diff --git a/pdf/grandpa.bib b/pdf/grandpa.bib deleted file mode 100644 index 5c157cd..0000000 --- a/pdf/grandpa.bib +++ /dev/null @@ -1,63 +0,0 @@ -@article{flp, - title={Impossibility of distributed consensus with one faulty process}, - author={Fischer, Michael J and Lynch, Nancy A and Paterson, Michael S}, - journal={Journal of the ACM (JACM)}, - volume={32}, - number={2}, - pages={374--382}, - year={1985}, - publisher={ACM}, - url={https://groups.csail.mit.edu/tds/papers/Lynch/jacm85.pdf} -} - -@article{CasperFFG, - title={Casper the friendly finality gadget}, - author={Buterin, Vitalik and Griffith, Virgil}, - journal={arXiv preprint arXiv:1710.09437}, - year={2017}, - url={https://arxiv.org/abs/1710.09437} -} - -@article{Tendermint, - title={The latest gossip on BFT consensus}, - author={Buchman, Ethan and Kwon, Jae and Milosevic, Zarko}, - journal={arXiv preprint arXiv:1807.04938}, - year={2018}, - url={https://arxiv.org/abs/1807.04938} -} - -@article{CasperCBC, - title={Casper the Friendly Ghost: A “Correct-by-Construction” Blockchain Consensus Protocol}, - author={Zamfir,Vlad}, - year={2017}, - url={https://github.com/ethereum/research/blob/master/papers/CasperTFG/CasperTFG.pdf} -} - - -@article{BitcoinBA, - title={Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin}, - author={Miller, Andrew and LaViola Jr, Joseph J}, - url={https://nakamotoinstitute.org/research/anonymous-byzantine-consensus/}, - year={2014} -} - -@inproceedings{Discoin, - title={Bitcoin meets strong consistency}, - author={Decker, Christian and Seidel, Jochen and Wattenhofer, Roger}, - booktitle={Proceedings of the 17th International Conference on Distributed Computing and Networking}, - pages={13}, - year={2016}, - organization={ACM}, - url={https://arxiv.org/abs/1412.7935} -} - -@article{SCP, - title={SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains.}, - author={Luu, Loi and Narayanan, Viswesh and Baweja, Kunal and Zheng, Chaodong and Gilbert, Seth and Saxena, Prateek}, - journal={IACR Cryptology ePrint Archive}, - volume={2015}, - pages={1168}, - year={2015}, - url={https://www.weusecoins.com/assets/pdf/library/SCP%20-%20%20A%20Computationally-Scalable%20Byzantine.pdf} -} - diff --git a/pdf/grandpa.tex b/pdf/grandpa.tex index 5ad66e5..a2a9e83 100644 --- a/pdf/grandpa.tex +++ b/pdf/grandpa.tex @@ -43,17 +43,17 @@ \section{Introduction} -Bitcoin~\cite{nakamoto09bitcoin} and its descendants~\cite{wood14ethereum,zcash} are cryptocurrencies that provide +Bitcoin~\cite{nakamoto08bitcoin} and its descendants~\cite{wood14ethereum,sasson2014zerocash} are cryptocurrencies that provide secure automated value exchange without the need for a central managing authority. In order to achieve this, they build on peer-to-peer networks where special nodes (usually called miners) collect transactions from users and run a consensus protocol in order to maintain a distributed public ledger known as the \textit{blockchain}. One of the challenges of the consensus protocols run by these systems is that they only have the property of eventual consensus - that an ever growing prefix of the chain will be agreed upon by all participants forever onward. But this eventual consensus process generally takes tens of minutes and only gives probabilistic guarantees - if we see a few blocks building on a given block, we can estimate the probability that it is final. Unfortunately these guarantees only hold if the underlying network is well-connected and the client able to find an uncensored source of information, two assumptions that -do not hold in adversarial environments~\cite{apostolaki17hijacking, gervais16tampering, hellman15eclipse}. +do not hold in adversarial environments~\cite{apostolaki16hijacking, gervais15tampering, heilman15eclipse}. The underlying problem which enables these attacks is that first generation blockchain protocols do not consider finality (i.e., when will a block never be reverted) as a first class property, prioritizing liveness instead. -New generation protocols~\cite{kokoris16enhancing,decker15bitcoin} propose the complete opposite by employing a \emph{hybrid} approach~\cite{pass16hybrid}, to block liveness when finality is not readily achievable. +New generation protocols~\cite{kokoris16enhancing,decker16bitcoin} propose the complete opposite by employing a \emph{hybrid} approach~\cite{pass16hybrid}, to block liveness when finality is not readily achievable. This can only happen if we change the existing infrastructure which has multiple shortcomings. First, these hybrid consensus protocols are exclusive which might lead to centralization, because the protocol needs to put a limit on the number of participating miners in order to achieve good performance. Second, tying consensus with liveness of the chain means that there is no optimism and blocks are committed only when all verification information are available.\xxx{Describe why this is a problem in the context of polkadot and other probabilistic protocols.} @@ -62,7 +62,7 @@ Second, tying consensus with liveness of the chain means that there is no optimi In this work we show the that the middle ground also merits exploration. We introduce the idea of lazy finality which is encapsulated in the abstraction of a \emph{finality gadget.} Separating the liveness of the consensus protocol from the finality of the blocks can have 4 concrete benefits for the overlying blockchain protocol. First, not every node that is competing to mine a block needs to be part of the finality gadget, hence we can get the \textit{best of both worlds} (i.e., full inclusive decentralization and scalable fast finality). Second we can reorganize \xxx{Al put a sentence on why this is a cool property.}. Third, a finality gadget can be deployed gradually and light clients can choose to consult it or follow the longest chain rule and ignore it, enabling light client heterogeneity. The light client that trust the gadget do not need to have the full chain or actively listen to the network. -This can in turn enable scalability~\cite{avarikioti19divide} in an ecosystem of multiple chains (weather sharding~\cite{kokoris18omniledger,zamani19rapidchain,kokoris18channels} or heterogeneous~\cite{zamyatin19sok}), where no single party receives or stores all the data in the system. +This can in turn enable scalability~\cite{avarikioti19divide} in an ecosystem of multiple chains (weather sharding~\cite{kokoris17omniledger,al18chainspace,androulaki18channels} or heterogeneous~\cite{zamyatin19sok}), where no single party receives or stores all the data in the system. Finally, the finality gadget protocol is simpler than consensus protocols since they do not require a complex and costly view change phase. @@ -70,7 +70,7 @@ More specifically, this work introduces the abstraction of a \emph{finality gadg provides provable finality guarantees instead of probabilistic. To this end we formalise the finality gadget problem and show that it is impossible to satisfy its properties with a deterministic asynchronous protocol. To circumvent this impossibility result , we introduce the GRANDPA finality gadget that works in a partially synchronous network model, in the presence f up to $1/3$ Byzantine actors. -The combination of GRANDPA with a classic block production mechanism like GHOST~\cite{xxx} results in the existing deployment of the polkadot network which provides fast finality under good network conditions and protects the clients without compromising the liveness when under attack. +The combination of GRANDPA with a classic block production mechanism like GHOST~\cite{lewenberg15inclusive} results in the existing deployment of the polkadot network which provides fast finality under good network conditions and protects the clients without compromising the liveness when under attack. In our evaluation \xxx{add results} In summary we make the following contributions: @@ -90,7 +90,7 @@ The rest of the paper is organized as follows: We want to formalise the notion of finality gadget to be a sub-protocol that can be deployed along any protocol providing with -eventual consensus and probabilistic finality and enhance with provable finality. +eventual consensus and probabilistic finality and enhancing it with provable finality. To achieve this, we need to incorporate into the classic definition of Byzantine agreement the fact that we additionally have access to a protocol that would achieve eventual consensus if we did not affect it. @@ -126,7 +126,8 @@ We say an oracle $A$ in a protocol is {\em eventually consistent} if it returns \end{definition} \paragraph{Impossibility of Deterministic Agreement with an Oracle.}\label{ssec:impossibility} -For the binary case, i.e. when $|S|=2$, the Byzantine finality gadget problem is reducible to Byzantine agreement. This does not hold for $|S| > 2$, because the definition of validity is stronger in our protocol. Note that it is impossible for multi-valued Byzantine agreement to make the validity condition require that we decide an initial value of some honest voter and tolerate more than a $1/|S|$ fraction of faults, since we may have a $1/|S|$ fraction of voters reporting each initial value and Byzantine voters can act honestly enough not to be detectable. For finality gadgets, this stronger validity condition is possible. A natural question is then weather the celebrated FLP~\cite{flp} impossibility holds for our stronger requirements. +\xxx{Al can you extend this?} +For the binary case, i.e. when $|S|=2$, the Byzantine finality gadget problem is reducible to Byzantine agreement. This does not hold for $|S| > 2$, because the definition of validity is stronger in our protocol. Note that it is impossible for multi-valued Byzantine agreement to make the validity condition require that we decide an initial value of some honest voter and tolerate more than a $1/|S|$ fraction of faults, since we may have a $1/|S|$ fraction of voters reporting each initial value and Byzantine voters can act honestly enough not to be detectable. For finality gadgets, this stronger validity condition is possible. A natural question is then weather the celebrated FLP~\cite{fischer85impossibility} impossibility holds for our stronger requirements. Next, we show that an asynchronous, deterministic binary finality gadget is impossible, even with one fault. This means that the extra information voters have here, that $A$ will eventually agree for all voters, is not enough to make this possible. @@ -139,7 +140,7 @@ We have number of voters which each have an initial $v_i$ in $\{0,1\}$ We may have one or more faulty nodes, which here means going offline at some point. Nodes have asynchronous communication - so any message arrives but we have no guarantee when it will. The goal is to have all non-faulty nodes output the same $v$, which must be $0$ if all inputs $v_i$ are $0$ and $1$ if all are $1$. -Fischer, Lynch and Paterson\cite{flp} showed that this is impossible if there is one faulty node. +Fischer, Lynch and Paterson\cite{fischer85impossibility} showed that this is impossible if there is one faulty node. The binary fault-safe finality gadget problem is similar, except now there is an oracle $A$ that any node can call at any time with the following properties: @@ -152,7 +153,7 @@ and we want that if A never switches, then all non-faulty nodes output x. If A d Then this is also impossible, even for one faulty node, which just goes offline. Note that this generalises Byzantine agreement, since if we could each node $i$ could call $A$ once at the start and use the output as $v_i$. (For the multi-valued case, we will define the problem so that this reduction does not hold.) -\begin{proof}[Proof sketch] We follow the notation of \cite{flp} and assume for a contradiction that we use a correct protocol. +\begin{proof}[Proof sketch] We follow the notation of \cite{fischer85impossibility} and assume for a contradiction that we use a correct protocol. Let $r$ be a run of the protocol where $A$ gives $0$ all the time. Then by correctness $r$ decides $0$. Now we consider what can happen when $A$ switches to $1$ after each configuration in $r$. If it switches to $1$ at the start, then the protocol decides $1$. If we switch to $1$ when all node have already decided $0$, then we decide $0$. @@ -198,7 +199,7 @@ We say that $F$ solves {\em blockchain Byzantine finality gadget problem} if for \xxx{Lef I do not understand the paragraph below, clarify.} -As an example, we could assume $F$ uses proof of work to build on the longest chain and includes the last block $G$ finalised. Then we take $A(v,s_v,B)$ as being the longest chain which includes $B$ and which $v$ sees in state $s_v$. It is well-known \cite{bitcoinpapers} that longest chain with proof of work achieves eventual consensus under the right assumptions and similar arguments show that in this case we have conditional eventual consensus. +As an example, we could assume $F$ uses proof of work to build on the longest chain and includes the last block $G$ finalised. Then we take $A(v,s_v,B)$ as being the longest chain which includes $B$ and which $v$ sees in state $s_v$. It is well-known \cite{nakamoto08bitcoin} that longest chain with proof of work achieves eventual consensus under the right assumptions and similar arguments show that in this case we have conditional eventual consensus. As long as we do not change the chain we are building on by finalising another block, we will eventually agree on some prefix longer than the last finalised block. Thus, any finality gadget that satisfies Definition \ref{def:finality-gadget} will work in this system so that all honest voters finalise an increasingly long common chain. Thanks to the abstraction above, we can switch $F$ for one of many possible alternative consensus algorithms and $G$ will still work. @@ -271,7 +272,7 @@ A vote $v$ for a block $B$ by a voter $V$ is a message signed by $V$ containing A voter equivocates in a set of votes $S$ if they have cast multiple different votes in $S$. We call a set $S$ of votes safe if the number of voters who equivocate in $S$ is at most $f$. We say that $S$ has a supermajority for a block $B$ if the set of voters who either have a vote for blocks $\geq B$ or equivocate in $S$ has size at least $(n+f+1)/2$. We count equivocations as votes for everything so that observing a vote is monotonic, meaning that if $S \subset T$ then if $S$ has a supermajority for $B$ so does $T$, while being able to ignore yet more equivocating votes from an equivocating voter. -For our finality gadget (GRANDPA) we use the ghost~\cite{ghost} eventual consensus algorithm as $F$. +For our finality gadget (GRANDPA) we use the ghost~\cite{lewenberg15inclusive} eventual consensus algorithm as $F$. The $2/3$-GHOST function $g(S)$ takes a set $S$ of votes and returns the block $B$ with highest block number such that $S$ has a supermajority for $B$. If there is no such block, then it returns `nil`. \com{(if $f \neq \lfloor (n-1)/3 \rfloor$, then this is a misnomer and we may change the name of the function accordingly.)} Note that, if $S$ is safe, then we can compute $g(S)$ by starting at the genesis block and iteratively looking for a child of our current block with a supermajority, which must be unique if it exists. Thus we have: @@ -328,7 +329,7 @@ consensus protocols that solve the stronger problem as described in the previous Instead, only the finalization stops, but the blocks keep getting created and propagated to everyone. This means that when the conditions are safe again, the finality gadget only needs to finalize the head of the chain\footnote{Which the oracle will return quickly to a supermajority of miner}, instead of having to transmit and run consensus on every block. -In Figure~\ref{fig:finality}, we analyze the differences between classic blockchain protocols~\cite{bitcoin,ethereum}, finality gadget, and hybrid consensus solutions~\cite{byzcoin,hybrid,algorand} +In Figure~\ref{fig:finality}, we analyze the differences between classic blockchain protocols~\cite{nakamoto08bitcoin,wood14ethereum}, finality gadget, and hybrid consensus solutions~\cite{kokoris16enhancing,gilad17algorand} \xxx{Experiment: Catchup 100s of blocks Hotstuff vs GRANDPA}. @@ -336,7 +337,7 @@ In Figure~\ref{fig:finality}, we analyze the differences between classic blockch \subsection{The GRANDPA Protocol}\label{sec:grandpa} -In this section, we give our solution to the Byzantine finality gadget problem, GRANDPA. Our finality gadget works the partially synchronous setting, we also provide a fully asynchronous solution in Appendix~{app:async}. +In this section, we give our solution to the Byzantine finality gadget problem, GRANDPA. Our finality gadget works the partially synchronous setting, we also provide a fully asynchronous solution in Appendix~\ref{app:async}. GRANDPA works in rounds, each round has a set of $3f+1$ eligible voters, $2f+1$ of which are assumed honest. Furthermore, we assume that each round has a participant designated as primary and all participants agree on the voter sets and primary. We will can either choose the primary pseudorandomly from or rotate through the voter set. On a high-level, each round consists of a double-echo protocol after which every party waits in order to detect whether we can finalize a block in this round (this block does not need to be the immediate ancestor of the last finalized block, it might be far ahead from the last finalized block). If the round is unsuccessful, the parties simply move on to the next round with a new primary. When a good primary is selected, the oracle is consistent (returns the same value to all honest parties), @@ -879,6 +880,6 @@ Crucially note that $h$ depends only on $S$, which is determined when $4f+1$ vot \end{proof} } -\bibliography{grandpa} +\bibliography{net,os,sec,soc,theory} \end{document} diff --git a/pdf/net.bib b/pdf/net.bib new file mode 100644 index 0000000..82ff732 --- /dev/null +++ b/pdf/net.bib @@ -0,0 +1,5040 @@ + +%A + +@inproceedings{ abbott07browser, + author = {Timothy G. Abbott and Katherine J. Lai and + Michael R. Lieberman and Eric C. Price}, + title = {Browser-Based Attacks on {Tor}}, + booktitle = {\bibconf{PETS}{Privacy Enhancing Technologies}}, + year = 2007, +} + + + +@inproceedings{abu-libdeh10symbiotic, + author = {Hussam Abu-Libdeh and + Paolo Costa and + Antony I. T. Rowstron and + Greg O'Shea and + Austin Donnelly}, + title = {Symbiotic Routing in Future Data Centers}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {New Delhi, India}, + month = aug, + year = 2010 +} + +@misc{hearn15rapidly, + title={\href{https://en.bitcoin.it/wiki/Contract}{Rapidly-adjusted (micro)payments to a pre-determined party}}, + author={Hearn, Mike and Spilman, J}, + year={2015}, + url={https://en.bitcoin.it/wiki/Contract}, +} + +@article{back14enabling, + title={\href{https://blockstream.com/sidechains.pdf}{Enabling Blockchain Innovations with Pegged Sidechains}}, + author={Adam Back and Matt Corallo and Luke Dashjr and + Mark Friedenbach and Gregory Maxwell and + Andrew Miller and Andrew Poelstra and + Jorge Tim\'on and Pieter Wuille}, + month=oct, + year=2014, + url={https://blockstream.com/sidechains.pdf}, +} + +@misc{poon15bitcoin, + title={\href{https://lightning.network/lightning-network-paper.pdf}{The {Bitcoin} Lightning Network: Scalable Off-Chain Instant Payments}}, + author={Poon, Joseph and Dryja, Thaddeus}, + month=jan, + year={2016}, + url={https://lightning.network/lightning-network-paper.pdf}, +} + +@incollection{decker15fast, + title={\href{http://www.tik.ee.ethz.ch/file/716b955c130e6c703fac336ea17b1670/duplex-micropayment-channels.pdf}{A Fast and Scalable Payment Network with {Bitcoin} Duplex + Micropayment Channels}}, + author={Decker, Christian and Wattenhofer, Roger}, + booktitle={Stabilization, Safety, and Security of Distributed Systems}, + pages={3--18}, + month=aug, + year={2015}, + publisher={Springer}, + url={http://www.tik.ee.ethz.ch/file/716b955c130e6c703fac336ea17b1670/duplex-micropayment-channels.pdf}, +} + +.. note = {Adviser-Rivest, Ronald L.