 8141@conference {1251207,
@@ -8151,7 +8151,7 @@ We then extend our scheme to our second result, the first e-cash scheme that pro
8151This paper describes the design and implementation of rcc, the router configuration checker, a tool that finds faults in BGP configurations using static analysis. rcc detects faults by checking constraints that are based on a high-level correctness specification. rcc detects two broad classes of faults: route validity faults, where routers may learn routes that do not correspond to usable paths, and path visibility faults, where routers may fail to learn routes for paths that exist in the network. rcc enables network operators to test and debug configurations before deploying them in an operational network, improving on the status quo where most faults are detected only during operation. rcc has been downloaded by more than sixty-five network operators to date, some of whom have shared their configurations with us. We analyze network-wide configurations from 17 different ASes to detect a wide variety of faults and use these findings to motivate improvements to the Internet routing infrastructure}, 8151This paper describes the design and implementation of rcc, the router configuration checker, a tool that finds faults in BGP configurations using static analysis. rcc detects faults by checking constraints that are based on a high-level correctness specification. rcc detects two broad classes of faults: route validity faults, where routers may learn routes that do not correspond to usable paths, and path visibility faults, where routers may fail to learn routes for paths that exist in the network. rcc enables network operators to test and debug configurations before deploying them in an operational network, improving on the status quo where most faults are detected only during operation. rcc has been downloaded by more than sixty-five network operators to date, some of whom have shared their configurations with us. We analyze network-wide configurations from 17 different ASes to detect a wide variety of faults and use these findings to motivate improvements to the Internet routing infrastructure},
8152 www_section = {autonomous systems, border gateway protocol}, 8152 www_section = {autonomous systems, border gateway protocol},
8153 url = {http://portal.acm.org/citation.cfm?id=1251207$\#$}, 8153 url = {http://portal.acm.org/citation.cfm?id=1251207$\#$},
8154 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.113.5668.pdf}, 8154 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.113.5668.pdf},
8155 author = {Nick Feamster and Hari Balakrishnan} 8155 author = {Nick Feamster and Hari Balakrishnan}
8156} 8156}
8157@conference {Khorshadi:2005:DPR:1090948.1091369, 8157@conference {Khorshadi:2005:DPR:1090948.1091369,
@@ -8168,7 +8168,7 @@ This paper describes the design and implementation of rcc, the router configurat
8168 isbn = {0-7695-2417-6}, 8168 isbn = {0-7695-2417-6},
8169 doi = {10.1109/HOT-P2P.2005.9}, 8169 doi = {10.1109/HOT-P2P.2005.9},
8170 url = {http://dl.acm.org/citation.cfm?id=1090948.1091369}, 8170 url = {http://dl.acm.org/citation.cfm?id=1090948.1091369},
8171 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/HOT-P2P\%2705\%20-\%20Khorshadi\%2C\%20Liu\%20\%26\%20Ghosal.pdf}, 8171 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/HOT-P2P\%2705\%20-\%20Khorshadi\%2C\%20Liu\%20\%26\%20Ghosal.pdf},
8172 author = {Khorshadi, Behrooz and Liu, Xin and Dipak Ghosal} 8172 author = {Khorshadi, Behrooz and Liu, Xin and Dipak Ghosal}
8173} 8173}
8174@book {2005_3, 8174@book {2005_3,
@@ -8183,7 +8183,7 @@ This paper describes the design and implementation of rcc, the router configurat
8183 abstract = {In the last few years, an increasing number of massively distributed systems with millions of participants has emerged within very short time frames. Applications, such as instant messaging, file-sharing, and content distribution have attracted countless numbers of users. For example, Skype gained more than 2.5 millions of users within twelve months, and more than 50\% of Internet traffic is originated by BitTorrent. These very large and still rapidly growing systems attest to a new era for the design and deployment of distributed systems. In particular, they reflect what the major challenges are today for designing and implementing distributed systems: scalability, flexibility, and instant deployment}, 8183 abstract = {In the last few years, an increasing number of massively distributed systems with millions of participants has emerged within very short time frames. Applications, such as instant messaging, file-sharing, and content distribution have attracted countless numbers of users. For example, Skype gained more than 2.5 millions of users within twelve months, and more than 50\% of Internet traffic is originated by BitTorrent. These very large and still rapidly growing systems attest to a new era for the design and deployment of distributed systems. In particular, they reflect what the major challenges are today for designing and implementing distributed systems: scalability, flexibility, and instant deployment},
8184 www_section = {distributed hash table}, 8184 www_section = {distributed hash table},
8185 doi = {10.1007/11530657_7}, 8185 doi = {10.1007/11530657_7},
8186 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/LNCS\%20-\%20Distributed\%20Hash\%20Tables.pdf}, 8186 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/LNCS\%20-\%20Distributed\%20Hash\%20Tables.pdf},
8187 author = {Klaus Wehrle and G{\"o}tz, Stefan and Rieche, Simon} 8187 author = {Klaus Wehrle and G{\"o}tz, Stefan and Rieche, Simon}
8188} 8188}
8189@conference {2005_4, 8189@conference {2005_4,
@@ -8197,7 +8197,7 @@ This paper describes the design and implementation of rcc, the router configurat
8197 isbn = {3-540-29068-0, 978-3-540-29068-1}, 8197 isbn = {3-540-29068-0, 978-3-540-29068-1},
8198 doi = {10.1007/11558989_17}, 8198 doi = {10.1007/11558989_17},
8199 url = {http://dx.doi.org/10.1007/11558989_17}, 8199 url = {http://dx.doi.org/10.1007/11558989_17},
8200 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/maze_freeride.pdf}, 8200 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/maze_freeride.pdf},
8201 author = {Yang, Mao and Zhang, Zheng and Li, Xiaoming and Dai, Yafei} 8201 author = {Yang, Mao and Zhang, Zheng and Li, Xiaoming and Dai, Yafei}
8202} 8202}
8203@article {Bickson05theemule, 8203@article {Bickson05theemule,
@@ -8211,7 +8211,7 @@ This paper describes the design and implementation of rcc, the router configurat
8211 abstract = {this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitle "GNU Free Documentation License"}, 8211 abstract = {this document under the terms of the GNU Free Documentation License, Version 1.2 or any later version published by the Free Software Foundation; with no Invariant Sections, no Front-Cover Texts, and no Back-Cover Texts. A copy of the license is included in the section entitle "GNU Free Documentation License"},
8212 journal = {unknown}, 8212 journal = {unknown},
8213 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.7750}, 8213 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.7750},
8214 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.60.7750_0.pdf}, 8214 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.60.7750_0.pdf},
8215 author = {Yoram Kulbak and Danny Bickson} 8215 author = {Yoram Kulbak and Danny Bickson}
8216} 8216}
8217@conference {Wang05erasure-codingbased, 8217@conference {Wang05erasure-codingbased,
@@ -8225,7 +8225,7 @@ This paper describes the design and implementation of rcc, the router configurat
8225 www_section = {delay tolerant network, routing}, 8225 www_section = {delay tolerant network, routing},
8226 doi = {10.1145/1080139.1080140}, 8226 doi = {10.1145/1080139.1080140},
8227 url = {http://doi.acm.org/10.1145/1080139.1080140}, 8227 url = {http://doi.acm.org/10.1145/1080139.1080140},
8228 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.79.364.pdf}, 8228 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.79.364.pdf},
8229 author = {Wang, Yong and Sushant Jain and Martonosi, Margaret and Fall, Kevin} 8229 author = {Wang, Yong and Sushant Jain and Martonosi, Margaret and Fall, Kevin}
8230} 8230}
8231@conference {2005_5, 8231@conference {2005_5,
@@ -8241,7 +8241,7 @@ This paper describes the design and implementation of rcc, the router configurat
8241 www_section = {exchange-based mechanism, peer-to-peer networking, sharing}, 8241 www_section = {exchange-based mechanism, peer-to-peer networking, sharing},
8242 isbn = {0-7695-2086-3 }, 8242 isbn = {0-7695-2086-3 },
8243 doi = {10.1109/ICDCS.2004.1281619}, 8243 doi = {10.1109/ICDCS.2004.1281619},
8244 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ICDCS\%2704.pdf}, 8244 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ICDCS\%2704.pdf},
8245 author = {Kostas G. Anagnostakis and Michael B. Greenwald} 8245 author = {Kostas G. Anagnostakis and Michael B. Greenwald}
8246} 8246}
8247@conference {conf/infocom/GollapudiSZ05, 8247@conference {conf/infocom/GollapudiSZ05,
@@ -8258,7 +8258,7 @@ This paper describes the design and implementation of rcc, the router configurat
8258 isbn = {0-7803-8968-9 }, 8258 isbn = {0-7803-8968-9 },
8259 doi = {10.1109/INFCOM.2005.1498490 }, 8259 doi = {10.1109/INFCOM.2005.1498490 },
8260 url = {http://dblp.uni-trier.de/db/conf/infocom/infocom2005.html$\#$GollapudiSZ05}, 8260 url = {http://dblp.uni-trier.de/db/conf/infocom/infocom2005.html$\#$GollapudiSZ05},
8261 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2705\%20-\%20Exploiting\%20anarchy\%20in\%20networks.pdf}, 8261 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2705\%20-\%20Exploiting\%20anarchy\%20in\%20networks.pdf},
8262 author = {Gollapudi, Sreenivas and Sivakumar, D. and Zhang, Aidong} 8262 author = {Gollapudi, Sreenivas and Sivakumar, D. and Zhang, Aidong}
8263} 8263}
8264@article {10.1109/MOBIQUITOUS.2005.29, 8264@article {10.1109/MOBIQUITOUS.2005.29,
@@ -8283,7 +8283,7 @@ This paper describes the design and implementation of rcc, the router configurat
8283 address = {Los Alamitos, CA, USA}, 8283 address = {Los Alamitos, CA, USA},
8284 issn = {1526-7539}, 8284 issn = {1526-7539},
8285 doi = {http://doi.ieeecomputersociety.org/10.1109/MASCOT.2005.73}, 8285 doi = {http://doi.ieeecomputersociety.org/10.1109/MASCOT.2005.73},
8286 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SBirrer-dhtBasedMulticast_0.pdf}, 8286 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SBirrer-dhtBasedMulticast_0.pdf},
8287 author = {Stefan Birrer and Fabian E. Bustamante} 8287 author = {Stefan Birrer and Fabian E. Bustamante}
8288} 8288}
8289@conference {Wang05findingcollisions, 8289@conference {Wang05findingcollisions,
@@ -8298,7 +8298,7 @@ This paper describes the design and implementation of rcc, the router configurat
8298 isbn = {978-3-540-28114-6}, 8298 isbn = {978-3-540-28114-6},
8299 doi = {10.1007/11535218}, 8299 doi = {10.1007/11535218},
8300 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.4261}, 8300 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.94.4261},
8301 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SHA1AttackProceedingVersion.pdf}, 8301 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SHA1AttackProceedingVersion.pdf},
8302 author = {Xiaoyun Wang and Yiqun Lisa Yin and Hongbo Yu} 8302 author = {Xiaoyun Wang and Yiqun Lisa Yin and Hongbo Yu}
8303} 8303}
8304@book {DBLP:conf/p2p/EberspacherS05a, 8304@book {DBLP:conf/p2p/EberspacherS05a,
@@ -8320,7 +8320,7 @@ This paper describes the design and implementation of rcc, the router configurat
8320 year = {2005}, 8320 year = {2005},
8321 pages = {25--30}, 8321 pages = {25--30},
8322 www_section = {distributed hash table, openDHT, peer-to-peer, PlanetLab}, 8322 www_section = {distributed hash table, openDHT, peer-to-peer, PlanetLab},
8323 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/opendht-fixing.pdf}, 8323 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/opendht-fixing.pdf},
8324 author = {Rhea, S. and Chun, B.G. and Kubiatowicz, J. and S Shenker} 8324 author = {Rhea, S. and Chun, B.G. and Kubiatowicz, J. and S Shenker}
8325} 8325}
8326@conference {Fu::FlowMarking::2005, 8326@conference {Fu::FlowMarking::2005,
@@ -8334,7 +8334,7 @@ This paper describes the design and implementation of rcc, the router configurat
8334 www_section = {802.11, anonymity, Bluetooth, flow marking attack}, 8334 www_section = {802.11, anonymity, Bluetooth, flow marking attack},
8335 isbn = {0-7695-2331-5}, 8335 isbn = {0-7695-2331-5},
8336 url = {http://portal.acm.org/citation.cfm?id=1069397}, 8336 url = {http://portal.acm.org/citation.cfm?id=1069397},
8337 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Fu--FlowMarking--2005.pdf}, 8337 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Fu--FlowMarking--2005.pdf},
8338 author = {Xinwen Fu and Ye Zhu and Bryan Graham and Riccardo Bettati and Wei Zhao} 8338 author = {Xinwen Fu and Ye Zhu and Bryan Graham and Riccardo Bettati and Wei Zhao}
8339} 8339}
8340@conference {camlys05, 8340@conference {camlys05,
@@ -8351,7 +8351,7 @@ We provide a formal definition of onion-routing in the universally composable fr
8351 isbn = {978-3-540-28114-6}, 8351 isbn = {978-3-540-28114-6},
8352 doi = {10.1007/11535218}, 8352 doi = {10.1007/11535218},
8353 url = {http://www.springerlink.com/content/0jmg1krt9ph147ql/}, 8353 url = {http://www.springerlink.com/content/0jmg1krt9ph147ql/},
8354 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/camlys05.pdf}, 8354 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/camlys05.pdf},
8355 author = {Jan Camenisch and Anna Lysyanskaya}, 8355 author = {Jan Camenisch and Anna Lysyanskaya},
8356 editor = {Victor Shoup} 8356 editor = {Victor Shoup}
8357} 8357}
@@ -8368,7 +8368,7 @@ We provide a formal definition of onion-routing in the universally composable fr
8368 www_section = {distributed systems, free riding, Gnutella, peer-to-peer networking}, 8368 www_section = {distributed systems, free riding, Gnutella, peer-to-peer networking},
8369 issn = {1541-4922}, 8369 issn = {1541-4922},
8370 doi = {http://doi.ieeecomputersociety.org/10.1109/MDSO.2005.31}, 8370 doi = {http://doi.ieeecomputersociety.org/10.1109/MDSO.2005.31},
8371 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IEEE\%20DSO\%20-\%20Free\%20riding\%20on\%20Gnutella\%20revisited.pdf}, 8371 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IEEE\%20DSO\%20-\%20Free\%20riding\%20on\%20Gnutella\%20revisited.pdf},
8372 author = {Daniel Hughes and Geoff Coulson and James Walkerdine} 8372 author = {Daniel Hughes and Geoff Coulson and James Walkerdine}
8373} 8373}
8374@conference {2005_6, 8374@conference {2005_6,
@@ -8385,7 +8385,7 @@ We provide a formal definition of onion-routing in the universally composable fr
8385using biometric inputs as identities; the error-tolerance property of a Fuzzy IBE scheme is precisely what allows for the use of biometric identities, which inherently will have some noise each time they are sampled. Additionally, we show that Fuzzy-IBE can be used for a type of application that we term {\textquotedblleft}attribute-based encryption{\textquotedblright}. 8385using biometric inputs as identities; the error-tolerance property of a Fuzzy IBE scheme is precisely what allows for the use of biometric identities, which inherently will have some noise each time they are sampled. Additionally, we show that Fuzzy-IBE can be used for a type of application that we term {\textquotedblleft}attribute-based encryption{\textquotedblright}.
8386In this paper we present two constructions of Fuzzy IBE schemes. Our constructions can be viewed as an Identity-Based Encryption of a message under several attributes that compose a (fuzzy) identity. Our IBE schemes are both error-tolerant and secure against collusion attacks. Additionally, our basic construction does not use random oracles. We prove the security of our schemes under the Selective-ID security model}, 8386In this paper we present two constructions of Fuzzy IBE schemes. Our constructions can be viewed as an Identity-Based Encryption of a message under several attributes that compose a (fuzzy) identity. Our IBE schemes are both error-tolerant and secure against collusion attacks. Additionally, our basic construction does not use random oracles. We prove the security of our schemes under the Selective-ID security model},
8387 www_section = {Fuzzy IBE, IBE}, 8387 www_section = {Fuzzy IBE, IBE},
8388 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EUROCRYPT\%2705\%20-\%20Fuzzy\%20Identity-Based\%20Encryption.pdf}, 8388 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EUROCRYPT\%2705\%20-\%20Fuzzy\%20Identity-Based\%20Encryption.pdf},
8389 author = {Amit Sahai and Waters, Brent} 8389 author = {Amit Sahai and Waters, Brent}
8390} 8390}
8391@article {Jelasity:2005:GAL:1082469.1082470, 8391@article {Jelasity:2005:GAL:1082469.1082470,
@@ -8402,7 +8402,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8402 issn = {0734-2071}, 8402 issn = {0734-2071},
8403 doi = {http://doi.acm.org/10.1145/1082469.1082470}, 8403 doi = {http://doi.acm.org/10.1145/1082469.1082470},
8404 url = {http://doi.acm.org/10.1145/1082469.1082470}, 8404 url = {http://doi.acm.org/10.1145/1082469.1082470},
8405 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Jelasity\%2C\%20Montresor\%20\%26\%20Babaoglu\%20-\%20Gossip-based\%20aggregation.pdf}, 8405 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Jelasity\%2C\%20Montresor\%20\%26\%20Babaoglu\%20-\%20Gossip-based\%20aggregation.pdf},
8406 author = {M{\'a}rk Jelasity and Alberto Montresor and Babaoglu, Ozalp} 8406 author = {M{\'a}rk Jelasity and Alberto Montresor and Babaoglu, Ozalp}
8407} 8407}
8408@conference {Godfrey05heterogeneityand, 8408@conference {Godfrey05heterogeneityand,
@@ -8412,7 +8412,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8412 abstract = {Existing solutions to balance load in DHTs incur a high overhead either in terms of routing state or in terms of load movement generated by nodes arriving or departing the system. In this paper, we propose a set of general techniques and use them to develop a protocol based on Chord, called Y0 , that achieves load balancing with minimal overhead under the typical assumption that the load is uniformly distributed in the identifier space. In particular, we prove that Y0 can achieve near-optimal load balancing, while moving little load to maintain the balance and increasing the size of the routing tables by at most a constant factor}, 8412 abstract = {Existing solutions to balance load in DHTs incur a high overhead either in terms of routing state or in terms of load movement generated by nodes arriving or departing the system. In this paper, we propose a set of general techniques and use them to develop a protocol based on Chord, called Y0 , that achieves load balancing with minimal overhead under the typical assumption that the load is uniformly distributed in the identifier space. In particular, we prove that Y0 can achieve near-optimal load balancing, while moving little load to maintain the balance and increasing the size of the routing tables by at most a constant factor},
8413 www_section = {Chord, distributed hash table, load balancing}, 8413 www_section = {Chord, distributed hash table, load balancing},
8414 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.6740}, 8414 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.6740},
8415 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/paper.pdf}, 8415 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/paper.pdf},
8416 author = {Godfrey, Brighten and Ion Stoica} 8416 author = {Godfrey, Brighten and Ion Stoica}
8417} 8417}
8418@conference {Feldman:2005:HMR:1064009.1064022, 8418@conference {Feldman:2005:HMR:1064009.1064022,
@@ -8430,7 +8430,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8430 isbn = {1-59593-049-3}, 8430 isbn = {1-59593-049-3},
8431 doi = {http://doi.acm.org/10.1145/1064009.1064022}, 8431 doi = {http://doi.acm.org/10.1145/1064009.1064022},
8432 url = {http://doi.acm.org/10.1145/1064009.1064022}, 8432 url = {http://doi.acm.org/10.1145/1064009.1064022},
8433 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EC\%2705\%20-\%20Hidden-action\%20in\%20multi-hop\%20routing.pdf}, 8433 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EC\%2705\%20-\%20Hidden-action\%20in\%20multi-hop\%20routing.pdf},
8434 author = {Michal Feldman and John Chuang and Ion Stoica and S Shenker} 8434 author = {Michal Feldman and John Chuang and Ion Stoica and S Shenker}
8435} 8435}
8436@conference {IPTPS05, 8436@conference {IPTPS05,
@@ -8446,7 +8446,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8446 abstract = {High availability in peer-to-peer DHTs requires data redundancy. This paper compares two popular redundancy schemes: replication and erasure coding. Unlike previous comparisons, we take the characteristics of the nodes that comprise the overlay into account, and conclude that in some cases the benefits from coding are limited, and may not be worth its disadvantages}, 8446 abstract = {High availability in peer-to-peer DHTs requires data redundancy. This paper compares two popular redundancy schemes: replication and erasure coding. Unlike previous comparisons, we take the characteristics of the nodes that comprise the overlay into account, and conclude that in some cases the benefits from coding are limited, and may not be worth its disadvantages},
8447 www_section = {distributed hash table, erasure coding, high availability, peer-to-peer networking, redundancy, Replication}, 8447 www_section = {distributed hash table, erasure coding, high availability, peer-to-peer networking, redundancy, Replication},
8448 doi = {10.1007/11558989_21}, 8448 doi = {10.1007/11558989_21},
8449 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IPTPS\%2705\%20-\%20High\%20availability\%20in\%20DHTs\%3A\%20erasure\%20coding\%20vs.\%20replication.pdf}, 8449 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IPTPS\%2705\%20-\%20High\%20availability\%20in\%20DHTs\%3A\%20erasure\%20coding\%20vs.\%20replication.pdf},
8450 author = {Rodrigues, Rodrigo and Barbara Liskov} 8450 author = {Rodrigues, Rodrigo and Barbara Liskov}
8451} 8451}
8452@conference {Acedanski05howgood, 8452@conference {Acedanski05howgood,
@@ -8459,7 +8459,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8459 address = {Riva del Garda, Italy}, 8459 address = {Riva del Garda, Italy},
8460 abstract = {We consider the problem of storing a large file or multiple large files in a distributed manner over a network. In the framework we consider, there are multiple storage locations, each of which only have very limited storage space for each file. Each storage location chooses a part (or a coded version of the parts) of the file without the knowledge of what is stored in the other locations. We want a file-downloader to connect to as few storage locations as possible and retrieve the entire file. We compare the performance of three strategies: uncoded storage, traditional erasure coding based storage, random linear coding based storage motivated by network coding. We demonstrate that, in principle, a traditional erasure coding based storage (eg: Reed-Solomon Codes) strategy can almost do as well as one can ask for with appropriate choice of parameters. However, the cost is a large amount of additional storage space required at the centralized server before distribution among multiple locations. The random linear coding based strategy performs as well without suffering from any such disadvantage. Further, with a probability close to one, the minimum number of storage location a downloader needs to connect to (for reconstructing the entire file), can be very close to the case where there is complete coordination between the storage locations and the downloader. We also argue that an uncoded strategy performs poorly}, 8460 abstract = {We consider the problem of storing a large file or multiple large files in a distributed manner over a network. In the framework we consider, there are multiple storage locations, each of which only have very limited storage space for each file. Each storage location chooses a part (or a coded version of the parts) of the file without the knowledge of what is stored in the other locations. We want a file-downloader to connect to as few storage locations as possible and retrieve the entire file. We compare the performance of three strategies: uncoded storage, traditional erasure coding based storage, random linear coding based storage motivated by network coding. We demonstrate that, in principle, a traditional erasure coding based storage (eg: Reed-Solomon Codes) strategy can almost do as well as one can ask for with appropriate choice of parameters. However, the cost is a large amount of additional storage space required at the centralized server before distribution among multiple locations. The random linear coding based strategy performs as well without suffering from any such disadvantage. Further, with a probability close to one, the minimum number of storage location a downloader needs to connect to (for reconstructing the entire file), can be very close to the case where there is complete coordination between the storage locations and the downloader. We also argue that an uncoded strategy performs poorly},
8461 www_section = {distributed networked storage, limited storage, linear coding, multiple storage locations}, 8461 www_section = {distributed networked storage, limited storage, linear coding, multiple storage locations},
8462 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NetCod\%2705\%20-\%20Random\%20linear\%20coding\%20based\%20distributed\%20networked\%20storage.pdf}, 8462 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NetCod\%2705\%20-\%20Random\%20linear\%20coding\%20based\%20distributed\%20networked\%20storage.pdf},
8463 author = {Szymon Aceda{\'n}ski and Supratim Deb and Muriel M{\'e}dard and Ralf Koetter} 8463 author = {Szymon Aceda{\'n}ski and Supratim Deb and Muriel M{\'e}dard and Ralf Koetter}
8464} 8464}
8465@article {Zoels05thehybrid, 8465@article {Zoels05thehybrid,
@@ -8472,7 +8472,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8472 issn = {0302-9743}, 8472 issn = {0302-9743},
8473 doi = {10.1007/b107118}, 8473 doi = {10.1007/b107118},
8474 url = {http://www.springerlink.com/content/pdn9ttp0bvk0f3e9/}, 8474 url = {http://www.springerlink.com/content/pdn9ttp0bvk0f3e9/},
8475 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.68.7579.pdf}, 8475 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.68.7579.pdf},
8476 author = {Stefan Z{\"o}ls and R{\"u}diger Schollmeier and Wolfgang Kellerer and Anthony Tarlano} 8476 author = {Stefan Z{\"o}ls and R{\"u}diger Schollmeier and Wolfgang Kellerer and Anthony Tarlano}
8477} 8477}
8478@conference {1103797, 8478@conference {1103797,
@@ -8488,7 +8488,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8488 isbn = {1-59593-233-X}, 8488 isbn = {1-59593-233-X},
8489 doi = {10.1145/1103780.1103797}, 8489 doi = {10.1145/1103780.1103797},
8490 url = {http://portal.acm.org/citation.cfm?id=1103797$\#$}, 8490 url = {http://portal.acm.org/citation.cfm?id=1103797$\#$},
8491 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/w8paper13.pdf}, 8491 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/w8paper13.pdf},
8492 author = {Lihao Xu} 8492 author = {Lihao Xu}
8493} 8493}
8494@conference {1095944, 8494@conference {1095944,
@@ -8504,7 +8504,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8504 isbn = {1-59593-197-X}, 8504 isbn = {1-59593-197-X},
8505 doi = {10.1145/1095921.1095944}, 8505 doi = {10.1145/1095921.1095944},
8506 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.8807}, 8506 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.8807},
8507 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/RR-5578.pdf}, 8507 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/RR-5578.pdf},
8508 author = {Christoph Neumann and Aur{\'e}lien Francillon and David Furodet} 8508 author = {Christoph Neumann and Aur{\'e}lien Francillon and David Furodet}
8509} 8509}
8510@article {1646697, 8510@article {1646697,
@@ -8521,7 +8521,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8521 issn = {0140-3664}, 8521 issn = {0140-3664},
8522 doi = {10.1016/j.comcom.2005.02.008}, 8522 doi = {10.1016/j.comcom.2005.02.008},
8523 url = {http://portal.acm.org/citation.cfm?id=1646697$\#$}, 8523 url = {http://portal.acm.org/citation.cfm?id=1646697$\#$},
8524 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.68.5832.pdf}, 8524 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.68.5832.pdf},
8525 author = {Baumung, Peter and Martina Zitterbart and Kendy Kutzner} 8525 author = {Baumung, Peter and Martina Zitterbart and Kendy Kutzner}
8526} 8526}
8527@conference {Jun:2005:IBI:1080192.1080199, 8527@conference {Jun:2005:IBI:1080192.1080199,
@@ -8539,7 +8539,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8539 isbn = {1-59593-026-4}, 8539 isbn = {1-59593-026-4},
8540 doi = {http://doi.acm.org/10.1145/1080192.1080199}, 8540 doi = {http://doi.acm.org/10.1145/1080192.1080199},
8541 url = {http://doi.acm.org/10.1145/1080192.1080199}, 8541 url = {http://doi.acm.org/10.1145/1080192.1080199},
8542 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/P2PECON\%2705\%20-\%20Incentives\%20in\%20BitTorrent\%20induce\%20free\%20riding.pdf}, 8542 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/P2PECON\%2705\%20-\%20Incentives\%20in\%20BitTorrent\%20induce\%20free\%20riding.pdf},
8543 author = {Jun, Seung and Ahamad, Mustaque} 8543 author = {Jun, Seung and Ahamad, Mustaque}
8544} 8544}
8545@conference {Andrade:2005:ICB:1080192.1080198, 8545@conference {Andrade:2005:ICB:1080192.1080198,
@@ -8557,7 +8557,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8557 isbn = {1-59593-026-4}, 8557 isbn = {1-59593-026-4},
8558 doi = {http://doi.acm.org/10.1145/1080192.1080198}, 8558 doi = {http://doi.acm.org/10.1145/1080192.1080198},
8559 url = {http://doi.acm.org/10.1145/1080192.1080198}, 8559 url = {http://doi.acm.org/10.1145/1080192.1080198},
8560 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/coopbittorrentcom_0.pdf}, 8560 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/coopbittorrentcom_0.pdf},
8561 author = {Nazareno Andrade and Miranda Mowbray and Lima, Aliandro and Wagner, Gustavo and Ripeanu, Matei} 8561 author = {Nazareno Andrade and Miranda Mowbray and Lima, Aliandro and Wagner, Gustavo and Ripeanu, Matei}
8562} 8562}
8563@proceedings {2005_7, 8563@proceedings {2005_7,
@@ -8578,7 +8578,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8578 abstract = {Most research activities in the field of peer-to-peer (P2P) computing are concerned with routing in virtualized overlay networks. These overlays generally assume node connectivity to be provided by an underlying network-layer routing protocol. This duplication of functionality can give rise to severe inefficiencies. In contrast, we suggest a cross-layer approach where the P2P overlay network also provides the required network-layer routing functionality by itself. Especially in sensor networks, where special attention has to be paid to the nodes' limited capabilities, this can greatly help in reducing the message overhead. In this paper, we present a key building block for such a protocol, the iterative successor pointer rewiring protocol (ISPRP), which efficiently initializes a P2P routing network among a freshly deployed set of nodes having but link-layer connectivity. ISPRP works in a fully self-organizing way and issues only a small per-node amount of messages by keeping interactions between nodes as local as possible}, 8578 abstract = {Most research activities in the field of peer-to-peer (P2P) computing are concerned with routing in virtualized overlay networks. These overlays generally assume node connectivity to be provided by an underlying network-layer routing protocol. This duplication of functionality can give rise to severe inefficiencies. In contrast, we suggest a cross-layer approach where the P2P overlay network also provides the required network-layer routing functionality by itself. Especially in sensor networks, where special attention has to be paid to the nodes' limited capabilities, this can greatly help in reducing the message overhead. In this paper, we present a key building block for such a protocol, the iterative successor pointer rewiring protocol (ISPRP), which efficiently initializes a P2P routing network among a freshly deployed set of nodes having but link-layer connectivity. ISPRP works in a fully self-organizing way and issues only a small per-node amount of messages by keeping interactions between nodes as local as possible},
8579 www_section = {P2P}, 8579 www_section = {P2P},
8580 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 8580 url = {http://i30www.ira.uka.de/research/publications/p2p/},
8581 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cramer05isprp.pdf}, 8581 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cramer05isprp.pdf},
8582 author = {Cramer, Curt and Thomas Fuhrmann} 8582 author = {Cramer, Curt and Thomas Fuhrmann}
8583} 8583}
8584@article {1064217, 8584@article {1064217,
@@ -8595,7 +8595,7 @@ In this paper we present two constructions of Fuzzy IBE schemes. Our constructio
8595 issn = {0163-5999}, 8595 issn = {0163-5999},
8596 doi = {10.1145/1071690.1064217}, 8596 doi = {10.1145/1071690.1064217},
8597 url = {http://portal.acm.org/citation.cfm?id=1071690.1064217$\#$}, 8597 url = {http://portal.acm.org/citation.cfm?id=1071690.1064217$\#$},
8598 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.83.5920.pdf}, 8598 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.83.5920.pdf},
8599 author = {Leonard, Derek and Rai, Vivek and Loguinov, Dmitri} 8599 author = {Leonard, Derek and Rai, Vivek and Loguinov, Dmitri}
8600} 8600}
8601@conference {esorics05-Klonowski, 8601@conference {esorics05-Klonowski,
@@ -8612,7 +8612,7 @@ Our results contradict some beliefs that the protocols mentioned guarantee anony
8612 isbn = {978-3-540-28963-0}, 8612 isbn = {978-3-540-28963-0},
8613 doi = {10.1007/11555827}, 8613 doi = {10.1007/11555827},
8614 url = {http://www.springerlink.com/content/ewblt5k80xrgqe4j/}, 8614 url = {http://www.springerlink.com/content/ewblt5k80xrgqe4j/},
8615 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/esorics05-Klonowski.pdf}, 8615 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/esorics05-Klonowski.pdf},
8616 author = {Marcin Gogolewski and Marek Klonowski and Miroslaw Kutylowski} 8616 author = {Marcin Gogolewski and Marek Klonowski and Miroslaw Kutylowski}
8617} 8617}
8618@article {1042380, 8618@article {1042380,
@@ -8642,7 +8642,7 @@ Our results contradict some beliefs that the protocols mentioned guarantee anony
8642 www_section = {anonymity, onion routing, traffic analysis}, 8642 www_section = {anonymity, onion routing, traffic analysis},
8643 isbn = {0-7695-2339-0}, 8643 isbn = {0-7695-2339-0},
8644 url = {http://portal.acm.org/citation.cfm?id=1059390}, 8644 url = {http://portal.acm.org/citation.cfm?id=1059390},
8645 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/torta05.pdf}, 8645 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/torta05.pdf},
8646 author = {Steven J. Murdoch and George Danezis} 8646 author = {Steven J. Murdoch and George Danezis}
8647} 8647}
8648@conference {Fiat05makingchord, 8648@conference {Fiat05makingchord,
@@ -8656,7 +8656,7 @@ Our results contradict some beliefs that the protocols mentioned guarantee anony
8656 www_section = {Chord, distributed hash table, robustness}, 8656 www_section = {Chord, distributed hash table, robustness},
8657 doi = {10.1007/11561071}, 8657 doi = {10.1007/11561071},
8658 url = {http://www.springerlink.com/content/422llxn7khwej72n/}, 8658 url = {http://www.springerlink.com/content/422llxn7khwej72n/},
8659 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/swarm.pdf}, 8659 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/swarm.pdf},
8660 author = {Amos Fiat and Jared Saia and Maxwell Young} 8660 author = {Amos Fiat and Jared Saia and Maxwell Young}
8661} 8661}
8662@conference { wang:market-driven, 8662@conference { wang:market-driven,
@@ -8672,7 +8672,7 @@ Our results contradict some beliefs that the protocols mentioned guarantee anony
8672 www_section = {bandwidth allocation, economics, market-driven, prescribed protocol, selfish overlay network}, 8672 www_section = {bandwidth allocation, economics, market-driven, prescribed protocol, selfish overlay network},
8673 isbn = {0-7803-8968-9 }, 8673 isbn = {0-7803-8968-9 },
8674 doi = {http://dx.doi.org/10.1109/INFCOM.2005.1498542}, 8674 doi = {http://dx.doi.org/10.1109/INFCOM.2005.1498542},
8675 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2705\%20-\%20Market-driven\%20bandwidth\%20allocation.pdf}, 8675 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2705\%20-\%20Market-driven\%20bandwidth\%20allocation.pdf},
8676 author = {Weihong Wang and Baochun Li} 8676 author = {Weihong Wang and Baochun Li}
8677} 8677}
8678@conference {Guo:2005:MAM:1251086.1251090, 8678@conference {Guo:2005:MAM:1251086.1251090,
@@ -8688,7 +8688,7 @@ Our results contradict some beliefs that the protocols mentioned guarantee anony
8688 abstract = {Existing studies on BitTorrent systems are single-torrent based, while more than 85\% of all peers participate in multiple torrents according to our trace analysis. In addition, these studies are not sufficiently insightful and accurate even for single-torrent models, due to some unrealistic assumptions. Our analysis of representative Bit-Torrent traffic provides several new findings regarding the limitations of BitTorrent systems: (1) Due to the exponentially decreasing peer arrival rate in reality, service availability in such systems becomes poor quickly, after which it is difficult for the file to be located and downloaded. (2) Client performance in the BitTorrent-like systems is unstable, and fluctuates widely with the peer population. (3) Existing systems could provide unfair services to peers, where peers with high downloading speed tend to download more and upload less. In this paper, we study these limitations on torrent evolution in realistic environments. Motivated by the analysis and modeling results, we further build a graph based multi-torrent model to study inter-torrent collaboration. Our model quantitatively provides strong motivation for inter-torrent collaboration instead of directly stimulating seeds to stay longer. We also discuss a system design to show the feasibility of multi-torrent collaboration}, 8688 abstract = {Existing studies on BitTorrent systems are single-torrent based, while more than 85\% of all peers participate in multiple torrents according to our trace analysis. In addition, these studies are not sufficiently insightful and accurate even for single-torrent models, due to some unrealistic assumptions. Our analysis of representative Bit-Torrent traffic provides several new findings regarding the limitations of BitTorrent systems: (1) Due to the exponentially decreasing peer arrival rate in reality, service availability in such systems becomes poor quickly, after which it is difficult for the file to be located and downloaded. (2) Client performance in the BitTorrent-like systems is unstable, and fluctuates widely with the peer population. (3) Existing systems could provide unfair services to peers, where peers with high downloading speed tend to download more and upload less. In this paper, we study these limitations on torrent evolution in realistic environments. Motivated by the analysis and modeling results, we further build a graph based multi-torrent model to study inter-torrent collaboration. Our model quantitatively provides strong motivation for inter-torrent collaboration instead of directly stimulating seeds to stay longer. We also discuss a system design to show the feasibility of multi-torrent collaboration},
8689 www_section = {bittorrent system, intertorrent collaboration, multi-torrent collaboration, multiple torrents}, 8689 www_section = {bittorrent system, intertorrent collaboration, multi-torrent collaboration, multiple torrents},
8690 url = {http://www.usenix.org/events/imc05/tech/full_papers/guo/guo_html/}, 8690 url = {http://www.usenix.org/events/imc05/tech/full_papers/guo/guo_html/},
8691 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IMC\%2705\%20-\%20Measurement\%2C\%20analysis\%20and\%20modeling\%20of\%20BitTorrent-like\%20systems.pdf}, 8691 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IMC\%2705\%20-\%20Measurement\%2C\%20analysis\%20and\%20modeling\%20of\%20BitTorrent-like\%20systems.pdf},
8692 author = {Guo, Lei and Chen, Songqing and Xiao, Zhen and Tan, Enhua and Ding, Xiaoning and Zhang, Xiaodong} 8692 author = {Guo, Lei and Chen, Songqing and Xiao, Zhen and Tan, Enhua and Ding, Xiaoning and Zhang, Xiaodong}
8693} 8693}
8694@conference {kutzner05overnet, 8694@conference {kutzner05overnet,
@@ -8703,7 +8703,7 @@ This paper reports the results from a two week measurement of the entire Overnet
8703 isbn = {978-3-540-24473-8}, 8703 isbn = {978-3-540-24473-8},
8704 doi = {10.1007/b138861}, 8704 doi = {10.1007/b138861},
8705 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 8705 url = {http://i30www.ira.uka.de/research/publications/p2p/},
8706 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/kutzner05overnet.pdf}, 8706 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/kutzner05overnet.pdf},
8707 author = {Kendy Kutzner and Thomas Fuhrmann} 8707 author = {Kendy Kutzner and Thomas Fuhrmann}
8708} 8708}
8709@conference {pet05-serjantov, 8709@conference {pet05-serjantov,
@@ -8719,7 +8719,7 @@ This paper reports the results from a two week measurement of the entire Overnet
8719 isbn = {978-3-540-34745-3}, 8719 isbn = {978-3-540-34745-3},
8720 doi = {10.1007/11767831}, 8720 doi = {10.1007/11767831},
8721 url = {http://www.springerlink.com/content/375x2pv385388h86/}, 8721 url = {http://www.springerlink.com/content/375x2pv385388h86/},
8722 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/pet05-serjantov.pdf}, 8722 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/pet05-serjantov.pdf},
8723 author = {Andrei Serjantov and Steven J. Murdoch} 8723 author = {Andrei Serjantov and Steven J. Murdoch}
8724} 8724}
8725@conference {pet05-camenisch, 8725@conference {pet05-camenisch,
@@ -8750,7 +8750,7 @@ This paper reports the results from a two week measurement of the entire Overnet
8750 www_section = {large scale content distribution, network coding}, 8750 www_section = {large scale content distribution, network coding},
8751 isbn = {0-7803-8968-9 }, 8751 isbn = {0-7803-8968-9 },
8752 doi = {http://dx.doi.org/10.1109/INFCOM.2005.1498511}, 8752 doi = {http://dx.doi.org/10.1109/INFCOM.2005.1498511},
8753 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2705\%20-\%20Network\%20coding\%20for\%20large\%20scale\%20content\%20distribution.pdf}, 8753 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2705\%20-\%20Network\%20coding\%20for\%20large\%20scale\%20content\%20distribution.pdf},
8754 author = {Christos Gkantsidis and Pablo Rodriguez} 8754 author = {Christos Gkantsidis and Pablo Rodriguez}
8755} 8755}
8756@conference {Sanghavi:2005:NMF:1080192.1080200, 8756@conference {Sanghavi:2005:NMF:1080192.1080200,
@@ -8768,7 +8768,7 @@ This paper reports the results from a two week measurement of the entire Overnet
8768 isbn = {1-59593-026-4}, 8768 isbn = {1-59593-026-4},
8769 doi = {http://doi.acm.org/10.1145/1080192.1080200}, 8769 doi = {http://doi.acm.org/10.1145/1080192.1080200},
8770 url = {http://doi.acm.org/10.1145/1080192.1080200}, 8770 url = {http://doi.acm.org/10.1145/1080192.1080200},
8771 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/P2PEcon\%2705\%20-\%20A\%20new\%20mechanism\%20for\%20the\%20free-rider\%20problem.pdf}, 8771 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/P2PEcon\%2705\%20-\%20A\%20new\%20mechanism\%20for\%20the\%20free-rider\%20problem.pdf},
8772 author = {Sanghavi, Sujay and Hajek, Bruce} 8772 author = {Sanghavi, Sujay and Hajek, Bruce}
8773} 8773}
8774@conference {1251532, 8774@conference {1251532,
@@ -8782,7 +8782,7 @@ This paper reports the results from a two week measurement of the entire Overnet
8782 abstract = {The most basic functionality of a distributed hash table, or DHT, is to partition a key space across the set of nodes in a distributed system such that all nodes agree on the partitioning. For example, the Chord DHT assigns each node}, 8782 abstract = {The most basic functionality of a distributed hash table, or DHT, is to partition a key space across the set of nodes in a distributed system such that all nodes agree on the partitioning. For example, the Chord DHT assigns each node},
8783 www_section = {Chord, distributed hash table}, 8783 www_section = {Chord, distributed hash table},
8784 url = {http://portal.acm.org/citation.cfm?id=1251532$\#$}, 8784 url = {http://portal.acm.org/citation.cfm?id=1251532$\#$},
8785 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ntr-worlds05.pdf}, 8785 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ntr-worlds05.pdf},
8786 author = {Michael J. Freedman and Lakshminarayanan, Karthik and Rhea, Sean C. and Ion Stoica} 8786 author = {Michael J. Freedman and Lakshminarayanan, Karthik and Rhea, Sean C. and Ion Stoica}
8787} 8787}
8788@booklet {cryptoeprint:2005:394, 8788@booklet {cryptoeprint:2005:394,
@@ -8794,7 +8794,7 @@ This paper reports the results from a two week measurement of the entire Overnet
8794We introduce and implement Obfuscated Ciphertext Mixing, the obfuscation of a mixnet program. Using this technique, all proofs can be performed before the mixing process, even before the inputs are available. In addition, the mixing program does not need to be secret: anyone can publicly compute the shuffle (though not the decryption). We frame this functionality in the strongest obfuscation setting proposed by Barak et. al. [4], tweaked for the public-key setting. For applications where the secrecy of the shuffle permutation is particularly important (e.g. voting), we also consider the Distributed Obfuscation of a Mixer, where multiple trustees cooperate to generate an obfuscated mixer program such that no single trustee knows the composed shuffle permutation}, 8794We introduce and implement Obfuscated Ciphertext Mixing, the obfuscation of a mixnet program. Using this technique, all proofs can be performed before the mixing process, even before the inputs are available. In addition, the mixing program does not need to be secret: anyone can publicly compute the shuffle (though not the decryption). We frame this functionality in the strongest obfuscation setting proposed by Barak et. al. [4], tweaked for the public-key setting. For applications where the secrecy of the shuffle permutation is particularly important (e.g. voting), we also consider the Distributed Obfuscation of a Mixer, where multiple trustees cooperate to generate an obfuscated mixer program such that no single trustee knows the composed shuffle permutation},
8795 www_section = {obfuscated ciphertext mixing}, 8795 www_section = {obfuscated ciphertext mixing},
8796 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.6592}, 8796 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.60.6592},
8797 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cryptoeprint-2005-394.pdf}, 8797 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cryptoeprint-2005-394.pdf},
8798 author = {Ben Adida and Douglas Wikstr{\"o}m} 8798 author = {Ben Adida and Douglas Wikstr{\"o}m}
8799} 8799}
8800@conference {Garcia05off-linekarma:, 8800@conference {Garcia05off-linekarma:,
@@ -8811,7 +8811,7 @@ We introduce and implement Obfuscated Ciphertext Mixing, the obfuscation of a mi
8811 abstract = {Peer-to-peer (P2P) and grid systems allow their users to exchange information and share resources, with little centralised or hierarchical control, instead relying on the fairness of the users to make roughly as much resources available as they use. To enforce this balance, some kind of currency or barter (called karma) is needed that must be exchanged for resources thus limiting abuse. We present a completely decentralised, off-line karma implementation for P2P and grid systems, that detects double-spending and other types of fraud under varying adversarial scenarios. The system is based on tracing the spending pattern of coins, and distributing the normally central role of a bank over a predetermined, but random, selection of nodes. The system is designed to allow nodes to join and leave the system at arbitrary times}, 8811 abstract = {Peer-to-peer (P2P) and grid systems allow their users to exchange information and share resources, with little centralised or hierarchical control, instead relying on the fairness of the users to make roughly as much resources available as they use. To enforce this balance, some kind of currency or barter (called karma) is needed that must be exchanged for resources thus limiting abuse. We present a completely decentralised, off-line karma implementation for P2P and grid systems, that detects double-spending and other types of fraud under varying adversarial scenarios. The system is based on tracing the spending pattern of coins, and distributing the normally central role of a bank over a predetermined, but random, selection of nodes. The system is designed to allow nodes to join and leave the system at arbitrary times},
8812 www_section = {decentralized, free-riding, GRID, micropayments, peer-to-peer networking, security}, 8812 www_section = {decentralized, free-riding, GRID, micropayments, peer-to-peer networking, security},
8813 doi = {10.1007/11496137_25}, 8813 doi = {10.1007/11496137_25},
8814 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ACNS\%2705\%20-\%20Garcia\%20\%26\%20Hoepman\%20-\%20Off-line\%20Karma.pdf}, 8814 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ACNS\%2705\%20-\%20Garcia\%20\%26\%20Hoepman\%20-\%20Off-line\%20Karma.pdf},
8815 author = {Flavio D. Garcia and Jaap-Henk Hoepman} 8815 author = {Flavio D. Garcia and Jaap-Henk Hoepman}
8816} 8816}
8817@conference {2005_8, 8817@conference {2005_8,
@@ -8828,7 +8828,7 @@ We introduce and implement Obfuscated Ciphertext Mixing, the obfuscation of a mi
8828 doi = {10.1145/1080091.1080102}, 8828 doi = {10.1145/1080091.1080102},
8829 author = {unknown}, 8829 author = {unknown},
8830 url = {http://doi.acm.org/10.1145/1080091.1080102}, 8830 url = {http://doi.acm.org/10.1145/1080091.1080102},
8831 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/openDHT.pdf} 8831 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/openDHT.pdf}
8832} 8832}
8833@article {Feldman:2005:OFB:1120717.1120723, 8833@article {Feldman:2005:OFB:1120717.1120723,
8834 title = {Overcoming free-riding behavior in peer-to-peer systems}, 8834 title = {Overcoming free-riding behavior in peer-to-peer systems},
@@ -8844,7 +8844,7 @@ We introduce and implement Obfuscated Ciphertext Mixing, the obfuscation of a mi
8844 issn = {1551-9031}, 8844 issn = {1551-9031},
8845 doi = {http://doi.acm.org/10.1145/1120717.1120723}, 8845 doi = {http://doi.acm.org/10.1145/1120717.1120723},
8846 url = {http://doi.acm.org/10.1145/1120717.1120723}, 8846 url = {http://doi.acm.org/10.1145/1120717.1120723},
8847 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGecom\%20Exch.\%20\%285\%29\%20-\%20Overcoming\%20free-riding\%20behavior.pdf}, 8847 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGecom\%20Exch.\%20\%285\%29\%20-\%20Overcoming\%20free-riding\%20behavior.pdf},
8848 author = {Michal Feldman and John Chuang} 8848 author = {Michal Feldman and John Chuang}
8849} 8849}
8850@article {2005_9, 8850@article {2005_9,
@@ -8858,7 +8858,7 @@ We introduce and implement Obfuscated Ciphertext Mixing, the obfuscation of a mi
8858 www_section = {contracts, framework, P2P, peer-to-peer networking, resource exchange, service exchange}, 8858 www_section = {contracts, framework, P2P, peer-to-peer networking, resource exchange, service exchange},
8859 issn = {0167-739X}, 8859 issn = {0167-739X},
8860 doi = {10.1016/j.future.2004.04.013 }, 8860 doi = {10.1016/j.future.2004.04.013 },
8861 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/FGCS\%20-\%20P2P\%20Contracts\%3A\%20a\%20Framework\%20for\%20Resource\%20and\%20Service\%20Exchange.pdf}, 8861 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/FGCS\%20-\%20P2P\%20Contracts\%3A\%20a\%20Framework\%20for\%20Resource\%20and\%20Service\%20Exchange.pdf},
8862 author = {Dipak Ghosal and Benjamin K. Poon and Keith Kong} 8862 author = {Dipak Ghosal and Benjamin K. Poon and Keith Kong}
8863} 8863}
8864@conference { busca:pastis:, 8864@conference { busca:pastis:,
@@ -8875,7 +8875,7 @@ Pastis' design is simple compared to other existing systems, as it does not requ
8875We have developed a prototype based on the FreePastry open-source implementation of the Past DHT. We have used this prototype to evaluate several characteristics of our file system design. Supporting the close-to-open consistency model, plus a variant of the read-your-writes model, our prototype shows that Pastis is between 1.4 to 1.8 times slower than NFS. In comparison, Ivy and Oceanstore are between two to three times slower than NFS}, 8875We have developed a prototype based on the FreePastry open-source implementation of the Past DHT. We have used this prototype to evaluate several characteristics of our file system design. Supporting the close-to-open consistency model, plus a variant of the read-your-writes model, our prototype shows that Pastis is between 1.4 to 1.8 times slower than NFS. In comparison, Ivy and Oceanstore are between two to three times slower than NFS},
8876 www_section = {distributed hash table, multi-user, Pastis, peer-to-peer file system, read-write}, 8876 www_section = {distributed hash table, multi-user, Pastis, peer-to-peer file system, read-write},
8877 doi = {10.1007/11549468_128}, 8877 doi = {10.1007/11549468_128},
8878 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Euro-Par\%2705\%20-\%20Pastis.pdf}, 8878 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Euro-Par\%2705\%20-\%20Pastis.pdf},
8879 author = {Jean-Michel Busca and Fabio Picconi and Pierre Sens} 8879 author = {Jean-Michel Busca and Fabio Picconi and Pierre Sens}
8880} 8880}
8881@conference {Massachusetts05peer-to-peercommunication, 8881@conference {Massachusetts05peer-to-peercommunication,
@@ -8890,7 +8890,7 @@ We have developed a prototype based on the FreePastry open-source implementation
8890 abstract = {Network Address Translation (NAT) causes well-known difficulties for peer-to-peer (P2P) communication, since the peers involved may not be reachable at any globally valid IP address. Several NAT traversal techniques are known, but their documentation is slim, and data about their robustness or relative merits is slimmer. This paper documents and analyzes one of the simplest but most robust and practical NAT traversal techniques, commonly known as hole punching. Hole punching is moderately well-understood for UDP communication, but we show how it can be reliably used to set up peer-to-peer TCP streams as well. After gathering data on the reliability of this technique on a wide variety of deployed NATs, we nd that about 82\% of the NATs tested support hole punching for UDP, and about 64\% support hole punching for TCP streams. As NAT vendors become increasingly conscious of the needs of important P2P applications such as Voice over IP and online gaming protocols, support for hole punching is likely to increase in the future}, 8890 abstract = {Network Address Translation (NAT) causes well-known difficulties for peer-to-peer (P2P) communication, since the peers involved may not be reachable at any globally valid IP address. Several NAT traversal techniques are known, but their documentation is slim, and data about their robustness or relative merits is slimmer. This paper documents and analyzes one of the simplest but most robust and practical NAT traversal techniques, commonly known as hole punching. Hole punching is moderately well-understood for UDP communication, but we show how it can be reliably used to set up peer-to-peer TCP streams as well. After gathering data on the reliability of this technique on a wide variety of deployed NATs, we nd that about 82\% of the NATs tested support hole punching for UDP, and about 64\% support hole punching for TCP streams. As NAT vendors become increasingly conscious of the needs of important P2P applications such as Voice over IP and online gaming protocols, support for hole punching is likely to increase in the future},
8891 www_section = {communication network, ip address, NAT, nat traversal techniques, network address translation, P2P, peer-to-peer networking}, 8891 www_section = {communication network, ip address, NAT, nat traversal techniques, network address translation, P2P, peer-to-peer networking},
8892 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.6799\&rep=rep1\&type=pdf}, 8892 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.59.6799\&rep=rep1\&type=pdf},
8893 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.59.6799.pdf}, 8893 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.59.6799.pdf},
8894 author = {Pyda Srisuresh and Bryan Ford and Dan Kegel} 8894 author = {Pyda Srisuresh and Bryan Ford and Dan Kegel}
8895} 8895}
8896@booklet {Fuhrmann_aplatform, 8896@booklet {Fuhrmann_aplatform,
@@ -8899,7 +8899,7 @@ We have developed a prototype based on the FreePastry open-source implementation
8899 abstract = {Programming of and experiences with sensor network nodes are about to enter the curricula of technical universities. Often however, practical obstacles complicate the implementation of a didactic concept. In this paper we present our approach that uses a Java virtual machine to decouple experiments with algorithm and protocol concepts from the odds of embedded system programming. This concept enables students to load Java classes via an SD-card into a sensor node. An LC display provides detailed information if the program aborts due to bugs}, 8899 abstract = {Programming of and experiences with sensor network nodes are about to enter the curricula of technical universities. Often however, practical obstacles complicate the implementation of a didactic concept. In this paper we present our approach that uses a Java virtual machine to decouple experiments with algorithm and protocol concepts from the odds of embedded system programming. This concept enables students to load Java classes via an SD-card into a sensor node. An LC display provides detailed information if the program aborts due to bugs},
8900 www_section = {sensor networks}, 8900 www_section = {sensor networks},
8901 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.72.8036}, 8901 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.72.8036},
8902 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.72.8036.pdf}, 8902 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.72.8036.pdf},
8903 author = {Thomas Fuhrmann and Till Harbaum} 8903 author = {Thomas Fuhrmann and Till Harbaum}
8904} 8904}
8905@conference {Ali:2005:PTA:1082473.1082631, 8905@conference {Ali:2005:PTA:1082473.1082631,
@@ -8917,7 +8917,7 @@ We have developed a prototype based on the FreePastry open-source implementation
8917 isbn = {1-59593-093-0}, 8917 isbn = {1-59593-093-0},
8918 doi = {10.1145/1082473.1082631}, 8918 doi = {10.1145/1082473.1082631},
8919 url = {http://doi.acm.org/10.1145/1082473.1082631}, 8919 url = {http://doi.acm.org/10.1145/1082473.1082631},
8920 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/AAMAS\%2705\%20-\%20Accelerating\%20the\%20DCOP\%20algorithm\%20ADOPT.pdf}, 8920 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/AAMAS\%2705\%20-\%20Accelerating\%20the\%20DCOP\%20algorithm\%20ADOPT.pdf},
8921 author = {Ali, Syed and Koenig, Sven and Tambe, Milind} 8921 author = {Ali, Syed and Koenig, Sven and Tambe, Milind}
8922} 8922}
8923@article {2005_10, 8923@article {2005_10,
@@ -8931,7 +8931,7 @@ We have developed a prototype based on the FreePastry open-source implementation
8931 issn = {1071-5819}, 8931 issn = {1071-5819},
8932 doi = {10.1016/j.ijhcs.2005.04.019}, 8932 doi = {10.1016/j.ijhcs.2005.04.019},
8933 url = {http://dx.doi.org/10.1016/j.ijhcs.2005.04.019}, 8933 url = {http://dx.doi.org/10.1016/j.ijhcs.2005.04.019},
8934 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PrivacyPractices2005Jensen.pdf}, 8934 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PrivacyPractices2005Jensen.pdf},
8935 author = {Jensen, Carlos and Potts, Colin and Jensen, Christian} 8935 author = {Jensen, Carlos and Potts, Colin and Jensen, Christian}
8936} 8936}
8937@conference {pet05-bissias, 8937@conference {pet05-bissias,
@@ -8947,7 +8947,7 @@ We have developed a prototype based on the FreePastry open-source implementation
8947 isbn = {978-3-540-34745-3}, 8947 isbn = {978-3-540-34745-3},
8948 doi = {10.1007/11767831}, 8948 doi = {10.1007/11767831},
8949 url = {http://www.springerlink.com/content/1062w684754754h4/}, 8949 url = {http://www.springerlink.com/content/1062w684754754h4/},
8950 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/pet05-bissias.pdf}, 8950 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/pet05-bissias.pdf},
8951 author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine} 8951 author = {George Dean Bissias and Marc Liberatore and Brian Neil Levine}
8952} 8952}
8953@book {2005_11, 8953@book {2005_11,
@@ -8963,7 +8963,7 @@ We have developed a prototype based on the FreePastry open-source implementation
8963 isbn = {978-3-540-28114-6}, 8963 isbn = {978-3-540-28114-6},
8964 doi = {10.1007/11535218_15}, 8964 doi = {10.1007/11535218_15},
8965 url = {http://dx.doi.org/10.1007/11535218_15}, 8965 url = {http://dx.doi.org/10.1007/11535218_15},
8966 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PrivacyPreservingSetOperations2005Kissner.pdf}, 8966 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PrivacyPreservingSetOperations2005Kissner.pdf},
8967 author = {Kissner, Lea and Song, Dawn}, 8967 author = {Kissner, Lea and Song, Dawn},
8968 editor = {Shoup, Victor} 8968 editor = {Shoup, Victor}
8969} 8969}
@@ -8981,7 +8981,7 @@ We have developed a prototype based on the FreePastry open-source implementation
8981 isbn = {978-3-540-26226-8}, 8981 isbn = {978-3-540-26226-8},
8982 doi = {10.1007/11496618_9}, 8982 doi = {10.1007/11496618_9},
8983 url = {http://dx.doi.org/10.1007/11496618_9}, 8983 url = {http://dx.doi.org/10.1007/11496618_9},
8984 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PrivateScalarProduct2004Goethals.pdf}, 8984 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PrivateScalarProduct2004Goethals.pdf},
8985 author = {Goethals, Bart and Laur, Sven and Lipmaa, Helger and Mielik{\"a}inen, Taneli}, 8985 author = {Goethals, Bart and Laur, Sven and Lipmaa, Helger and Mielik{\"a}inen, Taneli},
8986 editor = {Park, Choon-sik and Chee, Seongtaek} 8986 editor = {Park, Choon-sik and Chee, Seongtaek}
8987} 8987}
@@ -8996,7 +8996,7 @@ We have developed a prototype based on the FreePastry open-source implementation
8996 isbn = {1-59593-231-3}, 8996 isbn = {1-59593-231-3},
8997 doi = {10.1145/1103576.1103585}, 8997 doi = {10.1145/1103576.1103585},
8998 url = {http://portal.acm.org/citation.cfm?id=1103576.1103585}, 8998 url = {http://portal.acm.org/citation.cfm?id=1103576.1103585},
8999 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/GHPvR05.pdf}, 8999 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/GHPvR05.pdf},
9000 author = {Flavio D. Garcia and Ichiro Hasuo and Wolter Pieters and Peter van Rossum} 9000 author = {Flavio D. Garcia and Ichiro Hasuo and Wolter Pieters and Peter van Rossum}
9001} 9001}
9002@conference {ih05-Klonowski, 9002@conference {ih05-Klonowski,
@@ -9012,7 +9012,7 @@ We have developed a prototype based on the FreePastry open-source implementation
9012 isbn = {978-3-540-29039-1}, 9012 isbn = {978-3-540-29039-1},
9013 doi = {10.1007/11558859}, 9013 doi = {10.1007/11558859},
9014 url = {http://www.springerlink.com/content/777769630v335773/}, 9014 url = {http://www.springerlink.com/content/777769630v335773/},
9015 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ih05-Klonowski.pdf}, 9015 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ih05-Klonowski.pdf},
9016 author = {Marek Klonowski and Miroslaw Kutylowski} 9016 author = {Marek Klonowski and Miroslaw Kutylowski}
9017} 9017}
9018@conference {cramer05pns, 9018@conference {cramer05pns,
@@ -9029,7 +9029,7 @@ We have developed a prototype based on the FreePastry open-source implementation
9029 isbn = {0-7695-2376-5}, 9029 isbn = {0-7695-2376-5},
9030 doi = {10.1109/P2P.2005.28}, 9030 doi = {10.1109/P2P.2005.28},
9031 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 9031 url = {http://i30www.ira.uka.de/research/publications/p2p/},
9032 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cramer05pns.pdf}, 9032 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cramer05pns.pdf},
9033 author = {Cramer, Curt and Thomas Fuhrmann} 9033 author = {Cramer, Curt and Thomas Fuhrmann}
9034} 9034}
9035@conference {sassaman:wpes2005, 9035@conference {sassaman:wpes2005,
@@ -9045,7 +9045,7 @@ We have developed a prototype based on the FreePastry open-source implementation
9045 isbn = {1-59593-228-3}, 9045 isbn = {1-59593-228-3},
9046 doi = {10.1145/1102199.1102201}, 9046 doi = {10.1145/1102199.1102201},
9047 url = {http://portal.acm.org/citation.cfm?id=1102199.1102201}, 9047 url = {http://portal.acm.org/citation.cfm?id=1102199.1102201},
9048 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/sassaman-wpes2005.pdf}, 9048 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/sassaman-wpes2005.pdf},
9049 author = {Len Sassaman and Bram Cohen and Nick Mathewson} 9049 author = {Len Sassaman and Bram Cohen and Nick Mathewson}
9050} 9050}
9051@conference {1524297, 9051@conference {1524297,
@@ -9059,7 +9059,7 @@ We have developed a prototype based on the FreePastry open-source implementation
9059 www_section = {anonymity, GNUnet, routing, shortcut}, 9059 www_section = {anonymity, GNUnet, routing, shortcut},
9060 issn = {1521-9097}, 9060 issn = {1521-9097},
9061 doi = {10.1109/ICPADS.2005.246}, 9061 doi = {10.1109/ICPADS.2005.246},
9062 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/kugler2.pdf}, 9062 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/kugler2.pdf},
9063 author = {Tatara, Kohei and Hori, Y. and Sakurai, Kouichi} 9063 author = {Tatara, Kohei and Hori, Y. and Sakurai, Kouichi}
9064} 9064}
9065@article {2005_13, 9065@article {2005_13,
@@ -9069,7 +9069,7 @@ We have developed a prototype based on the FreePastry open-source implementation
9069 institution = {The GNUnet Project}, 9069 institution = {The GNUnet Project},
9070 www_section = {Bloom filter, GNUnet}, 9070 www_section = {Bloom filter, GNUnet},
9071 journal = {unknown}, 9071 journal = {unknown},
9072 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/bloomfilter.pdf}, 9072 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/bloomfilter.pdf},
9073 author = {Christian Grothoff} 9073 author = {Christian Grothoff}
9074} 9074}
9075@conference {HanLLHP05, 9075@conference {HanLLHP05,
@@ -9106,7 +9106,7 @@ We have developed a prototype based on the FreePastry open-source implementation
9106 abstract = {This master thesis looks at aspects with backup of data and restore in ad-hoc networks. Ad-hoc networks are networks made between arbitrary nodes without any form of infrastructure or central control. Backup in such environments would have to rely on other nodes to keep backups. The key problem is knowing whom to trust. Backup in ad-hoc network is meant to be a method to offer extra security to data that is created outside of a controlled environment. The most important aspects of backup are the ability to retrieve data after it is lost from the original device. In this project an ad-hoc network is simulated, to measure how much of the data can be retrieved as a function of the size of the network. The distance to the data and how many of the distributed copies are available is measured. The network is simulated using User-mode Linux and the centrality and connectivity of the simulated network is measured. Finding the device that keeps your data when a restoration is needed can be like looking for a needle in a haystack. A simple solution to this is to not only rely on the ad-hoc network but also make it possible for devices that keep backups to upload data to others or back to a host that is available to the source itself}, 9106 abstract = {This master thesis looks at aspects with backup of data and restore in ad-hoc networks. Ad-hoc networks are networks made between arbitrary nodes without any form of infrastructure or central control. Backup in such environments would have to rely on other nodes to keep backups. The key problem is knowing whom to trust. Backup in ad-hoc network is meant to be a method to offer extra security to data that is created outside of a controlled environment. The most important aspects of backup are the ability to retrieve data after it is lost from the original device. In this project an ad-hoc network is simulated, to measure how much of the data can be retrieved as a function of the size of the network. The distance to the data and how many of the distributed copies are available is measured. The network is simulated using User-mode Linux and the centrality and connectivity of the simulated network is measured. Finding the device that keeps your data when a restoration is needed can be like looking for a needle in a haystack. A simple solution to this is to not only rely on the ad-hoc network but also make it possible for devices that keep backups to upload data to others or back to a host that is available to the source itself},
9107 www_section = {ad-hoc networks}, 9107 www_section = {ad-hoc networks},
9108 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.141}, 9108 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.106.141},
9109 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Retrivability_of_data_in_ad-hoc_backup.pdf}, 9109 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Retrivability_of_data_in_ad-hoc_backup.pdf},
9110 author = {Trond Aspelund} 9110 author = {Trond Aspelund}
9111} 9111}
9112@booklet {1698181, 9112@booklet {1698181,
@@ -9117,7 +9117,7 @@ We have developed a prototype based on the FreePastry open-source implementation
9117 abstract = {This paper describes how a network can continue to function in the presence of Byzantine failures. A Byzantine failure is one in which a node, instead of halting (as it would in a fail-stop failure), continues to operate, but incorrectly. It might lie about routing information, perform the routing algorithm itself flawlessly, but then fail to forward some class of packets correctly, or flood the network with garbage traffic. Our goal is to design a network so that as long as one nonfaulty path connects nonfaulty nodes A and B, they will be able to communicate, with some fair share of bandwidth, even if all the other components in the network are maximally malicious. We review work from 1988 that presented a network design that had that property, but required the network to be small enough so that every router could keep state proportional to n2, where n is the total number of nodes in the network. This would work for a network of size on the order of a thousand nodes, but to build a large network, we need to introduce hierarchy. This paper presents a new design, building on the original work, that works with hierarchical networks. This design not only defends against malicious routers, but because it guarantees fair allocation of resources, can mitigate against many other types of denial of service attacks}, 9117 abstract = {This paper describes how a network can continue to function in the presence of Byzantine failures. A Byzantine failure is one in which a node, instead of halting (as it would in a fail-stop failure), continues to operate, but incorrectly. It might lie about routing information, perform the routing algorithm itself flawlessly, but then fail to forward some class of packets correctly, or flood the network with garbage traffic. Our goal is to design a network so that as long as one nonfaulty path connects nonfaulty nodes A and B, they will be able to communicate, with some fair share of bandwidth, even if all the other components in the network are maximally malicious. We review work from 1988 that presented a network design that had that property, but required the network to be small enough so that every router could keep state proportional to n2, where n is the total number of nodes in the network. This would work for a network of size on the order of a thousand nodes, but to build a large network, we need to introduce hierarchy. This paper presents a new design, building on the original work, that works with hierarchical networks. This design not only defends against malicious routers, but because it guarantees fair allocation of resources, can mitigate against many other types of denial of service attacks},
9118 www_section = {routing}, 9118 www_section = {routing},
9119 url = {http://portal.acm.org/citation.cfm?id=1698181$\#$}, 9119 url = {http://portal.acm.org/citation.cfm?id=1698181$\#$},
9120 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/smli_tr-2005-146.pdf}, 9120 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/smli_tr-2005-146.pdf},
9121 author = {Perlman, Radia} 9121 author = {Perlman, Radia}
9122} 9122}
9123@conference {XuFZBCZ05, 9123@conference {XuFZBCZ05,
@@ -9132,7 +9132,7 @@ We have developed a prototype based on the FreePastry open-source implementation
9132 isbn = {978-3-540-28102-3}, 9132 isbn = {978-3-540-28102-3},
9133 doi = {10.1007/11534310}, 9133 doi = {10.1007/11534310},
9134 url = {http://www.springerlink.com/content/9b2k6u5wval6cep1/}, 9134 url = {http://www.springerlink.com/content/9b2k6u5wval6cep1/},
9135 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.66.7970.pdf}, 9135 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.66.7970.pdf},
9136 author = {Hongyun Xu and Xinwen Fu and Ye Zhu and Riccardo Bettati and Jianer Chen and Wei Zhao} 9136 author = {Hongyun Xu and Xinwen Fu and Ye Zhu and Riccardo Bettati and Jianer Chen and Wei Zhao}
9137} 9137}
9138@conference {Fuhrmann05scalablerouting, 9138@conference {Fuhrmann05scalablerouting,
@@ -9142,7 +9142,7 @@ We have developed a prototype based on the FreePastry open-source implementation
9142 abstract = {The design of efficient routing protocols for ad hoc and sensor networks is challenging for several reasons: Physical network topology is random. Nodes have limited computation and memory capabilities. Energy and bisection bandwidth are scarce. Furthermore, in most settings, the lack of centralized components leaves all network control tasks to the nodes acting as decentralized peers. In this paper, we present a novel routing algorithm, scalable source routing (SSR), which is capable of memory and message efficient routing in large random networks. A guiding example is a community of 'digital homes ' where smart sensors and actuators are installed by laypersons. Such networks combine wireless ad-hoc and infrastructure networks, and lack a well-crafted network topology. Typically, the nodes do not have sufficient processing and memory resources to perform sophisticated routing algorithms. Flooding on the other hand is too bandwidthconsuming in the envisaged large-scale networks. SSR is a fully self-organizing routing protocol for such scenarios. It creates a virtual ring that links all nodes via predecessor/successor source routes. Additionally, each node possesses O(log N) short-cut source routes to nodes in exponentially increasing virtual ring distance. Like with the Chord overlay network, this ensures full connectivity within the network. Moreover, it provides a routing semantic which can efficiently support indirection schemes like i3. Memory and message efficiency are achieved by the introduction of a route cache together with a set of path manipulation rules that allow to produce near-to-optimal paths}, 9142 abstract = {The design of efficient routing protocols for ad hoc and sensor networks is challenging for several reasons: Physical network topology is random. Nodes have limited computation and memory capabilities. Energy and bisection bandwidth are scarce. Furthermore, in most settings, the lack of centralized components leaves all network control tasks to the nodes acting as decentralized peers. In this paper, we present a novel routing algorithm, scalable source routing (SSR), which is capable of memory and message efficient routing in large random networks. A guiding example is a community of 'digital homes ' where smart sensors and actuators are installed by laypersons. Such networks combine wireless ad-hoc and infrastructure networks, and lack a well-crafted network topology. Typically, the nodes do not have sufficient processing and memory resources to perform sophisticated routing algorithms. Flooding on the other hand is too bandwidthconsuming in the envisaged large-scale networks. SSR is a fully self-organizing routing protocol for such scenarios. It creates a virtual ring that links all nodes via predecessor/successor source routes. Additionally, each node possesses O(log N) short-cut source routes to nodes in exponentially increasing virtual ring distance. Like with the Chord overlay network, this ensures full connectivity within the network. Moreover, it provides a routing semantic which can efficiently support indirection schemes like i3. Memory and message efficiency are achieved by the introduction of a route cache together with a set of path manipulation rules that allow to produce near-to-optimal paths},
9143 www_section = {scalable source routing, sensor networks, wireless sensor network}, 9143 www_section = {scalable source routing, sensor networks, wireless sensor network},
9144 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.67.6509}, 9144 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.67.6509},
9145 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.67.6509.pdf}, 9145 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.67.6509.pdf},
9146 author = {Thomas Fuhrmann} 9146 author = {Thomas Fuhrmann}
9147} 9147}
9148@conference {1049775, 9148@conference {1049775,
@@ -9158,7 +9158,7 @@ We have developed a prototype based on the FreePastry open-source implementation
9158 isbn = {0-7695-2299-8}, 9158 isbn = {0-7695-2299-8},
9159 doi = {10.1109/PERCOM.2005.36}, 9159 doi = {10.1109/PERCOM.2005.36},
9160 url = {http://portal.acm.org/citation.cfm?id=1049775$\#$}, 9160 url = {http://portal.acm.org/citation.cfm?id=1049775$\#$},
9161 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.73.7247.pdf}, 9161 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.73.7247.pdf},
9162 author = {Sailhan, Francoise and Valerie Issarny} 9162 author = {Sailhan, Francoise and Valerie Issarny}
9163} 9163}
9164@booklet {Sandberg05searchingin, 9164@booklet {Sandberg05searchingin,
@@ -9167,7 +9167,7 @@ We have developed a prototype based on the FreePastry open-source implementation
9167 abstract = {The small-world phenomenon, that the world's social network is tightly connected, and that any two people can be linked by a short chain of friends, has long been a subject of interest. Famously, the psychologist Stanley Milgram performed an experiment where he asked people to deliver a letter to a stranger by forwarding it to an acquaintance, who could forward it to one his acquaintances, and so on until the destination was reached. The results seemed to confirm that the small-world phenomenon is real. Recently it has been shown by Jon Kleinberg that in order to search in a network, that is to actually find the short paths in the manner of the Milgram experiment, a very special type of a graph model is needed. In this thesis, we present two ideas about searching in the small world stemming from Kleinberg's results. In the first we study the formation of networks of this type, attempting to see why the kind}, 9167 abstract = {The small-world phenomenon, that the world's social network is tightly connected, and that any two people can be linked by a short chain of friends, has long been a subject of interest. Famously, the psychologist Stanley Milgram performed an experiment where he asked people to deliver a letter to a stranger by forwarding it to an acquaintance, who could forward it to one his acquaintances, and so on until the destination was reached. The results seemed to confirm that the small-world phenomenon is real. Recently it has been shown by Jon Kleinberg that in order to search in a network, that is to actually find the short paths in the manner of the Milgram experiment, a very special type of a graph model is needed. In this thesis, we present two ideas about searching in the small world stemming from Kleinberg's results. In the first we study the formation of networks of this type, attempting to see why the kind},
9168 www_section = {small-world}, 9168 www_section = {small-world},
9169 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.688}, 9169 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.101.688},
9170 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.101.688.pdf}, 9170 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.101.688.pdf},
9171 author = {Sandberg, Oskar} 9171 author = {Sandberg, Oskar}
9172} 9172}
9173@book {conf/p2p/GotzRW05, 9173@book {conf/p2p/GotzRW05,
@@ -9185,7 +9185,7 @@ This overview focuses on the three DHT systems that have received the most atten
9185 www_section = {CAN, Chord, Content Addressable Networks, dblp, distributed hash table, Kademlia, Pastry, Symphony, Viceroy}, 9185 www_section = {CAN, Chord, Content Addressable Networks, dblp, distributed hash table, Kademlia, Pastry, Symphony, Viceroy},
9186 isbn = {3-540-29192-X}, 9186 isbn = {3-540-29192-X},
9187 url = {http://dblp.uni-trier.de/db/conf/p2p/p2p2005lncs.html$\#$GotzRW05}, 9187 url = {http://dblp.uni-trier.de/db/conf/p2p/p2p2005lncs.html$\#$GotzRW05},
9188 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Lecture\%20Notes\%20in\%20Computer\%20Science\%20-\%20Selected\%20DHT\%20Algorithms\%20.pdf}, 9188 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Lecture\%20Notes\%20in\%20Computer\%20Science\%20-\%20Selected\%20DHT\%20Algorithms\%20.pdf},
9189 author = {G{\"o}tz, Stefan and Rieche, Simon and Klaus Wehrle} 9189 author = {G{\"o}tz, Stefan and Rieche, Simon and Klaus Wehrle}
9190} 9190}
9191@conference {Gairing:2005:SRI:1073970.1074000, 9191@conference {Gairing:2005:SRI:1073970.1074000,
@@ -9203,7 +9203,7 @@ This overview focuses on the three DHT systems that have received the most atten
9203 isbn = {1-58113-986-1}, 9203 isbn = {1-58113-986-1},
9204 doi = {http://doi.acm.org/10.1145/1073970.1074000}, 9204 doi = {http://doi.acm.org/10.1145/1073970.1074000},
9205 url = {http://doi.acm.org/10.1145/1073970.1074000}, 9205 url = {http://doi.acm.org/10.1145/1073970.1074000},
9206 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SPAA\%2705\%20-\%20Selfish\%20routing\%20with\%20incomplete\%20information.pdf}, 9206 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SPAA\%2705\%20-\%20Selfish\%20routing\%20with\%20incomplete\%20information.pdf},
9207 author = {Gairing, Martin and Monien, Burkhard and Tiemann, Karsten} 9207 author = {Gairing, Martin and Monien, Burkhard and Tiemann, Karsten}
9208} 9208}
9209@conference {kutzner05dvdr, 9209@conference {kutzner05dvdr,
@@ -9215,7 +9215,7 @@ This overview focuses on the three DHT systems that have received the most atten
9215 abstract = {In [CKF04], we have reported on our concept of a peer-to-peer extension to the popular video disk recorder (VDR) [Sch04], the Distributed Video Disk Recording (DVDR) system. The DVDR is a collaboration system of existing video disk recorders via a peer to peer network. There, the VDRs communicate about the tasks to be done and distribute the recordings afterwards. In this paper, we report on lessons learnt during its implementation and explain the considerations leading to the design of a new job scheduling algorithm. DVDR is an application which is based on a distributed hash table (DHT) employing proximity route selection (PRS)/proximity neighbor selection (PNS). For our implementation, we chose to use Chord [SMK + 01, GGG + 03]. Using a DHT with PRS/PNS yields two important features: (1) Each hashed key is routed to exactly one destination node within the system. (2) PRS/PNS forces messages originating in one region of the network destined to the same key to be routed through exactly one node in that region (route convergence). The first property enables per-key aggregation trees with a tree being rooted at the node which is responsible for the respective key. This node serves as a rendezvous point. The second property leads to locality (i.e., low latency) in this aggregation tree}, 9215 abstract = {In [CKF04], we have reported on our concept of a peer-to-peer extension to the popular video disk recorder (VDR) [Sch04], the Distributed Video Disk Recording (DVDR) system. The DVDR is a collaboration system of existing video disk recorders via a peer to peer network. There, the VDRs communicate about the tasks to be done and distribute the recordings afterwards. In this paper, we report on lessons learnt during its implementation and explain the considerations leading to the design of a new job scheduling algorithm. DVDR is an application which is based on a distributed hash table (DHT) employing proximity route selection (PRS)/proximity neighbor selection (PNS). For our implementation, we chose to use Chord [SMK + 01, GGG + 03]. Using a DHT with PRS/PNS yields two important features: (1) Each hashed key is routed to exactly one destination node within the system. (2) PRS/PNS forces messages originating in one region of the network destined to the same key to be routed through exactly one node in that region (route convergence). The first property enables per-key aggregation trees with a tree being rooted at the node which is responsible for the respective key. This node serves as a rendezvous point. The second property leads to locality (i.e., low latency) in this aggregation tree},
9216 www_section = {Chord, distributed hash table, proximity neighbor selection}, 9216 www_section = {Chord, distributed hash table, proximity neighbor selection},
9217 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 9217 url = {http://i30www.ira.uka.de/research/publications/p2p/},
9218 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/kutzner05dvdr.pdf}, 9218 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/kutzner05dvdr.pdf},
9219 author = {Kendy Kutzner and Cramer, Curt and Thomas Fuhrmann} 9219 author = {Kendy Kutzner and Cramer, Curt and Thomas Fuhrmann}
9220} 9220}
9221@conference {fuhrmann05networking, 9221@conference {fuhrmann05networking,
@@ -9233,7 +9233,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to
9233 isbn = {978-3-540-25809-4}, 9233 isbn = {978-3-540-25809-4},
9234 doi = {10.1007/b136094}, 9234 doi = {10.1007/b136094},
9235 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 9235 url = {http://i30www.ira.uka.de/research/publications/p2p/},
9236 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fuhrmann05networking.pdf}, 9236 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fuhrmann05networking.pdf},
9237 author = {Thomas Fuhrmann} 9237 author = {Thomas Fuhrmann}
9238} 9238}
9239@conference {Irwin:2005:SVC:1080192.1080194, 9239@conference {Irwin:2005:SVC:1080192.1080194,
@@ -9251,7 +9251,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to
9251 isbn = {1-59593-026-4}, 9251 isbn = {1-59593-026-4},
9252 doi = {http://doi.acm.org/10.1145/1080192.1080194}, 9252 doi = {http://doi.acm.org/10.1145/1080192.1080194},
9253 url = {http://doi.acm.org/10.1145/1080192.1080194}, 9253 url = {http://doi.acm.org/10.1145/1080192.1080194},
9254 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/P2PECON\%2705\%20-\%20Self-recharging\%20virtual\%20currency.pdf}, 9254 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/P2PECON\%2705\%20-\%20Self-recharging\%20virtual\%20currency.pdf},
9255 author = {Irwin, David and Chase, Jeff and Grit, Laura and Yumerefendi, Aydan} 9255 author = {Irwin, David and Chase, Jeff and Grit, Laura and Yumerefendi, Aydan}
9256} 9256}
9257@conference {cramer05selfstabilizing, 9257@conference {cramer05selfstabilizing,
@@ -9263,7 +9263,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to
9263 abstract = {Large networks require scalable routing. Traditionally, protocol overhead is reduced by introducing a hierarchy. This requires aggregation of nearby nodes under a common address prefix. In fixed networks, this is achieved administratively, whereas in wireless ad-hoc networks, dynamic assignments of nodes to aggregation units are required. As a result of the nodes commonly being assigned a random network address, the majority of proposed ad-hoc routing protocols discovers routes between end nodes by flooding, thus limiting the network size. Peer-to-peer (P2P) overlay networks offer scalable routing solutions by employing virtualized address spaces, yet assume an underlying routing protocol for end-to-end connectivity. We investigate a cross-layer approach to P2P routing, where the virtual address space is implemented with a network-layer routing protocol by itself. The Iterative Successor Pointer Rewiring Protocol (ISPRP) efficiently initializes a ring-structured network among nodes having but link-layer connectivity. It is fully self-organizing and issues only a small per-node amount of messages by keeping interactions between nodes as local as possible. The main contribution of this paper is a proof that ISPRP is self-stabilizing, that is, starting from an arbitrary initial state, the protocol lets the network converge into a correct state within a bounded amount of time}, 9263 abstract = {Large networks require scalable routing. Traditionally, protocol overhead is reduced by introducing a hierarchy. This requires aggregation of nearby nodes under a common address prefix. In fixed networks, this is achieved administratively, whereas in wireless ad-hoc networks, dynamic assignments of nodes to aggregation units are required. As a result of the nodes commonly being assigned a random network address, the majority of proposed ad-hoc routing protocols discovers routes between end nodes by flooding, thus limiting the network size. Peer-to-peer (P2P) overlay networks offer scalable routing solutions by employing virtualized address spaces, yet assume an underlying routing protocol for end-to-end connectivity. We investigate a cross-layer approach to P2P routing, where the virtual address space is implemented with a network-layer routing protocol by itself. The Iterative Successor Pointer Rewiring Protocol (ISPRP) efficiently initializes a ring-structured network among nodes having but link-layer connectivity. It is fully self-organizing and issues only a small per-node amount of messages by keeping interactions between nodes as local as possible. The main contribution of this paper is a proof that ISPRP is self-stabilizing, that is, starting from an arbitrary initial state, the protocol lets the network converge into a correct state within a bounded amount of time},
9264 www_section = {ad-hoc networks, P2P}, 9264 www_section = {ad-hoc networks, P2P},
9265 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 9265 url = {http://i30www.ira.uka.de/research/publications/p2p/},
9266 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cramer05selfstabilizing.pdf}, 9266 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cramer05selfstabilizing.pdf},
9267 author = {Cramer, Curt and Thomas Fuhrmann} 9267 author = {Cramer, Curt and Thomas Fuhrmann}
9268} 9268}
9269@article {10.1109/PERSER.2005.1506410, 9269@article {10.1109/PERSER.2005.1506410,
@@ -9277,7 +9277,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to
9277 isbn = {0-7803-9032-6}, 9277 isbn = {0-7803-9032-6},
9278 doi = {10.1109/PERSER.2005.1506410}, 9278 doi = {10.1109/PERSER.2005.1506410},
9279 url = {http://www.computer.org/portal/web/csdl/doi/10.1109/PERSER.2005.1506410}, 9279 url = {http://www.computer.org/portal/web/csdl/doi/10.1109/PERSER.2005.1506410},
9280 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/31.pdf}, 9280 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/31.pdf},
9281 author = {Mijeom Kim and Mohan Kumar and Behrooz Shirazi} 9281 author = {Mijeom Kim and Mohan Kumar and Behrooz Shirazi}
9282} 9282}
9283@book {Bartolini:2005:SFA:2167504.2167521, 9283@book {Bartolini:2005:SFA:2167504.2167521,
@@ -9295,7 +9295,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to
9295 www_section = {framework, negotiation}, 9295 www_section = {framework, negotiation},
9296 isbn = {3-540-24843-9}, 9296 isbn = {3-540-24843-9},
9297 url = {http://dl.acm.org/citation.cfm?id=2167504.2167521}, 9297 url = {http://dl.acm.org/citation.cfm?id=2167504.2167521},
9298 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SELMAS\%20-\%20Software\%20framework\%20for\%20automated\%20negotiation.pdf}, 9298 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SELMAS\%20-\%20Software\%20framework\%20for\%20automated\%20negotiation.pdf},
9299 author = {Bartolini, Claudio and Preist, Chris and Nicholas R Jennings}, 9299 author = {Bartolini, Claudio and Preist, Chris and Nicholas R Jennings},
9300 editor = {Choren, Ricardo and Garcia, Alessandro and Lucena, Carlos and Romanovsky, Alexander} 9300 editor = {Choren, Ricardo and Garcia, Alessandro and Lucena, Carlos and Romanovsky, Alexander}
