LASTor: A low-latency as-aware tor client Secure distributed framework for achieving differential privacy Enhancing Tor's performance using real-time traffic classification DefenestraTor: Throwing Out Windows in Tor Seti@ home: an experiment in publicresource computing, 17th USENIX Security Symposium IEEE Symposium on Security and Privacy 12th Privacy Enhancing Technologies Symposium 19th ACM Conference on Computer and Communications Security 11th Privacy Enhancing Technologies Symposium, 2011. [6] A&M Records, Inc. v. Napster, Inc., 239 F.3d 1004 Pragocrypt, 1996. [9] P. S. Andre. IETF RFC 6120 Extensible Messaging and Presence Protocol (xmpp): Core. https, pp.56-61, 2001. ,
Secure multiparty computations on Bitcoin, IEEE Symposium on Security and Privacy, 2014. ,
DOI : 10.1145/2896386
URL : https://eprint.iacr.org/2013/784.pdf
On routing in Distributed Hash Tables: Is reputation a shelter from malicious behavior and churn?, 9th IEEE Conference on Peer-to-Peer Computing, pp.31-40, 2009. ,
(Nothing else) MATor(s), Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014. ,
DOI : 10.1007/978-3-642-32946-3_9
On distributed communications. Volumes I-XI, RAND Corporation Research Documents, 1964. ,
Low-resource routing attacks against tor, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, 2007. ,
DOI : 10.1145/1314333.1314336
URL : http://www.freehaven.net/anonbib/cache/bauer:wpes2007.pdf
Distributed Proving in Access-Control Systems, 2005 IEEE Symposium on Security and Privacy (S&P'05), 2005. ,
DOI : 10.1109/SP.2005.9
URL : http://www.cs.unc.edu/~reiter/papers/2005/SP2.pdf
Randomizable Proofs and Delegatable Anonymous Credentials, 29th International Cryptology Conference Advances in Cryptology, 2009. ,
DOI : 10.1007/978-3-642-03356-8_7
URL : http://eprint.iacr.org/2008/428.pdf
Making p2p accountable without losing privacy, Proceedings of the 2007 ACM workshop on Privacy in electronic society , WPES '07, 2007. ,
DOI : 10.1145/1314333.1314339
URL : http://www.cs.brown.edu/~mira/papers/wpes07.pdf
Zerocash: Decentralized anonymous payments from Bitcoin, IEEE Symposium on Security and Privacy, 2014. ,
The growth of Diaspora - A decentralized online social network in the wild, 2012 Proceedings IEEE INFOCOM Workshops, 2012. ,
DOI : 10.1109/INFCOMW.2012.6193476
Macaroons: Cookies with Contextual Caveats for Decentralized Authorization in the Cloud, Proceedings 2014 Network and Distributed System Security Symposium, 2014. ,
DOI : 10.14722/ndss.2014.23212
Deanonymisation of Clients in Bitcoin P2P Network, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014. ,
DOI : 10.1007/978-3-642-39884-1_2
Trawling for Tor Hidden Services: Detection, Measurement, Deanonymization, 2013 IEEE Symposium on Security and Privacy, p.2013 ,
DOI : 10.1109/SP.2013.15
URL : http://doi.org/10.1109/sp.2013.15
Threshold-based identity recovery for privacy enhanced applications, Proceedings of the 7th ACM conference on Computer and communications security , CCS '00, 2000. ,
DOI : 10.1145/352600.352611
Keynote: Trust Management for Public-Key Infrastructures (position paper), 6th International Workshop on Security Protocols, 1998. ,
DOI : 10.1007/3-540-49135-x_9
Sharemind: A Framework for Fast Privacy-Preserving Computations, 13th European Symposium on Research in Computer Security, 2008. ,
DOI : 10.1007/s001459910003
URL : http://www.math.ut.ee/%7Eswen/publications/articles/bogdanov-laur-willemson-2008.pdf
Abstract, Proceedings on Privacy Enhancing Technologies, pp.4-24, 2015. ,
DOI : 10.1109/TIT.1976.1055638
Peer- SoN: P2P social networking: early experiences and insights, 2nd ACM EuroSys Workshop on Social Network Systems, 2009. ,
DOI : 10.1145/1578002.1578010
How to win the clonewars, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006. ,
DOI : 10.1145/1180405.1180431
An Efficient System for Non-transferable Anonymous Credentials with Optional Anonymity Revocation, International Conference on the Theory and Application of Cryptographic Techniques Advances in Cryptology, 2001. ,
DOI : 10.1007/3-540-44987-6_7