}, .. +@phdthesis{adida06advances, + author = {Adida, Ben}, + title = {Advances in cryptographic voting systems}, + year = {2006}, + order_no = {AAI0810143}, + publisher = {Massachusetts Institute of Technology}, + school = {Massachusetts Institute of Technology}, + address = {Cambridge, MA, USA}, +} + +@inproceedings{ ahn03kanonymous, + author = {Ahn, Luis von and Bortz, Andrew and Hopper, Nicholas J.}, + title = {$k$-Anonymous Message Transmission}, + booktitle = {\bibconf[10th]{CCS}{ACM conference on + Computer and Communications Security}}, + year = {2003}, +} + +@article{ aiello04jfk, + author = {William Aiello and others}, + title = {Just Fast Keying: Key Agreement In A Hostile {Internet}}, + journal = {\bibconf{TISSEC}{ACM Transactions on Information and + System Security}}, + month = may, + Year = "2004", +} + +@inproceedings{aggrawal10private, + author = {Gaurav Aggrawal and Elie Bursztein and Collin Jackson and Dan Boneh}, + title = {An analysis of private browsing modes in modern browsers}, + year = 2010, + booktitle = {Usenix Security Symposium} +} + +@misc{akamai, + title = {Akamai Technologies}, + note = {\url{http://www.akamai.com}}, +} + +@misc{fullnodes, + author = {Bitnodes}, + title = {\href{https://bitnodes.21.co/nodes/}{Bitcoin Network Snapshot}}, + year = {2017}, + month = {April} +} + + + +@misc{ alexa, + key = {Alexa}, + title = {Alexa Top 500 Global Sites}, + note = {\url{http://www.alexa.com/topsites}}, + month = {April}, + year = {2012} +} + +@InProceedings{alimi08shadow, + author = {Richard Alimi and Ye Wang and Y. Richard Yang}, + title = {Shadow Configuration as a Network Management Primitive}, + booktitle = {ACM SIGCOMM}, + month = Aug, + year = 2008, + address = {Seattle, WA}, +} + +@incollection{ alsabah11defenstrator, + author = {AlSabah, Mashael and Bauer, Kevin and Goldberg, Ian and Grunwald, Dirk and McCoy, Damon and Savage, Stefan and Voelker, Geoffrey}, + booktitle = {\bibconf[11th]{PETS}{Privacy Enhancing Technologies}}, + title = {{DefenestraTor}: Throwing out Windows in {Tor}}, + month = jul, + year = 2011, + location = {Waterloo, Canada}, +} + +@misc{ android, + title = {{Android SDK}}, + note = {\url{http://developer.android.com/guide/basics/what-is-android.html}}, +} + +@inproceedings{ au06short, + author = {Man Ho Au and Sherman S.M. Chow and Willy Susilo and + Patrick P. Tsang}, + title = {Short Linkable Ring Signatures Revisited}, + booktitle = {\bibconf{EuroPKI}{European Public Key Infrastructure + Workshop}}, + month = jun, + year = 2006, + location = {Torino, Italy}, +} + +%B + +@inproceedings{bahl07highly, + author = {Paramvir Bahl and + Ranveer Chandra and + Albert G. Greenberg and + Srikanth Kandula and + David A. Maltz and + Ming Zhang}, + title = {Towards Highly Reliable Enterprise Network Services Via + Inference of Multi-level Dependencies}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Kyoto, Japan}, + month = aug, + year = 2007 +} + +@book{ basagni13mobile, + editor = {Stefano Basagni and Marco Conti and Silvia Giordano and + Ivan Stojmenovic}, + title = {Mobile Ad Hoc Networking: Cutting Edge Directions}, + edition = {2nd}, + month = mar, + year = 2013, + publisher = {Wiley-IEEE Press}, + isbn = {978-1118087282}, +} + +@misc{ basescu14crux, + author = {Cristina Basescu and Michael F. Nowlan and Kirill Nikitin + and Jose M. Faleiro and Bryan Ford}, + title = {\href{https://arxiv.org/abs/1405.0637}{Crux: Locality-Preserving Distributed Services}}, + month = may, + year = 2014, +} + +@inproceedings{ baset06analysis, + author = {Salman A. Baset and Henning Schulzrinne}, + title = {An Analysis of the {Skype} Peer-to-Peer + {Internet} Telephony Protocol}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = apr, + year = 2006, +} + +@inproceedings{ bauer07low, + author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and + Tadayoshi Kohno and Douglas Sicker}, + title = {Low-Resource Routing Attacks Against {Tor}}, + booktitle = {\bibconf[6th]{WPES}{Workshop on Privacy in the + Electronic Society}}, + month = oct, + year = 2007, +} + +@incollection{ bellare98relations, + author = {Bellare, Mihir and Desai, Anand and Pointcheval, David and Rogaway, Phillip}, + title = {Relations among notions of security for public-key encryption schemes}, + booktitle = {Advances in Cryptology — CRYPTO '98}, + series = {Lecture Notes in Computer Science}, + publisher = {Springer Berlin / Heidelberg}, +} + +@inproceedings { bennett03gap, + author = {Krista Bennett and Christian Grothoff}, + title = {{GAP} -- Practical Anonymous Networking}, + booktitle = {\bibconf{PET}{Workshop on Privacy Enhancing Technologies}}, + month = mar, + year = {2003}, + location = {Dresden, Germany} +} + + + +@article{ benslimane08Services, + author = {Djamal Benslimane and Schahram Dustdar and Amit Sheth}, + title = {Services Mashups: The New Generation of Web Applications}, + journal = {IEEE Internet Computing}, + month = may, + year = 2008, + volume = 12, + number = 5, +} + +@inproceedings{benson10network, + author = {Theophilus Benson and + Aditya Akella and + David A. Maltz}, + title = {Network traffic characteristics of data centers in the + wild}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + location = {Melbourne, Australia}, + month = nov, + year = 2010 +} + +@article{ beresford03location, + author={Beresford, A.R. and Stajano, F.}, + journal={{IEEE} Pervasive Computing}, + title={Location privacy in pervasive computing}, + year={2003}, +} + + +@inproceedings{ berthold01disadvantages, + author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke}, + title = {The Disadvantages of Free {MIX} Routes + and How to Overcome Them}, + booktitle = {Workshop on Design Issues in + Anonymity and Unobservability}, + month = jul, + year = 2000, + location = {Berkeley, CA, USA}, +} + +@inproceedings{ bilge09contacts, + author = {Leyla Bilge and Thorsten Strufe and Davide Balzarotti and Engin Kirda}, + title = {All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks}, + booktitle = {18th International World Wide Web Conference}, + month = {April}, + year = {2009}, + url = {http://www2009.eprints.org/56/} +} + + + +@inproceedings{ bohli06deniable, + author = {Jens-Matthias Bohli and Rainer Steinwandt}, + title = {Deniable Group Key Agreement}, + booktitle = {\bibconf{Vietcrypt}{First International Conference on + Cryptology in Vietnam}}, + month = sep, + year = 2006, + location = {Hanoi, Vietnam}, +} + +@inproceedings{borisov04offtherecord, + author = {Borisov, Nikita and Goldberg, Ian and Brewer, Eric}, + title = {Off-the-record communication, or, why not to use {PGP}}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the + Electronic Society}}, + month = oct, + year = {2004}, + location = {Washington DC, USA}, + isbn = {1-58113-968-3}, + doi = {http://doi.acm.org/10.1145/1029179.1029200}, +} +% publisher = {ACM}, +% address = {New York, NY, USA}, + +@inproceedings{ borisov07denial, + author = {Borisov, Nikita and Danezis, George and Mittal, Prateek + and Tabriz, Parisa}, + title = {Denial of Service or Denial of Security? + {How} Attacks on Reliability can Compromise Anonymity}, + booktitle = {\bibconf[14th]{CCS}{Conference on Computer and Communications Security}}, + month = oct, + year = 2007, +} + +@article{ bray05dispute, + author = {Hiawatha Bray}, + title = {Dispute threatens to snarl {Internet}}, + journal = {Boston Globe}, + month = oct, + day = 7, + year = 2005, +} + +@inproceedings{ brickell06efficient, + author = {Justin Brickell and Vitaly Shmatikov}, + title = {Efficient Anonymity-Preserving Data Collection}, + booktitle = {\bibconf[12th]{KDD}{ACM SIGKDD International Conference + on Knowledge Discovery and Data Mining}}, + month = aug, + year = 2006, + location = {Philadelphia, PA}, +} + +@article{brosh10delay, + author = {Eli Brosh and + Salman Abdul Baset and + Vishal Misra and + Dan Rubenstein and + Henning Schulzrinne}, + title = {The Delay-Friendliness of {TCP} for Real-Time Traffic}, + journal = {IEEE Transactions on Networking}, + year = {2010}, + ee = {http://dx.doi.org/10.1109/TNET.2010.2050780}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + +%C + +@article{ carbone10dummynet, + author = {M. Carbone and L. Rizzo}, + title = "{Dummynet Revisited}", + journal = "{ACM CCR}", + volume = 40, + number = 2, + month = apr, + year = 2010, +} + +@techreport{cooper08X509, + author = {Cooper, D. and Santesson, S. and Farrell, S. and Boeyen, S. and Housley, R. and Polk, W.}, + month = may, + title = {{RFC 5280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile}}, + url = {http://tools.ietf.org/html/rfc5280}, + year = {2008} +} + + + +@inproceedings{ cardoso07bandwidth, + author = {Jaime S. Cardoso}, + title = {Bandwidth-efficient byte stuffing}, + booktitle = {IEEE ICC 2007}, + year = 2007, +} + +@inproceedings{castro03splitstream, + title={\href{http://research.microsoft.com/en-us/um/people/antr/PAST/SplitStream-sosp.pdf}{{SplitStream}: high-bandwidth multicast in cooperative environments}}, + author={Castro, Miguel and Druschel, Peter and Kermarrec, Anne-Marie and Nandi, Animesh and Rowstron, Antony and Singh, Atul}, + booktitle={\bibconf{SOSP}{ACM Symposium on Operating Systems Principles}}, + year={2003}, + url={http://research.microsoft.com/en-us/um/people/antr/PAST/SplitStream-sosp.pdf}, +} + +@article{castro02practical, + title={Practical Byzantine fault tolerance and proactive recovery}, + author={Castro, Miguel and Liskov, Barbara}, + journal={ACM Transactions on Computer Systems (TOCS)}, + year={2002}, +} + + +@article{ chase07simulable, + author = {Melissa Chase and Anna Lysyanskaya}, + title = {Simulatable {VRFs} with applications to multi-theorem {NIZK}}, + booktitle = {CRYPTO}, + location = {Santa Barbara, CA}, + month = aug, + year = 2007, +} + +@article{ chaum81untraceable, + author = {Chaum, David}, + title = {\href{https://dl.acm.org/doi/10.1145/358549.358563}{Untraceable + Electronic Mail, Return Addresses, and Digital Pseudonyms}}, + journal = {Communications of the {ACM}}, + volume = {24}, + issue = {2}, + year = {1981}, + month = {February}, +} + +@article{ chaum88dining, + author = {Chaum, David}, + title = {The {Dining Cryptographers} problem: + Unconditional sender and recipient untraceability}, + journal = {Journal of Cryptology}, + month = jan, + year = 1988, +} + +@inproceedings{ chakravarty08identifying, + author = {Sambuddho Chakravarty and Angelos Stavrou and + Angelos D. Keromytis}, + title = {Identifying Proxy Nodes in a {Tor} Anonymization Circuit}, + booktitle = {\bibconf{SITIS}{Signal Image Technology + and Internet Based Systems}}, + month = nov, + year = 2008, + location = {Bali, Indonesia}, +} + +@inproceedings{chen04path, + author = {Mike Y. Chen and + Anthony Accardi and + Emre Kiciman and + David A. Patterson and + Armando Fox and + Eric A. Brewer}, + title = {Path-Based Failure and Evolution Management}, + booktitle = {\bibconf[1st]{NSDI}{USENIX Symposium on Networked System + Design and Implementation}}, + location = {San Francisco, CA}, + month = mar, + year = 2004 +} + +@inproceedings{ cheng12making, + author = {Cheng Li and Daniel Porto and Allen Clement and + Johannes Gehrke and Nuno Preguica and Rodrigo Rodrigues}, + title = {Making Geo-Replicated Systems Fast as Possible, + Consistent when Necessary}, + booktitle = {\bibconf[10th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}}, + month = oct, + year = 2012, +} + +@inproceedings{ cheshire97consistent, + author = {Stuart Cheshire and Mary Baker}, + title = "{Consistent Overhead Byte Stuffing}", + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = sep, + year = 1997 +} + +@article{ chlamtac03mobile, + author = {Imrich Chlamtac and Marco Conti and {Jennifer J.-N.} Liu}, + title = {\href{https://www.sciencedirect.com/science/article/abs/pii/S1570870503000131}{Mobile ad hoc networking: imperatives and challenges}}, + journal = {Ad Hoc Networks}, + volume = 1, + number = 1, + month = jul, + year = 2003, + pages = {13-64}, +} + +@inproceedings{choudhury11firehose, + author = {Munmun de Choudhury and Scott Counts and Czerwinski}, + month = {July}, + publisher = {\bibconf{ICWSM}{International AAAI Conference on Weblogs and Social Media}}, + title = {Find Me the Right Content! Diversity-based Sampling of Social Media Content for + Topic-centric Search.}, + year = {2011}, +} + +@inproceedings{chuanxiong08dcell, + author = {Chuanxiong Guo and + Haitao Wu and + Kun Tan and + Lei Shi and + Yongguang Zhang and + Songwu Lu}, + title = {{DCell}: {A} Scalable and Fault-tolerant Network + Structure for Data Centers}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Seattle, WA}, + month = aug, + year = 2008 +} + +@inproceedings{ chun03planetlab, + author = {Brent Chun and others}, + title = {{PlanetLab}: An Overlay Testbed for Broad-Coverage Services}, + booktitle = {ACM \bibbrev{CCR}{Computer Communications Review}}, + month = jul, + year = 2003, +} + +@inproceedings{ clarke00freenet, + author = {Ian Clarke and Oskar Sandberg and Brandon Wiley + and Theodore W. Hong}, + title = {{Freenet}: A Distributed Anonymous Information + Storage and Retrieval System}, + booktitle = {Workshop on Design Issues in + Anonymity and Unobservability}, + month = jul, + year = 2000, + location = {Berkeley, CA, USA}, +} + +@inproceedings{ clark07usability, + author = {Clark, Jeremy and van Oorschot, P. C. and Adams, Carlisle}, + title = {Usability of anonymous web browsing: an examination of Tor interfaces and deployability}, + booktitle = {\bibconf{SOUPS}{Symposium on Usable privacy and security}}, + year = {2007}, +} + +@inproceedings{ cox06bos, + author = {Cox, Richard S. and Gribble, Steven D. and Levy, Henry M. and Hansen, Jacob Gorm}, + title = {A Safety-Oriented Platform for Web Applications}, + booktitle = {IEEE \bibconf{SP}{Security and Privacy}}, + year = {2006}, +} + +@inproceedings{ corrigangibbs10dissent, + author = {Corrigan-Gibbs, Henry and Ford, Bryan}, + title = {{Dissent}: accountable anonymous group messaging}, + booktitle = {\bibconf[17th]{CCS}{ACM Conference on Computer and Communications Security}}, + month = oct, + year = {2010}, +} + +@unpublished{ corrigangibbs10dissenterr1, + author = {Corrigan-Gibbs, Henry and Ford, Bryan}, + title = {Dissent: Accountable Anonymous Group Messaging, Eratum}, + year = {2010}, + note = {\url{http://dedis.cs.yale.edu/2010/anon/papers/ccs10/erratum.pdf}}, +} + +@inproceedings{ corrigangibbs12scavenging, + author = {Corrigan-Gibbs, Henry and Ford, Bryan}, + title = {Scavenging for Anonymity with {BlogDrop} (Abstract)}, + booktitle = {Provable Privacy Workshop}, + month = jul, + year = 2012, + location = {Vigo, Spain}, +} + +@inproceedings{corrigangibbs2014riposte, + title={Riposte: An Anonymous Messaging System Handling Millions of Users}, + author={Corrigan-Gibbs, Henry and Boneh, Dan and Mazieres, David}, + booktitle = {IEEE \bibconf{SP}{Security and Privacy}}, + year={2014} +} + +@article{cutillo09safebook, + title={Safebook: A privacy-preserving online social network leveraging on real-life trust}, + author={Cutillo, Leucio Antonio and Molva, Refik and Strufe, Thorsten}, + journal={Communications Magazine, {IEEE}}, + year={2009}, +} + +%D + +@inproceedings{ danezis03mixminion, + author = {George Danezis and Roger Dingledine and Nick Mathewson}, + title = {{Mixminion}: Design of a {Type III} + Anonymous Remailer Protocol}, + booktitle = {IEEE \bibconf{SP}{Security and Privacy}}, + month = may, + year = 2003, +} + +@article{ dana97global, + author = {Peter H. Dana}, + title = {\href{https://link.springer.com/article/10.1023%2FA%3A1007906014916}{Global Positioning System (GPS) Time Dissemination for Real-Time