9301} 9301}
@@ -9314,7 +9314,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to
9314 isbn = {1-59593-022-1}, 9314 isbn = {1-59593-022-1},
9315 doi = {http://doi.acm.org/10.1145/1064212.1064273}, 9315 doi = {http://doi.acm.org/10.1145/1064212.1064273},
9316 url = {http://doi.acm.org/10.1145/1064212.1064273}, 9316 url = {http://doi.acm.org/10.1145/1064212.1064273},
9317 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGMETRICS\%2705\%20-\%20Bharambe\%2C\%20Herley\%20\%26\%20Padmanabhan.pdf}, 9317 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGMETRICS\%2705\%20-\%20Bharambe\%2C\%20Herley\%20\%26\%20Padmanabhan.pdf},
9318 author = {Bharambe, Ashwin R. and Herley, Cormac and Venkata N. Padmanabhan} 9318 author = {Bharambe, Ashwin R. and Herley, Cormac and Venkata N. Padmanabhan}
9319} 9319}
9320@conference {LuFSG05, 9320@conference {LuFSG05,
@@ -9339,7 +9339,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to
9339 issn = {1553-877X }, 9339 issn = {1553-877X },
9340 doi = {10.1109/COMST.2005.1610546}, 9340 doi = {10.1109/COMST.2005.1610546},
9341 url = {http://www.slideshare.net/networkingcentral/a-survey-and-comparison-of-peertopeer-overlay-network-schemes}, 9341 url = {http://www.slideshare.net/networkingcentral/a-survey-and-comparison-of-peertopeer-overlay-network-schemes},
9342 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IEEE\%20CST\%20-\%20A\%20Survey\%20and\%20Comparison\%20of\%20Peer-to-Peer\%20Overlay.pdf}, 9342 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IEEE\%20CST\%20-\%20A\%20Survey\%20and\%20Comparison\%20of\%20Peer-to-Peer\%20Overlay.pdf},
9343 author = {Eng Keong Lua and Jon Crowcroft and Marcelo Pias and Ravi Sharma and Steven Lim} 9343 author = {Eng Keong Lua and Jon Crowcroft and Marcelo Pias and Ravi Sharma and Steven Lim}
9344} 9344}
9345@conference {Cheng:2005:SRM:1080192.1080202, 9345@conference {Cheng:2005:SRM:1080192.1080202,
@@ -9357,7 +9357,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to
9357 isbn = {1-59593-026-4}, 9357 isbn = {1-59593-026-4},
9358 doi = {http://doi.acm.org/10.1145/1080192.1080202}, 9358 doi = {http://doi.acm.org/10.1145/1080192.1080202},
9359 url = {http://doi.acm.org/10.1145/1080192.1080202}, 9359 url = {http://doi.acm.org/10.1145/1080192.1080202},
9360 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ACM\%20SIGCOMM\%2705\%20-\%20Cheng\%20\%26\%20Friedman\%20-\%20Sybilproof\%20reputation\%20mechanisms.pdf}, 9360 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ACM\%20SIGCOMM\%2705\%20-\%20Cheng\%20\%26\%20Friedman\%20-\%20Sybilproof\%20reputation\%20mechanisms.pdf},
9361 author = {Cheng, Alice and Eric Friedman} 9361 author = {Cheng, Alice and Eric Friedman}
9362} 9362}
9363@conference {Danezis05sybil-resistantdht, 9363@conference {Danezis05sybil-resistantdht,
@@ -9370,7 +9370,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to
9370 abstract = {Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in open networks, where an adversary can perform a sybil attack by introducing a large number of corrupt nodes in the network, considerably degrading its performance. We introduce a routing strategy that alleviates some of the effects of such an attack by making sure that lookups are performed using a diverse set of nodes. This ensures that at least some of the nodes queried are good, and hence the search makes forward progress. This strategy makes use of latent social information present in the introduction graph of the network}, 9370 abstract = {Distributed Hash Tables (DHTs) are very efficient distributed systems for routing, but at the same time vulnerable to disruptive nodes. Designers of such systems want them used in open networks, where an adversary can perform a sybil attack by introducing a large number of corrupt nodes in the network, considerably degrading its performance. We introduce a routing strategy that alleviates some of the effects of such an attack by making sure that lookups are performed using a diverse set of nodes. This ensures that at least some of the nodes queried are good, and hence the search makes forward progress. This strategy makes use of latent social information present in the introduction graph of the network},
9371 www_section = {distributed hash table, routing}, 9371 www_section = {distributed hash table, routing},
9372 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.3947}, 9372 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.65.3947},
9373 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/sybildht.pdf}, 9373 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/sybildht.pdf},
9374 author = {George Danezis and Chris Lesniewski-laas and Frans M. Kaashoek and Ross Anderson} 9374 author = {George Danezis and Chris Lesniewski-laas and Frans M. Kaashoek and Ross Anderson}
9375} 9375}
9376@conference {Nielson05ataxonomy, 9376@conference {Nielson05ataxonomy,
@@ -9384,7 +9384,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to
9384 www_section = {attack, P2P}, 9384 www_section = {attack, P2P},
9385 doi = {10.1007/11558989}, 9385 doi = {10.1007/11558989},
9386 url = {http://www.springerlink.com/content/lh21385ml723844j/}, 9386 url = {http://www.springerlink.com/content/lh21385ml723844j/},
9387 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CameraReady_240.pdf}, 9387 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CameraReady_240.pdf},
9388 author = {Seth James Nielson and Scott A. Crosby} 9388 author = {Seth James Nielson and Scott A. Crosby}
9389} 9389}
9390@booklet {UCAM-CL-TR-637, 9390@booklet {UCAM-CL-TR-637,
@@ -9397,7 +9397,7 @@ In this paper, we present a fully self-organizing routing scheme that is able to
9397Modern conflicts often turn on connectivity: consider, for instance, anything from the American army's attack on the Taleban in Afghanistan, and elsewhere, or medics who are trying to battle a disease, like Aids, or anything else. All of these turn on, making strategic decisions about which nodes to go after in the network. For instance, you could consider that a good first place to give condoms out and start any Aids programme, would be with prostitutes}, 9397Modern conflicts often turn on connectivity: consider, for instance, anything from the American army's attack on the Taleban in Afghanistan, and elsewhere, or medics who are trying to battle a disease, like Aids, or anything else. All of these turn on, making strategic decisions about which nodes to go after in the network. For instance, you could consider that a good first place to give condoms out and start any Aids programme, would be with prostitutes},
9398 doi = {10.1007/978-3-540-77156-2}, 9398 doi = {10.1007/978-3-540-77156-2},
9399 url = {http://www.springerlink.com/content/p885q38262486876/}, 9399 url = {http://www.springerlink.com/content/p885q38262486876/},
9400 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/UCAM-CL-TR-637.pdf}, 9400 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/UCAM-CL-TR-637.pdf},
9401 author = {Shishir Nagaraja and Ross Anderson} 9401 author = {Shishir Nagaraja and Ross Anderson}
9402} 9402}
9403@conference {kutzner05autonomic, 9403@conference {kutzner05autonomic,
@@ -9415,7 +9415,7 @@ In this paper we present a novel routing approach that is capable of handling co
9415 isbn = {978-3-540-25273-3}, 9415 isbn = {978-3-540-25273-3},
9416 doi = {10.1007/b106632}, 9416 doi = {10.1007/b106632},
9417 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 9417 url = {http://i30www.ira.uka.de/research/publications/p2p/},
9418 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/kutzner05autonomic.pdf}, 9418 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/kutzner05autonomic.pdf},
9419 author = {Kendy Kutzner and Thomas Fuhrmann} 9419 author = {Kendy Kutzner and Thomas Fuhrmann}
9420} 9420}
9421@conference {WangCJ05, 9421@conference {WangCJ05,
@@ -9431,7 +9431,7 @@ In this paper we present a novel routing approach that is capable of handling co
9431 isbn = {1-59593-226-7}, 9431 isbn = {1-59593-226-7},
9432 doi = {10.1145/1102120.1102133}, 9432 doi = {10.1145/1102120.1102133},
9433 url = {http://portal.acm.org/citation.cfm?id=1102120.1102133}, 9433 url = {http://portal.acm.org/citation.cfm?id=1102120.1102133},
9434 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WangCJ05.pdf}, 9434 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WangCJ05.pdf},
9435 author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia} 9435 author = {Xinyuan Wang and Shiping Chen and Sushil Jajodia}
9436} 9436}
9437@conference {pet05-zhu, 9437@conference {pet05-zhu,
@@ -9447,7 +9447,7 @@ In this paper we present a novel routing approach that is capable of handling co
9447 isbn = {978-3-540-34745-3}, 9447 isbn = {978-3-540-34745-3},
9448 doi = {10.1007/11767831}, 9448 doi = {10.1007/11767831},
9449 url = {http://www.springerlink.com/content/l5110366246k5003/}, 9449 url = {http://www.springerlink.com/content/l5110366246k5003/},
9450 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/pet05-zhu.pdf}, 9450 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/pet05-zhu.pdf},
9451 author = {Ye Zhu and Riccardo Bettati} 9451 author = {Ye Zhu and Riccardo Bettati}
9452} 9452}
9453@conference {fuhrmann05emnets, 9453@conference {fuhrmann05emnets,
@@ -9463,7 +9463,7 @@ In this paper we present a novel routing approach that is capable of handling co
9463 www_section = {scalable source routing, topology matching}, 9463 www_section = {scalable source routing, topology matching},
9464 isbn = {0-7803-9246-9}, 9464 isbn = {0-7803-9246-9},
9465 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 9465 url = {http://i30www.ira.uka.de/research/publications/p2p/},
9466 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fuhrmann05emnets.pdf}, 9466 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fuhrmann05emnets.pdf},
9467 author = {Thomas Fuhrmann} 9467 author = {Thomas Fuhrmann}
9468} 9468}
9469@conference {DBLP:conf/sigcomm/JainDPF05, 9469@conference {DBLP:conf/sigcomm/JainDPF05,
@@ -9479,7 +9479,7 @@ In this paper we present a novel routing approach that is capable of handling co
9479 isbn = {1-59593-009-4}, 9479 isbn = {1-59593-009-4},
9480 doi = {10.1145/1080091.1080106}, 9480 doi = {10.1145/1080091.1080106},
9481 url = {http://portal.acm.org/citation.cfm?doid=1080091.1080106}, 9481 url = {http://portal.acm.org/citation.cfm?doid=1080091.1080106},
9482 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/paper-JaiDem.pdf}, 9482 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/paper-JaiDem.pdf},
9483 author = {Sushant Jain and Michael J. Demmer and Rabin K. Patra and Fall, Kevin} 9483 author = {Sushant Jain and Michael J. Demmer and Rabin K. Patra and Fall, Kevin}
9484} 9484}
9485@booklet {Cooley_abs:the, 9485@booklet {Cooley_abs:the,
@@ -9488,7 +9488,7 @@ In this paper we present a novel routing approach that is capable of handling co
9488 abstract = {Many personal computers are operated with no backup strategy for protecting data in the event of loss or failure. At the same time, PCs are likely to contain spare disk space and unused networking resources. We present the Apportioned Backup System (ABS), which provides a reliable collaborative backup resource by leveraging these independent, distributed resources. With ABS, procuring and maintaining specialized backup hardware is unnecessary. ABS makes efficient use of network and storage resources through use of coding techniques, convergent encryption and storage, and efficient versioning and verification processes. The system also painlessly accommodates dynamic expansion of system compute, storage, and network resources, and is tolerant of catastrophic node failures}, 9488 abstract = {Many personal computers are operated with no backup strategy for protecting data in the event of loss or failure. At the same time, PCs are likely to contain spare disk space and unused networking resources. We present the Apportioned Backup System (ABS), which provides a reliable collaborative backup resource by leveraging these independent, distributed resources. With ABS, procuring and maintaining specialized backup hardware is unnecessary. ABS makes efficient use of network and storage resources through use of coding techniques, convergent encryption and storage, and efficient versioning and verification processes. The system also painlessly accommodates dynamic expansion of system compute, storage, and network resources, and is tolerant of catastrophic node failures},
9489 www_section = {apportioned backup system}, 9489 www_section = {apportioned backup system},
9490 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.6858}, 9490 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.6858},
9491 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.120.6858.pdf}, 9491 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.120.6858.pdf},
9492 author = {Joe Cooley and Chris Taylor and Alen Peacock} 9492 author = {Joe Cooley and Chris Taylor and Alen Peacock}
9493} 9493}
9494@conference {Baset04ananalysis, 9494@conference {Baset04ananalysis,
@@ -9500,7 +9500,7 @@ In this paper we present a novel routing approach that is capable of handling co
9500 abstract = {Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN and Yahoo IM applications. It encrypts calls end-to-end, and stores user information in a decentralized fashion. Skype also supports instant messaging and conferencing. This report analyzes key Skype functions such as login, NAT and firewall traversal, call establishment, media transfer, codecs, and conferencing under three different network setups. Analysis is performed by careful study of Skype network traffic}, 9500 abstract = {Skype is a peer-to-peer VoIP client developed by KaZaa in 2003. Skype claims that it can work almost seamlessly across NATs and firewalls and has better voice quality than the MSN and Yahoo IM applications. It encrypts calls end-to-end, and stores user information in a decentralized fashion. Skype also supports instant messaging and conferencing. This report analyzes key Skype functions such as login, NAT and firewall traversal, call establishment, media transfer, codecs, and conferencing under three different network setups. Analysis is performed by careful study of Skype network traffic},
9501 www_section = {P2P, VoIP}, 9501 www_section = {P2P, VoIP},
9502 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.2433}, 9502 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.84.2433},
9503 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cucs-039-04.pdf}, 9503 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cucs-039-04.pdf},
9504 author = {Salman A. Baset and Henning G. Schulzrinne} 9504 author = {Salman A. Baset and Henning G. Schulzrinne}
9505} 9505}
9506@conference {newman:pet2004, 9506@conference {newman:pet2004,
@@ -9518,7 +9518,7 @@ Initial work considered a simple model, with an observer (Eve) restricted to cou
9518 isbn = {978-3-540-26203-9}, 9518 isbn = {978-3-540-26203-9},
9519 doi = {10.1007/b136164}, 9519 doi = {10.1007/b136164},
9520 url = {http://www.springerlink.com/content/w256n3dfl6wf2q3m/}, 9520 url = {http://www.springerlink.com/content/w256n3dfl6wf2q3m/},
9521 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/newman-pet2004.pdf}, 9521 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/newman-pet2004.pdf},
9522 author = {Richard E. Newman and Vipan R. Nalla and Ira S. Moskowitz} 9522 author = {Richard E. Newman and Vipan R. Nalla and Ira S. Moskowitz}
9523} 9523}
9524@article {halpern-oneill-2003, 9524@article {halpern-oneill-2003,
@@ -9531,7 +9531,7 @@ Initial work considered a simple model, with an observer (Eve) restricted to cou
9531 www_section = {anonymity, epistemic logic, formal methods}, 9531 www_section = {anonymity, epistemic logic, formal methods},
9532 issn = {0926-227X}, 9532 issn = {0926-227X},
9533 url = {http://portal.acm.org/citation.cfm?id=1145953}, 9533 url = {http://portal.acm.org/citation.cfm?id=1145953},
9534 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/halpern-oneill-2003.pdf}, 9534 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/halpern-oneill-2003.pdf},
9535 author = {Joseph Y. Halpern and Kevin R. O'Neil} 9535 author = {Joseph Y. Halpern and Kevin R. O'Neil}
9536} 9536}
9537@mastersthesis {andrei-thesis, 9537@mastersthesis {andrei-thesis,
@@ -9540,7 +9540,7 @@ Initial work considered a simple model, with an observer (Eve) restricted to cou
9540 month = {June}, 9540 month = {June},
9541 school = {University of Cambridge}, 9541 school = {University of Cambridge},
9542 type = {phd}, 9542 type = {phd},
9543 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/andrei-thesis.pdf}, 9543 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/andrei-thesis.pdf},
9544 author = {Andrei Serjantov} 9544 author = {Andrei Serjantov}
9545} 9545}
9546@conference {wisa04-Klonowski, 9546@conference {wisa04-Klonowski,
@@ -9554,7 +9554,7 @@ Initial work considered a simple model, with an observer (Eve) restricted to cou
9554In this paper we propose an {\textquotedblleft}onion-like{\textquotedblright} encoding design based on universal reencryption. The onions constructed in this way can be used in a protocol that achieves the same goals as the classical onions, however, at the same time we achieve immunity against a repetitive attack. Even if an adversary disturbs communication and prevents processing a message somewhere on the onion path, it is easy to identify the malicious server performing the attack and provide an evidence of its illegal behavior}, 9554In this paper we propose an {\textquotedblleft}onion-like{\textquotedblright} encoding design based on universal reencryption. The onions constructed in this way can be used in a protocol that achieves the same goals as the classical onions, however, at the same time we achieve immunity against a repetitive attack. Even if an adversary disturbs communication and prevents processing a message somewhere on the onion path, it is easy to identify the malicious server performing the attack and provide an evidence of its illegal behavior},
9555 www_section = {onion routing, repetitive attack, universal re-encryption, unlinkability}, 9555 www_section = {onion routing, repetitive attack, universal re-encryption, unlinkability},
9556 isbn = {978-3-540-24302-1}, 9556 isbn = {978-3-540-24302-1},
9557 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/wisa04-Klonowski.pdf}, 9557 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/wisa04-Klonowski.pdf},
9558 author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski} 9558 author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski}
9559} 9559}
9560@conference {Mislove04ap3:cooperative, 9560@conference {Mislove04ap3:cooperative,
@@ -9566,14 +9566,14 @@ In this paper we propose an {\textquotedblleft}onion-like{\textquotedblright} en
9566 www_section = {anonymity, Peer-to-Peer Proxy}, 9566 www_section = {anonymity, Peer-to-Peer Proxy},
9567 doi = {10.1145/1133572.1133578}, 9567 doi = {10.1145/1133572.1133578},
9568 url = {http://portal.acm.org/citation.cfm?id=1133578}, 9568 url = {http://portal.acm.org/citation.cfm?id=1133578},
9569 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.61.6219.pdf} 9569 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.61.6219.pdf}
9570} 9570}
9571@booklet {2004_0, 9571@booklet {2004_0,
9572 title = {Apres-a system for anonymous presence}, 9572 title = {Apres-a system for anonymous presence},
9573 year = {2004}, 9573 year = {2004},
9574 abstract = {If Alice wants to know when Bob is online, and they don't want anyone else to know their interest in each other, what do they do? Once they know they are both online, they would like to be able to exchange messages, send files, make phone calls to each other, and so forth, all without anyone except them knowing they are doing this. Apres is a system that attempts to make this possible}, 9574 abstract = {If Alice wants to know when Bob is online, and they don't want anyone else to know their interest in each other, what do they do? Once they know they are both online, they would like to be able to exchange messages, send files, make phone calls to each other, and so forth, all without anyone except them knowing they are doing this. Apres is a system that attempts to make this possible},
9575 www_section = {anonymous presence, presence}, 9575 www_section = {anonymous presence, presence},
9576 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/apres.pdf}, 9576 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/apres.pdf},
9577 author = {Laurie, Ben} 9577 author = {Laurie, Ben}
9578} 9578}
9579@conference {Antoniadis04anasymptotically, 9579@conference {Antoniadis04anasymptotically,
@@ -9585,7 +9585,7 @@ In this paper we propose an {\textquotedblleft}onion-like{\textquotedblright} en
9585 abstract = {The asymptotic analysis of certain public good models for p2p systems suggests that when the aim is to maximize social welfare a fixed contribution scheme in terms of the number of files shared can be asymptotically optimal as the number of participants grows to infinity. Such a simple scheme eliminates free riding, is incentive compatible and obtains a value of social welfare that is within o(n) of that obtained by the second-best policy of the corresponding mechanism design formulation of the problem. We extend our model to account for file popularity, and discuss properties of the resulting equilibria. The fact that a simple optimization problem can be used to closely approximate the solution of the exact model (which is in most cases practically intractable both analytically and computationally), is of great importance for studying several interesting aspects of the system. We consider the evolution of the system to equilibrium in its early life, when both peers and the system planner are still learning about system parameters. We also analyse the case of group formation when peers belong to different classes (such as DSL and dial-up users), and it may be to their advantage to form distinct groups instead of a larger single group, or form such a larger group but avoid disclosing their class. We finally discuss the game that occurs when peers know that a fixed fee will be used, but the distribution of their valuations is unknown to the system designer}, 9585 abstract = {The asymptotic analysis of certain public good models for p2p systems suggests that when the aim is to maximize social welfare a fixed contribution scheme in terms of the number of files shared can be asymptotically optimal as the number of participants grows to infinity. Such a simple scheme eliminates free riding, is incentive compatible and obtains a value of social welfare that is within o(n) of that obtained by the second-best policy of the corresponding mechanism design formulation of the problem. We extend our model to account for file popularity, and discuss properties of the resulting equilibria. The fact that a simple optimization problem can be used to closely approximate the solution of the exact model (which is in most cases practically intractable both analytically and computationally), is of great importance for studying several interesting aspects of the system. We consider the evolution of the system to equilibrium in its early life, when both peers and the system planner are still learning about system parameters. We also analyse the case of group formation when peers belong to different classes (such as DSL and dial-up users), and it may be to their advantage to form distinct groups instead of a larger single group, or form such a larger group but avoid disclosing their class. We finally discuss the game that occurs when peers know that a fixed fee will be used, but the distribution of their valuations is unknown to the system designer},
9586 www_section = {asymptotically optimal, P2P, sharing}, 9586 www_section = {asymptotically optimal, P2P, sharing},
9587 url = {http://www.eecs.harvard.edu/p2pecon/confman/papers }, 9587 url = {http://www.eecs.harvard.edu/p2pecon/confman/papers },
9588 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/optimalscheme04.pdf}, 9588 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/optimalscheme04.pdf},
9589 author = {Panayotis Antoniadis and Costas Courcoubetis and Richard Weber} 9589 author = {Panayotis Antoniadis and Costas Courcoubetis and Richard Weber}
9590} 9590}
9591@booklet {Levien04attackresistant, 9591@booklet {Levien04attackresistant,
@@ -9593,7 +9593,7 @@ In this paper we propose an {\textquotedblleft}onion-like{\textquotedblright} en
9593 year = {2004}, 9593 year = {2004},
9594 abstract = {This dissertation characterizes the space of trust metrics, under both the scalar assumption where each assertion is evaluated independently, and the group assumption where a group of assertions are evaluated in tandem. We present a quantitative framework for evaluating the attack resistance of trust metrics, and give examples of trust metrics that are within a small factor of optimum compared to theoretical upper bounds. We discuss experiences with a realworld deployment of a group trust metric, the Advogato website. Finally, we explore possible applications of attack resistant trust metrics, including using it as to build a distributed name server, verifying metadata in peer-to-peer networks such as music sharing systems, and a proposal for highly spam resistant e-mail delivery}, 9594 abstract = {This dissertation characterizes the space of trust metrics, under both the scalar assumption where each assertion is evaluated independently, and the group assumption where a group of assertions are evaluated in tandem. We present a quantitative framework for evaluating the attack resistance of trust metrics, and give examples of trust metrics that are within a small factor of optimum compared to theoretical upper bounds. We discuss experiences with a realworld deployment of a group trust metric, the Advogato website. Finally, we explore possible applications of attack resistant trust metrics, including using it as to build a distributed name server, verifying metadata in peer-to-peer networks such as music sharing systems, and a proposal for highly spam resistant e-mail delivery},
9595 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.9266}, 9595 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.9266},
9596 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/compact.pdf}, 9596 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/compact.pdf},
9597 author = {Raph Levien} 9597 author = {Raph Levien}
9598} 9598}
9599@conference {2004.Pang.imc.dns, 9599@conference {2004.Pang.imc.dns,
@@ -9609,7 +9609,7 @@ In this paper we propose an {\textquotedblleft}onion-like{\textquotedblright} en
9609 isbn = {1-58113-821-0}, 9609 isbn = {1-58113-821-0},
9610 doi = {http://doi.acm.org/10.1145/1028788.1028790}, 9610 doi = {http://doi.acm.org/10.1145/1028788.1028790},
9611 url = {http://doi.acm.org/10.1145/1028788.1028790}, 9611 url = {http://doi.acm.org/10.1145/1028788.1028790},
9612 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IMC\%2704\%20-\%20Availability\%2C\%20Usage\%2C\%20and\%20Deployment\%20Characteristics\%20of\%20the\%20DNS.pdf}, 9612 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IMC\%2704\%20-\%20Availability\%2C\%20Usage\%2C\%20and\%20Deployment\%20Characteristics\%20of\%20the\%20DNS.pdf},
9613 author = {Jeffrey Pang and James Hendricks and Aditya Akella and Bruce Maggs and Roberto De Prisco and Seshan, Srinivasan} 9613 author = {Jeffrey Pang and James Hendricks and Aditya Akella and Bruce Maggs and Roberto De Prisco and Seshan, Srinivasan}
9614} 9614}
9615@article {1026492, 9615@article {1026492,
@@ -9626,7 +9626,7 @@ In this paper we propose an {\textquotedblleft}onion-like{\textquotedblright} en
9626 issn = {1545-5971}, 9626 issn = {1545-5971},
9627 doi = {10.1109/TDSC.2004.2}, 9627 doi = {10.1109/TDSC.2004.2},
9628 url = {http://portal.acm.org/citation.cfm?id=1026488.1026492$\#$}, 9628 url = {http://portal.acm.org/citation.cfm?id=1026488.1026492$\#$},
9629 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.88.2793.pdf}, 9629 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.88.2793.pdf},
9630 author = {Avizienis, Algirdas and Laprie, Jean-Claude and Randell, Brian and Carl Landwehr} 9630 author = {Avizienis, Algirdas and Laprie, Jean-Claude and Randell, Brian and Carl Landwehr}
9631} 9631}
9632@mastersthesis {george-thesis, 9632@mastersthesis {george-thesis,
@@ -9636,7 +9636,7 @@ In this paper we propose an {\textquotedblleft}onion-like{\textquotedblright} en
9636 school = {University of Cambridge}, 9636 school = {University of Cambridge},
9637 type = {phd}, 9637 type = {phd},
9638 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.3200}, 9638 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.3200},
9639 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/george-thesis.pdf}, 9639 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/george-thesis.pdf},
9640 author = {George Danezis} 9640 author = {George Danezis}
9641} 9641}
9642@conference {Cramer04Bootstrapping, 9642@conference {Cramer04Bootstrapping,
@@ -9652,7 +9652,7 @@ In this paper we propose an {\textquotedblleft}onion-like{\textquotedblright} en
9652 isbn = {0-7803-8783-X }, 9652 isbn = {0-7803-8783-X },
9653 doi = {10.1109/ICON.2004.1409169}, 9653 doi = {10.1109/ICON.2004.1409169},
9654 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 9654 url = {http://i30www.ira.uka.de/research/publications/p2p/},
9655 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cramer04bootstrapping.pdf}, 9655 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cramer04bootstrapping.pdf},
9656 author = {Cramer, Curt and Kendy Kutzner and Thomas Fuhrmann} 9656 author = {Cramer, Curt and Kendy Kutzner and Thomas Fuhrmann}
9657} 9657}
9658@conference {mixmaster-reliable, 9658@conference {mixmaster-reliable,
@@ -9667,7 +9667,7 @@ We identify flaws in the software in Reliable that further compromise its abilit
9667 isbn = {978-3-540-22987-2}, 9667 isbn = {978-3-540-22987-2},
9668 doi = {10.1007/b100085}, 9668 doi = {10.1007/b100085},
9669 url = {http://www.springerlink.com/content/7lvqwn445ty1c7ga/}, 9669 url = {http://www.springerlink.com/content/7lvqwn445ty1c7ga/},
9670 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mixmaster-reliable.pdf}, 9670 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/mixmaster-reliable.pdf},
9671 author = {Claudia Diaz and Len Sassaman and Evelyne Dewitte} 9671 author = {Claudia Diaz and Len Sassaman and Evelyne Dewitte}
9672} 9672}
9673@article {2004_1, 9673@article {2004_1,
@@ -9680,7 +9680,7 @@ We identify flaws in the software in Reliable that further compromise its abilit
9680 abstract = {There are many research interests in peer-to-peer (P2P) overlay architectures. Most widely used unstructured P2P networks rely on central directory servers or massive message flooding, clearly not scalable. Structured overlay networks based on distributed hash tables (DHT) are expected to eliminate flooding and central servers, but can require many long-haul message deliveries. An important aspect of constructing an efficient overlay network is how to exploit network locality in the underlying network. We propose a novel mechanism, mOverlay, for constructing an overlay network that takes account of the locality of network hosts. The constructed overlay network can significantly decrease the communication cost between end hosts by ensuring that a message reaches its destination with small overhead and very efficient forwarding. To construct the locality-aware overlay network, dynamic landmark technology is introduced. We present an effective locating algorithm for a new host joining the overlay network. We then present a theoretical analysis and simulation results to evaluate the network performance. Our analysis shows that the overhead of our locating algorithm is O(logN), where N is the number of overlay network hosts. Our simulation results show that the average distance between a pair of hosts in the constructed overlay network is only about 11\% of the one in a traditional, randomly connected overlay network. Network design guidelines are also provided. Many large-scale network applications, such as media streaming, application-level multicasting, and media distribution, can leverage mOverlay to enhance their performance}, 9680 abstract = {There are many research interests in peer-to-peer (P2P) overlay architectures. Most widely used unstructured P2P networks rely on central directory servers or massive message flooding, clearly not scalable. Structured overlay networks based on distributed hash tables (DHT) are expected to eliminate flooding and central servers, but can require many long-haul message deliveries. An important aspect of constructing an efficient overlay network is how to exploit network locality in the underlying network. We propose a novel mechanism, mOverlay, for constructing an overlay network that takes account of the locality of network hosts. The constructed overlay network can significantly decrease the communication cost between end hosts by ensuring that a message reaches its destination with small overhead and very efficient forwarding. To construct the locality-aware overlay network, dynamic landmark technology is introduced. We present an effective locating algorithm for a new host joining the overlay network. We then present a theoretical analysis and simulation results to evaluate the network performance. Our analysis shows that the overhead of our locating algorithm is O(logN), where N is the number of overlay network hosts. Our simulation results show that the average distance between a pair of hosts in the constructed overlay network is only about 11\% of the one in a traditional, randomly connected overlay network. Network design guidelines are also provided. Many large-scale network applications, such as media streaming, application-level multicasting, and media distribution, can leverage mOverlay to enhance their performance},
9681 www_section = {distributed hash table, flooding attacks, overlay networks, P2P}, 9681 www_section = {distributed hash table, flooding attacks, overlay networks, P2P},
9682 url = {http://kmweb.twbbs.org/drupal/node/13}, 9682 url = {http://kmweb.twbbs.org/drupal/node/13},
9683 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/6-914.ppt}, 9683 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/6-914.ppt},
9684 author = {Xin Yan Zhang and Qian Zhang and Zhang, Zhensheng and Gang Song and Wenwu Zhu} 9684 author = {Xin Yan Zhang and Qian Zhang and Zhang, Zhensheng and Gang Song and Wenwu Zhu}
9685} 9685}
9686@conference {1111777, 9686@conference {1111777,
@@ -9695,7 +9695,7 @@ We identify flaws in the software in Reliable that further compromise its abilit
9695 www_section = {P2P, redundancy, storage}, 9695 www_section = {P2P, redundancy, storage},
9696 isbn = {0-7803-8430-X}, 9696 isbn = {0-7803-8430-X},
9697 url = {http://portal.acm.org/citation.cfm?id=1111777$\#$}, 9697 url = {http://portal.acm.org/citation.cfm?id=1111777$\#$},
9698 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.102.9992.pdf}, 9698 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.102.9992.pdf},
9699 author = {Gil Utard and Antoine Vernois} 9699 author = {Gil Utard and Antoine Vernois}
9700} 9700}
9701@conference {Garces-Erice2004DataIndexing, 9701@conference {Garces-Erice2004DataIndexing,
@@ -9720,7 +9720,7 @@ We identify flaws in the software in Reliable that further compromise its abilit
9720 school = {University of Dublin}, 9720 school = {University of Dublin},
9721 address = {Dublin, Ireland}, 9721 address = {Dublin, Ireland},
9722 www_section = {autonomic distributed system, descentralised coordination}, 9722 www_section = {autonomic distributed system, descentralised coordination},
9723 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Thesis\%20-\%20Autonomic\%20distributed\%20systems.pdf}, 9723 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Thesis\%20-\%20Autonomic\%20distributed\%20systems.pdf},
9724 author = {Jim Dowling} 9724 author = {Jim Dowling}
9725} 9725}
9726@conference {1133613, 9726@conference {1133613,
@@ -9735,7 +9735,7 @@ We identify flaws in the software in Reliable that further compromise its abilit
9735 www_section = {attack, overlay networks}, 9735 www_section = {attack, overlay networks},
9736 doi = {10.1145/1133572.1133613}, 9736 doi = {10.1145/1133572.1133613},
9737 url = {http://portal.acm.org/citation.cfm?id=1133572.1133613$\#$}, 9737 url = {http://portal.acm.org/citation.cfm?id=1133572.1133613$\#$},
9738 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.61.5727.pdf}, 9738 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.61.5727.pdf},
9739 author = {Singh, Atul and Miguel Castro and Peter Druschel and Antony Rowstron} 9739 author = {Singh, Atul and Miguel Castro and Peter Druschel and Antony Rowstron}
9740} 9740}
9741@conference {Cramer04DemandDrivenClustering, 9741@conference {Cramer04DemandDrivenClustering,
@@ -9749,7 +9749,7 @@ We identify flaws in the software in Reliable that further compromise its abilit
9749 abstract = { Many clustering protocols for mobile ad hoc networks (MANETs) have been proposed in the literature. With only one exception so far [1], all these protocols are proactive, thus wasting bandwidth when their function is not currently needed. To reduce the signalling traffic load, reactive clustering may be employed. We have developed a clustering protocol named {\textquotedblleft}On-Demand Group Mobility-Based Clustering {\textquotedblright} (ODGMBC) which is reactive. Its goal is to build clusters as a basis for address autoconfiguration and hierarchical routing. The design process especially addresses the notion of group mobility in a MANET. As a result, ODGMBC maps varying physical node groups onto logical clusters. In this paper, ODGMBC is described. It was implemented for the ad hoc network simulator GloMoSim [2] and evaluated using several performance indicators. Simulation results are promising and show that ODGMBC leads to stable clusters. This stability is advantageous for autoconfiguration and routing mechansims to be employed in conjunction with the clustering algorithm. Index Terms {\textemdash} clustering, multi-hop, reactive, MANET, group mobility}, 9749 abstract = { Many clustering protocols for mobile ad hoc networks (MANETs) have been proposed in the literature. With only one exception so far [1], all these protocols are proactive, thus wasting bandwidth when their function is not currently needed. To reduce the signalling traffic load, reactive clustering may be employed. We have developed a clustering protocol named {\textquotedblleft}On-Demand Group Mobility-Based Clustering {\textquotedblright} (ODGMBC) which is reactive. Its goal is to build clusters as a basis for address autoconfiguration and hierarchical routing. The design process especially addresses the notion of group mobility in a MANET. As a result, ODGMBC maps varying physical node groups onto logical clusters. In this paper, ODGMBC is described. It was implemented for the ad hoc network simulator GloMoSim [2] and evaluated using several performance indicators. Simulation results are promising and show that ODGMBC leads to stable clusters. This stability is advantageous for autoconfiguration and routing mechansims to be employed in conjunction with the clustering algorithm. Index Terms {\textemdash} clustering, multi-hop, reactive, MANET, group mobility},
9750 www_section = {mobile Ad-hoc networks, multi-hop networks}, 9750 www_section = {mobile Ad-hoc networks, multi-hop networks},
9751 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 9751 url = {http://i30www.ira.uka.de/research/publications/p2p/},
9752 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cramer04odgmbc.pdf}, 9752 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cramer04odgmbc.pdf},
9753 author = {Cramer, Curt and Oliver Stanze and Kilian Weniger and Martina Zitterbart} 9753 author = {Cramer, Curt and Oliver Stanze and Kilian Weniger and Martina Zitterbart}
9754} 9754}
9755@conference {Hof04SecureDistributedServiceDirectory, 9755@conference {Hof04SecureDistributedServiceDirectory,
@@ -9763,7 +9763,7 @@ We identify flaws in the software in Reliable that further compromise its abilit
9763 isbn = {978-3-540-20825-9}, 9763 isbn = {978-3-540-20825-9},
9764 doi = {10.1007/978-3-540-24606-0_19}, 9764 doi = {10.1007/978-3-540-24606-0_19},
9765 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 9765 url = {http://i30www.ira.uka.de/research/publications/p2p/},
9766 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/scan.pdf}, 9766 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/scan.pdf},
9767 author = {Hans-Joachim Hof and Erik-Oliver Blass and Thomas Fuhrmann and Martina Zitterbart} 9767 author = {Hans-Joachim Hof and Erik-Oliver Blass and Thomas Fuhrmann and Martina Zitterbart}
9768} 9768}
9769@conference {Dabek:2004:DDL:1251175.1251182, 9769@conference {Dabek:2004:DDL:1251175.1251182,
@@ -9782,7 +9782,7 @@ This paper explores the design of these techniques and their interaction in a co
9782Measurements with 425 server instances running on 150 PlanetLab and RON hosts show that the latency optimizations reduce the time required to locate and fetch data by a factor of two. The throughput optimizations result in a sustainable bulk read throughput related to the number of DHT hosts times the capacity of the slowest access link; with 150 selected PlanetLab hosts, the peak aggregate throughput over multiple clients is 12.8 megabytes per second}, 9782Measurements with 425 server instances running on 150 PlanetLab and RON hosts show that the latency optimizations reduce the time required to locate and fetch data by a factor of two. The throughput optimizations result in a sustainable bulk read throughput related to the number of DHT hosts times the capacity of the slowest access link; with 150 selected PlanetLab hosts, the peak aggregate throughput over multiple clients is 12.8 megabytes per second},
9783 www_section = {distributed hash table, high-throughput, latency}, 9783 www_section = {distributed hash table, high-throughput, latency},
9784 url = {http://dl.acm.org/citation.cfm?id=1251175.1251182}, 9784 url = {http://dl.acm.org/citation.cfm?id=1251175.1251182},
9785 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NSDI\%2704\%20-\%20Designing\%20a\%20DHT\%20for\%20low\%20latency\%20and\%20high\%20throughput.pdf}, 9785 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NSDI\%2704\%20-\%20Designing\%20a\%20DHT\%20for\%20low\%20latency\%20and\%20high\%20throughput.pdf},
9786 author = {Dabek, Frank and Li, Jinyang and Emil Sit and Robertson, James and Frans M. Kaashoek and Robert Morris} 9786 author = {Dabek, Frank and Li, Jinyang and Emil Sit and Robertson, James and Frans M. Kaashoek and Robert Morris}
9787} 9787}
9788@conference {2004_3, 9788@conference {2004_3,
@@ -9798,7 +9798,7 @@ Measurements with 425 server instances running on 150 PlanetLab and RON hosts sh
9798 www_section = {incentives, P2P, peer-to-peer networking}, 9798 www_section = {incentives, P2P, peer-to-peer networking},
9799 isbn = {0-7803-8525-X }, 9799 isbn = {0-7803-8525-X },
9800 doi = {10.1109/GECON.2004.1317584 }, 9800 doi = {10.1109/GECON.2004.1317584 },
9801 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/GECON\%2704\%20-\%20Designing\%20incentive\%20mechanisms\%20for\%20p2p\%20systems.pdf}, 9801 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/GECON\%2704\%20-\%20Designing\%20incentive\%20mechanisms\%20for\%20p2p\%20systems.pdf},
9802 author = {John Chuang} 9802 author = {John Chuang}
9803} 9803}
9804@booklet {_digitalfountains:, 9804@booklet {_digitalfountains:,
@@ -9807,7 +9807,7 @@ Measurements with 425 server instances running on 150 PlanetLab and RON hosts sh
9807 year = {2004}, 9807 year = {2004},
9808 abstract = {survey constructions and applications of digital fountains, an abstraction of erasure coding for network communication. Digital fountains effectively change the standard paradigm where a user receives an ordered stream of packets to one where a user must simply receive enough packets in order to obtain the desired data. Obviating the need for ordered data simplifies data delivery, especially when the data is large or is to be distributed to a large number of users. We also examine barriers to the adoption of digital fountains and discuss whether they can be overcome. I}, 9808 abstract = {survey constructions and applications of digital fountains, an abstraction of erasure coding for network communication. Digital fountains effectively change the standard paradigm where a user receives an ordered stream of packets to one where a user must simply receive enough packets in order to obtain the desired data. Obviating the need for ordered data simplifies data delivery, especially when the data is large or is to be distributed to a large number of users. We also examine barriers to the adoption of digital fountains and discuss whether they can be overcome. I},
9809 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.2282}, 9809 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.114.2282},
9810 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.114.2282.pdf} 9810 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.114.2282.pdf}
9811} 9811}
9812@conference {golle:eurocrypt2004, 9812@conference {golle:eurocrypt2004,
9813 title = {Dining Cryptographers Revisited}, 9813 title = {Dining Cryptographers Revisited},
@@ -9823,7 +9823,7 @@ We present new DC-net constructions that simultaneously achieve non-interactivit
9823 isbn = {978-3-540-21935-4}, 9823 isbn = {978-3-540-21935-4},
9824 doi = {10.1007/b97182}, 9824 doi = {10.1007/b97182},
9825 url = {http://www.springerlink.com/content/ud2tb1fyk5m2ywlu/}, 9825 url = {http://www.springerlink.com/content/ud2tb1fyk5m2ywlu/},
9826 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/golle-eurocrypt2004.pdf}, 9826 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/golle-eurocrypt2004.pdf},
9827 author = {Philippe Golle and Ari Juels} 9827 author = {Philippe Golle and Ari Juels}
9828} 9828}
9829@conference { izal:dissecting, 9829@conference { izal:dissecting,
@@ -9840,7 +9840,7 @@ We present new DC-net constructions that simultaneously achieve non-interactivit
9840 abstract = {Popular content such as software updates is requested by a large number of users. Traditionally, to satisfy a large number of requests, lager server farms or mirroring are used, both of which are expensive. An inexpensive alternative are peer-to-peer based replication systems, where users who retrieve the file, act simultaneously as clients and servers. In this paper, we study BitTorrent, a new and already very popular peer-to-peer application that allows distribution of very large contents to a large set of hosts. Our analysis of BitTorrent is based on measurements collected on a five months long period that involved thousands of peers}, 9840 abstract = {Popular content such as software updates is requested by a large number of users. Traditionally, to satisfy a large number of requests, lager server farms or mirroring are used, both of which are expensive. An inexpensive alternative are peer-to-peer based replication systems, where users who retrieve the file, act simultaneously as clients and servers. In this paper, we study BitTorrent, a new and already very popular peer-to-peer application that allows distribution of very large contents to a large set of hosts. Our analysis of BitTorrent is based on measurements collected on a five months long period that involved thousands of peers},
9841 www_section = {BitTorrent, P2P, peer-to-peer networking, replication system}, 9841 www_section = {BitTorrent, P2P, peer-to-peer networking, replication system},
9842 doi = {10.1007/978-3-540-24668-8_1}, 9842 doi = {10.1007/978-3-540-24668-8_1},
9843 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PAM\%2704\%20-\%20Dissecting\%20bittorrent.pdf}, 9843 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PAM\%2704\%20-\%20Dissecting\%20bittorrent.pdf},
9844 author = {Mikel Izal and Guillaume Urvoy-Keller and E W Biersack and Pascal Felber and Anwar Al Hamra and L Garc{\'e}s-Erice} 9844 author = {Mikel Izal and Guillaume Urvoy-Keller and E W Biersack and Pascal Felber and Anwar Al Hamra and L Garc{\'e}s-Erice}
9845} 9845}
9846@conference {Cramer04Scheduling, 9846@conference {Cramer04Scheduling,
@@ -9853,7 +9853,7 @@ We present new DC-net constructions that simultaneously achieve non-interactivit
9853 abstract = {Since the advent of Gnutella, Peer-to-Peer (P2P) protocols have matured towards a fundamental design element for large-scale, self-organising distributed systems. Many research efforts have been invested to improve various aspects of P2P systems, like their performance, scalability, and so on. However, little experience has been gathered from the actual deployment of such P2P systems apart from the typical file sharing applications. To bridge this gap and to gain more experience in making the transition from theory to practice, we started building advanced P2P applications whose explicit goal is {\textquotedblleft}to be deployed in the wild{\textquotedblright}. In this paper, we describe a fully decentralised P2P video recording system. Every node in the system is a networked computer (desktop PC or set-top box) capable of receiving and recording DVB-S, i.e. digital satellite TV. Like a normal video recorder, users can program their machines to record certain programmes. With our system, they will be able to schedule multiple recordings in parallel. It is the task of the system to assign the recordings to different machines in the network. Moreover, users can {\textquotedblleft}record broadcasts in the past{\textquotedblright}, i.e. the system serves as a short-term archival storage}, 9853 abstract = {Since the advent of Gnutella, Peer-to-Peer (P2P) protocols have matured towards a fundamental design element for large-scale, self-organising distributed systems. Many research efforts have been invested to improve various aspects of P2P systems, like their performance, scalability, and so on. However, little experience has been gathered from the actual deployment of such P2P systems apart from the typical file sharing applications. To bridge this gap and to gain more experience in making the transition from theory to practice, we started building advanced P2P applications whose explicit goal is {\textquotedblleft}to be deployed in the wild{\textquotedblright}. In this paper, we describe a fully decentralised P2P video recording system. Every node in the system is a networked computer (desktop PC or set-top box) capable of receiving and recording DVB-S, i.e. digital satellite TV. Like a normal video recorder, users can program their machines to record certain programmes. With our system, they will be able to schedule multiple recordings in parallel. It is the task of the system to assign the recordings to different machines in the network. Moreover, users can {\textquotedblleft}record broadcasts in the past{\textquotedblright}, i.e. the system serves as a short-term archival storage},
9854 www_section = {DVB, P2P}, 9854 www_section = {DVB, P2P},
9855 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 9855 url = {http://i30www.ira.uka.de/research/publications/p2p/},
9856 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cramer04scheduling.pdf}, 9856 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cramer04scheduling.pdf},
9857 author = {Cramer, Curt and Kendy Kutzner and Thomas Fuhrmann} 9857 author = {Cramer, Curt and Kendy Kutzner and Thomas Fuhrmann}
9858} 9858}
9859@conference {mmsec04-Klonowski, 9859@conference {mmsec04-Klonowski,
@@ -9878,7 +9878,7 @@ The simplest solution to this problem would be to send many onions with the same
9878 abstract = {We propose the first economic model of censorship resistance. Early peer-to-peer systems, such as the Eternity Service, sought to achieve censorshop resistance by distributing content randomly over the whole Internet. An alternative approach is to encourage nodes to serve resources they are interested in. Both architectures have been implemented but so far there has been no quantitative analysis of the protection they provide. We develop a model inspired by economics and con 9878 abstract = {We propose the first economic model of censorship resistance. Early peer-to-peer systems, such as the Eternity Service, sought to achieve censorshop resistance by distributing content randomly over the whole Internet. An alternative approach is to encourage nodes to serve resources they are interested in. Both architectures have been implemented but so far there has been no quantitative analysis of the protection they provide. We develop a model inspired by economics and con
9879ict theory to analyse these systems. Under our assumptions, resource distribution according to nodes' individual preferences provides better stability and resistance to censorship. Our results may have wider application too}, 9879ict theory to analyse these systems. Under our assumptions, resource distribution according to nodes' individual preferences provides better stability and resistance to censorship. Our results may have wider application too},
9880 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.4.7003\&rep=rep1\&type=pdf}, 9880 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.4.7003\&rep=rep1\&type=pdf},
9881 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.4.7003\%20\%281\%29.pdf}, 9881 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.4.7003\%20\%281\%29.pdf},
9882 author = {George Danezis and Ross Anderson} 9882 author = {George Danezis and Ross Anderson}
9883} 9883}
9884@book {2004_4, 9884@book {2004_4,
@@ -9894,7 +9894,7 @@ ict theory to analyse these systems. Under our assumptions, resource distributio
9894 isbn = {978-3-540-21935-4}, 9894 isbn = {978-3-540-21935-4},
9895 doi = {10.1007/978-3-540-24676-3_1}, 9895 doi = {10.1007/978-3-540-24676-3_1},
9896 url = {http://dx.doi.org/10.1007/978-3-540-24676-3_1}, 9896 url = {http://dx.doi.org/10.1007/978-3-540-24676-3_1},
9897 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EffecitvePrivateMatching2004Freedman.pdf}, 9897 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EffecitvePrivateMatching2004Freedman.pdf},
9898 author = {Freedman, MichaelJ. and Nissim, Kobbi and Pinkas, Benny}, 9898 author = {Freedman, MichaelJ. and Nissim, Kobbi and Pinkas, Benny},
9899 editor = {Cachin, Christian and Camenisch, Jan L} 9899 editor = {Cachin, Christian and Camenisch, Jan L}
9900} 9900}
@@ -9906,7 +9906,7 @@ ict theory to analyse these systems. Under our assumptions, resource distributio
9906 organization = {Kluwer Academic Publishers}, 9906 organization = {Kluwer Academic Publishers},
9907 abstract = {The resource discovery problem poses new challenges in infrastructure-less wireless networks. Due to the highly dynamic nature of these networks and their bandwidth and energy constraints, there is a pressing need for energy-aware communicationefficient resource discovery protocols. This chapter provides an overview of several approaches to resource discovery, discussing their suitability for classes of wireless networks. The approaches discussed in this chapter include flooding-based approaches, hierarchical cluster-based and dominating set schemes, and hybrid loose hierarchy architectures. Furthermore, the chapter provides a detailed case study on the design, evaluation and analysis of an energy-efficient resource discovery protocol based on hybrid loose hierarchy and utilizing the concept of {\textquoteleft}contacts'}, 9907 abstract = {The resource discovery problem poses new challenges in infrastructure-less wireless networks. Due to the highly dynamic nature of these networks and their bandwidth and energy constraints, there is a pressing need for energy-aware communicationefficient resource discovery protocols. This chapter provides an overview of several approaches to resource discovery, discussing their suitability for classes of wireless networks. The approaches discussed in this chapter include flooding-based approaches, hierarchical cluster-based and dominating set schemes, and hybrid loose hierarchy architectures. Furthermore, the chapter provides a detailed case study on the design, evaluation and analysis of an energy-efficient resource discovery protocol based on hybrid loose hierarchy and utilizing the concept of {\textquoteleft}contacts'},
9908 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.9310}, 9908 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.76.9310},
9909 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.76.9310.pdf}, 9909 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.76.9310.pdf},
9910 author = {Ahmed Helmy} 9910 author = {Ahmed Helmy}
9911} 9911}
9912@conference {mrkoot:sirer04, 9912@conference {mrkoot:sirer04,
@@ -9919,7 +9919,7 @@ ict theory to analyse these systems. Under our assumptions, resource distributio
9919 www_section = {anonymity, file-sharing, overlay networks}, 9919 www_section = {anonymity, file-sharing, overlay networks},
9920 doi = {10.1145/1133572.1133611}, 9920 doi = {10.1145/1133572.1133611},
9921 url = {http://dx.doi.org/10.1145/1133572.1133611}, 9921 url = {http://dx.doi.org/10.1145/1133572.1133611},
9922 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/herbivore-esigops.pdf}, 9922 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/herbivore-esigops.pdf},
9923 author = {Emin G{\"u}n Sirer and Goel, Sharad and Mark Robson and Engin, Dogan} 9923 author = {Emin G{\"u}n Sirer and Goel, Sharad and Mark Robson and Engin, Dogan}
9924} 9924}
9925@conference {1013317, 9925@conference {1013317,
@@ -9934,7 +9934,7 @@ ict theory to analyse these systems. Under our assumptions, resource distributio
9934 isbn = {1-58113-929-2}, 9934 isbn = {1-58113-929-2},
9935 doi = {10.1145/1013235.1013317}, 9935 doi = {10.1145/1013235.1013317},
9936 url = {http://doi.acm.org/10.1145/1013235.1013317}, 9936 url = {http://doi.acm.org/10.1145/1013235.1013317},
9937 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/2004-ISLPED-Energy-aware\%20demand\%20paging\%20on\%20NAND\%20flash-based\%20embedded\%20storages.pdf}, 9937 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/2004-ISLPED-Energy-aware\%20demand\%20paging\%20on\%20NAND\%20flash-based\%20embedded\%20storages.pdf},
9938 author = {Chanik Park and Kang, Jeong-Uk and Park, Seon-Yeong and Kim, Jin-Soo} 9938 author = {Chanik Park and Kang, Jeong-Uk and Park, Seon-Yeong and Kim, Jin-Soo}
9939} 9939}
9940@conference {1251279, 9940@conference {1251279,
@@ -9948,7 +9948,7 @@ ict theory to analyse these systems. Under our assumptions, resource distributio
9948 abstract = {A fundamental vision driving pervasive computing research is access to personal and shared data anywhere at anytime. In many ways, this vision is close to being realized. Wireless networks such as 802.11 offer connectivity to small, mobile devices. Portable storage, such as mobile disks and USB keychains, let users carry several gigabytes of data in their pockets. Yet, at least three substantial barriers to pervasive data access remain. First, power-hungry network and storage devices tax the limited battery capacity of mobile computers. Second, the danger of viewing stale data or making inconsistent updates grows as objects are replicated across more computers and portable storage devices. Third, mobile data access performance can suffer due to variable storage access times caused by dynamic power management, mobility, and use of heterogeneous storage devices. To overcome these barriers, we have built a new distributed file system called BlueFS. Compared to the Coda file system, BlueFS reduces file system energy usage by up to 55\% and provides up to 3 times faster access to data replicated on portable storage}, 9948 abstract = {A fundamental vision driving pervasive computing research is access to personal and shared data anywhere at anytime. In many ways, this vision is close to being realized. Wireless networks such as 802.11 offer connectivity to small, mobile devices. Portable storage, such as mobile disks and USB keychains, let users carry several gigabytes of data in their pockets. Yet, at least three substantial barriers to pervasive data access remain. First, power-hungry network and storage devices tax the limited battery capacity of mobile computers. Second, the danger of viewing stale data or making inconsistent updates grows as objects are replicated across more computers and portable storage devices. Third, mobile data access performance can suffer due to variable storage access times caused by dynamic power management, mobility, and use of heterogeneous storage devices. To overcome these barriers, we have built a new distributed file system called BlueFS. Compared to the Coda file system, BlueFS reduces file system energy usage by up to 55\% and provides up to 3 times faster access to data replicated on portable storage},
9949 www_section = {802.11, file systems}, 9949 www_section = {802.11, file systems},
9950 url = {http://portal.acm.org/citation.cfm?id=1251279$\#$}, 9950 url = {http://portal.acm.org/citation.cfm?id=1251279$\#$},
9951 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/nightingale-bluefs2004.pdf}, 9951 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/nightingale-bluefs2004.pdf},
9952 author = {Nightingale, Edmund B. and Flinn, Jason} 9952 author = {Nightingale, Edmund B. and Flinn, Jason}
9953} 9953}
9954@article {2004_5, 9954@article {2004_5,
@@ -9961,7 +9961,7 @@ ict theory to analyse these systems. Under our assumptions, resource distributio
9961 type = {survey}, 9961 type = {survey},
9962 abstract = {This paper presents a state-of-the-art review of the Web privacy and anonymity enhancing security mechanisms, tools, applications and services, with respect to their architecture, operational principles and vulnerabilities. Furthermore, to facilitate a detailed comparative analysis, the appropriate parameters have been selected and grouped in classes of comparison criteria, in the form of an integrated comparison framework. The main concern during the design of this framework was to cover the confronted security threats, applied technological issues and users' demands satisfaction. GNUnet's Anonymity Protocol (GAP), Freedom, Hordes, Crowds, Onion Routing, Platform for Privacy Preferences (P3P), TRUSTe, Lucent Personalized Web Assistant (LPWA), and Anonymizer have been reviewed and compared. The comparative review has clearly highlighted that the pros and cons of each system do not coincide, mainly due to the fact that each one exhibits different design goals and thus adopts dissimilar techniques for protecting privacy and anonymity}, 9962 abstract = {This paper presents a state-of-the-art review of the Web privacy and anonymity enhancing security mechanisms, tools, applications and services, with respect to their architecture, operational principles and vulnerabilities. Furthermore, to facilitate a detailed comparative analysis, the appropriate parameters have been selected and grouped in classes of comparison criteria, in the form of an integrated comparison framework. The main concern during the design of this framework was to cover the confronted security threats, applied technological issues and users' demands satisfaction. GNUnet's Anonymity Protocol (GAP), Freedom, Hordes, Crowds, Onion Routing, Platform for Privacy Preferences (P3P), TRUSTe, Lucent Personalized Web Assistant (LPWA), and Anonymizer have been reviewed and compared. The comparative review has clearly highlighted that the pros and cons of each system do not coincide, mainly due to the fact that each one exhibits different design goals and thus adopts dissimilar techniques for protecting privacy and anonymity},
9963 www_section = {anonymity, GNUnet, onion routing}, 9963 www_section = {anonymity, GNUnet, onion routing},
9964 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p255.pdf}, 9964 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p255.pdf},
9965 author = {Stefanos Gritzalis} 9965 author = {Stefanos Gritzalis}
9966} 9966}
9967@conference {1021938, 9967@conference {1021938,
@@ -9976,7 +9976,7 @@ ict theory to analyse these systems. Under our assumptions, resource distributio
9976 isbn = {0-7695-2156-8}, 9976 isbn = {0-7695-2156-8},
9977 doi = {10.1109/P2P.2004.17}, 9977 doi = {10.1109/P2P.2004.17},
9978 url = {http://portal.acm.org/citation.cfm?id=1021938$\#$}, 9978 url = {http://portal.acm.org/citation.cfm?id=1021938$\#$},
9979 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.109.2034.pdf}, 9979 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.109.2034.pdf},
9980 author = {Lin, W. K. and Chiu, Dah Ming and Lee, Y. B.} 9980 author = {Lin, W. K. and Chiu, Dah Ming and Lee, Y. B.}
9981} 9981}
9982@booklet {You04evaluationof, 9982@booklet {You04evaluationof,
@@ -9985,7 +9985,7 @@ ict theory to analyse these systems. Under our assumptions, resource distributio
9985 abstract = {The ever-increasing volume of archival data that need to be retained for long periods of time has motivated the design of low-cost, high-efficiency storage systems. Inter-file compression has been proposed as a technique to improve storage efficiency by exploiting the high degree of similarity among archival data. We evaluate the two main inter-file compression techniques, data chunking and delta encoding, and compare them with traditional intra-file compression. We report on experimental results from a range of representative archival data sets}, 9985 abstract = {The ever-increasing volume of archival data that need to be retained for long periods of time has motivated the design of low-cost, high-efficiency storage systems. Inter-file compression has been proposed as a technique to improve storage efficiency by exploiting the high degree of similarity among archival data. We evaluate the two main inter-file compression techniques, data chunking and delta encoding, and compare them with traditional intra-file compression. We report on experimental results from a range of representative archival data sets},
9986 www_section = {compression, storage}, 9986 www_section = {compression, storage},
9987 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.1341}, 9987 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.1341},
9988 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.11.1341.pdf}, 9988 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.11.1341.pdf},
9989 author = {Lawrence L. You and Christos Karamanolis} 9989 author = {Lawrence L. You and Christos Karamanolis}
9990} 9990}
9991@conference {Karp2004/ALGO, 9991@conference {Karp2004/ALGO,
@@ -10017,7 +10017,7 @@ This work was supported in part by the National Science Foundation under Contrac
10017 isbn = {978-3-540-26203-9}, 10017 isbn = {978-3-540-26203-9},
10018 doi = {10.1007/b136164}, 10018 doi = {10.1007/b136164},
10019 url = {http://www.springerlink.com/content/kej7uwxee8h71p81/}, 10019 url = {http://www.springerlink.com/content/kej7uwxee8h71p81/},
10020 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/flow-correlation04.pdf}, 10020 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/flow-correlation04.pdf},
10021 author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao} 10021 author = {Ye Zhu and Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}
10022} 10022}
10023@conference {esorics04-mauw, 10023@conference {esorics04-mauw,
@@ -10031,7 +10031,7 @@ This work was supported in part by the National Science Foundation under Contrac
10031 abstract = {The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goals, such as privacy, has received less attention. Due to the increasing importance of privacy in the current society, formal methods will also become indispensable in this area. Therefore, we propose a formal definition of the notion of anonymity in presence of an observing intruder. We validate this definition by analyzing a well-known anonymity preserving protocol, viz. onion routing}, 10031 abstract = {The use of formal methods to verify security protocols with respect to secrecy and authentication has become standard practice. In contrast, the formalization of other security goals, such as privacy, has received less attention. Due to the increasing importance of privacy in the current society, formal methods will also become indispensable in this area. Therefore, we propose a formal definition of the notion of anonymity in presence of an observing intruder. We validate this definition by analyzing a well-known anonymity preserving protocol, viz. onion routing},
10032 www_section = {anonymity, onion routing, privacy}, 10032 www_section = {anonymity, onion routing, privacy},
10033 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.75.2547}, 10033 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.75.2547},
10034 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/esorics04-mauw.pdf}, 10034 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/esorics04-mauw.pdf},
10035 author = {Sjouke Mauw and Jan Verschuren and Erik P. de Vink} 10035 author = {Sjouke Mauw and Jan Verschuren and Erik P. de Vink}
10036} 10036}
10037@conference {reiter:ccs2004, 10037@conference {reiter:ccs2004,
@@ -10047,7 +10047,7 @@ This work was supported in part by the National Science Foundation under Contrac
10047 isbn = {1-58113-961-6}, 10047 isbn = {1-58113-961-6},
10048 doi = {10.1145/1030083.1030114}, 10048 doi = {10.1145/1030083.1030114},
10049 url = {http://portal.acm.org/citation.cfm?id=1030114}, 10049 url = {http://portal.acm.org/citation.cfm?id=1030114},
10050 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/reiter-ccs2004.pdf}, 10050 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/reiter-ccs2004.pdf},
10051 author = {Michael K. Reiter and XiaoFeng Wang} 10051 author = {Michael K. Reiter and XiaoFeng Wang}
10052} 10052}
10053@conference {Feldman:2004:FWP:1016527.1016539, 10053@conference {Feldman:2004:FWP:1016527.1016539,
@@ -10065,7 +10065,7 @@ This work was supported in part by the National Science Foundation under Contrac
10065 isbn = {1-58113-942-X}, 10065 isbn = {1-58113-942-X},
10066 doi = {http://doi.acm.org/10.1145/1016527.1016539}, 10066 doi = {http://doi.acm.org/10.1145/1016527.1016539},
10067 url = {http://doi.acm.org/10.1145/1016527.1016539}, 10067 url = {http://doi.acm.org/10.1145/1016527.1016539},
10068 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PINS\%2704\%20-\%20\%20Free-riding\%20and\%20whitewashing\%20in\%20P2P\%20systems.pdf}, 10068 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PINS\%2704\%20-\%20\%20Free-riding\%20and\%20whitewashing\%20in\%20P2P\%20systems.pdf},
10069 author = {Michal Feldman and Papadimitriou, Christos and John Chuang and Ion Stoica} 10069 author = {Michal Feldman and Papadimitriou, Christos and John Chuang and Ion Stoica}
10070} 10070}
10071@book {2004_6, 10071@book {2004_6,
@@ -10080,7 +10080,7 @@ This work was supported in part by the National Science Foundation under Contrac
10080 isbn = {978-3-540-22849-3}, 10080 isbn = {978-3-540-22849-3},
10081 doi = {10.1007/978-3-540-27836-8_18}, 10081 doi = {10.1007/978-3-540-27836-8_18},
10082 url = {http://dx.doi.org/10.1007/978-3-540-27836-8_18}, 10082 url = {http://dx.doi.org/10.1007/978-3-540-27836-8_18},
10083 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p_icalp04_0.pdf}, 10083 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p_icalp04_0.pdf},
10084 author = {Awerbuch, Baruch and Scheideler, Christian}, 10084 author = {Awerbuch, Baruch and Scheideler, Christian},
10085 editor = {D{\'\i}az, Josep and Karhum{\"a}ki, Juhani and Lepist{\"o}, Arto and Sannella, Donald} 10085 editor = {D{\'\i}az, Josep and Karhum{\"a}ki, Juhani and Lepist{\"o}, Arto and Sannella, Donald}
10086} 10086}
@@ -10097,7 +10097,7 @@ However, the statistical hitting set attack is prone to wrong solutions with a g
10097 www_section = {anonymity, hitting set attack, traffic analysis}, 10097 www_section = {anonymity, hitting set attack, traffic analysis},
10098 doi = {10.1007/b104759}, 10098 doi = {10.1007/b104759},
10099 url = {http://www.springerlink.com/content/t6bkk4tyjvr71m55/}, 10099 url = {http://www.springerlink.com/content/t6bkk4tyjvr71m55/},
10100 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/hitting-set04.pdf}, 10100 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/hitting-set04.pdf},
10101 author = {Dogan Kesdogan and Lexi Pimenidis} 10101 author = {Dogan Kesdogan and Lexi Pimenidis}
10102} 10102}
10103@conference {koepsell:wpes2004, 10103@conference {koepsell:wpes2004,
@@ -10113,7 +10113,7 @@ However, the statistical hitting set attack is prone to wrong solutions with a g
10113 isbn = {1-58113-968-3}, 10113 isbn = {1-58113-968-3},
10114 doi = {10.1145/1029179.1029197}, 10114 doi = {10.1145/1029179.1029197},
10115 url = {http://portal.acm.org/citation.cfm?id=1029179.1029197}, 10115 url = {http://portal.acm.org/citation.cfm?id=1029179.1029197},
10116 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/koepsell-wpes2004_0.pdf}, 10116 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/koepsell-wpes2004_0.pdf},
10117 author = {Stefan K{\"o}psell and Ulf Hilling} 10117 author = {Stefan K{\"o}psell and Ulf Hilling}
10118} 10118}
10119@conference {fairbrother:pet2004, 10119@conference {fairbrother:pet2004,
@@ -10132,7 +10132,7 @@ Golle et al's techniques for universal re-encryption are reviewed, and a hybrid
10132 isbn = {978-3-540-26203-9}, 10132 isbn = {978-3-540-26203-9},
10133 doi = {10.1007/b136164}, 10133 doi = {10.1007/b136164},
10134 url = {http://www.springerlink.com/content/q07439n27u1egx0w/}, 10134 url = {http://www.springerlink.com/content/q07439n27u1egx0w/},
10135 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fairbrother-pet2004.pdf}, 10135 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fairbrother-pet2004.pdf},
10136 author = {Peter Fairbrother} 10136 author = {Peter Fairbrother}
10137} 10137}
10138@article {modular-approach, 10138@article {modular-approach,
@@ -10148,7 +10148,7 @@ The key feature of our approach is its modularity. It yields precise, formal spe
10148 www_section = {anonymity, information hiding, privacy}, 10148 www_section = {anonymity, information hiding, privacy},
10149 issn = {0926-227X}, 10149 issn = {0926-227X},
10150 url = {http://portal.acm.org/citation.cfm?id=1297694}, 10150 url = {http://portal.acm.org/citation.cfm?id=1297694},
10151 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/shmat_anon.pdf}, 10151 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/shmat_anon.pdf},
10152 author = {Dominic Hughes and Vitaly Shmatikov} 10152 author = {Dominic Hughes and Vitaly Shmatikov}
10153} 10153}
10154@conference {1096703, 10154@conference {1096703,
@@ -10162,7 +10162,7 @@ The key feature of our approach is its modularity. It yields precise, formal spe
10162 abstract = {We describe a technique called lookaside caching that combines the strengths of distributed file systems and portable storage devices, while negating their weaknesses. In spite of its simplicity, this technique proves to be powerful and versatile. By unifying distributed storage and portable storage into a single abstraction, lookaside caching allows users to treat devices they carry as merely performance and availability assists for distant file servers. Careless use of portable storage has no catastrophic consequences. Experimental results show that significant performance improvements are possible even in the presence of stale data on the portable device}, 10162 abstract = {We describe a technique called lookaside caching that combines the strengths of distributed file systems and portable storage devices, while negating their weaknesses. In spite of its simplicity, this technique proves to be powerful and versatile. By unifying distributed storage and portable storage into a single abstraction, lookaside caching allows users to treat devices they carry as merely performance and availability assists for distant file servers. Careless use of portable storage has no catastrophic consequences. Experimental results show that significant performance improvements are possible even in the presence of stale data on the portable device},
10163 www_section = {caching proxies, distributed database}, 10163 www_section = {caching proxies, distributed database},
10164 url = {http://portal.acm.org/citation.cfm?id=1096703$\#$}, 10164 url = {http://portal.acm.org/citation.cfm?id=1096703$\#$},
10165 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/integratingpds-fast04.pdf}, 10165 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/integratingpds-fast04.pdf},
10166 author = {Niraj Tolia and Harkes, Jan and Michael Kozuch and Satyanarayanan, Mahadev} 10166 author = {Niraj Tolia and Harkes, Jan and Michael Kozuch and Satyanarayanan, Mahadev}
10167} 10167}
10168@article {987233, 10168@article {987233,
@@ -10179,7 +10179,7 @@ The key feature of our approach is its modularity. It yields precise, formal spe
10179 issn = {1063-6692}, 10179 issn = {1063-6692},
10180 doi = {10.1109/TNET.2004.826279}, 10180 doi = {10.1109/TNET.2004.826279},
10181 url = {http://portal.acm.org/citation.cfm?id=987233$\#$}, 10181 url = {http://portal.acm.org/citation.cfm?id=987233$\#$},
10182 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/i3.pdf}, 10182 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/i3.pdf},
10183 author = {Ion Stoica and Adkins, Daniel and Shelley Zhuang and S Shenker and Surana, Sonesh} 10183 author = {Ion Stoica and Adkins, Daniel and Shelley Zhuang and S Shenker and Surana, Sonesh}
10184} 10184}
10185@book {2004_7, 10185@book {2004_7,
@@ -10194,7 +10194,7 @@ The key feature of our approach is its modularity. It yields precise, formal spe
10194 isbn = {9780199275984}, 10194 isbn = {9780199275984},
10195 doi = {10.1093/019927598X.001.0001}, 10195 doi = {10.1093/019927598X.001.0001},
10196 url = {http://www.oxfordscholarship.com/view/10.1093/019927598X.001.0001/acprof-9780199275984}, 10196 url = {http://www.oxfordscholarship.com/view/10.1093/019927598X.001.0001/acprof-9780199275984},
10197 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Menezes\%20\%26\%20Monteiro\%20-\%20An\%20Introduction\%20to\%20Auction\%20Theory.pdf}, 10197 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Menezes\%20\%26\%20Monteiro\%20-\%20An\%20Introduction\%20to\%20Auction\%20Theory.pdf},
10198 author = {Flavio M. Menezes and Paulo K. Monteiro} 10198 author = {Flavio M. Menezes and Paulo K. Monteiro}
10199} 10199}
10200@mastersthesis {Amnefelt04keso-, 10200@mastersthesis {Amnefelt04keso-,
@@ -10215,7 +10215,7 @@ The main goals for the design of Keso has been that it should make use of spare
10215By basing Keso on peer-to-peer techniques it becomes highly scalable, fault tolerant and self-organizing. Keso is intended to run on ordinary workstations and can make use of the previously unused storage space. Keso also provides means for access control and data privacy despite being built on top of untrusted components. The file system utilizes the fact that a lot of data stored in traditional file systems is redundant by letting all files that contains a datablock with the same contents reference the same datablock in the file system. This is achieved while still maintaining access control and data privacy}, 10215By basing Keso on peer-to-peer techniques it becomes highly scalable, fault tolerant and self-organizing. Keso is intended to run on ordinary workstations and can make use of the previously unused storage space. Keso also provides means for access control and data privacy despite being built on top of untrusted components. The file system utilizes the fact that a lot of data stored in traditional file systems is redundant by letting all files that contains a datablock with the same contents reference the same datablock in the file system. This is achieved while still maintaining access control and data privacy},
10216 www_section = {decentralized file system, DKS, Keso}, 10216 www_section = {decentralized file system, DKS, Keso},
10217 url = {http://mattias.amnefe.lt/keso/}, 10217 url = {http://mattias.amnefe.lt/keso/},
10218 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Amnefelt\%20\%26\%20Svenningsson\%20-\%20Keso.pdf}, 10218 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Amnefelt\%20\%26\%20Svenningsson\%20-\%20Keso.pdf},
10219 author = {Mattias Amnefelt and Johanna Svenningsson} 10219 author = {Mattias Amnefelt and Johanna Svenningsson}
10220} 10220}
10221@booklet {Yu04leopard:a, 10221@booklet {Yu04leopard:a,
@@ -10225,7 +10225,7 @@ By basing Keso on peer-to-peer techniques it becomes highly scalable, fault tole
10225 abstract = {A fundamental challenge in Peer-To-Peer (P2P) systems is how to locate objects of interest, namely, the look-up service problem. A key break-through towards a scalable and distributed solution of this problem is the distributed hash}, 10225 abstract = {A fundamental challenge in Peer-To-Peer (P2P) systems is how to locate objects of interest, namely, the look-up service problem. A key break-through towards a scalable and distributed solution of this problem is the distributed hash},
10226 www_section = {distributed hash table, P2P}, 10226 www_section = {distributed hash table, P2P},
10227 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.3912}, 10227 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.134.3912},
10228 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM05_Poster.pdf}, 10228 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM05_Poster.pdf},
10229 author = {Yinzhe Yu and Sanghwan Lee and Zhi-li Zhang} 10229 author = {Yinzhe Yu and Sanghwan Lee and Zhi-li Zhang}
10230} 10230}
10231@conference {feamster:wpes2004, 10231@conference {feamster:wpes2004,
@@ -10240,7 +10240,7 @@ Specifically, we implement a variant of a recently proposed technique that passi
10240 www_section = {anonymity, autonomous systems}, 10240 www_section = {anonymity, autonomous systems},
10241 doi = {10.1145/1029179.1029199}, 10241 doi = {10.1145/1029179.1029199},
10242 url = {http://portal.acm.org/citation.cfm?id=1029199}, 10242 url = {http://portal.acm.org/citation.cfm?id=1029199},
10243 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.10.6119.pdf}, 10243 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.10.6119.pdf},
10244 author = {Nick Feamster and Roger Dingledine} 10244 author = {Nick Feamster and Roger Dingledine}
10245} 10245}
10246@conference {1251195, 10246@conference {1251195,
@@ -10253,7 +10253,7 @@ Specifically, we implement a variant of a recently proposed technique that passi
10253 address = {Berkeley, CA, USA}, 10253 address = {Berkeley, CA, USA},
10254 abstract = {Currently, researchers designing and implementing large-scale overlay services employ disparate techniques at each stage in the production cycle: design, implementation, experimentation, and evaluation. As a result, complex and tedious tasks are often duplicated leading to ineffective resource use and difficulty in fairly comparing competing algorithms. In this paper, we present MACEDON, an infrastructure that provides facilities to: i) specify distributed algorithms in a concise domain-specific language; ii) generate code that executes in popular evaluation infrastructures and in live networks; iii) leverage an overlay-generic API to simplify the interoperability of algorithm implementations and applications; and iv) enable consistent experimental evaluation. We have used MACEDON to implement and evaluate a number of algorithms, including AMMO, Bullet, Chord, NICE, Overcast, Pastry, Scribe, and SplitStream, typically with only a few hundred lines of MACEDON code. Using our infrastructure, we are able to accurately reproduce or exceed published results and behavior demonstrated by current publicly available implementations}, 10254 abstract = {Currently, researchers designing and implementing large-scale overlay services employ disparate techniques at each stage in the production cycle: design, implementation, experimentation, and evaluation. As a result, complex and tedious tasks are often duplicated leading to ineffective resource use and difficulty in fairly comparing competing algorithms. In this paper, we present MACEDON, an infrastructure that provides facilities to: i) specify distributed algorithms in a concise domain-specific language; ii) generate code that executes in popular evaluation infrastructures and in live networks; iii) leverage an overlay-generic API to simplify the interoperability of algorithm implementations and applications; and iv) enable consistent experimental evaluation. We have used MACEDON to implement and evaluate a number of algorithms, including AMMO, Bullet, Chord, NICE, Overcast, Pastry, Scribe, and SplitStream, typically with only a few hundred lines of MACEDON code. Using our infrastructure, we are able to accurately reproduce or exceed published results and behavior demonstrated by current publicly available implementations},
10255 url = {http://portal.acm.org/citation.cfm?id=1251175.1251195$\#$}, 10255 url = {http://portal.acm.org/citation.cfm?id=1251175.1251195$\#$},
10256 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.2.8796.pdf}, 10256 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.2.8796.pdf},
10257 author = {Rodriguez, Adolfo and Killian, Charles and Bhat, Sooraj and Kosti{\'c}, Dejan and Vahdat, Amin} 10257 author = {Rodriguez, Adolfo and Killian, Charles and Bhat, Sooraj and Kosti{\'c}, Dejan and Vahdat, Amin}
10258} 10258}
10259@conference {TH04, 10259@conference {TH04,
@@ -10266,7 +10266,7 @@ Specifically, we implement a variant of a recently proposed technique that passi
10266 abstract = {Anonymous message transmission should be a key feature in network architectures ensuring that delivered messages are impossible-or at least infeasible-to be traced back to their senders. For this purpose the formal model of the non-adaptive, real-time PROB-channel will be introduced. In this model attackers try to circumvent applied protection measures and to link senders to delivered messages. In order to formally measure the level of anonymity provided by the system, the probability will be given, with which observers can determine the senders of delivered messages (source-hiding property) or the recipients of sent messages (destination-hiding property). In order to reduce the certainty of an observer, possible counter-measures will be defined that will ensure specified upper limit for the probability with which an observer can mark someone as the sender or recipient of a message. Finally results of simulations will be shown to demonstrate the strength of the techniques}, 10266 abstract = {Anonymous message transmission should be a key feature in network architectures ensuring that delivered messages are impossible-or at least infeasible-to be traced back to their senders. For this purpose the formal model of the non-adaptive, real-time PROB-channel will be introduced. In this model attackers try to circumvent applied protection measures and to link senders to delivered messages. In order to formally measure the level of anonymity provided by the system, the probability will be given, with which observers can determine the senders of delivered messages (source-hiding property) or the recipients of sent messages (destination-hiding property). In order to reduce the certainty of an observer, possible counter-measures will be defined that will ensure specified upper limit for the probability with which an observer can mark someone as the sender or recipient of a message. Finally results of simulations will be shown to demonstrate the strength of the techniques},
10267 isbn = {3-540-26203-2}, 10267 isbn = {3-540-26203-2},
10268 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.851}, 10268 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.77.851},
10269 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/TH04.pdf}, 10269 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/TH04.pdf},
10270 author = {Gergely T{\'o}th and Zolt{\'a}n Horn{\'a}k} 10270 author = {Gergely T{\'o}th and Zolt{\'a}n Horn{\'a}k}
10271} 10271}
10272@conference {THV04, 10272@conference {THV04,
@@ -10279,7 +10279,7 @@ Specifically, we implement a variant of a recently proposed technique that passi
10279 abstract = {Anonymous message transmission systems are the building blocks of several high-level anonymity services (e.g. epayment, e-voting). Therefore, it is essential to give a theoretically based but also practically usable objective numerical measure for the provided level of anonymity. In this paper two entropybased anonymity measures will be analyzed and some shortcomings of these methods will be highlighted. Finally, source- and destination-hiding properties will be introduced for so called local anonymity, an aspect reflecting the point of view of the users}, 10279 abstract = {Anonymous message transmission systems are the building blocks of several high-level anonymity services (e.g. epayment, e-voting). Therefore, it is essential to give a theoretically based but also practically usable objective numerical measure for the provided level of anonymity. In this paper two entropybased anonymity measures will be analyzed and some shortcomings of these methods will be highlighted. Finally, source- and destination-hiding properties will be introduced for so called local anonymity, an aspect reflecting the point of view of the users},
10280 www_section = {anonymity, anonymity measurement}, 10280 www_section = {anonymity, anonymity measurement},
10281 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.7843}, 10281 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.7843},
10282 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/THV04.pdf}, 10282 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/THV04.pdf},
10283 author = {Gergely T{\'o}th and Zolt{\'a}n Horn{\'a}k and Ferenc Vajda}, 10283 author = {Gergely T{\'o}th and Zolt{\'a}n Horn{\'a}k and Ferenc Vajda},
10284 editor = {Sanna Liimatainen and Teemupekka Virtanen} 10284 editor = {Sanna Liimatainen and Teemupekka Virtanen}
10285} 10285}
@@ -10297,7 +10297,7 @@ Specifically, we implement a variant of a recently proposed technique that passi
10297 issn = {0146-4833}, 10297 issn = {0146-4833},
10298 doi = {10.1145/1030194.1015507}, 10298 doi = {10.1145/1030194.1015507},
10299 url = {http://portal.acm.org/citation.cfm?id=1030194.1015507$\#$}, 10299 url = {http://portal.acm.org/citation.cfm?id=1030194.1015507$\#$},
10300 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p625-bharambe1.pdf}, 10300 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p625-bharambe1.pdf},
10301 author = {Bharambe, Ashwin R. and Agrawal, Mukesh and Seshan, Srinivasan} 10301 author = {Bharambe, Ashwin R. and Agrawal, Mukesh and Seshan, Srinivasan}
10302} 10302}
10303@conference {danezis:wpes2004, 10303@conference {danezis:wpes2004,
@@ -10313,7 +10313,7 @@ Specifically, we implement a variant of a recently proposed technique that passi
10313 isbn = {1-58113-968-3}, 10313 isbn = {1-58113-968-3},
10314 doi = {10.1145/1029179.1029198}, 10314 doi = {10.1145/1029179.1029198},
10315 url = {http://portal.acm.org/citation.cfm?id=1029179.1029198}, 10315 url = {http://portal.acm.org/citation.cfm?id=1029179.1029198},
10316 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/danezis-wpes2004.pdf}, 10316 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/danezis-wpes2004.pdf},
10317 author = {George Danezis and Ben Laurie} 10317 author = {George Danezis and Ben Laurie}
10318} 10318}
10319@conference {Qiu:2004:MPA:1015467.1015508, 10319@conference {Qiu:2004:MPA:1015467.1015508,
@@ -10331,7 +10331,7 @@ Specifically, we implement a variant of a recently proposed technique that passi
10331 isbn = {1-58113-862-8}, 10331 isbn = {1-58113-862-8},
10332 doi = {http://doi.acm.org/10.1145/1015467.1015508}, 10332 doi = {http://doi.acm.org/10.1145/1015467.1015508},
10333 url = {http://doi.acm.org/10.1145/1015467.1015508}, 10333 url = {http://doi.acm.org/10.1145/1015467.1015508},
10334 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%2704\%20-\%20Qui\%20\%26\%20Srikant\%20-\%20Modeling\%20and\%20performance\%20analysis.pdf}, 10334 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%2704\%20-\%20Qui\%20\%26\%20Srikant\%20-\%20Modeling\%20and\%20performance\%20analysis.pdf},
10335 author = {Qiu, Dongyu and Rayadurgam Srikant} 10335 author = {Qiu, Dongyu and Rayadurgam Srikant}
10336} 10336}
10337@conference {Aberer04multifacetedsimultaneous, 10337@conference {Aberer04multifacetedsimultaneous,
@@ -10343,7 +10343,7 @@ Specifically, we implement a variant of a recently proposed technique that passi
10343 abstract = {In this paper we present and evaluate uncoordinated on-line algorithms for simultaneous storage and replication load-balancing in DHT-based peer-to-peer systems. We compare our approach with the classical balls into bins model, and point out the similarities but also the differences which call for new loadbalancing mechanisms specifically targeted at P2P systems. Some of the peculiarities of P2P systems, which make our problem even more challenging are that both the network membership and the data indexed in the network is dynamic, there is neither global coordination nor global information to rely on, and the load-balancing mechanism ideally should not compromise the structural properties and thus the search efficiency of the DHT, while preserving the semantic information of the data (e.g., lexicographic ordering to enable range searches)}, 10343 abstract = {In this paper we present and evaluate uncoordinated on-line algorithms for simultaneous storage and replication load-balancing in DHT-based peer-to-peer systems. We compare our approach with the classical balls into bins model, and point out the similarities but also the differences which call for new loadbalancing mechanisms specifically targeted at P2P systems. Some of the peculiarities of P2P systems, which make our problem even more challenging are that both the network membership and the data indexed in the network is dynamic, there is neither global coordination nor global information to rely on, and the load-balancing mechanism ideally should not compromise the structural properties and thus the search efficiency of the DHT, while preserving the semantic information of the data (e.g., lexicographic ordering to enable range searches)},
