Building a Scalable Bipartite P2P Overlay Network
IEEE Transactions on Parallel and Distributed Systems
Survey on anonymity in unstructured peer-to-peer systems
Journal of Computer Science and Technology
An interest-based intelligent link selection algorithm in unstructured P2P environment
ICA3PP'07 Proceedings of the 7th international conference on Algorithms and architectures for parallel processing
A practical congestion attack on tor using long paths
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Anonymity analysis of P2P anonymous communication systems
Computer Communications
PDA: Privacy-Preserving Data Aggregation for Information Collection
ACM Transactions on Sensor Networks (TOSN)
Anonymous Communication Over Invisible Mix Rings
ICA3PP'11 Proceedings of the 11th international conference on Algorithms and architectures for parallel processing - Volume Part I
Mobile cloud computing: A survey
Future Generation Computer Systems
Hi-index | 0.00 |
We present the design of a Network Forensic Alliance (NFA), to allow multiple administrative domains (ADs) to jointly locatethe origin of epidemic spreading attacks. ADs in the NFA collaborate in a distributed protocol for post-mortem analysis ofworm-like ...