Applications}}, + journal = {Real Time Systems}, + month = jan, + year = 1997, + volume = 12, + number = 1, + pages = {9-40}, +} + +@article{dean13tail, + title={The tail at scale}, + author={Dean, Jeffrey and Barroso, Luiz Andr{\'e}}, + journal={Communications of the ACM}, + volume={56}, + number={2}, + pages={74--80}, + year={2013}, + publisher={ACM} +} + +@article{ deering90multicast, + author = {Stephen E. Deering and David R. Cheriton}, + title = {\href{http://dl.acm.org/citation.cfm?id=78953}{Multicast Routing in Datagram Internetworks + and Extended {LANs}}}, + journal = {ACM Transactions on Computer Systems}, + month = may, + year = 1990, + volume = 8, + number = 2, + url = {http://dl.acm.org/citation.cfm?id=78953}, +} + +@misc{ deterlab, + key = {DeterLab}, + title = {\href{http://isi.deterlab.net/}{{DeterLab} Network Security Testbed}}, + url = {http://isi.deterlab.net/}, + month = {September}, + year = {2012}, +} + +@book{ dicke92franchising, + author = {Thomas S. Dicke}, + title = {Franchising in America}, + publisher = {University of North Carolina Press}, + year = 1992, +}, + +@inproceedings{ dingledine02reliable, + author = {Roger Dingledine and Paul Syverson}, + title = {Reliable {MIX} Cascade Networks through Reputation}, + booktitle = {Financial Cryptography}, + month = mar, + year = 2002, + location = {Southampton, Bermuda}, +} + +@inproceedings{ dingledine04tor, + author = {Dingledine, Roger and Mathewson, Nick and Syverson, Paul}, + title = {\href{https://dl.acm.org/citation.cfm?id=1251375.1251396}{Tor: + the second-generation onion router}}, + booktitle = {12th USENIX Security Symposium}, + month = aug, + year = {2004}, +} + +@inproceedings{ dingledine04synchronous, + author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson}, + title = {Synchronous Batching: From Cascades to Free Routes}, + booktitle = {\bibbrev{WPET}{Workshop on + Privacy Enhancing Technologies}}, + month = may, + year = 2004, + location = {Toronto, Canada}, +} + +@misc{ dingledine06design, + author = {Roger Dingledine and Nick Mathewson}, + title = {Design of a blocking-resistant anonymity system}, + month = nov, + year = 2006, + note = {Tor Project technical report, + \url{https://svn.torproject.org/svn/projects/design-paper/blocking.html}}, +} + +@misc{ dingledine13guards, + author = {Roger Dingledine}, + note = {\url{https://blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters}}, + year = {2013}, + title = {Improving Tor's anonymity by changing guard parameters}, +} + +@misc{ torproject, + key = {Tor}, + title = {Tor: {A}nonymity {O}nline}, + author = {}, + note = {\url{https://www.torproject.org}} +} + +@misc{ torslow, + title = {Why is {Tor} so slow?}, + author = {}, + note = {\\ \url{https://www.torproject.org/docs/faq.html.en\#WhySlow}} +} + +@misc{ tormetrics, + key = {Tor Metrics Portal}, + title = {Tor Metrics Portal}, + author = {}, + note = {\\ \url{http://metrics.torproject.org/}}, +} + +@inproceedings{ dingledine06blending, + author = {Roger Dingledine and Andrei Serjantov and Paul Syverson}, + title = {Blending different latency traffic with alpha-mixing}, + booktitle = {\bibconf[6th]{WPET}{Workshop on + Privacy Enhancing Technologies}}, + month = jun, + year = 2006, + location = {Cambridge, UK}, +} + +@misc{ dingledine12how, + author = {Roger Dingledine and Jacob Appelbaum}, + title = {How governments have tried to block {Tor}}, + year = 2012, + note = {Tor project presentation, + \url{https://svn.torproject.org/svn/projects/presentations/slides-28c3.pdf}}, +} + +@article{ dolev00xor, + author = {Shlomi Dolev and Rafail Ostrovsky}, + title = {Xor-Trees for Efficient Anonymous Multicast and Reception}, + journal = {\bibbrev{TISSEC}{ACM Transactions on + Information and System Security}}, + month = may, + year = 2000, +} + +@inproceedings{ douceur02sybil, + author = {John R. Douceur}, + title = {\href{http://research.microsoft.com/pubs/74220/IPTPS2002.pdf}{The {Sybil} Attack}}, + booktitle = {\bibconf[1st]{IPTPS}{International Workshop on Peer-to-Peer + Systems}}, + location = {Cambridge, MA}, + month = mar, + year = 2002, + url = {http://research.microsoft.com/pubs/74220/IPTPS2002.pdf}, +} + +@misc{ ducklin09facebook, + author = {Paul Ducklin}, + title = {{Sophos Australia Facebook ID probe 2009}}, + month = dec, + day = 6, + year = 2009, + note = {\url{http://www.sophos.com/blogs/duck/g/2009/12/06/facebook-id-probe-2009/}}, +} + +@inproceedings{ dukkipati05processor, + author = {Nandita Dukkipati and Masayoshi Kobayashi and Rui Zhang-Shen + and Nick McKeown}, + title = {Processor Sharing Flows in the {Internet}}, + booktitle = {\bibbrev{IWQoS}{13th International Workshop on + Quality of Service (IWQoS)}}, + location = {Passau, Germany}, + month = jun, + year = 2005, +} + +@inproceedings{ dukkipati06rcpac, + author = {Nandita Dukkipati and Nick McKeown and Alexander G. Fraser}, + title = {{RCP-AC}: Congestion Control to make flows complete quickly + in any environment}, + booktitle = {High-Speed Networking Workshop: The Terabits Challenge}, + location = {Barcelona, Spain}, + month = apr, + year = 2006, +} + +@inproceedings{dukkipati11proportional, + author = {Nandita Dukkipati and Matt Mathis and + Yuchung Cheng and Monia Ghobadi}, + title = {Proportional Rate Reduction for {TCP}}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = nov, + year = {2011}, + location = {Berlin, Germany}, +} + +%E + +@article{eastlake99domain, + title={Domain name system security extensions}, + author={Eastlake, Donald E and others}, + year={1999} +} + +@inproceedings{ eckersley10browser, + author = {Peter Eckersley}, + title = {How Unique Is Your Web Browser?}, + booktitle = {\bibbrev{PETS}{Privacy-Enhancing + Technologies Symposium}}, + month = jul, + year = 2010, +} + +@inproceedings{ edman09awareness, + author = {Edman, Matthew and Syverson, Paul}, + title = {As-awareness in Tor path selection}, + booktitle = {\bibconf{CCS}{ACM conference on Computer and communications security}}, + year = {2009}, +} + +@inproceedings{ ekwall02robust, + author = {Richard Ekwall and Peter Urban and Andre Schiper}, + title = "{Robust TCP Connections for Fault Tolerant Computing}", + booktitle = "{International Conference on Parallel and Distributed Systems (ICPADS)}", + location = {Taiwan}, + month = dec, + year = 2002, +} + +@incollection{ elgamal85public, + author = {Taher ElGamal}, + title = {A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms}, + booktitle = {Advances in Cryptology}, + series = {Lecture Notes in Computer Science}, + editor = {Blakley, George and Chaum, David}, + publisher = {Springer Berlin / Heidelberg}, + url = {http://dx.doi.org/10.1007/3-540-39568-7_2}, + year = {1985} +} + +@inproceedings{elahi12guards, + author = {Elahi, Tariq and Bauer, Kevin and AlSabah, Mashael and Dingledine, Roger and Goldberg, Ian}, + title = {Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the Electronic Society}}, + year = {2012}, +} + +@misc{ emulab, + key = {Emulab}, + title = {Emulab Network Emulation Testbed}, + note = {\url{http://emulab.net/}}, + year = {2012}, + month = {September} +} + +@misc{ erratasec12lulzsec, + author = {Errata Security}, + title = {Notes on {Sabu} arrest}, + year = {2012}, + month = march, + note = {\url{http://blog.erratasec.com/2012/03/notes-on-sabu-arrest.html}}, +} + +@article{ethereum18shardingspec, + author = {}, + title = {\href{https://github.com/ethereum/sharding/blob/develop/docs/doc.md#validator-manager-contract-vmc}{Ethereum's Sharding Specification}}, + year={2018} +} + +@misc{evdokimov_redsocks, + author = {Leonid Evdokimov}, + title = {{redsocks - transparent socks redirector}}, + note = {\url{http://darkk.net.ru/redsocks/}}, +} + +@misc{ ewasm, + key = {ewasm}, + title = {\href{https://github.com/ewasm/design}{Ethereum flavored WebAssembly (ewasm)}}, + note = {\url{https://github.com/ewasm/design}}, +} + +%F + +@inproceedings{ fall03delay, + author = {Kevin Fall}, + title = {A Delay-Tolerant Network Architecture + for Challenged {Internets}}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2003, + location = {Karlsruhe, Germany}, +} + +@misc{ feigenbaum06portia, + author = {J. Feigenbaum and D. J. {Weitzner, eds.}}, + title = {Report on the 2006 {PORTIA/TAMI} Workshop + on Privacy and Accountability}, + month = jun, + year = 2006, +} + +@misc{ feigenbaum06report, + author = {Joan Feigenbaum and Daniel J. Weitzner}, + title = {Report on the 2006 {PORTIA/TAMI} Workshop + on Privacy and Accountability}, + month = jun, + year = 2006, + note = {\url{http://dig.csail.mit.edu/2006/tami-portia-accountability-ws/summary}}, +} + +@inproceedings{ feigenbaum07probabilistic, + author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson}, + title = {Probabilistic Analysis of Onion Routing in a Black-box Model}, + booktitle = {\bibconf[6th]{WPES}{Workshop on Privacy + in the Electronic Society}}, + location = {Alexandria, VA}, + month = oct, + year = 2007, +} + +@inproceedings{ feigenbaum07model, + author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson}, + title = {A Model of Onion Routing with Provable Anonymity}, + booktitle = {Financial Cryptography}, + month = feb, + year = 2007, +} + +@inproceedings{ feigenbaum10preventing, + author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson}, + title = {Preventing Active Timing Attacks in + Low-Latency Anonymous Communication (Extended Abstract)}, + booktitle = {10th \bibbrev{PETS}{Privacy-Enhancing + Technologies Symposium}}, + month = jul, + year = 2010, + note = {See also UT Austin CS Department TR 1965}, +} + +@article{ feigenbaum12probabilistic, + author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson}, + title = {Probabilistic Analysis of Onion Routing in a Black-Box Model}, + journal = {\bibconf{TISSEC}{ACM Transactions on Information and System Security}}, + month = nov, + year = 2012, +} + +@inproceedings{ felt17measuring, + author = {Adrienne Porter Felt and Richard Barnes and April King and Chris + Palmer and Chris Bentzel and Parisa Tabriz}, + title = + {\href{https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/felt}{Measuring + {HTTPS} Adoption on the Web}}, + booktitle = {{USENIX} Security Symposium}, + month = aug, + year = {2017}, + pages = {1323--1338} +} + +@inproceedings{ fidge88timestamps, + title={\href{https://zoo.cs.yale.edu/classes/cs426/2012/lab/bib/fidge88timestamps.pdf}{Timestamps in Message-Passing Systems That Preserve the Partial Ordering}}, + author={Colin J. Fidge}, + booktitle = {11th \bibbrev{ACSC}{Australian Computer Science Conference}}, + year={1988} +} + +@inproceedings{ fifield12evading, + title = {Evading censorship with browser-based proxies}, + author = {Fifield, David and Hardison, Nate and + Ellithorpe, Jonathan and Stark, Emily and + Boneh, Dan and Dingledine, Roger and Porras, Phil}, + booktitle = {12th \bibbrev{PETS}{Privacy Enhancing Technologies Symposium}}, + year = {2012}, +} + +@article{fitzpatrick04memcached, + title = {Distributed Caching with Memcached}, + author = {Brad Fitzpatrick}, + journal = {Linux Journal}, + year = {2004}, + month = aug, + note = {http://www.linuxjournal.com/article/7451}, +} + +@inproceedings{flach13reducing, + author = {Tobias Flach and Nandita Dukkipati and + Andreas Terzis and Barath Raghavan and + Neal Cardwell and Yuchung Cheng and + Ankur Jain and Shuai Hao and + Ethan Katz-Bassett and Ramesh Govindan}, + title = {Reducing Web Latency: the Virtue of Gentle Aggression}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + year = {2013}, + month = aug, + location = {Hong Kong, China}, +} + +@inproceedings{ ford07structured, + title = {Structured Streams: a New Transport Abstraction}, + author = {Bryan Ford}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + year = {2007}, + month = aug, + location = {Kyoto, Japan}, +} + +@inproceedings{ ford08breaking, + author = {Bryan Ford and Janardhan Iyengar}, + title = {Breaking Up the Transport Logjam}, + booktitle = {\bibbrev{HotNets-VII}{7th Workshop + on Hot Topics in Networks (HotNets-VII)}}, + location = {Calgary, Alberta, Canada}, + month = oct, + day = 6, + year = 2008, +} + +@inproceedings{ ford09efficient, + author = {Bryan Ford and Janardhan Iyengar}, + title = {Efficient Cross-Layer Negotiation}, + booktitle = {\bibbrev{HotNets-VIII}{8th Workshop + on Hot Topics in Networks (HotNets-VIII)}}, + location = {New York City, NY}, + month = oct, + day = 22, + year = 2009, +} + +@misc{ ford09flow, + author = {Janardhan Iyengar and Bryan Ford}, + title = {Flow Splitting with Fate Sharing in a + Next Generation Transport Services Architecture}, + month = dec, + year = 2009, + note = {\url{http://arxiv.org/abs/0912.0921}}, +} + +@inproceedings{freedman02tarzan, + title = {Tarzan: A peer-to-peer anonymizing network layer}, + author = {Freedman, Michael J. and Morris, Robert}, + booktitle = {\bibconf[9th]{CCS}{ACM Conference on Computer and Communications Security}}, + year = {2002} +} + +@inproceedings{freedman04coral, + author = {Michael J. Freedman and Eric Freudenthal and David Mazi\`{e}res}, + title = {Democratizing Content Publication with {C}oral}, + booktitle = {\bibconf[1st]{NSDI}{USENIX Symposium on Networked System + Design and Implementation}}, + location = {San Francisco, CA}, + month = mar, + year = 2004 +} + +@inproceedings{ fujisaki07traceable, + author = {Eiichiro Fujisaki and Koutarou Suzuki}, + title = {Traceable Ring Signature}, + booktitle = {\bibconf[10th]{PKC}{International Conference on + Theory and Practice of Public Key Cryptography}}, + month = apr, + year = 2007, + location = {Beijing, China}, +} + +@inproceedings{ furukawa01efficient, + author = {Jun Furukawa and + Kazue Sako}, + title = {An Efficient Scheme for Proving a Shuffle}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + location = {Santa Barbara, CA}, + month = aug, + year = 2001 +} + +%G + +@inproceedings{gedik05location, + author={Gedik, B. and Ling Liu}, + booktitle={IEEE \bibconf{ICDCS}{International Conference on Distributed Computing Systems}}, + title={Location Privacy in Mobile Systems: A Personalized Anonymization Model}, + year={2005}, + month={june}, +} + +@article{gettys11bufferbloat, + title = {{Bufferbloat}: Dark Buffers in the Internet}, + author = {Jim Gettys and Kathleen Nichols}, + journal = {{ACM} queue}, + year = {2011}, + month = nov, + note = {http://queue.acm.org/detail.cfm?id=2071893}, +} + +@inproceedings{ ghinita07prive, + author = {Ghinita, Gabriel and Kalnis, Panos and Skiadopoulos, Spiros}, + title = {{PRIVE}: anonymous location-based queries in distributed mobile systems}, + booktitle = {\bibconf[16th]{WWW}{International + World Wide Web Conference}}, + month = may, + year = {2007}, + location = {Banff, Alberta, Canada}, +} + +@inproceedings{ ghobadi12trickle, + author = {Monia Ghobadi and Yuchung Cheng and + Ankur Jain and Matt Mathis}, + title = {{Trickle}: Rate Limiting {YouTube} Video Streaming}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = {2012}, + location ={Boston, MA}, +} + +@inproceedings{gill11understanding, + author = {Phillipa Gill and + Navendu Jain and + Nachiappan Nagappan}, + title = {Understanding Network Failures in Data Centers: + {M}easurement, Analysis, and Implications}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Toronto, Canada}, + month = aug, + year = 2011 +} + + +@inproceedings{ goel02supporting, + author = {Ashvin Goel and Charles Krasic and Kang Li + and Jonathan Walpole}, + title = {Supporting low latency {TCP}-based media streams}, + booktitle = {\bibconf[10th]{IWQoS}{International Workshop + on Quality of Service}}, + month = may, + year = 2002, + location = {Miami Beach, FL}, +} + +@techreport{ goel03herbivore, + title = {{Herbivore}: A Scalable and Efficient Protocol for Anonymous Communication}, + author = {Sharad Goel and Mark Robson and Milo Polte and Emin Gun Sirer}, + institution = {Cornell University}, + number = {2003-1890}, + year = {2003}, + month = {February}, + www_pdf_url = {http://www.cs.cornell.edu/People/egs/papers/herbivore-tr.pdf}, +} + +@article{ goldschlag99onion, + author = {David Goldschlag and Michael Reed and Paul Syverson}, + title = {Onion Routing for Anonymous and Private Internet Connections}, + journal = {Communications of the ACM}, + month = feb, + year = 1999, + volume = 42, + number = 2, +} + +@article{ golijan12privacy, + author = {Rosa Golijan}, + title = {Consumer {Reports}: {Facebook} privacy problems are on the rise}, + year = {2012}, + month = may, + howpublished = {\url{http://www.nbcnews.com/technology/consumer-reports-facebook-privacy-problems-are-rise-749990}}, +} + +@inproceedings{ gollakota08zigzag, + author = {Shyamnath Gollakota and Dina Katabi}, + title = {ZigZag Decoding: Combating Hidden Terminals + in Wireless Networks}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2008, + location = {Seattle, WA}, +} + +@inproceedings{ golle04dining, + author = {Philippe Golle and + Ari Juels}, + title = {Dining Cryptographers Revisited}, + booktitle = {\bibconf{EUROCRYPT}{International Conference on Theory and + Applications of Cryptographic Techniques}}, + location = {Interlaken, Switzerland}, + month = may, + year = 2004 +} + +@inproceedings{ gopal11torchestra, + author = {Gopal, Deepika and Heninger, Nadia}, + title = {Torchestra: reducing interactive traffic delays over {Tor}}, + booktitle = {\bibconf{WPES}{Workshop on + Privacy in the Electronic Society}}, + month = oct, + year = {2012}, + location = {Raleigh, NC}, +} + +@article{ griffin02stable, + author = {Timothy G. Griffin and F. Bruce Shepherd and Gordon Wilfong}, + title = {The Stable Paths Problem and Interdomain Routing}, + journal = {Transactions on Networking}, + volume = 10, + number = 2, + month = apr, + year = 2002, +} + +@inproceedings{ guha08noyb, + title={NOYB: Privacy in online social networks}, + author={Guha, Saikat and Tang, Kevin and Francis, Paul}, + booktitle={\bibconf{WOSN}{Workshop on Online social networks}}, + year={2008}, +} + +@inproceedings{gunawi04deploying, + author = {Gunawi, Haryadi S. and Arpaci-Dusseau, Andrea C. and Arpaci-Dusseau, Remzi H.