Endorsed E-Cash, 2007 IEEE Symposium on Security and Privacy (SP '07), 2007. ,
DOI : 10.1109/SP.2007.15
Secure routing for structured peerto-peer overlay networks, 5th USENIX Symposium on Operating System Design and Implementation, 2002. ,
DOI : 10.1145/844128.844156
Efficient security primitives derived from a secure aggregation algorithm, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, 2008. ,
DOI : 10.1145/1455770.1455836
URL : http://www-2.cs.cmu.edu/~haowen/secure-aggregation-applications.pdf
Untraceable electronic mail, return addresses, and digital pseudonyms, Commun. ACM, 1981. ,
DOI : 10.1007/978-1-4615-0239-5_14
URL : http://www.cs.utexas.edu/~shmat/courses/cs395t_fall04/chaum81.pdf
The dining cryptographers problem: Unconditional sender and recipient untraceability, Journal of Cryptology, vol.1, issue.1, 1988. ,
DOI : 10.1007/BF00206326
URL : http://www.cs.ucsb.edu/~ravenben/classes/595n-s07/papers/dcnet-jcrypt88.pdf
XPay, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, 2009. ,
DOI : 10.1145/1655188.1655195
Private information retrieval, J. ACM, 1998. ,
Freenet: A Distributed Anonymous Information Storage and Retrieval System, Designing Privacy Enhancing Technologies, International Workshop on Design Issues in Anonymity and Unobservability, 2000. ,
DOI : 10.1007/3-540-44702-4_4
Riposte: An Anonymous Messaging System Handling Millions of Users, 2015 IEEE Symposium on Security and Privacy, 2015. ,
DOI : 10.1109/SP.2015.27
A reputation-based approach for choosing reliable resources in peer-to-peer networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002. ,
DOI : 10.1145/586110.586138
$\text{Drac}$ : An Architecture for Anonymous Low-Volume Communications, 10th Privacy Enhancing Technologies Symposium, 2010. ,
DOI : 10.1038/30918
Mixminion: design of a type III anonymous remailer protocol, Proceedings 19th International Conference on Data Engineering (Cat. No.03CH37405), 2003. ,
DOI : 10.1109/SECPRI.2003.1199323
Sybil-Resistant DHT Routing, European Symposium On Research In Computer Security, pp.305-318, 2005. ,
DOI : 10.1007/11555827_18
URL : http://www.cl.cam.ac.uk/~rja14/Papers/sybildht.pdf
SybilInfer: Detecting sybil nodes using social networks, Network and Distributed System Security Symposium, 2009. ,
MapReduce, Communications of the ACM, vol.51, issue.1, 2008. ,
DOI : 10.14293/S2199-1006.1.SOR-UNCAT.AUNHT8.v1.RBZFIB
Exploring and improving BitTorrent topologies, IEEE P2P 2013 Proceedings, 2013. ,
DOI : 10.1109/P2P.2013.6688698
Panel Discussion -Mix Cascades Versus Peerto-Peer: Is One Concept Superior?, Privacy Enhancing Technologies, pp.242-242, 2004. ,
Impact of Network Topology on Anonymity and Overhead in Low-Latency Anonymity Networks, 10th Privacy Enhancing Technologies Symposium, 2010. ,
DOI : 10.1145/1455770.1455812
Hero or villain: The data controller in privacy law and technologies, Ohio St. LJ, vol.74, pp.923-963, 2013. ,
Anonymity loves company: Usability and the network effect, 5th Workshop on the Economics of Information Security (WEIS), 2006. ,
Design of a blockingresistant anonymity system. The Tor Project, Tech. Rep, issue.1, 2006. ,
Tor: The second-generation onion router, 13th USENIX Security Symposium, 2004. ,
DOI : 10.21236/ADA465464
URL : http://www.dtic.mil/cgi-bin/GetTRDoc?AD=ADA465464&Location=U2&doc=GetTRDoc.pdf
Secure Decentralized DNS. https://bit.namecoin. info/. Last accessed, 2017. ,
The Sybil Attack, 1st International Worksop on Peer-to-Peer Systems, 2002. ,
DOI : 10.1007/3-540-45748-8_24
P4P: practical large-scale privacy-preserving distributed computation robust against malicious users, 19th USENIX Security Symposium, 2010. ,
DOI : 10.1007/978-1-4614-9242-9_8
As-awareness in Tor path selection, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009. ,
DOI : 10.1145/1653662.1653708
URL : http://www.freehaven.net/anonbib/cache/DBLP:conf/ccs/EdmanS09.pdf
PrivEx, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014. ,
DOI : 10.1007/978-3-642-03356-8_8
Establishing identity without certification authorities, 6th USENIX Security Symposium, 1996. ,
