Highly resilient correctors for polynomials
Information Processing Letters
Randomized algorithms
Crowds: anonymity for Web transactions
ACM Transactions on Information and System Security (TISSEC)
Consistent, yet anonymous, Web access with LPWA
Communications of the ACM
A prototype implementation of archival Intermemory
Proceedings of the fourth ACM conference on Digital libraries
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Communications of the ACM
Data Structures and Algorithms
Data Structures and Algorithms
Pricing via Processing or Combatting Junk Mail
CRYPTO '92 Proceedings of the 12th Annual International Cryptology Conference on Advances in Cryptology
ACSAC '96 Proceedings of the 12th Annual Computer Security Applications Conference
Towards an Archival Intermemory
ADL '98 Proceedings of the Advances in Digital Libraries Conference
Freenet: a distributed anonymous information storage and retrieval system
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Tangler: a censorship-resistant publishing system based on document entanglements
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Wide-area cooperative storage with CFS
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Observations on game server discovery mechanisms
NetGames '02 Proceedings of the 1st workshop on Network and system support for games
Query-flood DoS attacks in gnutella
Proceedings of the 9th ACM conference on Computer and communications security
Tarzan: a peer-to-peer anonymizing network layer
Proceedings of the 9th ACM conference on Computer and communications security
The Evolving Field of Distributed Storage
IEEE Internet Computing
Protecting Free Expression Online with Freenet
IEEE Internet Computing
Anonymity and accountability in self-organizing electronic communities
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Introducing MorphMix: peer-to-peer based anonymous Internet usage with collusion detection
Proceedings of the 2002 ACM workshop on Privacy in the Electronic Society
Efficient Sharing of Encrypted Data
ACISP '02 Proceedings of the 7th Australian Conference on Information Security and Privacy
Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Self-Organizing Subsets: From Each According to His Abilities, to Each According to His Needs
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Anonymizing Censorship Resistant Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Peer to Peer: Peering into the Future
Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002]
Transaction-Based Charging in Mnemosyne: A Peer-to-Peer Steganographic Storage System
Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing
Infranet: Circumventing Web Censorship and Surveillance
Proceedings of the 11th USENIX Security Symposium
Deanonymizing Users of the SafeWeb Anonymizing Service
Proceedings of the 11th USENIX Security Symposium
Enhancing Survivability of Security Services Using Redundanc
DSN '01 Proceedings of the 2001 International Conference on Dependable Systems and Networks (formerly: FTCS)
Peer to peer: peering into the future
Advanced lectures on networking
Sharing Presence Information and Message Notification in an Ad Hoc Network
PERCOM '03 Proceedings of the First IEEE International Conference on Pervasive Computing and Communications
The Hash History Approach for Reconciling Mutual Inconsistency
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Mutual Anonymity Protocols for Hybrid Peer-to-Peer Systems
ICDCS '03 Proceedings of the 23rd International Conference on Distributed Computing Systems
Measuring and analyzing the characteristics of Napster and Gnutella hosts
Multimedia Systems
PocketLens: Toward a personal recommender system
ACM Transactions on Information Systems (TOIS)
How to achieve blocking resistance for existing systems enabling anonymous web surfing
Proceedings of the 2004 ACM workshop on Privacy in the electronic society
An Efficient Anonymity Protocol for Grid Computing
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
A Mutual Anonymous Peer-to-Peer Protocol Design
IPDPS '05 Proceedings of the 19th IEEE International Parallel and Distributed Processing Symposium (IPDPS'05) - Papers - Volume 01
Awarded Best Student Paper! - Pond: The OceanStore Prototype
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Verifiable audit trails for a versioning file system
Proceedings of the 2005 ACM workshop on Storage security and survivability
An approach for fault tolerant and secure data storage in collaborative work environments
Proceedings of the 2005 ACM workshop on Storage security and survivability
Hydra: a platform for survivable and secure data storage systems
Proceedings of the 2005 ACM workshop on Storage security and survivability
Towards a framework for connection anonymity
SAICSIT '05 Proceedings of the 2005 annual research conference of the South African institute of computer scientists and information technologists on IT research in developing countries
Utilizing node's selfishness for providing complete anonymity in peer-to-peer based grids
Multiagent and Grid Systems
Long-term threats to secure archives
Proceedings of the second ACM workshop on Storage security and survivability
Simple efficient mutual anonymity protocols for peer-to-peer network based on primitive roots
Journal of Network and Computer Applications
P2P's significance for eBusiness: towards a research agenda
Journal of Theoretical and Applied Electronic Commerce Research
Design and implementation of a secure wide-area object middleware
Computer Networks: The International Journal of Computer and Telecommunications Networking
STAR: an efficient coding scheme for correcting triple storage node failures