}, + title = "{Deploying Safe User-Level Network Services With icTCP}", + booktitle = {OSDI 04}, + year = {2004}, + publisher = {USENIX Association}, + address = {Berkeley, CA, USA}, + } + +@inproceedings{guo06delving, + author = {Lei Guo and Enhua Tan and Songqing Chen and Zhen Xiao and Oliver Spatscheck and Xiaodong Zhang}, + title = {Delving into {Internet} Streaming Media Delivery: a Quality and Resource Utilization Perspective}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = {2006}, + location = {Rio de Janeiro, Brazil}, +} + +%H + +@article{ha08cubic, + author = {Sangtae Ha and Injong Rhee and Lisong Xu}, + title = {{CUBIC}: a new {TCP}-friendly high-speed {TCP} variant}, + journal = {\bibbrev{ACM SIGOPS} Operating Systems Review}, + volume = {42}, + number = {5}, + year = {2008}, + month = jul, +} + +@inproceedings{ haeberlen09netreview, + author = {Andreas Haeberlen and Ioannis Avramopoulos and + Jennifer Rexford and Peter Druschel}, + title = {{NetReview}: Detecting when interdomain routing goes wrong}, + booktitle = {6th Symposium on Networked Systems Design + and Implementation (NSDI '09)}, + month = apr, + year = 2009, + location = {Boston, MA}, +} + +@inproceedings{ han13expressive, + author = {Seungyeop Han and Vincent Liu and Qifan Pu + and Simon Peter and Thomas Anderson and Arvind Krishnamurthy + and David Wetherall}, + title = {Expressive Privacy Control with Pseudonyms}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2013, + location = {Hong Kong}, +} + +@inproceedings{handley01network, + author = {Handley, Mark and Paxson, Vern and Kreibich, Christian}, + title = "{Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-end Protocol Semantics}", + booktitle = {SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium}, + year = {2001}, + } + +@article{handley06why, + author = {Handley, M.}, + title = "{Why the Internet only just works}", + journal = {BT Technology Journal}, + year = {2006}, + doi = {http://dx.doi.org/10.1007/s10550-006-0084-z}, + publisher = {Kluwer Academic Publishers}, + address = {Hingham, MA, USA}, + } + +@ARTICLE{Hei07IPTV, + author = {X. Hei and others}, + title = {A Measurement Study of a Large-Scale P2P IPTV System}, + journal = {IEEE Transactions on Multimedia}, + year = {2007}, +} + +@article{ honda05understanding, + author = {Osamu Honda and Hiroyuki Ohsaki and Makoto Imase + and Mika Ishizuka and Junichi Murayama}, + journal = {Proceedings of SPIE}, + volume = 6011, + pages = {138-146}, + year = 2005, +} + +@inproceedings{ honda11possible, + author = {Michio Honda and Yoshifumi Nishida and Costin Raiciu + and Adam Greenhalgh and Mark Handley and Hideyuki Tokuda}, + title = {Is it Still Possible to Extend {TCP}?}, + booktitle = {\bibbrev{IMC}{Internet Measurement Conference}}, + month = nov, + year = 2011, + location = {Berlin, Germany}, +} + +@inproceedings{ hopper07how, + author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin}, + title = {How Much Anonymity does Network Latency Leak?}, + booktitle = {\bibconf{CCS}{ACM Conference on + Computer and Communications Security}}, + month = oct, + year = 2007, +} + +@inproceedings{ hsiao12lap, + title={{LAP}: Lightweight anonymity and privacy}, + author = {Hsiao, Hsu-Chun and Kim, Tiffany Hyun-Jin and Perrig, Adrian + and Yamada, Akira and Nelson, Samuel C. and Gruteser, Marco and Meng, Wei}, + booktitle = {IEEE \bibconf{SP}{Security and Privacy}}, + pages = {506--520}, + year = {2012}, +} + +@INPROCEEDINGS{Huang08challenges, + author = {Yan Huang and others}, + title = {Challenges, Design and Analysis of a Large-scale P2P VoD + System}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + year = {2008} +} + +%I +@misc{ i2p, + title = {Invisible Internet Project (I2P)}, + note = {\url{http://geti2p.net/en}}, + year = 2015, + month = jan +} + +@inproceedings{ iyengar10minion, + author = {Janardhan Iyengar and Bryan Ford and Dishant Ailawadi and Syed Obaid Amin and Michael Nowlan and Nabin Tiwari and Jeff Wise}, + title = {Minion---an All-Terrain Packet Packhorse to Jump-Start Stalled Internet Transports}, + booktitle = {PFLDNeT 2010}, + month = nov, + year = 2010 +} + +% author = {Janardhan Iyengar and others}, +@inproceedings{ iyengar12minion, + author = {Michael F. Nowlan and Nabin Tiwari and + Janardhan Iyengar and Syed Obaid Amin and Bryan Ford}, + title = {Fitting Square Pegs Through Round Pipes: + Unordered Delivery Wire-Compatible with {TCP} and {TLS}}, + month = apr, + year = {2012} +} + +% XXX full version (currently arxiv/TR, maybe journal in future?) +% author = {Janardhan Iyengar and others}, +@misc{ iyengar12minion-full, + author = {Janardhan Iyengar and Syed Obaid Amin and + Michael F. Nowlan and Nabin Tiwari and Bryan Ford}, + title = {Minion: Unordered Delivery Wire-Compatible with {TCP} and {TLS} + (Full Version)}, + month = apr, + year = 2012, + note = {Technical Report. \texttt{arXiv:1103.0463}} +} + +@misc{ itu01pesq, + author = {\abbr{ITU}{International Telecommunication Union}}, + title = {P.862: Perceptual evaluation of speech quality {(PESQ)}}, + month = feb, + year = 2001, +} + +@misc{ itu03transtime, + author = {\abbr{ITU}{International Telecommunication Union}}, + title = {Recommendation {G.114}: One-way Transmission Time}, + month = may, + year = 2003, +} + +@misc{ itu05impl, + author = {ITU-T Telecommunication Standardization Sector of ITU}, + title = {Recommendation P.862 (2001) Amendment 2 (11/05) reference + implementation and conformance testing}, + month = nov, + year = 2005, + note = {\url{http://www.itu.int/rec/T-REC-P.862-200511-I!Amd2/en}} +} + +@misc{ itu07wideband, + author = {ITU-T Telecommunication Standardization Sector of ITU}, + title = {Wideband extension to Recommendation P.862 for the + assessment of wideband telephone networks and + speech codecs}, + month = nov, + year = 2007, + url = {http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-P.862.2-200711-I!!PDF-E&type=items} +} + +@inproceedings{ iwanik04duo, + author = {Jan Iwanik and Marek Klonowski and Miroslaw Kutylowski}, + title = {{DUO-Onions} and {Hydra-Onions} -- + failure and adversary resistant onion protocols}, + booktitle = {\bibbrev{IFIP CMS}{IFIP TC-6 TC-11 Conference on + Communications and Multimedia Security}}, + month = sep, + year = 2004, +}, + +%J + +@inproceedings{jahid11easier, + title={{EASiER}: Encryption-based access control in social networks with efficient revocation}, + author={Jahid, Sonia and Mittal, Prateek and Borisov, Nikita}, + booktitle={\bibconf{ASIACCS}{ACM Symposium on Information, Computer and Communications Security}}, + year={2011}, +} + +@inproceedings{ jones11hiding, + author = {Nicholas Jones and Matvey Arye and Jacopo Cesareo + and Michael J. Freedman}, + title = {Hiding Amongst the Clouds: + A Proposal for Cloud-based Onion Routing}, + booktitle = {\bibconf{FOCI}{Workshop on Free and Open Communications + on the Internet}}, + month = aug, + year = 2011, + location = {San Francisco, CA}, +} + +%K + + +@book{kaminow97optical, + title={Optical Fiber Telecommunications IIIA}, + author={Kaminow, Ivan P and Koch, Thomas L}, + year={1997}, + publisher={Academic Press, New York} +} + + +@misc{kamkar10evercookie, + author = {Samy Kamkar}, + year = {2010}, + howpublished = {\url{http://http://samy.pl/evercookie/}}, + month = {oct}, + title = {evercookie}, +} + +@inproceedings{kandula05shrink, + author = {Srikanth Kandula and + Dina Katabi and + Jean-Philippe Vasseur}, + title = {Shrink: {A} Tool for Failure Diagnosis in {IP} Networks}, + booktitle = {MineNet}, + location = {Philadephia, PA}, + month = aug, + year = 2005 +} + +@inproceedings{kandula09detailed, + author = {Srikanth Kandula and + Ratul Mahajan and + Patrick Verkaik and + Sharad Agarwal and + Jitendra Padhye and + Paramvir Bahl}, + title = {Detailed Diagnosis in Enterprise Networks}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Barcelona, Spain}, + month = aug, + year = 2009 +} + +@inproceedings{ karlin11decoy, + author = {Josh Karlin and others}, + title = {Decoy Routing: Toward Unblockable Internet Communication}, + booktitle = {\bibconf{FOCI}{Workshop on Free and Open Communications + on the Internet}}, + month = aug, + year = 2011, + location = {San Francisco, CA}, +} + +@inproceedings{katz06towards, + author = {Ethan Katz-Bassett and John P. John and Arvind Krishnamurthy + and David Wetherall and Thomas Anderson and Yatin Chawathe}, + title = {Towards {IP} Geolocation using delay and topology measurements}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = {2006}, + location = {Rio de Janeiro, Brazil}, +} + +@article{kobeissi13cryptocat, + author = {Nadim Kobeissi and Arlo Breault}, + title = {Cryptocat: Adopting Accessibility and Ease of Use as Security Properties}, + journal = {CoRR}, + url = {\url{http://arxiv.org/abs/1306.5156}}, +} + +@inproceedings{kompella05ip, + author = {Ramana Rao Kompella and + Jennifer Yates and + Albert G. Greenberg and + Alex C. Snoeren}, + title = {{IP} Fault Localization Via Risk Modeling}, + booktitle = {\bibconf[2nd]{NSDI}{USENIX Symposium on Networked System + Design and Implementation}}, + location = {Boston, MA}, + month = may, + year = 2005 +} + + +@incollection{ kontaxis11sudoweb, + title={{SudoWeb}: Minimizing information disclosure to third parties in single sign-on platforms}, + author={Kontaxis, Georgios and Polychronakis, Michalis and Markatos, Evangelos P}, + booktitle={\bibconf{ISC}{Information Security Conference}}, + year={2011}, +} + +@inproceedings{ kumar10characterization, + author = {Kumar, Ravi and Tomkins, Andrew}, + title = {A characterization of online browsing behavior}, + booktitle = {\bibconf[19th]{WWW}{International Conference on {World} {Wide} {Web}}}, + year = {2010}, + pages = {561--570}, +} + +@article{ kung95credit , + author = {Kung, N.T. and Morris, R.}, + journal = {Network, IEEE}, + title = {Credit-based flow control for ATM networks}, + year = {1995}, + month = {mar/apr}, + volume = {9}, + number = {2}, + pages = {40 -48}, + doi = {10.1109/65.372658}, + issn={0890-8044}, +} + +%L + +@article{ lamport98parttime, + author = {Leslie Lamport}, + title = {\href{https://dl.acm.org/citation.cfm?id=279229}{The Part-Time Parliament}}, + journal = {ACM Transactions on Computer Systems}, + volume = 16, + number = 2, + month = may, + year = 1989, + pages = {133-169}, +} + +@misc{ leblond10deanonymizing, + author = {Stevens Le Blond and Pere Manils and Abdelberi Chaabane + and Mohamed Ali Kaafar and Arnaud Legout + and Claude Castellucia and Walid Dabbous}, + title = {De-anonymizing {BitTorrent} Users on {Tor}}, + month = apr, + day = 8, + year = 2010, + note = {\url{http://arxiv.org/abs/1004.1267}}, +} + +@inproceedings{ leblond13anon, + author = {Le Blond, Stevens and Choffnes, David and Zhou, Wenxuan + and Druschel, Peter and Ballani, Hitesh and Francis, Paul}, + title = {Towards Efficient Traffic-analysis Resistant + Anonymity Networks}, + booktitle = {{ACM} {SIGCOMM}}, + year = {2013}, + month = {August}, +} + +@misc{ leger13silkroad, + author = {Donna Leinwand Leger}, + title = {How FBI brought down cyer-underworld site Silk Road}, + year = {2013}, + note = {\url{http://www.usatoday.com/story/news/nation/2013/10/21/fbi-cracks-silk-road/2984921/}}, +} + +@article{lelewer87data, + author = {Lelewer, Debra A. and Hirschberg, Daniel S.}, + title = {Data compression}, + journal = {ACM Computing Surveys}, + volume = {19}, + issue = {3}, + month = {September}, + year = {1987}, + pages = {261-296}, + url = {http://doi.acm.org/10.1145/45072.45074}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@incollection{levine04timing, + author = {Levine, Brian and Reiter, Michael and Wang, Chenxi and Wright, Matthew}, + title = {Timing Attacks in Low-Latency Mix Systems}, + booktitle = {Financial Cryptography}, + pages = {251-265}, + year = {2004} +} + +@inproceedings{levin09trinc, + title={{TrInc}: Small Trusted Hardware for Large Distributed Systems.}, + author={Levin, Dave and Douceur, John R and Lorch, Jacob R and Moscibroda, Thomas}, + booktitle={NSDI}, + year={2009} +} + +@article{ lewandowski91gps, + author = {Wlodzimierz Lewandowski and Claudine Thomas}, + title = {\href{https://ieeexplore.ieee.org/document/84976/authors#authors}{GPS Time Transfer}}, + journal = {Proceedings of the IEEE}, + volume = 79, + number = 7, + month = jul, + year = 1991, + pages = {991-1000}, +} + +@inproceedings{li13efficient, + author = {Zhenhua Li and Christo Wilson and Zhefu Jiang and Yao Liu and + Ben Y. Zhao and Cheng Jin and Zhi-Li Zhang and Yafei Dai}, + title = {Efficient Batched Synchronization in {D}ropbox-like + Cloud Storage Services}, + booktitle = {\bibconf[14th]{Middleware}{ACM/IFIP/USENIX International + Middleware Conference}}, + location = {Beijing, China}, + month = dec, + year = 2013 +} + +@inproceedings{li14network, + author = {Zhenhua Li and + Cheng Jin and + Tianyin Xu and + Christo Wilson and + Yao Liu and + Linsong Cheng and + Yunhao Liu and + Yafei Dai and + Zhi-Li Zhang}, + title = {Towards Network-level Efficiency for Cloud Storage + Services}, + booktitle = {\bibconf[14th]{IMC}{ACM Internet Measurement Conference}}, + location = {Vancouver, Canada}, + month = nov, + year = 2014 +} + + +@inproceedings{ liu04linkable, + author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, + title = {Linkable Spontaneous Anonymous Group Signature + for Ad Hoc Groups}, + booktitle = {Australian Conference on + Information Security and Privacy}, + month = jul, + year = 2004, + location = {Sydney, Australia}, + pages = {614--623}, +} + +@inproceedings{liu13f10, + author = {Vincent Liu and + Daniel Halperin and + Arvind Krishnamurthy and + Thomas Anderson}, + title = {{F10}: {A} Fault-Tolerant Engineered Network}, + booktitle = {\bibconf[10th]{NSDI}{USENIX Symposium on Networked Systems + Design and Implementation}}, + location = {Lombard, IL}, + month = apr, + year = 2013 +} + +@misc{ lombardi02nist, + author = {Michael A. Lombardi}, + title = {\href{http://tf.nist.gov/general/pdf/1383.pdf}{NIST Time and Frequency Services}}, + note = {NIST Special Publication 432}, + month = jan, + year = 2002, +} + +@inproceedings{ lumezanu09triangle, + author = {Cristian Lumezanu and Randy Baden and Neil Spring + and Bobby Bhattacharjee}, + title = {Triangle Inequality and Routing Policy Violations + in the {Internet}}, + booktitle = {\bibconf{PAM}{Passive and Active Measurement Conference}}, + month = apr, + year = 2009, + location = {Seoul, South Korea}, +} + +@inproceedings{ lv02search, + author = {Qin Lv and Pei Cao and Edith Cohen and + Kai Li and Scott Shenker}, + booktitle = {\bibconf[16th]{ICS}{International Conference on Supercompiting}}, + month = jun, + year = 2002, + location = {New York City, NY}, +} + + +%M + +@inproceedings{madhyastha06iplane, + author = {Harsha V. Madhyastha and Tomas Isdal and Michael Poatek and Colin Dixon and Tomas E. Anderson and Vrvind Krishnamurthy and Arun Venkataramani}, + title = {{iPlane}:An information plane for distributed services}, + booktitle = {OSDI}, + year = 2006 +} + +@inproceedings{ maganis12opaak, + title={Opaak: using mobile phones to limit anonymous identities online}, + author={Maganis, Gabriel and Shi, Elaine and Chen, Hao and Song, Dawn}, + booktitle={\bibconf{MobiSys}{Conference on Mobile systems, applications, and services}}, + year={2012}, +} + +@article{marko10using, + author = {Kurt Marko}, + title = "{Using SSL Proxies To Block Unauthorized SSL VPNs}", + journal = {Processor Magazine, www.processor.com}, + volume = 32, + number = 16, + month = jul, + year = 2010, + pages = {23} +} + +@article{mckeown08openflow, + author = {Nick McKeown and Tom Anderson and Hari Balakrishnan and + Guru Parulkar and Larry Peterson and Jennifer Rexford + and Scott Shenker and Jonathan Turner}, + title = {{OpenFlow}: Enabling Innovation in Campus Networks}, + journal = {ACM SIGCOMM Computer Communication Review}, + volume = 38, + number = 2, + pages = {69-74}, + year = 2008, +} + +@article{ meushaw00nettop, + author = {Robert Meushaw and Donald Simard}, + title = {{NetTop}: Commercial Technology in High Assurance Applications}, + journal = {Tech Trend Notes}, + year = 2000, +} + +@inproceedings{michalakis07ensuring, + title={Ensuring content integrity for untrusted peer-to-peer content distribution networks}, + author={Michalakis, Nikolaos and Soul{\'e}, Robert and Grimm, Robert}, + booktitle={Proceedings of the 4th USENIX conference on Networked systems design \& implementation}, + pages={11--11}, + year={2007}, + organization={USENIX Association} +} + + +@article{ mills91internet, + author = {David L. Mills}, + title = {\href{https://ieeexplore.ieee.org/document/103043}{Internet Time Synchronization: The Network Time Protocol}}, + journal = {IEEE Transactions on Communications}, + volume = 39, + number = 10, + month = oct, + year = 1991, + pages = {1482-1493}, +} + +@inproceedings{ mislove04ap3, + author = {Alan Mislove and Gaurav Oberoi and Ansley Post + and Charles Reis and Peter Druschel and Dan S. Wallach}, + title = {{AP3}: Cooperative, decentralized anonymous communication}, + booktitle = {\bibconf{SIGOPS EW}{ACM SIGOPS European Workshop}}, + month = sep, + year = 2004, + location = {Leuven, Belgium}, +} + +@inproceedings{ mislove07measurement, + author = {Alan Mislove and Massimiliano Marcon and Krishna P. Gummadi + and Peter Druschel and Bobby Bhattacharjee}, + title = {Measurement and Analysis of Online Social Networks}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = 2007, + location = {San Diego, USA}, +} + +@inproceedings{ mittal11stealthy, + author = {Prateek Mittal and Ahmed Khurshid and Joshua Juen + and Matthew Caesar and Nikita Borisov}, + title = {Stealthy Traffic Analysis of Low-Latency + Anonymous Communication Using Throughput Fingerprinting}, + booktitle = {\bibconf[18th]{CCS}{ACM Conference on + Computer and Communications Security}}, + month = oct, + year = 2011, + location = {Chicago, IL}, +} + +@inproceedings{ mockapetris88development, + author = {Paul V. Mockapetris and Kevin J. Dunlap}, + title = {\href{http://www.dtic.mil/dtic/tr/fulltext/u2/a203901.pdf}{Development of the Domain Name System}}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1988, + location = {Stanford, CA}, +} + +@inproceedings{moghaddam12skypemorph, + title = {{SkypeMorph}: Protocol obfuscation for {Tor} bridges}, + author = {Mohajeri Moghaddam, Hooman and Li, Baiyu and + Derakhshani, Mohammad and Goldberg, Ian}, + booktitle = {\bibconf[19th]{CCS}{ACM Conference on + Computer and Communications Security}}, + location = {Raleigh, NC}, + month = oct, + year = 2012 +} + +@inproceedings{ mogul03tcp, + author = {Jeff Mogul}, + title = "{TCP} Offload is a Dumb Idea Whose Time Has Come", + booktitle = {HotOS IX}, + month = may, + year = 2003 +} + +@inproceedings{ molteni02using, + author = {M. Molteni and M. Villari}, + title = "{Using SCTP with Partial Reliability for MPEG-4 Multimedia Streaming}", + booktitle = {BSDCon Europe}, + month = oct, + year = 2002 +} + +@inproceedings{moreno09elastic, + author = {Moreno-Vozmediano, Rafael and Montero, Ruben S. and Llorente, Ignacio M.