A key-management scheme for distributed sensor networks, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002. ,
DOI : 10.1145/586110.586117
Opinion on privacy in the digital agePrivacy by Design" as a key tool to ensure citizen's trust in ICTS, 2010. ,
Social networking with Frientegrity: Privacy and integrity with an untrusted provider, 21th USENIX Security Symposium, 2012. ,
HSkip+: A selfstabilizing overlay network for nodes with heterogeneous bandwidths, 14th IEEE International Conference on Peer-to-Peer Computing, 2014. ,
DOI : 10.1109/p2p.2014.6934300
URL : http://arxiv.org/pdf/1408.0395
Tarzan, Proceedings of the 9th ACM conference on Computer and communications security , CCS '02, 2002. ,
DOI : 10.1145/586110.586137
Vanish: Increasing data privacy with self-destructing data, 18th USENIX Security Symposium, 2009. ,
File sharing and distribution network, 2017. ,
No place to hide: Edward Snowden, the NSA, and the US surveillance state, 2014. ,
Secure electronic voting, 2012. ,
DOI : 10.1007/978-1-4615-0239-5
Eclipse attacks on Bitcoin's peer-to-peer network, 24th USENIX Security Symposium, 2015. ,
A brief history of anon.penet.fi: the legendary anonymous remailer, 1997. ,
Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study Using I2P, Privacy Enhancing Technologies, 2011. ,
DOI : 10.1007/978-3-642-22263-4_9
A survey of attack and defense techniques for reputation systems, ACM Computing Surveys, vol.42, issue.1, 2009. ,
DOI : 10.1145/1592451.1592452
AN- ONIZE: A large-scale anonymous survey system, IEEE Symposium on Security and Privacy, 2014. ,
DOI : 10.1109/sp.2014.31
URL : http://ieee-security.org/TC/SP2014/papers/ANONIZE_c_ALarge-ScaleAnonymousSurveySystem.pdf
Indra: a peer-to-peer approach to network intrusion detection and prevention, WET ICE 2003. Proceedings. Twelfth IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprises, 2003., 2003. ,
DOI : 10.1109/ENABL.2003.1231412
Trust-based anonymous communication, Proceedings of the 18th ACM conference on Computer and communications security, CCS '11, 2011. ,
DOI : 10.1145/2046707.2046729
Users get routed, Proceedings of the 2013 ACM SIGSAC conference on Computer & communications security, CCS '13, 2013. ,
DOI : 10.1145/2508859.2516651
Nymble: Anonymous IP-Address Blocking, 7th Privacy Enhancing Technologies Symposium, 2007. ,
DOI : 10.1007/978-3-540-75551-7_8
Abstract, Proceedings on Privacy Enhancing Technologies, vol.41, issue.2, 2015. ,
DOI : 10.1515/popets-2015-0021
Plutus: Scalable secure file sharing on untrusted storage, USENIX Conference on File and Storage Technologies, 2003. ,
Halo: High-assurance locate for distributed hash tables, Network and Distributed System Security Symposium, 2008. ,
Doublespending fast payments in Bitcoin, 19th ACM Conference on Computer and Communications Security, 2012. ,
DOI : 10.1145/2382196.2382292
How to Use Bitcoin to Incentivize Correct Computations, Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security, CCS '14, 2014. ,
DOI : 10.1007/s00145-008-9036-8
Time, clocks, and the ordering of events in a distributed system, Communications of the ACM, vol.21, issue.7, 1978. ,
DOI : 10.1145/359545.359563
Certificate transparency. Queue, 2014. ,
DOI : 10.1145/2659897
Poster: Deanonymizing BitTorrent users on Tor, 7th USENIX Symposium on Network Design and Implementation (NSDI'10), 2010. ,
Alpaca, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315299
An efficient distributed PKI for structured P2P networks, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 2009. ,
DOI : 10.1109/P2P.2009.5284491
URL : https://hal.archives-ouvertes.fr/hal-00423320
Distributed credential chain discovery in trust management, Journal of Computer Security, 2003. ,
DOI : 10.1145/501983.502005
Finding the linchpins of the dark web: a study on topologically dedicated hosts on malicious web infrastructures, IEEE Symposium on Security and Privacy, 2013. ,
The impact of NAT on BitTorrent-like P2P systems, 9th International Conference on Peer-to- Peer Computing, 2009. ,
