Peer-to-Peer Anonymous Networking Using Coding (original) (raw)

On the Integrity of Network Coding-Based Anonymous P2P File Sharing Networks

Alessio Merlo

2010 Ninth IEEE International Symposium on Network Computing and Applications, 2010

View PDFchevron_right

Anonymous routing in structured peer-to-peer overlays

Nikita Borisov

2005

View PDFchevron_right

Anonymous and secure network coding scheme

Oksana Trushina

View PDFchevron_right

Peeriod: An Anonymous Approach for Decentralized Overlay Networks

Jörn Röder

Peeriod: An Anonymous Approach for Decentralized Overlay Networks, 2014

View PDFchevron_right

An Effective Privacy-Preserving Data Coding in Peer-To-Peer Network

Leila Bahri

International journal of Computer Networks & Communications, 2018

View PDFchevron_right

Slicing the Onion: Anonymous Routing Without PKI

Katty LC

View PDFchevron_right

Anonymity in Structured Peer-to-Peer Networks

Nikita Borisov

2003

View PDFchevron_right

Anonymous Communication with Network Coding against Traffic Analysis Attack

Jin Wang

View PDFchevron_right

Tarzan: A peer-to-peer anonymizing network layer

durga prasad

Proceedings of the 9th ACM conference on …, 2002

View PDFchevron_right

Dynamic Multipath Onion Routing in Anonymous Peer-To-Peer Overlay Networks

Georg Carle

IEEE GLOBECOM 2007-2007 IEEE Global Telecommunications Conference, 2007

View PDFchevron_right

ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies

Nikita Borisov

Proceedings of the 16th ACM conference on …, 2009

View PDFchevron_right

A k -anonymous communication protocol for overlay networks

Douglas Reeves

Proceedings of the 2nd ACM symposium on Information, computer and communications security - ASIACCS '07, 2007

View PDFchevron_right

ANOC: Anonymous Network-Coding-Based Communication with Efficient Cooperation

John C.S. Lui

IEEE Journal on Selected Areas in Communications, 2012

View PDFchevron_right

Weak data secrecy via obfuscation in network coding based content distribution

Bruno Crispo

Wireless Days, 2008. …, 2008

View PDFchevron_right

Network Coding Combined with Onion Routing for Anonymous and Secure Communication in a Wireless Mesh Network

abhinav prakash

International journal of Computer Networks & Communications, 2014

View PDFchevron_right

Merging the information theoretic and cryptographic approaches to Network Coding

Aditya Khosla

stanford.edu

View PDFchevron_right

Information leaks in structured peer-to-peer anonymous communication systems

Nikita Borisov

ACM Transactions on Information and System Security, 2012

View PDFchevron_right

On the Security and Efficiency of Content Distribution via Network Coding

John C.S. Lui

IEEE Transactions on Dependable and Secure Computing, 2012

View PDFchevron_right

Design and analysis of anonymous communications for emerging applications

Souvik Ray

View PDFchevron_right

Rumor Riding: An Anonymity Approach for Decentralized Peer to Peer Systems

rizwan akhtar

Wireless Personal Communications, 2014

View PDFchevron_right

Anonymous Communications in Computer Networks

juan cano

2009

View PDFchevron_right

Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security

Juan Pablo Timpanaro

Proceedings of the 1st International Conference on Information Systems Security and Privacy, 2015

View PDFchevron_right

Random linear network coding for peer-to-peer applications

Xiaowen Chu

IEEE Network, 2000

View PDFchevron_right

Signatures for Content Distribution with Network Coding

Fang Zhao

2007 IEEE International Symposium on Information Theory, 2007

View PDFchevron_right

An Efficient Communication System With Strong Anonymity

david lazar

2018

View PDFchevron_right

Agyaat Mutual Anonymity over Structured P2P Networks

Ling Liu

View PDFchevron_right

Scalable Anonymous Communication with Provable Security

Nikita Borisov

View PDFchevron_right

Cashmere: Resilient Anonymous Routing

Feng Zhou

2005

View PDFchevron_right

Providing witness anonymity in peer-to-peer systems

Bo Zhu

Proceedings of the 13th ACM conference on Computer and communications security - CCS '06, 2006

View PDFchevron_right

An Anonymous Overlay Routing Protocol for Uplink-Intensive Applications

Vincenzo De Angelis

arXiv (Cornell University), 2022

View PDFchevron_right

An Efficient Encryption Algorithm for P2P Networks Robust Against Man-in-the-Middle Adversary, International Journal of Computer Science Issues, Vol 9 (6), pp. 97-102, 2012.

Roohallah Rastaghi

View PDFchevron_right

Efficient Network Coding Signatures in the Standard Model

D. Catalano

Public Key Cryptography – PKC 2012, 2012

View PDFchevron_right

MIS: Malicious Nodes Identification Scheme in Network-Coding-Based Peer-to-Peer Streaming

long vu

2010 Proceedings IEEE INFOCOM, 2010

View PDFchevron_right