10344 www_section = {distributed hash table, P2P, storage}, 10344 www_section = {distributed hash table, P2P, storage},
10345 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.3746}, 10345 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.3746},
10346 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/self-star-load-balance.pdf}, 10346 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/self-star-load-balance.pdf},
10347 author = {Karl Aberer and Anwitaman Datta and Manfred Hauswirth} 10347 author = {Karl Aberer and Anwitaman Datta and Manfred Hauswirth}
10348} 10348}
10349@conference {DBLP:conf/infocom/ChandraBB04, 10349@conference {DBLP:conf/infocom/ChandraBB04,
@@ -10352,7 +10352,7 @@ Specifically, we implement a variant of a recently proposed technique that passi
10352 year = {2004}, 10352 year = {2004},
10353 abstract = {There are a number of scenarios where it is desirable to have a wireless device connect to multiple networks simultaneously. Currently, this is possible only by using multiple wireless network cards in the device. Unfortunately, using multiple wireless cards causes excessive energy drain and consequent reduction of lifetime in battery operated devices. In this paper, we propose a software based approach, called MultiNet, that facilitates simultaneous connections to multiple networks by virtualizing a single wireless card. The wireless card is virtualized by introducing an intermediate layer below IP, which continuously switches the card across multiple networks. The goal of the switching algorithm is to be transparent to the user who sees her machine as being connected to multiple networks. We present the design, implementation, and performance of the MultiNet system.We analyze and evaluate buffering and switching algorithms in terms of delay and energy consumption. Our system has been operational for over twelve months, it is agnostic of the upper layer protocols, and works well over popular IEEE 802.11 wireless LAN cards}, 10353 abstract = {There are a number of scenarios where it is desirable to have a wireless device connect to multiple networks simultaneously. Currently, this is possible only by using multiple wireless network cards in the device. Unfortunately, using multiple wireless cards causes excessive energy drain and consequent reduction of lifetime in battery operated devices. In this paper, we propose a software based approach, called MultiNet, that facilitates simultaneous connections to multiple networks by virtualizing a single wireless card. The wireless card is virtualized by introducing an intermediate layer below IP, which continuously switches the card across multiple networks. The goal of the switching algorithm is to be transparent to the user who sees her machine as being connected to multiple networks. We present the design, implementation, and performance of the MultiNet system.We analyze and evaluate buffering and switching algorithms in terms of delay and energy consumption. Our system has been operational for over twelve months, it is agnostic of the upper layer protocols, and works well over popular IEEE 802.11 wireless LAN cards},
10354 url = {http://www.pubzone.org/dblp/conf/infocom/ChandraBB04}, 10354 url = {http://www.pubzone.org/dblp/conf/infocom/ChandraBB04},
10355 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/18_3.PDF}, 10355 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/18_3.PDF},
10356 author = {Ranveer Chandra and Victor Bahl and Pradeep Bahl} 10356 author = {Ranveer Chandra and Victor Bahl and Pradeep Bahl}
10357} 10357}
10358@conference {Kleinberg:2004:NFD:982792.982803, 10358@conference {Kleinberg:2004:NFD:982792.982803,
@@ -10369,7 +10369,7 @@ Specifically, we implement a variant of a recently proposed technique that passi
10369 www_section = {failure detection, graph connectivity, network}, 10369 www_section = {failure detection, graph connectivity, network},
10370 isbn = {0-89871-558-X}, 10370 isbn = {0-89871-558-X},
10371 url = {http://dl.acm.org/citation.cfm?id=982792.982803}, 10371 url = {http://dl.acm.org/citation.cfm?id=982792.982803},
10372 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SODA\%2704\%20-\%20Network\%20failure\%20detection\%20and\%20graph\%20connectivity\%250A.pdf}, 10372 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SODA\%2704\%20-\%20Network\%20failure\%20detection\%20and\%20graph\%20connectivity\%250A.pdf},
10373 author = {Kleinberg, Jon and Sandler, Mark and Slivkins, Aleksandrs} 10373 author = {Kleinberg, Jon and Sandler, Mark and Slivkins, Aleksandrs}
10374} 10374}
10375@conference {Ng:2004:NPS:1247415.1247426, 10375@conference {Ng:2004:NPS:1247415.1247426,
@@ -10385,7 +10385,7 @@ Specifically, we implement a variant of a recently proposed technique that passi
10385 abstract = {Network positioning has recently been demonstrated to be a viable concept to represent the network distance relationships among Internet end hosts. Several subsequent studies have examined the potential benefits of using network position in applications, and proposed alternative network positioning algorithms. In this paper, we study the problem of designing and building a network positioning system (NPS). We identify several key system-building issues such as the consistency, adaptivity and stability of host network positions over time. We propose a hierarchical network positioning architecture that maintains consistency while enabling decentralization, a set of adaptive decentralized algorithms to compute and maintain accurate, stable network positions, and finally present a prototype system deployed on PlanetLab nodes that can be used by a variety of applications. We believe our system is a viable first step to provide a network positioning capability in the Internet}, 10385 abstract = {Network positioning has recently been demonstrated to be a viable concept to represent the network distance relationships among Internet end hosts. Several subsequent studies have examined the potential benefits of using network position in applications, and proposed alternative network positioning algorithms. In this paper, we study the problem of designing and building a network positioning system (NPS). We identify several key system-building issues such as the consistency, adaptivity and stability of host network positions over time. We propose a hierarchical network positioning architecture that maintains consistency while enabling decentralization, a set of adaptive decentralized algorithms to compute and maintain accurate, stable network positions, and finally present a prototype system deployed on PlanetLab nodes that can be used by a variety of applications. We believe our system is a viable first step to provide a network positioning capability in the Internet},
10386 www_section = {Internet, network positioning algorithms, network positioning system, nps}, 10386 www_section = {Internet, network positioning algorithms, network positioning system, nps},
10387 url = {http://dl.acm.org/citation.cfm?id=1247415.1247426}, 10387 url = {http://dl.acm.org/citation.cfm?id=1247415.1247426},
10388 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ATEC\%2704\%20-\%20A\%20network\%20positioning\%20system.pdf}, 10388 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ATEC\%2704\%20-\%20A\%20network\%20positioning\%20system.pdf},
10389 author = {Ng, T. S. Eugene and Zhang, Hui} 10389 author = {Ng, T. S. Eugene and Zhang, Hui}
10390} 10390}
10391@conference {1251194, 10391@conference {1251194,
@@ -10399,7 +10399,7 @@ Specifically, we implement a variant of a recently proposed technique that passi
10399 abstract = {PlanetLab is a geographically distributed overlay network designed to support the deployment and evaluation of planetary-scale network services. Two high-level goals shape its design. First, to enable a large research community to share the infrastructure, PlanetLab provides distributed virtualization, whereby each service runs in an isolated slice of PlanetLab's global resources. Second, to support competition among multiple network services, PlanetLab decouples the operating system running on each node from the network-wide services that define PlanetLab, a principle referred to as unbundled management. This paper describes how Planet-Lab realizes the goals of distributed virtualization and unbundled management, with a focus on the OS running on each node}, 10399 abstract = {PlanetLab is a geographically distributed overlay network designed to support the deployment and evaluation of planetary-scale network services. Two high-level goals shape its design. First, to enable a large research community to share the infrastructure, PlanetLab provides distributed virtualization, whereby each service runs in an isolated slice of PlanetLab's global resources. Second, to support competition among multiple network services, PlanetLab decouples the operating system running on each node from the network-wide services that define PlanetLab, a principle referred to as unbundled management. This paper describes how Planet-Lab realizes the goals of distributed virtualization and unbundled management, with a focus on the OS running on each node},
10400 www_section = {overlay networks}, 10400 www_section = {overlay networks},
10401 url = {http://portal.acm.org/citation.cfm?id=1251175.1251194$\#$}, 10401 url = {http://portal.acm.org/citation.cfm?id=1251175.1251194$\#$},
10402 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/plos_nsdi_04.pdf}, 10402 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/plos_nsdi_04.pdf},
10403 author = {Bavier, Andy and Bowman, Mic and Chun, Brent and Culler, David and Karlin, Scott and Muir, Steve and Peterson, Larry and Roscoe, Timothy and Spalink, Tammo and Wawrzoniak, Mike} 10403 author = {Bavier, Andy and Bowman, Mic and Chun, Brent and Culler, David and Karlin, Scott and Muir, Steve and Peterson, Larry and Roscoe, Timothy and Spalink, Tammo and Wawrzoniak, Mike}
10404} 10404}
10405@conference {golle:ccs2004, 10405@conference {golle:ccs2004,
@@ -10417,7 +10417,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10417 isbn = {1-58113-961-6}, 10417 isbn = {1-58113-961-6},
10418 doi = {10.1145/1030083.1030113}, 10418 doi = {10.1145/1030083.1030113},
10419 url = {http://portal.acm.org/citation.cfm?id=1030113}, 10419 url = {http://portal.acm.org/citation.cfm?id=1030113},
10420 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/golle-ccs2004.pdf}, 10420 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/golle-ccs2004.pdf},
10421 author = {Philippe Golle and Ari Juels} 10421 author = {Philippe Golle and Ari Juels}
10422} 10422}
10423@booklet {Fakult04peerstore:better, 10423@booklet {Fakult04peerstore:better,
@@ -10426,7 +10426,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10426 abstract = {Backup is cumbersome. To be effective, backups have to be made at regular intervals, forcing users to organize and store a growing collection of backup media. In this paper we propose a novel Peer-to-Peer backup system, PeerStore, that allows the user to store his backups on other people's computers instead. PeerStore is an adaptive, cost-effective system suitable for all types of networks ranging from LAN, WAN to large unstable networks like the Internet. The system consists of two layers: metadata layer and symmetric trading layer. Locating blocks and duplicate checking is accomplished by the metadata layer while the actual data distribution is done between pairs of peers after they have established a symmetric data trade. By decoupling the metadata management from data storage, the system offers a significant reduction of the maintenance cost and preserves fairness among peers. Results show that PeerStore has a reduced maintenance cost comparing to pStore. PeerStore also realizes fairness because of the symmetric nature of the trades}, 10426 abstract = {Backup is cumbersome. To be effective, backups have to be made at regular intervals, forcing users to organize and store a growing collection of backup media. In this paper we propose a novel Peer-to-Peer backup system, PeerStore, that allows the user to store his backups on other people's computers instead. PeerStore is an adaptive, cost-effective system suitable for all types of networks ranging from LAN, WAN to large unstable networks like the Internet. The system consists of two layers: metadata layer and symmetric trading layer. Locating blocks and duplicate checking is accomplished by the metadata layer while the actual data distribution is done between pairs of peers after they have established a symmetric data trade. By decoupling the metadata management from data storage, the system offers a significant reduction of the maintenance cost and preserves fairness among peers. Results show that PeerStore has a reduced maintenance cost comparing to pStore. PeerStore also realizes fairness because of the symmetric nature of the trades},
10427 www_section = {backup, P2P}, 10427 www_section = {backup, P2P},
10428 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.8067}, 10428 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.8067},
10429 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/peerstore-better-performance-by.pdf}, 10429 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/peerstore-better-performance-by.pdf},
10430 author = {Martin Landers and Han Zhang and Kian-Lee Tan} 10430 author = {Martin Landers and Han Zhang and Kian-Lee Tan}
10431} 10431}
10432@conference {2004_8, 10432@conference {2004_8,
@@ -10436,7 +10436,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10436 abstract = {File sharing in wireless ad-hoc networks in a peer to peer manner imposes many challenges that make conventional peer-to-peer systems operating on wire-line networks inapplicable for this case. Information and workload distribution as well as routing are major problems for members of a wireless ad-hoc network, which are only aware of their neighborhood. In this paper we propose a system that solves peer-to-peer filesharing problem for wireless ad-hoc networks. Our system works according to peer-to-peer principles, without requiring a central server, and distributes information regarding the location of shared files among members of the network. By means of a {\textquotedblleft}hashline{\textquotedblright} and forming a tree-structure based on the topology of the network, the system is able to answer location queries, and also discover and maintain routing information that is used to transfer files from a source-peer to another peer}, 10436 abstract = {File sharing in wireless ad-hoc networks in a peer to peer manner imposes many challenges that make conventional peer-to-peer systems operating on wire-line networks inapplicable for this case. Information and workload distribution as well as routing are major problems for members of a wireless ad-hoc network, which are only aware of their neighborhood. In this paper we propose a system that solves peer-to-peer filesharing problem for wireless ad-hoc networks. Our system works according to peer-to-peer principles, without requiring a central server, and distributes information regarding the location of shared files among members of the network. By means of a {\textquotedblleft}hashline{\textquotedblright} and forming a tree-structure based on the topology of the network, the system is able to answer location queries, and also discover and maintain routing information that is used to transfer files from a source-peer to another peer},
10437 author = {unknown}, 10437 author = {unknown},
10438 www_section = {ad-hoc networks, file systems, P2P}, 10438 www_section = {ad-hoc networks, file systems, P2P},
10439 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.124.9928.pdf}, 10439 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.124.9928.pdf},
10440 editor = {Hasan S{\"o}zer and Metin Kekkalmaz and Ibrahim K{\"o}rpeoglu} 10440 editor = {Hasan S{\"o}zer and Metin Kekkalmaz and Ibrahim K{\"o}rpeoglu}
10441} 10441}
10442@article {2004_9, 10442@article {2004_9,
@@ -10449,7 +10449,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10449 abstract = {Unter dem Begriff Peer-to-Peer etabliert sich ein h{\"o}chst interessantes Paradigma f{\"u}r die Kommunikation im Internet. Obwohl urspr{\"u}nglich nur f{\"u}r die sehr pragmatischen und rechtlich umstrittenen Dateitauschb{\"o}rsen entworfen, k{\"o}nnen die Peerto-Peer-Mechanismen zur verteilten Nutzung unterschiedlichster Betriebsmittel genutzt werden und neue M{\"o}glichkeiten f{\"u}r Internetbasierte Anwendungen er{\"o}ffnen}, 10449 abstract = {Unter dem Begriff Peer-to-Peer etabliert sich ein h{\"o}chst interessantes Paradigma f{\"u}r die Kommunikation im Internet. Obwohl urspr{\"u}nglich nur f{\"u}r die sehr pragmatischen und rechtlich umstrittenen Dateitauschb{\"o}rsen entworfen, k{\"o}nnen die Peerto-Peer-Mechanismen zur verteilten Nutzung unterschiedlichster Betriebsmittel genutzt werden und neue M{\"o}glichkeiten f{\"u}r Internetbasierte Anwendungen er{\"o}ffnen},
10450 www_section = {computing, networking, peer-to-peer networking}, 10450 www_section = {computing, networking, peer-to-peer networking},
10451 doi = {10.1007/s00287-003-0362-9}, 10451 doi = {10.1007/s00287-003-0362-9},
10452 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Informatik\%20Spektrum\%20-\%20Peer-to-peer\%20networking\%20\%26\%20-computing.pdf}, 10452 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Informatik\%20Spektrum\%20-\%20Peer-to-peer\%20networking\%20\%26\%20-computing.pdf},
10453 author = {Ralf Steinmetz and Klaus Wehrle} 10453 author = {Ralf Steinmetz and Klaus Wehrle}
10454} 10454}
10455@conference {Cramer04LifeScience, 10455@conference {Cramer04LifeScience,
@@ -10462,7 +10462,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10462 abstract = {Databases and Grid computing are a good match. With the service orientation of Grid computing, the complexity of maintaining and integrating databases can be kept away from the actual users. Data access and integration is performed via services, which also allow to employ an access control. While it is our perception that many proposed Grid applications rely on a centralized and static infrastructure, Peer-to-Peer (P2P) technologies might help to dynamically scale and enhance Grid applications. The focus does not lie on publicly available P2P networks here, but on the self-organizing capabilities of P2P networks in general. A P2P overlay could, e.g., be used to improve the distribution of queries in a data Grid. For studying the combination of these three technologies, Grid computing, databases, and P2P, in this paper, we use an existing application from the life sciences, drug target validation, as an example. In its current form, this system has several drawbacks. We believe that they can be alleviated by using a combination of the service-based architecture of Grid computing and P2P technologies for implementing the services. The work presented in this paper is in progress. We mainly focus on the description of the current system state, its problems and the proposed new architecture. For a better understanding, we also outline the main topics related to the work presented here}, 10462 abstract = {Databases and Grid computing are a good match. With the service orientation of Grid computing, the complexity of maintaining and integrating databases can be kept away from the actual users. Data access and integration is performed via services, which also allow to employ an access control. While it is our perception that many proposed Grid applications rely on a centralized and static infrastructure, Peer-to-Peer (P2P) technologies might help to dynamically scale and enhance Grid applications. The focus does not lie on publicly available P2P networks here, but on the self-organizing capabilities of P2P networks in general. A P2P overlay could, e.g., be used to improve the distribution of queries in a data Grid. For studying the combination of these three technologies, Grid computing, databases, and P2P, in this paper, we use an existing application from the life sciences, drug target validation, as an example. In its current form, this system has several drawbacks. We believe that they can be alleviated by using a combination of the service-based architecture of Grid computing and P2P technologies for implementing the services. The work presented in this paper is in progress. We mainly focus on the description of the current system state, its problems and the proposed new architecture. For a better understanding, we also outline the main topics related to the work presented here},
10463 www_section = {GRID, overlay networks, P2P}, 10463 www_section = {GRID, overlay networks, P2P},
10464 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 10464 url = {http://i30www.ira.uka.de/research/publications/p2p/},
10465 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cramer04lifescience.pdf}, 10465 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cramer04lifescience.pdf},
10466 author = {Cramer, Curt and Andrea Schafferhans and Thomas Fuhrmann} 10466 author = {Cramer, Curt and Andrea Schafferhans and Thomas Fuhrmann}
10467} 10467}
10468@article {2004_10, 10468@article {2004_10,
@@ -10476,7 +10476,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10476 www_section = {BANDWIDTH, category hierarchy, category mapping algorithms, Displays, fusion algorithm, History, human factors, information filtering, information retrieval, libraries, personalized Web search, profile learning, retrieval effectiveness, search engines, search intention, special needs, user interfaces, user profiles, user search histories, Web search, Web search engines}, 10476 www_section = {BANDWIDTH, category hierarchy, category mapping algorithms, Displays, fusion algorithm, History, human factors, information filtering, information retrieval, libraries, personalized Web search, profile learning, retrieval effectiveness, search engines, search intention, special needs, user interfaces, user profiles, user search histories, Web search, Web search engines},
10477 issn = {1041-4347}, 10477 issn = {1041-4347},
10478 doi = {10.1109/TKDE.2004.1264820}, 10478 doi = {10.1109/TKDE.2004.1264820},
10479 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PersonalizedWebSearch2004Liu.pdf}, 10479 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PersonalizedWebSearch2004Liu.pdf},
10480 author = {Fang Liu and Yu, C. and Weiyi Meng} 10480 author = {Fang Liu and Yu, C. and Weiyi Meng}
10481} 10481}
10482@booklet {2004_11, 10482@booklet {2004_11,
@@ -10501,7 +10501,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10501 isbn = {978-3-540-22420-4}, 10501 isbn = {978-3-540-22420-4},
10502 doi = {10.1007/b98935}, 10502 doi = {10.1007/b98935},
10503 url = {http://www.springerlink.com/content/dc1qn54t9ta4u3g1/}, 10503 url = {http://www.springerlink.com/content/dc1qn54t9ta4u3g1/},
10504 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/morphmix-fc2004.pdf}, 10504 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/morphmix-fc2004.pdf},
10505 author = {Marc Rennhard and Bernhard Plattner}, 10505 author = {Marc Rennhard and Bernhard Plattner},
10506 editor = {Ari Juels} 10506 editor = {Ari Juels}
10507} 10507}
@@ -10519,7 +10519,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10519 issn = {0146-4833}, 10519 issn = {0146-4833},
10520 doi = {http://doi.acm.org/10.1145/972374.972394}, 10520 doi = {http://doi.acm.org/10.1145/972374.972394},
10521 url = {http://doi.acm.org/10.1145/972374.972394}, 10521 url = {http://doi.acm.org/10.1145/972374.972394},
10522 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%20Comput.\%20Commun.\%20Rev.\%20-\%20Practical\%2C\%20distributed\%20network\%20coordinates.pdf}, 10522 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%20Comput.\%20Commun.\%20Rev.\%20-\%20Practical\%2C\%20distributed\%20network\%20coordinates.pdf},
10523 author = {Russ Cox and Dabek, Frank and Frans M. Kaashoek and Li, Jinyang and Robert Morris} 10523 author = {Russ Cox and Dabek, Frank and Frans M. Kaashoek and Li, Jinyang and Robert Morris}
10524} 10524}
10525@conference {e2e-traffic, 10525@conference {e2e-traffic,
@@ -10537,7 +10537,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10537 isbn = {978-3-540-26203-9}, 10537 isbn = {978-3-540-26203-9},
10538 doi = {10.1007/b136164}, 10538 doi = {10.1007/b136164},
10539 url = {http://www.springerlink.com/content/v6m6cat1lxvbd4yd/}, 10539 url = {http://www.springerlink.com/content/v6m6cat1lxvbd4yd/},
10540 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/e2e-traffic.pdf}, 10540 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/e2e-traffic.pdf},
10541 author = {Nick Mathewson and Roger Dingledine} 10541 author = {Nick Mathewson and Roger Dingledine}
10542} 10542}
10543@article {Wright:2004, 10543@article {Wright:2004,
@@ -10553,7 +10553,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10553 issn = {1094-9224}, 10553 issn = {1094-9224},
10554 doi = {10.1145/1042031.1042032}, 10554 doi = {10.1145/1042031.1042032},
10555 url = {http://portal.acm.org/citation.cfm?id=1042031.1042032\&coll=GUIDE\&dl=GUIDE\&CFID=76057600\&CFTOKEN=15386893}, 10555 url = {http://portal.acm.org/citation.cfm?id=1042031.1042032\&coll=GUIDE\&dl=GUIDE\&CFID=76057600\&CFTOKEN=15386893},
10556 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Wright-2004.pdf}, 10556 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Wright-2004.pdf},
10557 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields} 10557 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}
10558} 10558}
10559@booklet {Acquisti04privacyin, 10559@booklet {Acquisti04privacyin,
@@ -10578,7 +10578,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10578 isbn = {1-58113-968-3}, 10578 isbn = {1-58113-968-3},
10579 doi = {10.1145/1029179.1029204}, 10579 doi = {10.1145/1029179.1029204},
10580 url = {http://doi.acm.org/10.1145/1029179.1029204}, 10580 url = {http://doi.acm.org/10.1145/1029179.1029204},
10581 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WPES\%2704\%20-\%20Forecasting\%20and\%20benchamking.pdf}, 10581 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WPES\%2704\%20-\%20Forecasting\%20and\%20benchamking.pdf},
10582 author = {Atallah, Mikhail and Bykova, Marina and Li, Jiangtao and Frikken, Keith and Topkara, Mercan} 10582 author = {Atallah, Mikhail and Bykova, Marina and Li, Jiangtao and Frikken, Keith and Topkara, Mercan}
10583} 10583}
10584@article {kissner04private, 10584@article {kissner04private,
@@ -10590,7 +10590,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10590 isbn = {3-540-22217-0}, 10590 isbn = {3-540-22217-0},
10591 issn = {0302-9743 }, 10591 issn = {0302-9743 },
10592 url = {http://cat.inist.fr/?aModele=afficheN\&cpsidt=15852065}, 10592 url = {http://cat.inist.fr/?aModele=afficheN\&cpsidt=15852065},
10593 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/kissner04private.pdf}, 10593 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/kissner04private.pdf},
10594 author = {Lea Kissner and Alina Oprea and Michael K. Reiter and Dawn Xiaodong Song and Ke Yang} 10594 author = {Lea Kissner and Alina Oprea and Michael K. Reiter and Dawn Xiaodong Song and Ke Yang}
10595} 10595}
10596@conference {2004_12, 10596@conference {2004_12,
@@ -10607,7 +10607,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10607 abstract = {The problem of encouraging trustworthy behavior in P2P online communities by managing peers' reputations has drawn a lot of attention recently. However, most of the proposed solutions exhibit the following two problems: huge implementation overhead and unclear trust related model semantics. In this paper we show that a simple probabilistic technique, maximum likelihood estimation namely, can reduce these two problems substantially when employed as the feedback aggregation strategy. Thus, no complex exploration of the feedback is necessary. Instead, simple, intuitive and efficient probabilistic estimation methods suffice}, 10607 abstract = {The problem of encouraging trustworthy behavior in P2P online communities by managing peers' reputations has drawn a lot of attention recently. However, most of the proposed solutions exhibit the following two problems: huge implementation overhead and unclear trust related model semantics. In this paper we show that a simple probabilistic technique, maximum likelihood estimation namely, can reduce these two problems substantially when employed as the feedback aggregation strategy. Thus, no complex exploration of the feedback is necessary. Instead, simple, intuitive and efficient probabilistic estimation methods suffice},
10608 www_section = {p2p network, peer performance}, 10608 www_section = {p2p network, peer performance},
10609 doi = {10.1007/978-3-540-30104-2_6}, 10609 doi = {10.1007/978-3-540-30104-2_6},
10610 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CIA\%2704\%20-\%20Despotovic\%20\%26\%20Aberer\%20-\%20Peers\%27\%20performance\%20in\%20P2P\%20networks.pdf}, 10610 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CIA\%2704\%20-\%20Despotovic\%20\%26\%20Aberer\%20-\%20Peers\%27\%20performance\%20in\%20P2P\%20networks.pdf},
10611 author = {Zoran Despotovic and Karl Aberer} 10611 author = {Zoran Despotovic and Karl Aberer}
10612} 10612}
10613@article {crowds-model, 10613@article {crowds-model,
@@ -10620,7 +10620,7 @@ Parallel re-encryption mixnets offer security guarantees comparable to those of
10620 abstract = {We use the probabilistic model checker PRISM to analyze the Crowds system for anonymous Web browsing. This case study demonstrates how probabilistic model checking techniques can be used to formally analyze security properties of a peer-to-peer group communication system based on random message routing among members. The behavior of group members and the adversary is modeled as a discrete-time Markov chain, and the desired security properties are expressed as PCTL formulas. The PRISM model checker is used to perform automated analysis of the system and verify anonymity guarantees it provides. Our main result is a demonstration of how certain forms of probabilistic anonymity degrade when group size increases or random routing paths are rebuilt, assuming that the corrupt group members are able to identify and/or correlate multiple routing paths originating from the same sender}, 10620 abstract = {We use the probabilistic model checker PRISM to analyze the Crowds system for anonymous Web browsing. This case study demonstrates how probabilistic model checking techniques can be used to formally analyze security properties of a peer-to-peer group communication system based on random message routing among members. The behavior of group members and the adversary is modeled as a discrete-time Markov chain, and the desired security properties are expressed as PCTL formulas. The PRISM model checker is used to perform automated analysis of the system and verify anonymity guarantees it provides. Our main result is a demonstration of how certain forms of probabilistic anonymity degrade when group size increases or random routing paths are rebuilt, assuming that the corrupt group members are able to identify and/or correlate multiple routing paths originating from the same sender},
10621 www_section = {anonymity, P2P, routing}, 10621 www_section = {anonymity, P2P, routing},
10622 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.6570}, 10622 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.6570},
10623 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/shmat_crowds.pdf}, 10623 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/shmat_crowds.pdf},
10624 author = {Vitaly Shmatikov} 10624 author = {Vitaly Shmatikov}
10625} 10625}
10626@conference {berman-fc2004, 10626@conference {berman-fc2004,
@@ -10638,7 +10638,7 @@ In this paper we improve these results: we show that the same level of unlinkabi
10638 isbn = {978-3-540-23208-7}, 10638 isbn = {978-3-540-23208-7},
10639 doi = {10.1007/b100936}, 10639 doi = {10.1007/b100936},
10640 url = {http://www.springerlink.com/content/cknab9y9bpete2ha/}, 10640 url = {http://www.springerlink.com/content/cknab9y9bpete2ha/},
10641 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/berman-fc2004.pdf}, 10641 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/berman-fc2004.pdf},
10642 author = {Ron Berman and Amos Fiat and Amnon Ta-Shma}, 10642 author = {Ron Berman and Amos Fiat and Amnon Ta-Shma},
10643 editor = {Ari Juels} 10643 editor = {Ari Juels}
10644} 10644}
@@ -10649,7 +10649,7 @@ In this paper we improve these results: we show that the same level of unlinkabi
10649 pages = {74--79}, 10649 pages = {74--79},
10650 abstract = {Information dissemination in wide area networks has recently garnered much attention. Two differing models, publish/subscribe and rendezvous-based multicast atop overlay networks, have emerged as the two leading approaches for this goal. Event-based publish/subscribe supports contentbased services with powerful filtering capabilities, while peer-to-peer rendezvous-based services allow for efficient communication in a dynamic network infrastructure. We describe Reach, a system that integrates these two approaches to provide efficient and scalable content-based services in a dynamic network setting}, 10650 abstract = {Information dissemination in wide area networks has recently garnered much attention. Two differing models, publish/subscribe and rendezvous-based multicast atop overlay networks, have emerged as the two leading approaches for this goal. Event-based publish/subscribe supports contentbased services with powerful filtering capabilities, while peer-to-peer rendezvous-based services allow for efficient communication in a dynamic network infrastructure. We describe Reach, a system that integrates these two approaches to provide efficient and scalable content-based services in a dynamic network setting},
10651 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.92.4393\&rep=rep1\&type=pdf}, 10651 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.92.4393\&rep=rep1\&type=pdf},
10652 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/debs04perng.pdf}, 10652 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/debs04perng.pdf},
10653 author = {Ginger Perng and Chenxi Wang and Michael K. Reiter} 10653 author = {Ginger Perng and Chenxi Wang and Michael K. Reiter}
10654} 10654}
10655@conference { boneh04publickey, 10655@conference { boneh04publickey,
@@ -10661,7 +10661,7 @@ In this paper we improve these results: we show that the same level of unlinkabi
10661 organization = {Springer-Verlag}, 10661 organization = {Springer-Verlag},
10662 abstract = {We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice's public key. An email gateway wants to test whether the email contains the keyword "urgent" so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. We define and construct a mechanism that enables Alice to provide a key to the gateway that}, 10662 abstract = {We study the problem of searching on data that is encrypted using a public key system. Consider user Bob who sends email to user Alice encrypted under Alice's public key. An email gateway wants to test whether the email contains the keyword "urgent" so that it could route the email accordingly. Alice, on the other hand does not wish to give the gateway the ability to decrypt all her messages. We define and construct a mechanism that enables Alice to provide a key to the gateway that},
10663 url = {citeseer.ist.psu.edu/boneh04public.html}, 10663 url = {citeseer.ist.psu.edu/boneh04public.html},
10664 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/encsearch.pdf}, 10664 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/encsearch.pdf},
10665 author = {Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Gieseppe Persiano} 10665 author = {Dan Boneh and Giovanni Di Crescenzo and Rafail Ostrovsky and Gieseppe Persiano}
10666} 10666}
10667@conference {pool-dummy04, 10667@conference {pool-dummy04,
@@ -10673,7 +10673,7 @@ In this paper we improve these results: we show that the same level of unlinkabi
10673 address = {Toronto}, 10673 address = {Toronto},
10674 abstract = {In this paper we study the anonymity provided by genralized mixes that insert dummy traffic. Mixes are an essential component to offer anonymous email services. We indicate how to compute the recipient and sender anonymity and we point out some problems that may arise from the intutitive extension of the metric to make into account dummies. Two possible ways of inserting dummy traffic are disussed and compared. An active attack scenario is considered, and the anonymity provided by mixes under the attack is analyzed}, 10674 abstract = {In this paper we study the anonymity provided by genralized mixes that insert dummy traffic. Mixes are an essential component to offer anonymous email services. We indicate how to compute the recipient and sender anonymity and we point out some problems that may arise from the intutitive extension of the metric to make into account dummies. Two possible ways of inserting dummy traffic are disussed and compared. An active attack scenario is considered, and the anonymity provided by mixes under the attack is analyzed},
10675 www_section = {anonymity}, 10675 www_section = {anonymity},
10676 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/pool-dummy04.pdf}, 10676 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/pool-dummy04.pdf},
10677 author = {Claudia Diaz and Bart Preneel} 10677 author = {Claudia Diaz and Bart Preneel}
10678} 10678}
10679@conference {1247420, 10679@conference {1247420,
@@ -10686,7 +10686,7 @@ In this paper we improve these results: we show that the same level of unlinkabi
10686 address = {Berkeley, CA, USA}, 10686 address = {Berkeley, CA, USA},
10687 abstract = {Ongoing advancements in technology lead to ever-increasing storage capacities. In spite of this, optimizing storage usage can still provide rich dividends. Several techniques based on delta-encoding and duplicate block suppression have been shown to reduce storage overheads, with varying requirements for resources such as computation and memory. We propose a new scheme for storage reduction that reduces data sizes with an effectiveness comparable to the more expensive techniques, but at a cost comparable to the faster but less effective ones. The scheme, called Redundancy Elimination at the Block Level (REBL), leverages the benefits of compression, duplicate block suppression, and delta-encoding to eliminate a broad spectrum of redundant data in a scalable and efficient manner. REBL generally encodes more compactly than compression (up to a factor of 14) and a combination of compression and duplicate suppression (up to a factor of 6.7). REBL also encodes similarly to a technique based on delta-encoding, reducing overall space significantly in one case. Furthermore, REBL uses super-fingerprints, a technique that reduces the data needed to identify similar blocks while dramatically reducing the computational requirements of matching the blocks: it turns O(n2) comparisons into hash table lookups. As a result, using super-fingerprints to avoid enumerating matching data objects decreases computation in the resemblance detection phase of REBL by up to a couple orders of magnitude}, 10687 abstract = {Ongoing advancements in technology lead to ever-increasing storage capacities. In spite of this, optimizing storage usage can still provide rich dividends. Several techniques based on delta-encoding and duplicate block suppression have been shown to reduce storage overheads, with varying requirements for resources such as computation and memory. We propose a new scheme for storage reduction that reduces data sizes with an effectiveness comparable to the more expensive techniques, but at a cost comparable to the faster but less effective ones. The scheme, called Redundancy Elimination at the Block Level (REBL), leverages the benefits of compression, duplicate block suppression, and delta-encoding to eliminate a broad spectrum of redundant data in a scalable and efficient manner. REBL generally encodes more compactly than compression (up to a factor of 14) and a combination of compression and duplicate suppression (up to a factor of 6.7). REBL also encodes similarly to a technique based on delta-encoding, reducing overall space significantly in one case. Furthermore, REBL uses super-fingerprints, a technique that reduces the data needed to identify similar blocks while dramatically reducing the computational requirements of matching the blocks: it turns O(n2) comparisons into hash table lookups. As a result, using super-fingerprints to avoid enumerating matching data objects decreases computation in the resemblance detection phase of REBL by up to a couple orders of magnitude},
10688 url = {http://portal.acm.org/citation.cfm?id=1247420$\#$}, 10688 url = {http://portal.acm.org/citation.cfm?id=1247420$\#$},
10689 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.91.8331.pdf}, 10689 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.91.8331.pdf},
10690 author = {Kulkarni, Purushottam and Douglis, Fred and Jason Lavoie and Tracey, John M.} 10690 author = {Kulkarni, Purushottam and Douglis, Fred and Jason Lavoie and Tracey, John M.}
10691} 10691}
10692@conference {Barreto04areplicated, 10692@conference {Barreto04areplicated,
@@ -10696,7 +10696,7 @@ In this paper we improve these results: we show that the same level of unlinkabi
10696 abstract = {The emergence of more powerful and resourceful mobile devices, as well as new wireless communication technologies, is turning the concept of ad-hoc networking into a viable and promising possibility for ubiquitous information sharing. However, the inherent characteristics of ad-hoc networks bring up new challenges for which most conventional systems don't provide an appropriate response. Namely, the lack of a pre-existing infrastructure, the high topological dynamism of these networks, the relatively low bandwidth of wireless links, as well as the limited storage and energy resources of mobile devices are issues that strongly affect the efficiency of any distributed system intended to provide ubiquitous information sharing. In this paper we describe Haddock-FS, a transparent replicated file system designed to support collaboration in the novel usage scenarios enabled by mobile environments. Haddock-FS is based on a highly available optimistic consistency protocol. In order to effectively cope with the network bandwidth and device memory constraints of these environments, Haddock-FS employs a limited size log truncation scheme and a cross-file, cross-version content similarity exploitation mechanism}, 10696 abstract = {The emergence of more powerful and resourceful mobile devices, as well as new wireless communication technologies, is turning the concept of ad-hoc networking into a viable and promising possibility for ubiquitous information sharing. However, the inherent characteristics of ad-hoc networks bring up new challenges for which most conventional systems don't provide an appropriate response. Namely, the lack of a pre-existing infrastructure, the high topological dynamism of these networks, the relatively low bandwidth of wireless links, as well as the limited storage and energy resources of mobile devices are issues that strongly affect the efficiency of any distributed system intended to provide ubiquitous information sharing. In this paper we describe Haddock-FS, a transparent replicated file system designed to support collaboration in the novel usage scenarios enabled by mobile environments. Haddock-FS is based on a highly available optimistic consistency protocol. In order to effectively cope with the network bandwidth and device memory constraints of these environments, Haddock-FS employs a limited size log truncation scheme and a cross-file, cross-version content similarity exploitation mechanism},
10697 www_section = {ad-hoc networks, ubiquitous computing}, 10697 www_section = {ad-hoc networks, ubiquitous computing},
10698 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.9141}, 10698 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.144.9141},
10699 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.144.9141.pdf}, 10699 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.144.9141.pdf},
10700 author = {Jo{\~a}o Barreto and Paulo Ferreira} 10700 author = {Jo{\~a}o Barreto and Paulo Ferreira}
10701} 10701}
10702@conference {golle:pet2004, 10702@conference {golle:pet2004,
@@ -10713,7 +10713,7 @@ We propose three very efficient protocols for reputable mixnets, all synchronous
10713 isbn = {978-3-540-26203-9}, 10713 isbn = {978-3-540-26203-9},
10714 doi = {10.1007/b136164}, 10714 doi = {10.1007/b136164},
10715 url = {http://www.springerlink.com/content/mqpu4nyljy82ca90/}, 10715 url = {http://www.springerlink.com/content/mqpu4nyljy82ca90/},
10716 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/golle-pet2004.pdf}, 10716 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/golle-pet2004.pdf},
10717 author = {Philippe Golle} 10717 author = {Philippe Golle}
10718} 10718}
10719@conference {Gupta:2004:RMF:1018440.1021942, 10719@conference {Gupta:2004:RMF:1018440.1021942,
@@ -10731,7 +10731,7 @@ We propose three very efficient protocols for reputable mixnets, all synchronous
10731 isbn = {0-7695-2156-8}, 10731 isbn = {0-7695-2156-8},
10732 doi = {http://dx.doi.org/10.1109/P2P.2004.44}, 10732 doi = {http://dx.doi.org/10.1109/P2P.2004.44},
10733 url = {http://dx.doi.org/10.1109/P2P.2004.44}, 10733 url = {http://dx.doi.org/10.1109/P2P.2004.44},
10734 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/P2P\%2704\%20-\%20Reputation\%20management\%20framework.pdf}, 10734 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/P2P\%2704\%20-\%20Reputation\%20management\%20framework.pdf},
10735 author = {Gupta, Rohit and Somani, Arun K.} 10735 author = {Gupta, Rohit and Somani, Arun K.}
10736} 10736}
10737@conference {Awerbuch04robustdistributed, 10737@conference {Awerbuch04robustdistributed,
@@ -10740,7 +10740,7 @@ We propose three very efficient protocols for reputable mixnets, all synchronous
10740 year = {2004}, 10740 year = {2004},
10741 pages = {1--8}, 10741 pages = {1--8},
10742 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.4900}, 10742 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.142.4900},
10743 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/awerbuch-robust.pdf}, 10743 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/awerbuch-robust.pdf},
10744 author = {Awerbuch, Baruch} 10744 author = {Awerbuch, Baruch}
10745} 10745}
10746@conference {Feldman:2004:RIT:988772.988788, 10746@conference {Feldman:2004:RIT:988772.988788,
@@ -10758,7 +10758,7 @@ We propose three very efficient protocols for reputable mixnets, all synchronous
10758 isbn = {1-58113-771-0}, 10758 isbn = {1-58113-771-0},
10759 doi = {http://doi.acm.org/10.1145/988772.988788}, 10759 doi = {http://doi.acm.org/10.1145/988772.988788},
10760 url = {http://doi.acm.org/10.1145/988772.988788}, 10760 url = {http://doi.acm.org/10.1145/988772.988788},
10761 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EC\%2704\%20-\%20Robust\%20incentive\%20techniques\%20for\%20P2P\%20networks.pdf}, 10761 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EC\%2704\%20-\%20Robust\%20incentive\%20techniques\%20for\%20P2P\%20networks.pdf},
10762 author = {Michal Feldman and Kevin Lai and Ion Stoica and John Chuang} 10762 author = {Michal Feldman and Kevin Lai and Ion Stoica and John Chuang}
10763} 10763}
10764@article {2004_13, 10764@article {2004_13,
@@ -10767,7 +10767,7 @@ We propose three very efficient protocols for reputable mixnets, all synchronous
10767 abstract = {This paper gives a scalable protocol for solving the Byzantine agreement problem. The protocol is scalable in the sense that for Byzantine agreement over n processors, each processor sends and receives only O(log n) messages in expectation. To the best of our knowledge this is the first result for the Byzantine agreement problem where each processor sends and receives o(n) messages. The protocol uses randomness and is correct with high probability. 1 It can tolerate any fraction of faulty processors which is strictly less than 1/6. Our result partially answers the following question posed by Kenneth Birman: {\textquotedblleft}How scalable are the traditional solutions to problems such as Consensus or Byzantine Agreement?{\textquotedblright} [5]}, 10767 abstract = {This paper gives a scalable protocol for solving the Byzantine agreement problem. The protocol is scalable in the sense that for Byzantine agreement over n processors, each processor sends and receives only O(log n) messages in expectation. To the best of our knowledge this is the first result for the Byzantine agreement problem where each processor sends and receives o(n) messages. The protocol uses randomness and is correct with high probability. 1 It can tolerate any fraction of faulty processors which is strictly less than 1/6. Our result partially answers the following question posed by Kenneth Birman: {\textquotedblleft}How scalable are the traditional solutions to problems such as Consensus or Byzantine Agreement?{\textquotedblright} [5]},
10768 www_section = {byzantine agreement}, 10768 www_section = {byzantine agreement},
10769 journal = {unknown}, 10769 journal = {unknown},
10770 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/sba.pdf}, 10770 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/sba.pdf},
10771 author = {Lewis, Scott and Saia, Jared} 10771 author = {Lewis, Scott and Saia, Jared}
10772} 10772}
10773@conference {Goh04secureindexes, 10773@conference {Goh04secureindexes,
@@ -10775,7 +10775,7 @@ We propose three very efficient protocols for reputable mixnets, all synchronous
10775 booktitle = {In submission}, 10775 booktitle = {In submission},
10776 year = {2004}, 10776 year = {2004},
10777 url = {http://gnunet.org/papers/secureindex.pdf }, 10777 url = {http://gnunet.org/papers/secureindex.pdf },
10778 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/secureindex.pdf}, 10778 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/secureindex.pdf},
10779 author = {Eu-jin Goh} 10779 author = {Eu-jin Goh}
10780} 10780}
10781@conference {Conrad04SecureServiceSignaling, 10781@conference {Conrad04SecureServiceSignaling,
@@ -10792,7 +10792,7 @@ This paper describes the design and implementation of a secure, reliable, and sc
10792 isbn = {978-3-540-71499-6}, 10792 isbn = {978-3-540-71499-6},
10793 doi = {10.1007/978-3-540-71500-9}, 10793 doi = {10.1007/978-3-540-71500-9},
10794 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 10794 url = {http://i30www.ira.uka.de/research/publications/p2p/},
10795 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/iwan2004.pdf}, 10795 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/iwan2004.pdf},
10796 author = {Michael Conrad and Thomas Fuhrmann and Marcus Schoeller and Martina Zitterbart} 10796 author = {Michael Conrad and Thomas Fuhrmann and Marcus Schoeller and Martina Zitterbart}
10797} 10797}
10798@mastersthesis {2004_14, 10798@mastersthesis {2004_14,
@@ -10805,7 +10805,7 @@ This paper describes the design and implementation of a secure, reliable, and sc
10805 address = {Munich, Germany}, 10805 address = {Munich, Germany},
10806 abstract = {This work deals with the efficiency of Peer-to-Peer (P2P) networks, which are distributed and self-organizing overlay networks. We contribute to their understanding and design by using new measurement techniques, simulations and analytical methods. In this context we first present measurement methods and results of P2P networks concerning traffic and topology characteristics as well as concerning user behavior. Based on these results we develop stochastic models to describe the user behavior, the traffic and the topology of P2P networks analytically. Using the results of our measurements and analytical investigations, we develop new P2P architectures to improve the efficiency of P2P networks concerning their topology and their signaling traffic. Finally we verify our results for the new architectures by measurements as well as computer-based simulations on different levels of detail}, 10806 abstract = {This work deals with the efficiency of Peer-to-Peer (P2P) networks, which are distributed and self-organizing overlay networks. We contribute to their understanding and design by using new measurement techniques, simulations and analytical methods. In this context we first present measurement methods and results of P2P networks concerning traffic and topology characteristics as well as concerning user behavior. Based on these results we develop stochastic models to describe the user behavior, the traffic and the topology of P2P networks analytically. Using the results of our measurements and analytical investigations, we develop new P2P architectures to improve the efficiency of P2P networks concerning their topology and their signaling traffic. Finally we verify our results for the new architectures by measurements as well as computer-based simulations on different levels of detail},
10807 www_section = {application model, communication network, compression, content availability, cross layer communication, generating functions, overlay networks, random graph theory, self-organization, signaling traffic, simulation, topology measurement, traffic measurement, user model}, 10807 www_section = {application model, communication network, compression, content availability, cross layer communication, generating functions, overlay networks, random graph theory, self-organization, signaling traffic, simulation, topology measurement, traffic measurement, user model},
10808 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Schollmeier\%20-\%20Signaling\%20and\%20networking\%20in\%20unstructured\%20p2p\%20networks.pdf}, 10808 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Schollmeier\%20-\%20Signaling\%20and\%20networking\%20in\%20unstructured\%20p2p\%20networks.pdf},
10809 author = {R{\"u}diger Schollmeier} 10809 author = {R{\"u}diger Schollmeier}
10810} 10810}
10811@conference {1007919, 10811@conference {1007919,
@@ -10821,7 +10821,7 @@ This paper describes the design and implementation of a secure, reliable, and sc
10821 isbn = {1-58113-840-7}, 10821 isbn = {1-58113-840-7},
10822 doi = {10.1145/1007912.1007919}, 10822 doi = {10.1145/1007912.1007919},
10823 url = {http://portal.acm.org/citation.cfm?id=1007919$\#$}, 10823 url = {http://portal.acm.org/citation.cfm?id=1007919$\#$},
10824 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.88.2405.pdf}, 10824 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.88.2405.pdf},
10825 author = {David Karger and Ruhl, Matthias} 10825 author = {David Karger and Ruhl, Matthias}
10826} 10826}
10827@conference {Shnayder04simulatingthe, 10827@conference {Shnayder04simulatingthe,
@@ -10837,7 +10837,7 @@ In this paper, we present, a scalable simulation environment for wireless sensor
10837 www_section = {sensor networks, TinyOS}, 10837 www_section = {sensor networks, TinyOS},
10838 doi = {10.1145/1031495.1031518}, 10838 doi = {10.1145/1031495.1031518},
10839 url = {http://portal.acm.org/citation.cfm?id=1031495.1031518}, 10839 url = {http://portal.acm.org/citation.cfm?id=1031495.1031518},
10840 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.65.9976.pdf}, 10840 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.65.9976.pdf},
10841 author = {Victor Shnayder and Mark Hempstead and Bor-rong Chen and Geoff Werner Allen and Matt Welsh} 10841 author = {Victor Shnayder and Mark Hempstead and Bor-rong Chen and Geoff Werner Allen and Matt Welsh}
10842} 10842}
10843@conference {DanSer04, 10843@conference {DanSer04,
@@ -10854,7 +10854,7 @@ In this paper, we present, a scalable simulation environment for wireless sensor
10854 isbn = {978-3-540-24207-9}, 10854 isbn = {978-3-540-24207-9},
10855 doi = {10.1007/b104759}, 10855 doi = {10.1007/b104759},
10856 url = {http://www.springerlink.com/content/tqljb3hybk4rubla/}, 10856 url = {http://www.springerlink.com/content/tqljb3hybk4rubla/},
10857 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.6.2954.pdf}, 10857 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.6.2954.pdf},
10858 author = {George Danezis and Andrei Serjantov} 10858 author = {George Danezis and Andrei Serjantov}
10859} 10859}
10860@article {Androutsellis-Theotokis:2004:SPC:1041680.1041681, 10860@article {Androutsellis-Theotokis:2004:SPC:1041680.1041681,
@@ -10871,7 +10871,7 @@ In this paper, we present, a scalable simulation environment for wireless sensor
10871 issn = {0360-0300}, 10871 issn = {0360-0300},
10872 doi = {http://doi.acm.org/10.1145/1041680.1041681}, 10872 doi = {http://doi.acm.org/10.1145/1041680.1041681},
10873 url = {http://doi.acm.org/10.1145/1041680.1041681}, 10873 url = {http://doi.acm.org/10.1145/1041680.1041681},
10874 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ACM\%20Computing\%20Surveys\%20-\%20A\%20survey\%20of\%20p2p\%20content\%20distribution\%20technologies.pdf}, 10874 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ACM\%20Computing\%20Surveys\%20-\%20A\%20survey\%20of\%20p2p\%20content\%20distribution\%20technologies.pdf},
10875 author = {Androutsellis-Theotokis, Stephanos and Spinellis, Diomidis} 10875 author = {Androutsellis-Theotokis, Stephanos and Spinellis, Diomidis}
10876} 10876}
10877@conference {Tamilmani04swift:a, 10877@conference {Tamilmani04swift:a,
@@ -10882,7 +10882,7 @@ In this paper, we present, a scalable simulation environment for wireless sensor
10882 address = {Cambridge, Massachusetts, USA}, 10882 address = {Cambridge, Massachusetts, USA},
10883 abstract = {In this paper, we present the design of a credit-based trading mechanism for peer-to-peer file sharing networks. We divide files into verifiable pieces; every peer interested in a file requests these pieces individually from the peers it is connected to. Our goal is to build a mechanism that supports fair large scale distribution in which downloads are fast, with low startup latency. We build a trading model in which peers use a pairwise currency to reconcile trading differences with each other and examine various trading strategies that peers can adopt. We show through analysis and simulation that peers who contribute to the network and take risks receive the most benefit in return. Our simulations demonstrate that peers who set high upload rates receive high download rates in return, but free-riders download very slowly compared to peers who upload. Finally, we propose a default trading strategy that is good for both the network as a whole and the peer employing it: deviating from that strategy yields little or no advantage for the peer}, 10883 abstract = {In this paper, we present the design of a credit-based trading mechanism for peer-to-peer file sharing networks. We divide files into verifiable pieces; every peer interested in a file requests these pieces individually from the peers it is connected to. Our goal is to build a mechanism that supports fair large scale distribution in which downloads are fast, with low startup latency. We build a trading model in which peers use a pairwise currency to reconcile trading differences with each other and examine various trading strategies that peers can adopt. We show through analysis and simulation that peers who contribute to the network and take risks receive the most benefit in return. Our simulations demonstrate that peers who set high upload rates receive high download rates in return, but free-riders download very slowly compared to peers who upload. Finally, we propose a default trading strategy that is good for both the network as a whole and the peer employing it: deviating from that strategy yields little or no advantage for the peer},
10884 www_section = {SWIFT, trading}, 10884 www_section = {SWIFT, trading},
10885 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/P2PEcon\%2704\%20-\%20SWIFT.pdf}, 10885 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/P2PEcon\%2704\%20-\%20SWIFT.pdf},
10886 author = {Karthik Tamilmani and Vinay Pai and Alexander E. Mohr} 10886 author = {Karthik Tamilmani and Vinay Pai and Alexander E. Mohr}
10887} 10887}
10888@conference {sync-batching, 10888@conference {sync-batching,
@@ -10897,7 +10897,7 @@ In this paper, we present, a scalable simulation environment for wireless sensor
10897 www_section = {anonymity, network topology}, 10897 www_section = {anonymity, network topology},
10898 doi = {10.1007/b136164}, 10898 doi = {10.1007/b136164},
10899 url = {http://www.springerlink.com/content/uqvfwe97ehlldm8d/}, 10899 url = {http://www.springerlink.com/content/uqvfwe97ehlldm8d/},
10900 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/sync-batching.pdf}, 10900 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/sync-batching.pdf},
10901 author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson} 10901 author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson}
10902} 10902}
10903@conference {taxonomy-dummy, 10903@conference {taxonomy-dummy,
@@ -10909,7 +10909,7 @@ In this paper, we present, a scalable simulation environment for wireless sensor
10909 abstract = {This paper presents an analysis of mixes and dummy traffic policies, which are building blocks of anonymous services. The goal of the paper is to bring together all the issues related to the analysis and design of mix networks. We discuss continuous and pool mixes, topologies for mix networks and dummy traffic policies. We point out the advantages and disadvantages of design decisions for mixes and dummy policies. Finally, we provide a list of research problems that need further work}, 10909 abstract = {This paper presents an analysis of mixes and dummy traffic policies, which are building blocks of anonymous services. The goal of the paper is to bring together all the issues related to the analysis and design of mix networks. We discuss continuous and pool mixes, topologies for mix networks and dummy traffic policies. We point out the advantages and disadvantages of design decisions for mixes and dummy policies. Finally, we provide a list of research problems that need further work},
10910 www_section = {anonymity, dummy traffic, mix}, 10910 www_section = {anonymity, dummy traffic, mix},
10911 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.9855}, 10911 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.9855},
10912 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.5.9855.pdf}, 10912 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.5.9855.pdf},
10913 author = {Claudia Diaz and Bart Preneel} 10913 author = {Claudia Diaz and Bart Preneel}
10914} 10914}
10915@conference {timing-fc2004, 10915@conference {timing-fc2004,
@@ -10924,7 +10924,7 @@ In this paper, we present, a scalable simulation environment for wireless sensor
10924 isbn = {978-3-540-22420-4}, 10924 isbn = {978-3-540-22420-4},
10925 doi = {10.1007/b98935}, 10925 doi = {10.1007/b98935},
10926 url = {http://www.springerlink.com/content/n4khdtwk7dqvj0u0/}, 10926 url = {http://www.springerlink.com/content/n4khdtwk7dqvj0u0/},
10927 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/timing-fc2004.pdf}, 10927 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/timing-fc2004.pdf},
10928 author = {Brian Neil Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright}, 10928 author = {Brian Neil Levine and Michael K. Reiter and Chenxi Wang and Matthew Wright},
10929 editor = {Ari Juels} 10929 editor = {Ari Juels}
10930} 10930}
@@ -10938,7 +10938,7 @@ In this paper, we present, a scalable simulation environment for wireless sensor
10938 abstract = {We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication}, 10938 abstract = {We present Tor, a circuit-based low-latency anonymous communication service. This second-generation Onion Routing system addresses limitations in the original design by adding perfect forward secrecy, congestion control, directory servers, integrity checking, configurable exit policies, and a practical design for location-hidden services via rendezvous points. Tor works on the real-world Internet, requires no special privileges or kernel modifications, requires little synchronization or coordination between nodes, and provides a reasonable tradeoff between anonymity, usability, and efficiency. We briefly describe our experiences with an international network of more than 30 nodes. We close with a list of open problems in anonymous communication},
10939 www_section = {onion routing}, 10939 www_section = {onion routing},
10940 url = {http://portal.acm.org/citation.cfm?id=1251396}, 10940 url = {http://portal.acm.org/citation.cfm?id=1251396},
10941 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/tor-design.pdf}, 10941 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/tor-design.pdf},
10942 author = {Roger Dingledine and Nick Mathewson and Paul Syverson} 10942 author = {Roger Dingledine and Nick Mathewson and Paul Syverson}
10943} 10943}
10944@conference {Kiran04totalrecall:, 10944@conference {Kiran04totalrecall:,
@@ -10950,7 +10950,7 @@ In this paper, we present, a scalable simulation environment for wireless sensor
10950This paper describes the motivation, architecture and implementation for a new peer-to-peer storage system, called TotalRecall, that automates the task of availability management. In particular, the TotalRecall system automatically measures and estimates the availability of its constituent host components, predicts their future availability based on past behavior, calculates the appropriate redundancy mechanisms and repair policies, and delivers user-specified availability while maximizing efficiency}, 10950This paper describes the motivation, architecture and implementation for a new peer-to-peer storage system, called TotalRecall, that automates the task of availability management. In particular, the TotalRecall system automatically measures and estimates the availability of its constituent host components, predicts their future availability based on past behavior, calculates the appropriate redundancy mechanisms and repair policies, and delivers user-specified availability while maximizing efficiency},
10951 www_section = {P2P}, 10951 www_section = {P2P},
10952 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.9775}, 10952 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.9775},
10953 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/recall.pdf}, 10953 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/recall.pdf},
10954 author = {Ranjita Bhagwan Kiran and Kiran Tati and Yu-chung Cheng and Stefan Savage and Geoffrey M. Voelker} 10954 author = {Ranjita Bhagwan Kiran and Kiran Tati and Yu-chung Cheng and Stefan Savage and Geoffrey M. Voelker}
10955} 10955}
10956@conference {danezis:pet2004, 10956@conference {danezis:pet2004,
@@ -10968,7 +10968,7 @@ This paper describes the motivation, architecture and implementation for a new p
10968 isbn = {978-3-540-26203-9}, 10968 isbn = {978-3-540-26203-9},
10969 doi = {10.1007/b136164}, 10969 doi = {10.1007/b136164},
10970 url = {http://www.springerlink.com/content/kgenxdaxkyey4ed2/}, 10970 url = {http://www.springerlink.com/content/kgenxdaxkyey4ed2/},
10971 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/danezis-pet2004.pdf}, 10971 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/danezis-pet2004.pdf},
10972 author = {George Danezis} 10972 author = {George Danezis}
10973} 10973}
10974@book {Jiang_trustand, 10974@book {Jiang_trustand,
@@ -10981,7 +10981,7 @@ This paper describes the motivation, architecture and implementation for a new p
10981 organization = {Springer Berlin / Heidelberg}, 10981 organization = {Springer Berlin / Heidelberg},
10982 abstract = {Most of the past studies on peer-to-peer systems have emphasized routing and lookup. The selfishness of users, which brings on the free riding problem, has not attracted sufficient attention from researchers. In this paper, we introduce a decentralized reputation-based trust model first, in which trust relationships could be built based on the reputation of peers. Subsequently, we use the iterated prisoner's dilemma to model the interactions in peer-to-peer systems and propose a simple incentive mechanism. By simulations, it's shown that the stable cooperation can emerge after limited rounds of interaction between peers by using the incentive mechanism}, 10982 abstract = {Most of the past studies on peer-to-peer systems have emphasized routing and lookup. The selfishness of users, which brings on the free riding problem, has not attracted sufficient attention from researchers. In this paper, we introduce a decentralized reputation-based trust model first, in which trust relationships could be built based on the reputation of peers. Subsequently, we use the iterated prisoner's dilemma to model the interactions in peer-to-peer systems and propose a simple incentive mechanism. By simulations, it's shown that the stable cooperation can emerge after limited rounds of interaction between peers by using the incentive mechanism},
10983 www_section = {cooperation, incentives, iterated prisoner's dilemma, peer-to-peer networking}, 10983 www_section = {cooperation, incentives, iterated prisoner's dilemma, peer-to-peer networking},
10984 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Jiang\%2C\%20Bai\%20\%26\%20Wang\%20-\%20Trust\%20and\%20Cooperation\%20in\%20Peer-to-Peer\%20Systems.pdf}, 10984 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Jiang\%2C\%20Bai\%20\%26\%20Wang\%20-\%20Trust\%20and\%20Cooperation\%20in\%20Peer-to-Peer\%20Systems.pdf},
10985 author = {Junjie Jiang and Haihuan Bai and Weinong Wang} 10985 author = {Junjie Jiang and Haihuan Bai and Weinong Wang}
10986} 10986}
10987@conference {GolleJakobssonJuelsSyverson:universal04, 10987@conference {GolleJakobssonJuelsSyverson:universal04,
@@ -10998,7 +10998,7 @@ While technically and conceptually simple, universal re-encryption leads to new
10998 isbn = {978-3-540-20996-6}, 10998 isbn = {978-3-540-20996-6},
10999 doi = {10.1007/b95630}, 10999 doi = {10.1007/b95630},
11000 url = {http://www.springerlink.com/content/1fu5qrb1a2kfe7f9/}, 11000 url = {http://www.springerlink.com/content/1fu5qrb1a2kfe7f9/},
11001 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/GolleJakobssonJuelsSyverson-universal04.pdf}, 11001 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/GolleJakobssonJuelsSyverson-universal04.pdf},
11002 author = {Philippe Golle and Jakobsson, Markus and Ari Juels and Paul Syverson} 11002 author = {Philippe Golle and Jakobsson, Markus and Ari Juels and Paul Syverson}
11003} 11003}
11004@conference {warta04-Klonowski, 11004@conference {warta04-Klonowski,
@@ -11009,7 +11009,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11009 abstract = {Anonymous communication protocols, very essential for preserving privacy of the parties communicating, may lead to severe problems. A malicious server may use anonymous communication protocols for injecting unwelcome messages into the system so that their source can be hardly traced. So anonymity and privacy protection on one side and protection against such phenomena as spam are so far contradictory goals. We propose a mechanism that may be used to limit the mentioned side effects of privacy protection. During the protocol proposed each encrypted message admitted into the system is signed by a respective authority. Then, on its route through the network the encrypted message and the signature are re-encrypted universally. The purpose of universal re-encryption is to hide the routes of the messages from an observer monitoring the traffic. Despite re-encryption, signature of the authority remains valid. Depending on a particular application, verification of the signature is possible either off-line by anybody with the access to the ciphertext and the signature or requires contact with the authority that has issued the signature}, 11009 abstract = {Anonymous communication protocols, very essential for preserving privacy of the parties communicating, may lead to severe problems. A malicious server may use anonymous communication protocols for injecting unwelcome messages into the system so that their source can be hardly traced. So anonymity and privacy protection on one side and protection against such phenomena as spam are so far contradictory goals. We propose a mechanism that may be used to limit the mentioned side effects of privacy protection. During the protocol proposed each encrypted message admitted into the system is signed by a respective authority. Then, on its route through the network the encrypted message and the signature are re-encrypted universally. The purpose of universal re-encryption is to hide the routes of the messages from an observer monitoring the traffic. Despite re-encryption, signature of the authority remains valid. Depending on a particular application, verification of the signature is possible either off-line by anybody with the access to the ciphertext and the signature or requires contact with the authority that has issued the signature},
11010 www_section = {anonymity, information hiding, privacy, re-encryption}, 11010 www_section = {anonymity, information hiding, privacy, re-encryption},
11011 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.4976}, 11011 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.108.4976},
11012 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.108.4976.pdf}, 11012 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.108.4976.pdf},
11013 author = {Marek Klonowski and Miroslaw Kutylowski and Anna Lauks and Filip Zagorski} 11013 author = {Marek Klonowski and Miroslaw Kutylowski and Anna Lauks and Filip Zagorski}
11014} 11014}
11015@article {Dabek:2004:VDN:1030194.1015471, 11015@article {Dabek:2004:VDN:1030194.1015471,
@@ -11026,7 +11026,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11026 issn = {0146-4833}, 11026 issn = {0146-4833},
11027 doi = {http://doi.acm.org/10.1145/1030194.1015471}, 11027 doi = {http://doi.acm.org/10.1145/1030194.1015471},
11028 url = {http://doi.acm.org/10.1145/1030194.1015471}, 11028 url = {http://doi.acm.org/10.1145/1030194.1015471},
11029 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%20Compt.\%20Commun.\%20Rev.\%20-\%20Vivaldi.pdf}, 11029 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%20Compt.\%20Commun.\%20Rev.\%20-\%20Vivaldi.pdf},
11030 author = {Dabek, Frank and Russ Cox and Frans M. Kaashoek and Robert Morris} 11030 author = {Dabek, Frank and Russ Cox and Frans M. Kaashoek and Robert Morris}
11031} 11031}
11032@conference {1038318, 11032@conference {1038318,
@@ -11042,7 +11042,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11042 isbn = {0-7695-2252-1}, 11042 isbn = {0-7695-2252-1},
11043 doi = {10.1109/CSAC.2004.50}, 11043 doi = {10.1109/CSAC.2004.50},
11044 url = {http://portal.acm.org/citation.cfm?id=1038254.1038318$\#$}, 11044 url = {http://portal.acm.org/citation.cfm?id=1038254.1038318$\#$},
11045 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.3.1198.pdf}, 11045 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.3.1198.pdf},
11046 author = {Srivatsa, Mudhakar and Liu, Ling} 11046 author = {Srivatsa, Mudhakar and Liu, Ling}
11047} 11047}
11048@conference {Bustamante04wayback:a, 11048@conference {Bustamante04wayback:a,
@@ -11052,7 +11052,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11052 abstract = {In a typical file system, only the current version of a file (or directory) is available. In Wayback, a user can also access any previous version, all the way back to the file's creation time. Versioning is done automatically at the write level: each write to the file creates a new version. Wayback implements versioning using an undo log structure, exploiting the massive space available on modern disks to provide its very useful functionality. Wayback is a user-level file system built on the FUSE framework that relies on an underlying file system for access to the disk. In addition to simplifying Wayback, this also allows it to extend any existing file system with versioning: after being mounted, the file system can be mounted a second time with versioning. We describe the implementation of Wayback, and evaluate its performance using several benchmarks}, 11052 abstract = {In a typical file system, only the current version of a file (or directory) is available. In Wayback, a user can also access any previous version, all the way back to the file's creation time. Versioning is done automatically at the write level: each write to the file creates a new version. Wayback implements versioning using an undo log structure, exploiting the massive space available on modern disks to provide its very useful functionality. Wayback is a user-level file system built on the FUSE framework that relies on an underlying file system for access to the disk. In addition to simplifying Wayback, this also allows it to extend any existing file system with versioning: after being mounted, the file system can be mounted a second time with versioning. We describe the implementation of Wayback, and evaluate its performance using several benchmarks},
11053 www_section = {file systems, version control}, 11053 www_section = {file systems, version control},
11054 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.2672}, 11054 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.2672},
11055 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.11.2672.pdf}, 11055 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.11.2672.pdf},
11056 author = {Fabian Bustamante and Brian Cornell and Brian Cornell and Peter Dinda and Peter Dinda and Fabian Bustamante} 11056 author = {Fabian Bustamante and Brian Cornell and Brian Cornell and Peter Dinda and Peter Dinda and Fabian Bustamante}
11057} 11057}
11058@conference {Andrade04whencan, 11058@conference {Andrade04whencan,
@@ -11076,7 +11076,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11076 www_section = {traffic analysis}, 11076 www_section = {traffic analysis},
11077 isbn = {0-7695-2033-2}, 11077 isbn = {0-7695-2033-2},
11078 url = {http://portal.acm.org/citation.cfm?id=950964}, 11078 url = {http://portal.acm.org/citation.cfm?id=950964},
11079 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fu-active.pdf}, 11079 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fu-active.pdf},
11080 author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao} 11080 author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}
11081} 11081}
11082@conference {939011, 11082@conference {939011,
@@ -11092,7 +11092,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11092 isbn = {1-58113-753-2}, 11092 isbn = {1-58113-753-2},
11093 doi = {10.1145/938985.939011}, 11093 doi = {10.1145/938985.939011},
11094 url = {http://portal.acm.org/citation.cfm?id=939011$\#$}, 11094 url = {http://portal.acm.org/citation.cfm?id=939011$\#$},
11095 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.103.7483.pdf}, 11095 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.103.7483.pdf},
11096 author = {Anderegg, Luzi and Eidenbenz, Stephan} 11096 author = {Anderegg, Luzi and Eidenbenz, Stephan}
11097} 11097}
11098@conference {1251057, 11098@conference {1251057,
@@ -11105,7 +11105,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11105 address = {Berkeley, CA, USA}, 11105 address = {Berkeley, CA, USA},
11106 abstract = {Recent research has produced a new and perhaps dangerous technique for uniquely identifying blocks that I will call compare-by-hash. Using this technique, we decide whether two blocks are identical to each other by comparing their hash values, using a collision-resistant hash such as SHA-1[5]. If the hash values match, we assume the blocks are identical without further ado. Users of compare-by-hash argue that this assumption is warranted because the chance of a hash collision between any two randomly generated blocks is estimated to be many orders of magnitude smaller than the chance of many kinds of hardware errors. Further analysis shows that this approach is not as risk-free as it seems at first glance}, 11106 abstract = {Recent research has produced a new and perhaps dangerous technique for uniquely identifying blocks that I will call compare-by-hash. Using this technique, we decide whether two blocks are identical to each other by comparing their hash values, using a collision-resistant hash such as SHA-1[5]. If the hash values match, we assume the blocks are identical without further ado. Users of compare-by-hash argue that this assumption is warranted because the chance of a hash collision between any two randomly generated blocks is estimated to be many orders of magnitude smaller than the chance of many kinds of hardware errors. Further analysis shows that this approach is not as risk-free as it seems at first glance},
11107 url = {http://portal.acm.org/citation.cfm?id=1251057$\#$}, 11107 url = {http://portal.acm.org/citation.cfm?id=1251057$\#$},
11108 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.100.8338.pdf}, 11108 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.100.8338.pdf},
11109 author = {Henson, Val} 11109 author = {Henson, Val}
11110} 11110}
11111@conference {Kuegler03ananalysis, 11111@conference {Kuegler03ananalysis,
@@ -11117,7 +11117,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11117 publisher = {Springer-Verlag}, 11117 publisher = {Springer-Verlag},
11118 organization = {Springer-Verlag}, 11118 organization = {Springer-Verlag},
11119 www_section = {anonymity, GNUnet}, 11119 www_section = {anonymity, GNUnet},
11120 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/GNUnet_pet.pdf}, 11120 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/GNUnet_pet.pdf},
11121 author = {Dennis K{\"u}gler} 11121 author = {Dennis K{\"u}gler}
11122} 11122}
11123@conference {fu-analytical, 11123@conference {fu-analytical,
@@ -11130,7 +11130,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11130 isbn = {0-7695-2017-0}, 11130 isbn = {0-7695-2017-0},
11131 doi = {10.1109/ICPP.2003.1240613}, 11131 doi = {10.1109/ICPP.2003.1240613},
11132 url = {http://www.computer.org/portal/web/csdl/doi?doc=doi/10.1109/ICPP.2003.1240613}, 11132 url = {http://www.computer.org/portal/web/csdl/doi?doc=doi/10.1109/ICPP.2003.1240613},
11133 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fu-analytical.pdf}, 11133 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fu-analytical.pdf},
11134 author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao} 11134 author = {Xinwen Fu and Bryan Graham and Riccardo Bettati and Wei Zhao}
11135} 11135}
11136@conference {SN03, 11136@conference {SN03,
@@ -11145,7 +11145,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11145 abstract = {This paper presents a method for calculating the anonymity of a timed pool mix. Thus we are able to compare it to a threshold pool mix, and any future mixes that might be developed. Although we are only able to compute the anonymity of a timed pool mix after some specic number of rounds, this is a practical approximation to the real anonymity}, 11145 abstract = {This paper presents a method for calculating the anonymity of a timed pool mix. Thus we are able to compare it to a threshold pool mix, and any future mixes that might be developed. Although we are only able to compute the anonymity of a timed pool mix after some specic number of rounds, this is a practical approximation to the real anonymity},
11146 www_section = {anonymity, mix}, 11146 www_section = {anonymity, mix},
11147 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.5699}, 11147 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.5699},
11148 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.9.5699.pdf}, 11148 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.9.5699.pdf},
11149 author = {Andrei Serjantov and Richard E. Newman} 11149 author = {Andrei Serjantov and Richard E. Newman}
11150} 11150}
11151@conference {Hildrum03asymptoticallyefficient, 11151@conference {Hildrum03asymptoticallyefficient,
@@ -11158,7 +11158,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11158 isbn = {978-3-540-20184-7}, 11158 isbn = {978-3-540-20184-7},
11159 doi = {10.1007/b13831}, 11159 doi = {10.1007/b13831},
11160 url = {http://www.springerlink.com/content/7emt7u01cvbb6bu6/}, 11160 url = {http://www.springerlink.com/content/7emt7u01cvbb6bu6/},
11161 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.4.334.pdf}, 11161 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.4.334.pdf},
11162 author = {Hildrum, Kirsten and John Kubiatowicz} 11162 author = {Hildrum, Kirsten and John Kubiatowicz}
11163} 11163}
11164@booklet {Hurler_automaticcontext, 11164@booklet {Hurler_automaticcontext,
@@ -11166,7 +11166,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11166 year = {2003}, 11166 year = {2003},
11167 abstract = {Tele-collaboration is a valuable tool that can connect learners at different sites and help them benefit from their respective competences. Albeit many e-learning applications provide a high level of technical sophistication, such tools typically fall short of reflecting the learners ' full context, e.g., their presence and awareness. Hence, these applications cause many disturbances in the social interaction of the learners. This paper describes mechanisms to improve the group awareness in elearning environments with the help of automatic integration of such context information from the physical world. This information is gathered by different embedded sensors in various objects, e.g., a coffee mug or an office chair. This paper also describes first results of the integration of these sensors into an existing CSCW/CSCL framework}, 11167 abstract = {Tele-collaboration is a valuable tool that can connect learners at different sites and help them benefit from their respective competences. Albeit many e-learning applications provide a high level of technical sophistication, such tools typically fall short of reflecting the learners ' full context, e.g., their presence and awareness. Hence, these applications cause many disturbances in the social interaction of the learners. This paper describes mechanisms to improve the group awareness in elearning environments with the help of automatic integration of such context information from the physical world. This information is gathered by different embedded sensors in various objects, e.g., a coffee mug or an office chair. This paper also describes first results of the integration of these sensors into an existing CSCW/CSCL framework},
11168 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.71.1450}, 11168 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.71.1450},
11169 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/hurler03context.pdf}, 11169 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/hurler03context.pdf},
11170 author = {Bernhard Hurler and Leo Petrak and Thomas Fuhrmann and Oliver Brand and Martina Zitterbart} 11170 author = {Bernhard Hurler and Leo Petrak and Thomas Fuhrmann and Oliver Brand and Martina Zitterbart}
11171} 11171}
11172@conference {2003_0, 11172@conference {2003_0,
@@ -11176,7 +11176,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11176 month = jun, 11176 month = jun,
11177 address = {Berkeley, CA, USA}, 11177 address = {Berkeley, CA, USA},
11178 www_section = {bartering, distributed computational economies, peer-to-peer bartering, resource discovery, resource exchange, resource peering}, 11178 www_section = {bartering, distributed computational economies, peer-to-peer bartering, resource discovery, resource exchange, resource peering},
11179 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Workshop\%20on\%20Economics\%20of\%20P2P\%20Systems\%2703\%20-\%20Chun\%2C\%20Fu\%20\%26\%20Vahdat.pdf}, 11179 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Workshop\%20on\%20Economics\%20of\%20P2P\%20Systems\%2703\%20-\%20Chun\%2C\%20Fu\%20\%26\%20Vahdat.pdf},
11180 author = {Chun, Brent and Yun Fu and Vahdat, Amin} 11180 author = {Chun, Brent and Yun Fu and Vahdat, Amin}
11181} 11181}
11182@conference {nguyen:pet2003, 11182@conference {nguyen:pet2003,
@@ -11192,7 +11192,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11192 isbn = {978-3-540-20610-1}, 11192 isbn = {978-3-540-20610-1},
11193 doi = {10.1007/b94512}, 11193 doi = {10.1007/b94512},
11194 url = {http://www.springerlink.com/content/0e0mwvgyt008wxkf/}, 11194 url = {http://www.springerlink.com/content/0e0mwvgyt008wxkf/},
11195 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/nguyen-pet2003.pdf}, 11195 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/nguyen-pet2003.pdf},
11196 author = {Lan Nguyen and Rei Safavi-Naini}, 11196 author = {Lan Nguyen and Rei Safavi-Naini},
11197 editor = {Roger Dingledine} 11197 editor = {Roger Dingledine}
11198} 11198}
@@ -11205,7 +11205,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11205 pages = {995--1002}, 11205 pages = {995--1002},
11206 abstract = {Scheme to build dynamic, distributed P2P networks of constant degree and logarithmic diameter}, 11206 abstract = {Scheme to build dynamic, distributed P2P networks of constant degree and logarithmic diameter},
11207 url = {http://www.cs.brown.edu/people/eli/papers/focs01.pdf}, 11207 url = {http://www.cs.brown.edu/people/eli/papers/focs01.pdf},
11208 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/focs01.pdf}, 11208 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/focs01.pdf},
11209 author = {Gopal Pandurangan and Prabhakar Raghavan and Eli Upfal} 11209 author = {Gopal Pandurangan and Prabhakar Raghavan and Eli Upfal}
11210} 11210}
11211@conference {Kostic:2003:BHB:945445.945473, 11211@conference {Kostic:2003:BHB:945445.945473,
@@ -11223,7 +11223,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11223 isbn = {1-58113-757-5}, 11223 isbn = {1-58113-757-5},
11224 doi = {http://doi.acm.org/10.1145/945445.945473}, 11224 doi = {http://doi.acm.org/10.1145/945445.945473},
11225 url = {http://doi.acm.org/10.1145/945445.945473}, 11225 url = {http://doi.acm.org/10.1145/945445.945473},
11226 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SOSP\%2703\%20-\%20Bullet.pdf}, 11226 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SOSP\%2703\%20-\%20Bullet.pdf},
11227 author = {Kosti{\'c}, Dejan and Rodriguez, Adolfo and Albrecht, Jeannie and Vahdat, Amin} 11227 author = {Kosti{\'c}, Dejan and Rodriguez, Adolfo and Albrecht, Jeannie and Vahdat, Amin}
11228} 11228}
11229@article {buses03, 11229@article {buses03,
@@ -11238,7 +11238,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11238 issn = {0933-2790}, 11238 issn = {0933-2790},
11239 doi = {10.1007/s00145-002-0128-6}, 11239 doi = {10.1007/s00145-002-0128-6},
11240 url = {http://www.springerlink.com/content/eljjgl3ec01c00xa/}, 11240 url = {http://www.springerlink.com/content/eljjgl3ec01c00xa/},
11241 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.80.1566.pdf}, 11241 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.80.1566.pdf},
11242 author = {Amos Beimel and Shlomi Dolev} 11242 author = {Amos Beimel and Shlomi Dolev}
11243} 11243}
11244@conference {778418, 11244@conference {778418,
@@ -11254,7 +11254,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11254 isbn = {1-58113-684-6}, 11254 isbn = {1-58113-684-6},
11255 doi = {10.1145/778415.778418}, 11255 doi = {10.1145/778415.778418},
11256 url = {http://portal.acm.org/citation.cfm?id=778418$\#$}, 11256 url = {http://portal.acm.org/citation.cfm?id=778418$\#$},
11257 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/BenSalemBHJ03mobihoc.pdf}, 11257 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/BenSalemBHJ03mobihoc.pdf},
11258 author = {Salem, Naouel Ben and Levente Butty{\'a}n and Jean-Pierre Hubaux and Jakobsson, Markus} 11258 author = {Salem, Naouel Ben and Levente Butty{\'a}n and Jean-Pierre Hubaux and Jakobsson, Markus}
11259} 11259}
11260@conference {kutzner03connecting, 11260@conference {kutzner03connecting,
@@ -11265,7 +11265,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11265 address = {University of Dortmund, Germany}, 11265 address = {University of Dortmund, Germany},