}, + title = {Elastic Management of Cluster-based Services in the Cloud}, + booktitle = {Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds}, + series = {ACDC '09}, + year = {2009}, + isbn = {978-1-60558-585-7}, + location = {Barcelona, Spain}, + pages = {19--24}, + numpages = {6}, + url = {http://doi.acm.org/10.1145/1555271.1555277}, + doi = {10.1145/1555271.1555277}, + acmid = {1555277}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {cloud computing, cluster-based services, virtualization}, +} + +@article{muller, + author = {N.J. Muller}, + title = {Managing Service Level Agreements}, + journal = {International Journal of Network Management}, + volume = {9}, + number = {3}, + year = {1999}, + pages = {155-166}, + publisher = {John Wiley & Sons}, + address = {New York, NY, USA}, +} + +@inproceedings{ murdoch05low, + author = {Steven J. Murdoch and George Danezis}, + title = {Low-Cost Traffic Analysis of {Tor}}, + booktitle = {IEEE \bibconf{SP}{Security and Privacy}}, + month = may, + year = 2005, +} + +@techreport{ murdoch11comparison, + author = {Steven J. Murdoch}, + title = {Comparison of {Tor} Datagram Designs}, + institution = {The Tor Project}, + number = {2011-11-001}, + year = {2011}, + month = {November}, + url = {https://research.torproject.org/techreports/datagram-comparison-2011-11-07.pdf} +} + +@inproceedings{mysore09portland, + author = {Radhika Niranjan Mysore and + Andreas Pamboris and + Nathan Farrington and + Nelson Huang and + Pardis Miri and + Sivasankar Radhakrishnan and + Vikram Subramanya and + Amin Vahdat}, + title = {{PortLand}: {A} Scalable Fault-tolerant Layer 2 Data Center + Network Fabric}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {arcelona, Spain}, + month = aug, + year = 2009 +} + + +%N + +% author = {Preethi Natarajan and Janardhan R. Iyengar and +% Paul. D. Amer and Randall Stewart}, +@inproceedings{ natarajan06sctp, + author = {Preethi Natarajan and others}, + title = {{SCTP}: An innovative transport layer protocol + for the {Web}}, + booktitle = {\bibconf[15th]{WWW}{World Wide Web Conference}}, + location = {Edinburgh, Scotland}, + month = may, + year = 2006, +} + +@inproceedings{natarajan12nsdminer, + author = {Arun Natarajan and Peng Ning and Yao Liu and + Sushil Jajodia and Steve E. Hutchinson}, + title = {{NSDMiner}: {A}utomated discovery of network + service dependencies}, + booktitle = {\bibconf[31st]{INFOCOM}{IEEE INFOCOM}}, + location = {Orlando, FL}, + month = mar, + year = 2012 +} + +@inproceedings{neff01verifiable, + author = {Neff, C. Andrew}, + title = {A verifiable secret shuffle and its application to e-voting}, + booktitle = {\bibconf[8th]{CCS}{ACM Conference on + Computer and Communications Security}}, + pages={116--125}, + month = nov, + year = {2001}, +} + +@article{nichols12controlling, + title = {Controlling queue delay}, + author = {Kathleen Nichols and Van Jacobson}, + journal = {{ACM} queue}, + year = {2012}, + month = may, + note = {http://queue.acm.org/detail.cfm?id=2209336}, +} + +@inproceedings{nobori14vpn, + title={{VPN} {Gate}: A Volunteer-Organized Public {VPN} Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls}, + author={Nobori, Daiyuu and Shinjo, Yasushi}, + booktitle={\bibconf{NSDI}{Symposium on Networked Systems Design and Implementation}}, +} + +@book{ northcutt05inside, + author = {Stephen Northcutt and Lenny Zeltser and Scott Winters and Karen Kent and Ronald Ritchey}, + title = {Inside Network Perimeter Security}, + publisher = {SAMS Publishing}, + year = 2005, +}, + + +%O + +@inproceedings{ ongaro14search, + author = {Diego Ongaro and John Ousterhout}, + title = {In Search of an Understandable Consensus Algorithm}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + year = 2014, +} + % month = jun, + % location = {Philadelphia, PA}, + +@article{oreilly2.0, + author = {Tim O'Reilly}, + title = {What is Web 2.0}, + day = 30, + month = sep, + year = 2005, + publisher = {O'Reilly Media Inc.}, + note = {\url{http://oreilly.com/web2/archive/what-is-web-20.html}}, +} + +%P + +@inproceedings{ panchenko11website, + author = {Andriy Panchenko and Lukas Niessen and Andreas Zinnen + and Thomas Engel}, + title = {\href{https://anonymous-proxy-servers.net/paper/wpes11-panchenko.pdf}{Website Fingerprinting in Onion Routing Based Anonymization Networks}}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the + Electronic Society}}, + month = oct, + year = 2011, +} + +@article{papazoglou03service, + author = {M. P. Papazoglou, D. Georgakopoulos}, + title = {Service-Oriented Computing: Introduction}, + journal = {Communications of the ACM}, + volume = {46}, + number = {10}, + year = {2003}, + pages = {24-28}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@article{ papazoglou08service, + author = {Michael P. Papazoglou and others}, + title = {Service-Oriented Computing: a Research Roadmap}, + journal = {Cooperative Information Systems}, + volume = 17, + number = 2, + year = 2008, + pages = {223-255}, +} + +@inproceedings{ patelSTP, + author = {P. Patel and others}, + title = {Upgrading Transport Protocols Using Mobile Code}, + booktitle = {19th \bibbrev{SOSP}{{ACM} Symposium on + Operating Systems Principles (SOSP)}}, + month = oct, + year = 2003, + location = {Lake George, NY}, +} + +@inproceedings{ paterson11tag, + title={\href{https://www.iacr.org/archive/asiacrypt2011/70730368/70730368.pdf}{Tag + size does matter: Attacks and proofs for the {TLS} record protocol}}, + author={Paterson, Kenneth G and Ristenpart, Thomas and Shrimpton, Thomas}, + booktitle={International Conference on the Theory and Application of + Cryptology and Information Security}, + pages={372--389}, + month=dec, + year={2011} +} + +@inproceedings{peddycord12accurate, + author = {Barry Peddycord III and + Peng Ning and + Sushil Jajodia}, + title = {On the Accurate Identification of + Network Service Dependencies in Distributed Systems}, + booktitle = {\bibconf[26th]{LISA}{Large Installation System + Administration Conference}}, + location = {San Diego, CA}, + month = dec, + year = 2012 +} + +@inproceedings{ perng2006multicasting, + author={ Perng, G. and Reiter, M.K. and Chenxi Wang}, + booktitle={\bibconf[26th]{ICDCS}{International Conference on + Distributed Computing Systems}}, + title={{M2}: Multicasting Mixes for + Efficient and Anonymous Communication}, + year={2006}, + month={}, + volume={}, + number={}, + pages={59-59}, + keywords={}, + doi={10.1109/ICDCS.2006.53}, + ISSN={1063-6927}, +} + +@inproceedings{popa09macroscope, + author = {Lucian Popa and + Byung-Gon Chun and + Ion Stoica and + Jaideep Chandrashekar and + Nina Taft}, + title = {{M}acroscope: {E}nd-point approach to networked application + dependency discovery}, + booktitle = {CoNEXT}, + year = 2009 +} + + +@misc{phobos13freedom, + author = {phobos}, + year = {2013}, + month = {aug}, + title = {Hidden Services, Current Events, and Freedom Hosting}, + howpublished = {\url{https://blog.torproject.org/blog/hidden-services-current-events-and-freedom-hosting}}, +} + + +@inproceedings{ popa10http, + author = {Lucian Popa and Ali Ghodsi and Ion Stoica}, + title = {{HTTP} as the Narrow Waist of the Future {Internet}}, + booktitle = {\bibbrev{HotNets-IX}{9th ACM Workshop on + Hot Topics in Networks (HotNets-IX)}}, + location = {Monterey, CA}, + month = oct, + year = 2010, +} + +@inproceedings{ power10piccolo, + author = {Russell Power and Jinyang Li}, + title = {Piccolo: Building Fast, Distributed Programs + with Partitioned Tables}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}}, + month = oct, + year = 2010, +} + +@misc{ powertutor, + title = {{PowerTutor}}, + key = {PowerTutor}, + howpublished = {\url{http://powertutor.org/}}, +} + +@misc{ preston11facebook, + title = {{Facebook} officials keep quiet in its role in revolts}, + author = {Jennifer Preston}, + howpublished = {New York Times}, + day = 14, + month = feb, + year = 2011, + note = {\url{http://www.nytimes.com/2011/02/15/business/media/15facebook.html}}, +} + +@misc{ pwn2own, + title = {Pwn2Own}, + note = {\url{http://www.pwn2own.com/}}, +} + +%Q + +@misc{quic, + key = {{QUIC}}, + title = {{QUIC}: Multiplexed Stream Transport over {UDP}}, + note = {{http://blog.chromium.org/2013/06/experimenting-with-quic.html}}, +} + +%R + +% author = {Costin Raiciu and Sebastien Barre and Christopher Pluntke +% and Adam Greenhalgh and Damon Wischik and Mark Handley}, +@inproceedings{ raiciu11improving, + author = {Costin Raiciu and others}, + title = {Improving Datacenter Performance and Robustness + with {Multipath TCP}}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2011, + location = {Toronto, Ontario, Canada}, +} + +@inproceedings{ raimondo05secure, + author = {Mario Di Raimondo and Rosario Gennaro and Hugo Krawczyk}, + title = {Secure Off-the-Record Messaging}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the + Electronic Society}}, + month = nov, + year = 2005, + location = {Alexandria, VA, USA}, +} + +@article{rappa, + author = {Michael Rappa}, + title = {Business Models on the Web}, + note = {\\Accessed on July 7 2010. \\ + \url{http://digitalenterprise.org/models/models.html#Advertising}} +} + +@inproceedings{reardon09improving, + author = {Reardon, Joel and Goldberg, Ian}, + title = {Improving tor using a {TCP}-over-{DTLS} tunnel}, + booktitle = {18th USENIX Security Symposium}, + month = aug, + year = {2009}, + location = {Montreal, Canada}, +} + +% author = {Charles Reis and Steven D. Gribble and Tadayoshi Kohno +% and Nicholas C. Weaver}, +@inproceedings{ reis08detecting, + author = {Charles Reis and others}, + title = {Detecting In-Flight Page Changes with Web Tripwires}, + booktitle = {\bibconf[5th]{NSDI}{Symposium on Networked System + Design and Implementation}}, + month = apr, + year = 2008, + location = {San Francisco, CA}, +} + +@article{reiter99crowds, + author = {Reiter, Michael K. and Rubin, Aviel D.}, + title = {Anonymous {Web} transactions with {Crowds}}, + journal = {Communications of the ACM}, + volume = {42}, + number = {2}, + year = {1999}, + issn = {0001-0782}, + pages = {32--48}, + doi = {http://doi.acm.org/10.1145/293411.293778}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{rivest01leak, + author = {Ronald L. Rivest and + Adi Shamir and + Yael Tauman}, + title = {How to Leak a Secret}, + booktitle = {\bibconf[7th]{ASIACRYPT}{International Conference on the + Theory and Application of Cryptology and Information Security}}, + location = {Gold Coast, Australia}, + month = dec, + year = 2001 +} + +@misc{ yegge11platforms, + author = {Steve Yegge}, + title = {Stevey's Google Platforms Rant}, + month = oct, + year = 2011, + note = {\url{https://plus.google.com/+RipRowan/posts/eVeouesvaVX}}, +} + +%S + +@inproceedings{ sahai02automatedsla, + author = {Akhil Sahai and others}, + title = {Automated SLA Monitoring for Web Services}, + booktitle = {IEEE/IFIP DSOM}, + year = {2002}, + pages = {28-41}, + publisher = {Springer-Verlag} +} + +@inproceedings{ schollmeier01definition, + author = {Schollmeier, Rudiger}, + title = {A Definition of Peer-to-Peer Networking for the + Classification of Peer-to-Peer Architectures and Applications}, + booktitle = {1st International Conference on Peer-to-Peer Computing}, + month = aug, + year = 2001, + location = {Linkoping, Sweden}, +} + +@inproceedings{ semke98automatic, + author = {Jeffrey Semke and Matthew Mathis and Jamshid Mahdavi}, + title = {Automatic TCP Buffer Tuning}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = sep, + year = 1998, + location = {Vancouver, BC, Canada}, +} + +@article{schneider1990implementing, + title={Implementing fault-tolerant services using the state machine approach: A tutorial}, + author={Schneider, Fred B}, + journal={ACM Computing Surveys (CSUR)}, + volume={22}, + number={4}, + pages={299--319}, + year={1990}, + publisher={ACM} +} + +@article{ serjantov03trickle, + Author = {Serjantov, Andrei and Dingledine, Roger and Syverson, Paul}, + Title = {From a Trickle to a Flood: + Active Attacks on Several Mix Types}, + booktitle = {5th International Workshop on Information Hiding}, + Year = {2002}, +} + +@inproceedings{ sherr09scalable, + author = {Micah Sherr and Matt Blaze and Boon Thau Loo}, + title = {Scalable Link-Based Relay Selection for Anonymous Routing}, + booktitle = {9th \bibbrev{PETS}{Privacy-Enhancing + Technologies Symposium}}, + month = aug, + year = 2009, + location = {Seattle, WA}, +} + +@inproceedings{silverston07measuring, + author = {Thomas Silverston and Olivier Fourmaux}, + title = {Measuring P2P IPTV Systems}, + booktitle = {17th \bibbrev{NOSSDA}{International Workshop on Network and + Operating Systems Support for Digital Audio \& Video}}, +} + +% author = {Emin G\"un Sirer and Sharad Goel and Mark Robson +% and Do\v{g}an Engin}, +@inproceedings{ sirer04eluding, + author = {Sirer, Emin G\"un and Goel, Sharad and Robson, Mark + and Engin, D\v{o}gan}, + title = {Eluding Carnivores: File Sharing with Strong Anonymity}, + booktitle = {11th ACM SIGOPS European Workshop}, + month = sep, + year = 2004, +} + +@INPROCEEDINGS{Skene04preciseservice, + author = {James Skene and D. Davide Lamanna and Wolfgang Emmerich}, + title = {Precise Service Level Agreements}, + booktitle = {In: Proc. of 26th Intl. Conference on Software Engineering + (ICSE)}, + year = {2004}, + pages = {179-188}, + publisher = {IEEE Press} +} + +@inproceedings{ smits11bridgespa, + author = {Rob Smits and others}, + title = {{BridgeSPA}: Improving {Tor} Bridges with + Single Packet Authorization}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the + Electronic Society}}, + month = oct, + year = 2011, + location = {Chicago, IL}, +} + +@misc{ smux, + author = {Jim Gettys and Henrik Frystyk Nielsen}, + title = "{SMUX Protocol Specification}", + booktitle = {W3C working draft (expired)}, + note = {\url{http://www.w3.org/TR/WD-mux}}, + month = jul, + year = 1998 +} + +@inproceedings{song12faceless, + author = {Xiaoxiao Song and + David Isaac Wolinsky and + Bryan Ford}, + title = {Faceless: decentralized anonymous group messaging for online + social networks}, + booktitle = {\bibconf{SNS}{EuroSys Workshop on Social Network Systems}}, + year = {2012}, + month = {April}, +} + +@misc{ spdy, + title = {{SPDY}: An Experimental Protocol For a Faster {Web}}, + note = {\url{http://www.chromium.org/spdy/spdy-whitepaper}}, +} + +@INPROCEEDINGS{srivastava03Web, + author = {Biplav Srivastava and Jana Koehler}, + title = {Web Service Composition - Current Solutions and Open Problems}, + booktitle = {ICAPS 2003 Workshop on Planning for Web Services}, + year = {2003}, + pages = {28--35} +} + +@inproceedings{ stajano99cocaine, + author = {Frank Stajano and Ross Anderson}, + title = {The Cocaine Auction Protocol: + On The Power Of Anonymous Broadcast}, + booktitle = {3rd International Workshop on Information Hiding}, + month = sep, + year = 1999, +} + +@inproceedings{suchara11network, + author = {Martin Suchara and + Dahai Xu and + Robert D. Doverspike and + David Johnson and + Jennifer Rexford}, + title = {Network Architecture for Joint Failure Recovery and + Traffic Engineering}, + booktitle = {\bibconf{SIGMETRICS}{ACM SIGMETRICS}}, + location = {San Jose, CA}, + month = jun, + year = 2011 +} + +@article{ sundararaman05clock, + author = {Bharath Sundararaman and Ugo Buy and Ajay D. Kshemkalyani}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S1570870505000144?via%3Dihub}{Clock synchronization for wireless sensor networks: a survey}}, + journal = {Ad Hoc Networks}, + volume = 3, + number = 3, + month = may, + year = 2005, +} + +@inproceedings{stutzbach06understanding, + title={Understanding churn in peer-to-peer networks}, + author={Stutzbach, Daniel and Rejaie, Reza}, + booktitle={\bibconf{IMC}{ACM SIGCOMM conference on Internet measurement}}, + year={2006}, +} + +@inproceedings{ syverson11sleeping, + author = {Paul Syverson}, + title = {Sleeping dogs lie on a bed of onions but wake when mixed}, + booktitle = {\bibconf{HotPETs}{Hot Topics in + Privacy Enhancing Technologies}}, + month = jul, + year = 2011, + location = {Waterloo, Canada}, +} + +%T + +@misc{ tahrir, + key = {Tahrir}, + title = {The Tahrir Project}, + note = {\url{https://github.com/sanity/tahrir/wiki/Overview}}, +} + +@misc{ tails, + key = {Tails}, + title = {Tails: The Amnesic Incognito Live System}, + note = {\url{https://tails.boum.org/}}, + month = {September}, + year = {2012} +} + +@inproceedings{ tang10improved, + author = {Tang, Can and Goldberg, Ian}, + title = {An improved algorithm for {Tor} circuit scheduling}, + booktitle = {\bibconf[17th]{CCS}{ACM conference on + Computer and Communications Security}}, + month = oct, + year = {2010}, + location = {Chicago, IL}, +} + +@inproceedings{ terpstra10channel, + author = {Wesley W. Terpstra and Christof Leng and Max Lehn + and Alejandro P. Buchmann}, + title = {Channel-based Unidirectional Stream Protocol {(CUSP)}}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM} Mini Conference}, + month = mar, + year = 2010, +} + +@article{ thrasyvoulos10routing, + author = {Thrasyvoulos Spyropoulos and Rao Naveed Bin Rais and + Thierry Turletti and Katia Obraczka and Athanasios Vasilakos}, + title = {\href{https://link.springer.com/article/10.1007/s11276-010-0276-9}{Routing for disruption tolerant networks: taxonomy and design}}, + journal = {Wireless Networks}, + month = nov, + year = 2010, + volume = 16, + number = 8, + pages = {2349–2370}, +} + +@article{ tiloca17axiom, + title={\href{http://www.diva-portal.org/smash/get/diva2:1128111/FULLTEXT01.pdf}{Axiom: DTLS-based secure IoT group communication}}, + author={Tiloca, Marco and Nikitin, Kirill and Raza, Shahid}, + journal={ACM Transactions on Embedded Computing Systems}, + volume={16}, + number={3}, + month=apr, + year={2017} +} + +@misc{ titz01why, + author = {Olaf Titz}, + title = {Why {TCP} Over {TCP} Is A Bad Idea}, + month = apr, + year = 2001, + note = {\url{http://sites.inka.de/bigred/devel/tcp-tcp.html}}, +} + +@misc{ torbrowser, + title = {Tor Browser Bundle}, + note = {\url{https://www.torproject.org/projects/torbrowser.html.en}}, +} + +@inproceedings{ tran09sybil, + author = {Nguyen Tran and Bonan Min and Jinyang Li + and Lakshminarayanan Submaranian}, + title = {Sybil-resilient online content voting}, + booktitle = {\bibconf[6th]{NSDI}{Symposium on Networked System + Design and Implementation}}, + month = apr, + year = 2009, + pages = {15--28}, +} + +@inproceedings{ tsang05short, + author = {Patrick P. Tsang and Victor K. Wei}, + title = {Short Linkable Ring Signatures for E-voting, E-cash + and Attestation}, + booktitle = {\bibconf{ISPEC}{Information Security Practice + and Experience}}, + month = apr, + year = 2005, + location = {Singapore}, +} + +@inproceedings{tuulos04irc, + author={Tuulos, V.H. and Tirri, H.