FAST'05 Proceedings of the 4th conference on USENIX Conference on File and Storage Technologies - Volume 4
Palimpsest: soft-capacity storage for planetary-scale services
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Tor: the second-generation onion router
SSYM'04 Proceedings of the 13th conference on USENIX Security Symposium - Volume 13
Towards a theory of data entanglement
Theoretical Computer Science
Visual detection of LSB-encoded natural image steganography
ACM Transactions on Applied Perception (TAP)
POTSHARDS: secure long-term storage without encryption
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Protecting Agent from Attack in Grid ComputingIII
SOFSEM '07 Proceedings of the 33rd conference on Current Trends in Theory and Practice of Computer Science
Proceedings of the 4th ACM international workshop on Storage security and survivability
Scalable and efficient provable data possession
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Enforcing behaviour with anonymity
Proceedings of the workshop on Applications of private and anonymous communications
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Survey on anonymity in unstructured peer-to-peer systems
Journal of Computer Science and Technology
POTSHARDS—a secure, recoverable, long-term archival storage system
ACM Transactions on Storage (TOS)
Privacy-conscious P2P data sharing scheme with bogus profile distribution
Web Intelligence and Agent Systems
On anonymity in an electronic society: A survey of anonymous communication systems
ACM Computing Surveys (CSUR)
Short Survey: Privacy-enhancing technologies for the world wide web
Computer Communications
Anonymity and Censorship Resistance in Unstructured Overlay Networks
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
A market-based approach to managing the risk of peer-to-peer transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
Privacy-enhancing technologies for the internet, II: five years later
PET'02 Proceedings of the 2nd international conference on Privacy enhancing technologies
A survey of peer-to-peer security issues
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A dynamic framework for integrated management of all types of resources in P2P systems
The Journal of Supercomputing
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Load-balanced query dissemination in privacy-aware online communities
Proceedings of the 2010 ACM SIGMOD International Conference on Management of data
Spread spectrum storage with mnemosyne
Future directions in distributed computing
Replication strategies for highly available peer-to-peer storage
Future directions in distributed computing
A security framework for a workflow-based grid development platform
Computer Standards & Interfaces
Pass it on: social networks stymie censors
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Rendezvous tunnel for anonymous publishing
Proceedings of the 17th ACM conference on Computer and communications security
Evaluating Bluetooth as a medium for botnet command and control
DIMVA'10 Proceedings of the 7th international conference on Detection of intrusions and malware, and vulnerability assessment
Conditional e-payments with transferability
Journal of Parallel and Distributed Computing
Pond: the oceanstore prototype
FAST'03 Proceedings of the 2nd USENIX conference on File and storage technologies
Rendezvous tunnel for anonymous publishing: clean slate and tor based designs
SSS'11 Proceedings of the 13th international conference on Stabilization, safety, and security of distributed systems
Review: A survey on content-centric technologies for the current Internet: CDN and P2P solutions
Computer Communications
"Mix-in-Place" anonymous networking using secure function evaluation
Proceedings of the 27th Annual Computer Security Applications Conference
Using group overlapping to protect server from attack in grid computing
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Safe and private data sharing with turtle: friends team-up and beat the system
SP'04 Proceedings of the 12th international conference on Security Protocols
Censorship resistance revisited
IH'05 Proceedings of the 7th international conference on Information Hiding
Client and server anonymity preserving in p2p networks
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
Improving sender anonymity in a structured overlay with imprecise routing
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Valet services: improving hidden servers with a personal touch
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
DSO: dependable signing overlay
ACNS'06 Proceedings of the 4th international conference on Applied Cryptography and Network Security
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
Privacy preserving web-based email
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Security and privacy issues for the network of the future
Security and Communication Networks
Review: An overview of anonymity technology usage
Computer Communications
A survey of trust in social networks
ACM Computing Surveys (CSUR)
Message in a bottle: sailing past censorship
Proceedings of the 29th Annual Computer Security Applications Conference
Hi-index | 0.00 |
We describe a system that we have designed and implemented for publishing content on the web. Our publishing scheme has the property that it is very difficult for any adversary to censor or modify the content. In addition, the identity of the publisher is protected once the content is posted. Our system differs from others in that we provide tools for updating or deleting the published content, and users can browse the content in the normal point and click manner using a standard web browser and a client-side proxy that we provide. All of our code is freely available.