11266 abstract = {This paper presents an approach for interconnecting isolated clouds of an ad hoc network that form a scatternet topology using Internet gateways as intermediate nodes. The architecture developed is intended to augment FleetNet, a highly dynamic ad hoc network for inter-vehicle communications. This is achieved by upgrading FleetNet capabilities to establish a communication path between moving vehicles and the Internet via Internet gateways to facilitate direct gateway to gateway communications via the Internet, thus bridging gaps in the network topology and relaying packets closer towards their geographical destination at the same time. After outlining the overall FleetNet approach and its underlying geographical multi-hop routing, we focus on the FleetNet gateway architecture. We describe required modifications to the gateway architecture and to the FleetNet network layer in order to use these gateways as intermediate nodes for FleetNet routing. Finally, we conclude the paper by a short discussion on the prototype gateway implementation and by summarizing first results and ongoing work on inter scatternet communication}, 11266 abstract = {This paper presents an approach for interconnecting isolated clouds of an ad hoc network that form a scatternet topology using Internet gateways as intermediate nodes. The architecture developed is intended to augment FleetNet, a highly dynamic ad hoc network for inter-vehicle communications. This is achieved by upgrading FleetNet capabilities to establish a communication path between moving vehicles and the Internet via Internet gateways to facilitate direct gateway to gateway communications via the Internet, thus bridging gaps in the network topology and relaying packets closer towards their geographical destination at the same time. After outlining the overall FleetNet approach and its underlying geographical multi-hop routing, we focus on the FleetNet gateway architecture. We describe required modifications to the gateway architecture and to the FleetNet network layer in order to use these gateways as intermediate nodes for FleetNet routing. Finally, we conclude the paper by a short discussion on the prototype gateway implementation and by summarizing first results and ongoing work on inter scatternet communication},
11267 url = {http://i30www.ira.uka.de/research/publications/p2p/}, 11267 url = {http://i30www.ira.uka.de/research/publications/p2p/},
11268 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/kutzner03connecting.pdf}, 11268 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/kutzner03connecting.pdf},
11269 author = {Kendy Kutzner and Jean-Jacques Tchouto and Marc Bechler and Lars Wolf and Bernd Bochow and Thomas Luckenbach} 11269 author = {Kendy Kutzner and Jean-Jacques Tchouto and Marc Bechler and Lars Wolf and Bernd Bochow and Thomas Luckenbach}
11270} 11270}
11271@conference {1247343, 11271@conference {1247343,
@@ -11281,7 +11281,7 @@ While technically and conceptually simple, universal re-encryption leads to new
11281Because our scheme requires cooperation, it is potentially vulnerable to several novel attacks involving free riding (e.g., holding a partner's data is costly, which tempts cheating) or disruption. We defend against these attacks using a number of new methods, including the use of periodic random challenges to ensure partners continue to hold data and the use of disk-space wasting to make cheating unprofitable. Results from an initial prototype show that our technique is feasible and very inexpensive: it appears to be one to two orders of magnitude cheaper than existing Internet backup services}, 11281Because our scheme requires cooperation, it is potentially vulnerable to several novel attacks involving free riding (e.g., holding a partner's data is costly, which tempts cheating) or disruption. We defend against these attacks using a number of new methods, including the use of periodic random challenges to ensure partners continue to hold data and the use of disk-space wasting to make cheating unprofitable. Results from an initial prototype show that our technique is feasible and very inexpensive: it appears to be one to two orders of magnitude cheaper than existing Internet backup services},
11282 www_section = {backup, P2P, redundancy}, 11282 www_section = {backup, P2P, redundancy},
11283 url = {http://portal.acm.org/citation.cfm?id=1247343$\#$}, 11283 url = {http://portal.acm.org/citation.cfm?id=1247343$\#$},
11284 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/lillibridge.pdf}, 11284 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/lillibridge.pdf},
11285 author = {Mark Lillibridge and Sameh Elnikety and Andrew D. Birrell and Mike Burrows and Isard, Michael} 11285 author = {Mark Lillibridge and Sameh Elnikety and Andrew D. Birrell and Mike Burrows and Isard, Michael}
11286} 11286}
11287@conference {Leibowitz:2003:DKN:832311.837393, 11287@conference {Leibowitz:2003:DKN:832311.837393,
@@ -11298,7 +11298,7 @@ Because our scheme requires cooperation, it is potentially vulnerable to several
11298 www_section = {file swapping traffic, kazaa, traffic}, 11298 www_section = {file swapping traffic, kazaa, traffic},
11299 isbn = {0-7695-1972-5}, 11299 isbn = {0-7695-1972-5},
11300 url = {http://dl.acm.org/citation.cfm?id=832311.837393}, 11300 url = {http://dl.acm.org/citation.cfm?id=832311.837393},
11301 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WIAPP\%2703\%20-\%20Deconstructing\%20the\%20Kazaa\%20network.pdf}, 11301 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WIAPP\%2703\%20-\%20Deconstructing\%20the\%20Kazaa\%20network.pdf},
11302 author = {Leibowitz, Nathaniel and Ripeanu, Matei and Wierzbicki, Adam} 11302 author = {Leibowitz, Nathaniel and Ripeanu, Matei and Wierzbicki, Adam}
11303} 11303}
11304@conference {wright03, 11304@conference {wright03,
@@ -11313,7 +11313,7 @@ Because our scheme requires cooperation, it is potentially vulnerable to several
11313 www_section = {attack, P2P}, 11313 www_section = {attack, P2P},
11314 isbn = {0-7695-1940-7}, 11314 isbn = {0-7695-1940-7},
11315 url = {http://portal.acm.org/citation.cfm?id=830556}, 11315 url = {http://portal.acm.org/citation.cfm?id=830556},
11316 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/wright-passive.pdf , https://gnunet.org/git/bibliography.git/plain/docs/wright-passive2.pdf}, 11316 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/wright-passive.pdf , https://git.gnunet.org/bibliography.git/plain/docs/wright-passive2.pdf},
11317 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields} 11317 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}
11318} 11318}
11319@conference {863960, 11319@conference {863960,
@@ -11328,7 +11328,7 @@ Because our scheme requires cooperation, it is potentially vulnerable to several
11328 isbn = {1-58113-735-4}, 11328 isbn = {1-58113-735-4},
11329 doi = {10.1145/863955.863960}, 11329 doi = {10.1145/863955.863960},
11330 url = {http://portal.acm.org/citation.cfm?id=863960$\#$}, 11330 url = {http://portal.acm.org/citation.cfm?id=863960$\#$},
11331 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IRB-TR-03-003.pdf}, 11331 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IRB-TR-03-003.pdf},
11332 author = {Fall, Kevin} 11332 author = {Fall, Kevin}
11333} 11333}
11334@booklet { roca03design, 11334@booklet { roca03design,
@@ -11339,7 +11339,7 @@ Because our scheme requires cooperation, it is potentially vulnerable to several
11339 isbn = {978-3-540-20051-2}, 11339 isbn = {978-3-540-20051-2},
11340 doi = {10.1007/b13249}, 11340 doi = {10.1007/b13249},
11341 url = {http://www.springerlink.com/content/tdemq6m8b20320hb/}, 11341 url = {http://www.springerlink.com/content/tdemq6m8b20320hb/},
11342 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ngc03_ldpc_slides_03sep18_4s.pdf}, 11342 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ngc03_ldpc_slides_03sep18_4s.pdf},
11343 author = {Vincent Roca and Zainab Khallouf and Julien Laboure} 11343 author = {Vincent Roca and Zainab Khallouf and Julien Laboure}
11344} 11344}
11345@booklet {_, 11345@booklet {_,
@@ -11350,7 +11350,7 @@ Because our scheme requires cooperation, it is potentially vulnerable to several
11350This paper presents the design and implementation of a cooperative off-site backup system, Venti-DHash. Venti-DHash is based on a DHT infrastructure and is designed to support recovery of data after a disaster by keeping regular snapshots of filesystems distributed off-site, on peers on the Internet. Where as conventional backup systems incur significant equipment costs, manual effort and high administrative overhead, we hope that a distributed backup system can alleviate these problems, making backups easy and feasible. By building this system on top of a DHT, the backup application inherits the properties of the DHT, and serves to evaluate the feasibility of using a DHT to build larg escale applications}, 11350This paper presents the design and implementation of a cooperative off-site backup system, Venti-DHash. Venti-DHash is based on a DHT infrastructure and is designed to support recovery of data after a disaster by keeping regular snapshots of filesystems distributed off-site, on peers on the Internet. Where as conventional backup systems incur significant equipment costs, manual effort and high administrative overhead, we hope that a distributed backup system can alleviate these problems, making backups easy and feasible. By building this system on top of a DHT, the backup application inherits the properties of the DHT, and serves to evaluate the feasibility of using a DHT to build larg escale applications},
11351 www_section = {backup, distributed hash table}, 11351 www_section = {backup, distributed hash table},
11352 url = {http://doc.cat-v.org/plan_9/misc/venti-dhash/}, 11352 url = {http://doc.cat-v.org/plan_9/misc/venti-dhash/},
11353 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.104.8086.pdf}, 11353 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.104.8086.pdf},
11354 author = {Emil Sit and Josh Cates and Russ Cox} 11354 author = {Emil Sit and Josh Cates and Russ Cox}
11355} 11355}
11356@conference {Acquisti03onthe, 11356@conference {Acquisti03onthe,
@@ -11360,7 +11360,7 @@ This paper presents the design and implementation of a cooperative off-site back
11360 pages = {84--102}, 11360 pages = {84--102},
11361 abstract = {Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives to participate in such systems remains a major roadblock. Here we explore some reasons why anonymity systems are particularly hard to deploy, enumerate the incentives to participate either as senders or also as nodes, and build a general model to describe the effects of these incentives. We then describe and justify some simplifying assumptions to make the model manageable, and compare optimal strategies for participants based on a variety of scenarios}, 11361 abstract = {Decentralized anonymity infrastructures are still not in wide use today. While there are technical barriers to a secure robust design, our lack of understanding of the incentives to participate in such systems remains a major roadblock. Here we explore some reasons why anonymity systems are particularly hard to deploy, enumerate the incentives to participate either as senders or also as nodes, and build a general model to describe the effects of these incentives. We then describe and justify some simplifying assumptions to make the model manageable, and compare optimal strategies for participants based on a variety of scenarios},
11362 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.13.5636\&rep=rep1\&type=pdf}, 11362 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.13.5636\&rep=rep1\&type=pdf},
11363 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.13.5636.pdf}, 11363 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.13.5636.pdf},
11364 author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson} 11364 author = {Alessandro Acquisti and Roger Dingledine and Paul Syverson}
11365} 11365}
11366@conference {Buchegger03theeffect, 11366@conference {Buchegger03theeffect,
@@ -11370,7 +11370,7 @@ This paper presents the design and implementation of a cooperative off-site back
11370 abstract = {Mobile ad-hoc networks rely on the cooperation of nodes for routing and forwarding. For individual nodes there are however several advantages resulting from noncooperation, the most obvious being power saving. Nodes that act selfishly or even maliciously pose a threat to availability in mobile ad-hoc networks. Several approaches have been proposed to detect noncooperative nodes. In this paper, we investigate the effect of using rumors with respect to the detection time of misbehaved nodes as well as the robustness of the reputation system against wrong accusations. We propose a Bayesian approach for reputation representation, updates, and view integration. We also present a mechanism to detect and exclude potential lies. The simulation results indicate that by using this Bayesian approach, the reputation system is robust against slander while still benefitting from the speed-up in detection time provided by the use of rumors}, 11370 abstract = {Mobile ad-hoc networks rely on the cooperation of nodes for routing and forwarding. For individual nodes there are however several advantages resulting from noncooperation, the most obvious being power saving. Nodes that act selfishly or even maliciously pose a threat to availability in mobile ad-hoc networks. Several approaches have been proposed to detect noncooperative nodes. In this paper, we investigate the effect of using rumors with respect to the detection time of misbehaved nodes as well as the robustness of the reputation system against wrong accusations. We propose a Bayesian approach for reputation representation, updates, and view integration. We also present a mechanism to detect and exclude potential lies. The simulation results indicate that by using this Bayesian approach, the reputation system is robust against slander while still benefitting from the speed-up in detection time provided by the use of rumors},
11371 www_section = {ad-hoc networks, reputation, robustness}, 11371 www_section = {ad-hoc networks, reputation, robustness},
11372 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.9006}, 11372 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.9006},
11373 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.13.9006_0.pdf}, 11373 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.13.9006_0.pdf},
11374 author = {Sonja Buchegger and Jean-Yves Le Boudec} 11374 author = {Sonja Buchegger and Jean-Yves Le Boudec}
11375} 11375}
11376@conference {2003_1, 11376@conference {2003_1,
@@ -11381,7 +11381,7 @@ This paper presents the design and implementation of a cooperative off-site back
11381 address = {Sophia-Antipolis, France}, 11381 address = {Sophia-Antipolis, France},
11382 abstract = {Mobile ad-hoc networks rely on the cooperation of nodes for routing and forwarding. For individual nodes there are however several advantages resulting from noncooperation, the most obvious being power saving. Nodes that act selfishly or even maliciously pose a threat to availability in mobile adhoc networks. Several approaches have been proposed to detect noncooperative nodes. In this paper, we investigate the e$\#$ect of using rumors with respect to the detection time of misbehaved nodes as well as the robustness of the reputation system against wrong accusations. We propose a Bayesian approach for reputation representation, updates, and view integration. We also present a mechanism to detect and exclude potential lies. The simulation results indicate that by using this Bayesian approach, the reputation system is robust against slander while still benefitting from the speed-up in detection time provided by the use of rumors}, 11382 abstract = {Mobile ad-hoc networks rely on the cooperation of nodes for routing and forwarding. For individual nodes there are however several advantages resulting from noncooperation, the most obvious being power saving. Nodes that act selfishly or even maliciously pose a threat to availability in mobile adhoc networks. Several approaches have been proposed to detect noncooperative nodes. In this paper, we investigate the e$\#$ect of using rumors with respect to the detection time of misbehaved nodes as well as the robustness of the reputation system against wrong accusations. We propose a Bayesian approach for reputation representation, updates, and view integration. We also present a mechanism to detect and exclude potential lies. The simulation results indicate that by using this Bayesian approach, the reputation system is robust against slander while still benefitting from the speed-up in detection time provided by the use of rumors},
11383 www_section = {mobile Ad-hoc networks, reputation, reputation system, rumor}, 11383 www_section = {mobile Ad-hoc networks, reputation, reputation system, rumor},
11384 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WiOpt\%2703\%20-\%20Buchegger\%20\%26\%20Le\%20Boudec\%20-\%20Reputation\%20Systems.pdf}, 11384 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WiOpt\%2703\%20-\%20Buchegger\%20\%26\%20Le\%20Boudec\%20-\%20Reputation\%20Systems.pdf},
11385 author = {Sonja Buchegger and Jean-Yves Le Boudec} 11385 author = {Sonja Buchegger and Jean-Yves Le Boudec}
11386} 11386}
11387@conference {Kwon:2003:EPF:827273.829221, 11387@conference {Kwon:2003:EPF:827273.829221,
@@ -11399,7 +11399,7 @@ This paper presents the design and implementation of a cooperative off-site back
11399 isbn = {0-7695-1872-9}, 11399 isbn = {0-7695-1872-9},
11400 doi = {http://doi.ieeecomputersociety.org/10.1109/SAINT.2003.1183054}, 11400 doi = {http://doi.ieeecomputersociety.org/10.1109/SAINT.2003.1183054},
11401 url = {http://dl.acm.org/citation.cfm?id=827273.829221}, 11401 url = {http://dl.acm.org/citation.cfm?id=827273.829221},
11402 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SAINT\%2703\%20-\%20Kwon\%20\%26\%20Ryu.pdf}, 11402 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SAINT\%2703\%20-\%20Kwon\%20\%26\%20Ryu.pdf},
11403 author = {Kwon, Gisik and Ryu, Kyung D.} 11403 author = {Kwon, Gisik and Ryu, Kyung D.}
11404} 11404}
11405@conference {Kamvar:2003:EAR:775152.775242, 11405@conference {Kamvar:2003:EAR:775152.775242,
@@ -11417,7 +11417,7 @@ This paper presents the design and implementation of a cooperative off-site back
11417 isbn = {1-58113-680-3}, 11417 isbn = {1-58113-680-3},
11418 doi = {http://doi.acm.org/10.1145/775152.775242}, 11418 doi = {http://doi.acm.org/10.1145/775152.775242},
11419 url = {http://doi.acm.org/10.1145/775152.775242}, 11419 url = {http://doi.acm.org/10.1145/775152.775242},
11420 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/WWW\%2703\%20-\%20The\%20EigenTrust\%20algorithm.pdf}, 11420 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/WWW\%2703\%20-\%20The\%20EigenTrust\%20algorithm.pdf},
11421 author = {Kamvar, Sepandar D. and Schlosser, Mario T. and Hector Garcia-Molina} 11421 author = {Kamvar, Sepandar D. and Schlosser, Mario T. and Hector Garcia-Molina}
11422} 11422}
11423@conference {948119, 11423@conference {948119,
@@ -11433,7 +11433,7 @@ This paper presents the design and implementation of a cooperative off-site back
11433 isbn = {1-58113-738-9}, 11433 isbn = {1-58113-738-9},
11434 doi = {10.1145/948109.948119}, 11434 doi = {10.1145/948109.948119},
11435 url = {http://portal.acm.org/citation.cfm?id=948119$\#$}, 11435 url = {http://portal.acm.org/citation.cfm?id=948119$\#$},
11436 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ccs03-SNKeyMan.pdf}, 11436 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ccs03-SNKeyMan.pdf},
11437 author = {Liu, Donggang and Peng Ning} 11437 author = {Liu, Donggang and Peng Ning}
11438} 11438}
11439@article {2003_2, 11439@article {2003_2,
@@ -11446,7 +11446,7 @@ This paper presents the design and implementation of a cooperative off-site back
11446 abstract = {Both laboratory and field data suggest that people punish noncooperators even in one-shot interactions. Although such {\textquotedblleft}altruistic punishment{\textquotedblright} may explain the high levels of cooperation in human societies, it creates an evolutionary puzzle: existing models suggest that altruistic cooperation among nonrelatives is evolutionarily stable only in small groups. Thus, applying such models to the evolution of altruistic punishment leads to the prediction that people will not incur costs to punish others to provide benefits to large groups of nonrelatives. However, here we show that an important asymmetry between altruistic cooperation and altruistic punishment allows altruistic punishment to evolve in populations engaged in one-time, anonymous interactions. This process allows both altruistic punishment and altruistic cooperation to be maintained even when groups are large and other parameter values approximate conditions that characterize cultural evolution in the small-scale societies in which humans lived for most of our prehistory}, 11446 abstract = {Both laboratory and field data suggest that people punish noncooperators even in one-shot interactions. Although such {\textquotedblleft}altruistic punishment{\textquotedblright} may explain the high levels of cooperation in human societies, it creates an evolutionary puzzle: existing models suggest that altruistic cooperation among nonrelatives is evolutionarily stable only in small groups. Thus, applying such models to the evolution of altruistic punishment leads to the prediction that people will not incur costs to punish others to provide benefits to large groups of nonrelatives. However, here we show that an important asymmetry between altruistic cooperation and altruistic punishment allows altruistic punishment to evolve in populations engaged in one-time, anonymous interactions. This process allows both altruistic punishment and altruistic cooperation to be maintained even when groups are large and other parameter values approximate conditions that characterize cultural evolution in the small-scale societies in which humans lived for most of our prehistory},
11447 www_section = {altruistic cooperation, altruistic punishment, cooperation, human society, nonrelatives}, 11447 www_section = {altruistic cooperation, altruistic punishment, cooperation, human society, nonrelatives},
11448 doi = {10.1073/pnas.0630443100}, 11448 doi = {10.1073/pnas.0630443100},
11449 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PNAS\%20\%282003\%29\%20-\%20The\%20evolution\%20of\%20altruistic\%20punishment.pdf}, 11449 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PNAS\%20\%282003\%29\%20-\%20The\%20evolution\%20of\%20altruistic\%20punishment.pdf},
11450 author = {Robert Boyd and Herbert Gintis and Samuel Bowles and Peter J. Richerson} 11450 author = {Robert Boyd and Herbert Gintis and Samuel Bowles and Peter J. Richerson}
11451} 11451}
11452@article { ebe2003, 11452@article { ebe2003,
@@ -11464,7 +11464,7 @@ makes it hard to link a transaction to the node where it originated from. While
11464decisions}, 11464decisions},
11465 www_section = {anonymity, file-sharing, GNUnet}, 11465 www_section = {anonymity, file-sharing, GNUnet},
11466 url = {http://grothoff.org/christian/ebe.pdf}, 11466 url = {http://grothoff.org/christian/ebe.pdf},
11467 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ebe.pdf}, 11467 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ebe.pdf},
11468 author = {Christian Grothoff} 11468 author = {Christian Grothoff}
11469} 11469}
11470@booklet {Peterson03ext3cow:the, 11470@booklet {Peterson03ext3cow:the,
@@ -11473,7 +11473,7 @@ decisions},
11473 abstract = {The ext3cow file system, built on Linux's popular ext3 file system, brings snapshot functionality and file versioning to the open-source community. Our implementation of ext3cow has several desirable properties: ext3cow is implemented entirely in the file system and, therefore, does not modify kernel interfaces or change the operation of other file systems; ext3cow provides a time-shifting interface that permits access to data in the past without polluting the file system namespace; and, ext3cow creates versions of files on disk without copying data in memory. Experimental results show that the time-shifting functions of ext3cow do not degrade file system performance. Ext3cow performs comparably to ext3 on many file system benchmarks and trace driven experiments}, 11473 abstract = {The ext3cow file system, built on Linux's popular ext3 file system, brings snapshot functionality and file versioning to the open-source community. Our implementation of ext3cow has several desirable properties: ext3cow is implemented entirely in the file system and, therefore, does not modify kernel interfaces or change the operation of other file systems; ext3cow provides a time-shifting interface that permits access to data in the past without polluting the file system namespace; and, ext3cow creates versions of files on disk without copying data in memory. Experimental results show that the time-shifting functions of ext3cow do not degrade file system performance. Ext3cow performs comparably to ext3 on many file system benchmarks and trace driven experiments},
11474 www_section = {file systems}, 11474 www_section = {file systems},
11475 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.2545}, 11475 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.2545},
11476 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.10.2545.pdf}, 11476 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.10.2545.pdf},
11477 author = {Zachary N. J. Peterson and Randal C. Burns} 11477 author = {Zachary N. J. Peterson and Randal C. Burns}
11478} 11478}
11479@article {2003_3, 11479@article {2003_3,
@@ -11487,7 +11487,7 @@ In this paper we analyze several extensions to the exponential feedback algorith
11487 doi = {10.1007/b13249}, 11487 doi = {10.1007/b13249},
11488 journal = {unknown}, 11488 journal = {unknown},
11489 url = {http://www.springerlink.com/content/bvelyaew4ukl4aau/}, 11489 url = {http://www.springerlink.com/content/bvelyaew4ukl4aau/},
11490 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fuhrmann03feedback.pdf}, 11490 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fuhrmann03feedback.pdf},
11491 author = {Thomas Fuhrmann and J{\"o}rg Widmer} 11491 author = {Thomas Fuhrmann and J{\"o}rg Widmer}
11492} 11492}
11493@conference {2003_4, 11493@conference {2003_4,
@@ -11504,7 +11504,7 @@ In this paper we analyze several extensions to the exponential feedback algorith
11504 isbn = {0-7695-2023-5 }, 11504 isbn = {0-7695-2023-5 },
11505 doi = { 10.1109/PTP.2003.1231503 }, 11505 doi = { 10.1109/PTP.2003.1231503 },
11506 url = { 10.1109/PTP.2003.1231503 }, 11506 url = { 10.1109/PTP.2003.1231503 },
11507 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/P2P\%2703\%20-\%20Buragohain\%2C\%20Agrawal\%20\%26\%20Suri\%20-\%20Incentives\%20in\%20P2P\%20systems.pdf}, 11507 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/P2P\%2703\%20-\%20Buragohain\%2C\%20Agrawal\%20\%26\%20Suri\%20-\%20Incentives\%20in\%20P2P\%20systems.pdf},
11508 author = {Chiranjeeb Buragohain and Dvyakant Agrawal and Subhash Suri} 11508 author = {Chiranjeeb Buragohain and Dvyakant Agrawal and Subhash Suri}
11509} 11509}
11510@conference { gap, 11510@conference { gap,
@@ -11520,7 +11520,7 @@ The main focus of this work is gap, a simple protocol for anonymous transfer of
11520schemes, allowing individual nodes to balance anonymity with efficiency according to their specific needs}, 11520schemes, allowing individual nodes to balance anonymity with efficiency according to their specific needs},
11521 www_section = {anonymity, GNUnet, installation}, 11521 www_section = {anonymity, GNUnet, installation},
11522 url = {http://grothoff.org/christian/aff.pdf}, 11522 url = {http://grothoff.org/christian/aff.pdf},
11523 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/aff.pdf}, 11523 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/aff.pdf},
11524 author = {Krista Bennett and Christian Grothoff} 11524 author = {Krista Bennett and Christian Grothoff}
11525} 11525}
11526@conference {diaz:pet2003, 11526@conference {diaz:pet2003,
@@ -11537,7 +11537,7 @@ We then show how to express existing mixes in the framework, and then suggest ot
11537 isbn = {978-3-540-20610-1}, 11537 isbn = {978-3-540-20610-1},
11538 doi = {10.1007/b94512}, 11538 doi = {10.1007/b94512},
11539 url = {http://www.springerlink.com/content/jvuk0exyqxvcyhvy/}, 11539 url = {http://www.springerlink.com/content/jvuk0exyqxvcyhvy/},
11540 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.3.9155.pdf}, 11540 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.3.9155.pdf},
11541 author = {Claudia Diaz and Andrei Serjantov}, 11541 author = {Claudia Diaz and Andrei Serjantov},
11542 editor = {Roger Dingledine} 11542 editor = {Roger Dingledine}
11543} 11543}
@@ -11554,7 +11554,7 @@ We then show how to express existing mixes in the framework, and then suggest ot
11554 isbn = {1-58113-776-1}, 11554 isbn = {1-58113-776-1},
11555 doi = {10.1145/1005140.1005154}, 11555 doi = {10.1145/1005140.1005154},
11556 url = {http://portal.acm.org/citation.cfm?id=1005154}, 11556 url = {http://portal.acm.org/citation.cfm?id=1005154},
11557 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/danezis-wpes2003.pdf}, 11557 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/danezis-wpes2003.pdf},
11558 author = {George Danezis and Len Sassaman} 11558 author = {George Danezis and Len Sassaman}
11559} 11559}
11560@booklet {herbivore:tr, 11560@booklet {herbivore:tr,
@@ -11567,7 +11567,7 @@ We then show how to express existing mixes in the framework, and then suggest ot
11567 abstract = {Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. In this paper, we describe Herbivore, a peer-to-peer, scalable, tamper-resilient communication system that provides provable anonymity and privacy. Building on dining cryptographer networks, Herbivore scales by partitioning the network into anonymizing cliques. Adversaries able to monitor all network traffic cannot deduce the identity of a sender or receiver beyond an anonymizing clique. In addition to strong anonymity, Herbivore simultaneously provides high efficiency and scalability, distinguishing it from other anonymous communication protocols. Performance measurements from a prototype implementation show that the system can achieve high bandwidths and low latencies when deployed over the Internet}, 11567 abstract = {Anonymity is increasingly important for networked applications amidst concerns over censorship and privacy. In this paper, we describe Herbivore, a peer-to-peer, scalable, tamper-resilient communication system that provides provable anonymity and privacy. Building on dining cryptographer networks, Herbivore scales by partitioning the network into anonymizing cliques. Adversaries able to monitor all network traffic cannot deduce the identity of a sender or receiver beyond an anonymizing clique. In addition to strong anonymity, Herbivore simultaneously provides high efficiency and scalability, distinguishing it from other anonymous communication protocols. Performance measurements from a prototype implementation show that the system can achieve high bandwidths and low latencies when deployed over the Internet},
11568 www_section = {anonymity, P2P, privacy}, 11568 www_section = {anonymity, P2P, privacy},
11569 url = {http://ecommons.cornell.edu/handle/1813/5606}, 11569 url = {http://ecommons.cornell.edu/handle/1813/5606},
11570 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/herbivore-tr.pdf}, 11570 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/herbivore-tr.pdf},
11571 author = {Goel, Sharad and Mark Robson and Milo Polte and Emin G{\"u}n Sirer} 11571 author = {Goel, Sharad and Mark Robson and Milo Polte and Emin G{\"u}n Sirer}
11572} 11572}
11573@article {10.1109/ICPP.2003.1240580, 11573@article {10.1109/ICPP.2003.1240580,
@@ -11597,7 +11597,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11597 abstract = {Peer-to-peer storage aims to build large-scale, reliable and available storage from many small-scale unreliable, low-availability distributed hosts. Data redundancy is the key to any data guarantees. However, preserving redundancy in the face of highly dynamic membership is costly. We use a simple resource usage model to measured behavior from the Gnutella file-sharing network to argue that large-scale cooperative storage is limited by likely dynamics and cross-system bandwidth -- not by local disk space. We examine some bandwidth optimization strategies like delayed response to failures, admission control, and load-shifting and find that they do not alter the basic problem. We conclude that when redundancy, data scale, and dynamics are all high, the needed cross-system bandwidth is unreasonable}, 11597 abstract = {Peer-to-peer storage aims to build large-scale, reliable and available storage from many small-scale unreliable, low-availability distributed hosts. Data redundancy is the key to any data guarantees. However, preserving redundancy in the face of highly dynamic membership is costly. We use a simple resource usage model to measured behavior from the Gnutella file-sharing network to argue that large-scale cooperative storage is limited by likely dynamics and cross-system bandwidth -- not by local disk space. We examine some bandwidth optimization strategies like delayed response to failures, admission control, and load-shifting and find that they do not alter the basic problem. We conclude that when redundancy, data scale, and dynamics are all high, the needed cross-system bandwidth is unreasonable},
11598 www_section = {distributed hosts, dynamic peer network, peer-to-peer storage, redundancy}, 11598 www_section = {distributed hosts, dynamic peer network, peer-to-peer storage, redundancy},
11599 url = {http://dl.acm.org/citation.cfm?id=1251054.1251055}, 11599 url = {http://dl.acm.org/citation.cfm?id=1251054.1251055},
11600 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/HotOS\%20IX\%20-\%20High\%20available\%2C\%20scalable\%20storage\%2C\%20dynamic\%20peer\%20networks.pdf}, 11600 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/HotOS\%20IX\%20-\%20High\%20available\%2C\%20scalable\%20storage\%2C\%20dynamic\%20peer\%20networks.pdf},
11601 author = {Blake, Charles and Rodrigues, Rodrigo} 11601 author = {Blake, Charles and Rodrigues, Rodrigo}
11602} 11602}
11603@conference {10.1109/PTP.2003.1231513, 11603@conference {10.1109/PTP.2003.1231513,
@@ -11613,7 +11613,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11613 www_section = {anonymity, identity, identity model, P2P, peer-to-peer networking, reliability, reputation, reputation system}, 11613 www_section = {anonymity, identity, identity model, P2P, peer-to-peer networking, reliability, reputation, reputation system},
11614 isbn = {0-7695-2023-5}, 11614 isbn = {0-7695-2023-5},
11615 doi = {http://doi.ieeecomputersociety.org/10.1109/PTP.2003.1231513}, 11615 doi = {http://doi.ieeecomputersociety.org/10.1109/PTP.2003.1231513},
11616 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/P2P\%2703\%20-\%20Identity\%20crisis\%3A\%20anonymity\%20vs\%20reputation.pdf}, 11616 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/P2P\%2703\%20-\%20Identity\%20crisis\%3A\%20anonymity\%20vs\%20reputation.pdf},
11617 author = {Marti, Sergio and Hector Garcia-Molina} 11617 author = {Marti, Sergio and Hector Garcia-Molina}
11618} 11618}
11619@conference {Gummadi:2003:IDR:863955.863998, 11619@conference {Gummadi:2003:IDR:863955.863998,
@@ -11631,7 +11631,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11631 isbn = {1-58113-735-4}, 11631 isbn = {1-58113-735-4},
11632 doi = {http://doi.acm.org/10.1145/863955.863998}, 11632 doi = {http://doi.acm.org/10.1145/863955.863998},
11633 url = {http://doi.acm.org/10.1145/863955.863998}, 11633 url = {http://doi.acm.org/10.1145/863955.863998},
11634 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%2703\%20-\%20The\%20impact\%20of\%20DHT\%20routing\%20geometry\%20on\%20resilience\%20and\%20proximity.pdf}, 11634 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%2703\%20-\%20The\%20impact\%20of\%20DHT\%20routing\%20geometry\%20on\%20resilience\%20and\%20proximity.pdf},
11635 author = {Krishna Phani Gummadi and Gummadi, Ramakrishna and Steven D. Gribble and Sylvia Paul Ratnasamy and S Shenker and Ion Stoica} 11635 author = {Krishna Phani Gummadi and Gummadi, Ramakrishna and Steven D. Gribble and Sylvia Paul Ratnasamy and S Shenker and Ion Stoica}
11636} 11636}
11637@conference {clayton:pet2003, 11637@conference {clayton:pet2003,
@@ -11645,7 +11645,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11645 abstract = {Several di$\#$erent notations are used in the literature of MIX networks to describe the nested encrypted structures now widely known as "onions". The shortcomings of these notations are described and a new notation is proposed, that as well as having some advantages from a typographical point of view, is also far clearer to read and to reason about. The proposed notation generated a lively debate at the PET2003 workshop and the various views, and alternative proposals, are reported upon. The workshop participants did not reach any consensus on improving onion notation, but there is now a heightened awareness of the problems that can arise with existing representations}, 11645 abstract = {Several di$\#$erent notations are used in the literature of MIX networks to describe the nested encrypted structures now widely known as "onions". The shortcomings of these notations are described and a new notation is proposed, that as well as having some advantages from a typographical point of view, is also far clearer to read and to reason about. The proposed notation generated a lively debate at the PET2003 workshop and the various views, and alternative proposals, are reported upon. The workshop participants did not reach any consensus on improving onion notation, but there is now a heightened awareness of the problems that can arise with existing representations},
11646 www_section = {onion routing}, 11646 www_section = {onion routing},
11647 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.5965}, 11647 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.5965},
11648 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/clayton-pet2003.pdf}, 11648 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/clayton-pet2003.pdf},
11649 author = {Richard Clayton}, 11649 author = {Richard Clayton},
11650 editor = {Roger Dingledine} 11650 editor = {Roger Dingledine}
11651} 11651}
@@ -11657,7 +11657,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11657 address = {Berkeley, CA, USA}, 11657 address = {Berkeley, CA, USA},
11658 abstract = {The BitTorrent file distribution system uses tit-for-tat as a method to seeking pareto efficiency. It achieves a higher level of robustness and resource utilization than any currently known cooperative technique. We explain what BitTorrent does, and how economic methods are used to achieve that goal}, 11658 abstract = {The BitTorrent file distribution system uses tit-for-tat as a method to seeking pareto efficiency. It achieves a higher level of robustness and resource utilization than any currently known cooperative technique. We explain what BitTorrent does, and how economic methods are used to achieve that goal},
11659 www_section = {BitTorrent, resource utilization, robustness}, 11659 www_section = {BitTorrent, resource utilization, robustness},
11660 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NetEcon\%2703\%20-\%20Cohen\%20-\%20Incentives\%20build\%20robustness\%20in\%20BitTorrent.pdf}, 11660 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NetEcon\%2703\%20-\%20Cohen\%20-\%20Incentives\%20build\%20robustness\%20in\%20BitTorrent.pdf},
11661 author = {Bram Cohen} 11661 author = {Bram Cohen}
11662} 11662}
11663@conference {Lai03incentivesfor, 11663@conference {Lai03incentivesfor,
@@ -11669,7 +11669,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11669 abstract = {this paper, our contributions are to generalize from the traditional symmetric EPD to the asymmetric transactions of P2P applications, map out the design space of EPD-based incentive techniques, and simulate a subset of these techniques. Our findings are as follows: Incentive techniques relying on private history (where entites only use their private histories of entities' actions) fail as the population size increases}, 11669 abstract = {this paper, our contributions are to generalize from the traditional symmetric EPD to the asymmetric transactions of P2P applications, map out the design space of EPD-based incentive techniques, and simulate a subset of these techniques. Our findings are as follows: Incentive techniques relying on private history (where entites only use their private histories of entities' actions) fail as the population size increases},
11670 www_section = {P2P, privacy}, 11670 www_section = {P2P, privacy},
11671 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.1949}, 11671 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.1949},
11672 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/incentives-for-cooperation-in_0.pdf}, 11672 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/incentives-for-cooperation-in_0.pdf},
11673 author = {Kevin Lai and Michal Feldman and Ion Stoica and John Chuang} 11673 author = {Kevin Lai and Michal Feldman and Ion Stoica and John Chuang}
11674} 11674}
11675@conference {Ahn03k-anonymousmessage, 11675@conference {Ahn03k-anonymousmessage,
@@ -11683,7 +11683,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11683 abstract = {Informally, a communication protocol is sender k--anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down its search to a set of k suspects. Receiver k-anonymity places a similar guarantee on the receiver: an adversary, at best, can only narrow down the possible receivers to a set of size k. In this paper we introduce the notions of sender and receiver k-anonymity and consider their applications. We show that there exist simple and e$\#$cient protocols which are k-anonymous for both the sender and the receiver in a model where a polynomial time adversary can see all tra$\#$c in the network and can control up to a constant fraction of the participants. Our protocol is provably secure, practical, and does not require the existence of trusted third parties. This paper also provides a conceptually simple augmentation to Chaum's DC-Nets that adds robustness against adversaries who attempt to disrupt the protocol through perpetual transmission or selective non-participation}, 11683 abstract = {Informally, a communication protocol is sender k--anonymous if it can guarantee that an adversary, trying to determine the sender of a particular message, can only narrow down its search to a set of k suspects. Receiver k-anonymity places a similar guarantee on the receiver: an adversary, at best, can only narrow down the possible receivers to a set of size k. In this paper we introduce the notions of sender and receiver k-anonymity and consider their applications. We show that there exist simple and e$\#$cient protocols which are k-anonymous for both the sender and the receiver in a model where a polynomial time adversary can see all tra$\#$c in the network and can control up to a constant fraction of the participants. Our protocol is provably secure, practical, and does not require the existence of trusted third parties. This paper also provides a conceptually simple augmentation to Chaum's DC-Nets that adds robustness against adversaries who attempt to disrupt the protocol through perpetual transmission or selective non-participation},
11684 isbn = {1-58113-738-9}, 11684 isbn = {1-58113-738-9},
11685 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.9.9348\&rep=rep1\&type=url\&i=2}, 11685 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.9.9348\&rep=rep1\&type=url\&i=2},
11686 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/k-anonymous_ccs2003.pdf}, 11686 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/k-anonymous_ccs2003.pdf},
11687 author = {Luis von Ahn and Andrew Bortz and Nicholas J. Hopper} 11687 author = {Luis von Ahn and Andrew Bortz and Nicholas J. Hopper}
11688} 11688}
11689@conference {2003_6, 11689@conference {2003_6,
@@ -11694,7 +11694,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11694 address = {Berkeley, CA, USA}, 11694 address = {Berkeley, CA, USA},
11695 abstract = {Peer-to-peer systems are typically designed around the assumption that all peers will willingly contribute resources to a global pool. They thus suffer from freeloaders,that is, participants who consume many more resources than they contribute. In this paper, we propose a general economic framework for avoiding freeloaders in peer-to-peer systems. Our system works by keeping track of the resource consumption and resource contributionof each participant. The overall standing of each}, 11695 abstract = {Peer-to-peer systems are typically designed around the assumption that all peers will willingly contribute resources to a global pool. They thus suffer from freeloaders,that is, participants who consume many more resources than they contribute. In this paper, we propose a general economic framework for avoiding freeloaders in peer-to-peer systems. Our system works by keeping track of the resource consumption and resource contributionof each participant. The overall standing of each},
11696 www_section = {economic framework, freeloader, karma, p2p resource sharing}, 11696 www_section = {economic framework, freeloader, karma, p2p resource sharing},
11697 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/P2PECON\%2705\%20-\%20KARMA.pdf}, 11697 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/P2PECON\%2705\%20-\%20KARMA.pdf},
11698 author = {Vivek Vishnumurthy and Sangeeth Chandrakumar and Emin G{\"u}n Sirer} 11698 author = {Vivek Vishnumurthy and Sangeeth Chandrakumar and Emin G{\"u}n Sirer}
11699} 11699}
11700@conference {Gupta03kelips:building, 11700@conference {Gupta03kelips:building,
@@ -11704,7 +11704,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11704 abstract = {A peer-to-peer (p2p) distributed hash table (DHT) system allows hosts to join and fail silently (or leave), as well as to insert and retrieve files (objects). This paper explores a new point in design space in which increased memory usage and constant background communication overheads are tolerated to reduce file lookup times and increase stability to failures and churn. Our system, called Kelips, uses peer-to-peer gossip to partially replicate file index information. In Kelips, (a) under normal conditions, file lookups are resolved with O(1) time and complexity (i.e., independent of system size), and (b) membership changes (e.g., even when a large number of nodes fail) are detected and disseminated to the system quickly. Per-node memory requirements are small in medium-sized systems. When there are failures, lookup success is ensured through query rerouting. Kelips achieves load balancing comparable to existing systems. Locality is supported by using topologically aware gossip mechanisms. Initial results of an ongoing experimental study are also discussed}, 11704 abstract = {A peer-to-peer (p2p) distributed hash table (DHT) system allows hosts to join and fail silently (or leave), as well as to insert and retrieve files (objects). This paper explores a new point in design space in which increased memory usage and constant background communication overheads are tolerated to reduce file lookup times and increase stability to failures and churn. Our system, called Kelips, uses peer-to-peer gossip to partially replicate file index information. In Kelips, (a) under normal conditions, file lookups are resolved with O(1) time and complexity (i.e., independent of system size), and (b) membership changes (e.g., even when a large number of nodes fail) are detected and disseminated to the system quickly. Per-node memory requirements are small in medium-sized systems. When there are failures, lookup success is ensured through query rerouting. Kelips achieves load balancing comparable to existing systems. Locality is supported by using topologically aware gossip mechanisms. Initial results of an ongoing experimental study are also discussed},
11705 www_section = {distributed hash table, P2P}, 11705 www_section = {distributed hash table, P2P},
11706 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.3464}, 11706 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.3464},
11707 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.13.3464.pdf}, 11707 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.13.3464.pdf},
11708 author = {Indranil Gupta and Kenneth P. Birman and Prakash Linga and Alan Demers and Robbert Van Renesse} 11708 author = {Indranil Gupta and Kenneth P. Birman and Prakash Linga and Alan Demers and Robbert Van Renesse}
11709} 11709}
11710@book {2003_7, 11710@book {2003_7,
@@ -11720,7 +11720,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11720 abstract = {Koorde is a new distributed hash table (DHT) based on Chord 15 and the de Bruijn graphs 2. While inheriting the simplicity of Chord, Koorde meets various lower bounds, such as O(log n) hops per lookup request with only 2 neighbors per node (where n is the number of nodes in the DHT), and O(log n/log log n) hops per lookup request with O(log n) neighbors per node}, 11720 abstract = {Koorde is a new distributed hash table (DHT) based on Chord 15 and the de Bruijn graphs 2. While inheriting the simplicity of Chord, Koorde meets various lower bounds, such as O(log n) hops per lookup request with only 2 neighbors per node (where n is the number of nodes in the DHT), and O(log n/log log n) hops per lookup request with O(log n) neighbors per node},
11721 www_section = {de Bruijn graph, distributed hash table, Koorde}, 11721 www_section = {de Bruijn graph, distributed hash table, Koorde},
11722 doi = {10.1007/b11823}, 11722 doi = {10.1007/b11823},
11723 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/koorde.pdf}, 11723 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/koorde.pdf},
11724 author = {Frans M. Kaashoek and David Karger} 11724 author = {Frans M. Kaashoek and David Karger}
11725} 11725}
11726@booklet { turner03lightweight, 11726@booklet { turner03lightweight,
@@ -11729,7 +11729,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11729 abstract = {A P2P resource market is a market in which peers trade resources (including storage, bandwidth and CPU cycles) and services with each other. We propose a specific paradigm for a P2P resource market. This paradigm has five key components: (i) pairwise trading market, with peers setting their own prices for offered resources; (ii) multiple currency economy, in which any peer can issue its own currency; (iii) no legal recourse, thereby limiting the transaction costs in trades; (iv) a simple, secure application-layer protocol; and (v) entity identification based on the entity's unique public key. We argue that the paradigm can lead to a flourishing P2P resource market, allowing applications to tap into the huge pool of surplus peer resources. We illustrate the paradigm and its corresponding Lightweight Currency Protocol (LCP) with several application examples}, 11729 abstract = {A P2P resource market is a market in which peers trade resources (including storage, bandwidth and CPU cycles) and services with each other. We propose a specific paradigm for a P2P resource market. This paradigm has five key components: (i) pairwise trading market, with peers setting their own prices for offered resources; (ii) multiple currency economy, in which any peer can issue its own currency; (iii) no legal recourse, thereby limiting the transaction costs in trades; (iv) a simple, secure application-layer protocol; and (v) entity identification based on the entity's unique public key. We argue that the paradigm can lead to a flourishing P2P resource market, allowing applications to tap into the huge pool of surplus peer resources. We illustrate the paradigm and its corresponding Lightweight Currency Protocol (LCP) with several application examples},
11730 www_section = {P2P}, 11730 www_section = {P2P},
11731 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.1309}, 11731 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.11.1309},
11732 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/LightweightParadigm.pdf}, 11732 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/LightweightParadigm.pdf},
11733 author = {David A. Turner and Keith W. Ross} 11733 author = {David A. Turner and Keith W. Ross}
11734} 11734}
11735@article {Eugster:2003:LPB:945506.945507, 11735@article {Eugster:2003:LPB:945506.945507,
@@ -11743,7 +11743,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11743 address = {New York, NY, USA}, 11743 address = {New York, NY, USA},
11744 www_section = {Broadcast, buffering, garbage collection, gossip, noise, randomization, reliability, scalability}, 11744 www_section = {Broadcast, buffering, garbage collection, gossip, noise, randomization, reliability, scalability},
11745 issn = {0734-2071}, 11745 issn = {0734-2071},
11746 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/lightweight_prob_broadcast.pdf}, 11746 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/lightweight_prob_broadcast.pdf},
11747 author = {Patrick Eugster and Rachid Guerraoui and Sidath B. Handurukande and Petr Kouznetsov and Anne-Marie Kermarrec} 11747 author = {Patrick Eugster and Rachid Guerraoui and Sidath B. Handurukande and Petr Kouznetsov and Anne-Marie Kermarrec}
11748} 11748}
11749@conference {864000, 11749@conference {864000,
@@ -11759,7 +11759,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11759 isbn = {1-58113-735-4}, 11759 isbn = {1-58113-735-4},
11760 doi = {10.1145/863955.864000}, 11760 doi = {10.1145/863955.864000},
11761 url = {http://portal.acm.org/citation.cfm?id=864000$\#$}, 11761 url = {http://portal.acm.org/citation.cfm?id=864000$\#$},
11762 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.10.5444.pdf}, 11762 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.10.5444.pdf},
11763 author = {Chawathe, Yatin and Breslau, Lee and Lanham, Nick and S Shenker} 11763 author = {Chawathe, Yatin and Breslau, Lee and Lanham, Nick and S Shenker}
11764} 11764}
11765@conference {1090700, 11765@conference {1090700,
@@ -11773,7 +11773,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11773 abstract = {Versioning file systems retain earlier versions of modified files, allowing recovery from user mistakes or system corruption. Unfortunately, conventional versioning systems do not efficiently record large numbers of versions. In particular, versioned metadata can consume as much space as versioned data. This paper examines two space-efficient metadata structures for versioning file systems and describes their integration into the Comprehensive Versioning File System (CVFS), which keeps all versions of all files. Journal-based metadata encodes each metadata version into a single journal entry; CVFS uses this structure for inodes and indirect blocks, reducing the associated space requirements by 80\%. Multiversion b-trees extend each entrys key with a timestamp and keep current and historical entries in a single tree; CVFS uses this structure for directories, reducing the associated space requirements by 99\%. Similar space reductions are predicted via trace analysis for other versioning strategies (e.g., on-close versioning). Experiments with CVFS verify that its current-version performance is sim-ilar to that of non-versioning file systems while reducing overall space needed for history data by a factor of two. Although access to historical versions is slower than con-ventional versioning systems, checkpointing is shown to mitigate and bound this effect}, 11773 abstract = {Versioning file systems retain earlier versions of modified files, allowing recovery from user mistakes or system corruption. Unfortunately, conventional versioning systems do not efficiently record large numbers of versions. In particular, versioned metadata can consume as much space as versioned data. This paper examines two space-efficient metadata structures for versioning file systems and describes their integration into the Comprehensive Versioning File System (CVFS), which keeps all versions of all files. Journal-based metadata encodes each metadata version into a single journal entry; CVFS uses this structure for inodes and indirect blocks, reducing the associated space requirements by 80\%. Multiversion b-trees extend each entrys key with a timestamp and keep current and historical entries in a single tree; CVFS uses this structure for directories, reducing the associated space requirements by 99\%. Similar space reductions are predicted via trace analysis for other versioning strategies (e.g., on-close versioning). Experiments with CVFS verify that its current-version performance is sim-ilar to that of non-versioning file systems while reducing overall space needed for history data by a factor of two. Although access to historical versions is slower than con-ventional versioning systems, checkpointing is shown to mitigate and bound this effect},
11774 www_section = {file systems}, 11774 www_section = {file systems},
11775 url = {http://portal.acm.org/citation.cfm?id=1090694.1090700$\#$}, 11775 url = {http://portal.acm.org/citation.cfm?id=1090694.1090700$\#$},
11776 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fast03.pdf}, 11776 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fast03.pdf},
11777 author = {Soules, Craig A. N. and Goodson, Garth R. and Strunk, John D. and Ganger, Gregory R.} 11777 author = {Soules, Craig A. N. and Goodson, Garth R. and Strunk, John D. and Ganger, Gregory R.}
11778} 11778}
11779@conference {newman:pet2003, 11779@conference {newman:pet2003,
@@ -11786,7 +11786,7 @@ In this paper, we propose a new P2P routing algorithm--- HIERAS to relieve this
11786 organization = {Springer-Verlag, LNCS 2760}, 11786 organization = {Springer-Verlag, LNCS 2760},
11787 abstract = {This paper considers systems for Traffic Analysis Prevention (TAP) in a theoretical model. It considers TAP based on padding and rerouting of messages and describes the effects each has on the difference between the actual and the observed traffic matrix (TM). The paper introduces an entropy-based approach to the amount of uncertainty a global passive adversary has in determining the actual TM, or alternatively, the probability that the actual TM has a property of interest. Unlike previous work, the focus is on determining the overall amount of anonymity a TAP system can provide, or the amount it can provide for a given cost in padding and rerouting, rather than on the amount of protection a afforded particular communications}, 11787 abstract = {This paper considers systems for Traffic Analysis Prevention (TAP) in a theoretical model. It considers TAP based on padding and rerouting of messages and describes the effects each has on the difference between the actual and the observed traffic matrix (TM). The paper introduces an entropy-based approach to the amount of uncertainty a global passive adversary has in determining the actual TM, or alternatively, the probability that the actual TM has a property of interest. Unlike previous work, the focus is on determining the overall amount of anonymity a TAP system can provide, or the amount it can provide for a given cost in padding and rerouting, rather than on the amount of protection a afforded particular communications},
11788 www_section = {traffic analysis, traffic matrix}, 11788 www_section = {traffic analysis, traffic matrix},
11789 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/steinbrecher-pet2003_0.pdf}, 11789 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/steinbrecher-pet2003_0.pdf},
11790 author = {Richard E. Newman and Ira S. Moskowitz and Paul Syverson and Andrei Serjantov}, 11790 author = {Richard E. Newman and Ira S. Moskowitz and Paul Syverson and Andrei Serjantov},
11791 editor = {Roger Dingledine} 11791 editor = {Roger Dingledine}
11792} 11792}
@@ -11800,7 +11800,7 @@ analysis.
11800Mixmaster is based on D. Chaum's mix-net protocol. A mix (remailer) is a service that forwards messages, using public key 11800Mixmaster is based on D. Chaum's mix-net protocol. A mix (remailer) is a service that forwards messages, using public key
11801cryptography to hide the correlation between its inputs and outputs. Sending messages through sequences of remailers achieves anonymity and unobservability of communications against a powerful adversary}, 11801cryptography to hide the correlation between its inputs and outputs. Sending messages through sequences of remailers achieves anonymity and unobservability of communications against a powerful adversary},
11802 www_section = {electronic mail, public key cryptography, traffic analysis}, 11802 www_section = {electronic mail, public key cryptography, traffic analysis},
11803 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/freehaven.net-anonbib-cache-mixmaster-spec.txt.pdf}, 11803 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/freehaven.net-anonbib-cache-mixmaster-spec.txt.pdf},
11804 author = {Ulf M{\"o}ller and Lance Cottrell and Peter Palfrader and Len Sassaman} 11804 author = {Ulf M{\"o}ller and Lance Cottrell and Peter Palfrader and Len Sassaman}
11805} 11805}
11806@conference {Danezis03mixminion:design, 11806@conference {Danezis03mixminion:design,
@@ -11810,7 +11810,7 @@ cryptography to hide the correlation between its inputs and outputs. Sending mes
11810 pages = {2--15}, 11810 pages = {2--15},
11811 abstract = {We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages, so forward and reply messages share the same anonymity set. We add directory servers that allow users to learn public keys and performance statistics of participating remailers, and we describe nymservers that provide long-term pseudonyms using single-use reply blocks as a primitive. Our design integrates link encryption between remailers to provide forward anonymity. Mixminion works in a real-world Internet environment, requires little synchronization or coordination between nodes, and protects against known anonymity-breaking attacks as well as or better than other systems with similar design parameters. 1. Overview Chaum first introduced anonymous remailers over 20 years ago [7]}, 11811 abstract = {We present Mixminion, a message-based anonymous remailer protocol with secure single-use reply blocks. Mix nodes cannot distinguish Mixminion forward messages from reply messages, so forward and reply messages share the same anonymity set. We add directory servers that allow users to learn public keys and performance statistics of participating remailers, and we describe nymservers that provide long-term pseudonyms using single-use reply blocks as a primitive. Our design integrates link encryption between remailers to provide forward anonymity. Mixminion works in a real-world Internet environment, requires little synchronization or coordination between nodes, and protects against known anonymity-breaking attacks as well as or better than other systems with similar design parameters. 1. Overview Chaum first introduced anonymous remailers over 20 years ago [7]},
11812 url = { http://mixminion.net/minion-design.pdf}, 11812 url = { http://mixminion.net/minion-design.pdf},
11813 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/minion-design.pdf}, 11813 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/minion-design.pdf},
11814 author = {George Danezis and Roger Dingledine and Nick Mathewson} 11814 author = {George Danezis and Roger Dingledine and Nick Mathewson}
11815} 11815}
11816@conference {danezis:pet2003, 11816@conference {danezis:pet2003,
@@ -11824,7 +11824,7 @@ cryptography to hide the correlation between its inputs and outputs. Sending mes
11824 abstract = {We present a mix network topology that is based on sparse expander graphs, with each mix only communicating with a few neighbouring others. We analyse the anonymity such networks provide, and compare it with fully connected mix networks and mix cascades. We prove that such a topology is e$\#$cient since it only requires the route length of messages to be relatively small in comparison with the number of mixes to achieve maximal anonymity. Additionally mixes can resist intersection attacks while their batch size, that is directly linked to the latency of the network, remains constant. A worked example of a network is also presented to illustrate how these results can be applied to create secure mix networks in practise}, 11824 abstract = {We present a mix network topology that is based on sparse expander graphs, with each mix only communicating with a few neighbouring others. We analyse the anonymity such networks provide, and compare it with fully connected mix networks and mix cascades. We prove that such a topology is e$\#$cient since it only requires the route length of messages to be relatively small in comparison with the number of mixes to achieve maximal anonymity. Additionally mixes can resist intersection attacks while their batch size, that is directly linked to the latency of the network, remains constant. A worked example of a network is also presented to illustrate how these results can be applied to create secure mix networks in practise},
11825 www_section = {anonymity, mix cascades, traffic analysis}, 11825 www_section = {anonymity, mix cascades, traffic analysis},
11826 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.1188}, 11826 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.6.1188},
11827 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/danezis-pet2003.pdf}, 11827 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/danezis-pet2003.pdf},
11828 author = {George Danezis}, 11828 author = {George Danezis},
11829 editor = {Roger Dingledine} 11829 editor = {Roger Dingledine}
11830} 11830}
@@ -11841,7 +11841,7 @@ cryptography to hide the correlation between its inputs and outputs. Sending mes
11841 isbn = {978-3-540-20610-1}, 11841 isbn = {978-3-540-20610-1},
11842 doi = {10.1007/b94512}, 11842 doi = {10.1007/b94512},
11843 url = {http://www.springerlink.com/content/dxteg659uf2jtdd7/}, 11843 url = {http://www.springerlink.com/content/dxteg659uf2jtdd7/},
11844 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/steinbrecher-pet2003.pdf}, 11844 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/steinbrecher-pet2003.pdf},
11845 author = {Sandra Steinbrecher and Stefan K{\"o}psell}, 11845 author = {Sandra Steinbrecher and Stefan K{\"o}psell},
11846 editor = {Roger Dingledine} 11846 editor = {Roger Dingledine}
11847} 11847}
@@ -11858,7 +11858,7 @@ cryptography to hide the correlation between its inputs and outputs. Sending mes
11858 isbn = {1-58113-707-9}, 11858 isbn = {1-58113-707-9},
11859 doi = {10.1145/958491.958500}, 11859 doi = {10.1145/958491.958500},
11860 url = {http://doi.acm.org/10.1145/958491.958500}, 11860 url = {http://doi.acm.org/10.1145/958491.958500},
11861 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/eScholarship\%20UC\%20item\%204x6723n2.pdf}, 11861 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/eScholarship\%20UC\%20item\%204x6723n2.pdf},
11862 author = {Li, Xin and Kim, Young Jin and Govindan, Ramesh and Hong, Wei} 11862 author = {Li, Xin and Kim, Young Jin and Govindan, Ramesh and Hong, Wei}
11863} 11863}
11864@conference {Conrad03multiplelanguage, 11864@conference {Conrad03multiplelanguage,
@@ -11870,7 +11870,7 @@ cryptography to hide the correlation between its inputs and outputs. Sending mes
11870 isbn = {978-3-540-21250-8}, 11870 isbn = {978-3-540-21250-8},
11871 doi = {10.1007/b96396}, 11871 doi = {10.1007/b96396},
11872 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.3301}, 11872 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.68.3301},
11873 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/scholler03language.pdf}, 11873 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/scholler03language.pdf},
11874 author = {Michael Conrad and Marcus Schoeller and Thomas Fuhrmann and Gerhard Bocksch and Martina Zitterbart} 11874 author = {Michael Conrad and Marcus Schoeller and Thomas Fuhrmann and Gerhard Bocksch and Martina Zitterbart}
11875} 11875}
11876@conference {Gay03thenesc, 11876@conference {Gay03thenesc,
@@ -11882,7 +11882,7 @@ cryptography to hide the correlation between its inputs and outputs. Sending mes
11882 www_section = {data races, nesC, TinyOS}, 11882 www_section = {data races, nesC, TinyOS},
11883 doi = {10.1145/781131.781133}, 11883 doi = {10.1145/781131.781133},
11884 url = {http://portal.acm.org/citation.cfm?id=781133}, 11884 url = {http://portal.acm.org/citation.cfm?id=781133},
11885 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.127.9488.pdf}, 11885 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.127.9488.pdf},
11886 author = {David Gay and Matt Welsh and Philip Levis and Eric Brewer and Robert Von Behren and Culler, David} 11886 author = {David Gay and Matt Welsh and Philip Levis and Eric Brewer and Robert Von Behren and Culler, David}
11887} 11887}
11888@booklet {Fuhrmann_networkservices, 11888@booklet {Fuhrmann_networkservices,
@@ -11890,7 +11890,7 @@ cryptography to hide the correlation between its inputs and outputs. Sending mes
11890 year = {2003}, 11890 year = {2003},
11891 abstract = {Visions of future computing scenarios envisage a multitude of very-low-resource devices linked by power-efficient wireless communication means. This paper presents our vision of such a scenario. From this vision requirements are derived for an infrastructure that is able to satisfy the largely differing needs of these devices. The paper also shows how innovative, collaborating applications between distributed sensors and actuators can arise from such an infrastructure. The realization of such innovative applications is illustrated with two examples of straightforward services that have been implemented with the AMnet infrastructure that is currently being developed in the FlexiNet project. Additionally, first performance measurements for one of these services are given. Index terms {\textemdash} Bluetooth, Programmable networks, Sensoractuator networks}, 11891 abstract = {Visions of future computing scenarios envisage a multitude of very-low-resource devices linked by power-efficient wireless communication means. This paper presents our vision of such a scenario. From this vision requirements are derived for an infrastructure that is able to satisfy the largely differing needs of these devices. The paper also shows how innovative, collaborating applications between distributed sensors and actuators can arise from such an infrastructure. The realization of such innovative applications is illustrated with two examples of straightforward services that have been implemented with the AMnet infrastructure that is currently being developed in the FlexiNet project. Additionally, first performance measurements for one of these services are given. Index terms {\textemdash} Bluetooth, Programmable networks, Sensoractuator networks},
11892 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.186}, 11892 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.186},
11893 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ASWN2003.pdf}, 11893 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ASWN2003.pdf},
11894 author = {Thomas Fuhrmann and Till Harbaum and Martina Zitterbart} 11894 author = {Thomas Fuhrmann and Till Harbaum and Martina Zitterbart}
11895} 11895}
11896@conference {Bauer03newcovert, 11896@conference {Bauer03newcovert,
@@ -11917,7 +11917,7 @@ cryptography to hide the correlation between its inputs and outputs. Sending mes
11917 isbn = {1-58113-776-1}, 11917 isbn = {1-58113-776-1},
11918 doi = {10.1145/1005140.1005152}, 11918 doi = {10.1145/1005140.1005152},
11919 url = {http://portal.acm.org/citation.cfm?id=1005152}, 11919 url = {http://portal.acm.org/citation.cfm?id=1005152},
11920 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.4.6246.pdf}, 11920 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.4.6246.pdf},
11921 author = {Matthias Bauer} 11921 author = {Matthias Bauer}
11922} 11922}
11923@booklet {Klinedinst_anew, 11923@booklet {Klinedinst_anew,
@@ -11931,7 +11931,7 @@ cryptography to hide the correlation between its inputs and outputs. Sending mes
11931 year = {2003}, 11931 year = {2003},
11932 abstract = {AMnet is a programmable network that aims at the flexible and rapid creation of services within an IP network. Examples for typical services include network layer enhancements e.g. for multicast and mobility, transport layer enhancements e.g. to integrate wireless LANs, and various application layer services e.g. for media transcoding and content distribution. AMnet is based on regular Linux boxes that run an execution environment (EE), a resource monitor, and a basic signaling-engine. These so-called active nodes run the services and provide support for resource-management and module-relocation. Services are created by service modules, small pieces of code, that are executed within the EE. Based on the standard netfilter mechanism of Linux, service modules have full access to the network traffic passing through the active node. This paper describes the evaluation mechanism for service setup in AMnet. In order to determine where a service module can be started, service modules are accompanied by evaluation modules. This allows service module authors to implement various customized strategies for node-selection and service setup. Examples that are supported by the AMnet evaluation mechanism are a) service setup at a fixed position, e.g. as gateway, b) along a fixed path (with variable position along that path), c) at variable positions inside the network with preferences for certain constellations, or d) at an unspecified position, e.g. for modification of multicasted traffic. The required path information is gathered by the AMnodes present in the network. By interaction with the resource monitors of the AMnodes and the service module repository of the respective administrative domain, the AMnet evaluation also ensures overall system security and stability}, 11932 abstract = {AMnet is a programmable network that aims at the flexible and rapid creation of services within an IP network. Examples for typical services include network layer enhancements e.g. for multicast and mobility, transport layer enhancements e.g. to integrate wireless LANs, and various application layer services e.g. for media transcoding and content distribution. AMnet is based on regular Linux boxes that run an execution environment (EE), a resource monitor, and a basic signaling-engine. These so-called active nodes run the services and provide support for resource-management and module-relocation. Services are created by service modules, small pieces of code, that are executed within the EE. Based on the standard netfilter mechanism of Linux, service modules have full access to the network traffic passing through the active node. This paper describes the evaluation mechanism for service setup in AMnet. In order to determine where a service module can be started, service modules are accompanied by evaluation modules. This allows service module authors to implement various customized strategies for node-selection and service setup. Examples that are supported by the AMnet evaluation mechanism are a) service setup at a fixed position, e.g. as gateway, b) along a fixed path (with variable position along that path), c) at variable positions inside the network with preferences for certain constellations, or d) at an unspecified position, e.g. for modification of multicasted traffic. The required path information is gathered by the AMnodes present in the network. By interaction with the resource monitors of the AMnodes and the service module repository of the respective administrative domain, the AMnet evaluation also ensures overall system security and stability},
11933 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.8749}, 11933 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.69.8749},
11934 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fuhrmann03evaluation.pdf}, 11934 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fuhrmann03evaluation.pdf},
11935 author = {Thomas Fuhrmann and Marcus Schoeller and Christina Schmidt and Martina Zitterbart} 11935 author = {Thomas Fuhrmann and Marcus Schoeller and Christina Schmidt and Martina Zitterbart}
11936} 11936}
11937@conference {Tolia03opportunisticuse, 11937@conference {Tolia03opportunisticuse,
@@ -11942,7 +11942,7 @@ cryptography to hide the correlation between its inputs and outputs. Sending mes
11942 abstract = {Motivated by the prospect of readily available Content Addressable Storage (CAS), we introduce the concept of file recipes. A file's recipe is a first-class file system object listing content hashes that describe the data blocks composing the file. File recipes provide applications with instructions for reconstructing the original file from available CAS data blocks. We describe one such application of recipes, the CASPER distributed file system. A CASPER client opportunistically fetches blocks from nearby CAS providers to improve its performance when the connection to a file server traverses a low-bandwidth path. We use measurements of our prototype to evaluate its performance under varying network conditions. Our results demonstrate significant improvements in execution times of applications that use a network file system. We conclude by describing fuzzy block matching, a promising technique for using approximately matching blocks on CAS providers to reconstitute the exact desired contents of a file at a client}, 11942 abstract = {Motivated by the prospect of readily available Content Addressable Storage (CAS), we introduce the concept of file recipes. A file's recipe is a first-class file system object listing content hashes that describe the data blocks composing the file. File recipes provide applications with instructions for reconstructing the original file from available CAS data blocks. We describe one such application of recipes, the CASPER distributed file system. A CASPER client opportunistically fetches blocks from nearby CAS providers to improve its performance when the connection to a file server traverses a low-bandwidth path. We use measurements of our prototype to evaluate its performance under varying network conditions. Our results demonstrate significant improvements in execution times of applications that use a network file system. We conclude by describing fuzzy block matching, a promising technique for using approximately matching blocks on CAS providers to reconstitute the exact desired contents of a file at a client},
11943 www_section = {file systems, storage}, 11943 www_section = {file systems, storage},
11944 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.740}, 11944 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.740},
11945 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/casper-usenix2003.pdf}, 11945 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/casper-usenix2003.pdf},
11946 author = {Niraj Tolia and Michael Kozuch and Satyanarayanan, Mahadev and Brad Karp and Thomas Bressoud and Adrian Perrig} 11946 author = {Niraj Tolia and Michael Kozuch and Satyanarayanan, Mahadev and Brad Karp and Thomas Bressoud and Adrian Perrig}
11947} 11947}
11948@conference {792493, 11948@conference {792493,
@@ -11957,7 +11957,7 @@ cryptography to hide the correlation between its inputs and outputs. Sending mes
11957 www_section = {overlay networks, P2P, SRS}, 11957 www_section = {overlay networks, P2P, SRS},
11958 isbn = {0-7695-1919-9}, 11958 isbn = {0-7695-1919-9},
11959 url = {http://portal.acm.org/citation.cfm?id=792493$\#$}, 11959 url = {http://portal.acm.org/citation.cfm?id=792493$\#$},
11960 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fuhrmann03overlaySRS.pdf}, 11960 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fuhrmann03overlaySRS.pdf},
11961 author = {Thomas Fuhrmann and Andrea Schafferhans and Etzold, Thure} 11961 author = {Thomas Fuhrmann and Andrea Schafferhans and Etzold, Thure}
11962} 11962}
11963@conference {SS03, 11963@conference {SS03,
@@ -11973,7 +11973,7 @@ We analyse the anonymity of connection-based systems against passive adversaries
11973 isbn = {978-3-540-20300-1}, 11973 isbn = {978-3-540-20300-1},
11974 doi = {10.1007/b13237}, 11974 doi = {10.1007/b13237},
11975 url = {http://www.springerlink.com/content/8jva7vy8tkert9ur/}, 11975 url = {http://www.springerlink.com/content/8jva7vy8tkert9ur/},
11976 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.5.2005.pdf}, 11976 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.5.2005.pdf},
11977 author = {Andrei Serjantov and Peter Sewell} 11977 author = {Andrei Serjantov and Peter Sewell}
11978} 11978}
11979@booklet {Loo03peer-to-peerbackup, 11979@booklet {Loo03peer-to-peerbackup,
@@ -11982,7 +11982,7 @@ We analyse the anonymity of connection-based systems against passive adversaries
11982 abstract = {FlashBack is a peer-to-peer backup algorithm designed for powerconstrained devices running in a personal area network (PAN). Backups are performed transparently as local updates initiate the spread of backup data among a subset of the currently available peers. Flashback limits power usage by avoiding flooding and keeping small neighbor sets. Flashback has also been designed to utilize powered infrastructure when possible to further extend device lifetime. We propose our architecture and algorithms, and present initial experimental results that illustrate FlashBack's performance characteristics}, 11982 abstract = {FlashBack is a peer-to-peer backup algorithm designed for powerconstrained devices running in a personal area network (PAN). Backups are performed transparently as local updates initiate the spread of backup data among a subset of the currently available peers. Flashback limits power usage by avoiding flooding and keeping small neighbor sets. Flashback has also been designed to utilize powered infrastructure when possible to further extend device lifetime. We propose our architecture and algorithms, and present initial experimental results that illustrate FlashBack's performance characteristics},
11983 www_section = {backup, P2P, personal area network}, 11983 www_section = {backup, P2P, personal area network},
11984 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.7820}, 11984 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.9.7820},
11985 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/052820031647_102.pdf}, 11985 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/052820031647_102.pdf},
11986 author = {Boon Thau Loo and Anthony LaMarca and Gaetano Borriello and Boon Thau Loo} 11986 author = {Boon Thau Loo and Anthony LaMarca and Gaetano Borriello and Boon Thau Loo}
11987} 11987}
11988@booklet {Aberer03p-grid:a, 11988@booklet {Aberer03p-grid:a,
@@ -11991,7 +11991,7 @@ We analyse the anonymity of connection-based systems against passive adversaries
11991 abstract = {this paper was supported in part by the National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center supported by the Swiss National Science Foundation under grant number 5005-67322 and by SNSF grant 2100064994, "Peer-to-Peer Information Systems." messages. From the responses it (randomly) selects certain peers to which direct network links are established}, 11991 abstract = {this paper was supported in part by the National Competence Center in Research on Mobile Information and Communication Systems (NCCR-MICS), a center supported by the Swiss National Science Foundation under grant number 5005-67322 and by SNSF grant 2100064994, "Peer-to-Peer Information Systems." messages. From the responses it (randomly) selects certain peers to which direct network links are established},
11992 www_section = {P2P}, 11992 www_section = {P2P},
11993 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.5649}, 11993 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.5649},
11994 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.3.5649.pdf}, 11994 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.3.5649.pdf},
11995 author = {Karl Aberer and Philippe Cudre-Mauroux and Anwitaman Datta and Zoran Despotovic and Manfred Hauswirth and Magdalena Punceva and Roman Schmidt} 11995 author = {Karl Aberer and Philippe Cudre-Mauroux and Anwitaman Datta and Zoran Despotovic and Manfred Hauswirth and Magdalena Punceva and Roman Schmidt}
11996} 11996}
11997@conference {Cuenca-Acuna03planetp:using, 11997@conference {Cuenca-Acuna03planetp:using,
@@ -12003,7 +12003,7 @@ We analyse the anonymity of connection-based systems against passive adversaries
12003 address = {Seattle, Washington}, 12003 address = {Seattle, Washington},
12004 abstract = {PlanetP is a peer-to-peer system in which searching content is done mostly locally. Every peer knows which content is available at which other peers. The index information is represented compactly using bloom filters and distributed throughout the network using push and pull mechanisms }, 12004 abstract = {PlanetP is a peer-to-peer system in which searching content is done mostly locally. Every peer knows which content is available at which other peers. The index information is represented compactly using bloom filters and distributed throughout the network using push and pull mechanisms },
12005 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.14.6056\&rep=rep1\&type=url\&i=0}, 12005 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.14.6056\&rep=rep1\&type=url\&i=0},
12006 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/paper.dvi_.pdf}, 12006 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/paper.dvi_.pdf},
12007 author = {Francisco Matias Cuenca-Acuna and Christopher Peery and Richard P. Martin and Thu D. Nguyen} 12007 author = {Francisco Matias Cuenca-Acuna and Christopher Peery and Richard P. Martin and Thu D. Nguyen}
12008} 12008}
12009@conference {DBLP:conf/ccs/YangG03, 12009@conference {DBLP:conf/ccs/YangG03,
@@ -12018,7 +12018,7 @@ We analyse the anonymity of connection-based systems against passive adversaries
12018 www_section = {economics, payment}, 12018 www_section = {economics, payment},
12019 isbn = {1-58113-738-9 }, 12019 isbn = {1-58113-738-9 },
12020 doi = {http://dx.doi.org/10.1145/948109.948150}, 12020 doi = {http://dx.doi.org/10.1145/948109.948150},
12021 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CCS\%2703\%20-\%20Yang\%20\%26\%20Garcia-Molina\%20-\%20PPay.pdf}, 12021 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CCS\%2703\%20-\%20Yang\%20\%26\%20Garcia-Molina\%20-\%20PPay.pdf},
12022 author = {Beverly Yang and Hector Garcia-Molina} 12022 author = {Beverly Yang and Hector Garcia-Molina}
12023} 12023}
12024@conference {RP03-1, 12024@conference {RP03-1,
@@ -12033,7 +12033,7 @@ We analyse the anonymity of connection-based systems against passive adversaries
12033 www_section = {performance}, 12033 www_section = {performance},
12034 isbn = {0-7695-1963-6}, 12034 isbn = {0-7695-1963-6},
12035 url = {http://portal.acm.org/citation.cfm?id=938984.939808}, 12035 url = {http://portal.acm.org/citation.cfm?id=938984.939808},
12036 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/RP03-1.pdf}, 12036 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/RP03-1.pdf},
12037 author = {Marc Rennhard and Bernhard Plattner} 12037 author = {Marc Rennhard and Bernhard Plattner}
12038} 12038}
12039@booklet {pt:03:ldpc, 12039@booklet {pt:03:ldpc,
@@ -12045,7 +12045,7 @@ We analyse the anonymity of connection-based systems against passive adversaries
12045 abstract = {This paper has been submitted for publication. Please see the above URL for current publication status. As peer-to-peer and widely distributed storage systems proliferate, the need to perform efficient erasure coding, instead of replication, is crucial to performance and efficiency. Low-Density Parity-Check (LDPC) codes have arisen as alternatives to standard erasure codes, such as Reed-Solomon codes, trading off vastly improved decoding performance for inefficiencies in the amount of data that must be acquired to perform decoding. The scores of papers written on LDPC codes typically analyze their collective and asymptotic behavior. Unfortunately, their practical application requires the generation and analysis of individual codes for finite systems. This paper attempts to illuminate the practical considerations of LDPC codes for peer-to-peer and distributed storage systems. The three main types of LDPC codes are detailed, and a huge variety of codes are generated, then analyzed using simulation. This analysis focuses on the performance of individual codes for finite systems, and addresses several important heretofore unanswered questions about employing LDPC codes in real-world systems. This material is based upon work supported by the National}, 12045 abstract = {This paper has been submitted for publication. Please see the above URL for current publication status. As peer-to-peer and widely distributed storage systems proliferate, the need to perform efficient erasure coding, instead of replication, is crucial to performance and efficiency. Low-Density Parity-Check (LDPC) codes have arisen as alternatives to standard erasure codes, such as Reed-Solomon codes, trading off vastly improved decoding performance for inefficiencies in the amount of data that must be acquired to perform decoding. The scores of papers written on LDPC codes typically analyze their collective and asymptotic behavior. Unfortunately, their practical application requires the generation and analysis of individual codes for finite systems. This paper attempts to illuminate the practical considerations of LDPC codes for peer-to-peer and distributed storage systems. The three main types of LDPC codes are detailed, and a huge variety of codes are generated, then analyzed using simulation. This analysis focuses on the performance of individual codes for finite systems, and addresses several important heretofore unanswered questions about employing LDPC codes in real-world systems. This material is based upon work supported by the National},
12046 www_section = {distributed hash table, distributed storage, LDPC, P2P}, 12046 www_section = {distributed hash table, distributed storage, LDPC, P2P},
12047 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.5709}, 12047 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.131.5709},
12048 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ut-cs-03-510.pdf}, 12048 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ut-cs-03-510.pdf},
12049 author = {James S. Plank and Michael G. Thomason} 12049 author = {James S. Plank and Michael G. Thomason}
12050} 12050}
12051@conference {camenisch2003pve, 12051@conference {camenisch2003pve,
@@ -12060,7 +12060,7 @@ We analyse the anonymity of connection-based systems against passive adversaries
12060 isbn = {978-3-540-40674-7}, 12060 isbn = {978-3-540-40674-7},
12061 doi = {10.1007/b11817}, 12061 doi = {10.1007/b11817},
12062 url = {http://www.springerlink.com/content/wjbh5579hdfd66ed/}, 12062 url = {http://www.springerlink.com/content/wjbh5579hdfd66ed/},
12063 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/camenisch2003pve.pdf}, 12063 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/camenisch2003pve.pdf},
12064 author = {Jan Camenisch and Victor Shoup} 12064 author = {Jan Camenisch and Victor Shoup}
12065} 12065}
12066@conference {agrawal03, 12066@conference {agrawal03,
@@ -12075,7 +12075,7 @@ We analyse the anonymity of connection-based systems against passive adversaries
12075 www_section = {anonymity measurement, mix, traffic analysis}, 12075 www_section = {anonymity measurement, mix, traffic analysis},
12076 isbn = {0-7695-1940-7}, 12076 isbn = {0-7695-1940-7},
12077 url = {http://portal.acm.org/citation.cfm?id=829515.830557}, 12077 url = {http://portal.acm.org/citation.cfm?id=829515.830557},
12078 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/agrawal03.pdf}, 12078 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/agrawal03.pdf},
12079 author = {Dakshi Agrawal and Dogan Kesdogan and Stefan Penz} 12079 author = {Dakshi Agrawal and Dogan Kesdogan and Stefan Penz}
12080} 12080}
12081@conference {BM:mixencrypt, 12081@conference {BM:mixencrypt,
@@ -12089,7 +12089,7 @@ We analyse the anonymity of connection-based systems against passive adversaries
12089for such length-preserving mixes, but it is not secure against active attacks. We show how to build practical cryptographically secure lengthpreserving mixes. The conventional de nition of security against chosen ciphertext attacks is not applicable to length-preserving mixes; we give an appropriate de nition and show that our construction achieves provable security}, 12089for such length-preserving mixes, but it is not secure against active attacks. We show how to build practical cryptographically secure lengthpreserving mixes. The conventional de nition of security against chosen ciphertext attacks is not applicable to length-preserving mixes; we give an appropriate de nition and show that our construction achieves provable security},
12090 www_section = {mix chain, public key cryptography}, 12090 www_section = {mix chain, public key cryptography},
12091 url = {http://eprints.kfupm.edu.sa/59837/}, 12091 url = {http://eprints.kfupm.edu.sa/59837/},
12092 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/BM-mixencrypt.pdf}, 12092 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/BM-mixencrypt.pdf},
12093 author = {Bodo M{\"o}ller} 12093 author = {Bodo M{\"o}ller}
12094} 12094}
12095@conference {Serjantov03puzzlesin, 12095@conference {Serjantov03puzzlesin,
@@ -12102,7 +12102,7 @@ for such length-preserving mixes, but it is not secure against active attacks. W
12102 address = {Ajaccio, Corsica}, 12102 address = {Ajaccio, Corsica},
12103 abstract = {In this paper we consider using client puzzles to provide incentives for users in a peer-to-peer system to behave in a uniform way. The techniques developed can be used to encourage users of a system to share content (combating the free riding problem) or perform {\textquoteleft}community' tasks}, 12103 abstract = {In this paper we consider using client puzzles to provide incentives for users in a peer-to-peer system to behave in a uniform way. The techniques developed can be used to encourage users of a system to share content (combating the free riding problem) or perform {\textquoteleft}community' tasks},