}, + booktitle={\bibconf{WI}{IEEE/WIC/ACM Conference on Web Intelligence}}, + title={Combining Topic Models and Social Networks for Chat Data Mining}, + year={2004}, + month={Sept}, +} + +@article{ varadhan00persistent, + author = {Kannan Varadhan and Ramesh Govindan and Deborah Estrin}, + title = {Persistent route oscillations in inter-domain routing}, + journal = {Computer Networks}, + volume = 32, + number = 1, + month = jan, + year = 2000, + pages = {1-16}, +} + +@inproceedings{ vasserman09membership, + author = {Eugene Vasserman and Rob Jansen and James Tyra + and Nicholas Hopper and Yongdae Kim}, + title = {Membership-Concealing Overlay Networks}, + booktitle = {\bibconf[16th]{CCS}{ACM conference on + Computer and Communications Security}}, + location = {Chicago, IL}, + month = nov, + year = 2009 +} + +@inproceedings{ venkataraman06chunkyspread, + author = {Vidhyashankar Venkataraman and Kaouru Yoshida + and Paul Francis}, + title = {\href{http://www.ieee-icnp.org/2006/papers/s1a1.pdf}{Chunkyspread: Heterogeneous Unstructured Tree-Based + Peer-to-Peer Multicast}}, + booktitle = {\bibconf[14th]{ICNP}{International Conference on + Network Protocols}}, + month = nov, + year = 2006, + location = {Santa Barbara, CA}, + url = {http://www.ieee-icnp.org/2006/papers/s1a1.pdf}, +} + +@inproceedings{ viswanath12canal, + author = {Bimal Viswanath and Mainack Mondal and Krishna P. Gummadi and + Alan Mislove and Ansley Post}, + title = {Canal: Scaling Social Network-Based Sybil Tolerance Schemes}, + booktitle = {\bibconf{SNS}{EuroSys Workshop on Social Network Systems}}, + year = {2012}, + month = {April}, +} + +@inproceedings{ vratonjic10integrity, + author = {Nevena Vratonjic and Julien Freudiger and Jean-Pierre Hubaux}, + title = {Integrity of the Web Content: The Case of Online Advertising}, + booktitle = {\bibbrev{CollSec}{Workshop on Collaborative Methods + for Security and Privacy}}, + month = aug, + year = 2010, + location = {Washington, DC}, +} + +%W + +@inproceedings{ wolinsky13buddies, + author = {David Isaac Wolinsky and Ewa Syta and Bryan Ford}, + title = {Hang With Your Buddies to Resist Intersection Attacks}, + booktitle = {\bibconf[20th]{CCS}{Conference on Computer and Communications Security}}, + month = {November}, + year = {2013}, +} + +@inproceedings{wang13artsense, + author = {Xinlei Oscar Wang and + Wei Cheng and + Prasant Mohapatra and + Tarek F. Abdelzaher}, + title = {{ARTS}ense: {A}nonymous reputation and trust in participatory + sensing}, + booktitle = {\bibconf[32nd]{INFOCOM}{IEEE International Conference on + Computer Communications}}, + location = {Turin, Italy}, + month = apr, + year = 2013 +} + + +@inproceedings{ waidner89dining, + author = {Michael Waidner and Birgit Pfitzmann}, + title = {The {Dining Cryptographers} in the Disco: + Unconditional Sender and Recipient Untraceability + with Computationally Secure Serviceability}, + booktitle = {Eurocrypt}, + location = {Houthalen, Belgium}, + month = apr, + year = 1989, + pages = {302--319}, +} + +@inproceedings{ weinberg12stegotorus, + author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and + Linda Briesemeister and Steven Cheung and Frank Wang and + Dan Boneh}, + title = {{StegoTorus}: a camouflage proxy for the + {Tor} anonymity system}, + booktitle = {\bibconf[19th]{CCS}{ACM conference on + Computer and Communications Security}}, + month = oct, + year = {2012}, + location = {Raleigh, NC}, +} + +@misc{ whonix, + key = {Whonix}, + title = {Whonix}, + note = {\url{http://sourceforge.net/p/whonix}}, +} + +@inproceedings{winstein13tcp, + author = {Keith Winstein and Hari Balakrishnan}, + title = {{TCP ex Machina}: Computer-Generated Congestion Control}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + year = {2013}, + month = aug, + location = {Hong Kong, China}, +} + +@misc{ wortham2010cellphones, + title = {{Cellphones Now Used More for Data Than for Calls}}, + author = {Jenna Wortham}, + publisher = {New York Times}, + day = 13, + month = may, + year = 2010, + note = {\url{http://www.nytimes.com/2010/05/14/technology/personaltech/14talk.html}}, +} + +% author = {Ye Wang and Hao Wang and Ajay Mahimkar and Richard Alimi +% and Yin Zhang and Lili Qiu and Y. Richard Yang}, +@inproceedings{ wang10r3, + author = {Ye Wang and others}, + title = {R3: Resilient Routing Reconfiguration}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2010, + location = {New Delhi, India}, +} + +@inproceedings{ wang15seeing, + title={\href{https://censorbib.nymity.ch/pdf/Wang2015a.pdf}{Seeing through + network-protocol obfuscation}}, + author={Wang, Liang and Dyer, Kevin P and Akella, Aditya and Ristenpart, + Thomas and Shrimpton, Thomas}, + booktitle={22nd ACM Conference on Computer and Communications Security + (CCS)}, + pages={57--69}, + month=oct, + year={2015} +} + +@misc{ web100, + title = "{The Web100 Project}", + note = {\url{http://www.web100.org}} +} + +@unpublished{ wiedemann11dissenterr2, + author = {Andrew Wiedemann and Doug von Kohorn and Henry Corrigan-Gibbs and Bryan Ford}, + title = {Dissent: Accountable Anonymous Group Messaging, Erratum 2}, + year = {2011}, + note = {\url{http://dedis.cs.yale.edu/2010/anon/papers/ccs10/erratum2.pdf}} +} + +@inproceedings{wolinsky09vpn, + author = {David Isaac Wolinsky and Yonggang Liu and Pierre St. Juste + and Girish Venkatasubramanian and Renato Figueiredo}, + title = {On the Design of Scalable, Self-Configuring Virtual Networks}, + booktitle = {IEEE/ACM Supercomputing}, + month = {November}, + year = {2009} +} + +@inproceedings{wolinsky11grid, + author = {David Isaac Wolinsky and Renato Figueiredo}, + title = {Experiences with Self-Organizing Decentralized Grids Using the Grid Appliance}, + booktitle = {\bibconf{ACM HPDC}{International Symposium on High Performance Distributed Computing}}, + year = 2011, +} + + +@inproceedings{ wolinsky12scalable, + author = {Wolinsky, David Isaac and Corrigan-Gibbs, Henry and + Ford, Bryan and Johnson, Aaron}, + title = {Scalable Anonymous Group Communication in the Anytrust Model}, + booktitle = {\bibconf{EuroSec}{European Workshop + on System Security}}, + month = apr, + day = 10, + year = 2012, + location = {Bern, Switzerland}, +} + +@inproceedings{ wolinsky12dissent, + author = {Wolinsky, David Isaac and Corrigan-Gibbs, Henry + and Johnson, Aaron and Ford, Bryan}, + title = {Dissent in Numbers: Making Strong Anonymity Scale}, + booktitle = {\bibconf[10th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}}, + month = oct, + year = 2012, +} + +@inproceedings{wolinsky13grid, + year={2013}, + booktitle={Cluster Computing}, + title={Experiences with self-organizing, decentralized grids using the grid appliance}, + author={Wolinsky, David Isaac and Chuchaisri, Panoat and Lee, Kyungyong and Figueiredo, Renato}, +} + +@inproceedings{ wolinsky14bootstrap, + title = {Dissent Design Document}, + note = {\url{https://github.com/DeDiS/Dissent/blob/master/DESIGN}}, + year = {2014} +} + +@inproceedings{wu12netpilot, + author = {Xin Wu and + Daniel Turner and + Chao-Chih Chen and + David A. Maltz and + Xiaowei Yang and + Lihua Yuan and + Ming Zhang}, + title = {Net{P}ilot: {A}utomating datacenter network + failure mitigation}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Helsinki, Finland}, + month = aug, + year = 2012 +} + + +%X + +@inproceedings{xie05static, + author = {Geoffrey G. Xie and + Jibin Zhan and + David A. Maltz and + Hui Zhang and + Albert G. Greenberg and + G\'{\i}sli Hj{\'a}lmt{\'y}sson and + Jennifer Rexford}, + title = {On Static Reachability Analysis of {IP} Networks}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + location = {Miami, FL}, + month = mar, + year = 2005 +} + +%Y + +%%%% +% It looks like this paper was (at least) partially plagarized from: +% "k-Anonymous Message Transmission" +% von Ahn, Bortz, and Hopper (CCS'03) +% +% inproceedings{ yao04new, +% author = {Gang Yao and Dengguo Feng}, +% title = {A New $k$-Anonymous Message Transmission Protocol}, +% booktitle = {\bibbrev{WISA}{Workshop on +% Information Security Applications (WISA)}}, +% month = aug, +% year = 2004, +% location = {Jeju Island, Korea}, +% } + +%Z + +@INPROCEEDINGS{zec02estimating, + author = {Marko Zec and Miljenko Mikuc and Mario Zagar}, + title = "Estimating the Impact of Interrupt Coalescing Delays on Steady State {TCP} Throughput", + booktitle = {SoftCOM}, + year = {2002} +} + +@ARTICLE{Zeng04qos-awaremiddleware, + author = {Liangzhao Zeng and others}, + title = {QoS-aware middleware for Web services composition}, + journal = {IEEE Transactions on Software Engineering}, + year = {2004}, + volume = {30}, + pages = {311--327} +} + +@inproceedings{zhang04planetseer, + author = {Ming Zhang and Chi Zhang and Vivek Pai and Larry Peterson and Randy Wang}, + title = {{PlanetSeer}: Internet path failure monitoring +and characterization in wide-area services}, + booktitle = {OSDI}, + year = 2004 +} + +@inproceedings{ zhao02brocade, + author = {Zhao, Ben Y. and Duan, Yitao and Huang, Ling and + Joseph, Anthony D. and Kubiatowicz, John}, + title = {Brocade: Landmark Routing on Overlay Networks}, + booktitle = {1st International Workshop on Peer-to-Peer Systems}, + month = mar, + year = 2002, +} + +@book{ zhao04wireless, + author = {Feng Zhao and Leonidas Guibas}, + title = {Wireless Sensor Networks: An Information Processing Approach}, + publisher = {Morgan Kaufmann}, + month = jul, + year = 2004, + isbn = {978-1493303779}, + pages = {376}, +} + +@article{ day83osi, + author = {John D. Day and Hubert Zimmermann}, + title = {\href{https://ieeexplore.ieee.org/abstract/document/1457043}{The {OSI} Reference Model}}, + journal = {Proceedings of the IEEE}, + volume = 71, + number = 12, + month = dec, + year = 1983, +} + + +%%%%% RFCs + +@misc{ rfc768, + author = {J. Postel}, + title = {User Datagram Protocol}, + month = aug, + year = 1980, + note = {RFC 768}, +} + +@misc{ rfc791, + key = "IP", + title = "Internet Protocol", + month = sep, + year = "1981", + note = "RFC 791", +} + +@misc{ rfc792, + author = {J. Postel}, + title = {Internet Control Message Protocol}, + month = sep, + year = 1981, + note = {RFC 792}, +} + +@misc{ rfc793, + key = "TCP", + title = "Transmission Control Protocol", + month = sep, + year = "1981", + note = "RFC 793", +} + +@misc{ rfc813, + author = {David D. Clark}, + title = {Window and Acknowledgement Strategy in {TCP}}, + month = jul, + year = 1982, + note = {RFC 813}, +} + +@misc{ rfc821, + author = {Jonathan B. Postel}, + title = {Simple Mail Transfer Protocol}, + month = aug, + year = 1982, + note = {RFC 821}, +} + +@misc{ rfc826, + author = "David C. Plummer", + title = "An Ethernet Address Resolution Protocol", + month = nov, + year = "1982", + note = "RFC 826", +} + +@misc{ rfc854, + author = "J. Postel and J. Reynolds", + title = "Telnet Protocol Specification", + month = may, + year = 1983, + note = "RFC 854", +} + +@misc{ rfc896, + author = "J. Nagle", + title = "{Congestion Control in IP/TCP Internetworks}", + month = jan, + year = 1984, + note = "RFC 896", +} + +% Note: updated by rfc1151 +@misc{ rfc908, + author = {David Velten and Robert Hinden and Jack Sax}, + title = {Reliable Data Protocol}, + month = jul, + year = 1984, + note = {RFC 908}, +} + +@misc{ rfc955, + author = {R. Braden}, + title = {Towards a Transport Service for + Transaction Processing Applications}, + month = sep, + year = 1985, + note = {RFC 955}, +} + +@misc{ rfc959, + author = {J. Postel and J. Reynolds}, + title = {File Transfer Protocol {(FTP)}}, + month = oct, + year = 1985, + note = {RFC 959}, +} + +@misc{ rfc1009, + author = {R. Braden and J. Postel}, + title = {Requirements for {Internet} Gateways}, + month = jun, + year = 1987, + note = {RFC 1009}, +} + +@misc{ rfc1016, + author = {W. Prue and J. Postel}, + title = {Something a Host Could Do with Source Quench: + The Source Quench Introduced Delay {(SQuID)}}, + month = jul, + year = 1987, + note = {RFC 1016}, +} + +@misc{ rfc1034, + author = "P. Mockapetris", + title = "Domain names: concepts and facilities", + month = nov, + year = 1987, + note = "RFC 1034", +} + +@misc{ rfc1035, + author = "P. Mockapetris", + title = "Domain names: implementation and specification", + month = nov, + year = "1987", + note = "RFC 1035", +} + +@misc{ rfc1036, + author = {M. Horton and R. Adams}, + title = {\href{https://tools.ietf.org/html/rfc1036}{Standard for Interchange of {USENET} Messages}}, + month = dec, + year = 1987, + note = {RFC 1036}, +} + +@misc{ rfc1058, + author = "C. Hedrick", + title = "Routing Information Protocol", + month = jun, + year = "1988", + note = "RFC 1058", +} + +@misc{ rfc1078, + author = {M. Lottor}, + title = {{TCP} port service Multiplexer {(TCPMUX)}}, + month = nov, + year = 1988, + note = {RFC 1078}, +} + +@misc{ rfc1122, + author = {R. {Braden, ed.}}, + title = {Requirements for {Internet} Hosts -- Communication Layers}, + month = oct, + year = 1989, + note = {RFC 1122}, +} + +@misc{ rfc1151, + author = {C. Partridge and R. Hinden}, + title = {Version 2 of the Reliable Data Protocol {(RDP)}}, + month = apr, + year = 1990, + note = {RFC 1151}, +} + +@misc{ rfc1247, + author = "J. Moy", + title = "{OSPF} Version 2", + month = jul, + year = "1991", + note = "RFC 1247", +} + +@misc{ rfc1258, + author = "B. Kantor", + title = "{BSD} {Rlogin}", + month = sep, + year = 1991, + note = "RFC 1258", +} + +@misc{ rfc1263, + author = {S. O'Malley and L. Peterson}, + title = {{TCP} Extensions Considered Harmful}, + month = oct, + year = 1991, + note = {RFC 1263}, +} + +@misc{ rfc1323, + author = "V. Jacobson and R. Braden and D. Borman", + title = "{TCP} Extensions for High Performance", + month = may, + year = 1992, + note = "RFC 1323", +} + +% same as saltzer82naming? +@misc{ rfc1498, + author = {J. Saltzer}, + title = {On the Naming and Binding of Network Destinations}, + month = aug, + year = 1993, + note = "RFC 1498", +} + +@misc{ rfc1518, + author = "Y. Rekhter and T. {Li (editors)}", + title = "An Architecture for {IP} Address Allocation with {CIDR}", + month = sep, + year = "1993", + note = "RFC 1518", +} + +@misc{ rfc1519, + author = "V. Fuller and T. Li and J. Yu and K. Varadhan", + title = "Classless Inter-Domain Routing {(CIDR)}: + an Address Assignment and Aggregation Strategy", + month = sep, + year = "1993", + note = "RFC 1519", +} + +@misc{ rfc1631, + author = {K. Egevang and P. Francis}, + title = {The {IP} Network Address Translator {(NAT)}}, + month = may, + year = 1994, + note = {RFC 1631}, +} + +@misc{ rfc1644, + author = "R. Braden", + title = "{T/TCP} -- {TCP} Extensions for Transactions", + month = jul, + year = 1994, + note = "RFC 1644", +} + +@misc{ rfc1705, + author = {R. Carlson and D. Ficarella}, + title = "Six Virtual Inches to the Left: The Problem with {IPng}", + month = oct, + year = 1995, + note = "RFC 1705", +} + +@misc{ rfc1771, + author = "Y. Rekhter and T. {Li (editors)}", + title = "A Border Gateway Protocol 4 {(BGP-4)}", + month = mar, + year = "1995", + note = "RFC 1771", +} + +@misc{ rfc1812, + author = {F. {Baker, ed.