Crypto-Book, Proceedings of the Twelfth ACM Workshop on Hot Topics in Networks, HotNets-XII, p.14, 2013. ,
DOI : 10.1145/2535771.2535798
Scalable onion routing with torsk, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009. ,
DOI : 10.1145/1653662.1653733
CONIKS: bringing key transparency to end users, 24th USENIX Security Symposium, 2015. ,
Analyzing the vulnerability of superpeer networks against attack, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315274
Information leaks in structured peer-to-peer anonymous communication systems, 15th ACM Conference on Computer and Communications Security, 2008. ,
DOI : 10.1145/1455770.1455805
URL : http://www.freehaven.net/anonbib/cache/ccs2008:mittal.pdf
ShadowWalker, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009. ,
DOI : 10.1145/1653662.1653683
X-Vine: Secure and pseudonymous routing in DHTs using social networks, 19th Network and Distributed System Security Symposium, 2012. ,
PIR-Tor: Scalable anonymous communication using private information retrieval, 20th USENIX Security Symposium, 2011. ,
Preserving link privacy in social network based systems, 20th Network and Distributed System Security Symposium(NDSS). Internet Society, 2013. ,
Pisces: Anonymous communication using social networks, 20th Network and Distributed System Security Symposium, 2013. ,
DNS prefetching and its privacy implications: When good things go bad, 3rd USENIX Workshop on Large-Scale Exploits and Emergent Threats, 2010. ,
Metrics for Security and Performance in Low-Latency Anonymity Systems, 8th Privacy Enhancing Technologies Symposium, 2008. ,
DOI : 10.1007/978-3-540-70630-4_8
Sampled Traffic Analysis by Internet-Exchange-Level Adversaries, 7th International Symposium on Privacy Enhancing Technologies, 2007. ,
DOI : 10.1007/978-3-540-75551-7_11
Bitcoin: A peer-to-peer electronic cash system, 2008. ,
Salsa, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006. ,
DOI : 10.1145/1180405.1180409
De-anonymizing Social Networks, 2009 30th IEEE Symposium on Security and Privacy, 2009. ,
DOI : 10.1109/SP.2009.22
URL : http://arxiv.org/pdf/0903.3276
A critical look at decentralized personal data architectures. arXiv preprint arXiv, pp.1202-4503, 2012. ,
Socially-aware distributed hash tables for decentralized online social networks, 2015 IEEE International Conference on Peer-to-Peer Computing (P2P), 2015. ,
DOI : 10.1109/P2P.2015.7328524
URL : http://arxiv.org/pdf/1508.05591
Cachet, Proceedings of the 8th international conference on Emerging networking experiments and technologies, CoNEXT '12, 2012. ,
DOI : 10.1145/2413176.2413215
Peer-to-Peer: Harnessing the power of disruptive technologies, 2001. ,
Distributed Detection of Node Replication Attacks in Sensor Networks, 2005 IEEE Symposium on Security and Privacy (S&P'05), 2005. ,
DOI : 10.1109/SP.2005.8
A survey on decentralized Online Social Networks, Computer Networks, vol.75, 2014. ,
DOI : 10.1016/j.comnet.2014.10.005
Anonymity, unlinkability, unobservability, pseudonymity, and identity management ? a consolidated proposal for terminology, 2005. ,
DOI : 10.1007/3-540-44702-4_1
TRIBLER: a social-based peer-to-peer system, 5th International workshop on Peer-To-Peer Systems (IPTPS), 2006. ,
DOI : 10.1007/11549468_125
Distributed privacypreserving transparency logging, 12th ACM Workshop on Privacy in the Electronic Society, p.2013 ,
DOI : 10.1145/2517840.2517847
On the effectiveness of distributed worm monitoring, 14th USENIX Security Symposium, 2005. ,
Revocation games in ephemeral networks, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, 2008. ,
DOI : 10.1145/1455770.1455797
Crowds: anonymity for Web transactions, ACM Transactions on Information and System Security, vol.1, issue.1, 1998. ,
DOI : 10.1145/290163.290168
A border gateway protocol 4 (BGP-4), 2005. ,
DOI : 10.17487/rfc1771
URL : http://ietfreport.isoc.org/rfc/PDF/rfc-pdf/rfc1105.pdf
Sdsi-a simple distributed security infrastructure. Crypto, 1996. ,
Robust computational secret sharing and a unified account of classical secret-sharing goals, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315268