12104 www_section = {p2p network, puzzle}, 12104 www_section = {p2p network, puzzle},
12105 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CaberNet\%20Radicals\%20Workshop\%20-\%20Puzzles\%20in\%20P2P\%20Systems.pdf}, 12105 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CaberNet\%20Radicals\%20Workshop\%20-\%20Puzzles\%20in\%20P2P\%20Systems.pdf},
12106 author = {Andrei Serjantov and Stephen Lewis} 12106 author = {Andrei Serjantov and Stephen Lewis}
12107} 12107}
12108@conference {Feldman03quantifyingdisincentives, 12108@conference {Feldman03quantifyingdisincentives,
@@ -12113,7 +12113,7 @@ for such length-preserving mixes, but it is not secure against active attacks. W
12113 address = {Berkeley, CA}, 12113 address = {Berkeley, CA},
12114 abstract = {In this paper, we use modeling and simulation to better understand the effects of cooperation on user performance and to quantify the performance-based disincentives in a peer-to-peer file sharing system. This is the first step towards building an incentive system. For the models developed in this paper, we have the following results: Although performance improves significantly when cooperation increases from low to moderate levels, the improvement diminishes thereafter. In particular, the mean delay to download a file when 5\% of the nodes share files is 8x more than when 40\% of the nodes share files, while the mean download delay when 40\% of the nodes share is only 1.75x more than when 100\% share}, 12114 abstract = {In this paper, we use modeling and simulation to better understand the effects of cooperation on user performance and to quantify the performance-based disincentives in a peer-to-peer file sharing system. This is the first step towards building an incentive system. For the models developed in this paper, we have the following results: Although performance improves significantly when cooperation increases from low to moderate levels, the improvement diminishes thereafter. In particular, the mean delay to download a file when 5\% of the nodes share files is 8x more than when 40\% of the nodes share files, while the mean download delay when 40\% of the nodes share is only 1.75x more than when 100\% share},
12115 www_section = {incentives, peer-to-peer networking}, 12115 www_section = {incentives, peer-to-peer networking},
12116 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Feldman\%2C\%20Lai\%2C\%20Chuang\%20\%26\%20Stoica\%20-\%20Quantifying\%20disincentives\%20in\%20peer-to-peer\%20networks.pdf}, 12116 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Feldman\%2C\%20Lai\%2C\%20Chuang\%20\%26\%20Stoica\%20-\%20Quantifying\%20disincentives\%20in\%20peer-to-peer\%20networks.pdf},
12117 author = {Michal Feldman and Kevin Lai and John Chuang and Ion Stoica} 12117 author = {Michal Feldman and Kevin Lai and John Chuang and Ion Stoica}
12118} 12118}
12119@conference {Huebsch:2003:QIP:1315451.1315480, 12119@conference {Huebsch:2003:QIP:1315451.1315480,
@@ -12127,7 +12127,7 @@ for such length-preserving mixes, but it is not secure against active attacks. W
12127 www_section = {distributed hash table, PIER, range queries}, 12127 www_section = {distributed hash table, PIER, range queries},
12128 isbn = {0-12-722442-4}, 12128 isbn = {0-12-722442-4},
12129 url = {http://dl.acm.org/citation.cfm?id=1315451.1315480}, 12129 url = {http://dl.acm.org/citation.cfm?id=1315451.1315480},
12130 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/vldb03-pier.pdf}, 12130 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/vldb03-pier.pdf},
12131 author = {Huebsch, Ryan and Hellerstein, Joseph M. and Lanham, Nick and Boon Thau Loo and S Shenker and Ion Stoica} 12131 author = {Huebsch, Ryan and Hellerstein, Joseph M. and Lanham, Nick and Boon Thau Loo and S Shenker and Ion Stoica}
12132} 12132}
12133@booklet {RatnasamyHellersteinShenker2003RangeQueries, 12133@booklet {RatnasamyHellersteinShenker2003RangeQueries,
@@ -12152,7 +12152,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12152 isbn = {978-3-540-20300-1}, 12152 isbn = {978-3-540-20300-1},
12153 doi = {10.1007/b13237}, 12153 doi = {10.1007/b13237},
12154 url = {http://www.springerlink.com/content/5gmj68nn4x1xc4j1/}, 12154 url = {http://www.springerlink.com/content/5gmj68nn4x1xc4j1/},
12155 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/GKK03.pdf}, 12155 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/GKK03.pdf},
12156 author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski} 12156 author = {Marcin Gomulkiewicz and Marek Klonowski and Miroslaw Kutylowski}
12157} 12157}
12158@conference { maymounkov:rateless, 12158@conference { maymounkov:rateless,
@@ -12169,7 +12169,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12169 abstract = {This paper presents a novel algorithm for downloading big files from multiple sources in peer-to-peer networks. The algorithm is simple, but offers several compelling properties. It ensures low hand-shaking overhead between peers that download files (or parts of files) from each other. It is computationally efficient, with cost linear in the amount of data transfered. Most importantly, when nodes leave the network in the middle of uploads, the algorithm minimizes the duplicate information shared by nodes with truncated downloads. Thus, any two peers with partial knowledge of a given file can almost always fully benefit from each other's knowledge. Our algorithm is made possible by the recent introduction of linear-time, rateless erasure codes}, 12169 abstract = {This paper presents a novel algorithm for downloading big files from multiple sources in peer-to-peer networks. The algorithm is simple, but offers several compelling properties. It ensures low hand-shaking overhead between peers that download files (or parts of files) from each other. It is computationally efficient, with cost linear in the amount of data transfered. Most importantly, when nodes leave the network in the middle of uploads, the algorithm minimizes the duplicate information shared by nodes with truncated downloads. Thus, any two peers with partial knowledge of a given file can almost always fully benefit from each other's knowledge. Our algorithm is made possible by the recent introduction of linear-time, rateless erasure codes},
12170 www_section = {algorithms, big files, download, multiple sources, rateless code}, 12170 www_section = {algorithms, big files, download, multiple sources, rateless code},
12171 doi = {10.1007/978-3-540-45172-3_23}, 12171 doi = {10.1007/978-3-540-45172-3_23},
12172 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IPTPS\%2703\%20-\%20Rateless\%20codes\%20and\%20big\%20downloads.pdf}, 12172 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IPTPS\%2703\%20-\%20Rateless\%20codes\%20and\%20big\%20downloads.pdf},
12173 author = {Petar Maymounkov and David Mazi{\`e}res} 12173 author = {Petar Maymounkov and David Mazi{\`e}res}
12174} 12174}
12175@conference {incomparable-pkeys, 12175@conference {incomparable-pkeys,
@@ -12185,7 +12185,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12185 isbn = {1-58113-738-9}, 12185 isbn = {1-58113-738-9},
12186 doi = {10.1145/948109.948127}, 12186 doi = {10.1145/948109.948127},
12187 url = {http://portal.acm.org/citation.cfm?id=948127}, 12187 url = {http://portal.acm.org/citation.cfm?id=948127},
12188 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/incomparable-pkeys.pdf}, 12188 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/incomparable-pkeys.pdf},
12189 author = {Waters, Brent and Edward W. Felten and Amit Sahai}, 12189 author = {Waters, Brent and Edward W. Felten and Amit Sahai},
12190 editor = {Vijay Atluri and Peng Liu} 12190 editor = {Vijay Atluri and Peng Liu}
12191} 12191}
@@ -12197,7 +12197,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12197 abstract = {Decentralized anonymity systems tend to be unreliable, because users must choose nodes in the network without knowing the entire state of the network. Reputation systems promise to improve reliability by predicting network state. In this paper we focus on anonymous remailers and anonymous publishing, explain why the systems can benefit from reputation, and describe our experiences designing reputation systems for them while still ensuring anonymity. We find that in each example we first must redesign the underlying anonymity system to support verifiable transactions}, 12197 abstract = {Decentralized anonymity systems tend to be unreliable, because users must choose nodes in the network without knowing the entire state of the network. Reputation systems promise to improve reliability by predicting network state. In this paper we focus on anonymous remailers and anonymous publishing, explain why the systems can benefit from reputation, and describe our experiences designing reputation systems for them while still ensuring anonymity. We find that in each example we first must redesign the underlying anonymity system to support verifiable transactions},
12198 www_section = {anonymity, anonymous publishing, remailer, reputation}, 12198 www_section = {anonymity, anonymous publishing, remailer, reputation},
12199 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.4740}, 12199 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.4740},
12200 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/rep-anon.pdf}, 12200 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/rep-anon.pdf},
12201 author = {Roger Dingledine and Nick Mathewson and Paul Syverson} 12201 author = {Roger Dingledine and Nick Mathewson and Paul Syverson}
12202} 12202}
12203@conference {Dingledine03reputationin, 12203@conference {Dingledine03reputationin,
@@ -12207,7 +12207,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12207 abstract = {Decentralized anonymity systems tend to be unreliable, because users must choose nodes in the network without knowing the entire state of the network. Reputation systems promise to improve reliability by predicting network state. In this paper we focus on anonymous remailers and anonymous publishing, explain why the systems can benefit from reputation, and describe our experiences designing reputation systems for them while still ensuring anonymity. We find that in each example we first must redesign the underlying anonymity system to support verifiable transactions}, 12207 abstract = {Decentralized anonymity systems tend to be unreliable, because users must choose nodes in the network without knowing the entire state of the network. Reputation systems promise to improve reliability by predicting network state. In this paper we focus on anonymous remailers and anonymous publishing, explain why the systems can benefit from reputation, and describe our experiences designing reputation systems for them while still ensuring anonymity. We find that in each example we first must redesign the underlying anonymity system to support verifiable transactions},
12208 www_section = {anonymity, P2P, redundancy, remailer}, 12208 www_section = {anonymity, P2P, redundancy, remailer},
12209 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.4740}, 12209 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.14.4740},
12210 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.14.4740.pdf}, 12210 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.14.4740.pdf},
12211 author = {Roger Dingledine and Nick Mathewson and Paul Syverson} 12211 author = {Roger Dingledine and Nick Mathewson and Paul Syverson}
12212} 12212}
12213@conference {Padmanabhan:2003:RPS:951950.952204, 12213@conference {Padmanabhan:2003:RPS:951950.952204,
@@ -12224,7 +12224,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12224 www_section = {distribution trees, mdc, media content, multiple description coding, peer-to-peer streaming}, 12224 www_section = {distribution trees, mdc, media content, multiple description coding, peer-to-peer streaming},
12225 isbn = {0-7695-2024-3}, 12225 isbn = {0-7695-2024-3},
12226 url = {http://dl.acm.org/citation.cfm?id=951950.952204}, 12226 url = {http://dl.acm.org/citation.cfm?id=951950.952204},
12227 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ICNP\%2703\%20-\%20Resilient\%20peer-to-peer\%20streaming.pdf}, 12227 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ICNP\%2703\%20-\%20Resilient\%20peer-to-peer\%20streaming.pdf},
12228 author = {Venkata N. Padmanabhan and Wang, Helen J. and Chou, Philip A.} 12228 author = {Venkata N. Padmanabhan and Wang, Helen J. and Chou, Philip A.}
12229} 12229}
12230@conference {Fuhrmann03resultson, 12230@conference {Fuhrmann03resultson,
@@ -12234,7 +12234,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12234 abstract = {Active and programmable networks have been subject to intensive and successful research activities during the last couple of years. Many ideas and concepts have been pursued. However, only a few prototype implementations that have been developed so far, can deal with different applications in a larger scale setting. Moreover, detailed performance analyses of such prototypes are greatly missing today. Therefore, this paper does not present yet another architecture for active and programmable networks. In contrast, it rather focuses on the performance evaluation of the so-called AMnet approach that has already been presented previously [1]. As such, the paper demonstrates that an operational high-performance programmable network system with AAA (authentication, authorization, and accounting) security functionality will in fact be feasible in the near future}, 12234 abstract = {Active and programmable networks have been subject to intensive and successful research activities during the last couple of years. Many ideas and concepts have been pursued. However, only a few prototype implementations that have been developed so far, can deal with different applications in a larger scale setting. Moreover, detailed performance analyses of such prototypes are greatly missing today. Therefore, this paper does not present yet another architecture for active and programmable networks. In contrast, it rather focuses on the performance evaluation of the so-called AMnet approach that has already been presented previously [1]. As such, the paper demonstrates that an operational high-performance programmable network system with AAA (authentication, authorization, and accounting) security functionality will in fact be feasible in the near future},
12235 www_section = {programmable networks}, 12235 www_section = {programmable networks},
12236 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.67.3074}, 12236 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.67.3074},
12237 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fuhrmann03performance.pdf}, 12237 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fuhrmann03performance.pdf},
12238 author = {Thomas Fuhrmann and Till Harbaum and Panos Kassianidis and Marcus Schoeller and Martina Zitterbart} 12238 author = {Thomas Fuhrmann and Till Harbaum and Panos Kassianidis and Marcus Schoeller and Martina Zitterbart}
12239} 12239}
12240@conference {reusable-channels:wpes2003, 12240@conference {reusable-channels:wpes2003,
@@ -12250,7 +12250,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12250 isbn = {1-58113-776-1}, 12250 isbn = {1-58113-776-1},
12251 doi = {10.1145/1005140.1005155}, 12251 doi = {10.1145/1005140.1005155},
12252 url = {http://portal.acm.org/citation.cfm?id=1005155}, 12252 url = {http://portal.acm.org/citation.cfm?id=1005155},
12253 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/reusable-channels-wpes2003.pdf}, 12253 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/reusable-channels-wpes2003.pdf},
12254 author = {Philippe Golle and Jakobsson, Markus} 12254 author = {Philippe Golle and Jakobsson, Markus}
12255} 12255}
12256@conference {2003_8, 12256@conference {2003_8,
@@ -12265,7 +12265,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12265 isbn = {1-58113-670-6}, 12265 isbn = {1-58113-670-6},
12266 doi = {10.1145/773153.773173}, 12266 doi = {10.1145/773153.773173},
12267 url = {http://doi.acm.org/10.1145/773153.773173}, 12267 url = {http://doi.acm.org/10.1145/773153.773173},
12268 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/RevelaingInformation2003Dinur.pdf}, 12268 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/RevelaingInformation2003Dinur.pdf},
12269 author = {Dinur, Irit and Nissim, Kobbi} 12269 author = {Dinur, Irit and Nissim, Kobbi}
12270} 12270}
12271@conference {Lpcox03samsara:honor, 12271@conference {Lpcox03samsara:honor,
@@ -12280,7 +12280,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12280 abstract = {Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement mechanism. Prior solutions to this problem require centralized infrastructure, constraints on data placement, or ongoing administrative costs. All of these run counter to the design philosophy of peer-to-peer systems. requiring trusted third parties, symmetric storage relationships, monetary payment, or certified identities. Each peer that requests storage of another must agree to hold a claim in return---a placeholder that accounts for available space. After an exchange, each partner checks the other to ensure faithfulness. Samsara punishes unresponsive nodes probabilistically. Because objects are replicated, nodes with transient failures are unlikely to suffer data loss, unlike those that are dishonest or chronically unavailable. Claim storage overhead can be reduced when necessary by forwarding among chains of nodes, and eliminated when cycles are created. Forwarding chains increase the risk of exposure to failure, but such risk is modest under reasonable assumptions of utilization and simultaneous, persistent failure}, 12280 abstract = {Peer-to-peer storage systems assume that their users consume resources in proportion to their contribution. Unfortunately, users are unlikely to do this without some enforcement mechanism. Prior solutions to this problem require centralized infrastructure, constraints on data placement, or ongoing administrative costs. All of these run counter to the design philosophy of peer-to-peer systems. requiring trusted third parties, symmetric storage relationships, monetary payment, or certified identities. Each peer that requests storage of another must agree to hold a claim in return---a placeholder that accounts for available space. After an exchange, each partner checks the other to ensure faithfulness. Samsara punishes unresponsive nodes probabilistically. Because objects are replicated, nodes with transient failures are unlikely to suffer data loss, unlike those that are dishonest or chronically unavailable. Claim storage overhead can be reduced when necessary by forwarding among chains of nodes, and eliminated when cycles are created. Forwarding chains increase the risk of exposure to failure, but such risk is modest under reasonable assumptions of utilization and simultaneous, persistent failure},
12281 www_section = {P2P, reputation}, 12281 www_section = {P2P, reputation},
12282 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.6734}, 12282 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.6734},
12283 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p135-cox.pdf}, 12283 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p135-cox.pdf},
12284 author = {Landon P. Cox and Brian D. Noble} 12284 author = {Landon P. Cox and Brian D. Noble}
12285} 12285}
12286@conference {2003_9, 12286@conference {2003_9,
@@ -12297,7 +12297,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12297 abstract = {We present an application-level implementation of anycast for highly dynamic groups. The implementation can handle group sizes varying from one to the whole Internet, and membership maintenance is efficient enough to allow members to join for the purpose of receiving a single message. Key to this efficiency is the use of a proximity-aware peer-to-peer overlay network for decentralized, lightweight group maintenance; nodes join the overlay once and can join and leave many groups many times to amortize the cost of maintaining the overlay. An anycast implementation with these properties provides a key building block for distributed applications. In particular, it enables management and location of dynamic resources in large scale peer-to-peer systems. We present several resource management applications that are enabled by our implementation}, 12297 abstract = {We present an application-level implementation of anycast for highly dynamic groups. The implementation can handle group sizes varying from one to the whole Internet, and membership maintenance is efficient enough to allow members to join for the purpose of receiving a single message. Key to this efficiency is the use of a proximity-aware peer-to-peer overlay network for decentralized, lightweight group maintenance; nodes join the overlay once and can join and leave many groups many times to amortize the cost of maintaining the overlay. An anycast implementation with these properties provides a key building block for distributed applications. In particular, it enables management and location of dynamic resources in large scale peer-to-peer systems. We present several resource management applications that are enabled by our implementation},
12298 www_section = {anycast, application-level, highly dynamic groups, peer-to-peer networking}, 12298 www_section = {anycast, application-level, highly dynamic groups, peer-to-peer networking},
12299 doi = {10.1007/978-3-540-39405-1_5}, 12299 doi = {10.1007/978-3-540-39405-1_5},
12300 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NGC\%2703\%20-\%20Scalable\%20Application-level\%20Anycast\%20.pdf}, 12300 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NGC\%2703\%20-\%20Scalable\%20Application-level\%20Anycast\%20.pdf},
12301 author = {Miguel Castro and Peter Druschel and Anne-Marie Kermarrec and Antony Rowstron} 12301 author = {Miguel Castro and Peter Druschel and Anne-Marie Kermarrec and Antony Rowstron}
12302} 12302}
12303@article {776703, 12303@article {776703,
@@ -12314,7 +12314,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12314 issn = {1089-7801}, 12314 issn = {1089-7801},
12315 doi = {10.1109/MIC.2003.1200305}, 12315 doi = {10.1109/MIC.2003.1200305},
12316 url = {http://portal.acm.org/citation.cfm?id=776703$\#$}, 12316 url = {http://portal.acm.org/citation.cfm?id=776703$\#$},
12317 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IEEE-IC-SecurityPerformance-May-2003.pdf}, 12317 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IEEE-IC-SecurityPerformance-May-2003.pdf},
12318 author = {Menasc{\'e}, Daniel} 12318 author = {Menasc{\'e}, Daniel}
12319} 12319}
12320@conference {Qiu:2003:SRI:863955.863974, 12320@conference {Qiu:2003:SRI:863955.863974,
@@ -12332,7 +12332,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12332 isbn = {1-58113-735-4}, 12332 isbn = {1-58113-735-4},
12333 doi = {http://doi.acm.org/10.1145/863955.863974}, 12333 doi = {http://doi.acm.org/10.1145/863955.863974},
12334 url = {http://doi.acm.org/10.1145/863955.863974}, 12334 url = {http://doi.acm.org/10.1145/863955.863974},
12335 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%2703\%20-\%20On\%20selfish\%20routing\%20in\%20internet-like\%20environments.pdf}, 12335 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%2703\%20-\%20On\%20selfish\%20routing\%20in\%20internet-like\%20environments.pdf},
12336 author = {Lili Qiu and Yang, Yang Richard and Zhang, Yin and S Shenker} 12336 author = {Lili Qiu and Yang, Yang Richard and Zhang, Yin and S Shenker}
12337} 12337}
12338@article {766661, 12338@article {766661,
@@ -12350,7 +12350,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12350 issn = {1536-1233}, 12350 issn = {1536-1233},
12351 doi = {10.1109/TMC.2003.1195151}, 12351 doi = {10.1109/TMC.2003.1195151},
12352 url = {http://portal.acm.org/citation.cfm?id=766655.766661$\#$}, 12352 url = {http://portal.acm.org/citation.cfm?id=766655.766661$\#$},
12353 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.6.1545.pdf} 12353 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.6.1545.pdf}
12354} 12354}
12355@conference {Naor03asimple, 12355@conference {Naor03asimple,
12356 title = {A Simple Fault Tolerant Distributed Hash Table}, 12356 title = {A Simple Fault Tolerant Distributed Hash Table},
@@ -12361,7 +12361,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12361 www_section = {distributed hash table, fault-tolerance}, 12361 www_section = {distributed hash table, fault-tolerance},
12362 doi = {10.1007/b11823}, 12362 doi = {10.1007/b11823},
12363 url = {http://www.springerlink.com/content/4e756fgyq4ff4kay/}, 12363 url = {http://www.springerlink.com/content/4e756fgyq4ff4kay/},
12364 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.12.3388.pdf}, 12364 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.12.3388.pdf},
12365 author = {Moni Naor and Udi Wieder} 12365 author = {Moni Naor and Udi Wieder}
12366} 12366}
12367@conference {Harvey:2003:SSO:1251460.1251469, 12367@conference {Harvey:2003:SSO:1251460.1251469,
@@ -12375,7 +12375,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12375 address = {Berkeley, CA, USA}, 12375 address = {Berkeley, CA, USA},
12376 www_section = {distributed hash table, range queries, SkipNet}, 12376 www_section = {distributed hash table, range queries, SkipNet},
12377 url = {http://dl.acm.org/citation.cfm?id=1251460.1251469}, 12377 url = {http://dl.acm.org/citation.cfm?id=1251460.1251469},
12378 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/harvey.pdf}, 12378 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/harvey.pdf},
12379 author = {Harvey, Nicholas J. A. and Michael B. Jones and Stefan Saroiu and Marvin Theimer and Wolman, Alec} 12379 author = {Harvey, Nicholas J. A. and Michael B. Jones and Stefan Saroiu and Marvin Theimer and Wolman, Alec}
12380} 12380}
12381@booklet {Freedman03sloppyhashing, 12381@booklet {Freedman03sloppyhashing,
@@ -12388,7 +12388,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12388 abstract = {We are building Coral, a peer-to-peer content distribution system. Coral creates self-organizing clusters of nodes that fetch information from each other to avoid communicating with more distant or heavily-loaded servers. Coral indexes data, but does not store it. The actual content resides where it is used, such as in nodes' local web caches. Thus, replication happens exactly in proportion to demand}, 12388 abstract = {We are building Coral, a peer-to-peer content distribution system. Coral creates self-organizing clusters of nodes that fetch information from each other to avoid communicating with more distant or heavily-loaded servers. Coral indexes data, but does not store it. The actual content resides where it is used, such as in nodes' local web caches. Thus, replication happens exactly in proportion to demand},
12389 isbn = {978-3-540-40724-9}, 12389 isbn = {978-3-540-40724-9},
12390 url = {www.coralcdn.org/docs/coral-iptps03.ps}, 12390 url = {www.coralcdn.org/docs/coral-iptps03.ps},
12391 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/coral-iptps03.pdf}, 12391 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/coral-iptps03.pdf},
12392 author = {Michael J. Freedman and David Mazi{\`e}res} 12392 author = {Michael J. Freedman and David Mazi{\`e}res}
12393} 12393}
12394@conference {Klemm03aspecial-purpose, 12394@conference {Klemm03aspecial-purpose,
@@ -12398,7 +12398,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12398 abstract = {Establishing peer-to-peer (P2P) file sharing for mobile ad hoc networks ANET) requires the construction of a search algorithm for transmitting queries and search results as well as the development of a transfer protocol for downloading files matching a query. In this paper, we present a special-purpose system for searching and file transfer tailored to both the characteristics of MANET and the requirements of peer-to-peer file sharing. Our approach is based on an application layer overlay networlc As innovative feature, overlay routes are set up on demand by the search algorithm, closely matching network topology and transparently aggregating redundant transfer paths on a per-file basis. The transfer protocol guarantees high data rates and low transmission overhead by utilizing overlay routes. In a detailed ns2 simulation study, we show that both the search algorithm and the transfer protocol outperform offthe -shelf approaches based on a P2P file sharing system for the wireline Internet, TCP and a MANET routing protocol}, 12398 abstract = {Establishing peer-to-peer (P2P) file sharing for mobile ad hoc networks ANET) requires the construction of a search algorithm for transmitting queries and search results as well as the development of a transfer protocol for downloading files matching a query. In this paper, we present a special-purpose system for searching and file transfer tailored to both the characteristics of MANET and the requirements of peer-to-peer file sharing. Our approach is based on an application layer overlay networlc As innovative feature, overlay routes are set up on demand by the search algorithm, closely matching network topology and transparently aggregating redundant transfer paths on a per-file basis. The transfer protocol guarantees high data rates and low transmission overhead by utilizing overlay routes. In a detailed ns2 simulation study, we show that both the search algorithm and the transfer protocol outperform offthe -shelf approaches based on a P2P file sharing system for the wireline Internet, TCP and a MANET routing protocol},
12399 www_section = {ad-hoc networks, file-sharing, P2P}, 12399 www_section = {ad-hoc networks, file-sharing, P2P},
12400 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.9634}, 12400 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.9634},
12401 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/VTC03.pdf}, 12401 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/VTC03.pdf},
12402 author = {Alexander Klemm and Er Klemm and Christoph Lindemann and Oliver Waldhorst} 12402 author = {Alexander Klemm and Er Klemm and Christoph Lindemann and Oliver Waldhorst}
12403} 12403}
12404@article {Castro:2003:SHM:1165389.945474, 12404@article {Castro:2003:SHM:1165389.945474,
@@ -12415,7 +12415,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12415 issn = {0163-5980}, 12415 issn = {0163-5980},
12416 doi = {http://doi.acm.org/10.1145/1165389.945474}, 12416 doi = {http://doi.acm.org/10.1145/1165389.945474},
12417 url = {http://doi.acm.org/10.1145/1165389.945474}, 12417 url = {http://doi.acm.org/10.1145/1165389.945474},
12418 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGOSP\%2703\%20-\%20Spitstream\%3A\%20High-bandwidth\%20multicast.pdf}, 12418 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGOSP\%2703\%20-\%20Spitstream\%3A\%20High-bandwidth\%20multicast.pdf},
12419 author = {Miguel Castro and Peter Druschel and Anne-Marie Kermarrec and Nandi, Animesh and Antony Rowstron and Singh, Atul} 12419 author = {Miguel Castro and Peter Druschel and Anne-Marie Kermarrec and Nandi, Animesh and Antony Rowstron and Singh, Atul}
12420} 12420}
12421@conference {statistical-disclosure, 12421@conference {statistical-disclosure,
@@ -12430,7 +12430,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12430 abstract = {An improvement over the previously known disclosure attack is presented that allows, using statistical methods, to effectively deanonymize users of a mix system. Furthermore the statistical disclosure attack is computationally efficient, and the conditions for it to be possible and accurate are much better understood. The new attack can be generalized easily to a variety of anonymity systems beyond mix networks}, 12430 abstract = {An improvement over the previously known disclosure attack is presented that allows, using statistical methods, to effectively deanonymize users of a mix system. Furthermore the statistical disclosure attack is computationally efficient, and the conditions for it to be possible and accurate are much better understood. The new attack can be generalized easily to a variety of anonymity systems beyond mix networks},
12431 www_section = {anonymity, statistical analysis, traffic analysis}, 12431 www_section = {anonymity, statistical analysis, traffic analysis},
12432 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.4512}, 12432 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.4512},
12433 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/statistical-disclosure.pdf}, 12433 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/statistical-disclosure.pdf},
12434 author = {George Danezis} 12434 author = {George Danezis}
12435} 12435}
12436@article {942421, 12436@article {942421,
@@ -12447,7 +12447,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12447 issn = {1383-469X}, 12447 issn = {1383-469X},
12448 doi = {10.1023/A:1025146013151 }, 12448 doi = {10.1023/A:1025146013151 },
12449 url = {http://portal.acm.org/citation.cfm?id=942421$\#$}, 12449 url = {http://portal.acm.org/citation.cfm?id=942421$\#$},
12450 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ButtyanH03monet.pdf}, 12450 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ButtyanH03monet.pdf},
12451 author = {Levente Butty{\'a}n and Jean-Pierre Hubaux} 12451 author = {Levente Butty{\'a}n and Jean-Pierre Hubaux}
12452} 12452}
12453@booklet {_onthe, 12453@booklet {_onthe,
@@ -12456,7 +12456,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12456 abstract = {Network protocols suffer from a lock dictated by the need for standardization and Metcalf's law. Programmable middleboxes can help to relieve the effects of that lock. This paper gives game theoretic arguments that show how the option of having middleboxes can raise the quality of communication protocols. Based on this analysis, design considerations for active and programmable networks are discussed}, 12456 abstract = {Network protocols suffer from a lock dictated by the need for standardization and Metcalf's law. Programmable middleboxes can help to relieve the effects of that lock. This paper gives game theoretic arguments that show how the option of having middleboxes can raise the quality of communication protocols. Based on this analysis, design considerations for active and programmable networks are discussed},
12457 www_section = {programmable networks}, 12457 www_section = {programmable networks},
12458 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.71.7171}, 12458 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.71.7171},
12459 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fuhrmann03strategy.pdf}, 12459 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fuhrmann03strategy.pdf},
12460 author = {Thomas Fuhrmann} 12460 author = {Thomas Fuhrmann}
12461} 12461}
12462@conference {792432, 12462@conference {792432,
@@ -12471,7 +12471,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12471 www_section = {overlay networks, programmable networks, topology matching}, 12471 www_section = {overlay networks, programmable networks, topology matching},
12472 isbn = {0-7695-1919-9}, 12472 isbn = {0-7695-1919-9},
12473 url = {http://portal.acm.org/citation.cfm?id=791231.792432$\#$}, 12473 url = {http://portal.acm.org/citation.cfm?id=791231.792432$\#$},
12474 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fuhrmann03supportingP2P.pdf}, 12474 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fuhrmann03supportingP2P.pdf},
12475 author = {Thomas Fuhrmann} 12475 author = {Thomas Fuhrmann}
12476} 12476}
12477@conference {1251470, 12477@conference {1251470,
@@ -12485,7 +12485,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12485 abstract = {We present Symphony, a novel protocol for maintaining distributed hash tables in a wide area network. The key idea is to arrange all participants along a ring and equip them with long distance contacts drawn from a family of harmonic distributions. Through simulation, we demonstrate that our construction is scalable, flexible, stable in the presence of frequent updates and offers small average latency with only a handful of long distance links per node. The cost of updates when hosts join and leave is small}, 12485 abstract = {We present Symphony, a novel protocol for maintaining distributed hash tables in a wide area network. The key idea is to arrange all participants along a ring and equip them with long distance contacts drawn from a family of harmonic distributions. Through simulation, we demonstrate that our construction is scalable, flexible, stable in the presence of frequent updates and offers small average latency with only a handful of long distance links per node. The cost of updates when hosts join and leave is small},
12486 www_section = {small-world}, 12486 www_section = {small-world},
12487 url = {http://portal.acm.org/citation.cfm?id=1251460.1251470$\#$}, 12487 url = {http://portal.acm.org/citation.cfm?id=1251460.1251470$\#$},
12488 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/manku03symphony.pdf}, 12488 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/manku03symphony.pdf},
12489 author = {Manku, Gurmeet Singh and Bawa, Mayank and Prabhakar Raghavan} 12489 author = {Manku, Gurmeet Singh and Bawa, Mayank and Prabhakar Raghavan}
12490} 12490}
12491@conference {958494, 12491@conference {958494,
@@ -12501,7 +12501,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12501 isbn = {1-58113-707-9}, 12501 isbn = {1-58113-707-9},
12502 doi = {10.1145/958491.958494}, 12502 doi = {10.1145/958491.958494},
12503 url = {http://portal.acm.org/citation.cfm?id=958494$\#$}, 12503 url = {http://portal.acm.org/citation.cfm?id=958494$\#$},
12504 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p14-woo.pdf}, 12504 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p14-woo.pdf},
12505 author = {Woo, Alec and Tong, Terence and Culler, David} 12505 author = {Woo, Alec and Tong, Terence and Culler, David}
12506} 12506}
12507@conference {feamster:pet2003, 12507@conference {feamster:pet2003,
@@ -12514,7 +12514,7 @@ We provide a rigorous stochastic analysis of how much information is revealed by
12514 organization = {Springer-Verlag, LNCS 2760}, 12514 organization = {Springer-Verlag, LNCS 2760},
12515 abstract = {All existing anti-censorship systems for theWeb rely on proxies to grant clients access to censored information. Therefore, they face the proxy discovery problem: how can clients discover the proxies without having the censor discover and block these proxies? To avoid widespread discovery and blocking, proxies must not be widely published and should be discovered in-band. In this paper, we present a proxy discovery mechanism called keyspace hopping that meets this goal. Similar in spirit to frequency hopping in wireless networks, keyspace hopping ensures that each client discovers only a small fraction of the total number of proxies.However, requiring clients to independently discover proxies from a large set makes it practically impossible to verify the trustworthiness of every proxy and creates the possibility of having untrusted proxies. To address 12515 abstract = {All existing anti-censorship systems for theWeb rely on proxies to grant clients access to censored information. Therefore, they face the proxy discovery problem: how can clients discover the proxies without having the censor discover and block these proxies? To avoid widespread discovery and blocking, proxies must not be widely published and should be discovered in-band. In this paper, we present a proxy discovery mechanism called keyspace hopping that meets this goal. Similar in spirit to frequency hopping in wireless networks, keyspace hopping ensures that each client discovers only a small fraction of the total number of proxies.However, requiring clients to independently discover proxies from a large set makes it practically impossible to verify the trustworthiness of every proxy and creates the possibility of having untrusted proxies. To address
12516this, we propose separating the proxy into two distinct components|the messenger, which the client discovers using keyspace hopping and which simply acts as a gateway to the Internet; and the portal, whose identity is widely-published and whose responsibility it is to interpret and serve the client's requests for censored content. We show how this separation, as well as in-band proxy discovery, can be applied to a variety of anti-censorship systems}, 12516this, we propose separating the proxy into two distinct components|the messenger, which the client discovers using keyspace hopping and which simply acts as a gateway to the Internet; and the portal, whose identity is widely-published and whose responsibility it is to interpret and serve the client's requests for censored content. We show how this separation, as well as in-band proxy discovery, can be applied to a variety of anti-censorship systems},
12517 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/feamster-pet2003.pdf}, 12517 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/feamster-pet2003.pdf},
12518 author = {Nick Feamster and Magdalena Balazinska and Winston Wang and Hari Balakrishnan and David Karger}, 12518 author = {Nick Feamster and Magdalena Balazinska and Winston Wang and Hari Balakrishnan and David Karger},
12519 editor = {Roger Dingledine} 12519 editor = {Roger Dingledine}
12520} 12520}
@@ -12523,7 +12523,7 @@ this, we propose separating the proxy into two distinct components|the messenger
12523 year = {2003}, 12523 year = {2003},
12524 abstract = {Random-graph models are about to become an important tool in the study of wireless ad-hoc and sensor-networks, peer-to-peer networks, and, generally, overlay-networks. Such models provide a theoretical basis to assess the capabilities of certain networks, and guide the design of new protocols. Especially the recently proposed models for so-called small-world networks receive much attention from the networking community. This paper proposes the use of two more mathematical concepts for the analysis of network topologies, dimension and curvature. These concepts can intuitively be applied to, e.g., sensor-networks. But they can also be sensibly dened for certain other random-graph models. The latter is non-trivial since such models may describe purely virtual networks that do not inherit properties from an underlying physical world. Analysis of a random-graph model for Gnutella-like overlay-networks yields strong indications that such networks might be characterized as a sphere with fractal dimension}, 12524 abstract = {Random-graph models are about to become an important tool in the study of wireless ad-hoc and sensor-networks, peer-to-peer networks, and, generally, overlay-networks. Such models provide a theoretical basis to assess the capabilities of certain networks, and guide the design of new protocols. Especially the recently proposed models for so-called small-world networks receive much attention from the networking community. This paper proposes the use of two more mathematical concepts for the analysis of network topologies, dimension and curvature. These concepts can intuitively be applied to, e.g., sensor-networks. But they can also be sensibly dened for certain other random-graph models. The latter is non-trivial since such models may describe purely virtual networks that do not inherit properties from an underlying physical world. Analysis of a random-graph model for Gnutella-like overlay-networks yields strong indications that such networks might be characterized as a sphere with fractal dimension},
12525 journal = {unknown}, 12525 journal = {unknown},
12526 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fuhrmann03topology.pdf}, 12526 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fuhrmann03topology.pdf},
12527 author = {Thomas Fuhrmann} 12527 author = {Thomas Fuhrmann}
12528} 12528}
12529@conference {DBLP:conf/iptps/DabekZDKS03, 12529@conference {DBLP:conf/iptps/DabekZDKS03,
@@ -12541,7 +12541,7 @@ this, we propose separating the proxy into two distinct components|the messenger
12541 www_section = {API, key abstraction}, 12541 www_section = {API, key abstraction},
12542 isbn = {3-540-40724-3}, 12542 isbn = {3-540-40724-3},
12543 doi = {http://dx.doi.org/10.1007/978-3-540-45172-3_3}, 12543 doi = {http://dx.doi.org/10.1007/978-3-540-45172-3_3},
12544 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IPTPS\%2703\%20-\%20Towards\%20a\%20common\%20API.pdf}, 12544 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IPTPS\%2703\%20-\%20Towards\%20a\%20common\%20API.pdf},
12545 author = {Dabek, Frank and Ben Y. Zhao and Peter Druschel and John Kubiatowicz and Ion Stoica} 12545 author = {Dabek, Frank and Ben Y. Zhao and Peter Druschel and John Kubiatowicz and Ion Stoica}
12546} 12546}
12547@conference { gnunettransport, 12547@conference { gnunettransport,
@@ -12554,7 +12554,7 @@ this, we propose separating the proxy into two distinct components|the messenger
12554 abstract = {The initially unrestricted host-to-host communication model provided by the Internet Protocol has deteriorated due to political and technical changes caused by Internet growth. While this is not a problem for most client-server applications, peer-to-peer networks frequently struggle with peers that are only partially reachable. We describe how a peer-to-peer framework can hide diversity and obstacles in the underlying Internet and provide peer-to-peer applications with abstractions that hide transport specific details. We present the details of an implementation of a transport service based on SMTP. Small-scale benchmarks are used to compare transport services over UDP, TCP, and SMTP}, 12554 abstract = {The initially unrestricted host-to-host communication model provided by the Internet Protocol has deteriorated due to political and technical changes caused by Internet growth. While this is not a problem for most client-server applications, peer-to-peer networks frequently struggle with peers that are only partially reachable. We describe how a peer-to-peer framework can hide diversity and obstacles in the underlying Internet and provide peer-to-peer applications with abstractions that hide transport specific details. We present the details of an implementation of a transport service based on SMTP. Small-scale benchmarks are used to compare transport services over UDP, TCP, and SMTP},
12555 www_section = {GNUnet, P2P}, 12555 www_section = {GNUnet, P2P},
12556 url = {http://grothoff.org/christian/transport.pdf}, 12556 url = {http://grothoff.org/christian/transport.pdf},
12557 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/transport.pdf}, 12557 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/transport.pdf},
12558 author = {Ronaldo A. Ferreira and Christian Grothoff and Paul Ruth} 12558 author = {Ronaldo A. Ferreira and Christian Grothoff and Paul Ruth}
12559} 12559}
12560@conference {642636, 12560@conference {642636,
@@ -12570,7 +12570,7 @@ this, we propose separating the proxy into two distinct components|the messenger
12570 isbn = {1-58113-630-7}, 12570 isbn = {1-58113-630-7},
12571 doi = {10.1145/642611.642636}, 12571 doi = {10.1145/642611.642636},
12572 url = {http://portal.acm.org/citation.cfm?id=642611.642636$\#$}, 12572 url = {http://portal.acm.org/citation.cfm?id=642611.642636$\#$},
12573 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/HPL-2002-163.pdf}, 12573 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/HPL-2002-163.pdf},
12574 author = {Good, Nathaniel S. and Krekelberg, Aaron} 12574 author = {Good, Nathaniel S. and Krekelberg, Aaron}
12575} 12575}
12576@booklet {Fuhrmann_usingbluetooth, 12576@booklet {Fuhrmann_usingbluetooth,
@@ -12593,7 +12593,7 @@ this, we propose separating the proxy into two distinct components|the messenger
12593 www_section = {anonymity, caching proxies, privacy}, 12593 www_section = {anonymity, caching proxies, privacy},
12594 doi = {10.1145/1120709.1120713}, 12594 doi = {10.1145/1120709.1120713},
12595 url = {http://portal.acm.org/citation.cfm?id=1120713}, 12595 url = {http://portal.acm.org/citation.cfm?id=1120713},
12596 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/shsm03.pdf}, 12596 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/shsm03.pdf},
12597 author = {Anna Shubina and Sean Smith} 12597 author = {Anna Shubina and Sean Smith}
12598} 12598}
12599@article {939859, 12599@article {939859,
@@ -12617,7 +12617,7 @@ this, we propose separating the proxy into two distinct components|the messenger
12617 www_section = {ad-hoc networks}, 12617 www_section = {ad-hoc networks},
12618 isbn = {0-7695-1938-5}, 12618 isbn = {0-7695-1938-5},
12619 url = {http://portal.acm.org/citation.cfm?id=825345}, 12619 url = {http://portal.acm.org/citation.cfm?id=825345},
12620 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.13.9956.pdf}, 12620 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.13.9956.pdf},
12621 author = {Malika Boulkenafed and Valerie Issarny} 12621 author = {Malika Boulkenafed and Valerie Issarny}
12622} 12622}
12623@conference {BonehGolle:psp2002, 12623@conference {BonehGolle:psp2002,
@@ -12634,7 +12634,7 @@ this, we propose separating the proxy into two distinct components|the messenger
12634 isbn = {1-58113-612-9}, 12634 isbn = {1-58113-612-9},
12635 doi = {10.1145/586110.586121}, 12635 doi = {10.1145/586110.586121},
12636 url = {http://portal.acm.org/citation.cfm?id=586121}, 12636 url = {http://portal.acm.org/citation.cfm?id=586121},
12637 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/BonehGolle-psp2002.pdf}, 12637 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/BonehGolle-psp2002.pdf},
12638 author = {Dan Boneh and Philippe Golle}, 12638 author = {Dan Boneh and Philippe Golle},
12639 editor = {Vijay Atluri} 12639 editor = {Vijay Atluri}
12640} 12640}
@@ -12651,7 +12651,7 @@ this, we propose separating the proxy into two distinct components|the messenger
12651 isbn = {3-540-00223-5}, 12651 isbn = {3-540-00223-5},
12652 doi = {10.1007/3-540-36199-5}, 12652 doi = {10.1007/3-540-36199-5},
12653 url = {http://portal.acm.org/citation.cfm?id=664025$\#$}, 12653 url = {http://portal.acm.org/citation.cfm?id=664025$\#$},
12654 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fuhrmann02architecture_0.pdf}, 12654 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fuhrmann02architecture_0.pdf},
12655 author = {Thomas Fuhrmann and Till Harbaum and Marcus Schoeller and Martina Zitterbart} 12655 author = {Thomas Fuhrmann and Till Harbaum and Marcus Schoeller and Martina Zitterbart}
12656} 12656}
12657@conference {RRMPH02-1, 12657@conference {RRMPH02-1,
@@ -12667,7 +12667,7 @@ this, we propose separating the proxy into two distinct components|the messenger
12667 www_section = {anonymity, anonymous web browsing}, 12667 www_section = {anonymity, anonymous web browsing},
12668 isbn = {0-7695-1748-X}, 12668 isbn = {0-7695-1748-X},
12669 url = {http://portal.acm.org/citation.cfm?id=759973}, 12669 url = {http://portal.acm.org/citation.cfm?id=759973},
12670 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/RRMPH02-1.pdf}, 12670 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/RRMPH02-1.pdf},
12671 author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and David Hutchison} 12671 author = {Marc Rennhard and Sandro Rafaeli and Laurent Mathy and Bernhard Plattner and David Hutchison}
12672} 12672}
12673@conference {wright02, 12673@conference {wright02,
@@ -12680,7 +12680,7 @@ this, we propose separating the proxy into two distinct components|the messenger
12680 abstract = {There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of each protocol over time. We prove that when a particular initiator continues communication with a particular responder across path reformations, existing protocols are subject to the attack. We use this result to place an upper bound on how long existing protocols, including Crowds, Onion Routing, Hordes, Web Mixes, and DC-Net, can maintain anonymity in the face of the attacks described. Our results show that fully-connected DC-Net is the most resilient to these attacks, but it su$\#$ers from scalability issues that keep anonymity group sizes small. Additionally, we show how violating an assumption of the attack allows malicious users to setup other participants to falsely appear to be the initiator of a connection}, 12680 abstract = {There have been a number of protocols proposed for anonymous network communication. In this paper we investigate attacks by corrupt group members that degrade the anonymity of each protocol over time. We prove that when a particular initiator continues communication with a particular responder across path reformations, existing protocols are subject to the attack. We use this result to place an upper bound on how long existing protocols, including Crowds, Onion Routing, Hordes, Web Mixes, and DC-Net, can maintain anonymity in the face of the attacks described. Our results show that fully-connected DC-Net is the most resilient to these attacks, but it su$\#$ers from scalability issues that keep anonymity group sizes small. Additionally, we show how violating an assumption of the attack allows malicious users to setup other participants to falsely appear to be the initiator of a connection},
12681 www_section = {anonymity, Crowds, dining cryptographers, Hordes, onion routing}, 12681 www_section = {anonymity, Crowds, dining cryptographers, Hordes, onion routing},
12682 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.9435}, 12682 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.9435},
12683 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/wright-degrade.pdf}, 12683 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/wright-degrade.pdf},
12684 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields} 12684 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}
12685} 12685}
12686@booklet {Serjantov02anonymizingcensorship, 12686@booklet {Serjantov02anonymizingcensorship,
@@ -12692,7 +12692,7 @@ this, we propose separating the proxy into two distinct components|the messenger
12692 abstract = {In this paper we propose a new Peer-to-Peer architecture for a censorship resistant system with user, server and active-server document anonymity as well as efficient document retrieval. The retrieval service is layered on top of an existing Peer-to-Peer infrastructure, which should facilitate its implementation}, 12692 abstract = {In this paper we propose a new Peer-to-Peer architecture for a censorship resistant system with user, server and active-server document anonymity as well as efficient document retrieval. The retrieval service is layered on top of an existing Peer-to-Peer infrastructure, which should facilitate its implementation},
12693 isbn = {3-540-44179-4}, 12693 isbn = {3-540-44179-4},
12694 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.13.5048\&rep=rep1\&type=pdf}, 12694 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.13.5048\&rep=rep1\&type=pdf},
12695 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.13.5048.pdf}, 12695 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.13.5048.pdf},
12696 author = {Andrei Serjantov} 12696 author = {Andrei Serjantov}
12697} 12697}
12698@conference {Serj02-iptps, 12698@conference {Serj02-iptps,
@@ -12708,7 +12708,7 @@ Indeed, if one server has been pressured into removal, the other server administ
12708 isbn = {978-3-540-44179-3}, 12708 isbn = {978-3-540-44179-3},
12709 doi = {10.1007/3-540-45748-8}, 12709 doi = {10.1007/3-540-45748-8},
12710 url = {http://portal.acm.org/citation.cfm?id=687808}, 12710 url = {http://portal.acm.org/citation.cfm?id=687808},
12711 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Serj02-iptps.pdf}, 12711 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Serj02-iptps.pdf},
12712 author = {Andrei Serjantov} 12712 author = {Andrei Serjantov}
12713} 12713}
12714@conference {714768, 12714@conference {714768,
@@ -12725,7 +12725,7 @@ Placing application-dedicated functionality within the network requires a flexib
12725 isbn = {3-540-43709-6}, 12725 isbn = {3-540-43709-6},
12726 doi = {10.1007/3-540-47906-6}, 12726 doi = {10.1007/3-540-47906-6},
12727 url = {http://www.springerlink.com/content/4j371710765jg14q/}, 12727 url = {http://www.springerlink.com/content/4j371710765jg14q/},
12728 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/speer02networking.pdf}, 12728 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/speer02networking.pdf},
12729 author = {Speer, Anke and Marcus Schoeller and Thomas Fuhrmann and Martina Zitterbart} 12729 author = {Speer, Anke and Marcus Schoeller and Thomas Fuhrmann and Martina Zitterbart}
12730} 12730}
12731@conference {beimel-barrier, 12731@conference {beimel-barrier,
@@ -12736,7 +12736,7 @@ Placing application-dedicated functionality within the network requires a flexib
12736 www_section = {private information retrieval}, 12736 www_section = {private information retrieval},
12737 isbn = {0-7695-1822-2}, 12737 isbn = {0-7695-1822-2},
12738 url = {http://portal.acm.org/citation.cfm?id=652187}, 12738 url = {http://portal.acm.org/citation.cfm?id=652187},
12739 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/beimel-barrier.pdf}, 12739 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/beimel-barrier.pdf},
12740 author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Jean-Fran{\c c}ois Raymond} 12740 author = {Amos Beimel and Yuval Ishai and Eyal Kushilevitz and Jean-Fran{\c c}ois Raymond}
12741} 12741}
12742@conference {Mazieres:2002:BSF:571825.571840, 12742@conference {Mazieres:2002:BSF:571825.571840,
@@ -12754,7 +12754,7 @@ Placing application-dedicated functionality within the network requires a flexib
12754 isbn = {1-58113-485-1}, 12754 isbn = {1-58113-485-1},
12755 doi = {http://doi.acm.org/10.1145/571825.571840}, 12755 doi = {http://doi.acm.org/10.1145/571825.571840},
12756 url = {http://doi.acm.org/10.1145/571825.571840}, 12756 url = {http://doi.acm.org/10.1145/571825.571840},
12757 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PODC\%2702\%20-\%20Building\%20secure\%20file\%20systems\%20out\%20of\%20Byzantine\%20storage.pdf}, 12757 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PODC\%2702\%20-\%20Building\%20secure\%20file\%20systems\%20out\%20of\%20Byzantine\%20storage.pdf},
12758 author = {David Mazi{\`e}res and Shasha, Dennis} 12758 author = {David Mazi{\`e}res and Shasha, Dennis}
12759} 12759}
12760@article {Oswald02capacity-achievingsequences, 12760@article {Oswald02capacity-achievingsequences,
@@ -12769,7 +12769,7 @@ Placing application-dedicated functionality within the network requires a flexib
12769 issn = { 0018-9448 }, 12769 issn = { 0018-9448 },
12770 doi = {10.1109/TIT.2002.805067 }, 12770 doi = {10.1109/TIT.2002.805067 },
12771 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.6722}, 12771 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.83.6722},
12772 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.92.7281.pdf}, 12772 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.92.7281.pdf},
12773 author = {Peter Oswald and M. Amin Shokrollahi} 12773 author = {Peter Oswald and M. Amin Shokrollahi}
12774} 12774}
12775@conference {cebolla, 12775@conference {cebolla,
@@ -12780,7 +12780,7 @@ Placing application-dedicated functionality within the network requires a flexib
12780 abstract = {Cebolla is an intersection of cryptographic mix networks and the environment of the public Internet. Most of the history of cryptographic mix networks lies in academic attempts to provide anonymity of various sorts to the users of the network. While based on strong cryptographic principles, most attempts have failed to address properties of the public network and the reasonable expectations of most of its users. Cebolla attempts to address this gulf between the interesting research aspects of IP level anonymity and the operational expectations of most uses of the IP network}, 12780 abstract = {Cebolla is an intersection of cryptographic mix networks and the environment of the public Internet. Most of the history of cryptographic mix networks lies in academic attempts to provide anonymity of various sorts to the users of the network. While based on strong cryptographic principles, most attempts have failed to address properties of the public network and the reasonable expectations of most of its users. Cebolla attempts to address this gulf between the interesting research aspects of IP level anonymity and the operational expectations of most uses of the IP network},
12781 www_section = {anonymity, cryptography}, 12781 www_section = {anonymity, cryptography},
12782 url = {http://www.linuxinsight.com/ols2002_cebolla_pragmatic_ip_anonymity.html}, 12782 url = {http://www.linuxinsight.com/ols2002_cebolla_pragmatic_ip_anonymity.html},
12783 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cebolla.pdf}, 12783 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cebolla.pdf},
12784 author = {Zach Brown} 12784 author = {Zach Brown}
12785} 12785}
12786@booklet {Fiat02censorshipresistant, 12786@booklet {Fiat02censorshipresistant,
@@ -12788,7 +12788,7 @@ Placing application-dedicated functionality within the network requires a flexib
12788 year = {2002}, 12788 year = {2002},
12789 abstract = {We present a censorship resistant peer-to-peer network for accessing n data items in a network of n nodes. Each search for a data item in the network takes O(log n) time and requires at most O(log2n) messages. Our network is censorship resistant in the sense that even after adversarial removal of an arbitrarily large constant fraction of the nodes in the network, all but an arbitrarily small fraction of the remaining nodes can obtain all but an arbitrarily small fraction of the original data items. The network can be created in a fully distributed fashion. It requires only O(log n) memory in each node. We also give a variant of our scheme that has the property that it is highly spam resistant: an adversary can take over complete control of a constant fraction of the nodes in the network and yet will still be unable to generate spam}, 12789 abstract = {We present a censorship resistant peer-to-peer network for accessing n data items in a network of n nodes. Each search for a data item in the network takes O(log n) time and requires at most O(log2n) messages. Our network is censorship resistant in the sense that even after adversarial removal of an arbitrarily large constant fraction of the nodes in the network, all but an arbitrarily small fraction of the remaining nodes can obtain all but an arbitrarily small fraction of the original data items. The network can be created in a fully distributed fashion. It requires only O(log n) memory in each node. We also give a variant of our scheme that has the property that it is highly spam resistant: an adversary can take over complete control of a constant fraction of the nodes in the network and yet will still be unable to generate spam},
12790 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.16.4761\&rep=rep1\&type=pdf}, 12790 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.16.4761\&rep=rep1\&type=pdf},
12791 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.16.4761.pdf}, 12791 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.16.4761.pdf},
12792 author = {Amos Fiat and Jared Saia} 12792 author = {Amos Fiat and Jared Saia}
12793} 12793}
12794@conference {chaffinch, 12794@conference {chaffinch,
@@ -12802,7 +12802,7 @@ Placing application-dedicated functionality within the network requires a flexib
12802 www_section = {legal attack, RIP}, 12802 www_section = {legal attack, RIP},
12803 doi = {10.1007/3-540-36415-3}, 12803 doi = {10.1007/3-540-36415-3},
12804 url = {http://portal.acm.org/citation.cfm?id=647598.732024}, 12804 url = {http://portal.acm.org/citation.cfm?id=647598.732024},
12805 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Chaffinch.pdf}, 12805 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Chaffinch.pdf},
12806 author = {Richard Clayton and George Danezis}, 12806 author = {Richard Clayton and George Danezis},
12807 editor = {Fabien Petitcolas} 12807 editor = {Fabien Petitcolas}
12808} 12808}
@@ -12818,7 +12818,7 @@ Placing application-dedicated functionality within the network requires a flexib
12818 isbn = {1-58113-449-5}, 12818 isbn = {1-58113-449-5},
12819 doi = {10.1145/511446.511496}, 12819 doi = {10.1145/511446.511496},
12820 url = {http://portal.acm.org/citation.cfm?id=511496$\#$}, 12820 url = {http://portal.acm.org/citation.cfm?id=511496$\#$},
12821 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/samarati.pdf}, 12821 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/samarati.pdf},
12822 author = {Cornelli, Fabrizio and Ernesto Damiani and Sabrina De Capitani di Vimercati and Stefano Paraboschi and Pierangela Samarati} 12822 author = {Cornelli, Fabrizio and Ernesto Damiani and Sabrina De Capitani di Vimercati and Stefano Paraboschi and Pierangela Samarati}
12823} 12823}
12824@article {571638, 12824@article {571638,
@@ -12835,7 +12835,7 @@ Placing application-dedicated functionality within the network requires a flexib
12835 issn = {0734-2071}, 12835 issn = {0734-2071},
12836 doi = {10.1145/571637.571638}, 12836 doi = {10.1145/571637.571638},
12837 url = {http://portal.acm.org/citation.cfm?id=571638$\#$}, 12837 url = {http://portal.acm.org/citation.cfm?id=571638$\#$},
12838 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cocaTOCS.pdf}, 12838 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cocaTOCS.pdf},
12839 author = {Zhou, Lidong and Schneider, Fred B. and Robbert Van Renesse} 12839 author = {Zhou, Lidong and Schneider, Fred B. and Robbert Van Renesse}
12840} 12840}
12841@conference {Harren:2002:CQD:646334.687945, 12841@conference {Harren:2002:CQD:646334.687945,
@@ -12853,7 +12853,7 @@ Placing application-dedicated functionality within the network requires a flexib
12853 www_section = {distributed hash table}, 12853 www_section = {distributed hash table},
12854 isbn = {3-540-44179-4}, 12854 isbn = {3-540-44179-4},
12855 url = {http://dl.acm.org/citation.cfm?id=646334.687945}, 12855 url = {http://dl.acm.org/citation.cfm?id=646334.687945},
12856 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IPTPS\%2701\%20-\%20Complex\%20queries\%20in\%20DHT-based\%20p2p\%20networks.pdf}, 12856 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IPTPS\%2701\%20-\%20Complex\%20queries\%20in\%20DHT-based\%20p2p\%20networks.pdf},
12857 author = {Harren, Matthew and Hellerstein, Joseph M. and Huebsch, Ryan and Boon Thau Loo and S Shenker and Ion Stoica} 12857 author = {Harren, Matthew and Hellerstein, Joseph M. and Huebsch, Ryan and Boon Thau Loo and S Shenker and Ion Stoica}
12858} 12858}
12859@conference {Mui:2002:CMT:820745.821158, 12859@conference {Mui:2002:CMT:820745.821158,
@@ -12871,7 +12871,7 @@ Placing application-dedicated functionality within the network requires a flexib
12871 isbn = {0-7695-1435-9}, 12871 isbn = {0-7695-1435-9},
12872 doi = {http://dx.doi.org/10.1109/HICSS.2002.994181}, 12872 doi = {http://dx.doi.org/10.1109/HICSS.2002.994181},
12873 url = {http://dl.acm.org/citation.cfm?id=820745.821158}, 12873 url = {http://dl.acm.org/citation.cfm?id=820745.821158},
12874 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/HICSS\%2702\%20-\%20A\%20computational\%20model\%20of\%20trust\%20and\%20reputation.pdf}, 12874 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/HICSS\%2702\%20-\%20A\%20computational\%20model\%20of\%20trust\%20and\%20reputation.pdf},
12875 author = {Lik Mui and Mojdeh Mohtashemi and Ari Halberstadt} 12875 author = {Lik Mui and Mojdeh Mohtashemi and Ari Halberstadt}
12876} 12876}
12877@conference {2002_0, 12877@conference {2002_0,
@@ -12879,7 +12879,7 @@ Placing application-dedicated functionality within the network requires a flexib
12879 booktitle = {In The USENIX Conf. on File and Storage Technologies}, 12879 booktitle = {In The USENIX Conf. on File and Storage Technologies},
12880 year = {2002}, 12880 year = {2002},
12881 abstract = {This paper presents the design of a novel backup system built on top of a peer-to-peer architecture with minimal supporting infrastructure. The system can be deployed for both large-scale and small-scale peer-to-peer overlay networks. It allows computers connected to the Internet to back up their data cooperatively. Each computer has a set of partner computers and stores its backup data distributively among those partners. In return, such a way as to achieve both fault-tolerance and high reliability. This form of cooperation poses several interesting technical challenges because these computers have independent failure modes, do not trust each other, and are subject to third party attacks}, 12881 abstract = {This paper presents the design of a novel backup system built on top of a peer-to-peer architecture with minimal supporting infrastructure. The system can be deployed for both large-scale and small-scale peer-to-peer overlay networks. It allows computers connected to the Internet to back up their data cooperatively. Each computer has a set of partner computers and stores its backup data distributively among those partners. In return, such a way as to achieve both fault-tolerance and high reliability. This form of cooperation poses several interesting technical challenges because these computers have independent failure modes, do not trust each other, and are subject to third party attacks},
12882 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/elnikety.pdf}, 12882 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/elnikety.pdf},
12883 author = {Sameh Elnikety and Mark Lillibridge and Mike Burrows and Willy Zwaenepoel} 12883 author = {Sameh Elnikety and Mark Lillibridge and Mike Burrows and Willy Zwaenepoel}
12884} 12884}
12885@conference {715916, 12885@conference {715916,
@@ -12893,7 +12893,7 @@ Placing application-dedicated functionality within the network requires a flexib
12893 abstract = {CPCMS, the Cryptographically Protected Configuration Management System is a new configuration management system that provides scalability, disconnected commits, and fine-grain access controls. It addresses the novel problems raised by modern open-source development practices, in which projects routinely span traditional organizational boundaries and can involve thousands of participants. CPCMS provides for simultaneous public and private lines of development, with post hoc "publication" of private branches}, 12893 abstract = {CPCMS, the Cryptographically Protected Configuration Management System is a new configuration management system that provides scalability, disconnected commits, and fine-grain access controls. It addresses the novel problems raised by modern open-source development practices, in which projects routinely span traditional organizational boundaries and can involve thousands of participants. CPCMS provides for simultaneous public and private lines of development, with post hoc "publication" of private branches},
12894 isbn = {1-880446-01-4}, 12894 isbn = {1-880446-01-4},
12895 url = {http://portal.acm.org/citation.cfm?id=715916$\#$}, 12895 url = {http://portal.acm.org/citation.cfm?id=715916$\#$},
12896 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.61.3184.pdf}, 12896 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.61.3184.pdf},
12897 author = {Shapiro, Jonathan S. and Vanderburgh, John} 12897 author = {Shapiro, Jonathan S. and Vanderburgh, John}
12898} 12898}
12899@conference {idemix, 12899@conference {idemix,
@@ -12909,7 +12909,7 @@ Placing application-dedicated functionality within the network requires a flexib
12909 isbn = {1-58113-612-9}, 12909 isbn = {1-58113-612-9},
12910 doi = {http://doi.acm.org/10.1145/586110.586114}, 12910 doi = {http://doi.acm.org/10.1145/586110.586114},
12911 url = {http://portal.acm.org/citation.cfm?id=586114}, 12911 url = {http://portal.acm.org/citation.cfm?id=586114},
12912 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/idemix.pdf}, 12912 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/idemix.pdf},
12913 author = {Jan Camenisch and Els Van Herreweghen} 12913 author = {Jan Camenisch and Els Van Herreweghen}
12914} 12914}
12915@conference {713855, 12915@conference {713855,
@@ -12924,7 +12924,7 @@ Placing application-dedicated functionality within the network requires a flexib
12924 www_section = {file systems}, 12924 www_section = {file systems},
12925 isbn = {1-880446-00-6}, 12925 isbn = {1-880446-00-6},
12926 url = {http://portal.acm.org/citation.cfm?id=713855$\#$}, 12926 url = {http://portal.acm.org/citation.cfm?id=713855$\#$},
12927 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/storedesign2002.pdf}, 12927 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/storedesign2002.pdf},
12928 author = {Shapiro, Jonathan S. and Adams, Jonathan} 12928 author = {Shapiro, Jonathan S. and Adams, Jonathan}
12929} 12929}
12930@article {Rubenstein:2000:DSC:345063.339410, 12930@article {Rubenstein:2000:DSC:345063.339410,
@@ -12941,7 +12941,7 @@ Placing application-dedicated functionality within the network requires a flexib
12941 issn = {1063-6692 }, 12941 issn = {1063-6692 },
12942 doi = {http://dx.doi.org/10.1109/TNET.2002.1012369}, 12942 doi = {http://dx.doi.org/10.1109/TNET.2002.1012369},
12943 url = {http://dx.doi.org/10.1109/TNET.2002.1012369}, 12943 url = {http://dx.doi.org/10.1109/TNET.2002.1012369},
12944 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IEEE\%E2\%81\%84ACM\%20Transactions\%20on\%20Networking\%20-\%20Detecting\%20shared\%20congestion\%20of\%20flows.pdf}, 12944 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IEEE\%E2\%81\%84ACM\%20Transactions\%20on\%20Networking\%20-\%20Detecting\%20shared\%20congestion\%20of\%20flows.pdf},
12945 author = {Rubenstein, Dan and Kurose, Jim and Don Towsley} 12945 author = {Rubenstein, Dan and Kurose, Jim and Don Towsley}
12946} 12946}
12947@conference {Feigenbaum:2002:DAM:570810.570812, 12947@conference {Feigenbaum:2002:DAM:570810.570812,
@@ -12959,7 +12959,7 @@ Placing application-dedicated functionality within the network requires a flexib
12959 isbn = {1-58113-587-4}, 12959 isbn = {1-58113-587-4},
12960 doi = {http://doi.acm.org/10.1145/570810.570812}, 12960 doi = {http://doi.acm.org/10.1145/570810.570812},
12961 url = {http://jmvidal.cse.sc.edu/library/feigenbaum02a.pdf}, 12961 url = {http://jmvidal.cse.sc.edu/library/feigenbaum02a.pdf},
12962 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/DIALM\%2702\%20-\%20Feigenbaum\%20\%26\%20Shenker\%20-\%20Distributed\%20algorithmic\%20mechanism\%20design.pdf}, 12962 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/DIALM\%2702\%20-\%20Feigenbaum\%20\%26\%20Shenker\%20-\%20Distributed\%20algorithmic\%20mechanism\%20design.pdf},
12963 author = {Feigenbaum, Joan and S Shenker} 12963 author = {Feigenbaum, Joan and S Shenker}
12964} 12964}
12965@booklet {Hildrum:CSD-02-1178, 12965@booklet {Hildrum:CSD-02-1178,
@@ -12970,7 +12970,7 @@ Placing application-dedicated functionality within the network requires a flexib
12970 publisher = {EECS Department, University of California, Berkeley}, 12970 publisher = {EECS Department, University of California, Berkeley},
12971 abstract = {Modern networking applications replicate data and services widely, leading to a need for location-independent routing -- the ability to route queries directly to objects using names that are independent of the objects' physical locations. Two important properties of a routing infrastructure are routing locality and rapid adaptation to arriving and departing nodes. We show how these two properties can be achieved with an efficient solution to the nearest-neighbor problem. We present a new distributed algorithm that can solve the nearest-neighbor problem for a restricted metric space. We describe our solution in the context of Tapestry, an overlay network infrastructure that employs techniques proposed by Plaxton, Rajaraman, and Richa}, 12971 abstract = {Modern networking applications replicate data and services widely, leading to a need for location-independent routing -- the ability to route queries directly to objects using names that are independent of the objects' physical locations. Two important properties of a routing infrastructure are routing locality and rapid adaptation to arriving and departing nodes. We show how these two properties can be achieved with an efficient solution to the nearest-neighbor problem. We present a new distributed algorithm that can solve the nearest-neighbor problem for a restricted metric space. We describe our solution in the context of Tapestry, an overlay network infrastructure that employs techniques proposed by Plaxton, Rajaraman, and Richa},
12972 url = {http://www.eecs.berkeley.edu/Pubs/TechRpts/2002/5214.html}, 12972 url = {http://www.eecs.berkeley.edu/Pubs/TechRpts/2002/5214.html},
12973 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CSD-02-1178.pdf}, 12973 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CSD-02-1178.pdf},
12974 author = {Hildrum, Kirsten and John Kubiatowicz and Rao, Satish and Ben Y. Zhao} 12974 author = {Hildrum, Kirsten and John Kubiatowicz and Rao, Satish and Ben Y. Zhao}
12975} 12975}
12976@article {wagner, 12976@article {wagner,
@@ -12999,7 +12999,7 @@ For a detailed description of our method we assume a cascade of Chaumian MIXes a
12999 isbn = {978-3-540-00565-0}, 12999 isbn = {978-3-540-00565-0},
13000 doi = {10.1007/3-540-36467-6}, 13000 doi = {10.1007/3-540-36467-6},
13001 url = {http://www.springerlink.com/content/66ybualwu5hmh563/}, 13001 url = {http://www.springerlink.com/content/66ybualwu5hmh563/},
13002 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/langos02.pdf}, 13002 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/langos02.pdf},
13003 author = {Oliver Berthold and Heinrich Langos}, 13003 author = {Oliver Berthold and Heinrich Langos},
13004 editor = {Roger Dingledine and Paul Syverson} 13004 editor = {Roger Dingledine and Paul Syverson}
13005} 13005}
@@ -13015,7 +13015,7 @@ For a detailed description of our method we assume a cascade of Chaumian MIXes a
13015 isbn = {978-3-540-44050-5}, 13015 isbn = {978-3-540-44050-5},
13016 doi = {10.1007/3-540-45708-9}, 13016 doi = {10.1007/3-540-45708-9},
13017 url = {http://portal.acm.org/citation.cfm?id=704437}, 13017 url = {http://portal.acm.org/citation.cfm?id=704437},
13018 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/camenisch2002da.pdf}, 13018 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/camenisch2002da.pdf},
13019 author = {Jan Camenisch and Anna Lysyanskaya} 13019 author = {Jan Camenisch and Anna Lysyanskaya}
13020} 13020}
13021@booklet {Saia02dynamicallyfault-tolerant, 13021@booklet {Saia02dynamicallyfault-tolerant,
@@ -13025,7 +13025,7 @@ For a detailed description of our method we assume a cascade of Chaumian MIXes a
13025 www_section = {fault-tolerance, robustness}, 13025 www_section = {fault-tolerance, robustness},
13026 doi = {10.1007/3-540-45748-8}, 13026 doi = {10.1007/3-540-45748-8},
13027 url = {http://www.springerlink.com/content/r7fumjuwmgnd4md1/}, 13027 url = {http://www.springerlink.com/content/r7fumjuwmgnd4md1/},
13028 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/180.pdf}, 13028 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/180.pdf},
13029 author = {Jared Saia and Amos Fiat and Steven D. Gribble and Anna R. Karlin and Stefan Saroiu} 13029 author = {Jared Saia and Amos Fiat and Steven D. Gribble and Anna R. Karlin and Stefan Saroiu}
13030} 13030}
13031@conference {esed, 13031@conference {esed,
@@ -13038,7 +13038,7 @@ For a detailed description of our method we assume a cascade of Chaumian MIXes a
13038 address = {Melbourne, Australia}, 13038 address = {Melbourne, Australia},
13039 www_section = {censorship resistance, ECRS, encoding, file-sharing, GNUnet}, 13039 www_section = {censorship resistance, ECRS, encoding, file-sharing, GNUnet},
13040 url = {http://grothoff.org/christian/esed.pdf}, 13040 url = {http://grothoff.org/christian/esed.pdf},
13041 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/esed.pdf}, 13041 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/esed.pdf},
13042 author = {Krista Bennett and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu} 13042 author = {Krista Bennett and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu}
13043} 13043}
13044@article {605408, 13044@article {605408,
@@ -13054,7 +13054,7 @@ For a detailed description of our method we assume a cascade of Chaumian MIXes a
13054 issn = {0163-5964}, 13054 issn = {0163-5964},
13055 doi = {10.1145/635506.605408}, 13055 doi = {10.1145/635506.605408},
13056 url = {http://portal.acm.org/citation.cfm?id=635506.605408$\#$}, 13056 url = {http://portal.acm.org/citation.cfm?id=635506.605408$\#$},
13057 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/asplos-x_annot.pdf}, 13057 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/asplos-x_annot.pdf},
13058 author = {Juang, Philo and Oki, Hidekazu and Wang, Yong and Martonosi, Margaret and Peh, Li Shiuan and Rubenstein, Daniel} 13058 author = {Juang, Philo and Oki, Hidekazu and Wang, Yong and Martonosi, Margaret and Peh, Li Shiuan and Rubenstein, Daniel}
13059} 13059}
13060@conference {687814, 13060@conference {687814,
@@ -13070,7 +13070,7 @@ For a detailed description of our method we assume a cascade of Chaumian MIXes a
13070 isbn = {3-540-44179-4}, 13070 isbn = {3-540-44179-4},
13071 doi = {10.1007/3-540-45748-8}, 13071 doi = {10.1007/3-540-45748-8},
13072 url = {http://www.springerlink.com/content/e1kmcf729e6updgm/}, 13072 url = {http://www.springerlink.com/content/e1kmcf729e6updgm/},
13073 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IPTPS\%2701\%20-\%20Erasure\%20coding\%20vs.\%20replication.pdf}, 13073 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IPTPS\%2701\%20-\%20Erasure\%20coding\%20vs.\%20replication.pdf},
13074 author = {Weatherspoon, Hakim and John Kubiatowicz} 13074 author = {Weatherspoon, Hakim and John Kubiatowicz}
13075} 13075}
13076@booklet {citeulike:1360149, 13076@booklet {citeulike:1360149,
@@ -13079,7 +13079,7 @@ For a detailed description of our method we assume a cascade of Chaumian MIXes a
13079 abstract = {Mojo Nation\&quot;w as a netw ork for robust, decentralized file storage and transfer}, 13079 abstract = {Mojo Nation\&quot;w as a netw ork for robust, decentralized file storage and transfer},
13080 isbn = {3-540-44179-4}, 13080 isbn = {3-540-44179-4},
13081 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.9607}, 13081 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.59.9607},
13082 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Experiences_Deploying_a_Large-Scale_Emergent_Network.pdf}, 13082 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Experiences_Deploying_a_Large-Scale_Emergent_Network.pdf},
13083 author = {O'Hearn, Bryce W.} 13083 author = {O'Hearn, Bryce W.}
13084} 13084}
13085@conference {Castro02exploitingnetwork_0, 13085@conference {Castro02exploitingnetwork_0,
@@ -13091,7 +13091,7 @@ For a detailed description of our method we assume a cascade of Chaumian MIXes a
13091in the different DHT routing protocols. We conclude that proximity neighbor selection, when used in DHTs with prefixbased routing like Pastry and Tapestry, is highly effective and appears to dominate the other approaches}, 13091in the different DHT routing protocols. We conclude that proximity neighbor selection, when used in DHTs with prefixbased routing like Pastry and Tapestry, is highly effective and appears to dominate the other approaches},
13092 www_section = {CAN, distributed hash table, P2P}, 13092 www_section = {CAN, distributed hash table, P2P},
13093 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.3062}, 13093 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.126.3062},
13094 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fudico.pdf}, 13094 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fudico.pdf},
13095 author = {Miguel Castro and Peter Druschel and Y. Charlie Hu} 13095 author = {Miguel Castro and Peter Druschel and Y. Charlie Hu}
13096} 13096}
13097@booklet {Castro02exploitingnetwork, 13097@booklet {Castro02exploitingnetwork,
@@ -13099,7 +13099,7 @@ in the different DHT routing protocols. We conclude that proximity neighbor sele
13099 year = {2002}, 13099 year = {2002},
13100 abstract = {The authors give an overview over various ways to use proximity information to optimize routing in peer-to-peer networks. Their study focuses on Pastry and describe in detail the protocols that are used in Pastry to build routing tables with neighbours that are close in terms of the underlying network. They give some analytical and extensive experimental evidence that the protocols are effective in reducing the length of the routing-path in terms of the link-to-link latency that their implementation uses to measure distance}, 13100 abstract = {The authors give an overview over various ways to use proximity information to optimize routing in peer-to-peer networks. Their study focuses on Pastry and describe in detail the protocols that are used in Pastry to build routing tables with neighbours that are close in terms of the underlying network. They give some analytical and extensive experimental evidence that the protocols are effective in reducing the length of the routing-path in terms of the link-to-link latency that their implementation uses to measure distance},
13101 url = {http://www.research.microsoft.com/~antr/PAST/location.ps }, 13101 url = {http://www.research.microsoft.com/~antr/PAST/location.ps },
13102 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/location.pdf}, 13102 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/location.pdf},
13103 author = {Miguel Castro and Peter Druschel and Y. Charlie Hu and Antony Rowstron} 13103 author = {Miguel Castro and Peter Druschel and Y. Charlie Hu and Antony Rowstron}
13104} 13104}
13105@article {Adya:2002:FFA:844128.844130, 13105@article {Adya:2002:FFA:844128.844130,
@@ -13116,7 +13116,7 @@ in the different DHT routing protocols. We conclude that proximity neighbor sele
13116 issn = {0163-5980}, 13116 issn = {0163-5980},
13117 doi = {http://doi.acm.org/10.1145/844128.844130}, 13117 doi = {http://doi.acm.org/10.1145/844128.844130},
13118 url = {http://doi.acm.org/10.1145/844128.844130}, 13118 url = {http://doi.acm.org/10.1145/844128.844130},
13119 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGOPS\%20-\%20FARSITE.pdf}, 13119 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGOPS\%20-\%20FARSITE.pdf},
13120 author = {Adya, Atul and Bolosky, William J. and Miguel Castro and Cermak, Gerald and Chaiken, Ronnie and John R. Douceur and Howell, Jon and Lorch, Jacob R. and Marvin Theimer and Roger Wattenhofer} 13120 author = {Adya, Atul and Bolosky, William J. and Miguel Castro and Cermak, Gerald and Chaiken, Ronnie and John R. Douceur and Howell, Jon and Lorch, Jacob R. and Marvin Theimer and Roger Wattenhofer}
13121} 13121}
13122@conference {Fu:2002:FSD:505452.505453, 13122@conference {Fu:2002:FSD:505452.505453,
@@ -13136,7 +13136,7 @@ The read-only file system makes the security of published content independent fr
13136 issn = {0734-2071}, 13136 issn = {0734-2071},
13137 doi = {http://doi.acm.org/10.1145/505452.505453}, 13137 doi = {http://doi.acm.org/10.1145/505452.505453},
13138 url = {http://doi.acm.org/10.1145/505452.505453}, 13138 url = {http://doi.acm.org/10.1145/505452.505453},
13139 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/OSDI\%2700\%20-\%20Fast\%20and\%20Secure\%20Distributed\%20Read-Only\%20File\%20System.pdf}, 13139 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/OSDI\%2700\%20-\%20Fast\%20and\%20Secure\%20Distributed\%20Read-Only\%20File\%20System.pdf},
13140 author = {Kevin Fu and Frans M. Kaashoek and David Mazi{\`e}res} 13140 author = {Kevin Fu and Frans M. Kaashoek and David Mazi{\`e}res}
13141} 13141}
13142@conference {hintz02, 13142@conference {hintz02,
@@ -13151,7 +13151,7 @@ The read-only file system makes the security of published content independent fr
13151 isbn = {978-3-540-00565-0}, 13151 isbn = {978-3-540-00565-0},
13152 doi = {10.1007/3-540-36467-6}, 13152 doi = {10.1007/3-540-36467-6},
13153 url = {http://www.springerlink.com/content/c4qwe6d608p2cjyv/}, 13153 url = {http://www.springerlink.com/content/c4qwe6d608p2cjyv/},
13154 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/hintz02.pdf}, 13154 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/hintz02.pdf},
13155 author = {Andrew Hintz}, 13155 author = {Andrew Hintz},
13156 editor = {Roger Dingledine and Paul Syverson} 13156 editor = {Roger Dingledine and Paul Syverson}
13157} 13157}
@@ -13164,7 +13164,7 @@ The read-only file system makes the security of published content independent fr
13164 www_section = {BEC, coding theory, low-density parity-check, maximum-likelihood}, 13164 www_section = {BEC, coding theory, low-density parity-check, maximum-likelihood},
13165 doi = {10.1109/TIT.2002.1003839 }, 13165 doi = {10.1109/TIT.2002.1003839 },
13166 url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1003839}, 13166 url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1003839},
13167 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Finite-length\%20analysis\%20of\%20low-density\%20parity-check\%20codes\%20on.pdf}, 13167 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Finite-length\%20analysis\%20of\%20low-density\%20parity-check\%20codes\%20on.pdf},
13168 author = {Changyan Di and David Proietti and I. Emre Telatar and Thomas J. Richardson and R{\"u}diger L. Urbanke} 13168 author = {Changyan Di and David Proietti and I. Emre Telatar and Thomas J. Richardson and R{\"u}diger L. Urbanke}
13169} 13169}
13170@conference {Dan:SFMix03, 13170@conference {Dan:SFMix03,
@@ -13177,7 +13177,7 @@ The read-only file system makes the security of published content independent fr
13177 abstract = {New threats such as compulsion to reveal logs, secret and private keys as well as to decrypt material are studied in the context of the security of mix networks. After a comparison of this new threat model with the traditional one, a new construction is introduced, the fs-mix, that minimizes the impact that such powers have on the security of the network, by using forward secure communication channels and key updating operation inside the mixes. A discussion about the forward security of these new proposals and some extensions is included}, 13177 abstract = {New threats such as compulsion to reveal logs, secret and private keys as well as to decrypt material are studied in the context of the security of mix networks. After a comparison of this new threat model with the traditional one, a new construction is introduced, the fs-mix, that minimizes the impact that such powers have on the security of the network, by using forward secure communication channels and key updating operation inside the mixes. A discussion about the forward security of these new proposals and some extensions is included},
13178 www_section = {anonymity, forward security, mix, traffic analysis}, 13178 www_section = {anonymity, forward security, mix, traffic analysis},
13179 url = {http://citeseer.ist.psu.edu/533725.html}, 13179 url = {http://citeseer.ist.psu.edu/533725.html},
13180 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Dan-SFMix03.pdf}, 13180 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Dan-SFMix03.pdf},
13181 author = {George Danezis}, 13181 author = {George Danezis},
13182 editor = {Fisher-Hubner, Jonsson} 13182 editor = {Fisher-Hubner, Jonsson}
13183} 13183}
@@ -13193,7 +13193,7 @@ The read-only file system makes the security of published content independent fr
13193 isbn = {978-3-540-00421-9}, 13193 isbn = {978-3-540-00421-9},
13194 doi = {10.1007/3-540-36415-3}, 13194 doi = {10.1007/3-540-36415-3},
13195 url = {http://www.springerlink.com/content/um0kf3dp88b0eg5v/}, 13195 url = {http://www.springerlink.com/content/um0kf3dp88b0eg5v/},
13196 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/trickle02.pdf}, 13196 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/trickle02.pdf},
13197 author = {Andrei Serjantov and Roger Dingledine and Paul Syverson}, 13197 author = {Andrei Serjantov and Roger Dingledine and Paul Syverson},
13198 editor = {Fabien Petitcolas} 13198 editor = {Fabien Petitcolas}
13199} 13199}
@@ -13208,7 +13208,7 @@ The read-only file system makes the security of published content independent fr
13208 keywords = {anonymity, economics, encoding, GNUnet, obsolete database}, 13208 keywords = {anonymity, economics, encoding, GNUnet, obsolete database},
13209 www_tags = selected, 13209 www_tags = selected,
13210 journal = {unknown}, 13210 journal = {unknown},
13211 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/main.pdf}, 13211 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/main.pdf},
13212 author = {Krista Bennett and Tiberius Stef and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu} 13212 author = {Krista Bennett and Tiberius Stef and Christian Grothoff and Tzvetan Horozov and Ioana Patrascu}
13213} 13213}
13214@article {Levine:2002, 13214@article {Levine:2002,
@@ -13222,7 +13222,7 @@ The read-only file system makes the security of published content independent fr
13222 www_section = {anonymity, Hordes, multicast, routing}, 13222 www_section = {anonymity, Hordes, multicast, routing},
13223 issn = {0926-227X}, 13223 issn = {0926-227X},
13224 url = {http://portal.acm.org/citation.cfm?id=603406}, 13224 url = {http://portal.acm.org/citation.cfm?id=603406},
13225 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Levine-2002.pdf}, 13225 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Levine-2002.pdf},
13226 author = {Brian Neil Levine and Clay Shields} 13226 author = {Brian Neil Levine and Clay Shields}
13227} 13227}
13228@conference {DBLP:conf/eurocrypt/RussellW02, 13228@conference {DBLP:conf/eurocrypt/RussellW02,