}}, + title = {Requirements for {IP} Version 4 Routers}, + month = jun, + year = 1995, + note = {RFC 1812}, +} + +@misc{ rfc1831, + author = {R. Srinivasan}, + title = {{RPC:} Remote Procedure Call Protocol Specification Version 2}, + month = aug, + year = 1995, + note = {RFC 1831}, +} + +@misc{ rfc1832, + author = {R. Srinivasan}, + title = {{XDR:} External Data Representation Standard}, + month = aug, + year = 1995, + note = {RFC 1832}, +} + +@misc{ rfc1833, + author = {R. Srinivasan}, + title = {Binding Protocols for {ONC RPC} Version 2}, + month = aug, + year = 1995, + note = {RFC 1833}, +} + +@misc{ rfc1858, + author = {G. Ziemba and D. Reed and P. Traina}, + title = {Security Considerations for IP Fragment Filtering}, + month = oct, + year = 1995, + note = {RFC 1858}, +} + +@misc{ rfc1881, + author = "IAB and IESG", + title = "{IPv6} Address Allocation Management", + month = dec, + year = "1995", + note = "RFC 1881", +} + +@misc{ rfc1887, + author = "Y. Rekhter and T. Li", + title = "An Architecture for {IPv6} Unicast Address Allocation", + month = dec, + year = "1995", + note = "RFC 1887", +} + +@misc{ rfc1918, + author = "Y. Rekhter and others", + title = "Address Allocation for Private Internets", + month = feb, + year = 1996, + note = "RFC 1918", +} + + +@misc{ rfc1928, + author = "M. Leech and others", + title = "{SOCKS} Protocol", + month = mar, + year = "1996", + note = "RFC 1928", +} + +@misc{ rfc1939, + author = {J. Myers and M. Rose}, + title = {Post Office Protocol -- Version 3}, + month = may, + year = 1996, + note = {RFC 1939}, +} + +@misc{ rfc1945, + author = "T. Berners-Lee and R. Fielding and H. Frystyk", + title = "Hypertext Transfer Protocol -- {HTTP/1.0}", + month = may, + year = 1996, + note = "RFC 1945", +} + +@misc{ rfc1948, + author = "S. Bellovin", + title = "Defending Against Sequence Number Attacks", + month = may, + year = 1996, + note = "RFC 1948", +} + +@misc{ rfc1950, + author = {P. Deutsch and J-L. Gailly}, + title = {{ZLIB} Compressed Data Format Specification version 3.3}, + month = may, + year = 1996, + note = "RFC 1950", +} + +@misc{ rfc1955, + author = {R. Hinden}, + title = {New Scheme for {Internet} Routing and Addressing {(ENCAPS)} + for {IPNG}}, + month = jun, + year = 1996, + note = "RFC 1955", +}, + +@misc{ rfc1992, + author = "I. Castineyra and N. Chiappa and M. Steenstrup", + title = "The {Nimrod} Routing Architecture", + month = aug, + year = "1996", + note = "RFC 1992", +} + +@misc{ rfc2008, + author = {Y. Rekhter and T. Li}, + title = {Implications of Various Address Allocation Policies + for {Internet} Routing}, + month = oct, + year = 1996, + note = {RFC 2008}, +} + +@misc{ rfc2018, + author = "M. Mathis and J. Mahdav and S. Floyd and A. Romanow", + title = "{TCP} Selective Acknowledgment Options", + month = oct, + year = 1996, + note = "RFC 2018", +} + +@misc{ rfc2050, + author = "K. Hubbard and M. Kosters and D. Conrad and D. Karrenberg and J. Postel", + title = "Internet Registry {IP} Allocation Guidelines", + month = nov, + year = "1996", + note = "RFC 2050", +} + +@misc{ rfc2076, + author = {J. Palme}, + title = {Common Internet Message Headers}, + month = feb, + year = 1997, + note = {RFC 2076}, +} + +@misc{ rfc2101, + author = "B. Carpenter and J. Crowcroft and Y. Rekhter", + title = "{IPv4} Address Behaviour Today", + month = feb, + year = "1997", + note = "RFC 2101", +} + +@misc{ rfc2103, + author = "R. Ramanathan", + title = "Mobility Support for {Nimrod}: + Challenges and Solution Approaches", + month = feb, + year = "1997", + note = "RFC 2103", +} + +@misc{ rfc2131, + author = "R. Droms", + title = "Dynamic Host Configuration Protocol", + month = mar, + year = "1997", + note = "RFC 2131", +} + +@misc{ rfc2132, + author = {S. Alexander and R. Droms}, + title = {{DHCP} Options and {BOOTP} Vendor Extensions}, + month = mar, + year = 1997, + note = {RFC 2132}, +} + +@misc{ rfc2136, + author = "P. {Vixie, Editor} and S. Thomson and Y. Rekhter and J. Bound", + title = "Dynamic Updates in the Domain Name System", + month = apr, + year = "1997", + note = "RFC 2136", +} + +@misc{ rfc2140, + author = {J. Touch}, + title = {{TCP} Control Block Interdependence}, + month = apr, + year = 1997, + note = "RFC 2140", +} + +@misc{ rfc2205, + author = {R. {Braden, Ed.}}, + title = {Resource ReSerVation Protocol {(RSVP)} -- + Version 1 Functional Specification}, + month = sep, + year = 1997, + note = {RFC 2205}, +} + +@misc{ rfc2228, + author = {M. Horowitz and S. Lunt}, + title = {{FTP} Security Extensions}, + month = oct, + year = 1997, + note = {RFC 2228}, +} + +% obsoleted by rfc4346, rfc5246, rfc8446 +@misc{ rfc2246, + author = "T. Dierks and C. Allen", + title = "The {TLS} Protocol Version 1.0", + month = jan, + year = "1999", + note = "RFC 2246", +} + +@misc{ rfc2260, + author = "T. Bates and Y. Rekhter", + title = "Scalable Support for Multi-homed Multi-provider Connectivity", + month = jan, + year = 1998, + note = "RFC 2260", +} + +@misc{ rfc2309, + author = {B. Braden and others}, + title = {Recommendations on Queue Management and Congestion Avoidance + in the {Internet}}, + month = apr, + year = 1998, + note = "RFC 2309", +} + +@misc{ rfc2326, + author = {H. Schulzrinne and A. Rao and R. Lanphier}, + title = {Real Time Streaming Protocol {(RTSP)}}, + month = apr, + year = 1998, + note = {RFC 2326}, +} + +% Note: obsoleted by RFC 4301 +@misc{ rfc2401, + author = "S. Kent and R. Atkinson", + title = "Security Architecture for the {Internet Protocol}", + month = nov, + year = "1998", + note = "RFC 2401", +} + +% Note: obsoleted by RFC 4303 +@misc{ rfc2406, + author = "S. Kent and R. Atkinson", + title = "{IP} Encapsulating Security Payload", + month = nov, + year = "1998", + note = "RFC 2406", +} +% title = "{IP} Encapsulating Security Payload {(ESP)}", + +@misc{ rfc2460, + author = "S. Deering and R. Hinden", + title = "Internet Protocol, Version 6 {(IPv6)} Specification", + month = dec, + year = "1998", + note = "RFC 2460", +} + +@misc{ rfc2462, + author = "S. Thomson and T. Narten", + title = "{IPv6} Stateless Address Autoconfiguration", + month = dec, + year = "1998", + note = "RFC 2462", +} + +@misc{ rfc2527, + author = {S. Chokhani and W. Ford}, + title = {Internet {X.509} Public Key Infrastructure + Certificate Policy and Certification Practices Framework}, + month = mar, + year = 1999, + note = {RFC 2527}, +} + + +@misc{ rfc2535, + author = "D. Eastlake", + title = "Domain Name System Security Extensions", + month = mar, + year = "1999", + note = "RFC 2535", +} + +@misc {rfc2536, + author = "D. EastLake", + title = "{DSA} {KEYs} and {SIGs} in the {Domain Name System (DNS)}", + month = mar, + year = "1999", + note = "RFC 2536", +} + +@misc{ rfc2581, + author = "M. Allman and V. Paxson and W. Stevens", + title = "{TCP} Congestion Control", + month = apr, + year = "1999", + note = "RFC 2581", +} + +@misc{ rfc2616, + author = {R. Fielding and others}, + title = {Hypertext Transfer Protocol -- {HTTP/1.1}}, + month = jun, + year = 1999, + note = {RFC 2616}, +} + +@misc{ rfc2647, + author = {D. Newman}, + title = {Benchmarking Terminology for Firewall Performance}, + month = aug, + year = 1999, + note = {RFC 2647}, +} + +@misc{ rfc2663, + author = "P. Srisuresh and M. Holdrege", + title = "{IP} Network Address Translator {(NAT)} + Terminology and Considerations", + month = aug, + year = "1999", + note = "RFC 2663", +} + +@misc{rfc2692, + author={C. Ellison}, + title="{SPKI Requirements}", + year=1999, + month=sep, + note={RFC 2692} +} + +@misc{rfc2693, + author={C. Ellison and others}, + title="{SPKI Certificate Theory}", + year=1999, + month=sep, + note={RFC 2693} +} + +@misc{ rfc2757, + author = {G. Montenegro and others}, + title = {Long Thin Networks}, + month = jan, + year = 2000, + note = {RFC 2757}, +} + +@misc{ rfc2764, + title = "{A Framework for IP Based Virtual Private Networks}", + author = "B. Gleeson and others", + year = "2000", + month = feb, + note = "RFC 2764", +} + +@misc{ rfc2766, + author = "G. Tsirtsis and P. Srisuresh", + title = "Network Address Translation - Protocol Translation {(NAT-PT)}", + month = feb, + year = "2000", + note = "RFC 2766", +} + +@misc{ rfc2782, + author = "A. Gulbrandsen and P. Vixie and L. Esibov", + title = "A {DNS} {RR} for specifying the location of services + {(DNS SRV)}", + month = feb, + year = "2000", + note = "RFC 2782", +} + +@misc{ rfc2818, + author = {E. Rescorla}, + title = {{HTTP} Over {TLS}}, + month = may, + year = 2000, + note = {RFC 2818}, +} + +@misc{ rfc2821, + author = {J. {Klensin, ed.}}, + title = {Simple Mail Transfer Protocol}, + month = apr, + year = 2001, + note = {RFC 2821}, +} + +@misc{ rfc2822, + author = {P. {Resnick, ed.}}, + title = {Internet Message Format}, + month = apr, + year = 2001, + note = {RFC 2822}, +} + +@misc{ rfc2883, + author = "S. Floyd and J. Mahdavi and M. Mathis and M. Podolsky", + title = "An Extension to the Selective Acknowledgement + {(SACK)} Option for {TCP}", + month = jul, + year = 2000, + note = "RFC 2883", +} + +@misc{ rfc2914, + author = "S. Floyd", + title = "Congestion Control Principles", + month = sep, + year = "2000", + note = "RFC 2914", +} + +% obsoleted by rfc4960 +@misc{ rfc2960, + author = "R. Stewart and others", + title = "Stream Control Transmission Protocol", + month = oct, + year = 2000, + note = "RFC 2960", +} + +@misc{ rfc2979, + author = {N. Freed}, + title = {Behavior of and Requirements for {Internet} Firewalls}, + month = oct, + year = 2000, + note = {RFC 2979}, +} + +@misc{ rfc3007, + author = "B. Wellington", + title = "Secure Domain Name System {(DNS)} Dynamic Update", + month = nov, + year = "2000", + note = "RFC 3007", +} + +@misc{ rfc3022, + author = "P. Srisuresh and K. Egevang", + title = "Traditional {IP} Network Address Translator + {(Traditional NAT)}", + month = jan, + year = "2001", + note = "RFC 3022", +} + +@misc{ rfc3027, + author = "M. Holdrege and P. Srisuresh", + title = "Protocol Complications + with the {IP} Network Address Translator", + month = jan, + year = "2001", + note = "RFC 3027", +} + +@misc{ rfc3080, + author = {M. Rose}, + title = {The Blocks Extensible Exchange Protocol Core}, + month = mar, + year = 2001, + note = "RFC 3080", +} + +@misc{ rfc3102, + author = "M. Borella and J. Lo and D. Grabelsky and G. Montenegro", + title = "Realm Specific {IP}: Framework", + month = oct, + year = "2001", + note = "RFC 3102", +} + +% author = {J. Border and M. Kojo and J. Griner and G. Montenegro +% and Z. Shelby}, +@misc{ rfc3135, + author = {J. Border and others}, + title = {Performance Enhancing Proxies Intended to Mitigate + Link-Related Degradations}, + month = jun, + year = 2001, + note = {RFC 3135}, +} + +@misc{ rfc3142, + author = {J. Hagino and K. Yamamoto}, + title = {An {IPv6}-to-{IPv4} Transport Relay Translator}, + month = jun, + year = 2001, + note = {RFC 3142}, +} + +@misc{ rfc3161, + author = {C. Adams and P. Cain and D. Pinkas and R. Zuccherato}, + title = {Internet X.509 Public Key Infrastructure + Time-Stamp Protocol (TSP)}, + month = aug, + year = 2001, + note = {RFC 3161}, +} + +@misc{ rfc3168, + author = {K. Ramakrishnan and S. Floyd and D. Black}, + title = {The Addition of Explicit Congestion Notification {(ECN)} + to {IP}}, + month = sep, + year = 2001, + note = {RFC 3168}, +} + +@misc{ rfc3178, + author = "J. Hagino and H. Snyder", + title = "{IPv6} Multihoming Support at Site Exit Routers", + month = oct, + year = "2001", + note = "RFC 3178", +} + +@misc{ rfc3234, + author = "Brian Carpenter and Scott Brim", + title = "{Middleboxes: Taxonomy and Issues}", + month = feb, + year = "2002", + note = "RFC 3234", +} + +@misc{ rfc3235, + author = "D. Senie", + title = "Network Address Translator {(NAT)}-Friendly + Application Design Guidelines", + month = jan, + year = "2002", + note = "RFC 3235", +} + +@misc{ rfc3261, + author = "J. Rosenberg and others", + title = "{SIP:} Session Initiation Protocol", + month = jun, + year = 2002, + note = "RFC 3261", +} + +@misc{ rfc3280, + author = "R. Housley and W. Polk and W. Ford and D. Solo", + title = "Internet {X.509} Public Key Infrastructure + Certificate and Certificate Revocation List {(CRL)} Profile", + month = apr, + year = 2002, + note = "RFC 3280", +} + +@misc{ rfc3303, + author = "P. Srisuresh and J. Kuthan and J. Rosenberg and A. Molitor + and A. Rayhan", + title = "Middlebox communication architecture and framework", + month = aug, + year = "2002", + note = "RFC 3303", +} + +@misc{ rfc3315, + author = {R. {Droms, editor} and J. Bound and B. Volz and T. Lemon + and C. Perkins and M. Carney}, + title = {Dynamic Host Configuration Protocol for {IPv6} {(DHCPv6)}}, + month = jul, + year = 2003, + note = {RFC 3315}, +} + +@misc{ rfc3344, + author = "C. {Perkins, Editor}", + title = "{IP} Mobility Support for {IPv4}", + month = aug, + year = "2002", + note = "RFC 3344", +} + +@misc{ rfc3428, + author = "B. {Campbell, Editor}", + title = "{Session Initiation Protocol Extension for Instant Messaging}", + month = dec, + year = "2002", + note = "RFC 3428", +} + +@misc{ rfc3448, + author = "M. Handley and S. Floyd and J. Padhye and J. Widmer", + title = "{TCP} Friendly Rate Control {(TFRC)}: Protocol Specification", + month = jan, + year = 2003, + note = "RFC 3448", +} + +@misc{ rfc3489, + author = "J. Rosenberg and others", + title = "{STUN} - Simple Traversal of User Datagram Protocol {(UDP)} + Through Network Address Translators {(NATs)}", + month = mar, + year = "2003", + note = "RFC 3489", +} + +@misc{ rfc3501, + author = {M. Crispin}, + title = {Internet Message Access Protocol - Version 4rev1}, + month = mar, + year = 2003, + note = {RFC 3501}, +} + +@misc{ rfc3514, + author = {S. Bellovin}, + title = {The Security Flag in the {IPv4} Header}, + month = apr, + year = 2003, + note = {RFC 3514}, +} + +@misc{ rfc3519, + author = {H. Levkowetz and S. Vaarala}, + title = {Mobile {IP} Traversal of Network Address Translation + {(NAT)} Devices}, + month = apr, + year = 2003, + note = {RFC 3519}, +} + + +@misc{ rfc3530, + author = {S. Shepler and B. Callaghan and D. Robinson and R. Thurlow + and C. Beame and M. Eisler and D. Noveck}, + title = {Network File System {(NFS)} version 4 Protocol}, + month = apr, + year = 2003, + note = {RFC 3530}, +} + +@misc{ rfc3550, + author = {H. Schulzrinne and S. Casner and R. Frederick + and V. Jacobson}, + title = {{RTP}: A Transport Protocol for Real-Time Applications}, + month = jul, + year = 2003, + note = "RFC 3550", +} + +@misc{ rfc3582, + author = "J. Abley and B. Black and V. Gill", + title = "Goals for {IPv6} Site-Multihoming Architectures", + month = aug, + year = "2003", + note = "RFC 3582", +} + +@misc{ rfc3633, + author = "O. Troan and R. Droms", + title = "{IPv6} Prefix Options for + Dynamic Host Configuration Protocol {(DHCP)} version 6", + month = dec, + year = 2003, + note = "RFC 3633", +} + +@misc{ rfc3649, + author = {S. Floyd}, + title = {{HighSpeed TCP} for Large Congestion Windows}, + month = dec, + year = 2003, + note = {RFC 3649}, +} + +@misc{ rfc3686, + author = {R. Housley}, + title = {Using Advanced Encryption Standard {(AES)} Counter Mode + With {IPsec} Encapsulating Security Payload {(ESP)}}, + month = jan, + year = 2004, + note = {RFC 3686}, +} + +@misc{ rfc3708, + author = {E. Blanton and M. Allman}, + title = {Using {TCP} Duplicate Selective Acknowledgement {(DSACKs)} and + Stream Control Transmission Protocol {(SCTP)} + Duplicate Transmission Sequence Numbers {(TSNs)} + to Detect Spurious Retransmissions}, + month = feb, + year = 2004, + note = {RFC 3708}, +} + +@misc{ rfc3715, + author = {B. Aboba and W. Dixon}, + title = {{IPsec-Network Address Translation (NAT) Compatibility Requirements}}, + month = mar, + year = 2005, + note = {RFC 3715}, +} + +@misc{ rfc3720, + author = {J. Satran and K. Meth and C. Sapuntzakis and M. Chadalapaka + and E. Zeidner}, + title = {Internet Small Computer Systems Interface {(iSCSI)}}, + month = apr, + year = 2004, + note = {RFC 3720}, +} + +@misc{ rfc3758, + author = {R. Stewart and M. Ramalho and Q. Xie and M. Tuexen and P. Conrad}, + title = {SCTP Partial Reliability Extension}, + month = may, + year = 2004, + note = {RFC 3758}, +} + +@misc{ rfc3828, + author = "L-A. Larzon and M. Degermark and S. Pink and + L-E. {Jonsson, Ed.} and G. {Fairhurst, Ed.}", + title = "The Lightweight User Datagram Protocol {(UDP-Lite)}", + month = jul, + year = 2004, + note = "RFC 3828", +} + +@misc{ rfc3833, + author = {D. Atkins and R. Austein}, + title = {\href{http://tools.ietf.org/html/rfc3833}{Threat Analysis of the Domain Name System (DNS)}}, + month = aug, + year = 2004, + note = {RFC 3833}, +} + +@misc{ rfc3920, + author = "P. {Saint-Andre, Editor}", + title = {Extensible Messaging and Presence Protocol (XMPP): Core}, + month = oct, + year = 2004, + note = {RFC 3920}, +} + +@misc{ rfc3947, + author = {T. Kivinen}, + title = {Negotiation of {NAT}-Traversal in the {IKE}}, + month = jan, + year = 2005, + note = {RFC 3947}, +} + +@misc{ rfc3948, + author = {A. Huttunen and B. Swander and V. Volpe and L. DiBurro + and M. Stenberg}, + title = {{UDP} Encapsulation of {IPsec ESP} Packets}, + month = jan, + year = 2005, + note = {RFC 3948}, +} + +@misc{ rfc3972, + author = {T. Aura}, + title = {Cryptographically Generated Addresses (CGA)}, + month = mar, + year = 2005, + note = {RFC 3972}, +} + +@misc{ rfc3977, + author = {C. Feather}, + title = {Network News Transfer Protocol {(NNTP)}}, + month = oct, + year = 2006, + note = {RFC 3977}, +} + +@misc{ rfc4033, + author = "R. Arends and R. Austein and M. Larson + and D. Massey and S. Rose", + title = "{DNS Security Introduction and Requirements}", + month = mar, + year = 2005, + note = "RFC 4033", +} + +@misc{ rfc4116, + author = {J. Abley and K. Lindqvist and E. Davies and + B. Black and V. Gill}, + title = {{IPv4} Multihoming Practices and Limitations}, + month = jul, + year = 2005, + note = {RFC 4116}, +} + +@misc{ rfc4193, + author = {R. Hinden and B. Haberman}, + title = {Unique Local {IPv6} Unicast Addresses}, + month = oct, + year = 2005, + note = {RFC 4193}, +} + +@misc{ rfc4301, + author = "S. Kent and K. Seo", + title = "Security Architecture for the {Internet} Protocol", + month = dec, + year = "2005", + note = "RFC 4301", +} + +@misc{ rfc4302, + author = {S. Kent}, + title = {{IP} Authentication Header}, + month = dec, + year = 2005, + note = {RFC 4302}, +} + +@misc{ rfc4303, + author = "S. Kent", + title = "{IP} Encapsulating Security Payload {(ESP)}", + month = dec, + year = "2005", + note = "RFC 4303", +} + +@misc{ rfc4306, + author = {C. {Kaufman, Ed.