SoK: P2PWNED - Modeling and Evaluating the Resilience of Peer-to-Peer Botnets, 2013 IEEE Symposium on Security and Privacy, 2013. ,
DOI : 10.1109/SP.2013.17
Design and verification of secure systems, 1981. ,
DOI : 10.1145/800216.806586
URL : http://www.csl.sri.com/users/rushby/papers/sosp81.ps.gz
Privacy by Design, Identity in the Information Society, vol.3, issue.2, pp.267-274, 2010. ,
DOI : 10.1007/s12394-010-0055-x
On the limits of privacy in reputation systems, Proceedings of the 10th annual ACM workshop on Privacy in the electronic society, WPES '11, 2011. ,
DOI : 10.1145/2046556.2046561
Automated Verification of Group Key Agreement Protocols, 2014 IEEE Symposium on Security and Privacy, 2014. ,
DOI : 10.1109/SP.2014.19
Tahoe-LAFS Distributed Storage Service in Community Network Clouds, 2014 IEEE Fourth International Conference on Big Data and Cloud Computing, pp.17-24, 2014. ,
DOI : 10.1109/BDCloud.2014.24
PrPl, Proceedings of the 1st ACM Workshop on Mobile Cloud Computing & Services Social Networks and Beyond, MCS '10, 2010. ,
DOI : 10.1145/1810931.1810939
How to share a secret, Communications of the ACM, vol.22, issue.11, 1979. ,
DOI : 10.1145/359168.359176
SuperNova: Super-peers based architecture for decentralized online social networks, 2012 Fourth International Conference on Communication Systems and Networks (COMSNETS 2012), 2012. ,
DOI : 10.1109/COMSNETS.2012.6151349
URL : http://arxiv.org/pdf/1105.0074.pdf
Scalable Link-Based Relay Selection for Anonymous Routing, 9th Privacy Enhancing Technologies Symposium, 2009. ,
DOI : 10.1007/978-3-642-03168-7_5
URL : https://repository.upenn.edu/cgi/viewcontent.cgi?article=1446&context=cis_papers
A tune-up for Tor: Improving security and performance in the tor network, 15th Network and Distributed System Security Symposium, 2008. ,
LEAP: A next-generation client VPN and encrypted email provider Multi-cloud oblivious storage, International Conference on Cryptology and Network Security ACM SIGSAC Conference on Computer and Communications Security, pp.176-191, 2013. ,
DOI : 10.1007/978-3-319-48965-0_11
Chord: A scalable peer-to-peer lookup service for Internet applications, SIGCOMM, 2001. ,
DOI : 10.1109/tnet.2002.808407
POTSHARDS: secure long-term storage without encryption, 2007. ,
Efficient bandwidth estimation for peer-to-peer systems, 2011 IEEE International Conference on Peer-to-Peer Computing, 2011. ,
DOI : 10.1109/P2P.2011.6038656
Anonymous connections and onion routing, Proceedings. 1997 IEEE Symposium on Security and Privacy (Cat. No.97CB36097), 1997. ,
DOI : 10.1109/SECPRI.1997.601314
URL : http://www.csl.mtu.edu/cs6461/www/Reading/08/Reed-jsac98.pdf
Taxable anonymous libre electronic reserve. https: //taler, Last accessed, 2017. ,
An improved algorithm for tor circuit scheduling, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010. ,
DOI : 10.1145/1866307.1866345
URL : http://www.cypherpunks.ca/%7Eiang/pubs/ewma-ccs.pdf
Hashing it out in public, Proceedings of the 8th ACM workshop on Privacy in the electronic society, WPES '09, 2009. ,
DOI : 10.1145/1655188.1655199
Blacklistable anonymous credentials, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315256
PEREA, Proceedings of the 15th ACM conference on Computer and communications security, CCS '08, 2008. ,
DOI : 10.1145/1455770.1455813
Nymble: Blocking Misbehaving Users in Anonymizing Networks, IEEE Transactions on Dependable and Secure Computing, vol.8, issue.2, 2011. ,
DOI : 10.1109/TDSC.2009.38
Membership-concealing overlay networks, Proceedings of the 16th ACM conference on Computer and communications security, CCS '09, 2009. ,
DOI : 10.1145/1653662.1653709
Inferring mechanics of web censorship around the world, 2nd USENIX Workshop on Free and Open Communications on the Internet, 2012. ,
An empirical evaluation of relay selection in Tor, 20th Network and Distributed System Security Symposium, 2013. ,
Automatic transport selection and resource allocation for resilient communication in decentralised networks, 14-th IEEE International Conference on Peer-to-Peer Computing, 2014. ,