@@ -13244,7 +13244,7 @@ The read-only file system makes the security of published content independent fr
13244 www_section = {data sharing, model-driven, P2P}, 13244 www_section = {data sharing, model-driven, P2P},
13245 isbn = {0-7695-1582-7}, 13245 isbn = {0-7695-1582-7},
13246 url = {http://portal.acm.org/citation.cfm?id=873217$\#$}, 13246 url = {http://portal.acm.org/citation.cfm?id=873217$\#$},
13247 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.16.909.pdf}, 13247 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.16.909.pdf},
13248 author = {Ranganathan, Kavitha and Iamnitchi, Adriana and Foster, Ian} 13248 author = {Ranganathan, Kavitha and Iamnitchi, Adriana and Foster, Ian}
13249} 13249}
13250@conference {Feamster02infranet:circumventing, 13250@conference {Feamster02infranet:circumventing,
@@ -13269,7 +13269,7 @@ The read-only file system makes the security of published content independent fr
13269 www_section = {censorship resistance, infranet}, 13269 www_section = {censorship resistance, infranet},
13270 isbn = {1-931971-00-5}, 13270 isbn = {1-931971-00-5},
13271 url = {http://portal.acm.org/citation.cfm?id=720281}, 13271 url = {http://portal.acm.org/citation.cfm?id=720281},
13272 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/infranet.pdf}, 13272 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/infranet.pdf},
13273 author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger} 13273 author = {Nick Feamster and Magdalena Balazinska and Greg Harfst and Hari Balakrishnan and David Karger}
13274} 13274}
13275@article {Cao:2002:IPG:508325.508330, 13275@article {Cao:2002:IPG:508325.508330,
@@ -13285,7 +13285,7 @@ The read-only file system makes the security of published content independent fr
13285 www_section = {bargaining problems, cooperative games, leader-follower games, Paris metro pricing, quality of services, two-person nonzero sum games}, 13285 www_section = {bargaining problems, cooperative games, leader-follower games, Paris metro pricing, quality of services, two-person nonzero sum games},
13286 issn = {1063-6692}, 13286 issn = {1063-6692},
13287 url = {http://dl.acm.org/citation.cfm?id=508325.508330}, 13287 url = {http://dl.acm.org/citation.cfm?id=508325.508330},
13288 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IEEE\%E2\%81\%84ACM\%20Trans.\%20Netw.\%2702\%20\%2810\%29-\%20Internet\%20pricing.pdf}, 13288 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IEEE\%E2\%81\%84ACM\%20Trans.\%20Netw.\%2702\%20\%2810\%29-\%20Internet\%20pricing.pdf},
13289 author = {Cao, Xi-Ren and Shen, Hong-Xia and Milito, Rodolfo and Wirth, Patrica} 13289 author = {Cao, Xi-Ren and Shen, Hong-Xia and Milito, Rodolfo and Wirth, Patrica}
13290} 13290}
13291@conference {stepping-stones, 13291@conference {stepping-stones,
@@ -13301,7 +13301,7 @@ The read-only file system makes the security of published content independent fr
13301 isbn = {978-3-540-44345-2}, 13301 isbn = {978-3-540-44345-2},
13302 doi = {10.1007/3-540-45853-0}, 13302 doi = {10.1007/3-540-45853-0},
13303 url = {http://portal.acm.org/citation.cfm?id=699363}, 13303 url = {http://portal.acm.org/citation.cfm?id=699363},
13304 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/2002-08-esorics02-ipd-correlation.pdf}, 13304 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/2002-08-esorics02-ipd-correlation.pdf},
13305 author = {Xinyuan Wang and Douglas S. Reeves and S. Felix Wu} 13305 author = {Xinyuan Wang and Douglas S. Reeves and S. Felix Wu}
13306} 13306}
13307@conference {morphmix:wpes2002, 13307@conference {morphmix:wpes2002,
@@ -13317,7 +13317,7 @@ The read-only file system makes the security of published content independent fr
13317 isbn = {1-58113-633-1}, 13317 isbn = {1-58113-633-1},
13318 doi = {10.1145/644527.644537}, 13318 doi = {10.1145/644527.644537},
13319 url = {http://portal.acm.org/citation.cfm?id=644537}, 13319 url = {http://portal.acm.org/citation.cfm?id=644537},
13320 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/morphmix-wpes2002.pdf}, 13320 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/morphmix-wpes2002.pdf},
13321 author = {Marc Rennhard and Bernhard Plattner} 13321 author = {Marc Rennhard and Bernhard Plattner}
13322} 13322}
13323@booklet {Freedman02introducingtarzan, 13323@booklet {Freedman02introducingtarzan,
@@ -13329,7 +13329,7 @@ The read-only file system makes the security of published content independent fr
13329 abstract = {We introduce Tarzan, a peer-to-peer anonymous network layer that provides generic IP forwarding. Unlike prior anonymizing layers, Tarzan is flexible, transparent, decentralized, and highly scalable. Tarzan achieves these properties by building anonymous IP tunnels between an open-ended set of peers. Tarzan can provide anonymity to existing applications, such as web browsing and file sharing, without change to those applications. Performance tests show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route}, 13329 abstract = {We introduce Tarzan, a peer-to-peer anonymous network layer that provides generic IP forwarding. Unlike prior anonymizing layers, Tarzan is flexible, transparent, decentralized, and highly scalable. Tarzan achieves these properties by building anonymous IP tunnels between an open-ended set of peers. Tarzan can provide anonymity to existing applications, such as web browsing and file sharing, without change to those applications. Performance tests show that Tarzan imposes minimal overhead over a corresponding non-anonymous overlay route},
13330 isbn = {3-540-44179-4}, 13330 isbn = {3-540-44179-4},
13331 url = {http://www.cs.rice.edu/Conferences/IPTPS02/182.pdf}, 13331 url = {http://www.cs.rice.edu/Conferences/IPTPS02/182.pdf},
13332 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/tarzan.pdf}, 13332 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/tarzan.pdf},
13333 author = {Michael J. Freedman and Emil Sit and Josh Cates and Robert Morris} 13333 author = {Michael J. Freedman and Emil Sit and Josh Cates and Robert Morris}
13334} 13334}
13335@booklet {646334, 13335@booklet {646334,
@@ -13350,7 +13350,7 @@ The read-only file system makes the security of published content independent fr
13350 abstract = {Ivy is a multi-user read/write peer-to-peer file system. Ivy has no centralized or dedicated components, and it provides useful integrity properties without requiring users to fully trust either the underlying peer-to-peer storage system or the other users of the file system}, 13350 abstract = {Ivy is a multi-user read/write peer-to-peer file system. Ivy has no centralized or dedicated components, and it provides useful integrity properties without requiring users to fully trust either the underlying peer-to-peer storage system or the other users of the file system},
13351 www_section = {distributed storage, P2P}, 13351 www_section = {distributed storage, P2P},
13352 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.2147}, 13352 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.2147},
13353 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.20.2147.pdf}, 13353 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.20.2147.pdf},
13354 author = {Muthitacharoen, Athicha and Robert Morris and Thomer M. Gil and Bengie Chen} 13354 author = {Muthitacharoen, Athicha and Robert Morris and Thomer M. Gil and Bengie Chen}
13355} 13355}
13356@conference {Maymounkov02kademlia:a, 13356@conference {Maymounkov02kademlia:a,
@@ -13369,7 +13369,7 @@ The read-only file system makes the security of published content independent fr
13369 isbn = {3-540-44179-4}, 13369 isbn = {3-540-44179-4},
13370 doi = {10.1007/3-540-45748-8_5}, 13370 doi = {10.1007/3-540-45748-8_5},
13371 url = {http://www.springerlink.com/content/2ekx2a76ptwd24qt/}, 13371 url = {http://www.springerlink.com/content/2ekx2a76ptwd24qt/},
13372 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/kpos_0.pdf}, 13372 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/kpos_0.pdf},
13373 author = {Petar Maymounkov and David Mazi{\`e}res} 13373 author = {Petar Maymounkov and David Mazi{\`e}res}
13374} 13374}
13375@article {DBLP:journals/ijufks/Sweene02, 13375@article {DBLP:journals/ijufks/Sweene02,
@@ -13391,7 +13391,7 @@ The read-only file system makes the security of published content independent fr
13391 abstract = {Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and communication capabilities. DSNs are dynamic in the sense that they allow addition and deletion of sensor nodes after deployment to grow the network or replace failing and unreliable nodes. DSNs may be deployed in hostile areas where communication is monitored and nodes are subject to capture and surreptitious use by an adversary. Hence DSNs require cryptographic protection of communications, sensorcapture detection, key revocation and sensor disabling. In this paper, we present a key-management scheme designed to satisfy both operational and security requirements of DSNs}, 13391 abstract = {Distributed Sensor Networks (DSNs) are ad-hoc mobile networks that include sensor nodes with limited computation and communication capabilities. DSNs are dynamic in the sense that they allow addition and deletion of sensor nodes after deployment to grow the network or replace failing and unreliable nodes. DSNs may be deployed in hostile areas where communication is monitored and nodes are subject to capture and surreptitious use by an adversary. Hence DSNs require cryptographic protection of communications, sensorcapture detection, key revocation and sensor disabling. In this paper, we present a key-management scheme designed to satisfy both operational and security requirements of DSNs},
13392 www_section = {DNS, mobile Ad-hoc networks}, 13392 www_section = {DNS, mobile Ad-hoc networks},
13393 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.9193}, 13393 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.19.9193},
13394 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.19.9193.pdf}, 13394 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.19.9193.pdf},
13395 author = {Laurent Eschenauer and Virgil D. Gligor} 13395 author = {Laurent Eschenauer and Virgil D. Gligor}
13396} 13396}
13397@conference {limits-open, 13397@conference {limits-open,
@@ -13404,7 +13404,7 @@ The read-only file system makes the security of published content independent fr
13404 abstract = {A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity providing technique is to establish an anonymity set. In open environments, such as the Internet, the established anonymity sets in the whole are observable and change with every anonymous communication. We use this fact of changing anonymity sets and present a model where we can determine the protection limit of an anonymity technique, i.e. the number of observations required for an attacker to break uniquely a given anonymity technique. In this paper, we use the popular MIX method to demonstrate our attack. The MIX method forms the basis of most of the today's deployments of anonymity services (e.g. Freedom, Onion Routing, Webmix). We note that our approach is general and can be applied equally well to other anonymity providing techniques}, 13404 abstract = {A user is only anonymous within a set of other users. Hence, the core functionality of an anonymity providing technique is to establish an anonymity set. In open environments, such as the Internet, the established anonymity sets in the whole are observable and change with every anonymous communication. We use this fact of changing anonymity sets and present a model where we can determine the protection limit of an anonymity technique, i.e. the number of observations required for an attacker to break uniquely a given anonymity technique. In this paper, we use the popular MIX method to demonstrate our attack. The MIX method forms the basis of most of the today's deployments of anonymity services (e.g. Freedom, Onion Routing, Webmix). We note that our approach is general and can be applied equally well to other anonymity providing techniques},
13405 www_section = {anonymity measurement, attack, mix}, 13405 www_section = {anonymity measurement, attack, mix},
13406 url = {http://portal.acm.org/citation.cfm?id=731881}, 13406 url = {http://portal.acm.org/citation.cfm?id=731881},
13407 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/limits-open.pdf}, 13407 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/limits-open.pdf},
13408 author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz}, 13408 author = {Dogan Kesdogan and Dakshi Agrawal and Stefan Penz},
13409 editor = {Fabien Petitcolas} 13409 editor = {Fabien Petitcolas}
13410} 13410}
@@ -13422,7 +13422,7 @@ The read-only file system makes the security of published content independent fr
13422 www_section = {broadcast encryption scheme, encryption, LSD}, 13422 www_section = {broadcast encryption scheme, encryption, LSD},
13423 isbn = {3-540-44050-X}, 13423 isbn = {3-540-44050-X},
13424 url = {http://dl.acm.org/citation.cfm?id=646767.704291}, 13424 url = {http://dl.acm.org/citation.cfm?id=646767.704291},
13425 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CRYPTO\%2702\%20-\%20The\%20LSD\%20broadcast\%20encryption\%20scheme.pdf}, 13425 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CRYPTO\%2702\%20-\%20The\%20LSD\%20broadcast\%20encryption\%20scheme.pdf},
13426 author = {Halevy, Dani and Shamir, Adi} 13426 author = {Halevy, Dani and Shamir, Adi}
13427} 13427}
13428@article {10.1109/SFCS.2002.1181950, 13428@article {10.1109/SFCS.2002.1181950,
@@ -13453,7 +13453,7 @@ Randomized partial checking is particularly well suited for voting systems, as i
13453 www_section = {electronic voting, public verifiability, randomized partial checking, shuffle network}, 13453 www_section = {electronic voting, public verifiability, randomized partial checking, shuffle network},
13454 isbn = {1-931971-00-5}, 13454 isbn = {1-931971-00-5},
13455 url = {http://portal.acm.org/citation.cfm?id=647253.720294}, 13455 url = {http://portal.acm.org/citation.cfm?id=647253.720294},
13456 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/randomized-checking.pdf}, 13456 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/randomized-checking.pdf},
13457 author = {Jakobsson, Markus and Ari Juels and Ron Rivest} 13457 author = {Jakobsson, Markus and Ari Juels and Ron Rivest}
13458} 13458}
13459@article {Thomas:2002:MAO:767821.769444, 13459@article {Thomas:2002:MAO:767821.769444,
@@ -13471,7 +13471,7 @@ Randomized partial checking is particularly well suited for voting systems, as i
13471 issn = {0030-364X}, 13471 issn = {0030-364X},
13472 doi = {10.1287/opre.50.4.603.2862}, 13472 doi = {10.1287/opre.50.4.603.2862},
13473 url = {http://dx.doi.org/10.1287/opre.50.4.603.2862}, 13473 url = {http://dx.doi.org/10.1287/opre.50.4.603.2862},
13474 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Oper.\%20Res.\%20-\%20Optimal\%20Resource\%20Allocation.pdf}, 13474 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Oper.\%20Res.\%20-\%20Optimal\%20Resource\%20Allocation.pdf},
13475 author = {Thomas, Panagiotis and Teneketzis, Demosthenis and MacKie-Mason, Jeffrey K.} 13475 author = {Thomas, Panagiotis and Teneketzis, Demosthenis and MacKie-Mason, Jeffrey K.}
13476} 13476}
13477@conference {Saroiu02ameasurement, 13477@conference {Saroiu02ameasurement,
@@ -13481,7 +13481,7 @@ Randomized partial checking is particularly well suited for voting systems, as i
13481 month = jan, 13481 month = jan,
13482 address = {San Jose}, 13482 address = {San Jose},
13483 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.4223\&rep=rep1\&type=pdf}, 13483 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.61.4223\&rep=rep1\&type=pdf},
13484 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mmcn.pdf}, 13484 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/mmcn.pdf},
13485 author = {Stefan Saroiu and P. Krishna Gummadi and Steven D. Gribble} 13485 author = {Stefan Saroiu and P. Krishna Gummadi and Steven D. Gribble}
13486} 13486}
13487@booklet { dwork02memorybound, 13487@booklet { dwork02memorybound,
@@ -13496,7 +13496,7 @@ We further investigate this intriguing proposal. Specifically, we
134965) Give experimental results showing that our concrete memory-bound function is only about four times slower on a 233 MHz settop box than on a 3.06 GHz workstation, and that speedup of the function is limited even if an adversary knows the access sequence and uses optimal off-line cache replacement}, 134965) Give experimental results showing that our concrete memory-bound function is only about four times slower on a 233 MHz settop box than on a 3.06 GHz workstation, and that speedup of the function is limited even if an adversary knows the access sequence and uses optimal off-line cache replacement},
13497 doi = {10.1007/b11817}, 13497 doi = {10.1007/b11817},
13498 url = {citeseer.ist.psu.edu/dwork02memorybound.html}, 13498 url = {citeseer.ist.psu.edu/dwork02memorybound.html},
13499 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/memory-bound-crypto.pdf}, 13499 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/memory-bound-crypto.pdf},
13500 author = {Cynthia Dwork and Andrew Goldberg and Moni Naor} 13500 author = {Cynthia Dwork and Andrew Goldberg and Moni Naor}
13501} 13501}
13502@book {2002_3, 13502@book {2002_3,
@@ -13511,7 +13511,7 @@ We further investigate this intriguing proposal. Specifically, we
13511 isbn = {978-3-540-44179-3}, 13511 isbn = {978-3-540-44179-3},
13512 doi = {10.1007/3-540-45748-8_13}, 13512 doi = {10.1007/3-540-45748-8_13},
13513 url = {http://dx.doi.org/10.1007/3-540-45748-8_13}, 13513 url = {http://dx.doi.org/10.1007/3-540-45748-8_13},
13514 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/107.pdf}, 13514 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/107.pdf},
13515 author = {Hand, Steven and Roscoe, Timothy}, 13515 author = {Hand, Steven and Roscoe, Timothy},
13516 editor = {Druschel, Peter and Kaashoek, Frans and Rowstron, Antony} 13516 editor = {Druschel, Peter and Kaashoek, Frans and Rowstron, Antony}
13517} 13517}
@@ -13521,7 +13521,7 @@ We further investigate this intriguing proposal. Specifically, we
13521 abstract = {We introduce online codes -- a class of near-optimal codes for a very general loss channel which we call the free channel. Online codes are linear encoding/decoding time codes, based on sparse bipartite graphs, similar to Tornado codes, with a couple of novel properties: local encodability and rateless-ness. Local encodability is the property that each block of the encoding of a message can be computed independently from the others in constant time. This also implies that each encoding block is only dependent on a constant-sized part of the message and a few preprocessed bits. Rateless-ness is the property that each message has an encoding of practically infinite size. We argue that rateless codes are more appropriate than fixed-rate codes for most situations where erasure codes were considered a solution. Furthermore, rateless codes meet new areas of application, where they are not replaceable by fixed-rate codes. One such area is information dispersal over peer-to-peer networks}, 13521 abstract = {We introduce online codes -- a class of near-optimal codes for a very general loss channel which we call the free channel. Online codes are linear encoding/decoding time codes, based on sparse bipartite graphs, similar to Tornado codes, with a couple of novel properties: local encodability and rateless-ness. Local encodability is the property that each block of the encoding of a message can be computed independently from the others in constant time. This also implies that each encoding block is only dependent on a constant-sized part of the message and a few preprocessed bits. Rateless-ness is the property that each message has an encoding of practically infinite size. We argue that rateless codes are more appropriate than fixed-rate codes for most situations where erasure codes were considered a solution. Furthermore, rateless codes meet new areas of application, where they are not replaceable by fixed-rate codes. One such area is information dispersal over peer-to-peer networks},
13522 www_section = {coding theory, local encodability, rateless-ness, sparse bipartite graphs}, 13522 www_section = {coding theory, local encodability, rateless-ness, sparse bipartite graphs},
13523 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.1333}, 13523 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.112.1333},
13524 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.112.1333.pdf}, 13524 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.112.1333.pdf},
13525 author = {Petar Maymounkov} 13525 author = {Petar Maymounkov}
13526} 13526}
13527@article {Sherwood_p5:a, 13527@article {Sherwood_p5:a,
@@ -13534,7 +13534,7 @@ We further investigate this intriguing proposal. Specifically, we
13534 publisher = {IOS Press Amsterdam, The Netherlands}, 13534 publisher = {IOS Press Amsterdam, The Netherlands},
13535 abstract = {We present a protocol for anonymous communication over the Internet. Our protocol, called P (Peer-to-Peer Personal Privacy Protocol) provides sender-, receiver-, and sender-receiver anonymity. P is designed to be implemented over the current Internet protocols, and does not require any special infrastructure support. A novel feature of P is that it allows individual participants to trade-off degree of anonymity for communication efficiency, and hence can be used to scalably implement large anonymous groups. We present a description of P , an analysis of its anonymity and communication efficiency, and evaluate its performance using detailed packet-level simulations}, 13535 abstract = {We present a protocol for anonymous communication over the Internet. Our protocol, called P (Peer-to-Peer Personal Privacy Protocol) provides sender-, receiver-, and sender-receiver anonymity. P is designed to be implemented over the current Internet protocols, and does not require any special infrastructure support. A novel feature of P is that it allows individual participants to trade-off degree of anonymity for communication efficiency, and hence can be used to scalably implement large anonymous groups. We present a description of P , an analysis of its anonymity and communication efficiency, and evaluate its performance using detailed packet-level simulations},
13536 url = { http://www.cs.umd.edu/projects/p5/p5.pdf}, 13536 url = { http://www.cs.umd.edu/projects/p5/p5.pdf},
13537 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p5.pdf}, 13537 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p5.pdf},
13538 author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan} 13538 author = {Rob Sherwood and Bobby Bhattacharjee and Aravind Srinivasan}
13539} 13539}
13540@booklet {Cox02pastiche:making, 13540@booklet {Cox02pastiche:making,
@@ -13543,7 +13543,7 @@ We further investigate this intriguing proposal. Specifically, we
13543 abstract = {Backup is cumbersome and expensive. Individual users almost never back up their data, and backup is a significant cost in large organizations. This paper presents Pastiche, a simple and inexpensive backup system. Pastiche exploits excess disk capacity to perform peer-to-peer backup with no administrative costs. Each node minimizes storage overhead by selecting peers that share a significant amount of data. It is easy for common installations to find suitable peers, and peers with high overlap can be identified with only hundreds of bytes. Pastiche provides mechanisms for confidentiality, integrity, and detection of failed or malicious peers. A Pastiche prototype suffers only 7.4\% overhead for a modified Andrew Benchmark, and restore performance is comparable to cross-machine copy}, 13543 abstract = {Backup is cumbersome and expensive. Individual users almost never back up their data, and backup is a significant cost in large organizations. This paper presents Pastiche, a simple and inexpensive backup system. Pastiche exploits excess disk capacity to perform peer-to-peer backup with no administrative costs. Each node minimizes storage overhead by selecting peers that share a significant amount of data. It is easy for common installations to find suitable peers, and peers with high overlap can be identified with only hundreds of bytes. Pastiche provides mechanisms for confidentiality, integrity, and detection of failed or malicious peers. A Pastiche prototype suffers only 7.4\% overhead for a modified Andrew Benchmark, and restore performance is comparable to cross-machine copy},
13544 www_section = {backup, P2P}, 13544 www_section = {backup, P2P},
13545 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.3254}, 13545 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.15.3254},
13546 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.15.3254.pdf}, 13546 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.15.3254.pdf},
13547 author = {Landon P. Cox and Christopher D. Murray and Brian D. Noble} 13547 author = {Landon P. Cox and Christopher D. Murray and Brian D. Noble}
13548} 13548}
13549@conference {513828, 13549@conference {513828,
@@ -13559,14 +13559,14 @@ We further investigate this intriguing proposal. Specifically, we
13559 isbn = {1-58113-501-7}, 13559 isbn = {1-58113-501-7},
13560 doi = {10.1145/513800.513828}, 13560 doi = {10.1145/513800.513828},
13561 url = {http://portal.acm.org/citation.cfm?id=513828$\#$}, 13561 url = {http://portal.acm.org/citation.cfm?id=513828$\#$},
13562 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/BucheggerL02.pdf}, 13562 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/BucheggerL02.pdf},
13563 author = {Sonja Buchegger and Jean-Yves Le Boudec} 13563 author = {Sonja Buchegger and Jean-Yves Le Boudec}
13564} 13564}
13565@booklet {Minsky02practicalset, 13565@booklet {Minsky02practicalset,
13566 title = {Practical Set Reconciliation}, 13566 title = {Practical Set Reconciliation},
13567 year = {2002}, 13567 year = {2002},
13568 www_section = {set reconciliation}, 13568 www_section = {set reconciliation},
13569 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/practical.pdf}, 13569 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/practical.pdf},
13570 author = {Yaron Minsky and Ari Trachtenberg} 13570 author = {Yaron Minsky and Ari Trachtenberg}
13571} 13571}
13572@conference {fiveyearslater, 13572@conference {fiveyearslater,
@@ -13581,7 +13581,7 @@ We further investigate this intriguing proposal. Specifically, we
13581 isbn = {978-3-540-00565-0}, 13581 isbn = {978-3-540-00565-0},
13582 doi = {10.1007/3-540-36467-6}, 13582 doi = {10.1007/3-540-36467-6},
13583 url = {http://www.springerlink.com/content/740p21gl5a9f640m/}, 13583 url = {http://www.springerlink.com/content/740p21gl5a9f640m/},
13584 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/petfive.pdf}, 13584 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/petfive.pdf},
13585 author = {Ian Goldberg}, 13585 author = {Ian Goldberg},
13586 editor = {Roger Dingledine and Paul Syverson} 13586 editor = {Roger Dingledine and Paul Syverson}
13587} 13587}
@@ -13598,7 +13598,7 @@ We further investigate this intriguing proposal. Specifically, we
13598 www_section = {Bloom filter, document location, document motion, probabilistic location}, 13598 www_section = {Bloom filter, document location, document motion, probabilistic location},
13599 isbn = {0-7803-7476-2 }, 13599 isbn = {0-7803-7476-2 },
13600 doi = {http://dx.doi.org/10.1109/INFCOM.2002.1019375}, 13600 doi = {http://dx.doi.org/10.1109/INFCOM.2002.1019375},
13601 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/INFOCOM\%2702\%20-\%20Probabilistic\%20location\%20and\%20routing.pdf}, 13601 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/INFOCOM\%2702\%20-\%20Probabilistic\%20location\%20and\%20routing.pdf},
13602 author = {Rhea, Sean C. and John Kubiatowicz} 13602 author = {Rhea, Sean C. and John Kubiatowicz}
13603} 13603}
13604@conference {586136, 13604@conference {586136,
@@ -13614,7 +13614,7 @@ We further investigate this intriguing proposal. Specifically, we
13614 isbn = {1-58113-612-9}, 13614 isbn = {1-58113-612-9},
13615 doi = {10.1145/586110.586136}, 13615 doi = {10.1145/586110.586136},
13616 url = {http://portal.acm.org/citation.cfm?id=586110.586136$\#$}, 13616 url = {http://portal.acm.org/citation.cfm?id=586110.586136$\#$},
13617 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p115-daswani_0.pdf}, 13617 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p115-daswani_0.pdf},
13618 author = {Daswani, Neil and Hector Garcia-Molina} 13618 author = {Daswani, Neil and Hector Garcia-Molina}
13619} 13619}
13620@conference {Douceur:2002:RSD:850928.851884, 13620@conference {Douceur:2002:RSD:850928.851884,
@@ -13632,7 +13632,7 @@ We further investigate this intriguing proposal. Specifically, we
13632 isbn = {0-7695-1585-1}, 13632 isbn = {0-7695-1585-1},
13633 doi = {http://dx.doi.org/10.1109/ICDCS.2002.1022312}, 13633 doi = {http://dx.doi.org/10.1109/ICDCS.2002.1022312},
13634 url = {http://dl.acm.org/citation.cfm?id=850928.851884}, 13634 url = {http://dl.acm.org/citation.cfm?id=850928.851884},
13635 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ICDCS\%2702\%20-\%20Reclaiming\%20space\%20for\%20duplicate\%20files.pdf}, 13635 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ICDCS\%2702\%20-\%20Reclaiming\%20space\%20for\%20duplicate\%20files.pdf},
13636 author = {John R. Douceur and Adya, Atul and Bolosky, William J. and Simon, Dan and Marvin Theimer} 13636 author = {John R. Douceur and Adya, Atul and Bolosky, William J. and Simon, Dan and Marvin Theimer}
13637} 13637}
13638@conference {Dingledine02reliablemix, 13638@conference {Dingledine02reliablemix,
@@ -13643,7 +13643,7 @@ We further investigate this intriguing proposal. Specifically, we
13643 organization = {Springer Verlag}, 13643 organization = {Springer Verlag},
13644 abstract = {We describe a MIX cascade protocol and a reputation system that together increase the reliability of a network of MIX cascades. In our protocol, MIX nodes periodically generate a communally random seed that, along with their reputations, determines cascade configuration}, 13644 abstract = {We describe a MIX cascade protocol and a reputation system that together increase the reliability of a network of MIX cascades. In our protocol, MIX nodes periodically generate a communally random seed that, along with their reputations, determines cascade configuration},
13645 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.19.9316\&rep=rep1\&type=pdf}, 13645 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.19.9316\&rep=rep1\&type=pdf},
13646 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.19.9316.pdf}, 13646 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.19.9316.pdf},
13647 author = {Roger Dingledine and Paul Syverson} 13647 author = {Roger Dingledine and Paul Syverson}
13648} 13648}
13649@conference {casc-rep, 13649@conference {casc-rep,
@@ -13658,7 +13658,7 @@ We further investigate this intriguing proposal. Specifically, we
13658 isbn = {978-3-540-00646-6}, 13658 isbn = {978-3-540-00646-6},
13659 doi = {10.1007/3-540-36504-4}, 13659 doi = {10.1007/3-540-36504-4},
13660 url = {http://www.springerlink.com/content/g67u25lm80234qj4/}, 13660 url = {http://www.springerlink.com/content/g67u25lm80234qj4/},
13661 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/casc-rep.pdf}, 13661 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/casc-rep.pdf},
13662 author = {Roger Dingledine and Paul Syverson}, 13662 author = {Roger Dingledine and Paul Syverson},
13663 editor = {Matt Blaze} 13663 editor = {Matt Blaze}
13664} 13664}
@@ -13674,7 +13674,7 @@ We further investigate this intriguing proposal. Specifically, we
13674 address = {Pittsburgh}, 13674 address = {Pittsburgh},
13675 abstract = {The Peer-to-Peer (P2P) architectures that are most prevalent in today's Internet are decentralized and unstructured. Search is blind in that it is independent of the query and is thus not more effective than probing randomly chosen peers. One technique to improve the effectiveness of blind search is to proactively replicate data}, 13675 abstract = {The Peer-to-Peer (P2P) architectures that are most prevalent in today's Internet are decentralized and unstructured. Search is blind in that it is independent of the query and is thus not more effective than probing randomly chosen peers. One technique to improve the effectiveness of blind search is to proactively replicate data},
13676 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.19.9873\&rep=rep1\&type=pdf}, 13676 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.19.9873\&rep=rep1\&type=pdf},
13677 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/replication.pdf}, 13677 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/replication.pdf},
13678 author = {Edith Cohen and S Shenker} 13678 author = {Edith Cohen and S Shenker}
13679} 13679}
13680@conference {Damiani02areputation-based_0, 13680@conference {Damiani02areputation-based_0,
@@ -13713,7 +13713,7 @@ We further investigate this intriguing proposal. Specifically, we
13713 isbn = {978-3-540-00420-2}, 13713 isbn = {978-3-540-00420-2},
13714 doi = {10.1007/3-540-36413-7}, 13714 doi = {10.1007/3-540-36413-7},
13715 url = {http://www.springerlink.com/content/9bnlbf2e2lp9u9p4/}, 13715 url = {http://www.springerlink.com/content/9bnlbf2e2lp9u9p4/},
13716 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/BS.pdf}, 13716 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/BS.pdf},
13717 author = {Amos Beimel and Yoav Stahl} 13717 author = {Amos Beimel and Yoav Stahl}
13718} 13718}
13719@conference {633045, 13719@conference {633045,
@@ -13729,7 +13729,7 @@ We further investigate this intriguing proposal. Specifically, we
13729 isbn = {1-58113-570-X}, 13729 isbn = {1-58113-570-X},
13730 doi = {10.1145/633025.633045}, 13730 doi = {10.1145/633025.633045},
13731 url = {http://portal.acm.org/citation.cfm?id=633045$\#$}, 13731 url = {http://portal.acm.org/citation.cfm?id=633045$\#$},
13732 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/sigcomm02.pdf}, 13732 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/sigcomm02.pdf},
13733 author = {Banerjee, Suman and Bobby Bhattacharjee and Kommareddy, Christopher} 13733 author = {Banerjee, Suman and Bobby Bhattacharjee and Kommareddy, Christopher}
13734} 13734}
13735@mastersthesis {937250, 13735@mastersthesis {937250,
@@ -13740,7 +13740,7 @@ We further investigate this intriguing proposal. Specifically, we
13740 type = {phd}, 13740 type = {phd},
13741 www_section = {CAN, distributed hash table}, 13741 www_section = {CAN, distributed hash table},
13742 url = {www.icir.org/sylvia/thesis.ps}, 13742 url = {www.icir.org/sylvia/thesis.ps},
13743 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/can.pdf}, 13743 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/can.pdf},
13744 author = {Sylvia Paul Ratnasamy} 13744 author = {Sylvia Paul Ratnasamy}
13745} 13745}
13746@article {Castro02scribe:a, 13746@article {Castro02scribe:a,
@@ -13752,7 +13752,7 @@ We further investigate this intriguing proposal. Specifically, we
13752 abstract = {This paper presents Scribe, a scalable application-level multicast infrastructure. Scribe supports large numbers of groups, with a potentially large number of members per group. Scribe is built on top of Pastry, a generic peer-to-peer object location and routing substrate overlayed on the Internet, and leverages Pastry's reliability, self-organization, and locality properties. Pastry is used to create and manage groups and to build efficient multicast trees for the dissemination of messages to each group. Scribe provides best-effort reliability guarantees, but we outline how an application can extend Scribe to provide stronger reliability. Simulation results, based on a realistic network topology model, show that Scribe scales across a wide range of groups and group sizes. Also, it balances the load on the nodes while achieving acceptable delay and link stress when compared to IP multicast}, 13752 abstract = {This paper presents Scribe, a scalable application-level multicast infrastructure. Scribe supports large numbers of groups, with a potentially large number of members per group. Scribe is built on top of Pastry, a generic peer-to-peer object location and routing substrate overlayed on the Internet, and leverages Pastry's reliability, self-organization, and locality properties. Pastry is used to create and manage groups and to build efficient multicast trees for the dissemination of messages to each group. Scribe provides best-effort reliability guarantees, but we outline how an application can extend Scribe to provide stronger reliability. Simulation results, based on a realistic network topology model, show that Scribe scales across a wide range of groups and group sizes. Also, it balances the load on the nodes while achieving acceptable delay and link stress when compared to IP multicast},
13753 www_section = {distributed hash table, multicast, Scribe}, 13753 www_section = {distributed hash table, multicast, Scribe},
13754 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.20.299\&rep=rep1\&type=pdf}, 13754 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.20.299\&rep=rep1\&type=pdf},
13755 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/jsac.pdf}, 13755 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/jsac.pdf},
13756 author = {Miguel Castro and Peter Druschel and Anne-Marie Kermarrec and Antony Rowstron} 13756 author = {Miguel Castro and Peter Druschel and Anne-Marie Kermarrec and Antony Rowstron}
13757} 13757}
13758@conference {Douceur:2002:SDS:784592.784803, 13758@conference {Douceur:2002:SDS:784592.784803,
@@ -13770,7 +13770,7 @@ We further investigate this intriguing proposal. Specifically, we
13770 isbn = {0-7695-1828-1}, 13770 isbn = {0-7695-1828-1},
13771 doi = {http://dx.doi.org/10.1109/CSAC.2002.1176289}, 13771 doi = {http://dx.doi.org/10.1109/CSAC.2002.1176289},
13772 url = {http://dl.acm.org/citation.cfm?id=784592.784803}, 13772 url = {http://dl.acm.org/citation.cfm?id=784592.784803},
13773 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ACSAC\%2702\%20-\%20A\%20secure\%20directory\%20service\%20based\%20on\%20exclusive\%20encryption.pdf}, 13773 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ACSAC\%2702\%20-\%20A\%20secure\%20directory\%20service\%20based\%20on\%20exclusive\%20encryption.pdf},
13774 author = {John R. Douceur and Adya, Atul and Benaloh, Josh and Bolosky, William J. and Yuval, Gideon} 13774 author = {John R. Douceur and Adya, Atul and Benaloh, Josh and Bolosky, William J. and Yuval, Gideon}
13775} 13775}
13776@article {844156, 13776@article {844156,
@@ -13787,7 +13787,7 @@ We further investigate this intriguing proposal. Specifically, we
13787 issn = {0163-5980}, 13787 issn = {0163-5980},
13788 doi = {10.1145/844128.844156}, 13788 doi = {10.1145/844128.844156},
13789 url = {http://portal.acm.org/citation.cfm?id=844156$\#$}, 13789 url = {http://portal.acm.org/citation.cfm?id=844156$\#$},
13790 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/osdi2002.pdf}, 13790 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/osdi2002.pdf},
13791 author = {Miguel Castro and Peter Druschel and Ganesh, Ayalvadi and Antony Rowstron and Dan S. Wallach} 13791 author = {Miguel Castro and Peter Druschel and Ganesh, Ayalvadi and Antony Rowstron and Dan S. Wallach}
13792} 13792}
13793@conference {Karlof02securerouting, 13793@conference {Karlof02securerouting,
@@ -13798,7 +13798,7 @@ We further investigate this intriguing proposal. Specifically, we
13798 abstract = {We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks --- sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks}, 13798 abstract = {We consider routing security in wireless sensor networks. Many sensor network routing protocols have been proposed, but none of them have been designed with security as a goal. We propose security goals for routing in sensor networks, show how attacks against ad-hoc and peer-to-peer networks can be adapted into powerful attacks against sensor networks, introduce two classes of novel attacks against sensor networks --- sinkholes and HELLO floods, and analyze the security of all the major sensor network routing protocols. We describe crippling attacks against all of them and suggest countermeasures and design considerations. This is the first such analysis of secure routing in sensor networks},
13799 www_section = {ad-hoc networks, P2P, sensor networks}, 13799 www_section = {ad-hoc networks, P2P, sensor networks},
13800 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.4672}, 13800 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.13.4672},
13801 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/sensor-route-security_0.pdf}, 13801 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/sensor-route-security_0.pdf},
13802 author = {Chris Karlof and David Wagner} 13802 author = {Chris Karlof and David Wagner}
13803} 13803}
13804@conference {687810, 13804@conference {687810,
@@ -13813,7 +13813,7 @@ We further investigate this intriguing proposal. Specifically, we
13813 www_section = {distributed hash table, P2P}, 13813 www_section = {distributed hash table, P2P},
13814 isbn = {3-540-44179-4}, 13814 isbn = {3-540-44179-4},
13815 url = {http://portal.acm.org/citation.cfm?id=687810$\#$}, 13815 url = {http://portal.acm.org/citation.cfm?id=687810$\#$},
13816 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/173.pdf}, 13816 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/173.pdf},
13817 author = {Emil Sit and Robert Morris} 13817 author = {Emil Sit and Robert Morris}
13818} 13818}
13819@conference {camenisch2002ssep, 13819@conference {camenisch2002ssep,
@@ -13828,7 +13828,7 @@ We further investigate this intriguing proposal. Specifically, we
13828 isbn = {978-3-540-00420-2}, 13828 isbn = {978-3-540-00420-2},
13829 doi = {10.1007/3-540-36413-7}, 13829 doi = {10.1007/3-540-36413-7},
13830 url = {http://www.springerlink.com/content/r66ywt172y06g5qr/}, 13830 url = {http://www.springerlink.com/content/r66ywt172y06g5qr/},
13831 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/camenisch2002ssep.pdf}, 13831 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/camenisch2002ssep.pdf},
13832 author = {Jan Camenisch and Anna Lysyanskaya} 13832 author = {Jan Camenisch and Anna Lysyanskaya}
13833} 13833}
13834@conference {Byers02simpleload, 13834@conference {Byers02simpleload,
@@ -13840,7 +13840,7 @@ We further investigate this intriguing proposal. Specifically, we
13840 www_section = {distributed hash table, load balancing}, 13840 www_section = {distributed hash table, load balancing},
13841 doi = {10.1007/b11823}, 13841 doi = {10.1007/b11823},
13842 url = {http://www.springerlink.com/content/r9r4qcqxc2bmfqmr/}, 13842 url = {http://www.springerlink.com/content/r9r4qcqxc2bmfqmr/},
13843 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.12.277.pdf}, 13843 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.12.277.pdf},
13844 author = {Byers, John W. and Jeffrey Considine and Michael Mitzenmacher} 13844 author = {Byers, John W. and Jeffrey Considine and Michael Mitzenmacher}
13845} 13845}
13846@conference {Capkun02smallworlds, 13846@conference {Capkun02smallworlds,
@@ -13855,7 +13855,7 @@ We further investigate this intriguing proposal. Specifically, we
13855 isbn = {1-58113-598-X}, 13855 isbn = {1-58113-598-X},
13856 doi = {10.1145/844102.844108}, 13856 doi = {10.1145/844102.844108},
13857 url = {http://portal.acm.org/citation.cfm?id=844102.844108}, 13857 url = {http://portal.acm.org/citation.cfm?id=844102.844108},
13858 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.12.5408.pdf}, 13858 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.12.5408.pdf},
13859 author = {Srdan Capkun and Levente Butty{\'a}n and Jean-Pierre Hubaux} 13859 author = {Srdan Capkun and Levente Butty{\'a}n and Jean-Pierre Hubaux}
13860} 13860}
13861@article {567178, 13861@article {567178,
@@ -13886,7 +13886,7 @@ We further investigate this intriguing proposal. Specifically, we
13886 www_section = {encryption, privacy}, 13886 www_section = {encryption, privacy},
13887 isbn = {0-7695-1543-6}, 13887 isbn = {0-7695-1543-6},
13888 url = {http://portal.acm.org/citation.cfm?id=830535}, 13888 url = {http://portal.acm.org/citation.cfm?id=830535},
13889 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/tr-2002-23.pdf}, 13889 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/tr-2002-23.pdf},
13890 author = {Qixiang Sun and Daniel R. Simon and Yi-Min Wang and Wilf Russell and Venkata N. Padmanabhan and Lili Qiu} 13890 author = {Qixiang Sun and Daniel R. Simon and Yi-Min Wang and Wilf Russell and Venkata N. Padmanabhan and Lili Qiu}
13891} 13891}
13892@booklet {Montenegro02statisticallyunique, 13892@booklet {Montenegro02statisticallyunique,
@@ -13894,7 +13894,7 @@ We further investigate this intriguing proposal. Specifically, we
13894 year = {2002}, 13894 year = {2002},
13895 abstract = {This paper addresses the identifier ownership problem. It does so by using characteristics of Statistic Uniqueness and Cryptographic Verifiability (SUCV) of certain entities which this document calls SUCV Identifiers and Addresses. Their characteristics allow them to severely limit certain classes of denial of service attacks and hijacking attacks. SUCV addresses are particularly applicable to solve the address ownership problem that hinders mechanisms like Binding Updates in Mobile IPv6}, 13895 abstract = {This paper addresses the identifier ownership problem. It does so by using characteristics of Statistic Uniqueness and Cryptographic Verifiability (SUCV) of certain entities which this document calls SUCV Identifiers and Addresses. Their characteristics allow them to severely limit certain classes of denial of service attacks and hijacking attacks. SUCV addresses are particularly applicable to solve the address ownership problem that hinders mechanisms like Binding Updates in Mobile IPv6},
13896 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.1456}, 13896 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.16.1456},
13897 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.16.1456.pdf}, 13897 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.16.1456.pdf},
13898 author = {Gabriel Montenegro} 13898 author = {Gabriel Montenegro}
13899} 13899}
13900@conference {wallach02p2psecurity, 13900@conference {wallach02p2psecurity,
@@ -13905,7 +13905,7 @@ We further investigate this intriguing proposal. Specifically, we
13905 abstract = { Peer-to-peer (p2p) networking technologies have gained popularity as a mechanism for users to share files without the need for centralized servers. A p2p network provides a scalable and fault-tolerant mechanism to locate nodes anywhere on a network without maintaining a large amount of routing state. This allows for a variety of applications beyond simple file sharing. Examples include multicast systems, anonymous communications systems, and web caches. We survey security issues that occur in the underlying p2p routing protocols, as well as fairness and trust issues that occur in file sharing and other p2p applications. We discuss how techniques, ranging from cryptography, to random network probing, to economic incentives, can be used to address these problems}, 13905 abstract = { Peer-to-peer (p2p) networking technologies have gained popularity as a mechanism for users to share files without the need for centralized servers. A p2p network provides a scalable and fault-tolerant mechanism to locate nodes anywhere on a network without maintaining a large amount of routing state. This allows for a variety of applications beyond simple file sharing. Examples include multicast systems, anonymous communications systems, and web caches. We survey security issues that occur in the underlying p2p routing protocols, as well as fairness and trust issues that occur in file sharing and other p2p applications. We discuss how techniques, ranging from cryptography, to random network probing, to economic incentives, can be used to address these problems},
13906 www_section = {cryptography, P2P, routing, security policy}, 13906 www_section = {cryptography, P2P, routing, security policy},
13907 url = {http://springerlink.metapress.com/openurl.asp?genre=article\&issn=0302-9743\&volume=2609\&spage=42}, 13907 url = {http://springerlink.metapress.com/openurl.asp?genre=article\&issn=0302-9743\&volume=2609\&spage=42},
13908 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.84.9197.pdf}, 13908 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.84.9197.pdf},
13909 author = {Dan S. Wallach} 13909 author = {Dan S. Wallach}
13910} 13910}
13911@article {568525, 13911@article {568525,
@@ -13922,7 +13922,7 @@ We further investigate this intriguing proposal. Specifically, we
13922 issn = {0360-0300}, 13922 issn = {0360-0300},
13923 doi = {10.1145/568522.568525}, 13923 doi = {10.1145/568522.568525},
13924 url = {http://portal.acm.org/citation.cfm?id=568522.568525$\#$}, 13924 url = {http://portal.acm.org/citation.cfm?id=568522.568525$\#$},
13925 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CMU-CS-99-148.pdf}, 13925 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CMU-CS-99-148.pdf},
13926 author = {Mootaz Elnozahy and Lorenzo Alvisi and Yi-Min Wang and Johnson, David B.} 13926 author = {Mootaz Elnozahy and Lorenzo Alvisi and Yi-Min Wang and Johnson, David B.}
13927} 13927}
13928@conference {Douceur:2002:SA:646334.687813, 13928@conference {Douceur:2002:SA:646334.687813,
@@ -13939,7 +13939,7 @@ We further investigate this intriguing proposal. Specifically, we
13939 www_section = {attack, peer-to-peer networking, security threat, Sybil attack}, 13939 www_section = {attack, peer-to-peer networking, security threat, Sybil attack},
13940 isbn = {3-540-44179-4}, 13940 isbn = {3-540-44179-4},
13941 url = {http://dl.acm.org/citation.cfm?id=646334.687813}, 13941 url = {http://dl.acm.org/citation.cfm?id=646334.687813},
13942 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IPTPS\%2702\%20-\%20Douceur\%20-\%20The\%20Sybil\%20Attack.pdf}, 13942 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IPTPS\%2702\%20-\%20Douceur\%20-\%20The\%20Sybil\%20Attack.pdf},
13943 author = {John R. Douceur} 13943 author = {John R. Douceur}
13944} 13944}
13945@conference {tarzan:ccs02, 13945@conference {tarzan:ccs02,
@@ -13955,7 +13955,7 @@ We further investigate this intriguing proposal. Specifically, we
13955 isbn = {1-58113-612-9}, 13955 isbn = {1-58113-612-9},
13956 doi = {10.1145/586110.586137}, 13956 doi = {10.1145/586110.586137},
13957 url = {http://portal.acm.org/citation.cfm?id=586137}, 13957 url = {http://portal.acm.org/citation.cfm?id=586137},
13958 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/tarzan-ccs02.pdf}, 13958 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/tarzan-ccs02.pdf},
13959 author = {Michael J. Freedman and Robert Morris} 13959 author = {Michael J. Freedman and Robert Morris}
13960} 13960}
13961@article {Clifton:2002:TPP:772862.772867, 13961@article {Clifton:2002:TPP:772862.772867,
@@ -13973,7 +13973,7 @@ We further investigate this intriguing proposal. Specifically, we
13973 issn = {1931-0145}, 13973 issn = {1931-0145},
13974 doi = {10.1145/772862.772867}, 13974 doi = {10.1145/772862.772867},
13975 url = {http://doi.acm.org/10.1145/772862.772867}, 13975 url = {http://doi.acm.org/10.1145/772862.772867},
13976 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGKDD\%20Explor.\%20Newsl.\%20-\%20Distributed\%20data\%20mining.pdf}, 13976 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGKDD\%20Explor.\%20Newsl.\%20-\%20Distributed\%20data\%20mining.pdf},
13977 author = {Clifton, Chris and Kantarcioglu, Murat and Vaidya, Jaideep and Lin, Xiaodong and Zhu, Michael Y.} 13977 author = {Clifton, Chris and Kantarcioglu, Murat and Vaidya, Jaideep and Lin, Xiaodong and Zhu, Michael Y.}
13978} 13978}
13979@booklet {Serjantov02towardsan, 13979@booklet {Serjantov02towardsan,
@@ -13986,7 +13986,7 @@ We further investigate this intriguing proposal. Specifically, we
13986 abstract = {In this paper we look closely at the popular metric of anonymity, the anonymity set, and point out a number of problems associated with it. We then propose an alternative information theoretic measure of anonymity which takes into account the probabilities of users sending and receiving the messages and show how to calculate it for a message in a standard mix-based anonymity system. We also use our metric to compare a pool mix to a traditional threshold mix, which was impossible using anonymity sets. We also show how the maximum route length restriction which exists in some fielded anonymity systems can lead to the attacker performing more powerful traffic analysis. Finally, we discuss open problems and future work on anonymity measurements}, 13986 abstract = {In this paper we look closely at the popular metric of anonymity, the anonymity set, and point out a number of problems associated with it. We then propose an alternative information theoretic measure of anonymity which takes into account the probabilities of users sending and receiving the messages and show how to calculate it for a message in a standard mix-based anonymity system. We also use our metric to compare a pool mix to a traditional threshold mix, which was impossible using anonymity sets. We also show how the maximum route length restriction which exists in some fielded anonymity systems can lead to the attacker performing more powerful traffic analysis. Finally, we discuss open problems and future work on anonymity measurements},
13987 isbn = {978-3-540-00565-0 }, 13987 isbn = {978-3-540-00565-0 },
13988 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.12.5992\&rep=rep1\&type=url\&i=0}, 13988 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.12.5992\&rep=rep1\&type=url\&i=0},
13989 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/set.dvi_.pdf}, 13989 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/set.dvi_.pdf},
13990 author = {Andrei Serjantov and George Danezis} 13990 author = {Andrei Serjantov and George Danezis}
13991} 13991}
13992@conference {Serj02, 13992@conference {Serj02,
@@ -14001,7 +14001,7 @@ We further investigate this intriguing proposal. Specifically, we
14001 isbn = {978-3-540-00565-0}, 14001 isbn = {978-3-540-00565-0},
14002 doi = {10.1007/3-540-36467-6}, 14002 doi = {10.1007/3-540-36467-6},
14003 url = {http://www.springerlink.com/content/wwe2c7g3hmwn0klf/}, 14003 url = {http://www.springerlink.com/content/wwe2c7g3hmwn0klf/},
14004 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.12.5992.pdf}, 14004 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.12.5992.pdf},
14005 author = {Andrei Serjantov and George Danezis}, 14005 author = {Andrei Serjantov and George Danezis},
14006 editor = {Roger Dingledine and Paul Syverson} 14006 editor = {Roger Dingledine and Paul Syverson}
14007} 14007}
@@ -14011,7 +14011,7 @@ We further investigate this intriguing proposal. Specifically, we
14011 publisher = {Springer-Verlag}, 14011 publisher = {Springer-Verlag},
14012 abstract = {This paper introduces an information theoretic model that allows to quantify the degree of anonymity provided by schemes for anonymous connections. It considers attackers that obtain probabilistic information about users. The degree is based on the probabilities an attacker, after observing the system, assigns to the dierent users of the system as being the originators of a message. As a proof of concept, the model is applied to some existing systems. The model is shown to be very useful for evaluating the level of privacy a system provides under various attack scenarios, for measuring the amount of information an attacker gets with a particular attack and for comparing dierent systems amongst each other}, 14012 abstract = {This paper introduces an information theoretic model that allows to quantify the degree of anonymity provided by schemes for anonymous connections. It considers attackers that obtain probabilistic information about users. The degree is based on the probabilities an attacker, after observing the system, assigns to the dierent users of the system as being the originators of a message. As a proof of concept, the model is applied to some existing systems. The model is shown to be very useful for evaluating the level of privacy a system provides under various attack scenarios, for measuring the amount of information an attacker gets with a particular attack and for comparing dierent systems amongst each other},
14013 url = {http://www.cosic.esat.kuleuven.be/publications/article-89.pdf}, 14013 url = {http://www.cosic.esat.kuleuven.be/publications/article-89.pdf},
14014 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/anonimity.pdf}, 14014 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/anonimity.pdf},
14015 author = {Claudia Diaz and Stefaan Seys and Joris Claessens and Bart Preneel} 14015 author = {Claudia Diaz and Stefaan Seys and Joris Claessens and Bart Preneel}
14016} 14016}
14017@conference {Diaz02, 14017@conference {Diaz02,
@@ -14026,7 +14026,7 @@ We further investigate this intriguing proposal. Specifically, we
14026 isbn = {978-3-540-00565-0}, 14026 isbn = {978-3-540-00565-0},
14027 doi = {10.1007/3-540-36467-6}, 14027 doi = {10.1007/3-540-36467-6},
14028 url = {http://www.springerlink.com/content/3qb837jkpgukc6b5/}, 14028 url = {http://www.springerlink.com/content/3qb837jkpgukc6b5/},
14029 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/article-89.pdf}, 14029 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/article-89.pdf},
14030 author = {Claudia Diaz and Stefaan Seys and Joris Claessens and Bart Preneel}, 14030 author = {Claudia Diaz and Stefaan Seys and Joris Claessens and Bart Preneel},
14031 editor = {Roger Dingledine and Paul Syverson} 14031 editor = {Roger Dingledine and Paul Syverson}
14032} 14032}
@@ -14043,7 +14043,7 @@ We further investigate this intriguing proposal. Specifically, we
14043 isbn = {1-58113-570-X}, 14043 isbn = {1-58113-570-X},
14044 doi = {10.1145/633025.633027}, 14044 doi = {10.1145/633025.633027},
14045 url = {http://portal.acm.org/citation.cfm?id=633027$\#$}, 14045 url = {http://portal.acm.org/citation.cfm?id=633027$\#$},
14046 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/bgpmisconfig.pdf}, 14046 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/bgpmisconfig.pdf},
14047 author = {Mahajan, Ratul and Wetherall, David and Anderson, Thomas} 14047 author = {Mahajan, Ratul and Wetherall, David and Anderson, Thomas}
14048} 14048}
14049@conference {kesdogan:pet2002, 14049@conference {kesdogan:pet2002,
@@ -14056,7 +14056,7 @@ We further investigate this intriguing proposal. Specifically, we
14056 abstract = {The technique Private Information Retrieval (PIR) perfectly protects a user's access pattern to a database. An attacker cannot observe (or determine) which data element is requested by a user and so cannot deduce the interest of the user. We discuss the application of PIR on the World Wide Web and compare it to the MIX approach. We demonstrate particularly that in this context the method does not provide perfect security, and we give a mathematical model for the amount of information an attacker could obtain. We provide an extension of the method under which perfect security can still be achieved}, 14056 abstract = {The technique Private Information Retrieval (PIR) perfectly protects a user's access pattern to a database. An attacker cannot observe (or determine) which data element is requested by a user and so cannot deduce the interest of the user. We discuss the application of PIR on the World Wide Web and compare it to the MIX approach. We demonstrate particularly that in this context the method does not provide perfect security, and we give a mathematical model for the amount of information an attacker could obtain. We provide an extension of the method under which perfect security can still be achieved},
14057 www_section = {private information retrieval}, 14057 www_section = {private information retrieval},
14058 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.7678}, 14058 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.80.7678},
14059 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PIR_Kesdogan.pdf}, 14059 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PIR_Kesdogan.pdf},
14060 author = {Dogan Kesdogan and Mark Borning and Michael Schmeink}, 14060 author = {Dogan Kesdogan and Mark Borning and Michael Schmeink},
14061 editor = {Roger Dingledine and Paul Syverson} 14061 editor = {Roger Dingledine and Paul Syverson}
14062} 14062}
@@ -14072,7 +14072,7 @@ We further investigate this intriguing proposal. Specifically, we
14072 www_section = {backup, file systems, network storage}, 14072 www_section = {backup, file systems, network storage},
14073 isbn = {1-880446-03-0}, 14073 isbn = {1-880446-03-0},
14074 url = {http://portal.acm.org/citation.cfm?id=651321$\#$}, 14074 url = {http://portal.acm.org/citation.cfm?id=651321$\#$},
14075 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/venti-fast.pdf}, 14075 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/venti-fast.pdf},
14076 author = {Quinlan, Sean and Dorward, Sean} 14076 author = {Quinlan, Sean and Dorward, Sean}
14077} 14077}
14078@conference {571857, 14078@conference {571857,
@@ -14088,7 +14088,7 @@ We further investigate this intriguing proposal. Specifically, we
14088 isbn = {1-58113-485-1}, 14088 isbn = {1-58113-485-1},
14089 doi = {10.1145/571825.571857}, 14089 doi = {10.1145/571825.571857},
14090 url = {http://portal.acm.org/citation.cfm?id=571857$\#$}, 14090 url = {http://portal.acm.org/citation.cfm?id=571857$\#$},
14091 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/viceroy.pdf}, 14091 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/viceroy.pdf},
14092 author = {Malkhi, Dahlia and Moni Naor and Ratajczak, David} 14092 author = {Malkhi, Dahlia and Moni Naor and Ratajczak, David}
14093} 14093}
14094@booklet {Hall01onalgorithms, 14094@booklet {Hall01onalgorithms,
@@ -14096,7 +14096,7 @@ We further investigate this intriguing proposal. Specifically, we
14096 year = {2001}, 14096 year = {2001},
14097 abstract = {The data migration problem is the problem of computing an efficient plan for moving data stored on devices in a network from one configuration to another. Load balancing or changing usage patterns could necessitate such a rearrangement of data. In this paper, we consider the case where the objects are fixed-size and the network is complete. The direct migration problem is closely related to edge-coloring. However, because there are space constraints on the devices, the problem is more complex. Our main results are polynomial time algorithms for finding a near-optimal migration plan in the presence of space constraints when a certain number of additional nodes is available as temporary storage, and a 3/2-approximation for the case where data must be migrated directly to its destination}, 14097 abstract = {The data migration problem is the problem of computing an efficient plan for moving data stored on devices in a network from one configuration to another. Load balancing or changing usage patterns could necessitate such a rearrangement of data. In this paper, we consider the case where the objects are fixed-size and the network is complete. The direct migration problem is closely related to edge-coloring. However, because there are space constraints on the devices, the problem is more complex. Our main results are polynomial time algorithms for finding a near-optimal migration plan in the presence of space constraints when a certain number of additional nodes is available as temporary storage, and a 3/2-approximation for the case where data must be migrated directly to its destination},
14098 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.26.1365\&rep=rep1\&type=pdf}, 14098 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.26.1365\&rep=rep1\&type=pdf},
14099 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.26.1365.pdf}, 14099 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.26.1365.pdf},
14100 author = {Joseph Hall and Jason D. Hartline and Anna R. Karlin and Jared Saia and John Wilkes} 14100 author = {Joseph Hall and Jason D. Hartline and Anna R. Karlin and Jared Saia and John Wilkes}
14101} 14101}
14102@conference {Wright01ananalysis, 14102@conference {Wright01ananalysis,
@@ -14106,7 +14106,7 @@ We further investigate this intriguing proposal. Specifically, we
14106 address = {San Diego, California}, 14106 address = {San Diego, California},
14107 abstract = {There have been a number of protocols proposed for anonymous network communication. In this paper we prove that when a particular initiator continues communication with a particular responder across path reformations, existing protocols are subject to attacks by corrupt group members that degrade the anonymity of each protocol over time. We use this result to place an upper bound on how long existing protocols including Crowds, Onion Routing, Hordes, and DC-Net, can maintain anonymity in the face of the attacks described. Our results show that fully-connected DC-Net is the most resilient to these attacks, but is subject to simple denial-of-service attacks. Additionally, we show how a variant of the attack allows attackers to setup other participants to falsely appear to be the initiator of a connection}, 14107 abstract = {There have been a number of protocols proposed for anonymous network communication. In this paper we prove that when a particular initiator continues communication with a particular responder across path reformations, existing protocols are subject to attacks by corrupt group members that degrade the anonymity of each protocol over time. We use this result to place an upper bound on how long existing protocols including Crowds, Onion Routing, Hordes, and DC-Net, can maintain anonymity in the face of the attacks described. Our results show that fully-connected DC-Net is the most resilient to these attacks, but is subject to simple denial-of-service attacks. Additionally, we show how a variant of the attack allows attackers to setup other participants to falsely appear to be the initiator of a connection},
14108 url = {http://freehaven.net/anonbib/cache/wright02.pdf}, 14108 url = {http://freehaven.net/anonbib/cache/wright02.pdf},
14109 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/wright02.pdf}, 14109 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/wright02.pdf},
14110 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields} 14110 author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}
14111} 14111}
14112@conference {747491, 14112@conference {747491,
@@ -14122,7 +14122,7 @@ We further investigate this intriguing proposal. Specifically, we
14122 isbn = {3-540-42824-0}, 14122 isbn = {3-540-42824-0},
14123 doi = {10.1007/3-540-45546-9}, 14123 doi = {10.1007/3-540-45546-9},
14124 url = {http://www.springerlink.com/content/ahdgfj8yj9exqe03/}, 14124 url = {http://www.springerlink.com/content/ahdgfj8yj9exqe03/},
14125 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/can-mcast.pdf}, 14125 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/can-mcast.pdf},
14126 author = {Sylvia Paul Ratnasamy and Handley, Mark and Richard Karp and S Shenker} 14126 author = {Sylvia Paul Ratnasamy and Handley, Mark and Richard Karp and S Shenker}
14127} 14127}
14128@conference {gup, 14128@conference {gup,
@@ -14138,7 +14138,7 @@ We also present a scheme resilient to even pseudonymous profiling yet preserving
14138 isbn = {978-3-540-42700-1}, 14138 isbn = {978-3-540-42700-1},
14139 doi = {10.1007/3-540-45472-1}, 14139 doi = {10.1007/3-540-45472-1},
14140 url = {http://portal.acm.org/citation.cfm?id=728483}, 14140 url = {http://portal.acm.org/citation.cfm?id=728483},
14141 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/gup.pdf}, 14141 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/gup.pdf},
14142 author = {Stuart Stubblebine and Paul Syverson}, 14142 author = {Stuart Stubblebine and Paul Syverson},
14143 editor = {Yair Frankel} 14143 editor = {Yair Frankel}
14144} 14144}
@@ -14152,7 +14152,7 @@ We also present a scheme resilient to even pseudonymous profiling yet preserving
14152 abstract = {This paper is to examine the space of negotiation opportunities for autonomous agents, to identify and evaluate some of the key techniques, and to highlight some of the major challenges for future automated negotiation research. This paper is not meant as a survey of the field of automated negotiation. Rather, the descriptions and assessments of the various approaches are generally undertaken with particular reference to work in which the authors have been involved. However, the specific issues raised should be viewed as being broadly applicable}, 14152 abstract = {This paper is to examine the space of negotiation opportunities for autonomous agents, to identify and evaluate some of the key techniques, and to highlight some of the major challenges for future automated negotiation research. This paper is not meant as a survey of the field of automated negotiation. Rather, the descriptions and assessments of the various approaches are generally undertaken with particular reference to work in which the authors have been involved. However, the specific issues raised should be viewed as being broadly applicable},
14153 www_section = {automated negociation autonomous agent, negociation}, 14153 www_section = {automated negociation autonomous agent, negociation},
14154 doi = {10.1023}, 14154 doi = {10.1023},
14155 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Group\%20Decision\%20and\%20Negociation\%20-\%20Automated\%20Negociation.pdf}, 14155 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Group\%20Decision\%20and\%20Negociation\%20-\%20Automated\%20Negociation.pdf},
14156 author = {Nicholas R Jennings and Peyman Faratin and Alessio R. Lomuscio and Simon Parsons and Carles Sierra and Michael Wooldridge} 14156 author = {Nicholas R Jennings and Peyman Faratin and Alessio R. Lomuscio and Simon Parsons and Carles Sierra and Michael Wooldridge}
14157} 14157}
14158@conference {378347, 14158@conference {378347,
@@ -14168,7 +14168,7 @@ We also present a scheme resilient to even pseudonymous profiling yet preserving
14168 isbn = {1-58113-370-7}, 14168 isbn = {1-58113-370-7},
14169 doi = {10.1145/378344.378347}, 14169 doi = {10.1145/378344.378347},
14170 url = {http://portal.acm.org/citation.cfm?id=378347$\#$}, 14170 url = {http://portal.acm.org/citation.cfm?id=378347$\#$},
14171 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/bayeux.pdf}, 14171 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/bayeux.pdf},
14172 author = {Shelley Zhuang and Ben Y. Zhao and Anthony D. Joseph and Katz, Randy H. and John Kubiatowicz} 14172 author = {Shelley Zhuang and Ben Y. Zhao and Anthony D. Joseph and Katz, Randy H. and John Kubiatowicz}
14173} 14173}
14174@article {Beimel01busesfor, 14174@article {Beimel01busesfor,
@@ -14179,7 +14179,7 @@ We also present a scheme resilient to even pseudonymous profiling yet preserving
14179 pages = {0--2003}, 14179 pages = {0--2003},
14180 abstract = {Applies graph theory to anonymity. The paper suffers from the fundamental problem that it does not discuss attacks on the scheme, and there are a couple of pretty basic ways to break anonymity. Also, the scheme uses lots of traffic; some variants end up looking much like a pipenet }, 14180 abstract = {Applies graph theory to anonymity. The paper suffers from the fundamental problem that it does not discuss attacks on the scheme, and there are a couple of pretty basic ways to break anonymity. Also, the scheme uses lots of traffic; some variants end up looking much like a pipenet },
14181 url = {http://gecko.cs.purdue.edu/gnet/papers/BD.pdf }, 14181 url = {http://gecko.cs.purdue.edu/gnet/papers/BD.pdf },
14182 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/BD.pdf}, 14182 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/BD.pdf},
14183 author = {Amos Beimel and Shlomi Dolev} 14183 author = {Amos Beimel and Shlomi Dolev}
14184} 14184}
14185@conference {Stoica01chord:a, 14185@conference {Stoica01chord:a,
@@ -14194,7 +14194,7 @@ We also present a scheme resilient to even pseudonymous profiling yet preserving
14194 abstract = {Efficiently determining the node that stores a data item in a distributed network is an important and challenging problem. This paper describes the motivation and design of the Chord system, a decentralized lookup service that stores key/value pairs for such networks. The Chord protocol takes as input an m-bit identifier (derived by hashing a higher-level application specific key), and returns the node that stores the value corresponding to that key. Each Chord node is identified by an m-bit identifier and each node stores the key identifiers in the system closest to the node's identifier. Each node maintains an m-entry routing table that allows it to look up keys efficiently. Results from theoretical analysis, simulations, and experiments show that Chord is incrementally scalable, with insertion and lookup costs scaling logarithmically with the number of Chord nodes}, 14194 abstract = {Efficiently determining the node that stores a data item in a distributed network is an important and challenging problem. This paper describes the motivation and design of the Chord system, a decentralized lookup service that stores key/value pairs for such networks. The Chord protocol takes as input an m-bit identifier (derived by hashing a higher-level application specific key), and returns the node that stores the value corresponding to that key. Each Chord node is identified by an m-bit identifier and each node stores the key identifiers in the system closest to the node's identifier. Each node maintains an m-entry routing table that allows it to look up keys efficiently. Results from theoretical analysis, simulations, and experiments show that Chord is incrementally scalable, with insertion and lookup costs scaling logarithmically with the number of Chord nodes},
14195 www_section = {Chord, distributed hash table}, 14195 www_section = {Chord, distributed hash table},
14196 isbn = {1-58113-411-8}, 14196 isbn = {1-58113-411-8},
14197 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/chord_sigcomm.pdf}, 14197 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/chord_sigcomm.pdf},
14198 author = {Ion Stoica and Robert Morris and David Karger and Frans M. Kaashoek and Hari Balakrishnan} 14198 author = {Ion Stoica and Robert Morris and David Karger and Frans M. Kaashoek and Hari Balakrishnan}
14199} 14199}
14200@article {Sirer_cliquenet:a, 14200@article {Sirer_cliquenet:a,
@@ -14207,7 +14207,7 @@ We also present a scheme resilient to even pseudonymous profiling yet preserving
14207 journal = {unknown}, 14207 journal = {unknown},
14208 issn = {TR2001}, 14208 issn = {TR2001},
14209 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.22.4785\&rep=rep1\&type=url\&i=0}, 14209 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.22.4785\&rep=rep1\&type=url\&i=0},
14210 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cliquenet-iptp.pdf}, 14210 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cliquenet-iptp.pdf},
14211 author = {Emin G{\"u}n Sirer and Milo Polte and Mark Robson} 14211 author = {Emin G{\"u}n Sirer and Milo Polte and Mark Robson}
14212} 14212}
14213@conference {Douceur01competitivehill-climbing, 14213@conference {Douceur01competitivehill-climbing,
@@ -14217,7 +14217,7 @@ We also present a scheme resilient to even pseudonymous profiling yet preserving
14217 pages = {48--62}, 14217 pages = {48--62},
14218 abstract = {The Farsite distributed file system stores multiple replicas of files on multiple machines, to provide file access even when some machines are unavailable. Farsite assigns file replicas to machines so as to maximally exploit the different degrees of availability of different machines, given an allowable replication factor R. We use competitive analysis and simulation to study the performance of three candidate hillclimbing replica placement strategies, MinMax, MinRand, and RandRand, each of which successively exchanges the locations of two file replicas. We show that the MinRand and RandRand strategies are perfectly competitive for R = 2 and 2/3-competitive for R = 3. For general R, MinRand is at least 1/2-competitive and RandRand is at least 10/17-competitive. The MinMax strategy is not competitive. Simulation results show better performance than the theoretic worst-case bounds}, 14218 abstract = {The Farsite distributed file system stores multiple replicas of files on multiple machines, to provide file access even when some machines are unavailable. Farsite assigns file replicas to machines so as to maximally exploit the different degrees of availability of different machines, given an allowable replication factor R. We use competitive analysis and simulation to study the performance of three candidate hillclimbing replica placement strategies, MinMax, MinRand, and RandRand, each of which successively exchanges the locations of two file replicas. We show that the MinRand and RandRand strategies are perfectly competitive for R = 2 and 2/3-competitive for R = 3. For general R, MinRand is at least 1/2-competitive and RandRand is at least 10/17-competitive. The MinMax strategy is not competitive. Simulation results show better performance than the theoretic worst-case bounds},
14219 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.22.6802\&rep=rep1\&type=pdf}, 14219 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.22.6802\&rep=rep1\&type=pdf},
14220 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/hill\%20climbing.pdf}, 14220 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/hill\%20climbing.pdf},
14221 author = {John R. Douceur and Roger Wattenhofer} 14221 author = {John R. Douceur and Roger Wattenhofer}
14222} 14222}
14223@conference {Michiardi01core:a, 14223@conference {Michiardi01core:a,
@@ -14228,7 +14228,7 @@ We also present a scheme resilient to even pseudonymous profiling yet preserving
14228 abstract = {Countermeasures for node misbehavior and selfishness are mandatory requirements in MANET. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifying the correctness and integrity of an operation. We suggest a generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior. Each network entity keeps track of other entities' collaboration using a technique called reputation. The reputation is calculated based on various types of information on each entity's rate of collaboration. Since there is no incentive for a node to maliciously spread negative information about other nodes, simple denial of service attacks using the collaboration technique itself are prevented. The generic mechanism can be smoothly extended to basic network functions with little impact on existing protocols}, 14228 abstract = {Countermeasures for node misbehavior and selfishness are mandatory requirements in MANET. Selfishness that causes lack of node activity cannot be solved by classical security means that aim at verifying the correctness and integrity of an operation. We suggest a generic mechanism based on reputation to enforce cooperation among the nodes of a MANET to prevent selfish behavior. Each network entity keeps track of other entities' collaboration using a technique called reputation. The reputation is calculated based on various types of information on each entity's rate of collaboration. Since there is no incentive for a node to maliciously spread negative information about other nodes, simple denial of service attacks using the collaboration technique itself are prevented. The generic mechanism can be smoothly extended to basic network functions with little impact on existing protocols},
14229 www_section = {ad-hoc networks}, 14229 www_section = {ad-hoc networks},
14230 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.4100}, 14230 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.58.4100},
14231 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/michpi-020801.pdf}, 14231 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/michpi-020801.pdf},
14232 author = {Pietro Michiardi and Refik Molva} 14232 author = {Pietro Michiardi and Refik Molva}
14233} 14233}
14234@conference {Cattaneo:2001:DIT:647054.715628, 14234@conference {Cattaneo:2001:DIT:647054.715628,
@@ -14247,7 +14247,7 @@ In this paper, we propose a new cryptographic le system, which we call TCFS , as
14247 www_section = {crytographic file system, UNIX}, 14247 www_section = {crytographic file system, UNIX},
14248 isbn = {1-880446-10-3}, 14248 isbn = {1-880446-10-3},
14249 url = {http://dl.acm.org/citation.cfm?id=647054.715628}, 14249 url = {http://dl.acm.org/citation.cfm?id=647054.715628},
14250 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/FREENIX\%2701\%20-\%20A\%20transparent\%20cryptographic\%20file\%20system\%20for\%20UNIX.pdf}, 14250 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/FREENIX\%2701\%20-\%20A\%20transparent\%20cryptographic\%20file\%20system\%20for\%20UNIX.pdf},
14251 author = {Cattaneo, Giuseppe and Catuogno, Luigi and Sorbo, Aniello Del and Persiano, Pino} 14251 author = {Cattaneo, Giuseppe and Catuogno, Luigi and Sorbo, Aniello Del and Persiano, Pino}
14252} 14252}
14253@article {2001_1, 14253@article {2001_1,
@@ -14265,7 +14265,7 @@ In this paper, we propose a new cryptographic le system, which we call TCFS , as
14265 pages = {569--584}, 14265 pages = {569--584},
14266 abstract = {We introduce a simple erasure recovery algorithm for codes derived from cascades of sparse bipartite graphs and analyze the algorithm by analyzing a corresponding discrete-time random process. As a result, we obtain a simple criterion involving the fractions of nodes of different degrees on both sides of the graph which is necessary and sufficient for the decoding process to finish successfully with high probability. By carefully designing these graphs we can construct for any given rate R and any given real number {\epsilon} a family of linear codes of rate R which can be encoded in time proportional to ln(1/{\epsilon}) times their block length n. Furthermore, a codeword can be recovered with high probability from a portion of its entries of length (1+{\epsilon})Rn or more. The recovery algorithm also runs in time proportional to n ln(1/{\epsilon}). Our algorithms have been implemented and work well in practice; various implementation issues are discussed}, 14266 abstract = {We introduce a simple erasure recovery algorithm for codes derived from cascades of sparse bipartite graphs and analyze the algorithm by analyzing a corresponding discrete-time random process. As a result, we obtain a simple criterion involving the fractions of nodes of different degrees on both sides of the graph which is necessary and sufficient for the decoding process to finish successfully with high probability. By carefully designing these graphs we can construct for any given rate R and any given real number {\epsilon} a family of linear codes of rate R which can be encoded in time proportional to ln(1/{\epsilon}) times their block length n. Furthermore, a codeword can be recovered with high probability from a portion of its entries of length (1+{\epsilon})Rn or more. The recovery algorithm also runs in time proportional to n ln(1/{\epsilon}). Our algorithms have been implemented and work well in practice; various implementation issues are discussed},
14267 www_section = {coding theory, recovery algorithm}, 14267 www_section = {coding theory, recovery algorithm},
14268 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.107.244.pdf}, 14268 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.107.244.pdf},
14269 author = {Luby, Michael and Michael Mitzenmacher and M. Amin Shokrollahi and Daniel A. Spielman} 14269 author = {Luby, Michael and Michael Mitzenmacher and M. Amin Shokrollahi and Daniel A. Spielman}
14270} 14270}
14271@conference {PShuffle, 14271@conference {PShuffle,
@@ -14278,7 +14278,7 @@ In this paper, we propose a new cryptographic le system, which we call TCFS , as
14278 isbn = {978-3-540-42456-7}, 14278 isbn = {978-3-540-42456-7},
14279 doi = {10.1007/3-540-44647-8}, 14279 doi = {10.1007/3-540-44647-8},
14280 url = {http://portal.acm.org/citation.cfm?id=704279}, 14280 url = {http://portal.acm.org/citation.cfm?id=704279},
14281 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PShuffle.pdf}, 14281 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PShuffle.pdf},
14282 author = {Jun Furukawa and Kazue Sako}, 14282 author = {Jun Furukawa and Kazue Sako},
14283 editor = {Joe Kilian} 14283 editor = {Joe Kilian}
14284} 14284}
@@ -14293,7 +14293,7 @@ In this paper, we propose a new cryptographic le system, which we call TCFS , as
14293 abstract = {A credential system is a system in which users can obtain credentials from organizations and demonstrate possession of these credentials. Such a system is anonymous when transactions carried out by the same user cannot be linked. An anonymous credential system is of significant practical relevance because it is the best means of providing privacy for users. In this paper we propose a practical anonymous credential system that is based on the strong RSA assumption and the decisional Diffie-Hellman assumption modulo a safe prime product and is considerably superior to existing ones: 1 We give the first practical solution that allows a user to unlinkably demonstrate possession of a credential as many times as necessary without involving the issuing organization. 2 To prevent misuse of anonymity, our scheme is the first to offer optional anonymity revocation for particular transactions. 3 Our scheme offers separability: all organizations can choose their cryptographic keys independently of each other. Moreover, we suggest more effective means of preventing users from sharing their credentials, by introducing all-or-nothing sharing: a user who allows a friend to use one of her credentials once, gives him the ability to use all of her credentials, i.e., taking over her identity. This is implemented by a new primitive, called circular encryption, which is of independent interest, and can be realized from any semantically secure cryptosystem in the random oracle model}, 14293 abstract = {A credential system is a system in which users can obtain credentials from organizations and demonstrate possession of these credentials. Such a system is anonymous when transactions carried out by the same user cannot be linked. An anonymous credential system is of significant practical relevance because it is the best means of providing privacy for users. In this paper we propose a practical anonymous credential system that is based on the strong RSA assumption and the decisional Diffie-Hellman assumption modulo a safe prime product and is considerably superior to existing ones: 1 We give the first practical solution that allows a user to unlinkably demonstrate possession of a credential as many times as necessary without involving the issuing organization. 2 To prevent misuse of anonymity, our scheme is the first to offer optional anonymity revocation for particular transactions. 3 Our scheme offers separability: all organizations can choose their cryptographic keys independently of each other. Moreover, we suggest more effective means of preventing users from sharing their credentials, by introducing all-or-nothing sharing: a user who allows a friend to use one of her credentials once, gives him the ability to use all of her credentials, i.e., taking over her identity. This is implemented by a new primitive, called circular encryption, which is of independent interest, and can be realized from any semantically secure cryptosystem in the random oracle model},
14294 isbn = {3-540-42070-3}, 14294 isbn = {3-540-42070-3},
14295 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.9429}, 14295 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.63.9429},
14296 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cl01a.pdf}, 14296 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cl01a.pdf},
14297 author = {Jan Camenisch and Anna Lysyanskaya} 14297 author = {Jan Camenisch and Anna Lysyanskaya}
14298} 14298}
14299@conference {747489, 14299@conference {747489,
@@ -14308,7 +14308,7 @@ In this paper, we propose a new cryptographic le system, which we call TCFS , as
14308 www_section = {multicast}, 14308 www_section = {multicast},
14309 isbn = {3-540-42824-0}, 14309 isbn = {3-540-42824-0},
14310 url = {http://portal.acm.org/citation.cfm?id=648089.747489$\#$}, 14310 url = {http://portal.acm.org/citation.cfm?id=648089.747489$\#$},
14311 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Widmer2001g.pdf}, 14311 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Widmer2001g.pdf},
14312 author = {J{\"o}rg Widmer and Thomas Fuhrmann} 14312 author = {J{\"o}rg Widmer and Thomas Fuhrmann}
14313} 14313}
14314@booklet {freedom21-security, 14314@booklet {freedom21-security,
@@ -14319,7 +14319,7 @@ In this paper, we propose a new cryptographic le system, which we call TCFS , as
14319 type = {White Paper}, 14319 type = {White Paper},
14320 abstract = {We describe attacks to which Freedom, or Freedom users, may be vulnerable. These attacks are those that reduce the privacy of a Freedom user, through exploiting cryptographic, design or implementation issues. We include issues which may not be Freedom security issues which arise when the system is not properly used. This disclosure includes all known design or implementation flaws, as well as places where various trade-offs made while creating the system have privacy implications. We also discuss cryptographic points that are needed for a complete understanding of how Freedom works, including ones we don't believe can be used to reduce anyone's privacy}, 14320 abstract = {We describe attacks to which Freedom, or Freedom users, may be vulnerable. These attacks are those that reduce the privacy of a Freedom user, through exploiting cryptographic, design or implementation issues. We include issues which may not be Freedom security issues which arise when the system is not properly used. This disclosure includes all known design or implementation flaws, as well as places where various trade-offs made while creating the system have privacy implications. We also discuss cryptographic points that are needed for a complete understanding of how Freedom works, including ones we don't believe can be used to reduce anyone's privacy},
14321 www_section = {Freedom, privacy}, 14321 www_section = {Freedom, privacy},
14322 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Freedom_Security2-1.pdf}, 14322 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Freedom_Security2-1.pdf},
14323 author = {Adam Back and Ian Goldberg and Adam Shostack} 14323 author = {Adam Back and Ian Goldberg and Adam Shostack}
14324} 14324}
14325@conference {2001_2, 14325@conference {2001_2,
@@ -14336,7 +14336,7 @@ We construct a threshold variant of the generalised scheme as well as zero-knowl
14336We then show how these building blocks can be used for applying the scheme to efficient electronic voting.This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes.W e show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimised such that for a certain range of parameter values, a ballot has size only O(log L) bits}, 14336We then show how these building blocks can be used for applying the scheme to efficient electronic voting.This reduces dramatically the work needed to compute the final result of an election, compared to the previously best known schemes.W e show how the basic scheme for a yes/no vote can be easily adapted to casting a vote for up to t out of L candidates. The same basic building blocks can also be adapted to provide receipt-free elections, under appropriate physical assumptions. The scheme for 1 out of L elections can be optimised such that for a certain range of parameter values, a ballot has size only O(log L) bits},
14337 isbn = {3-540-41658-7}, 14337 isbn = {3-540-41658-7},
14338 url = {http://dl.acm.org/citation.cfm?id=648118.746742}, 14338 url = {http://dl.acm.org/citation.cfm?id=648118.746742},
14339 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Generalisation2001Damgard.pdf}, 14339 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Generalisation2001Damgard.pdf},
14340 author = {Damg\aard, Ivan and Jurik, Mats} 14340 author = {Damg\aard, Ivan and Jurik, Mats}
14341} 14341}
14342@article {9999, 14342@article {9999,
@@ -14368,7 +14368,7 @@ We then show how these building blocks can be used for applying the scheme to ef
14368 issn = {0018-9448 }, 14368 issn = {0018-9448 },
14369 doi = {10.1109/18.910576 }, 14369 doi = {10.1109/18.910576 },
14370 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.6057}, 14370 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.137.6057},
14371 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/errorsIT.pdf}, 14371 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/errorsIT.pdf},
14372 author = {Luby, Michael and Michael Mitzenmacher and M. Amin Shokrollahi and Daniel A. Spielman} 14372 author = {Luby, Michael and Michael Mitzenmacher and M. Amin Shokrollahi and Daniel A. Spielman}
14373} 14373}
14374@conference {Golle01incentivesfor, 14374@conference {Golle01incentivesfor,
@@ -14382,7 +14382,7 @@ We then show how these building blocks can be used for applying the scheme to ef
14382 abstract = {We consider the free-rider problem in peer-to-peer file sharing networks such as Napster: that individual users are provided with no incentive for adding value to the network. We examine the design implications of the assumption that users will selfishly act to maximize their own rewards, by constructing a formal game theoretic model of the system and analyzing equilibria of user strategies under several novel payment mechanisms. We support and extend this work with results from experiments with a multi-agent reinforcement learning model}, 14382 abstract = {We consider the free-rider problem in peer-to-peer file sharing networks such as Napster: that individual users are provided with no incentive for adding value to the network. We examine the design implications of the assumption that users will selfishly act to maximize their own rewards, by constructing a formal game theoretic model of the system and analyzing equilibria of user strategies under several novel payment mechanisms. We support and extend this work with results from experiments with a multi-agent reinforcement learning model},
14383 www_section = {free-riding, incentives}, 14383 www_section = {free-riding, incentives},
14384 isbn = {3-540-42878-X}, 14384 isbn = {3-540-42878-X},
14385 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.23.9004.pdf}, 14385 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.23.9004.pdf},
14386 author = {Philippe Golle and Kevin Leyton-Brown and Ilya Mironov and Mark Lillibridge} 14386 author = {Philippe Golle and Kevin Leyton-Brown and Ilya Mironov and Mark Lillibridge}
14387} 14387}
14388@article {beimel01informationtheoretic, 14388@article {beimel01informationtheoretic,
@@ -14399,7 +14399,7 @@ Our construction strictly improves upon previous constructions and resolves some
14399 issn = {0302-9743}, 14399 issn = {0302-9743},
14400 doi = {10.1007/3-540-48224-5}, 14400 doi = {10.1007/3-540-48224-5},
14401 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.2796}, 14401 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.5.2796},
14402 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/beimel01informationtheoretic.pdf}, 14402 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/beimel01informationtheoretic.pdf},
14403 author = {Amos Beimel and Yuval Ishai} 14403 author = {Amos Beimel and Yuval Ishai}
14404} 14404}
14405@conference {Department01instrumentingthe, 14405@conference {Department01instrumentingthe,
@@ -14410,7 +14410,7 @@ Our construction strictly improves upon previous constructions and resolves some
14410 abstract = {Pervasive micro-sensing and actuation may revolutionize the way in which we understand and manage complex physical systems: from airplane wings to complex ecosystems. The capabilities for detailed physical monitoring and manipulation offer enormous opportunities for almost every scientific discipline, and it will alter the feasible granularity of engineering}, 14410 abstract = {Pervasive micro-sensing and actuation may revolutionize the way in which we understand and manage complex physical systems: from airplane wings to complex ecosystems. The capabilities for detailed physical monitoring and manipulation offer enormous opportunities for almost every scientific discipline, and it will alter the feasible granularity of engineering},
14411 www_section = {wireless sensor network}, 14411 www_section = {wireless sensor network},
14412 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.3027}, 14412 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.3.3027},
14413 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.3.3027.pdf}, 14413 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.3.3027.pdf},
14414 author = {Deborah Estrin and Gregory J. Pottie and L. Girod and Mani Srivastava} 14414 author = {Deborah Estrin and Gregory J. Pottie and L. Girod and Mani Srivastava}
14415} 14415}
14416@conference {2001_3, 14416@conference {2001_3,
@@ -14424,7 +14424,7 @@ Our construction strictly improves upon previous constructions and resolves some
14424 isbn = {0-7803-7016-3 }, 14424 isbn = {0-7803-7016-3 },
14425 doi = {10.1109/INFCOM.2001.916651 }, 14425 doi = {10.1109/INFCOM.2001.916651 },
14426 url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=916651}, 14426 url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=916651},
14427 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/infocom01investigating.pdf}, 14427 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/infocom01investigating.pdf},
14428 author = {Feeney, Laura Marie and Nilsson, Martin} 14428 author = {Feeney, Laura Marie and Nilsson, Martin}
14429} 14429}
14430@conference {502052, 14430@conference {502052,
@@ -14440,7 +14440,7 @@ Our construction strictly improves upon previous constructions and resolves some
14440 isbn = {1-58113-389-8}, 14440 isbn = {1-58113-389-8},
14441 doi = {10.1145/502034.502052}, 14441 doi = {10.1145/502034.502052},
14442 url = {http://portal.acm.org/citation.cfm?id=502052$\#$}, 14442 url = {http://portal.acm.org/citation.cfm?id=502052$\#$},
14443 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/lbfs.pdf}, 14443 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/lbfs.pdf},
14444 author = {Muthitacharoen, Athicha and Chen, Benjie and David Mazi{\`e}res} 14444 author = {Muthitacharoen, Athicha and Chen, Benjie and David Mazi{\`e}res}
14445} 14445}
14446@book {2001_4, 14446@book {2001_4,
@@ -14456,7 +14456,7 @@ Our construction strictly improves upon previous constructions and resolves some
14456 isbn = {978-3-540-42070-5}, 14456 isbn = {978-3-540-42070-5},
14457 doi = {10.1007/3-540-44987-6_18}, 14457 doi = {10.1007/3-540-44987-6_18},
14458 url = {http://dx.doi.org/10.1007/3-540-44987-6_18}, 14458 url = {http://dx.doi.org/10.1007/3-540-44987-6_18},
14459 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/MultiPartyComputation2001Cramer.pdf}, 14459 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/MultiPartyComputation2001Cramer.pdf},
14460 author = {Cramer, Ronald and Damg{\'a}rd, Ivan and Nielsen, JesperB}, 14460 author = {Cramer, Ronald and Damg{\'a}rd, Ivan and Nielsen, JesperB},
14461 editor = {Pfitzmann, Birgit} 14461 editor = {Pfitzmann, Birgit}
14462} 14462}
@@ -14470,7 +14470,7 @@ Our construction strictly improves upon previous constructions and resolves some
14470 www_section = {mix, public key cryptography, robustness}, 14470 www_section = {mix, public key cryptography, robustness},
14471 isbn = {1-58113-383-9}, 14471 isbn = {1-58113-383-9},
14472 url = {http://portal.acm.org/citation.cfm?id=383962.384046}, 14472 url = {http://portal.acm.org/citation.cfm?id=383962.384046},
14473 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.24.8205.pdf}, 14473 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.24.8205.pdf},
14474 author = {Jakobsson, Markus and Ari Juels} 14474 author = {Jakobsson, Markus and Ari Juels}
14475} 14475}
14476@conference {Druschel01past:a, 14476@conference {Druschel01past:a,
@@ -14481,7 +14481,7 @@ Our construction strictly improves upon previous constructions and resolves some
14481 abstract = {This paper sketches the design of PAST, a large-scale, Internet-based, global storage utility that provides scalability, high availability, persistence and security. PAST is a peer-to-peer Internet application and is entirely selforganizing. PAST nodes serve as access points for clients, participate in the routing of client requests, and contribute storage to the system. Nodes are not trusted, they may join the system at any time and may silently leave the system without warning. Yet, the system is able to provide strong assurances, efficient storage access, load balancing and scalability}, 14481 abstract = {This paper sketches the design of PAST, a large-scale, Internet-based, global storage utility that provides scalability, high availability, persistence and security. PAST is a peer-to-peer Internet application and is entirely selforganizing. PAST nodes serve as access points for clients, participate in the routing of client requests, and contribute storage to the system. Nodes are not trusted, they may join the system at any time and may silently leave the system without warning. Yet, the system is able to provide strong assurances, efficient storage access, load balancing and scalability},
14482 www_section = {peer-to-peer storage}, 14482 www_section = {peer-to-peer storage},
14483 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1674}, 14483 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.1.1674},
14484 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.1.1674.pdf}, 14484 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.1.1674.pdf},
14485 author = {Peter Druschel and Antony Rowstron} 14485 author = {Peter Druschel and Antony Rowstron}
14486} 14486}
14487@conference {697650, 14487@conference {697650,
@@ -14498,7 +14498,7 @@ Pastry is completely decentralized, scalable, and self-organizing; it automatica
14498 www_section = {overlay networks, P2P}, 14498 www_section = {overlay networks, P2P},
14499 isbn = {3-540-42800-3}, 14499 isbn = {3-540-42800-3},
14500 url = {http://portal.acm.org/citation.cfm?id=697650$\#$}, 14500 url = {http://portal.acm.org/citation.cfm?id=697650$\#$},
14501 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/pastry.pdf}, 14501 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/pastry.pdf},
14502 author = {Antony Rowstron and Peter Druschel} 14502 author = {Antony Rowstron and Peter Druschel}
14503} 14503}
14504@conference {Rowstron01pastry:scalable, 14504@conference {Rowstron01pastry:scalable,
@@ -14520,7 +14520,7 @@ Work done in part while visiting Microsoft Research, Cambridge, UK},
14520 isbn = {3-540-42800-3}, 14520 isbn = {3-540-42800-3},
14521 doi = {10.1007/3-540-45518-3_18}, 14521 doi = {10.1007/3-540-45518-3_18},
14522 url = {http://www.cs.rice.edu/~druschel/publications/Pastry.pdf}, 14522 url = {http://www.cs.rice.edu/~druschel/publications/Pastry.pdf},
14523 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Pastry.pdf}, 14523 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Pastry.pdf},
14524 author = {Antony Rowstron and Peter Druschel} 14524 author = {Antony Rowstron and Peter Druschel}
14525} 14525}
14526@book {558412, 14526@book {558412,
@@ -14553,7 +14553,7 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14553 title = {Poblano: A distributed trust model for peer-to-peer networks}, 14553 title = {Poblano: A distributed trust model for peer-to-peer networks},
14554 year = {2001}, 14554 year = {2001},
14555 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.106.7489\&rep=rep1\&type=pdf}, 14555 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.106.7489\&rep=rep1\&type=pdf},
14556 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.106.7489.pdf}, 14556 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.106.7489.pdf},
14557 author = {Rita Chen and William Yeager} 14557 author = {Rita Chen and William Yeager}
14558} 14558}
14559@booklet {Batten01pstore:a, 14559@booklet {Batten01pstore:a,
@@ -14562,14 +14562,14 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14562 abstract = {In an effort to combine research in peer-to-peer systems with techniques for incremental backup systems, we propose pStore: a secure distributed backup system based on an adaptive peer-to-peer network. pStore exploits unused personal hard drive space attached to the Internet to provide the distributed redundancy needed for reliable and effective data backup. Experiments on a 30 node network show that 95\% of the files in a 13 MB dataset can be retrieved even when 7 of the nodes have failed. On top of this reliability, pStore includes support for file encryption, versioning, and secure sharing. Its custom versioning system permits arbitrary version retrieval similar to CVS. pStore provides this functionality at less than 10\% of the network bandwidth and requires 85\% less storage capacity than simpler local tape backup schemes for a representative workload}, 14562 abstract = {In an effort to combine research in peer-to-peer systems with techniques for incremental backup systems, we propose pStore: a secure distributed backup system based on an adaptive peer-to-peer network. pStore exploits unused personal hard drive space attached to the Internet to provide the distributed redundancy needed for reliable and effective data backup. Experiments on a 30 node network show that 95\% of the files in a 13 MB dataset can be retrieved even when 7 of the nodes have failed. On top of this reliability, pStore includes support for file encryption, versioning, and secure sharing. Its custom versioning system permits arbitrary version retrieval similar to CVS. pStore provides this functionality at less than 10\% of the network bandwidth and requires 85\% less storage capacity than simpler local tape backup schemes for a representative workload},
14563 www_section = {P2P, robustness}, 14563 www_section = {P2P, robustness},
14564 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.3444}, 14564 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.3444},
14565 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.12.3444.pdf}, 14565 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.12.3444.pdf},
14566 author = {Christopher Batten and Kenneth Barr and Arvind Saraf and Stanley Trepetin} 14566 author = {Christopher Batten and Kenneth Barr and Arvind Saraf and Stanley Trepetin}
14567} 14567}
14568@booklet {Hubaux01thequest, 14568@booklet {Hubaux01thequest,
14569 title = {The Quest for Security in Mobile Ad Hoc Networks}, 14569 title = {The Quest for Security in Mobile Ad Hoc Networks},
14570 year = {2001}, 14570 year = {2001},
14571 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.130.6088\&rep=rep1\&type=pdf}, 14571 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.130.6088\&rep=rep1\&type=pdf},
14572 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.130.6088.pdf}, 14572 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.130.6088.pdf},
14573 author = {Jean-Pierre Hubaux and Levente Butty{\'a}n and Srdan Capkun} 14573 author = {Jean-Pierre Hubaux and Levente Butty{\'a}n and Srdan Capkun}
14574} 14574}
14575@conference {501437, 14575@conference {501437,
@@ -14585,7 +14585,7 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14585 isbn = {1-58113-428-2}, 14585 isbn = {1-58113-428-2},
14586 doi = {10.1145/501436.501437}, 14586 doi = {10.1145/501436.501437},
14587 url = {http://portal.acm.org/citation.cfm?id=501437$\#$}, 14587 url = {http://portal.acm.org/citation.cfm?id=501437$\#$},
14588 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Quest01.pdf}, 14588 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Quest01.pdf},
14589 author = {Jean-Pierre Hubaux and Levente Butty{\'a}n and Srdan Capkun} 14589 author = {Jean-Pierre Hubaux and Levente Butty{\'a}n and Srdan Capkun}
14590} 14590}
14591@conference {patterns-failure, 14591@conference {patterns-failure,
@@ -14600,7 +14600,7 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14600 www_section = {pseudonym, security policy}, 14600 www_section = {pseudonym, security policy},
14601 isbn = {3-540-42733-3}, 14601 isbn = {3-540-42733-3},
14602 url = {http://portal.acm.org/citation.cfm?id=731864}, 14602 url = {http://portal.acm.org/citation.cfm?id=731864},
14603 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Patterns_of_Failure.pdf}, 14603 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Patterns_of_Failure.pdf},
14604 author = {Richard Clayton and George Danezis and Markus G. Kuhn}, 14604 author = {Richard Clayton and George Danezis and Markus G. Kuhn},
14605 editor = {Ira S. Moskowitz} 14605 editor = {Ira S. Moskowitz}
14606} 14606}
@@ -14624,7 +14624,7 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14624 isbn = {978-3-540-42733-9}, 14624 isbn = {978-3-540-42733-9},
14625 doi = {10.1007/3-540-45496-9}, 14625 doi = {10.1007/3-540-45496-9},
14626 url = {http://www.springerlink.com/content/ej8qv86wdkeukjc5/}, 14626 url = {http://www.springerlink.com/content/ej8qv86wdkeukjc5/},
14627 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mix-acc.pdf}, 14627 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/mix-acc.pdf},
14628 author = {Roger Dingledine and Michael J. Freedman and David Hopwood and David Molnar}, 14628 author = {Roger Dingledine and Michael J. Freedman and David Hopwood and David Molnar},
14629 editor = {Ira S. Moskowitz} 14629 editor = {Ira S. Moskowitz}
14630} 14630}
@@ -14642,7 +14642,7 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14642 issn = {0163-5980}, 14642 issn = {0163-5980},
14643 doi = {10.1145/502059.502048}, 14643 doi = {10.1145/502059.502048},
14644 url = {http://portal.acm.org/citation.cfm?id=502059.502048$\#$}, 14644 url = {http://portal.acm.org/citation.cfm?id=502059.502048$\#$},
14645 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ron-sosp2001.pdf}, 14645 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ron-sosp2001.pdf},
14646 author = {Andersen, David and Hari Balakrishnan and Frans M. Kaashoek and Robert Morris} 14646 author = {Andersen, David and Hari Balakrishnan and Frans M. Kaashoek and Robert Morris}
14647} 14647}
14648@conference {Scarlata01responderanonymity, 14648@conference {Scarlata01responderanonymity,
@@ -14654,7 +14654,7 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14654 www_section = {anonymity, APFS, multicast}, 14654 www_section = {anonymity, APFS, multicast},
14655 isbn = {0-7695-1429-4 }, 14655 isbn = {0-7695-1429-4 },
14656 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.20.7821\&rep=rep1\&type=url\&i=0}, 14656 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.20.7821\&rep=rep1\&type=url\&i=0},
14657 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/APFS.pdf}, 14657 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/APFS.pdf},
14658 author = {Vincent Scarlata and Brian Neil Levine and Clay Shields} 14658 author = {Vincent Scarlata and Brian Neil Levine and Clay Shields}
14659} 14659}
14660@conference {383072, 14660@conference {383072,
@@ -14670,7 +14670,7 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14670 isbn = {1-58113-411-8}, 14670 isbn = {1-58113-411-8},
14671 doi = {10.1145/383059.383072}, 14671 doi = {10.1145/383059.383072},
14672 url = {http://portal.acm.org/citation.cfm?id=383072$\#$}, 14672 url = {http://portal.acm.org/citation.cfm?id=383072$\#$},
14673 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.19.8434.pdf}, 14673 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.19.8434.pdf},
14674 author = {Sylvia Paul Ratnasamy and Paul Francis and Handley, Mark and Richard Karp and S Shenker} 14674 author = {Sylvia Paul Ratnasamy and Paul Francis and Handley, Mark and Richard Karp and S Shenker}
14675} 14675}
14676@article { 10.1109/P2P.2001.990421, 14676@article { 10.1109/P2P.2001.990421,
@@ -14696,7 +14696,7 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14696 www_section = {pseudonym}, 14696 www_section = {pseudonym},
14697 doi = {10.1111/j.1430-9134.2001.00173.x}, 14697 doi = {10.1111/j.1430-9134.2001.00173.x},
14698 url = {http://www3.interscience.wiley.com/journal/119023370/abstract?CRETRY=1\&SRETRY=0}, 14698 url = {http://www3.interscience.wiley.com/journal/119023370/abstract?CRETRY=1\&SRETRY=0},
14699 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/081199.pdf}, 14699 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/081199.pdf},
14700 author = {Eric Friedman and Paul Resnick} 14700 author = {Eric Friedman and Paul Resnick}
14701} 14701}
14702@conference {strong-eternity, 14702@conference {strong-eternity,
@@ -14711,7 +14711,7 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14711 isbn = {978-3-540-42733-9}, 14711 isbn = {978-3-540-42733-9},
14712 doi = {10.1007/3-540-45496-9}, 14712 doi = {10.1007/3-540-45496-9},
14713 url = {http://portal.acm.org/citation.cfm?id=731726}, 14713 url = {http://portal.acm.org/citation.cfm?id=731726},
14714 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/strong-eternity.pdf}, 14714 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/strong-eternity.pdf},
14715 author = {Tonda Benes}, 14715 author = {Tonda Benes},
14716 editor = {Ira S. Moskowitz} 14716 editor = {Ira S. Moskowitz}
14717} 14717}
@@ -14722,7 +14722,7 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14722 pages = {126--135}, 14722 pages = {126--135},
14723 abstract = {The basic idea is to protect documents by making it impossible to remove one document from the system without loosing others. The underlying assumption that the adversary cares about collateral damage of this kind is a bit far fetched. Also, the entanglement doubles the amount of data that needs to be moved to retrieve a document}, 14723 abstract = {The basic idea is to protect documents by making it impossible to remove one document from the system without loosing others. The underlying assumption that the adversary cares about collateral damage of this kind is a bit far fetched. Also, the entanglement doubles the amount of data that needs to be moved to retrieve a document},
14724 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.24.3781\&rep=rep1\&type=pdf}, 14724 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.24.3781\&rep=rep1\&type=pdf},
14725 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/tangler.pdf}, 14725 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/tangler.pdf},
14726 author = {Marc Waldman and David Mazi{\`e}res} 14726 author = {Marc Waldman and David Mazi{\`e}res}
14727} 14727}
14728@conference {waldman01tangler, 14728@conference {waldman01tangler,
@@ -14736,7 +14736,7 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14736 isbn = {1-58113-385-5}, 14736 isbn = {1-58113-385-5},
14737 doi = {10.1145/501983.502002}, 14737 doi = {10.1145/501983.502002},
14738 url = {http://portal.acm.org/citation.cfm?id=501983.502002\&coll=GUIDE\&dl=GUIDE\&type=series\&idx=SERIES320\&part=series\&WantType=Proceedings\&title=CCS\&CFID=75729899\&CFTOKEN=36385677}, 14738 url = {http://portal.acm.org/citation.cfm?id=501983.502002\&coll=GUIDE\&dl=GUIDE\&type=series\&idx=SERIES320\&part=series\&WantType=Proceedings\&title=CCS\&CFID=75729899\&CFTOKEN=36385677},
14739 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.24.3781.pdf}, 14739 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.24.3781.pdf},
14740 author = {Marc Waldman and David Mazi{\`e}res} 14740 author = {Marc Waldman and David Mazi{\`e}res}
14741} 14741}
14742@booklet {Zhao01tapestry:an, 14742@booklet {Zhao01tapestry:an,
@@ -14744,7 +14744,7 @@ This compilation represents the collected wisdom of today's peer-to-peer luminar
14744 year = {2001}, 14744 year = {2001},
14745 abstract = {In today's chaotic network, data and services are mobile and replicated widely for availability, durability, and locality. Components' within this infrastructure interact in rich and complex ways, greatly stressing traditional approaches to name service and routing. This paper explores an alternative to traditional approaches called Tapestry. Tapestry is an overlay location and routing infrastructure that provides location-independent routing of messages directly to the closest copy of an object or service using only point-to-point links and without centralized resources. The routing and directory information within this' infrastructure is purely soft state and easily repaired. Tapestry is self-administering, fault-tolerant, and resilient under load. This paper presents' the architecture and algorithms of Tapestry and explores their advantages through a number of experiments}, 14745 abstract = {In today's chaotic network, data and services are mobile and replicated widely for availability, durability, and locality. Components' within this infrastructure interact in rich and complex ways, greatly stressing traditional approaches to name service and routing. This paper explores an alternative to traditional approaches called Tapestry. Tapestry is an overlay location and routing infrastructure that provides location-independent routing of messages directly to the closest copy of an object or service using only point-to-point links and without centralized resources. The routing and directory information within this' infrastructure is purely soft state and easily repaired. Tapestry is self-administering, fault-tolerant, and resilient under load. This paper presents' the architecture and algorithms of Tapestry and explores their advantages through a number of experiments},
14746 url = {http://portal.acm.org/citation.cfm?id=894116$\#$}, 14746 url = {http://portal.acm.org/citation.cfm?id=894116$\#$},
14747 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CSD-01-1141.pdf}, 14747 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CSD-01-1141.pdf},
14748 author = {Ben Y. Zhao and Ben Y. Zhao and John Kubiatowicz and John Kubiatowicz and Anthony D. Joseph and Anthony D. Joseph} 14748 author = {Ben Y. Zhao and Ben Y. Zhao and John Kubiatowicz and John Kubiatowicz and Anthony D. Joseph and Anthony D. Joseph}
14749} 14749}
14750@book {2001_6, 14750@book {2001_6,
@@ -14760,7 +14760,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14760 www_section = {economics, principal-agent model}, 14760 www_section = {economics, principal-agent model},
14761 isbn = {9780691091846}, 14761 isbn = {9780691091846},
14762 url = {http://press.princeton.edu/chapters/i7311.html}, 14762 url = {http://press.princeton.edu/chapters/i7311.html},
14763 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Laffont\%20\%26\%20Martimort\%20-\%20The\%20Theory\%20of\%20Incentives.pdf}, 14763 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Laffont\%20\%26\%20Martimort\%20-\%20The\%20Theory\%20of\%20Incentives.pdf},
14764 author = {Jean-Jacques Laffont and David Martimort} 14764 author = {Jean-Jacques Laffont and David Martimort}
14765} 14765}
14766@conference {back01, 14766@conference {back01,
@@ -14776,7 +14776,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14776 isbn = {978-3-540-42733-9}, 14776 isbn = {978-3-540-42733-9},
14777 doi = {10.1007/3-540-45496-9}, 14777 doi = {10.1007/3-540-45496-9},
14778 url = {http://www.springerlink.com/content/4gpwtejkkvadcdcm/}, 14778 url = {http://www.springerlink.com/content/4gpwtejkkvadcdcm/},
14779 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/traffic_0.pdf}, 14779 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/traffic_0.pdf},
14780 author = {Adam Back and Ulf M{\"o}ller and Anton Stiglic}, 14780 author = {Adam Back and Ulf M{\"o}ller and Anton Stiglic},
14781 editor = {Ira S. Moskowitz} 14781 editor = {Ira S. Moskowitz}
14782} 14782}
@@ -14793,7 +14793,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14793 isbn = {1-58113-385-5}, 14793 isbn = {1-58113-385-5},
14794 doi = {10.1145/501983.502000}, 14794 doi = {10.1145/501983.502000},
14795 url = {http://portal.acm.org/citation.cfm?id=502000}, 14795 url = {http://portal.acm.org/citation.cfm?id=502000},
14796 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/shuffle-ccs01.pdf}, 14796 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/shuffle-ccs01.pdf},
14797 author = {Andrew C. Neff}, 14797 author = {Andrew C. Neff},
14798 editor = {Pierangela Samarati} 14798 editor = {Pierangela Samarati}
14799} 14799}
@@ -14802,7 +14802,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14802 year = {2001}, 14802 year = {2001},
14803 abstract = {Vesta is a system for software configuration management. It stores collections of source files, keeps track of which versions of which files go together, and automates the process of building a complete software artifact from its component pieces. Vesta's novel approach gives it three important properties. First, every build is repeatable, because its component sources and build tools are stored immutably and immortally, and its configuration description completely specifies what components and tools are used and how they are put together. Second, every build is incremental, because results of previous builds are cached and reused. Third, every build is consistent, because all build dependencies are automatically captured and recorded, so that a cached result from a previous build is reused only when doing so is certain to be correct. In addition, Vesta's flexible language for writing configuration descriptions makes it easy to describe large software configurations in a modular fashion and to create variant configurations by customizing build parameters. This paper gives a brief overview of Vesta, outlining Vesta's advantages over traditional tools, how those benefits are achieved, and the system's overall performance}, 14803 abstract = {Vesta is a system for software configuration management. It stores collections of source files, keeps track of which versions of which files go together, and automates the process of building a complete software artifact from its component pieces. Vesta's novel approach gives it three important properties. First, every build is repeatable, because its component sources and build tools are stored immutably and immortally, and its configuration description completely specifies what components and tools are used and how they are put together. Second, every build is incremental, because results of previous builds are cached and reused. Third, every build is consistent, because all build dependencies are automatically captured and recorded, so that a cached result from a previous build is reused only when doing so is certain to be correct. In addition, Vesta's flexible language for writing configuration descriptions makes it easy to describe large software configurations in a modular fashion and to create variant configurations by customizing build parameters. This paper gives a brief overview of Vesta, outlining Vesta's advantages over traditional tools, how those benefits are achieved, and the system's overall performance},
14804 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.7370}, 14804 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.23.7370},
14805 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SRC-RR-168.pdf}, 14805 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SRC-RR-168.pdf},
14806 author = {Allan Heydon and Roy Levin and Timothy Mann and Yuan Yu} 14806 author = {Allan Heydon and Roy Levin and Timothy Mann and Yuan Yu}
14807} 14807}
14808@conference {502054, 14808@conference {502054,
@@ -14818,7 +14818,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14818 isbn = {1-58113-389-8}, 14818 isbn = {1-58113-389-8},
14819 doi = {10.1145/502034.502054}, 14819 doi = {10.1145/502034.502054},
14820 url = {http://portal.acm.org/citation.cfm?id=502054$\#$}, 14820 url = {http://portal.acm.org/citation.cfm?id=502054$\#$},
14821 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cfs_sosp.pdf}, 14821 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cfs_sosp.pdf},
14822 author = {Dabek, Frank and Frans M. Kaashoek and David Karger and Robert Morris and Ion Stoica} 14822 author = {Dabek, Frank and Frans M. Kaashoek and David Karger and Robert Morris and Ion Stoica}
14823} 14823}
14824@conference {Heimbigner00adaptingpublish/subscribe, 14824@conference {Heimbigner00adaptingpublish/subscribe,
@@ -14828,7 +14828,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14828 pages = {176--181}, 14828 pages = {176--181},
14829 abstract = {Gnutella represents a new wave of peer-to-peer applications providing distributed discovery and sharing of resources across the Internet. Gnutella is distinguished by its support for anonymity and by its decentralized architecture. The current Gnutella architecture and protocol have numerous flaws with respect to efficiency, anonymity, and vulnerability to malicious actions. An alternative design is described that provides Gnutella-like functionality but removes or mitigates many of Gnutella's flaws. This design, referred to as Query/Advertise (Q/A) is based upon a scalable publish/subscribe middleware system called Sienab. A prototype implementation of Q/A is described. The relative benefits of this approach are discussed, and a number of open research problems are identified with respect to Q/A systems}, 14829 abstract = {Gnutella represents a new wave of peer-to-peer applications providing distributed discovery and sharing of resources across the Internet. Gnutella is distinguished by its support for anonymity and by its decentralized architecture. The current Gnutella architecture and protocol have numerous flaws with respect to efficiency, anonymity, and vulnerability to malicious actions. An alternative design is described that provides Gnutella-like functionality but removes or mitigates many of Gnutella's flaws. This design, referred to as Query/Advertise (Q/A) is based upon a scalable publish/subscribe middleware system called Sienab. A prototype implementation of Q/A is described. The relative benefits of this approach are discussed, and a number of open research problems are identified with respect to Q/A systems},
14830 url = {http://serl.cs.colorado.edu/~serl/papers/CU-CS-909-00.pdf}, 14830 url = {http://serl.cs.colorado.edu/~serl/papers/CU-CS-909-00.pdf},
14831 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CU-CS-909-00.pdf}, 14831 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CU-CS-909-00.pdf},
14832 author = {Dennis Heimbigner} 14832 author = {Dennis Heimbigner}
14833} 14833}
14834@booklet {terminology, 14834@booklet {terminology,
@@ -14837,7 +14837,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14837 month = {July}, 14837 month = {July},
14838 abstract = {Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, unobservability, pseudonymity (pseudonyms and digital pseudonyms, and their attributes), and identity management. In addition, we describe the relationships between these terms, give a rational why we define them as we do, and sketch the main mechanisms to provide for the properties defined}, 14838 abstract = {Based on the nomenclature of the early papers in the field, we propose a terminology which is both expressive and precise. More particularly, we define anonymity, unlinkability, unobservability, pseudonymity (pseudonyms and digital pseudonyms, and their attributes), and identity management. In addition, we describe the relationships between these terms, give a rational why we define them as we do, and sketch the main mechanisms to provide for the properties defined},
14839 url = {http://dud.inf.tu-dresden.de/Anon_Terminology.shtml}, 14839 url = {http://dud.inf.tu-dresden.de/Anon_Terminology.shtml},
14840 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/terminology.pdf}, 14840 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/terminology.pdf},
14841 author = {Andreas Pfitzmann and Marit Hansen} 14841 author = {Andreas Pfitzmann and Marit Hansen}
14842} 14842}
14843@conference {DBLP:conf/diau/PfitzmannK00, 14843@conference {DBLP:conf/diau/PfitzmannK00,
@@ -14858,7 +14858,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14858 isbn = {3-540-41404-5}, 14858 isbn = {3-540-41404-5},
14859 doi = {10.1007/3-540-44448-3_15}, 14859 doi = {10.1007/3-540-44448-3_15},
14860 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.6972}, 14860 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.20.6972},
14861 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.20.6972.pdf}, 14861 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.20.6972.pdf},
14862 author = {Masashi Mitomo and Kaoru Kurosawa} 14862 author = {Masashi Mitomo and Kaoru Kurosawa}
14863} 14863}
14864@conference {rao-pseudonymity, 14864@conference {rao-pseudonymity,
@@ -14872,7 +14872,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14872 abstract = {One of the core challenges facing the Internet today is the problem of ensuring privacy for its users. It is believed that mechanisms such as anonymity and pseudonymity are essential building blocks in formulating solutions to address these challenges and considerable effort has been devoted towards realizing these primitives in practice. The focus of this effort, however, has mostly been on hiding explicit identify information (such as source addresses) by employing a combination of anonymizing proxies, cryptographic techniques to distribute trust among them and traffic shaping techniques to defeat traffic analysis. We claim that such approaches ignore a significant amount of identifying information about the source that leaks from the contents of web traffic itself. In this paper, we demonstrate the significance and value of such information by showing how techniques from linguistics and stylometry can use this information to compromise pseudonymity in several important settings. We discuss the severity of this problem and suggest possible countermeasures}, 14872 abstract = {One of the core challenges facing the Internet today is the problem of ensuring privacy for its users. It is believed that mechanisms such as anonymity and pseudonymity are essential building blocks in formulating solutions to address these challenges and considerable effort has been devoted towards realizing these primitives in practice. The focus of this effort, however, has mostly been on hiding explicit identify information (such as source addresses) by employing a combination of anonymizing proxies, cryptographic techniques to distribute trust among them and traffic shaping techniques to defeat traffic analysis. We claim that such approaches ignore a significant amount of identifying information about the source that leaks from the contents of web traffic itself. In this paper, we demonstrate the significance and value of such information by showing how techniques from linguistics and stylometry can use this information to compromise pseudonymity in several important settings. We discuss the severity of this problem and suggest possible countermeasures},
14873 www_section = {anonymity, pseudonym}, 14873 www_section = {anonymity, pseudonym},
14874 url = {http://portal.acm.org/citation.cfm?id=1251313}, 14874 url = {http://portal.acm.org/citation.cfm?id=1251313},
14875 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/rao.pdf}, 14875 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/rao.pdf},
14876 author = {Josyula R. Rao and Pankaj Rohatgi} 14876 author = {Josyula R. Rao and Pankaj Rohatgi}
14877} 14877}
14878@conference {339337, 14878@conference {339337,
@@ -14889,7 +14889,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14889 isbn = {1-58113-194-1}, 14889 isbn = {1-58113-194-1},
14890 doi = {10.1145/339331.339337}, 14890 doi = {10.1145/339331.339337},
14891 url = {http://portal.acm.org/citation.cfm?id=339337$\#$}, 14891 url = {http://portal.acm.org/citation.cfm?id=339337$\#$},
14892 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/jsac-2001.pdf}, 14892 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/jsac-2001.pdf},
14893 author = {Chu, Yang-hua and Rao, Sanjay G. and Zhang, Hui} 14893 author = {Chu, Yang-hua and Rao, Sanjay G. and Zhang, Hui}
14894} 14894}
14895@conference {disad-free-routes, 14895@conference {disad-free-routes,
@@ -14904,7 +14904,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14904 www_section = {anonymity, attack}, 14904 www_section = {anonymity, attack},
14905 isbn = {3-540-41724-9}, 14905 isbn = {3-540-41724-9},
14906 url = {http://portal.acm.org/citation.cfm?id=371975}, 14906 url = {http://portal.acm.org/citation.cfm?id=371975},
14907 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/disad-free-routes.pdf}, 14907 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/disad-free-routes.pdf},
14908 author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke} 14908 author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke}
14909} 14909}
14910@conference {820485, 14910@conference {820485,
@@ -14919,7 +14919,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14919 www_section = {Low-Energy Adaptive Clustering Hierarchy, mobile Ad-hoc networks, routing, wireless sensor network}, 14919 www_section = {Low-Energy Adaptive Clustering Hierarchy, mobile Ad-hoc networks, routing, wireless sensor network},
14920 isbn = {0-7695-0493-0}, 14920 isbn = {0-7695-0493-0},
14921 url = {http://portal.acm.org/citation.cfm?id=820485$\#$}, 14921 url = {http://portal.acm.org/citation.cfm?id=820485$\#$},
14922 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.90.8499.pdf}, 14922 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.90.8499.pdf},
14923 author = {Heinzelman, Wendi Rabiner and Chandrakasan, Anantha and Hari Balakrishnan} 14923 author = {Heinzelman, Wendi Rabiner and Chandrakasan, Anantha and Hari Balakrishnan}
14924} 14924}
14925@conference {514164, 14925@conference {514164,
@@ -14934,7 +14934,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14934 www_section = {ad-hoc networks, cryptography}, 14934 www_section = {ad-hoc networks, cryptography},
14935 isbn = {0-7803-6534-8}, 14935 isbn = {0-7803-6534-8},
14936 url = {http://portal.acm.org/citation.cfm?id=514164}, 14936 url = {http://portal.acm.org/citation.cfm?id=514164},
14937 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.84.5715.pdf}, 14937 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.84.5715.pdf},
14938 author = {Levente Butty{\'a}n and Jean-Pierre Hubaux} 14938 author = {Levente Butty{\'a}n and Jean-Pierre Hubaux}
14939} 14939}
14940@article {339345, 14940@article {339345,
@@ -14951,7 +14951,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14951 issn = {0163-5999}, 14951 issn = {0163-5999},
14952 doi = {10.1145/345063.339345}, 14952 doi = {10.1145/345063.339345},
14953 url = {http://portal.acm.org/citation.cfm?id=345063.339345$\#$}, 14953 url = {http://portal.acm.org/citation.cfm?id=345063.339345$\#$},
14954 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.65.4280_0.pdf}, 14954 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.65.4280_0.pdf},
14955 author = {Bolosky, William J. and John R. Douceur and Ely, David and Marvin Theimer} 14955 author = {Bolosky, William J. and John R. Douceur and Ely, David and Marvin Theimer}
14956} 14956}
14957@conference {Pei00fisheyestate, 14957@conference {Pei00fisheyestate,
@@ -14962,7 +14962,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14962 abstract = {In this paper, we present a novel routing protocol for wireless ad hoc networks -- Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce routing update overhead in large networks. Nodes exchange link state entries with their neighbors with a frequency which depends on distance to destination. From link state entries, nodes construct the topology map of the entire network and compute optimal routes. Simulation experiments show that FSR is simple, efficient and scalable routing solution in a mobile, ad hoc environment. 1 Introduction As the wireless and embedded computing technologies continue to advance, increasing numbers of small size and high performance computing and communication devices will be capable of tetherless communications and ad hoc wireless networking. An ad hoc wireless network is a selforganizing and self-configuring network with the capability of rapid deployment in response to application needs}, 14962 abstract = {In this paper, we present a novel routing protocol for wireless ad hoc networks -- Fisheye State Routing (FSR). FSR introduces the notion of multi-level fisheye scope to reduce routing update overhead in large networks. Nodes exchange link state entries with their neighbors with a frequency which depends on distance to destination. From link state entries, nodes construct the topology map of the entire network and compute optimal routes. Simulation experiments show that FSR is simple, efficient and scalable routing solution in a mobile, ad hoc environment. 1 Introduction As the wireless and embedded computing technologies continue to advance, increasing numbers of small size and high performance computing and communication devices will be capable of tetherless communications and ad hoc wireless networking. An ad hoc wireless network is a selforganizing and self-configuring network with the capability of rapid deployment in response to application needs},
14963 www_section = {mobile Ad-hoc networks}, 14963 www_section = {mobile Ad-hoc networks},
14964 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.6730}, 14964 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.43.6730},
14965 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/05_75_fisheye-state-routing-in_0.pdf}, 14965 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/05_75_fisheye-state-routing-in_0.pdf},
14966 author = {Guangyu Pei and Mario Gerla and Tsu-Wei Chen} 14966 author = {Guangyu Pei and Mario Gerla and Tsu-Wei Chen}
14967} 14967}
14968@conference {freehaven-berk, 14968@conference {freehaven-berk,
@@ -14977,7 +14977,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14977 isbn = {978-3-540-41724-8}, 14977 isbn = {978-3-540-41724-8},
14978 doi = {10.1007/3-540-44702-4}, 14978 doi = {10.1007/3-540-44702-4},
14979 url = {http://www.springerlink.com/content/uh3mbw5m6u6xt24v/}, 14979 url = {http://www.springerlink.com/content/uh3mbw5m6u6xt24v/},
14980 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/freehaven_pres.pdf}, 14980 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/freehaven_pres.pdf},
14981 author = {Roger Dingledine and Michael J. Freedman and David Molnar} 14981 author = {Roger Dingledine and Michael J. Freedman and David Molnar}
14982} 14982}
14983@booklet {freedom2-arch, 14983@booklet {freedom2-arch,
@@ -14987,7 +14987,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
14987 publisher = {Zero Knowledge Systems, {Inc.}}, 14987 publisher = {Zero Knowledge Systems, {Inc.}},
14988 type = {White Paper}, 14988 type = {White Paper},
14989 abstract = {This white paper, targeted at the technically savvy reader, offers a detailed look at the Freedom 2.0 System architecture. It is intended to give the reader a good understanding of the components that make up this system and the relationships between them, as well as to encourage analysis of the system}, 14989 abstract = {This white paper, targeted at the technically savvy reader, offers a detailed look at the Freedom 2.0 System architecture. It is intended to give the reader a good understanding of the components that make up this system and the relationships between them, as well as to encourage analysis of the system},
14990 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/freedom2-arch.pdf}, 14990 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/freedom2-arch.pdf},
14991 url = {https://bibliography.gnunet.org}, 14991 url = {https://bibliography.gnunet.org},
14992 author = {Philippe Boucher and Adam Shostack and Ian Goldberg} 14992 author = {Philippe Boucher and Adam Shostack and Ian Goldberg}
14993} 14993}
@@ -15000,7 +15000,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
15000 address = {Berkeley, CA, USA}, 15000 address = {Berkeley, CA, USA},
15001 abstract = {We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and di$\#$cult for a node operator to determine or be held responsible for the actual physical contents of her own node}, 15001 abstract = {We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and di$\#$cult for a node operator to determine or be held responsible for the actual physical contents of her own node},
15002 url = {http://www.ecse.rpi.edu/Homepages/shivkuma/teaching/sp2001/readings/freenet.pdf}, 15002 url = {http://www.ecse.rpi.edu/Homepages/shivkuma/teaching/sp2001/readings/freenet.pdf},
15003 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/freenet.pdf}, 15003 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/freenet.pdf},
15004 author = {Ian Clarke and Sandberg, Oskar and Brandon Wiley and Theodore W. Hong} 15004 author = {Ian Clarke and Sandberg, Oskar and Brandon Wiley and Theodore W. Hong}
15005} 15005}
15006@conference {freenet, 15006@conference {freenet,
@@ -15012,7 +15012,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
15012 abstract = {We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and di$\#$cult for a node operator to determine or be held responsible for the actual physical contents of her own node}, 15012 abstract = {We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and di$\#$cult for a node operator to determine or be held responsible for the actual physical contents of her own node},
15013 www_section = {anonymity, Freenet, P2P}, 15013 www_section = {anonymity, Freenet, P2P},
15014 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4919}, 15014 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4919},
15015 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.10.4919_0.pdf}, 15015 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.10.4919_0.pdf},
15016 author = {Ian Clarke and Sandberg, Oskar and Brandon Wiley and Theodore W. Hong} 15016 author = {Ian Clarke and Sandberg, Oskar and Brandon Wiley and Theodore W. Hong}
15017} 15017}
15018@conference {Clarke00freenet:a, 15018@conference {Clarke00freenet:a,
@@ -15023,7 +15023,7 @@ This book focuses on the principal-agent model, the "simple" situation where a p
15023 abstract = {We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and di$\#$cult for a node operator to determine or be held responsible for the actual physical contents of her own node}, 15023 abstract = {We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and di$\#$cult for a node operator to determine or be held responsible for the actual physical contents of her own node},
15024 www_section = {Freenet, P2P}, 15024 www_section = {Freenet, P2P},
15025 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4919}, 15025 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.10.4919},
15026 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.10.4919.pdf}, 15026 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.10.4919.pdf},
15027 author = {Ian Clarke and Sandberg, Oskar and Brandon Wiley and Theodore W. Hong} 15027 author = {Ian Clarke and Sandberg, Oskar and Brandon Wiley and Theodore W. Hong}
15028} 15028}
15029@conference {desmedt, 15029@conference {desmedt,
@@ -15038,7 +15038,7 @@ A part of this research was done while the author visited the Tokyo Institute of
15038 isbn = {978-3-540-67517-4}, 15038 isbn = {978-3-540-67517-4},
15039 doi = {10.1007/3-540-45539-6}, 15039 doi = {10.1007/3-540-45539-6},
15040 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.1814}, 15040 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.29.1814},
15041 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.29.1814.pdf}, 15041 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.29.1814.pdf},
15042 author = {Yvo Desmedt and Kaoru Kurosawa} 15042 author = {Yvo Desmedt and Kaoru Kurosawa}
15043} 15043}
15044@conference {hybrid-mix, 15044@conference {hybrid-mix,
@@ -15052,7 +15052,7 @@ A part of this research was done while the author visited the Tokyo Institute of
15052 isbn = {3-540-41404-5}, 15052 isbn = {3-540-41404-5},
15053 doi = {10.1007/3-540-44448-3_14}, 15053 doi = {10.1007/3-540-44448-3_14},
15054 url = {http://portal.acm.org/citation.cfm?id=647096.716874}, 15054 url = {http://portal.acm.org/citation.cfm?id=647096.716874},
15055 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.87.7718.pdf}, 15055 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.87.7718.pdf},
15056 author = {Miyako Ohkubo and Masayuki Abe} 15056 author = {Miyako Ohkubo and Masayuki Abe}
15057} 15057}
15058@conference {379239, 15058@conference {379239,
@@ -15067,7 +15067,7 @@ A part of this research was done while the author visited the Tokyo Institute of
15067 isbn = {1-58113-317-0}, 15067 isbn = {1-58113-317-0},
15068 doi = {10.1145/378993.379239}, 15068 doi = {10.1145/378993.379239},
15069 url = {http://doi.acm.org/10.1145/378993.379239}, 15069 url = {http://doi.acm.org/10.1145/378993.379239},
15070 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p190-kubi.pdf}, 15070 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p190-kubi.pdf},
15071 author = {John Kubiatowicz and Bindel, David and Chen, Yan and Czerwinski, Steven and Eaton, Patrick and Geels, Dennis and Gummadi, Ramakrishna and Rhea, Sean C. and Weatherspoon, Hakim and Wells, Chris and Ben Y. Zhao} 15071 author = {John Kubiatowicz and Bindel, David and Chen, Yan and Czerwinski, Steven and Eaton, Patrick and Geels, Dennis and Gummadi, Ramakrishna and Rhea, Sean C. and Weatherspoon, Hakim and Wells, Chris and Ben Y. Zhao}
15072} 15072}
15073@conference {onion-discex00, 15073@conference {onion-discex00,
@@ -15081,7 +15081,7 @@ A part of this research was done while the author visited the Tokyo Institute of
15081 abstract = {Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Thus it hides not only the data being sent, but who is talking to whom. Onion Routing's anonymous connections are bidirectional and near real-time, and can be used anywhere a socket connection can be used. Proxy aware applications, such as web browsing and e-mail, require no modification to use Onion Routing, and do so through a series of proxies. Other applications, such as remote login, can also use the system without modification. Access to an onion routing network can be configured in a variety of ways depending on the needs, policies, and facilities of those connecting. This paper describes some of these access configurations and also provides a basic overview of Onion Routing and comparisons with related work}, 15081 abstract = {Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Thus it hides not only the data being sent, but who is talking to whom. Onion Routing's anonymous connections are bidirectional and near real-time, and can be used anywhere a socket connection can be used. Proxy aware applications, such as web browsing and e-mail, require no modification to use Onion Routing, and do so through a series of proxies. Other applications, such as remote login, can also use the system without modification. Access to an onion routing network can be configured in a variety of ways depending on the needs, policies, and facilities of those connecting. This paper describes some of these access configurations and also provides a basic overview of Onion Routing and comparisons with related work},
15082 www_section = {anonymity, privacy, traffic analysis}, 15082 www_section = {anonymity, privacy, traffic analysis},
15083 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.4633}, 15083 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.4633},
15084 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/onion-discex00.pdf}, 15084 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/onion-discex00.pdf},
15085 author = {Paul Syverson and Michael Reed and David Goldschlag} 15085 author = {Paul Syverson and Michael Reed and David Goldschlag}
15086} 15086}
15087@conference {Jannotti:2000:ORM:1251229.1251243, 15087@conference {Jannotti:2000:ORM:1251229.1251243,
@@ -15101,7 +15101,7 @@ Overcast provides scalable and reliable single-source multicast using a simple p
15101Results based on simulations confirm that Overcast provides its added functionality while performing competitively with IP Multicast. Simulations indicate that Overcast quickly builds bandwidth-efficient distribution trees that, compared to IP Multicast, provide 70\%-100\% of the total bandwidth possible, at a cost of somewhat less than twice the network load. In addition, Overcast adapts quickly to changes caused by the addition of new nodes or the failure of existing nodes without causing undue load on the multicast source}, 15101Results based on simulations confirm that Overcast provides its added functionality while performing competitively with IP Multicast. Simulations indicate that Overcast quickly builds bandwidth-efficient distribution trees that, compared to IP Multicast, provide 70\%-100\% of the total bandwidth possible, at a cost of somewhat less than twice the network load. In addition, Overcast adapts quickly to changes caused by the addition of new nodes or the failure of existing nodes without causing undue load on the multicast source},
15102 www_section = {overcast, overlay network}, 15102 www_section = {overcast, overlay network},
15103 url = {http://dl.acm.org/citation.cfm?id=1251229.1251243}, 15103 url = {http://dl.acm.org/citation.cfm?id=1251229.1251243},
15104 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/OSDI\%2700\%20-\%20Overcast.pdf}, 15104 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/OSDI\%2700\%20-\%20Overcast.pdf},
15105 author = {Jannotti, John and Gifford, David K. and Johnson, Kirk L. and Frans M. Kaashoek and O'Toole Jr., James W.} 15105 author = {Jannotti, John and Gifford, David K. and Johnson, Kirk L. and Frans M. Kaashoek and O'Toole Jr., James W.}
15106} 15106}
15107@conference {Song00practicaltechniques, 15107@conference {Song00practicaltechniques,
@@ -15112,7 +15112,7 @@ Results based on simulations confirm that Overcast provides its added functional
15112 address = { Berkeley, CA, USA}, 15112 address = { Berkeley, CA, USA},
15113 abstract = {It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that one has to sacrifice functionality for security. For example, if a client wishes to retrieve only documents containing certain words, it was not previously known how to let the data storage server perform the search and answer the query without loss of data confidentiality}, 15113 abstract = {It is desirable to store data on data storage servers such as mail servers and file servers in encrypted form to reduce security and privacy risks. But this usually implies that one has to sacrifice functionality for security. For example, if a client wishes to retrieve only documents containing certain words, it was not previously known how to let the data storage server perform the search and answer the query without loss of data confidentiality},
15114 isbn = {0-7695-0665-8}, 15114 isbn = {0-7695-0665-8},
15115 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/encrypteddata.pdf}, 15115 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/encrypteddata.pdf},
15116 url = {https://bibliography.gnunet.org}, 15116 url = {https://bibliography.gnunet.org},
15117 author = {Dawn Xiaodong Song and David Wagner and Adrian Perrig} 15117 author = {Dawn Xiaodong Song and David Wagner and Adrian Perrig}
15118} 15118}
@@ -15126,7 +15126,7 @@ Results based on simulations confirm that Overcast provides its added functional
15126 abstract = {This paper presents a new protocol for initiator anonymity called Hordes, which uses forwarding mechanisms similar to those used in previous protocols for sending data, but is the first protocol to make use of the anonymity inherent in multicast routing to receive data. We show this results in shorter transmission latencies and requires less work of the protocol participants, in terms of the messages processed. We also present a comparison of the security and anonymity of Hordes with previous protocols, using the first quantitative definition of anonymity and unlinkability. Our analysis shows that Hordes provides anonymity in a degree similar to that of Crowds and Onion Routing, but also that Hordes has numerous performance advantages}, 15126 abstract = {This paper presents a new protocol for initiator anonymity called Hordes, which uses forwarding mechanisms similar to those used in previous protocols for sending data, but is the first protocol to make use of the anonymity inherent in multicast routing to receive data. We show this results in shorter transmission latencies and requires less work of the protocol participants, in terms of the messages processed. We also present a comparison of the security and anonymity of Hordes with previous protocols, using the first quantitative definition of anonymity and unlinkability. Our analysis shows that Hordes provides anonymity in a degree similar to that of Crowds and Onion Routing, but also that Hordes has numerous performance advantages},
15127 www_section = {Hordes, multicast}, 15127 www_section = {Hordes, multicast},
15128 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.37.3890\&rep=rep1\&type=url\&i=0}, 15128 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.37.3890\&rep=rep1\&type=url\&i=0},
15129 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/hordes-final-all.dvi_.pdf}, 15129 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/hordes-final-all.dvi_.pdf},
15130 author = {Clay Shields and Brian Neil Levine} 15130 author = {Clay Shields and Brian Neil Levine}
15131} 15131}
15132@mastersthesis {ian-thesis, 15132@mastersthesis {ian-thesis,
@@ -15139,7 +15139,7 @@ Results based on simulations confirm that Overcast provides its added functional
15139 www_section = {pseudonym}, 15139 www_section = {pseudonym},
15140 isbn = {0-493-10500-X}, 15140 isbn = {0-493-10500-X},
15141 url = {http://portal.acm.org/citation.cfm?id=933285}, 15141 url = {http://portal.acm.org/citation.cfm?id=933285},
15142 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.5.3353.pdf}, 15142 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.5.3353.pdf},
15143 author = {Ian Goldberg} 15143 author = {Ian Goldberg}
15144} 15144}
15145@conference {publius, 15145@conference {publius,
@@ -15150,7 +15150,7 @@ Results based on simulations confirm that Overcast provides its added functional
15150 pages = {59--72}, 15150 pages = {59--72},
15151 abstract = {We describe a system that we have designed and implemented for publishing content on the web. Our publishing scheme has the property that it is very difficult for any adversary to censor or modify the content. In addition, the identity of the publisher is protected once the content is posted. Our system differs from others in that we provide tools for updating or deleting the published content, and users can browse the content in the normal point and click manner using a standard web browser and a client-side proxy that we provide. All of our code is freely available}, 15151 abstract = {We describe a system that we have designed and implemented for publishing content on the web. Our publishing scheme has the property that it is very difficult for any adversary to censor or modify the content. In addition, the identity of the publisher is protected once the content is posted. Our system differs from others in that we provide tools for updating or deleting the published content, and users can browse the content in the normal point and click manner using a standard web browser and a client-side proxy that we provide. All of our code is freely available},
15152 url = {http://portal.acm.org/citation.cfm?id=1251311}, 15152 url = {http://portal.acm.org/citation.cfm?id=1251311},
15153 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/publius.pdf}, 15153 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/publius.pdf},
15154 author = {Marc Waldman and Aviel D. Rubin and Lorrie Cranor} 15154 author = {Marc Waldman and Aviel D. Rubin and Lorrie Cranor}
15155} 15155}
15156@article {Resnick:2000:RS:355112.355122, 15156@article {Resnick:2000:RS:355112.355122,
@@ -15166,7 +15166,7 @@ Results based on simulations confirm that Overcast provides its added functional
15166 issn = {0001-0782}, 15166 issn = {0001-0782},
15167 doi = {http://doi.acm.org/10.1145/355112.355122}, 15167 doi = {http://doi.acm.org/10.1145/355112.355122},
15168 url = {http://doi.acm.org/10.1145/355112.355122}, 15168 url = {http://doi.acm.org/10.1145/355112.355122},
15169 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Communications\%20of\%20the\%20ACM\%20-\%20Reputation\%20Systems.pdf}, 15169 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Communications\%20of\%20the\%20ACM\%20-\%20Reputation\%20Systems.pdf},
15170 author = {Paul Resnick and Kuwabara, Ko and Zeckhauser, Richard and Eric Friedman} 15170 author = {Paul Resnick and Kuwabara, Ko and Zeckhauser, Richard and Eric Friedman}
15171} 15171}
15172@booklet {896561, 15172@booklet {896561,
@@ -15175,7 +15175,7 @@ Results based on simulations confirm that Overcast provides its added functional
15175 publisher = {University of Mannheim}, 15175 publisher = {University of Mannheim},
15176 abstract = {Feedback from multicast group members is vital for many multicast protocols. In order to avoid feedback implosion in very large groups feedback algorithms with well behaved scaling-properties must be chosen. In this paper we analyse the performance of three typical feedback algorithms described in the literature. Apart from the basic trade-off between feedback latency and response duplicates we especially focus on the algorithms'' sensitivity to the quality of the group size estimation. Based on this analysis we give recommendations for the choice of well behaved feedback algorithms that are suitable for very large groups}, 15176 abstract = {Feedback from multicast group members is vital for many multicast protocols. In order to avoid feedback implosion in very large groups feedback algorithms with well behaved scaling-properties must be chosen. In this paper we analyse the performance of three typical feedback algorithms described in the literature. Apart from the basic trade-off between feedback latency and response duplicates we especially focus on the algorithms'' sensitivity to the quality of the group size estimation. Based on this analysis we give recommendations for the choice of well behaved feedback algorithms that are suitable for very large groups},
15177 url = {http://portal.acm.org/citation.cfm?id=896561$\#$}, 15177 url = {http://portal.acm.org/citation.cfm?id=896561$\#$},
15178 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Fuhrmann2001a.pdf}, 15178 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Fuhrmann2001a.pdf},
15179 author = {Thomas Fuhrmann} 15179 author = {Thomas Fuhrmann}
15180} 15180}
15181@conference {Minsky00setreconciliation, 15181@conference {Minsky00setreconciliation,
@@ -15184,7 +15184,7 @@ Results based on simulations confirm that Overcast provides its added functional
15184 year = {2000}, 15184 year = {2000},
15185 pages = {0--232}, 15185 pages = {0--232},
15186 www_section = {set reconciliation}, 15186 www_section = {set reconciliation},
15187 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/reconcile.pdf}, 15187 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/reconcile.pdf},
15188 url = {https://bibliography.gnunet.org}, 15188 url = {https://bibliography.gnunet.org},
15189 author = {Yaron Minsky and Ari Trachtenberg and Richard Zippel} 15189 author = {Yaron Minsky and Ari Trachtenberg and Richard Zippel}
15190} 15190}
@@ -15196,7 +15196,7 @@ Results based on simulations confirm that Overcast provides its added functional
15196 abstract = {We present an architecture that enables the sharing of information among mobile, wireless, collaborating hosts that experience intermittent connectivity to the Internet. Participants in the system obtain data objects from Internet-connected servers, cache them and exchange them with others who are interested in them. The system exploits the fact that there is a high locality of information access within a geographic area. It aims to increase the data availability to participants with lost connectivity to the Internet. We discuss the main components of the system and possible applications. Finally, we present simulation results that show that the ad hoc networks can be very e$\#$ective in distributing popular information. 1 Introduction In a few years, a large percentage of the population in metropolitan areas will be equipped with PDAs, laptops or cell phones with built-in web browsers. Thus, access to information and entertainment will become as important as voice communications}, 15196 abstract = {We present an architecture that enables the sharing of information among mobile, wireless, collaborating hosts that experience intermittent connectivity to the Internet. Participants in the system obtain data objects from Internet-connected servers, cache them and exchange them with others who are interested in them. The system exploits the fact that there is a high locality of information access within a geographic area. It aims to increase the data availability to participants with lost connectivity to the Internet. We discuss the main components of the system and possible applications. Finally, we present simulation results that show that the ad hoc networks can be very e$\#$ective in distributing popular information. 1 Introduction In a few years, a large percentage of the population in metropolitan areas will be equipped with PDAs, laptops or cell phones with built-in web browsers. Thus, access to information and entertainment will become as important as voice communications},
15197 www_section = {802.11, file-sharing}, 15197 www_section = {802.11, file-sharing},
15198 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.5640}, 15198 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.36.5640},
15199 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/globecom00.pdf}, 15199 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/globecom00.pdf},
15200 author = {Maria Papadopouli and Henning G. Schulzrinne} 15200 author = {Maria Papadopouli and Henning G. Schulzrinne}
15201} 15201}
15202@conference {335325, 15202@conference {335325,
@@ -15212,7 +15212,7 @@ Results based on simulations confirm that Overcast provides its added functional
15212 isbn = {1-58113-184-4}, 15212 isbn = {1-58113-184-4},
15213 doi = {10.1145/335305.335325}, 15213 doi = {10.1145/335305.335325},
15214 url = {http://portal.acm.org/citation.cfm?id=335325$\#$}, 15214 url = {http://portal.acm.org/citation.cfm?id=335325$\#$},
15215 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/swn.pdf}, 15215 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/swn.pdf},
15216 author = {Kleinberg, Jon} 15216 author = {Kleinberg, Jon}
15217} 15217}
15218@conference {onion-routing:pet2000, 15218@conference {onion-routing:pet2000,
@@ -15228,7 +15228,7 @@ Results based on simulations confirm that Overcast provides its added functional
15228 isbn = {978-3-540-41724-8}, 15228 isbn = {978-3-540-41724-8},
15229 doi = {10.1007/3-540-44702-4}, 15229 doi = {10.1007/3-540-44702-4},
15230 url = {http://portal.acm.org/citation.cfm?id=371981}, 15230 url = {http://portal.acm.org/citation.cfm?id=371981},
15231 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.34.5547.pdf}, 15231 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.34.5547.pdf},
15232 author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr} 15232 author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr}
15233} 15233}
15234@conference {raymond00, 15234@conference {raymond00,
@@ -15244,7 +15244,7 @@ Results based on simulations confirm that Overcast provides its added functional
15244 isbn = {3-540-41724-9}, 15244 isbn = {3-540-41724-9},
15245 doi = {10.1007/3-540-44702-4}, 15245 doi = {10.1007/3-540-44702-4},
15246 url = {http://portal.acm.org/citation.cfm?id=371972}, 15246 url = {http://portal.acm.org/citation.cfm?id=371972},
15247 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/raymond00.pdf}, 15247 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/raymond00.pdf},
15248 author = {Jean-Fran{\c c}ois Raymond} 15248 author = {Jean-Fran{\c c}ois Raymond}
15249} 15249}
15250@booklet {Rivest00trusteconomies, 15250@booklet {Rivest00trusteconomies,
@@ -15252,7 +15252,7 @@ Results based on simulations confirm that Overcast provides its added functional
15252 year = {2000}, 15252 year = {2000},
15253 abstract = {The Free Haven Project aims to deploy a system for distributed data storage which is robust against attempts by powerful adversaries to find and destroy stored data. Free Haven uses a secure mixnet for communication, and it emphasizes distributed, reliable, and anonymous storage over e$\#$cient retrieval. We provide a system for building trust between pseudonymous entities, based entirely on records of observed behavior. Modelling these observed behaviors as an economy allows us to draw heavily on previous economic theory, as well as on existing data havens which base their accountability on financial loss. This trust system provides a means of enforcing accountability without sacrificing anonymity}, 15253 abstract = {The Free Haven Project aims to deploy a system for distributed data storage which is robust against attempts by powerful adversaries to find and destroy stored data. Free Haven uses a secure mixnet for communication, and it emphasizes distributed, reliable, and anonymous storage over e$\#$cient retrieval. We provide a system for building trust between pseudonymous entities, based entirely on records of observed behavior. Modelling these observed behaviors as an economy allows us to draw heavily on previous economic theory, as well as on existing data havens which base their accountability on financial loss. This trust system provides a means of enforcing accountability without sacrificing anonymity},
15254 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.27.1639\&rep=rep1\&type=pdf}, 15254 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.27.1639\&rep=rep1\&type=pdf},
15255 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.27.1639\%20\%282\%29.pdf}, 15255 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.27.1639\%20\%282\%29.pdf},
15256 author = {Ron Rivest and Arthur C. Smith and Brian T. Sniffen} 15256 author = {Ron Rivest and Arthur C. Smith and Brian T. Sniffen}
15257} 15257}
15258@book {2000, 15258@book {2000,
@@ -15280,7 +15280,7 @@ Results based on simulations confirm that Overcast provides its added functional
15280 isbn = {978-3-540-41724-8}, 15280 isbn = {978-3-540-41724-8},
15281 doi = {10.1007/3-540-44702-4}, 15281 doi = {10.1007/3-540-44702-4},
15282 url = {http://portal.acm.org/citation.cfm?id=371983}, 15282 url = {http://portal.acm.org/citation.cfm?id=371983},
15283 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/web-mix-pet2000.pdf}, 15283 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/web-mix-pet2000.pdf},
15284 author = {Oliver Berthold and Hannes Federrath and Stefan K{\"o}psell} 15284 author = {Oliver Berthold and Hannes Federrath and Stefan K{\"o}psell}
15285} 15285}
15286@article {335405, 15286@article {335405,
@@ -15297,7 +15297,7 @@ Results based on simulations confirm that Overcast provides its added functional
15297 issn = {0163-5808}, 15297 issn = {0163-5808},
15298 doi = {10.1145/335191.335405}, 15298 doi = {10.1145/335191.335405},
15299 url = {http://portal.acm.org/citation.cfm?id=335405$\#$}, 15299 url = {http://portal.acm.org/citation.cfm?id=335405$\#$},
15300 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.33.2632.pdf}, 15300 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.33.2632.pdf},
15301 author = {Liefke, Hartmut and Suciu, Dan} 15301 author = {Liefke, Hartmut and Suciu, Dan}
15302} 15302}
15303@article {xor-trees, 15303@article {xor-trees,
@@ -15315,7 +15315,7 @@ Results based on simulations confirm that Overcast provides its added functional
15315 issn = {1094-9224}, 15315 issn = {1094-9224},
15316 doi = {10.1145/354876.354877}, 15316 doi = {10.1145/354876.354877},
15317 url = {http://portal.acm.org/citation.cfm?id=354876.354877}, 15317 url = {http://portal.acm.org/citation.cfm?id=354876.354877},
15318 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.73.6464.pdf}, 15318 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.73.6464.pdf},
15319 author = {Shlomi Dolev and Rafail Ostrovsky} 15319 author = {Shlomi Dolev and Rafail Ostrovsky}
15320} 15320}
15321@conference {Nisan:1999:AMD:301250.301287, 15321@conference {Nisan:1999:AMD:301250.301287,
@@ -15333,7 +15333,7 @@ Results based on simulations confirm that Overcast provides its added functional
15333 isbn = {1-58113-067-8}, 15333 isbn = {1-58113-067-8},
15334 doi = {http://doi.acm.org/10.1145/301250.301287}, 15334 doi = {http://doi.acm.org/10.1145/301250.301287},
15335 url = {http://doi.acm.org/10.1145/301250.301287}, 15335 url = {http://doi.acm.org/10.1145/301250.301287},
15336 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/STOC\%2799\%20-\%20Nisan\%20\%26\%20Ronen\%20-\%20Algorithmic\%20mechanism\%20design.pdf}, 15336 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/STOC\%2799\%20-\%20Nisan\%20\%26\%20Ronen\%20-\%20Algorithmic\%20mechanism\%20design.pdf},
15337 author = {Nisan, Noam and Ronen, Amir} 15337 author = {Nisan, Noam and Ronen, Amir}
15338} 15338}
15339@conference {Nisan:1999:ASA:1764891.1764893, 15339@conference {Nisan:1999:ASA:1764891.1764893,
@@ -15352,7 +15352,7 @@ This exposition presents a model to formally study such algorithms. This model,
15352 www_section = {algorithms, mechanism design, selfish agent}, 15352 www_section = {algorithms, mechanism design, selfish agent},
15353 isbn = {3-540-65691-X}, 15353 isbn = {3-540-65691-X},
15354 url = {http://dl.acm.org/citation.cfm?id=1764891.1764893}, 15354 url = {http://dl.acm.org/citation.cfm?id=1764891.1764893},
15355 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/STACS\%2799\%20-\%20Nisan\%20-\%20Algorithms\%20for\%20selfish\%20agents.pdf}, 15355 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/STACS\%2799\%20-\%20Nisan\%20-\%20Algorithms\%20for\%20selfish\%20agents.pdf},
15356 author = {Nisan, Noam} 15356 author = {Nisan, Noam}
15357} 15357}
15358@article {338955, 15358@article {338955,
@@ -15369,7 +15369,7 @@ This exposition presents a model to formally study such algorithms. This model,
15369 issn = {1064-5462}, 15369 issn = {1064-5462},
15370 doi = {10.1162/106454699568728}, 15370 doi = {10.1162/106454699568728},
15371 url = {http://portal.acm.org/citation.cfm?id=338955$\#$}, 15371 url = {http://portal.acm.org/citation.cfm?id=338955$\#$},
15372 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ij_23-alife99.pdf}, 15372 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ij_23-alife99.pdf},
15373 author = {Dorigo, Marco and Di Caro, Gianni and Gambardella, Luca M.} 15373 author = {Dorigo, Marco and Di Caro, Gianni and Gambardella, Luca M.}
15374} 15374}
15375@conference {1039861, 15375@conference {1039861,
@@ -15383,7 +15383,7 @@ This exposition presents a model to formally study such algorithms. This model,
15383 abstract = {Burt is a freely distributed parallel network backup system written at the University of Wisconsin, Madison. It is designed to backup large heterogeneous networks. It uses the Tcl scripting language and standard backup programs like dump(1) and GNUTar to enable backups of a wide variety of data sources, including UNIX and Windows NT workstations, AFS based storage, and others. It also uses Tcl for the creation of the user interface, giving the system administrator great flexibility in customizing the system. Burt supports parallel backups to ensure high backup speeds, and checksums to ensure data integrity. The principal contribution of Burt is that it provides a powerful I/O engine within the context of a flexible scripting language; this combination enables graceful solutions to many problems associated with backups of large installations. At our site, we use Burt to backup data from 350 workstations and from our AFS servers, a total of approximately 900 GB every two weeks}, 15383 abstract = {Burt is a freely distributed parallel network backup system written at the University of Wisconsin, Madison. It is designed to backup large heterogeneous networks. It uses the Tcl scripting language and standard backup programs like dump(1) and GNUTar to enable backups of a wide variety of data sources, including UNIX and Windows NT workstations, AFS based storage, and others. It also uses Tcl for the creation of the user interface, giving the system administrator great flexibility in customizing the system. Burt supports parallel backups to ensure high backup speeds, and checksums to ensure data integrity. The principal contribution of Burt is that it provides a powerful I/O engine within the context of a flexible scripting language; this combination enables graceful solutions to many problems associated with backups of large installations. At our site, we use Burt to backup data from 350 workstations and from our AFS servers, a total of approximately 900 GB every two weeks},
15384 www_section = {backup}, 15384 www_section = {backup},
15385 url = {http://portal.acm.org/citation.cfm?id=1039861$\#$}, 15385 url = {http://portal.acm.org/citation.cfm?id=1039861$\#$},
15386 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.112.7612.pdf}, 15386 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.112.7612.pdf},
15387 author = {Melski, Eric} 15387 author = {Melski, Eric}
15388} 15388}
15389@article {319159, 15389@article {319159,
@@ -15400,7 +15400,7 @@ This exposition presents a model to formally study such algorithms. This model,
15400 issn = {0163-5980}, 15400 issn = {0163-5980},
15401 doi = {10.1145/319344.319159}, 15401 doi = {10.1145/319344.319159},
15402 url = {http://portal.acm.org/citation.cfm?id=319159$\#$}, 15402 url = {http://portal.acm.org/citation.cfm?id=319159$\#$},
15403 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/p110-santry.pdf}, 15403 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/p110-santry.pdf},
15404 author = {Santry, Douglas S. and Feeley, Michael J. and Hutchinson, Norman C. and Veitch, Alistair C. and Carton, Ross W. and Ofir, Jacob} 15404 author = {Santry, Douglas S. and Feeley, Michael J. and Hutchinson, Norman C. and Veitch, Alistair C. and Carton, Ross W. and Ofir, Jacob}
15405} 15405}
15406@mastersthesis {1999_0, 15406@mastersthesis {1999_0,
@@ -15423,7 +15423,7 @@ This exposition presents a model to formally study such algorithms. This model,
15423 address = {New York, NY, USA}, 15423 address = {New York, NY, USA},
15424 isbn = {1-58113-099-6}, 15424 isbn = {1-58113-099-6},
15425 doi = {http://doi.acm.org/10.1145/301308.301333}, 15425 doi = {http://doi.acm.org/10.1145/301308.301333},
15426 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/flash-mix.pdf}, 15426 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/flash-mix.pdf},
15427 url = {https://bibliography.gnunet.org}, 15427 url = {https://bibliography.gnunet.org},
15428 author = {Jakobsson, Markus} 15428 author = {Jakobsson, Markus}
15429} 15429}
@@ -15438,7 +15438,7 @@ This exposition presents a model to formally study such algorithms. This model,
15438 isbn = {3-540-66587-0}, 15438 isbn = {3-540-66587-0},
15439 doi = {10.1007/3-540-48119-2}, 15439 doi = {10.1007/3-540-48119-2},
15440 url = {http://portal.acm.org/citation.cfm?id=730472}, 15440 url = {http://portal.acm.org/citation.cfm?id=730472},
15441 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/1999syverson-fm99.pdf}, 15441 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/1999syverson-fm99.pdf},
15442 author = {Paul Syverson and Stuart Stubblebine} 15442 author = {Paul Syverson and Stuart Stubblebine}
15443} 15443}
15444@conference {758535, 15444@conference {758535,
@@ -15453,7 +15453,7 @@ This exposition presents a model to formally study such algorithms. This model,
15453 www_section = {coding theory, irregular bipartite graphs, recovery algorithm}, 15453 www_section = {coding theory, irregular bipartite graphs, recovery algorithm},
15454 isbn = {3-540-66723-7}, 15454 isbn = {3-540-66723-7},
15455 url = {http://portal.acm.org/citation.cfm?id=758535\&dl=GUIDE\&coll=GUIDE\&CFID=102355791\&CFTOKEN=32605420$\#$}, 15455 url = {http://portal.acm.org/citation.cfm?id=758535\&dl=GUIDE\&coll=GUIDE\&CFID=102355791\&CFTOKEN=32605420$\#$},
15456 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/new_sequences_of_linear_time_erasure_cod_64778.pdf}, 15456 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/new_sequences_of_linear_time_erasure_cod_64778.pdf},
15457 author = {M. Amin Shokrollahi} 15457 author = {M. Amin Shokrollahi}
15458} 15458}
15459@conference {313556, 15459@conference {313556,
@@ -15469,7 +15469,7 @@ This exposition presents a model to formally study such algorithms. This model,
15469 isbn = {1-58113-142-9}, 15469 isbn = {1-58113-142-9},
15470 doi = {10.1145/313451.313556}, 15470 doi = {10.1145/313451.313556},
15471 url = {http://portal.acm.org/citation.cfm?id=313451.313556$\#$}, 15471 url = {http://portal.acm.org/citation.cfm?id=313451.313556$\#$},
15472 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.88.2867.pdf}, 15472 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.88.2867.pdf},
15473 author = {Deborah Estrin and Govindan, Ramesh and Heidemann, John and Kumar, Satish} 15473 author = {Deborah Estrin and Govindan, Ramesh and Heidemann, John and Kumar, Satish}
15474} 15474}
15475@article {Goldschlag99onionrouting, 15475@article {Goldschlag99onionrouting,
@@ -15480,7 +15480,7 @@ This exposition presents a model to formally study such algorithms. This model,
15480 pages = {39--41}, 15480 pages = {39--41},
15481 abstract = {this article's publication, the prototype network is processing more than 1 million Web connections per month from more than six thousand IP addresses in twenty countries and in all six main top level domains. [7] Onion Routing operates by dynamically building anonymous connections within a network of real-time Chaum Mixes [3]. A Mix is a store and forward device that accepts a number of fixed-length messages from numerous sources, performs cryptographic transformations on the messages, and then forwards the messages to the next destination in a random order. A single Mix makes tracking of a particular message either by specific bit-pattern, size, or ordering with respect to other messages difficult. By routing through numerous Mixes in the network, determining who is talking to whom becomes even more difficult. Onion Routing's network of core onion-routers (Mixes) is distributed, faulttolerant, and under the control of multiple administrative domains, so no single onion-router can bring down the network or compromise a user's privacy, and cooperation between compromised onion-routers is thereby confounded}, 15481 abstract = {this article's publication, the prototype network is processing more than 1 million Web connections per month from more than six thousand IP addresses in twenty countries and in all six main top level domains. [7] Onion Routing operates by dynamically building anonymous connections within a network of real-time Chaum Mixes [3]. A Mix is a store and forward device that accepts a number of fixed-length messages from numerous sources, performs cryptographic transformations on the messages, and then forwards the messages to the next destination in a random order. A single Mix makes tracking of a particular message either by specific bit-pattern, size, or ordering with respect to other messages difficult. By routing through numerous Mixes in the network, determining who is talking to whom becomes even more difficult. Onion Routing's network of core onion-routers (Mixes) is distributed, faulttolerant, and under the control of multiple administrative domains, so no single onion-router can bring down the network or compromise a user's privacy, and cooperation between compromised onion-routers is thereby confounded},
15482 url = { http://www.onion-router.net/Publications/CACM-1999 }, 15482 url = { http://www.onion-router.net/Publications/CACM-1999 },
15483 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/onionrouting.pdf}, 15483 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/onionrouting.pdf},
15484 author = {David Goldschlag and Michael Reed and Paul Syverson} 15484 author = {David Goldschlag and Michael Reed and Paul Syverson}
15485} 15485}
15486@conference {1268712, 15486@conference {1268712,
@@ -15493,7 +15493,7 @@ This exposition presents a model to formally study such algorithms. This model,
15493 address = {Berkeley, CA, USA}, 15493 address = {Berkeley, CA, USA},
15494 abstract = {In this paper we describe a technique called operation-based update propagation for efficiently transmitting updates to large files that have been modified on a weakly connected client of a distributed file system. In this technique, modifications are captured above the file-system layer at the client, shipped to a surrogate client that is strongly connected to a server, re-executed at the surrogate, and the resulting files transmitted from the surrogate to the server. If re-execution fails to produce a file identical to the original, the system falls back to shipping the file from the client over the slow network. We have implemented a prototype of this mechanism in the Coda File System on Linux, and demonstrated performance improvements ranging from 40 percents to nearly three orders of magnitude in reduced network traffic and elapsed time. We also found a novel use of forward error correction in this context}, 15494 abstract = {In this paper we describe a technique called operation-based update propagation for efficiently transmitting updates to large files that have been modified on a weakly connected client of a distributed file system. In this technique, modifications are captured above the file-system layer at the client, shipped to a surrogate client that is strongly connected to a server, re-executed at the surrogate, and the resulting files transmitted from the surrogate to the server. If re-execution fails to produce a file identical to the original, the system falls back to shipping the file from the client over the slow network. We have implemented a prototype of this mechanism in the Coda File System on Linux, and demonstrated performance improvements ranging from 40 percents to nearly three orders of magnitude in reduced network traffic and elapsed time. We also found a novel use of forward error correction in this context},
15495 url = {http://portal.acm.org/citation.cfm?id=1268712$\#$}, 15495 url = {http://portal.acm.org/citation.cfm?id=1268712$\#$},
15496 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/lee.pdf}, 15496 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/lee.pdf},
15497 author = {Lee, Yui-Wah and Leung, Kwong-Sak and Satyanarayanan, Mahadev} 15497 author = {Lee, Yui-Wah and Leung, Kwong-Sak and Satyanarayanan, Mahadev}
15498} 15498}
15499@conference {1999_1, 15499@conference {1999_1,
@@ -15506,7 +15506,7 @@ This exposition presents a model to formally study such algorithms. This model,
15506 abstract = {This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new trapdoor mechanism and derive from this technique three encryption schemes : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA. Our cryptosystems, based on usual modular arithmetics, are provably secure under appropriate assumptions in the standard model}, 15506 abstract = {This paper investigates a novel computational problem, namely the Composite Residuosity Class Problem, and its applications to public-key cryptography. We propose a new trapdoor mechanism and derive from this technique three encryption schemes : a trapdoor permutation and two homomorphic probabilistic encryption schemes computationally comparable to RSA. Our cryptosystems, based on usual modular arithmetics, are provably secure under appropriate assumptions in the standard model},
15507 isbn = {3-540-65889-0}, 15507 isbn = {3-540-65889-0},
15508 url = {http://dl.acm.org/citation.cfm?id=1756123.1756146}, 15508 url = {http://dl.acm.org/citation.cfm?id=1756123.1756146},
15509 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PublicKeyCryptoSystems1999Paillier.pdf}, 15509 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PublicKeyCryptoSystems1999Paillier.pdf},
15510 author = {Paillier, Pascal} 15510 author = {Paillier, Pascal}
15511} 15511}
15512@article {RePEc:bla:restud:v:66:y:1999:i:1:p:3-21, 15512@article {RePEc:bla:restud:v:66:y:1999:i:1:p:3-21,
@@ -15534,7 +15534,7 @@ This exposition presents a model to formally study such algorithms. This model,
15534 www_section = {And-Or trees, coding theory}, 15534 www_section = {And-Or trees, coding theory},
15535 isbn = {0-89871-410-9}, 15535 isbn = {0-89871-410-9},
15536 url = {http://portal.acm.org/citation.cfm?id=314722\&dl=GUIDE\&coll=GUIDE\&CFID=102355791\&CFTOKEN=32605420$\#$}, 15536 url = {http://portal.acm.org/citation.cfm?id=314722\&dl=GUIDE\&coll=GUIDE\&CFID=102355791\&CFTOKEN=32605420$\#$},
15537 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.63.2427.pdf}, 15537 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.63.2427.pdf},
15538 author = {Luby, Michael and Michael Mitzenmacher and M. Amin Shokrollahi} 15538 author = {Luby, Michael and Michael Mitzenmacher and M. Amin Shokrollahi}
15539} 15539}
15540@article {Reed98anonymousconnections, 15540@article {Reed98anonymousconnections,
@@ -15546,7 +15546,7 @@ This exposition presents a model to formally study such algorithms. This model,
15546 abstract = {Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing's anonymous connections are bidirectional and near realtime, and can be used anywhere a socket connection can be used. Any identifying information must be in the data stream carried over an anonymous connection. An onion is a data structure that is treated as the destination address by onion routers; thus, it is used to establish an anonymous connection. Onions themselves appear differently to each onion router as well as to network observers. The same goes for data carried over the connections they establish. Proxy aware applications, such as web browsing and e-mail, require no modification to use onion routing, and do so through a series of proxies. A prototype onion routing network is running between our lab and other sites. This paper describes anonymous connections and their imple}, 15546 abstract = {Onion Routing is an infrastructure for private communication over a public network. It provides anonymous connections that are strongly resistant to both eavesdropping and traffic analysis. Onion routing's anonymous connections are bidirectional and near realtime, and can be used anywhere a socket connection can be used. Any identifying information must be in the data stream carried over an anonymous connection. An onion is a data structure that is treated as the destination address by onion routers; thus, it is used to establish an anonymous connection. Onions themselves appear differently to each onion router as well as to network observers. The same goes for data carried over the connections they establish. Proxy aware applications, such as web browsing and e-mail, require no modification to use onion routing, and do so through a series of proxies. A prototype onion routing network is running between our lab and other sites. This paper describes anonymous connections and their imple},