DOI : 10.1109/P2P.2014.6934301
A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System, 13th International Conference on Cryptology and Network Security, 2014. ,
DOI : 10.1007/978-3-319-12280-9_9
Tangler, Proceedings of the 8th ACM conference on Computer and Communications Security , CCS '01, 2001. ,
DOI : 10.1145/501983.502002
Publius: A robust, tamper-evident, censorship-resistant, and sourceanonymous web publishing system, 9th USENIX Security Symposium, 2000. ,
Measuring large-scale distributed systems: case of BitTorrent Mainline DHT, IEEE P2P 2013 Proceedings, 2013. ,
DOI : 10.1109/P2P.2013.6688697
rBridge: User reputation based Tor bridge distribution with privacy preservation, 20th Network and Distributed System Security Symposium, 2013. ,
In search of an anonymous and secure lookup, Proceedings of the 17th ACM conference on Computer and communications security, CCS '10, 2010. ,
DOI : 10.1145/1866307.1866343
Tracking anonymous peer-to-peer VoIP calls on the internet, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005. ,
DOI : 10.1145/1102120.1102133
Experiences deploying a large-scale emergent network, International Workshop on Peer-to- Peer Systems, pp.104-110, 2002. ,
PeerAccess, Proceedings of the 12th ACM conference on Computer and communications security , CCS '05, 2005. ,
DOI : 10.1145/1102120.1102144
Authentication in the Taos operating system, ACM Transactions on Computer Systems, vol.12, issue.1, pp.3-32, 1994. ,
DOI : 10.1145/174613.174614
Authentication in the Taos operating system, 14th ACM Symposium on Operating System Principles, 1993. ,
Defeating Vanish with low-cost sybil attacks against large DHTs, Network and Distributed System Security Symposium, 2010. ,
Dissent in numbers: Making strong anonymity scale, 10th USENIX Symposium on Operating Systems Design and Implementation, 2012. ,
An analysis of the degradation of anonymous protocols, Network and Distributed System Security Symposium, 2002. ,
The predecessor attack, ACM Transactions on Information and System Security, vol.7, issue.4, 2004. ,
DOI : 10.1145/1042031.1042032
Survivable information storage systems, Computer, vol.33, issue.8, 2000. ,
DOI : 10.1109/2.863969
URL : http://www.pdl.cs.cmu.edu/PDL-FTP/Storage/PASIS.pdf
The Peer to Peer Search Engine, 2017. ,
PPay, Proceedings of the 10th ACM conference on Computer and communication security , CCS '03, 2003. ,
DOI : 10.1145/948109.948150
Practical Robust Communication in DHTs Tolerating a Byzantine Adversary, 2010 IEEE 30th International Conference on Distributed Computing Systems, 2010. ,
DOI : 10.1109/ICDCS.2010.31
URL : http://www.cacr.math.uwaterloo.ca/techreports/2009/cacr2009-31.pdf
Sybil- Limit: A near-optimal social network defense against Sybil attacks, IEEE/ACM Trans. Netw, 2010. ,
DOI : 10.1109/sp.2008.13
URL : http://www.comp.nus.edu.sg/~yuhf/yuh-sybillimit.pdf
DCast, Proceedings of the 2012 ACM conference on Computer and communications security, CCS '12, 2012. ,
DOI : 10.1145/2382196.2382256
On the accuracy of decentralized virtual coordinate systems in adversarial networks, Proceedings of the 14th ACM conference on Computer and communications security , CCS '07, 2007. ,
DOI : 10.1145/1315245.1315273
Sorcery: Could we make P2P content sharing systems robust to deceivers?, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing, 2009. ,
DOI : 10.1109/P2P.2009.5284532
Anonrep: Towards tracking-resistant anonymous reputation, 13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16), pp.583-596, 2016. ,
SCION: Scalability, control, and isolation on next-generation networks, IEEE Symposium on Security and Privacy, 2011. ,
DOI : 10.1109/sp.2011.45
Providing witness anonymity in peer-to-peer systems, Proceedings of the 13th ACM conference on Computer and communications security , CCS '06, 2006. ,
DOI : 10.1145/1180405.1180408
LEAP+: Efficient security mechanisms for large-scale distributed sensor networks, Jajodia, 2006. ,
Enigma: Decentralized computation platform with guaranteed privacy, 1506. ,