15547 www_section = {anonymity, onion routing}, 15547 www_section = {anonymity, onion routing},
15548 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.2362}, 15548 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.35.2362},
15549 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.65.8267.pdf}, 15549 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.65.8267.pdf},
15550 author = {Michael Reed and Paul Syverson and David Goldschlag} 15550 author = {Michael Reed and Paul Syverson and David Goldschlag}
15551} 15551}
15552@article {Reiter98crowds:anonymity, 15552@article {Reiter98crowds:anonymity,
@@ -15558,7 +15558,7 @@ This exposition presents a model to formally study such algorithms. This model,
15558 abstract = {Crowds is a system that allows anonymous web-surfing. For each host, a random static path through the crowd is formed that then acts as a sequence of proxies, indirecting replies and responses. Vulnerable when facing adversaries that can perform traffic analysis at the local node and without responder anonymity. But highly scalable and efficient}, 15558 abstract = {Crowds is a system that allows anonymous web-surfing. For each host, a random static path through the crowd is formed that then acts as a sequence of proxies, indirecting replies and responses. Vulnerable when facing adversaries that can perform traffic analysis at the local node and without responder anonymity. But highly scalable and efficient},
15559 www_section = {anonymous web browsing, Crowds}, 15559 www_section = {anonymous web browsing, Crowds},
15560 url = {http://avirubin.com/crowds.pdf}, 15560 url = {http://avirubin.com/crowds.pdf},
15561 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/crowds.pdf}, 15561 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/crowds.pdf},
15562 author = {Michael K. Reiter and Aviel D. Rubin} 15562 author = {Michael K. Reiter and Aviel D. Rubin}
15563} 15563}
15564@conference {nym-alias-net, 15564@conference {nym-alias-net,
@@ -15572,7 +15572,7 @@ This exposition presents a model to formally study such algorithms. This model,
15572 isbn = {1-58113-007-4}, 15572 isbn = {1-58113-007-4},
15573 doi = {10.1145/288090.288098}, 15573 doi = {10.1145/288090.288098},
15574 url = {http://portal.acm.org/citation.cfm?id=288098}, 15574 url = {http://portal.acm.org/citation.cfm?id=288098},
15575 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/nym-alias-net.pdf}, 15575 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/nym-alias-net.pdf},
15576 author = {David Mazi{\`e}res and Frans M. Kaashoek} 15576 author = {David Mazi{\`e}res and Frans M. Kaashoek}
15577} 15577}
15578@conference {285258, 15578@conference {285258,
@@ -15589,7 +15589,7 @@ This exposition presents a model to formally study such algorithms. This model,
15589 isbn = {1-58113-003-1}, 15589 isbn = {1-58113-003-1},
15590 doi = {10.1145/285237.285258}, 15590 doi = {10.1145/285237.285258},
15591 url = {http://portal.acm.org/citation.cfm?id=285258\&dl=GUIDE\&coll=GUIDE\&CFID=102355791\&CFTOKEN=32605420$\#$}, 15591 url = {http://portal.acm.org/citation.cfm?id=285258\&dl=GUIDE\&coll=GUIDE\&CFID=102355791\&CFTOKEN=32605420$\#$},
15592 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.72.3011.pdf}, 15592 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.72.3011.pdf},
15593 author = {Byers, John W. and Luby, Michael and Michael Mitzenmacher and Rege, Ashutosh} 15593 author = {Byers, John W. and Luby, Michael and Michael Mitzenmacher and Rege, Ashutosh}
15594} 15594}
15595@article {Xu98lowdensity, 15595@article {Xu98lowdensity,
@@ -15601,7 +15601,7 @@ This exposition presents a model to formally study such algorithms. This model,
15601 abstract = {We reveal an equivalence relation between the construction of a new class of low density MDS array codes, that we call B-Code, and a combinatorial problem known as perfect onefactorization of complete graphs. We use known perfect one-factors of complete graphs to create constructions and decoding algorithms for both B-Code and its dual code. B-Code and its dual are optimal in the sense that (i) they are MDS, (ii) they have an optimal encoding property, i.e., the number of the parity bits that are affected by change of a single information bit is minimal and (iii) they have optimal length. The existence of perfect one-factorizations for every complete graph with an even number of nodes is a 35 years long conjecture in graph theory. The construction of B-codes of arbitrary odd length will provide an affirmative answer to the conjecture}, 15601 abstract = {We reveal an equivalence relation between the construction of a new class of low density MDS array codes, that we call B-Code, and a combinatorial problem known as perfect onefactorization of complete graphs. We use known perfect one-factors of complete graphs to create constructions and decoding algorithms for both B-Code and its dual code. B-Code and its dual are optimal in the sense that (i) they are MDS, (ii) they have an optimal encoding property, i.e., the number of the parity bits that are affected by change of a single information bit is minimal and (iii) they have optimal length. The existence of perfect one-factorizations for every complete graph with an even number of nodes is a 35 years long conjecture in graph theory. The construction of B-codes of arbitrary odd length will provide an affirmative answer to the conjecture},
15602 www_section = {array codes, low density, MDS Codes, update complexity}, 15602 www_section = {array codes, low density, MDS Codes, update complexity},
15603 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.8899}, 15603 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.42.8899},
15604 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.42.8899.pdf}, 15604 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.42.8899.pdf},
15605 author = {Lihao Xu and Vasken Bohossian and Jehoshua Bruck and David Wagner} 15605 author = {Lihao Xu and Vasken Bohossian and Jehoshua Bruck and David Wagner}
15606} 15606}
15607@article {581193, 15607@article {581193,
@@ -15616,7 +15616,7 @@ This exposition presents a model to formally study such algorithms. This model,
15616 issn = {0163-5999}, 15616 issn = {0163-5999},
15617 doi = {10.1145/288197.581193}, 15617 doi = {10.1145/288197.581193},
15618 url = {http://portal.acm.org/citation.cfm?id=581193$\#$}, 15618 url = {http://portal.acm.org/citation.cfm?id=581193$\#$},
15619 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.83.6433.pdf}, 15619 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.83.6433.pdf},
15620 author = {Marco Ajmone Marsan and Gianfranco Balbo and Gianni Conte and Susanna Donatelli and Giuliana Franceschinis} 15620 author = {Marco Ajmone Marsan and Gianfranco Balbo and Gianni Conte and Susanna Donatelli and Giuliana Franceschinis}
15621} 15621}
15622@booklet {pipenet10, 15622@booklet {pipenet10,
@@ -15624,7 +15624,7 @@ This exposition presents a model to formally study such algorithms. This model,
15624 year = {1998}, 15624 year = {1998},
15625 month = jan, 15625 month = jan,
15626 url = {http://weidai.com/pipenet.txt}, 15626 url = {http://weidai.com/pipenet.txt},
15627 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/http___freehaven.net_anonbib_cache_pipenet10.html_.pdf}, 15627 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/http___freehaven.net_anonbib_cache_pipenet10.html_.pdf},
15628 author = {Dai, Wei} 15628 author = {Dai, Wei}
15629} 15629}
15630@booklet {citeulike:2549551, 15630@booklet {citeulike:2549551,
@@ -15645,7 +15645,7 @@ This exposition presents a model to formally study such algorithms. This model,
15645 www_section = {anonymity, privacy, private information retrieval}, 15645 www_section = {anonymity, privacy, private information retrieval},
15646 isbn = {3-540-65142-X}, 15646 isbn = {3-540-65142-X},
15647 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.6742}, 15647 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.18.6742},
15648 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.18.6742.pdf}, 15648 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.18.6742.pdf},
15649 author = {Yael Gertner and Shafi Goldwasser and Tal Malkin} 15649 author = {Yael Gertner and Shafi Goldwasser and Tal Malkin}
15650} 15650}
15651@article {realtime-mix, 15651@article {realtime-mix,
@@ -15684,7 +15684,7 @@ This exposition presents a model to formally study such algorithms. This model,
15684 isbn = {978-3-540-65386-8}, 15684 isbn = {978-3-540-65386-8},
15685 doi = {10.1007/3-540-49380-8_7}, 15685 doi = {10.1007/3-540-49380-8_7},
15686 url = {http://www.springerlink.com/content/hmfv2mgy1xqbn852/}, 15686 url = {http://www.springerlink.com/content/hmfv2mgy1xqbn852/},
15687 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/stop-and-go.pdf}, 15687 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/stop-and-go.pdf},
15688 author = {Dogan Kesdogan and Jan Egner and Roland B{\"u}schkes} 15688 author = {Dogan Kesdogan and Jan Egner and Roland B{\"u}schkes}
15689} 15689}
15690@conference {abe, 15690@conference {abe,
@@ -15713,7 +15713,7 @@ This exposition presents a model to formally study such algorithms. This model,
15713 isbn = {0-89791-888-6}, 15713 isbn = {0-89791-888-6},
15714 doi = {http://doi.acm.org/10.1145/258533.258609}, 15714 doi = {http://doi.acm.org/10.1145/258533.258609},
15715 url = {http://portal.acm.org/citation.cfm?id=258533.258609}, 15715 url = {http://portal.acm.org/citation.cfm?id=258533.258609},
15716 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/chor97computationally.pdf}, 15716 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/chor97computationally.pdf},
15717 author = {Benny Chor and Niv Gilboa} 15717 author = {Benny Chor and Niv Gilboa}
15718} 15718}
15719@book {Ogata97faulttolerant, 15719@book {Ogata97faulttolerant,
@@ -15727,7 +15727,7 @@ This exposition presents a model to formally study such algorithms. This model,
15727 organization = {Springer Berlin / Heidelberg}, 15727 organization = {Springer Berlin / Heidelberg},
15728 abstract = {This paper describes a zero-knowledge proof that a mix in onion routing can perform in order to proof that it did route the messages properly. This allows the deployment of a mix-net where malicious mixes can be detected without using dummy-traffic to probe for correctness. Technical}, 15728 abstract = {This paper describes a zero-knowledge proof that a mix in onion routing can perform in order to proof that it did route the messages properly. This allows the deployment of a mix-net where malicious mixes can be detected without using dummy-traffic to probe for correctness. Technical},
15729 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.19.357\&rep=rep1\&type=url\&i=0}, 15729 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.19.357\&rep=rep1\&type=url\&i=0},
15730 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/fault.dvi_.pdf}, 15730 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/fault.dvi_.pdf},
15731 www_section = unsorted, 15731 www_section = unsorted,
15732 author = {Wakaha Ogata and Kaoru Kurosawa and Kazue Sako and Kazunori Takatani} 15732 author = {Wakaha Ogata and Kaoru Kurosawa and Kazue Sako and Kazunori Takatani}
15733} 15733}
@@ -15746,7 +15746,7 @@ This exposition presents a model to formally study such algorithms. This model,
15746 isbn = {0-89791-888-6}, 15746 isbn = {0-89791-888-6},
15747 doi = {http://doi.acm.org/10.1145/258533.258573}, 15747 doi = {http://doi.acm.org/10.1145/258533.258573},
15748 url = {http://doi.acm.org/10.1145/258533.258573}, 15748 url = {http://doi.acm.org/10.1145/258533.258573},
15749 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/STOC\%2797\%20-\%20Practical\%20Loss-Resilient\%20Codes.pdf}, 15749 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/STOC\%2797\%20-\%20Practical\%20Loss-Resilient\%20Codes.pdf},
15750 author = {Luby, Michael and Michael Mitzenmacher and M. Amin Shokrollahi and Daniel A. Spielman and Stemann, Volker} 15750 author = {Luby, Michael and Michael Mitzenmacher and M. Amin Shokrollahi and Daniel A. Spielman and Stemann, Volker}
15751} 15751}
15752@conference {1997_0, 15752@conference {1997_0,
@@ -15761,7 +15761,7 @@ This exposition presents a model to formally study such algorithms. This model,
15761 www_section = {Internet, privacy, privacy-enhancing technology}, 15761 www_section = {Internet, privacy, privacy-enhancing technology},
15762 isbn = {0818678046}, 15762 isbn = {0818678046},
15763 url = {http://www.cs.berkeley.edu/~daw/papers/privacy-compcon97-www/privacy-html.html}, 15763 url = {http://www.cs.berkeley.edu/~daw/papers/privacy-compcon97-www/privacy-html.html},
15764 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Compcon\%20\%2797\%20-\%20Privacy-enhancing\%20Technologies\%20for\%20the\%20Internet.pdf}, 15764 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Compcon\%20\%2797\%20-\%20Privacy-enhancing\%20Technologies\%20for\%20the\%20Internet.pdf},
15765 author = {Ian Goldberg and David Wagner and Eric Brewer} 15765 author = {Ian Goldberg and David Wagner and Eric Brewer}
15766} 15766}
15767@article {1997_1, 15767@article {1997_1,
@@ -15776,7 +15776,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15776 issn = {1063-6692}, 15776 issn = {1063-6692},
15777 doi = {10.1109/90.650139}, 15777 doi = {10.1109/90.650139},
15778 url = {http://dx.doi.org/10.1109/90.650139}, 15778 url = {http://dx.doi.org/10.1109/90.650139},
15779 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Reliable_MultiCast1997Flyod.pdf}, 15779 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Reliable_MultiCast1997Flyod.pdf},
15780 author = {Floyd, Sally and Jacobson, Van and Liu, Ching-Gung and McCanne, Steven and Zhang, Lixia} 15780 author = {Floyd, Sally and Jacobson, Van and Liu, Ching-Gung and McCanne, Steven and Zhang, Lixia}
15781} 15781}
15782@article {rewebber, 15782@article {rewebber,
@@ -15790,7 +15790,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15790 www_section = {anonymous publishing}, 15790 www_section = {anonymous publishing},
15791 doi = {10.1.1.41.4031}, 15791 doi = {10.1.1.41.4031},
15792 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.41.4031}, 15792 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.41.4031},
15793 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.41.4031.pdf}, 15793 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.41.4031.pdf},
15794 author = {Ian Goldberg and David Wagner} 15794 author = {Ian Goldberg and David Wagner}
15795} 15795}
15796@conference {716407, 15796@conference {716407,
@@ -15819,7 +15819,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15819 abstract = {this paper is that a traditional identity certificate is neither necessary nor sufficient for this purpose. It is especially useless if the two parties concerned did not have the foresight to obtain such certificates before desiring to open a secure channel. There are many methods for establishing identity without using certificates from trusted certification authorities. The relationship between verifier and subject guides the choice of method. Many of these relationships have easy, straight-forward methods for binding a public key to an identity, using a broadcast channel or 1:1 meetings, but one relationship makes it especially difficult. That relationship is one with an old friend with whom you had lost touch but who appears now to be available on the net. You make contact and share a few exchanges which suggest to you that this is, indeed, your old friend. Then you want to form a secure channel in order to carry on a more extensive conversation in private. This case is subject to the man-in-themiddle attack. For this case, a protocol is presented which binds a pair of identities to a pair of public keys without using any certificates issued by a trusted CA. The apparent direct conflict between conventional wisdom and the thesis of this paper lies in the definition of the word "identity" -- a word which is commonly left undefined in discussions of certification}, 15819 abstract = {this paper is that a traditional identity certificate is neither necessary nor sufficient for this purpose. It is especially useless if the two parties concerned did not have the foresight to obtain such certificates before desiring to open a secure channel. There are many methods for establishing identity without using certificates from trusted certification authorities. The relationship between verifier and subject guides the choice of method. Many of these relationships have easy, straight-forward methods for binding a public key to an identity, using a broadcast channel or 1:1 meetings, but one relationship makes it especially difficult. That relationship is one with an old friend with whom you had lost touch but who appears now to be available on the net. You make contact and share a few exchanges which suggest to you that this is, indeed, your old friend. Then you want to form a secure channel in order to carry on a more extensive conversation in private. This case is subject to the man-in-themiddle attack. For this case, a protocol is presented which binds a pair of identities to a pair of public keys without using any certificates issued by a trusted CA. The apparent direct conflict between conventional wisdom and the thesis of this paper lies in the definition of the word "identity" -- a word which is commonly left undefined in discussions of certification},
15820 www_section = {certificate revocation, public key cryptography}, 15820 www_section = {certificate revocation, public key cryptography},
15821 url = {http://portal.acm.org/citation.cfm?id=1267576$\#$}, 15821 url = {http://portal.acm.org/citation.cfm?id=1267576$\#$},
15822 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.31.7263.pdf}, 15822 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.31.7263.pdf},
15823 author = {Ellison, Carl M.} 15823 author = {Ellison, Carl M.}
15824} 15824}
15825@conference {Anderson96theeternity, 15825@conference {Anderson96theeternity,
@@ -15831,7 +15831,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15831 address = {Prague, CZ}, 15831 address = {Prague, CZ},
15832 abstract = {The Internet was designed to provide a communications channel that is as resistant to denial of service attacks as human ingenuity can make it. In this note, we propose the construction of a storage medium with similar properties. The basic idea is to use redundancy and scattering techniques to replicate data across a large set of machines (such as the Internet), and add anonymity mechanisms to drive up the cost of selective service denial attacks. The detailed design of this service is an interesting scientific problem, and is not merely academic: the service may be vital in safeguarding individual rights against new threats posed by the spread of electronic publishing}, 15832 abstract = {The Internet was designed to provide a communications channel that is as resistant to denial of service attacks as human ingenuity can make it. In this note, we propose the construction of a storage medium with similar properties. The basic idea is to use redundancy and scattering techniques to replicate data across a large set of machines (such as the Internet), and add anonymity mechanisms to drive up the cost of selective service denial attacks. The detailed design of this service is an interesting scientific problem, and is not merely academic: the service may be vital in safeguarding individual rights against new threats posed by the spread of electronic publishing},
15833 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.16.1952\&rep=rep1\&type=pdf}, 15833 url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.16.1952\&rep=rep1\&type=pdf},
15834 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/eternity.pdf}, 15834 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/eternity.pdf},
15835 www_section = unsorted, 15835 www_section = unsorted,
15836 author = {Ross Anderson} 15836 author = {Ross Anderson}
15837} 15837}
@@ -15847,7 +15847,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15847 www_section = {communication chain, onion routing, traffic analysis}, 15847 www_section = {communication chain, onion routing, traffic analysis},
15848 isbn = {3-540-61996-8}, 15848 isbn = {3-540-61996-8},
15849 url = {http://portal.acm.org/citation.cfm?id=731526}, 15849 url = {http://portal.acm.org/citation.cfm?id=731526},
15850 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IH-1996.pdf}, 15850 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IH-1996.pdf},
15851 author = {David Goldschlag and Michael Reed and Paul Syverson}, 15851 author = {David Goldschlag and Michael Reed and Paul Syverson},
15852 editor = {Ross Anderson} 15852 editor = {Ross Anderson}
15853} 15853}
@@ -15865,7 +15865,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15865 www_section = {algorithms, constraint satisfaction, decision problem, framework, imcomplete knowledge, mixed CSP}, 15865 www_section = {algorithms, constraint satisfaction, decision problem, framework, imcomplete knowledge, mixed CSP},
15866 isbn = {0-262-51091-X}, 15866 isbn = {0-262-51091-X},
15867 url = {http://dl.acm.org/citation.cfm?id=1892875.1892901}, 15867 url = {http://dl.acm.org/citation.cfm?id=1892875.1892901},
15868 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/AAAI\%2796\%20-\%20Mixed\%20constraint\%20satisfaction.pdf}, 15868 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/AAAI\%2796\%20-\%20Mixed\%20constraint\%20satisfaction.pdf},
15869 author = {Fargier, H{\'e}l{\`e}ne and Lang, J{\'e}r{\^o}me and Schiex, Thomas} 15869 author = {Fargier, H{\'e}l{\`e}ne and Lang, J{\'e}r{\^o}me and Schiex, Thomas}
15870} 15870}
15871@conference {Gulcu96mixingemail, 15871@conference {Gulcu96mixingemail,
@@ -15875,7 +15875,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15875 pages = {2--16}, 15875 pages = {2--16},
15876 abstract = {Increasingly large numbers of people communicate today via electronic means such as email or news forums. One of the basic properties of the current electronic communication means is the identification of the end-points. However, at times it is desirable or even critical to hide the identity and/or whereabouts of the end-points (e.g., human users) involved. This paper discusses the goals and desired properties of anonymous email in general and introduces the design and salient features of Babel anonymous remailer. Babel allows email users to converse electronically while remaining anonymous with respect to each other and to other-- even hostile--parties. A range of attacks and corresponding countermeasures is considered. An attempt is made to formalize and quantify certain dimensions of anonymity and untraceable communication}, 15876 abstract = {Increasingly large numbers of people communicate today via electronic means such as email or news forums. One of the basic properties of the current electronic communication means is the identification of the end-points. However, at times it is desirable or even critical to hide the identity and/or whereabouts of the end-points (e.g., human users) involved. This paper discusses the goals and desired properties of anonymous email in general and introduces the design and salient features of Babel anonymous remailer. Babel allows email users to converse electronically while remaining anonymous with respect to each other and to other-- even hostile--parties. A range of attacks and corresponding countermeasures is considered. An attempt is made to formalize and quantify certain dimensions of anonymity and untraceable communication},
15877 url = {http://eprints.kfupm.edu.sa/50994/1/50994.pdf}, 15877 url = {http://eprints.kfupm.edu.sa/50994/1/50994.pdf},
15878 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/babel.pdf}, 15878 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/babel.pdf},
15879 www_section = unsorted, 15879 www_section = unsorted,
15880 author = {Ceki Gulcu and Gene Tsudik} 15880 author = {Ceki Gulcu and Gene Tsudik}
15881} 15881}
@@ -15888,7 +15888,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15888 month = {August}, 15888 month = {August},
15889 abstract = {Remailers have permitted Internet users to take advantage of the medium as a means to communicate with others globally on sensitive issues while maintaining a high degree of privacy. Recent events have clearly indicated that privacy is increasingly at risk on the global networks. Individual efforts have, so far, worked well in maintaining for most Internet users a modicum of anonymity. With the growth of increasingly sophisticated techniques to defeat anonymity, there will be a need for both standards and policies to continue to make privacy on the Internet a priority}, 15889 abstract = {Remailers have permitted Internet users to take advantage of the medium as a means to communicate with others globally on sensitive issues while maintaining a high degree of privacy. Recent events have clearly indicated that privacy is increasingly at risk on the global networks. Individual efforts have, so far, worked well in maintaining for most Internet users a modicum of anonymity. With the growth of increasingly sophisticated techniques to defeat anonymity, there will be a need for both standards and policies to continue to make privacy on the Internet a priority},
15890 url = {http://131.193.153.231/www/issues/issue2/remailers/index.html}, 15890 url = {http://131.193.153.231/www/issues/issue2/remailers/index.html},
15891 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Prospects\%20for\%20Remailers.pdf}, 15891 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Prospects\%20for\%20Remailers.pdf},
15892 www_section = unsorted, 15892 www_section = unsorted,
15893 author = {Sameer Parekh} 15893 author = {Sameer Parekh}
15894} 15894}
@@ -15897,7 +15897,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15897 year = {1996}, 15897 year = {1996},
15898 abstract = {An important issue to be addressed for the next generation of wirelessly-connected hand-held devices is battery longevity. In this paper we examine this issue from the point of view of the Network Interface (NI). In particular, we measure the power usage of two PDAs, the Apple Newton Messagepad and Sony Magic Link, and four NIs, the Metricom Ricochet Wireless Modem, the AT\&T Wavelan operating at 915 MHz and 2.4 GHz, and the IBM Infrared Wireless LAN Adapter. These measurements clearly indicate that the power drained by the network interface constitutes a large fraction of the total power used by the PDA. We also conduct trace-driven simulation experiments and show that by using applicationspecific policies it is possible to }, 15898 abstract = {An important issue to be addressed for the next generation of wirelessly-connected hand-held devices is battery longevity. In this paper we examine this issue from the point of view of the Network Interface (NI). In particular, we measure the power usage of two PDAs, the Apple Newton Messagepad and Sony Magic Link, and four NIs, the Metricom Ricochet Wireless Modem, the AT\&T Wavelan operating at 915 MHz and 2.4 GHz, and the IBM Infrared Wireless LAN Adapter. These measurements clearly indicate that the power drained by the network interface constitutes a large fraction of the total power used by the PDA. We also conduct trace-driven simulation experiments and show that by using applicationspecific policies it is possible to },
15899 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.8384}, 15899 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.39.8384},
15900 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.39.8384.pdf}, 15900 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.39.8384.pdf},
15901 www_section = unsorted, 15901 www_section = unsorted,
15902 url = {https://bibliography.gnunet.org}, 15902 url = {https://bibliography.gnunet.org},
15903 author = {Mark Stemm and Paul Gauthier and Daishi Harada and Katz, Randy H.} 15903 author = {Mark Stemm and Paul Gauthier and Daishi Harada and Katz, Randy H.}
@@ -15913,7 +15913,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15913 abstract = {This paper is a first step towards an understanding of the inherent limitations of distributed data structures. We propose a model of distributed search trees that is based on few natural assumptions. We prove that any class of trees within our model satisfies a lower bound of \Omega\Gamma p m) on the worst case height of distributed search trees for m keys. That is, unlike in the single site case, balance in the sense that the tree height satisfies a logarithmic upper bound cannot be achieved. This is true although each node is allowed to have arbitrary degree (note that in this case, the height of a single site search tree is trivially bounded by one). By proposing a method that generates trees of height O( p m), we show the bound to be tight. 1 Introduction Distributed data structures have attracted considerable attention in the past few years. From a practical viewpoint, this is due to the increasing availability of networks of workstations}, 15913 abstract = {This paper is a first step towards an understanding of the inherent limitations of distributed data structures. We propose a model of distributed search trees that is based on few natural assumptions. We prove that any class of trees within our model satisfies a lower bound of \Omega\Gamma p m) on the worst case height of distributed search trees for m keys. That is, unlike in the single site case, balance in the sense that the tree height satisfies a logarithmic upper bound cannot be achieved. This is true although each node is allowed to have arbitrary degree (note that in this case, the height of a single site search tree is trivially bounded by one). By proposing a method that generates trees of height O( p m), we show the bound to be tight. 1 Introduction Distributed data structures have attracted considerable attention in the past few years. From a practical viewpoint, this is due to the increasing availability of networks of workstations},
15914 isbn = {3-540-60220-8}, 15914 isbn = {3-540-60220-8},
15915 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.4081}, 15915 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.34.4081},
15916 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.34.4081.pdf}, 15916 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.34.4081.pdf},
15917 www_section = unsorted, 15917 www_section = unsorted,
15918 author = {Kr{\"o}ll, Brigitte and Widmayer, Peter} 15918 author = {Kr{\"o}ll, Brigitte and Widmayer, Peter}
15919} 15919}
@@ -15929,7 +15929,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15929 issn = {0163-5980}, 15929 issn = {0163-5980},
15930 doi = {10.1145/224057.224068}, 15930 doi = {10.1145/224057.224068},
15931 url = {http://portal.acm.org/citation.cfm?id=224068$\#$}, 15931 url = {http://portal.acm.org/citation.cfm?id=224068$\#$},
15932 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/s15.pdf}, 15932 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/s15.pdf},
15933 www_section = unsorted, 15933 www_section = unsorted,
15934 author = {Lily B. Mummert and Maria Ebling and Satyanarayanan, Mahadev} 15934 author = {Lily B. Mummert and Maria Ebling and Satyanarayanan, Mahadev}
15935} 15935}
@@ -15940,7 +15940,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15940 abstract = {This paper presents the first systematic design of a robust sensing system suited for the challenges presented by soil environments. We describe three soil deployments we have undertaken: in Bangladesh, and in California at the James Reserve and in the San Joaquin River basin. We discuss our experiences and lessons learned in deploying soil sensors. We present data from each deployment and evaluate our techniques for improving the information yield from these systems. Our most notable results include the following: in-situ calibration techniques to postpone labor-intensive and soil disruptive calibration events developed at the James Reserve; achieving a 91 \% network yield from a Mica2 wireless sensing system without end-to-end reliability in Bangladesh; and the javelin, a new platform that facilitates the deployment, replacement and in-situ calibration of soil sensors, deployed in the San Joaquin River basin. Our techniques to increase information yield have already led to scientifically promising results, including previously unexpected diurnal cycles in various soil chemistry parameters across several deployments }, 15940 abstract = {This paper presents the first systematic design of a robust sensing system suited for the challenges presented by soil environments. We describe three soil deployments we have undertaken: in Bangladesh, and in California at the James Reserve and in the San Joaquin River basin. We discuss our experiences and lessons learned in deploying soil sensors. We present data from each deployment and evaluate our techniques for improving the information yield from these systems. Our most notable results include the following: in-situ calibration techniques to postpone labor-intensive and soil disruptive calibration events developed at the James Reserve; achieving a 91 \% network yield from a Mica2 wireless sensing system without end-to-end reliability in Bangladesh; and the javelin, a new platform that facilitates the deployment, replacement and in-situ calibration of soil sensors, deployed in the San Joaquin River basin. Our techniques to increase information yield have already led to scientifically promising results, including previously unexpected diurnal cycles in various soil chemistry parameters across several deployments },
15941 www_section = {sensor networks, wireless sensor network}, 15941 www_section = {sensor networks, wireless sensor network},
15942 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.7766}, 15942 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.120.7766},
15943 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.120.7766.pdf}, 15943 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.120.7766.pdf},
15944 author = {Nithya Ramanathan and Tom Schoellhammer and Deborah Estrin and Mark Hansen and Tom Harmon and Eddie Kohler and Mani Srivastava} 15944 author = {Nithya Ramanathan and Tom Schoellhammer and Deborah Estrin and Mark Hansen and Tom Harmon and Eddie Kohler and Mani Srivastava}
15945} 15945}
15946@conference {cooper, 15946@conference {cooper,
@@ -15952,7 +15952,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15952 organization = {IEEE Computer Society}, 15952 organization = {IEEE Computer Society},
15953 abstract = {Even as wireless networks create the potential for access to information from mobile platforms, they pose a problem for privacy. In order to retrieve messages, users must periodically poll the network. The information that the user must give to the network could potentially be used to track that user. However, the movements of the user can also be used to hide the user's location if the protocols for sending and retrieving messages are carefully designed. We have developed a replicated memory service which allows users to read from memory without revealing which memory locations they are reading. Unlike previous protocols, our protocol is efficient in its use of computation and bandwidth. We show how this protocol can be used in conjunction with existing privacy preserving protocols to allow a user of a mobile computer to maintain privacy despite active attacks}, 15953 abstract = {Even as wireless networks create the potential for access to information from mobile platforms, they pose a problem for privacy. In order to retrieve messages, users must periodically poll the network. The information that the user must give to the network could potentially be used to track that user. However, the movements of the user can also be used to hide the user's location if the protocols for sending and retrieving messages are carefully designed. We have developed a replicated memory service which allows users to read from memory without revealing which memory locations they are reading. Unlike previous protocols, our protocol is efficient in its use of computation and bandwidth. We show how this protocol can be used in conjunction with existing privacy preserving protocols to allow a user of a mobile computer to maintain privacy despite active attacks},
15954 url = {http://portal.acm.org/citation.cfm?id=882491.884247}, 15954 url = {http://portal.acm.org/citation.cfm?id=882491.884247},
15955 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/cooper.pdf}, 15955 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/cooper.pdf},
15956 www_section = unsorted, 15956 www_section = unsorted,
15957 author = {David A. Cooper and Kenneth P. Birman} 15957 author = {David A. Cooper and Kenneth P. Birman}
15958} 15958}
@@ -15966,7 +15966,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15966 abstract = {Publicly accessible databases are an indispensable resource for retrieving up-to-date information. But they also pose a significant risk to the privacy of the user, since a curious database operator can follow the user's queries and infer what the user is after. Indeed, in cases where the users' intentions are to be kept secret, users are often cautious about accessing the database. It can be shown that when accessing a single database, to completely guarantee the privacy of the user, the whole database should be down-loaded; namely n bits should be communicated (where n is the number of bits in the database).In this work, we investigate whether by replicating the database, more efficient solutions to the private retrieval problem can be obtained. We describe schemes that enable a user to access k replicated copies of a database (k>=2) and privately retrieve information stored in the database. This means that each individual server (holding a replicated copy of the database) gets no information on the identity of the item retrieved by the user. Our schemes use the replication to gain substantial saving. In particular, we present a two-server scheme with communication complexity O(n1/3)}, 15966 abstract = {Publicly accessible databases are an indispensable resource for retrieving up-to-date information. But they also pose a significant risk to the privacy of the user, since a curious database operator can follow the user's queries and infer what the user is after. Indeed, in cases where the users' intentions are to be kept secret, users are often cautious about accessing the database. It can be shown that when accessing a single database, to completely guarantee the privacy of the user, the whole database should be down-loaded; namely n bits should be communicated (where n is the number of bits in the database).In this work, we investigate whether by replicating the database, more efficient solutions to the private retrieval problem can be obtained. We describe schemes that enable a user to access k replicated copies of a database (k>=2) and privately retrieve information stored in the database. This means that each individual server (holding a replicated copy of the database) gets no information on the identity of the item retrieved by the user. Our schemes use the replication to gain substantial saving. In particular, we present a two-server scheme with communication complexity O(n1/3)},
15967 doi = {http://doi.acm.org/10.1145/293347.293350}, 15967 doi = {http://doi.acm.org/10.1145/293347.293350},
15968 url = {http://portal.acm.org/citation.cfm?id=293347.293350}, 15968 url = {http://portal.acm.org/citation.cfm?id=293347.293350},
15969 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/pir.pdf}, 15969 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/pir.pdf},
15970 www_section = unsorted, 15970 www_section = unsorted,
15971 author = {Benny Chor and Oded Goldreich and Eyal Kushilevitz and Madhu Sudan} 15971 author = {Benny Chor and Oded Goldreich and Eyal Kushilevitz and Madhu Sudan}
15972} 15972}
@@ -15980,7 +15980,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15980 isbn = {978-3-540-59409-3}, 15980 isbn = {978-3-540-59409-3},
15981 doi = {10.1007/3-540-49264-X}, 15981 doi = {10.1007/3-540-49264-X},
15982 url = {http://www.springerlink.com/content/jhf7ccxn2fj2gfum/}, 15982 url = {http://www.springerlink.com/content/jhf7ccxn2fj2gfum/},
15983 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SK.pdf}, 15983 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SK.pdf},
15984 www_section = unsorted, 15984 www_section = unsorted,
15985 author = {Joe Kilian and Kazue Sako} 15985 author = {Joe Kilian and Kazue Sako}
15986} 15986}
@@ -15991,7 +15991,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
15991 www_section = {reliability, reputation}, 15991 www_section = {reliability, reputation},
15992 doi = {10.1109/WMCSA.1994.37}, 15992 doi = {10.1109/WMCSA.1994.37},
15993 url = {http://portal.acm.org/citation.cfm?id=1440028}, 15993 url = {http://portal.acm.org/citation.cfm?id=1440028},
15994 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.40.8955.pdf}, 15994 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.40.8955.pdf},
15995 www_section = unsorted, 15995 www_section = unsorted,
15996 author = {Alan Demers and Karin Petersen and Mike Spreitzer and Douglas Terry and Marvin Theimer and Brent Welch} 15996 author = {Alan Demers and Karin Petersen and Mike Spreitzer and Douglas Terry and Marvin Theimer and Brent Welch}
15997} 15997}
@@ -16007,7 +16007,7 @@ for future loss recovery. With the adaptive algorithm, our reliable multicast de
16007 16007
16008This paper describes WAFL (Write Anywhere File Layout), which is a file system designed specifically to work in an NFS appliance. The primary focus is on the algorithms and data structures that WAFL uses to implement Snapshotst, which are read-only clones of the active file system. WAFL uses a copy-on-write technique to minimize the disk space that Snapshots consume. This paper also describes how WAFL uses Snapshots to eliminate the need for file system consistency checking after an unclean shutdown}, 16008This paper describes WAFL (Write Anywhere File Layout), which is a file system designed specifically to work in an NFS appliance. The primary focus is on the algorithms and data structures that WAFL uses to implement Snapshotst, which are read-only clones of the active file system. WAFL uses a copy-on-write technique to minimize the disk space that Snapshots consume. This paper also describes how WAFL uses Snapshots to eliminate the need for file system consistency checking after an unclean shutdown},
16009 url = {http://portal.acm.org/citation.cfm?id=1267093$\#$}, 16009 url = {http://portal.acm.org/citation.cfm?id=1267093$\#$},
16010 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.40.3691.pdf}, 16010 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.40.3691.pdf},
16011 www_section = unsorted, 16011 www_section = unsorted,
16012 author = {Hitz, Dave and Lau, James and Malcolm, Michael} 16012 author = {Hitz, Dave and Lau, James and Malcolm, Michael}
16013} 16013}
@@ -16018,7 +16018,7 @@ This paper describes WAFL (Write Anywhere File Layout), which is a file system d
16018 pages = {1--10}, 16018 pages = {1--10},
16019 abstract = {We present a tool, called sif, for finding all similar files in a large file system. Files are considered similar if they have significant number of common pieces, even if they are very different otherwise. For example, one file may be contained, possibly with some changes, in another file, or a file may be a reorganization of another file. The running time for finding all groups of similar files, even for as little as 25\% similarity, is on the order of 500MB to 1GB an hour. The amount of similarity and several other customized parameters can be determined by the user at a post-processing stage, which is very fast. Sif can also be used to very quickly identify all similar files to a query file using a preprocessed index. Application of sif can be found in file management, information collecting (to remove duplicates), program reuse, file synchronization, data compression, and maybe even plagiarism detection. 1. Introduction Our goal is to identify files that came from the same source }, 16019 abstract = {We present a tool, called sif, for finding all similar files in a large file system. Files are considered similar if they have significant number of common pieces, even if they are very different otherwise. For example, one file may be contained, possibly with some changes, in another file, or a file may be a reorganization of another file. The running time for finding all groups of similar files, even for as little as 25\% similarity, is on the order of 500MB to 1GB an hour. The amount of similarity and several other customized parameters can be determined by the user at a post-processing stage, which is very fast. Sif can also be used to very quickly identify all similar files to a query file using a preprocessed index. Application of sif can be found in file management, information collecting (to remove duplicates), program reuse, file synchronization, data compression, and maybe even plagiarism detection. 1. Introduction Our goal is to identify files that came from the same source },
16020 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.3222}, 16020 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.12.3222},
16021 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.12.3222.pdf}, 16021 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.12.3222.pdf},
16022 www_section = unsorted, 16022 www_section = unsorted,
16023 author = {Udi Manber} 16023 author = {Udi Manber}
16024} 16024}
@@ -16030,7 +16030,7 @@ This paper describes WAFL (Write Anywhere File Layout), which is a file system d
16030 abstract = {Checkpointing is a simple technique for rollback recovery: the state of an executing program is periodically saved to a disk file from which it can be recovered after a failure. While recent research has developed a collection of powerful techniques for minimizing the overhead of writing checkpoint files, checkpointing remains unavailable to most application developers. In this paper we describe libckpt, a portable checkpointing tool for Unix that implements all applicable performance optimizations which are reported in the literature. While libckpt can be used in a mode which is almost totally transparent to the programmer, it also supports the incorporation of user directives into the creation of checkpoints. This user-directed checkpointing is an innovation which is unique to our work. 1 Introduction Consider a programmer who has developed an application which will take a long time to execute, say five days. Two days into the computation, the processor on which the application is}, 16030 abstract = {Checkpointing is a simple technique for rollback recovery: the state of an executing program is periodically saved to a disk file from which it can be recovered after a failure. While recent research has developed a collection of powerful techniques for minimizing the overhead of writing checkpoint files, checkpointing remains unavailable to most application developers. In this paper we describe libckpt, a portable checkpointing tool for Unix that implements all applicable performance optimizations which are reported in the literature. While libckpt can be used in a mode which is almost totally transparent to the programmer, it also supports the incorporation of user directives into the creation of checkpoints. This user-directed checkpointing is an innovation which is unique to our work. 1 Introduction Consider a programmer who has developed an application which will take a long time to execute, say five days. Two days into the computation, the processor on which the application is},
16031 www_section = {checkpointing, performance analysis}, 16031 www_section = {checkpointing, performance analysis},
16032 url = {http://portal.acm.org/citation.cfm?id=898770$\#$}, 16032 url = {http://portal.acm.org/citation.cfm?id=898770$\#$},
16033 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.55.257.pdf}, 16033 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.55.257.pdf},
16034 author = {James S. Plank and Beck, Micah and Kingsley, Gerry and Li, Kai} 16034 author = {James S. Plank and Beck, Micah and Kingsley, Gerry and Li, Kai}
16035} 16035}
16036@article {1993_0, 16036@article {1993_0,
@@ -16043,7 +16043,7 @@ This paper describes WAFL (Write Anywhere File Layout), which is a file system d
16043 abstract = {We report market experiments in which human traders are replaced by "zero-intelligence" programs that submit random bids and offers. Imposing a budget constraint (i.e., not permitting traders to sell below their costs or buy above their values) is sufficient to raise the allocative efficiency of these auctions close to 100 percent. Allocative efficiency of a double auction derives largely from its structure, independent of traders' motivation, intelligence, or learning. Adam Smith's invisible hand may be more powerful than some may have thought; it can generate aggregate rationality not only from individual rationality but also from individual irrationality}, 16043 abstract = {We report market experiments in which human traders are replaced by "zero-intelligence" programs that submit random bids and offers. Imposing a budget constraint (i.e., not permitting traders to sell below their costs or buy above their values) is sufficient to raise the allocative efficiency of these auctions close to 100 percent. Allocative efficiency of a double auction derives largely from its structure, independent of traders' motivation, intelligence, or learning. Adam Smith's invisible hand may be more powerful than some may have thought; it can generate aggregate rationality not only from individual rationality but also from individual irrationality},
16044 www_section = {allocative efficiency, double auction, market, zero-intelligence trader}, 16044 www_section = {allocative efficiency, double auction, market, zero-intelligence trader},
16045 url = {http://www.jstor.org/stable/2138676}, 16045 url = {http://www.jstor.org/stable/2138676},
16046 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/JPE\%20\%281993\%29\%20-\%20Gode\%20\%26\%20Sunder\%20-\%20Allocative\%20Efficiency.pdf}, 16046 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/JPE\%20\%281993\%29\%20-\%20Gode\%20\%26\%20Sunder\%20-\%20Allocative\%20Efficiency.pdf},
16047 author = {Dhananjay K. Gode and Shyam Sunder} 16047 author = {Dhananjay K. Gode and Shyam Sunder}
16048} 16048}
16049@conference {rackoff93cryptographic, 16049@conference {rackoff93cryptographic,
@@ -16057,7 +16057,7 @@ This paper describes WAFL (Write Anywhere File Layout), which is a file system d
16057 isbn = {0-89791-591-7}, 16057 isbn = {0-89791-591-7},
16058 doi = {http://doi.acm.org/10.1145/167088.167260}, 16058 doi = {http://doi.acm.org/10.1145/167088.167260},
16059 url = {http://portal.acm.org/citation.cfm?id=167088.167260}, 16059 url = {http://portal.acm.org/citation.cfm?id=167088.167260},
16060 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/rackoff93cryptographic.pdf}, 16060 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/rackoff93cryptographic.pdf},
16061 www_section = unsorted, 16061 www_section = unsorted,
16062 author = {Charles Rackoff and Daniel R. Simon} 16062 author = {Charles Rackoff and Daniel R. Simon}
16063} 16063}
@@ -16072,7 +16072,7 @@ This paper describes WAFL (Write Anywhere File Layout), which is a file system d
16072 abstract = {The contribution of this paper are twofold. First, we present an efficient computationally secure anonymous channel which has no problme of ciphertext length expansion. The length is irrelevant to the number of MIXes(control centers). It improves the efficiency of Chaums's election scheme based on the MIX net automatically. Second, we show an election scheme which satisfies fairness. That is, if some vote is disrupted, no one obtains any infromation about all the other votes. Each voter sends O(nk) bits so that the probability of the fairness is 1-2^-k, where n is the bit length of the ciphertext}, 16072 abstract = {The contribution of this paper are twofold. First, we present an efficient computationally secure anonymous channel which has no problme of ciphertext length expansion. The length is irrelevant to the number of MIXes(control centers). It improves the efficiency of Chaums's election scheme based on the MIX net automatically. Second, we show an election scheme which satisfies fairness. That is, if some vote is disrupted, no one obtains any infromation about all the other votes. Each voter sends O(nk) bits so that the probability of the fairness is 1-2^-k, where n is the bit length of the ciphertext},
16073 isbn = {3-540-57600-2}, 16073 isbn = {3-540-57600-2},
16074 url = {http://portal.acm.org/citation.cfm?id=188307.188351}, 16074 url = {http://portal.acm.org/citation.cfm?id=188307.188351},
16075 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/mix.pdf}, 16075 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/mix.pdf},
16076 www_section = unsorted, 16076 www_section = unsorted,
16077 author = {Choonsik Park and Kazutomo Itoh and Kaoru Kurosawa} 16077 author = {Choonsik Park and Kazutomo Itoh and Kaoru Kurosawa}
16078} 16078}
@@ -16097,7 +16097,7 @@ Elliptic Curve Public Key Cryptosystems is a valuable reference resource for res
16097 year = {1993}, 16097 year = {1993},
16098 abstract = {Eumel and its advanced successor L3 are operating systems built by GMD which have been used, for 13 years and 4 years respectively, as production systems in business and education. More than 2000 Eumel systems and 500 L3 systems have been shipped since 1979 and 1988. Both systems rely heavily on the paradigm of persistence (including fault-surviving persistence). Both data and processes, in principle all objects are persistent, files are implemented by means of persistent objects (not vice versa) etc. In addition to the principles and mechanisms of Eumel /L3, general and specific experiences are described: these relate to the design, implementation and maintenance of the systems over the last 13 years. For general purpose timesharing systems the idea is powerful and elegant, it can be efficiently implemented, but making a system really usable is hard work}, 16098 abstract = {Eumel and its advanced successor L3 are operating systems built by GMD which have been used, for 13 years and 4 years respectively, as production systems in business and education. More than 2000 Eumel systems and 500 L3 systems have been shipped since 1979 and 1988. Both systems rely heavily on the paradigm of persistence (including fault-surviving persistence). Both data and processes, in principle all objects are persistent, files are implemented by means of persistent objects (not vice versa) etc. In addition to the principles and mechanisms of Eumel /L3, general and specific experiences are described: these relate to the design, implementation and maintenance of the systems over the last 13 years. For general purpose timesharing systems the idea is powerful and elegant, it can be efficiently implemented, but making a system really usable is hard work},
16099 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.53.7112}, 16099 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.53.7112},
16100 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.53.7112.pdf}, 16100 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.53.7112.pdf},
16101 www_section = unsorted, 16101 www_section = unsorted,
16102 author = {Jochen Liedtke} 16102 author = {Jochen Liedtke}
16103} 16103}
@@ -16132,7 +16132,7 @@ Elliptic Curve Public Key Cryptosystems is a valuable reference resource for res
16132 isbn = {3-540-56413-6}, 16132 isbn = {3-540-56413-6},
16133 doi = {10.1007/3-540-47555-9_32}, 16133 doi = {10.1007/3-540-47555-9_32},
16134 url = {10.1007/3-540-47555-9_32}, 16134 url = {10.1007/3-540-47555-9_32},
16135 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EUROCRYPT\%2792_-_Chaun_\%26_Pedersen_-_Transferred_cash_grows_in_size.pdf}, 16135 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EUROCRYPT\%2792_-_Chaun_\%26_Pedersen_-_Transferred_cash_grows_in_size.pdf},
16136 author = {David Chaum and Torben P. Pedersen} 16136 author = {David Chaum and Torben P. Pedersen}
16137} 16137}
16138@article {Yokoo91distributedconstraint, 16138@article {Yokoo91distributedconstraint,
@@ -16145,7 +16145,7 @@ Elliptic Curve Public Key Cryptosystems is a valuable reference resource for res
16145 abstract = {In this paper, we argue that partially adversarial and partially cooperative (PARC) problems in distributed arti cial intelligence can be mapped into a formalism called distributed constraint optimization problems (DCOPs), which generalize distributed constraint satisfaction problems [Yokoo, et al. 90] by introducing weak constraints (preferences). We discuss several solution criteria for DCOP and clarify the relation between these criteria and di erent levels of agent rationality [Rosenschein and Genesereth 85], and show the algorithms for solving DCOPs in which agents incrementally exchange only necessary information to converge on a mutually satis able bsolution}, 16145 abstract = {In this paper, we argue that partially adversarial and partially cooperative (PARC) problems in distributed arti cial intelligence can be mapped into a formalism called distributed constraint optimization problems (DCOPs), which generalize distributed constraint satisfaction problems [Yokoo, et al. 90] by introducing weak constraints (preferences). We discuss several solution criteria for DCOP and clarify the relation between these criteria and di erent levels of agent rationality [Rosenschein and Genesereth 85], and show the algorithms for solving DCOPs in which agents incrementally exchange only necessary information to converge on a mutually satis able bsolution},
16146 www_section = {artificial intelligence, DCOP, PARC, partially adversial cooperation}, 16146 www_section = {artificial intelligence, DCOP, PARC, partially adversial cooperation},
16147 journal = {unknown}, 16147 journal = {unknown},
16148 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Tech\%20report\%20-\%20DCOP\%20as\%20a\%20formal\%20model\%20of\%20PARC.pdf}, 16148 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Tech\%20report\%20-\%20DCOP\%20as\%20a\%20formal\%20model\%20of\%20PARC.pdf},
16149 url = {https://bibliography.gnunet.org}, 16149 url = {https://bibliography.gnunet.org},
16150 author = {Makoto Yokoo and Edmund H. Durfee} 16150 author = {Makoto Yokoo and Edmund H. Durfee}
16151} 16151}
@@ -16156,7 +16156,7 @@ Elliptic Curve Public Key Cryptosystems is a valuable reference resource for res
16156 pages = {110--121}, 16156 pages = {110--121},
16157 abstract = {An intrusion-tolerant distributed system is a system which is designed so that any intrusion into apart of the system will not endanger confidentiality, integrity and availability. This approach is suitable for distributed systems, because distribution enables isolation of elements so that an intrusion gives physical access to only a part of the system. By intrusion, we mean not only computer break-ins by non-registered people, but also attempts by registered users to exceed or to abuse their privileges. In particular, possible malice of security administrators is taken into account. This paper describes how some functions of distributed systems can be designed to tolerate intrusions, in particular security functions such as user authentication and authorization, and application functions such as file management}, 16157 abstract = {An intrusion-tolerant distributed system is a system which is designed so that any intrusion into apart of the system will not endanger confidentiality, integrity and availability. This approach is suitable for distributed systems, because distribution enables isolation of elements so that an intrusion gives physical access to only a part of the system. By intrusion, we mean not only computer break-ins by non-registered people, but also attempts by registered users to exceed or to abuse their privileges. In particular, possible malice of security administrators is taken into account. This paper describes how some functions of distributed systems can be designed to tolerate intrusions, in particular security functions such as user authentication and authorization, and application functions such as file management},
16158 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.9968}, 16158 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.56.9968},
16159 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.56.9968.pdf}, 16159 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.56.9968.pdf},
16160 www_section = unsorted, 16160 www_section = unsorted,
16161 author = {Yves Deswarte and Laurent Blain and Jean-charles Fabre} 16161 author = {Yves Deswarte and Laurent Blain and Jean-charles Fabre}
16162} 16162}
@@ -16171,7 +16171,7 @@ Elliptic Curve Public Key Cryptosystems is a valuable reference resource for res
16171 abstract = {Untraceable communication for services like telephony is often considered infeasible in the near future because of bandwidth limitations. We present a technique, called ISDN-MIXes, which shows that this is not the case. As little changes as possible are made to the narrowband-ISDN planned by the PTTs. In particular, we assume the same subscriber lines with the same bit rate, and the same long-distance network between local exchanges, and we offer the same services. ISDN-MIXes are a combination of a new variant of CHAUM's MIXes, dummy traffic on the subscriber lines (where this needs no additional bandwidth), and broadcast of incoming-call messages in the subscriber-area}, 16171 abstract = {Untraceable communication for services like telephony is often considered infeasible in the near future because of bandwidth limitations. We present a technique, called ISDN-MIXes, which shows that this is not the case. As little changes as possible are made to the narrowband-ISDN planned by the PTTs. In particular, we assume the same subscriber lines with the same bit rate, and the same long-distance network between local exchanges, and we offer the same services. ISDN-MIXes are a combination of a new variant of CHAUM's MIXes, dummy traffic on the subscriber lines (where this needs no additional bandwidth), and broadcast of incoming-call messages in the subscriber-area},
16172 isbn = {3-540-53721-X}, 16172 isbn = {3-540-53721-X},
16173 url = {http://portal.acm.org/citation.cfm?id=645662.664536}, 16173 url = {http://portal.acm.org/citation.cfm?id=645662.664536},
16174 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.43.4892.pdf}, 16174 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.43.4892.pdf},
16175 www_section = unsorted, 16175 www_section = unsorted,
16176 author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner} 16176 author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}
16177} 16177}
@@ -16194,7 +16194,7 @@ We also sketch applications of these signatures to a payment system, solving dis
16194 www_section = {anonymity, arbitrary network, cryptology, DC-net}, 16194 www_section = {anonymity, arbitrary network, cryptology, DC-net},
16195 isbn = {3-540-53433-4}, 16195 isbn = {3-540-53433-4},
16196 url = {http://dl.acm.org/citation.cfm?id=111563.111630}, 16196 url = {http://dl.acm.org/citation.cfm?id=111563.111630},
16197 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/EUROCRYPT\%2789\%20-\%20Waidner\%26Pfitzmann\%20-\%20The\%20dining\%20cryptographers\%20in\%20the\%20disco\%20.pdf}, 16197 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/EUROCRYPT\%2789\%20-\%20Waidner\%26Pfitzmann\%20-\%20The\%20dining\%20cryptographers\%20in\%20the\%20disco\%20.pdf},
16198 author = {Michael Waidner and Birgit Pfitzmann} 16198 author = {Michael Waidner and Birgit Pfitzmann}
16199} 16199}
16200@article {78977, 16200@article {78977,
@@ -16211,7 +16211,7 @@ We also sketch applications of these signatures to a payment system, solving dis
16211 issn = {0001-0782}, 16211 issn = {0001-0782},
16212 doi = {10.1145/78973.78977}, 16212 doi = {10.1145/78973.78977},
16213 url = {http://portal.acm.org/citation.cfm?id=78977$\#$}, 16213 url = {http://portal.acm.org/citation.cfm?id=78977$\#$},
16214 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.85.9211.pdf}, 16214 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.85.9211.pdf},
16215 author = {Pugh, William} 16215 author = {Pugh, William}
16216} 16216}
16217@conference {1988_0, 16217@conference {1988_0,
@@ -16225,7 +16225,7 @@ We also sketch applications of these signatures to a payment system, solving dis
16225 isbn = {0-89791-264-0}, 16225 isbn = {0-89791-264-0},
16226 doi = {10.1145/62212.62213}, 16226 doi = {10.1145/62212.62213},
16227 url = {http://doi.acm.org/10.1145/62212.62213}, 16227 url = {http://doi.acm.org/10.1145/62212.62213},
16228 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CompletelenessTheorems1988Ben-Or.pdf}, 16228 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CompletelenessTheorems1988Ben-Or.pdf},
16229 www_section = unsorted, 16229 www_section = unsorted,
16230 author = {Ben-Or, Michael and Goldwasser, Shafi and Wigderson, Avi} 16230 author = {Ben-Or, Michael and Goldwasser, Shafi and Wigderson, Avi}
16231} 16231}
@@ -16239,7 +16239,7 @@ We also sketch applications of these signatures to a payment system, solving dis
16239 www_section = {pseudonym, unconditional security, untraceability}, 16239 www_section = {pseudonym, unconditional security, untraceability},
16240 issn = {0933-2790}, 16240 issn = {0933-2790},
16241 url = {http://portal.acm.org/citation.cfm?id=54239}, 16241 url = {http://portal.acm.org/citation.cfm?id=54239},
16242 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/dcnet-jcrypt88.pdf}, 16242 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/dcnet-jcrypt88.pdf},
16243 author = {David Chaum} 16243 author = {David Chaum}
16244} 16244}
16245@conference {1988_1, 16245@conference {1988_1,
@@ -16254,7 +16254,7 @@ We also sketch applications of these signatures to a payment system, solving dis
16254 isbn = {0-89791-264-0}, 16254 isbn = {0-89791-264-0},
16255 doi = {10.1145/62212.62215}, 16255 doi = {10.1145/62212.62215},
16256 url = {http://doi.acm.org/10.1145/62212.62215}, 16256 url = {http://doi.acm.org/10.1145/62212.62215},
16257 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/oblivious_transfer.pdf}, 16257 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/oblivious_transfer.pdf},
16258 author = {Kilian, Joe} 16258 author = {Kilian, Joe}
16259} 16259}
16260@conference {1987, 16260@conference {1987,
@@ -16268,7 +16268,7 @@ We also sketch applications of these signatures to a payment system, solving dis
16268 isbn = {0-89791-221-7}, 16268 isbn = {0-89791-221-7},
16269 doi = {10.1145/28395.28420}, 16269 doi = {10.1145/28395.28420},
16270 url = {http://doi.acm.org/10.1145/28395.28420}, 16270 url = {http://doi.acm.org/10.1145/28395.28420},
16271 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PlayMentalGame1987Goldreich.pdf}, 16271 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PlayMentalGame1987Goldreich.pdf},
16272 www_section = unsorted, 16272 www_section = unsorted,
16273 author = {Goldreich, O. and Micali, S. and Wigderson, A.} 16273 author = {Goldreich, O. and Micali, S. and Wigderson, A.}
16274} 16274}
@@ -16285,7 +16285,7 @@ We also sketch applications of these signatures to a payment system, solving dis
16285 issn = {0163-5980}, 16285 issn = {0163-5980},
16286 doi = {10.1145/37499.37517}, 16286 doi = {10.1145/37499.37517},
16287 url = {http://portal.acm.org/citation.cfm?id=37499.37517$\#$}, 16287 url = {http://portal.acm.org/citation.cfm?id=37499.37517$\#$},
16288 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/024-DatabasesPaper.pdf}, 16288 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/024-DatabasesPaper.pdf},
16289 www_section = unsorted, 16289 www_section = unsorted,
16290 author = {Andrew D. Birrell and Michael B. Jones and Edward P. Wobber} 16290 author = {Andrew D. Birrell and Michael B. Jones and Edward P. Wobber}
16291} 16291}
@@ -16304,7 +16304,7 @@ We also sketch applications of these signatures to a payment system, solving dis
16304 isbn = {0-89791-245-4}, 16304 isbn = {0-89791-245-4},
16305 doi = {http://doi.acm.org/10.1145/55482.55508}, 16305 doi = {http://doi.acm.org/10.1145/55482.55508},
16306 url = {http://doi.acm.org/10.1145/55482.55508}, 16306 url = {http://doi.acm.org/10.1145/55482.55508},
16307 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/SIGCOMM\%2787\%20-\%20Strategies\%20for\%20decentralized\%20resource\%20management.pdf}, 16307 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/SIGCOMM\%2787\%20-\%20Strategies\%20for\%20decentralized\%20resource\%20management.pdf},
16308 author = {Stumm, Michael} 16308 author = {Stumm, Michael}
16309} 16309}
16310@book {1986, 16310@book {1986,
@@ -16320,7 +16320,7 @@ We also sketch applications of these signatures to a payment system, solving dis
16320 isbn = {978-3-540-16468-5}, 16320 isbn = {978-3-540-16468-5},
16321 doi = {10.1007/3-540-39805-8_29}, 16321 doi = {10.1007/3-540-39805-8_29},
16322 url = {http://dx.doi.org/10.1007/3-540-39805-8_29}, 16322 url = {http://dx.doi.org/10.1007/3-540-39805-8_29},
16323 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/NetworkWithoutUserObservabiliy1985Pfitzmann.pdf}, 16323 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/NetworkWithoutUserObservabiliy1985Pfitzmann.pdf},
16324 www_section = unsorted, 16324 www_section = unsorted,
16325 author = {Pfitzmann, Andreas and Waidner, Michael}, 16325 author = {Pfitzmann, Andreas and Waidner, Michael},
16326 editor = {Pichler, Franz} 16326 editor = {Pichler, Franz}
@@ -16338,7 +16338,7 @@ We also sketch applications of these signatures to a payment system, solving dis
16338 issn = {0362-1340}, 16338 issn = {0362-1340},
16339 doi = {10.1145/15042.15043}, 16339 doi = {10.1145/15042.15043},
16340 url = {http://en.scientificcommons.org/42347723}, 16340 url = {http://en.scientificcommons.org/42347723},
16341 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/r5rs.pdf}, 16341 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/r5rs.pdf},
16342 www_section = unsorted, 16342 www_section = unsorted,
16343 author = {Rees, Jonathan and Clinger, William and Richard Kelsey} 16343 author = {Rees, Jonathan and Clinger, William and Richard Kelsey}
16344} 16344}
@@ -16349,7 +16349,7 @@ We also sketch applications of these signatures to a payment system, solving dis
16349 pages = {558--563}, 16349 pages = {558--563},
16350 abstract = {this paper we discuss a system, Amoeba, that uses capabilities for naming and protecting objects. In contrast to traditional, centralized operating systems, in which capabilities are managed by the operating system kernel, in Amoeba all the capabilities are managed directly by user code. To prevent tampering, the capabilities are protected cryptographically. The paper describes a variety of the issues involved, and gives four different ways of dealing with the access rights}, 16350 abstract = {this paper we discuss a system, Amoeba, that uses capabilities for naming and protecting objects. In contrast to traditional, centralized operating systems, in which capabilities are managed by the operating system kernel, in Amoeba all the capabilities are managed directly by user code. To prevent tampering, the capabilities are protected cryptographically. The paper describes a variety of the issues involved, and gives four different ways of dealing with the access rights},
16351 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.7998}, 16351 url = {http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.49.7998},
16352 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.56.3350.pdf}, 16352 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.56.3350.pdf},
16353 www_section = unsorted, 16353 www_section = unsorted,
16354 author = {Andrew Tanenbaum and Sape J. Mullender and Robbert Van Renesse} 16354 author = {Andrew Tanenbaum and Sape J. Mullender and Robbert Van Renesse}
16355} 16355}
@@ -16366,7 +16366,7 @@ We also sketch applications of these signatures to a payment system, solving dis
16366 issn = {0004-5411}, 16366 issn = {0004-5411},
16367 doi = {10.1145/3149.214121}, 16367 doi = {10.1145/3149.214121},
16368 url = {http://portal.acm.org/citation.cfm?id=214121$\#$}, 16368 url = {http://portal.acm.org/citation.cfm?id=214121$\#$},
16369 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/pods06_paper01.pdf}, 16369 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/pods06_paper01.pdf},
16370 www_section = unsorted, 16370 www_section = unsorted,
16371 author = {Fischer, Michael J. and Lynch, Nancy A. and Paterson, Michael S.} 16371 author = {Fischer, Michael J. and Lynch, Nancy A. and Paterson, Michael S.}
16372} 16372}
@@ -16398,7 +16398,7 @@ Therefore, we summarize basic concepts to keep the recipient and sender or at le
16398 www_section = {cryptosystem, discrete logarithms, public key, signature scheme}, 16398 www_section = {cryptosystem, discrete logarithms, public key, signature scheme},
16399 isbn = {0-387-15658-5}, 16399 isbn = {0-387-15658-5},
16400 url = {http://dl.acm.org/citation.cfm?id=19478.19480s}, 16400 url = {http://dl.acm.org/citation.cfm?id=19478.19480s},
16401 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/CRYPTO\%2784\%20-\%20El\%20Gamal\%20-\%20Public\%20Key\%20Cryptosystem.pdf}, 16401 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/CRYPTO\%2784\%20-\%20El\%20Gamal\%20-\%20Public\%20Key\%20Cryptosystem.pdf},
16402 author = {El Gamal, Taher} 16402 author = {El Gamal, Taher}
16403} 16403}
16404@article {4202, 16404@article {4202,
@@ -16415,7 +16415,7 @@ Therefore, we summarize basic concepts to keep the recipient and sender or at le
16415 issn = {0038-0644}, 16415 issn = {0038-0644},
16416 doi = {10.1002/spe.4380150703}, 16416 doi = {10.1002/spe.4380150703},
16417 url = {http://portal.acm.org/citation.cfm?id=4202$\#$}, 16417 url = {http://portal.acm.org/citation.cfm?id=4202$\#$},
16418 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.56.3350_0.pdf}, 16418 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.56.3350_0.pdf},
16419 author = {Tichy, Walter F.} 16419 author = {Tichy, Walter F.}
16420} 16420}
16421@article {chaum85, 16421@article {chaum85,
@@ -16430,7 +16430,7 @@ Therefore, we summarize basic concepts to keep the recipient and sender or at le
16430 issn = {0001-0782}, 16430 issn = {0001-0782},
16431 doi = {http://doi.acm.org/10.1145/4372.4373}, 16431 doi = {http://doi.acm.org/10.1145/4372.4373},
16432 url = {http://portal.acm.org/citation.cfm?id=4373}, 16432 url = {http://portal.acm.org/citation.cfm?id=4373},
16433 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/10.1.1.48.4680.pdf}, 16433 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/10.1.1.48.4680.pdf},
16434 www_section = unsorted, 16434 www_section = unsorted,
16435 author = {David Chaum} 16435 author = {David Chaum}
16436} 16436}
@@ -16442,7 +16442,7 @@ Therefore, we summarize basic concepts to keep the recipient and sender or at le
16442 address = {Newton, MA, USA}, 16442 address = {Newton, MA, USA},
16443 isbn = {0932376223}, 16443 isbn = {0932376223},
16444 url = {http://portal.acm.org/citation.cfm?id=538134$\#$}, 16444 url = {http://portal.acm.org/citation.cfm?id=538134$\#$},
16445 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Preface.pdf}, 16445 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Preface.pdf},
16446 www_section = unsorted, 16446 www_section = unsorted,
16447 author = {Levy, Henry M.} 16447 author = {Levy, Henry M.}
16448} 16448}
@@ -16458,7 +16458,7 @@ Therefore, we summarize basic concepts to keep the recipient and sender or at le
16458 issn = {0164-0925}, 16458 issn = {0164-0925},
16459 doi = {10.1145/357172.357176}, 16459 doi = {10.1145/357172.357176},
16460 url = {http://portal.acm.org/citation.cfm?id=357176$\#$}, 16460 url = {http://portal.acm.org/citation.cfm?id=357176$\#$},
16461 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/byz.pdf}, 16461 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/byz.pdf},
16462 www_section = unsorted, 16462 www_section = unsorted,
16463 author = {Lamport, Leslie and Shostak, Robert and Pease, Marshall} 16463 author = {Lamport, Leslie and Shostak, Robert and Pease, Marshall}
16464} 16464}
@@ -16471,7 +16471,7 @@ Therefore, we summarize basic concepts to keep the recipient and sender or at le
16471 address = {Washington, DC, USA}, 16471 address = {Washington, DC, USA},
16472 doi = {10.1109/SFCS.1982.88}, 16472 doi = {10.1109/SFCS.1982.88},
16473 url = {http://dx.doi.org/10.1109/SFCS.1982.88}, 16473 url = {http://dx.doi.org/10.1109/SFCS.1982.88},
16474 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ProtocolSecurecomputations1982Yao.pdf}, 16474 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ProtocolSecurecomputations1982Yao.pdf},
16475 www_section = unsorted, 16475 www_section = unsorted,
16476 author = {Yao, Andrew C.} 16476 author = {Yao, Andrew C.}
16477} 16477}
@@ -16488,7 +16488,7 @@ The technique can also be used to form rosters of untraceable digital pseudonyms
16488 www_section = {digital signature, electronic mail, privacy, pseudonym, public key cryptography, traffic analysis}, 16488 www_section = {digital signature, electronic mail, privacy, pseudonym, public key cryptography, traffic analysis},
16489 issn = {0001-0782 }, 16489 issn = {0001-0782 },
16490 doi = {http://doi.acm.org/10.1145/358549.358563}, 16490 doi = {http://doi.acm.org/10.1145/358549.358563},
16491 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/chaum-mix_0.pdf}, 16491 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/chaum-mix_0.pdf},
16492 url = {https://bibliography.gnunet.org}, 16492 url = {https://bibliography.gnunet.org},
16493 author = {David Chaum} 16493 author = {David Chaum}
16494} 16494}
@@ -16539,7 +16539,7 @@ The technique can also be used to form rosters of untraceable digital pseudonyms
16539 type = {S. M. \& E. E. thesis}, 16539 type = {S. M. \& E. E. thesis},
16540 address = {Cambridge, MA}, 16540 address = {Cambridge, MA},
16541 abstract = {This thesis examines the issues relating to non-discretionary access controls for decentralized computing systems. Decentralization changes the basic character of a computing system from a set of processes referencing a data base to a set of processes sending and receiving messages. Because messages must be acknowledged, operations that were read-only in a centralized system become read-write operations. As a result, the lattice model of non-discretionary access control, which mediates operations based on read versus read-write considerations, does not allow direct transfer of algorithms from centralized systems to decentralized systems. This thesis develops new mechanisms that comply with the lattice model and provide the necessary functions for effective decentralized computation. Secure protocols at several different levels are presented in the thesis. At the lowest level, a host or host protocol is shown that allows communication between hosts with effective internal security controls. Above this level, a host independent naming scheme is presented that allows generic naming of services in a manner consistent with the lattice model. The use of decentralized processing to aid in the downgrading of information is shown in the design of a secure intelligent terminal. Schemes are presented to deal with the decentralized administration of the lattice model, and with the proliferation of access classes as the user community of a decentralized system become more diverse. Limitations in the use of end-to-end encryption when used with the lattice model are identified, and a scheme is presented to relax these limitations for broadcast networks. Finally, a scheme is presented for forwarding authentication information between hosts on a network, without transmitting passwords (or their equivalent) over a network}, 16541 abstract = {This thesis examines the issues relating to non-discretionary access controls for decentralized computing systems. Decentralization changes the basic character of a computing system from a set of processes referencing a data base to a set of processes sending and receiving messages. Because messages must be acknowledged, operations that were read-only in a centralized system become read-write operations. As a result, the lattice model of non-discretionary access control, which mediates operations based on read versus read-write considerations, does not allow direct transfer of algorithms from centralized systems to decentralized systems. This thesis develops new mechanisms that comply with the lattice model and provide the necessary functions for effective decentralized computation. Secure protocols at several different levels are presented in the thesis. At the lowest level, a host or host protocol is shown that allows communication between hosts with effective internal security controls. Above this level, a host independent naming scheme is presented that allows generic naming of services in a manner consistent with the lattice model. The use of decentralized processing to aid in the downgrading of information is shown in the design of a secure intelligent terminal. Schemes are presented to deal with the decentralized administration of the lattice model, and with the proliferation of access classes as the user community of a decentralized system become more diverse. Limitations in the use of end-to-end encryption when used with the lattice model are identified, and a scheme is presented to relax these limitations for broadcast networks. Finally, a scheme is presented for forwarding authentication information between hosts on a network, without transmitting passwords (or their equivalent) over a network},
16542 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/MIT-LCS-TR-179.pdf}, 16542 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/MIT-LCS-TR-179.pdf},
16543 www_section = unsorted, 16543 www_section = unsorted,
16544 url = {https://bibliography.gnunet.org}, 16544 url = {https://bibliography.gnunet.org},
16545 author = {Paul A. Karger} 16545 author = {Paul A. Karger}
@@ -16565,7 +16565,7 @@ The technique can also be used to form rosters of untraceable digital pseudonyms
16565 www_section = {cryptographic systems, cryptography}, 16565 www_section = {cryptographic systems, cryptography},
16566 issn = {0018-9448}, 16566 issn = {0018-9448},
16567 doi = {10.1109/TIT.1976.1055638}, 16567 doi = {10.1109/TIT.1976.1055638},
16568 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/IEEE\%20Trans.\%20on\%20Info.\%20-\%20New\%20directions\%20in\%20cryptography.pdf}, 16568 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/IEEE\%20Trans.\%20on\%20Info.\%20-\%20New\%20directions\%20in\%20cryptography.pdf},
16569 url = {https://bibliography.gnunet.org}, 16569 url = {https://bibliography.gnunet.org},
16570 author = {Whitfield Diffie and Martin E. Hellman} 16570 author = {Whitfield Diffie and Martin E. Hellman}
16571} 16571}
@@ -16579,7 +16579,7 @@ The technique can also be used to form rosters of untraceable digital pseudonyms
16579 abstract = {A model is presented to account for the natural selection of what is termed reciprocally altruistic behavior. The model shows how selection can operate against the cheater (non-reciprocator) in the system. Three instances of altruistic behavior are discussed, the evolution of which the model can explain: (1) behavior involved in cleaning symbioses; (2) warning cries in birds; and (3) human reciprocal altruism. Regarding human reciprocal altruism, it is shown that the details of the psychological system that regulates this altruism can be explained by the model. Specifically, friendship, dislike, moralistic aggression, gratitude, sympathy, trust, suspicion, trustworthiness, aspects of guilt, and some forms of dishonesty and hypocrisy can be explained as important adaptations to regulate the altruistic system. Each individual human is seen as possessing altruistic and cheating tendencies, the expression of which is sensitive to developmental variables that were selected to set the tendencies at a balance appropriate to the local social and ecological environment}, 16579 abstract = {A model is presented to account for the natural selection of what is termed reciprocally altruistic behavior. The model shows how selection can operate against the cheater (non-reciprocator) in the system. Three instances of altruistic behavior are discussed, the evolution of which the model can explain: (1) behavior involved in cleaning symbioses; (2) warning cries in birds; and (3) human reciprocal altruism. Regarding human reciprocal altruism, it is shown that the details of the psychological system that regulates this altruism can be explained by the model. Specifically, friendship, dislike, moralistic aggression, gratitude, sympathy, trust, suspicion, trustworthiness, aspects of guilt, and some forms of dishonesty and hypocrisy can be explained as important adaptations to regulate the altruistic system. Each individual human is seen as possessing altruistic and cheating tendencies, the expression of which is sensitive to developmental variables that were selected to set the tendencies at a balance appropriate to the local social and ecological environment},
16580 www_section = {behavior, evolution, reciprocal altruism}, 16580 www_section = {behavior, evolution, reciprocal altruism},
16581 url = {http://www.jstor.org/pss/2822435}, 16581 url = {http://www.jstor.org/pss/2822435},
16582 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Trivers\%20-\%20The\%20evolution\%20of\%20reciprocal\%20altruism.pdf}, 16582 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Trivers\%20-\%20The\%20evolution\%20of\%20reciprocal\%20altruism.pdf},
16583 author = {Robert L. Trivers} 16583 author = {Robert L. Trivers}
16584} 16584}
16585@article {1970_0, 16585@article {1970_0,
@@ -16591,7 +16591,7 @@ The technique can also be used to form rosters of untraceable digital pseudonyms
16591 pages = {291--307}, 16591 pages = {291--307},
16592 abstract = {We consider the problem of partitioning the nodes of a graph with costs on its edges into subsets of given sizes so as to minimize the sum of the costs on all edges cut. This problem arises in several physical situations- for example, in assigning the components of electronic circuits to circuit boards to minimize the number of connections between boards. This paper presents a heuristic method for partitioning arbitrary graphs which is both effective in finding optimal partitions, and fast enough to be practical in solving large problems}, 16592 abstract = {We consider the problem of partitioning the nodes of a graph with costs on its edges into subsets of given sizes so as to minimize the sum of the costs on all edges cut. This problem arises in several physical situations- for example, in assigning the components of electronic circuits to circuit boards to minimize the number of connections between boards. This paper presents a heuristic method for partitioning arbitrary graphs which is both effective in finding optimal partitions, and fast enough to be practical in solving large problems},
16593 www_section = {heuristic method, partitioning graphs}, 16593 www_section = {heuristic method, partitioning graphs},
16594 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Kernighan\%20\%26\%20Lin\%20-\%20An\%20Efficient\%20Heuristic\%20Procedure\%20for\%20Partitioning\%20Graphs\%250A.pdf}, 16594 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Kernighan\%20\%26\%20Lin\%20-\%20An\%20Efficient\%20Heuristic\%20Procedure\%20for\%20Partitioning\%20Graphs\%250A.pdf},
16595 url = {https://bibliography.gnunet.org}, 16595 url = {https://bibliography.gnunet.org},
16596 author = {Brian W. Kernighan and S. Lin} 16596 author = {Brian W. Kernighan and S. Lin}
16597} 16597}
@@ -16604,7 +16604,7 @@ The technique can also be used to form rosters of untraceable digital pseudonyms
16604 pages = {488--500}, 16604 pages = {488--500},
16605 abstract = {I. Introduction, 488.--II. The model with automobiles as an example, 489.--III. Examples and applications, 492.--IV. Counteracting institutions, 499.--V. Conclusion, 500}, 16605 abstract = {I. Introduction, 488.--II. The model with automobiles as an example, 489.--III. Examples and applications, 492.--IV. Counteracting institutions, 499.--V. Conclusion, 500},
16606 url = { http://www.jstor.org/stable/1879431}, 16606 url = { http://www.jstor.org/stable/1879431},
16607 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/akerlof.pdf}, 16607 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/akerlof.pdf},
16608 www_section = unsorted, 16608 www_section = unsorted,
16609 author = {George A. Akerlof} 16609 author = {George A. Akerlof}
16610} 16610}
@@ -16625,7 +16625,7 @@ The technique can also be used to form rosters of untraceable digital pseudonyms
16625 volume = {162}, 16625 volume = {162},
16626 year = {1968}, 16626 year = {1968},
16627 pages = {1243--1248}, 16627 pages = {1243--1248},
16628 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Science\%20-\%20Hardin\%20-\%20The\%20Tragedy\%20of\%20the\%20Commons.pdf}, 16628 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Science\%20-\%20Hardin\%20-\%20The\%20Tragedy\%20of\%20the\%20Commons.pdf},
16629 www_section = unsorted, 16629 www_section = unsorted,
16630 url = {https://bibliography.gnunet.org}, 16630 url = {https://bibliography.gnunet.org},
16631 author = {Garrett Hardin} 16631 author = {Garrett Hardin}
@@ -16642,7 +16642,7 @@ The technique can also be used to form rosters of untraceable digital pseudonyms
16642 issn = {0096-1000 }, 16642 issn = {0096-1000 },
16643 doi = {10.1109/TIT.1962.1057683 }, 16643 doi = {10.1109/TIT.1962.1057683 },
16644 url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1057683}, 16644 url = {http://ieeexplore.ieee.org/xpl/freeabs_all.jsp?arnumber=1057683},
16645 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/ldpc.pdf}, 16645 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/ldpc.pdf},
16646 author = {Robert G. Gallager} 16646 author = {Robert G. Gallager}
16647} 16647}
16648@article {reed60polynomial, 16648@article {reed60polynomial,
@@ -16655,7 +16655,7 @@ The technique can also be used to form rosters of untraceable digital pseudonyms
16655 pages = {300--304}, 16655 pages = {300--304},
16656 www_section = {filing-erasure-coding}, 16656 www_section = {filing-erasure-coding},
16657 url = {http://www.jstor.org/pss/2098968}, 16657 url = {http://www.jstor.org/pss/2098968},
16658 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Reed\%20\%26\%20Solomon\%20-\%20Polynomial\%20Codes\%20Over\%20Certain\%20Finite\%20Fields.pdf}, 16658 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Reed\%20\%26\%20Solomon\%20-\%20Polynomial\%20Codes\%20Over\%20Certain\%20Finite\%20Fields.pdf},
16659 author = {Irving Reed and Golomb Solomon} 16659 author = {Irving Reed and Golomb Solomon}
16660} 16660}
16661@article {1959, 16661@article {1959,
@@ -16667,7 +16667,7 @@ The technique can also be used to form rosters of untraceable digital pseudonyms
16667 pages = {290--297}, 16667 pages = {290--297},
16668 www_section = {graphs, random, random graphs}, 16668 www_section = {graphs, random, random graphs},
16669 url = {https://bibliography.gnunet.org}, 16669 url = {https://bibliography.gnunet.org},
16670 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Erd\%C5\%91s\%20\%26\%20R\%C3\%A9nyi\%20-\%20On\%20Random\%20Graphs.pdf}, 16670 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Erd\%C5\%91s\%20\%26\%20R\%C3\%A9nyi\%20-\%20On\%20Random\%20Graphs.pdf},
16671 author = {Paul Erd{\H o}s and Alfr{\'e}d R{\'e}nyi} 16671 author = {Paul Erd{\H o}s and Alfr{\'e}d R{\'e}nyi}
16672} 16672}
16673@article {368907, 16673@article {368907,
@@ -16696,7 +16696,7 @@ The technique can also be used to form rosters of untraceable digital pseudonyms
16696 www_section = {n-persona game, strategy}, 16696 www_section = {n-persona game, strategy},
16697 doi = {10.1073/pnas.36.1.48}, 16697 doi = {10.1073/pnas.36.1.48},
16698 url = {https://bibliography.gnunet.org}, 16698 url = {https://bibliography.gnunet.org},
16699 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/PNAS\%20-\%20Nash\%20-\%20Equilibrium\%20points\%20in\%20n-person\%20games.pdf}, 16699 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/PNAS\%20-\%20Nash\%20-\%20Equilibrium\%20points\%20in\%20n-person\%20games.pdf},
16700 author = {John F. Nash Jr.} 16700 author = {John F. Nash Jr.}
16701} 16701}
16702@book {1944, 16702@book {1944,
@@ -16710,6 +16710,6 @@ The technique can also be used to form rosters of untraceable digital pseudonyms
16710 www_section = {economic behavior, games, theory}, 16710 www_section = {economic behavior, games, theory},
16711 isbn = {978-0-691-13061-3 }, 16711 isbn = {978-0-691-13061-3 },
16712 url = {http://www.archive.org/details/theoryofgamesand030098mbp}, 16712 url = {http://www.archive.org/details/theoryofgamesand030098mbp},
16713 www_pdf_url = {https://gnunet.org/git/bibliography.git/plain/docs/Neumann\%20\%26\%20Morgenstern\%20-\%20Theory\%20of\%20Games\%20and\%20Economic\%20Behavior.pdf}, 16713 www_pdf_url = {https://git.gnunet.org/bibliography.git/plain/docs/Neumann\%20\%26\%20Morgenstern\%20-\%20Theory\%20of\%20Games\%20and\%20Economic\%20Behavior.pdf},
16714 author = {John von Neumann and Oskar Morgenstern} 16714 author = {John von Neumann and Oskar Morgenstern}
16715} 16715}