}}, + title = {Internet Key Exchange {(IKEv2)} Protocol}, + month = dec, + year = 2005, + note = "RFC 4306", +} + +@misc{ rfc4251, + author = "T. Ylonen and C. {Lonvick, Ed.}", + title = "The Secure Shell Protocol Architecture", + month = jan, + year = 2006, + note = "RFC 4251", +} +% title = "The Secure Shell {(SSH)} Protocol Architecture", + +@misc{ rfc4252, + author = {T. Ylonen and C. {Lonvick, Ed.}}, + title = {The Secure Shell {(SSH)} Authentication Protocol}, + month = jan, + year = 2006, + note = {RFC 4252}, +} + +@misc{ rfc4253, + author = {T. Ylonen and C. {Lonvick, Ed.}}, + title = {\href{https://tools.ietf.org/html/rfc4253}{The Secure Shell {(SSH)} Transport Layer Protocol}}, + month = jan, + year = 2006, + note = {RFC 4253}, +} + +@misc{ rfc4254, + author = "T. Ylonen and C. {Lonvick, Ed.}", + title = "The Secure Shell {(SSH)} Connection Protocol", + month = jan, + year = 2006, + note = "RFC 4254", +} + +@misc{ rfc4271, + author = "Y. Rekhter and T. Li and S. {Hares (editors)}", + title = "A Border Gateway Protocol 4 {(BGP-4)}", + month = jan, + year = 2006, + note = "RFC 4271", +} + +@misc{ rfc4340, + author = "E. Kohler and M. Handley and S. Floyd", + title = "Datagram Congestion Control Protocol {(DCCP)}", + month = mar, + year = 2006, + note = "RFC 4340", +} + +@misc{ rfc4341, + author = "E. Kohler and S. Floyd", + title = "Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 2: TCP-like Congestion Control", + month = mar, + year = 2006, + note = "RFC 4341", +} + +@misc{ rfc4346, + author = {T. Dierks and E. Rescorla}, + title = {The Transport Layer Security {(TLS)} Protocol Version 1.1}, + month = apr, + year = 2006, + note = {RFC 4346}, +} + +@misc{ rfc4347, + author = "E. Rescorla and N. Modadugu", + title = "Datagram Transport Layer Security", + month = apr, + year = 2006, + note = "RFC 4347", +} + +@misc{ rfc4380, + author = {C. Huitema}, + title = {{Teredo}: Tunneling {IPv6} over {UDP} through + Network Address Translations {(NATs)}}, + month = feb, + year = 2006, + note = {RFC 4380}, +} + + +@misc{ rfc4423, + author = {R. Moskowitz and P. Nikander}, + title = {Host Identity Protocol {(HIP)} Architecture}, + month = may, + year = 2006, + note = {RFC 4423}, +} + +@misc{ rfc4510, + author = {K. {Zeilenga, Ed.}}, + title = {\href{https://tools.ietf.org/html/rfc4510}{Lightweight Directory Access Protocol {(LDAP)}: Technical Specification Road Map}}, + month = jun, + year = 2006, + note = {RFC 4510}, +} + +@misc{ rfc4634, + author = {D. {Eastlake 3rd} and T. Hansen}, + title = {{US} Secure Hash Algorithms ({SHA} and {HMAC-SHA})}, + month = jul, + year = 2006, + note = {RFC 4634}, +} + +@misc{ rfc4786, + author = {J. Abley and K. Lindqvist}, + title = {Operation of Anycast Services}, + month = dec, + year = 2006, + note = {RFC 4786}, +} + +@misc{ rfc4787, + author = {F. {Audet, ed.} and C. Jennings}, + title = {Network Address Translation {(NAT)} Behavioral Requirements + for Unicast {UDP}}, + month = jan, + year = 2007, + note = {RFC 4787}, +} + +@misc{ rfc4843, + author = {P. Nikander and J. Laganier and F. Dupont}, + title = {An {IPv6} Prefix for Overlay Routable Cryptographic + Hash Identifiers {(ORCHID)}}, + month = apr, + year = 2007, + note = {RFC 4843}, +} + +@misc{ rfc4864, + author = {G. {Van de Velde} and T. Hain and R. Droms and B. Carpenter + and E. Klein}, + title = {Local Network Protection for {IPv6}}, + month = may, + year = 2007, + note = {RFC 4864}, +} + +@misc{ rfc4868, + author = {S. Kelly and S. Frankel}, + title = {Using {HMAC-SHA-256}, {HMAC-SHA-384}, and {HMAC-SHA-512} + with {IPsec}}, + month = may, + year = 2007, + note = {RFC 4868}, +} + +@misc{ rfc4960, + author = "R. {Stewart, ed.}", + title = "Stream Control Transmission Protocol", + month = sep, + year = 2007, + note = "RFC 4960", +} + +@misc{ rfc4984, + author = {D. {Meyer, Ed.} and L. {Zhang, Ed.} and K. {Fall, Ed.}}, + title = {Report from the {IAB} Workshop on Routing and Addressing}, + month = sep, + year = 2007, + note = "RFC 4984", +} + +@misc{ rfc4987, + author = {W. Eddy}, + title = {{TCP} {SYN} Flooding Attacks and Common Mitigations}, + month = aug, + year = 2007, + note = "RFC 4987", +} + +@misc{ rfc5050, + author = {K. Scott and S. Burleigh}, + title = {Bundle Protocol Specification}, + month = nov, + year = 2007, + note = {RFC 5050}, +} + +@misc{ rfc5062, + author = {R. Stewart and M. Tuexen and G. Camarillo}, + title = {Security Attacks Found Against the + {Stream Control Transmission Protocol (SCTP)} + and Current Countermeasures}, + month = sep, + year = 2007, + note = {RFC 5062}, +} + +@misc{ rfc5128, + author = {P. Srisuresh and B. Ford and D. Kegel}, + title = {State of Peer-to-Peer {(P2P)} Communication across + Network Address Translators {(NATs)}}, + month = mar, + year = 2008, + note = "RFC 5128", +} + +@misc{ rfc5135, + author = {D. Wing and T. Eckert}, + title = {{IP} Multicast Requirements + for a Network Address Translator {(NAT)} + and a Network Address Port Translator {(NAPT)}}, + month = feb, + year = 2008, + note = "RFC 5135", +} + +@misc{ rfc5190, + author = {J. Quittek and M. Stiemerling and P. Srisuresh}, + title = {Definitions of Managed Objects for Middlebox Communication}, + month = mar, + year = 2008, + note = {RFC 5190}, +} + +@misc{ rfc5201, + author = {R. Moskowitz and others}, + title = {Host Identity Protocol}, + month = apr, + year = 2008, + note = {RFC 5201}, +} + +@misc{ rfc5207, + author = {M. Stiemerling and J. Quittek and L. Eggert}, + title = {{NAT} and Firewall Traversal Issues + of Host Identity Protocol {(HIP)} Communication}, + month = apr, + year = 2008, + note = {RFC 5207}, +} + +@misc{ rfc5238, + author = {T. Phelan}, + title = "{Datagram Transport Layer Security {(DTLS)} over the + Datagram Congestion Control Protocol {(DCCP)}}", + month = may, + year = 2008, + note = {RFC 5238}, +} + +% obsoleted by rfc8446 +@techreport{ rfc5246, + author = {Dierks, T. and Rescorla, E.}, + title = {\href{https://tools.ietf.org/html/rfc5246}{The Transport Layer + Security ({TLS}) Protocol Version 1.2}}, + type = {RFC}, + number = {5246}, + institution = {RFC Editor}, + year = 2008, + month = aug +} + +@misc{ rfc5382, + author = {S. {Guha, Ed.} and K. Biswas and B. Ford and + S. Sivakumar and P. Srisuresh}, + title = {{NAT} Behavioral Requirements for {TCP}}, + month = oct, + year = 2008, + note = {RFC 5382}, +} + +@misc{ rfc5389, + author = {J. Rosenberg and R. Mahy and P. Matthews and D. Wing}, + title = {Session Traversal Utilities for {NAT} {(STUN)}}, + month = oct, + year = 2008, + note = {RFC 5389}, +} + +@misc{ rfc5456, + author = {M. Spencer and B. Capouch and E. {Guy, Ed.} and + F. Miller and K. Shumard}, + title = {{IAX}: {Inter-Asterisk eXchange} Version 2}, + month = feb, + year = 2010, + note = {RFC 5456}, +} + +@misc{ rfc5533, + author = {E. Nordmark and M. Bagnulo}, + title = {Shim6: Level 3 Multihoming Shim Protocol for IPv6}, + month = jun, + year = 2009, + note = {RFC 5533}, +} + +@misc{ rfc5762, + author = {C. Perkins}, + title = {{RTP} and the Datagram Congestion Control Protocol ({DCCP})}, + month = apr, + year = 2010, + note = {RFC 5762}, +} + +@misc { rfc5849, + author = {E. Hammer-Lahav}, + title = {\href{https://tools.ietf.org/html/rfc5849}{The {OAuth} 1.0 Protocol}}, + month = apr, + year = 2010, + note = {RFC 5849}, +} + +@misc{ rfc5905, + author = {D. Mills and J. {Martin, Ed.} and J. Burbank and W. Kasch}, + title = {Network Time Protocol Version 4: + Protocol and Algorithms Specification}, + month = jun, + year = 2010, + note = {RFC 5905}, +} + +@misc{ rfc5906, + author = {B. {Haberman, Ed.} and D. Mills}, + title = {Network Time Protocol Version 4: Autokey Specification}, + month = jun, + year = 2010, + note = {RFC 5906}, +} + +@misc{ rfc6101, + title={The Secure Sockets Layer {(SSL)} Protocol Version 3.0}, + author={Freier, Alan and Karlton, Philip and Kocher, Paul}, + month = aug, + year={2011}, + note = {RFC 6101}, +} + +@misc{ rfc6347, + author = {E. Rescorla and N. Modadugu}, + title = {\href{https://tools.ietf.org/html/rfc6347}{Datagram Transport Layer Security Version 1.2}}, + month = jan, + year = 2012, + note = "RFC 6347", +} + +@techreport{ rfc6698, + author = {Hoffman, P. and Schlyter, J.}, + title = {\href{https://tools.ietf.org/html/rfc6698}{The {DNS}-Based + Authentication of Named Entities ({DANE}) Transport Layer Security ({TLS}) + Protocol: {TLSA}}}, + type = {RFC}, + number = {6698}, + institution = {RFC Editor}, + year = {2012}, + month = aug +} + +@misc { rfc6749, + author = {Ed Hardt}, + title = {\href{https://tools.ietf.org/html/rfc7009}{The {OAuth} 2.0 Authorization Framework}}, + month = oct, + year = 2012, + note = {RFC 6749}, +} + +@misc{ rfc6781, + author = {O. Kolkman and W. Mekking and R. Gieben}, + title = {\href{https://tools.ietf.org/html/rfc6781}{DNSSEC Operational Practices, Version 2}}, + month = dec, + year = 2012, + note = {RFC 6781}, +} + +@misc{ rfc6961, + author = {Y. Pettersen}, + title = {\href{https://tools.ietf.org/html/rfc6961}{The Transport Layer Security (TLS) Multiple Certificate Status Request Extension}}, + month = jun, + year = 2013, + note = {RFC 6961}, +} + +@misc{ rfc6962, + author = {B. Laurie and A. Langley and E. Kasper}, + title = {Certificate Transparency}, + month = jun, + year = 2013, + note = {RFC 6962}, +} + +@misc { rfc7009, + author = {T. Loddersted and S. Dronia and M. Scurtescu}, + title = {\href{https://tools.ietf.org/html/rfc7009}{{OAuth} 2.0 Token Revocation}}, + month = aug, + year = 2013, + note = {RFC 7009}, +} + +@misc{ rfc7530, + author = {T. Haynes and D. Noveck}, + title = {\href{https://tools.ietf.org/html/rfc7530}{Network File System {(NFS)} version 4 Protocol}}, + month = mar, + year = 2015, + note = {RFC 7530}, +} + +@misc{ rfc7540, + author = {M. Belshe and R. Peon and M. {Thomson, Ed.}}, + title = {Hypertext Transfer Protocol Version 2 {(HTTP/2)}}, + month = may, + year = 2015, + note = {RFC 7540}, +} + +@techreport{rfc8446, + author = {Rescorla, E.}, + title = {\href{https://tools.ietf.org/html/rfc8446}{The Transport Layer + Security ({TLS}) Protocol Version 1.3}}, + type = {RFC}, + number = {8446}, + institution = {RFC Editor}, + year = 2018, + month = aug +} + +%%%%% Internet-Drafts + +@misc{ rescorla20encrypted, + author = {E. Rescorla and K. Oku and N. Sullivan and C.A. Wood}, + title = "{\href{https://tlswg.org/draft-ietf-tls-esni/draft-ietf-tls-esni.html}{Encrypted Server Name Indication for TLS 1.3}}", + month = feb, + year = 2020, + note = "Internet-Draft draft-ietf-tls-esni-latest (Work in Progress)", +} + +@misc{ wing10happy, + author = {Dan Wing and Andrew Yourtchenko}, + title = "{Happy Eyeballs: Trending Towards Success with Dual-Stack Hosts}", + month = oct, + year = 2010, + note = "Internet-Draft draft-wing-v6ops-happy-eyeballs-ipv6-01 (Work in Progress)", +} + +@misc{ ford10tcp, + author = {Alan Ford and Costin Raiciu and Mark Handley}, + title = "{TCP Extensions for Multipath Operation with Multiple Addresses}", + month = oct, + year = 2010, + note = "Internet-Draft draft-ietf-mptcp-multiaddressed-02 (Work in Progress)", +} + +@misc{ manner10generic, + author = {J. Manner and N. Varis and B. Briscoe}, + title = "{Generic UDP Tunnelling (GUT)}", + month = jul, + year = 2010, + note = "Internet-Draft draft-manner-tsvwg-gut-02 (Work in Progress)", +} + +@misc{ tuexen10udp, + author = {Michael Tuexen and Randall Stewart}, + title = "{UDP Encapsulation of SCTP Packets}", + month = jan, + year = 2010, + note = "Internet-Draft draft-tuexen-sctp-udp-encaps-05 (Work in Progress)", +} + +@misc{ phelan10dccp, + author = {T. Phelan}, + title = "{DCCP Encapsulation in UDP for NAT Traversal (DCCP-UDP)}", + month = aug, + year = 2010, + note = "Internet-Draft draft-ietf-dccp-udpencap-02 (Work in Progress)", +} + +@misc{ falk07specification, + author = {Aaron Falk and Yuri Pryadkin and Dina Katabi}, + title = {Specification for the Explicit Control Protocol (XCP)}, + month = jul, + year = 2007, + note = "Internet-Draft draft-falk-xcp-spec-03 (Expired)", +} + +@misc{ odell97gse, + author = {Mike O'Dell}, + title = {{GSE} - An Alternate Addressing Architecture for IPv6}, + month = feb, + day = 24, + year = 1997, + note = "Internet-Draft (Work in Progress)", +} + +@misc{ cheshire04dynamic, + author = "Stuart Cheshire and Bernard Aboba and Erik Guttman", + title = "Dynamic Configuration of {IPv4} Link-Local Addresses", + month = jul, + year = "2004", + note = "Internet-Draft (Work in Progress)", +} + +@misc{ jennings04nat, + author = {C. Jennings}, + title = {{NAT} Classification Results using {STUN}}, + month = oct, + year = {2004}, + note = "Internet-Draft (Work in Progress)", +} + +@misc{ huitema04teredo, + author = "C. Huitema", + title = "Teredo: Tunneling {IPv6} over {UDP} through {NATs}", + month = mar, + year = "2004", + note = "Internet-Draft (Work in Progress)", +} + +% obsoleted by rfc4423 +@misc{ moskowitz03hip-arch, + author = "R. Moskowitz and P. Nikander", + title = "Host Identity Protocol Architecture", + month = apr, + year = "2003", + note = "Internet-Draft (Work in Progress)", +} + +@misc{ perkins02adhoc, + author = "Charles E. Perkins and Elizabeth M. Belding-Royer + and Samir Das", + title = "Ad Hoc On-Demand Distance Vector {(AODV)} Routing", + + note = "Internet-Draft (Work in Progress)", + month = jan, + year = "2002", +} + +@misc{ ylonen02ssh, + author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and S. Lehtinen", + title = "{SSH} Protocol Architecture", + month = sep, + year = "2002", + note = "Internet-Draft (Work in Progress)", +} + +@misc{ rosenberg07ice, + author = "J. Rosenberg", + title = "Interactive Connectivity Establishment {(ICE)}", + month = oct, + day = 29, + year = "2007", + note = "Internet-Draft (Work in Progress)", +} + +@misc{ rosenberg03traversal, + author = "J. Rosenberg and C. Huitema and R. Mahy", + title = "Traversal Using Relay {NAT} {(TURN)}", + month = oct, + year = "2003", + note = "Internet-Draft (Work in Progress)", +} + +@misc{ touch06tcp, + author = "J. Touch", + title = "A {TCP} Option for Port Names", + month = apr, + year = 2006, + note = "Internet-Draft (Work in Progress)", +} + +@misc{ spencer06iax2, + author = {M. Spencer and others}, + title = {{IAX2}: {Inter-Asterisk eXchange} Version 2}, + month = oct, + date = 23, + year = 2006, + note = "Internet-Draft (Work in Progress)", +} + +% Note: obsoleted by RFC 4787 +@misc{ audet06nat, + author = "F. {Audet, ed.} and C. Jennings", + title = "NAT Behavioral Requirements for Unicast UDP", + month = oct, + year = 2006, + note = "Internet-Draft (Work in Progress)", +} + +@misc{ ong00tunneling, + author = {L. Ong and R. Stewart and Q. Xie}, + title = {Tunneling of {SCTP} over Single {UDP} Port}, + month = mar, + year = 2000, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ guha07nat, + author = {S. {Guha, Ed.} and K. Biswas and B. Ford + and S. Sivakumar and P. Srisuresh}, + title = {{NAT} Behavioral Requirements for {TCP}}, + month = apr, + day = 28, + year = 2007, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ tuexen07udp, + author = {M. Tuexen and R. Stewart}, + title = {{UDP} Encapsulation of {SCTP} Packets}, + month = mar, + day = 19, + year = 2013, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ woodyatt08application, + author = {J H. Woodyatt}, + title = {Application Listener Discovery {(ALD)} for {IPv6}}, + month = dec, + day = 21, + year = 2007, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ phelan08datagram, + author = {T. Phelan}, + title = {Datagram Congestion Control Protocol {(DCCP)} + Encapsulation for {NAT} Traversal {(DCCP-NAT)}}, + month = feb, + year = 2008, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ cotton08iana, + author = {M. Cotton and others}, + title = {{IANA} Allocation Guidelines for {TCP} and {UDP} Port Numbers}, + month = feb, + year = 2008, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ rosenberg08udp, + author = {J. Rosenberg}, + title = {{UDP} and {TCP} as the New Waist of the {Internet} Hourglass}, + month = feb, + year = 2008, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ stiemerling08nat, + author = {M. Stiemerling and H. Tschofenig and C. Aoun and E. Davies}, + title = {{NAT}/Firewall {NSIS} Signaling Layer Protocol {(NSLP)}}, + month = nov, + year = 2008, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ denis08udp, + author = {R. Denis-Courmont}, + title = {{UDP}-Encapsulated Transport Protocols}, + month = jul, + year = 2008, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ larsen09port, + author = {M. Larsen and F. Gont}, + title = {Port Randomization}, + month = nov, + year = 2009, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ ford09architectural, + author = {A. {Ford, Ed.} and others}, + title = {Architectural Guidelines for Multipath {TCP} Development}, + month = oct, + year = 2009, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ ford11architectural, + author = {A. {Ford, Ed.} and C. Raiciu and M. Handley and S. Barre and J. Iyengar}, + title = {Architectural Guidelines for Multipath {TCP} Development}, + month = jan, + year = 2011, + note = {Internet-Draft (Work in Progress)}, +} + + +%%%%% Misc + +@misc{ tng, + author = {Bryan Ford and Janardhan Iyengar}, + title = {{Tng}: Transport Next-Generation -- + Refactoring the {Internet}'s Transport Architecture}, + year = 2009, + note = {\url{http://dedis.cs.yale.edu/2009/tng/}}, +} + +@misc{ nsf0916413, + author = {Bryan Ford and Janardhan Iyengar}, + title = {{Tng}, a Next Generation Transport Services Architecture}, + note = {NSF collaborative grants CNS-0916413 and CNS-0916678, + awarded for August 1, 2009--July 31, 2011. + \url{http://dedis.cs.yale.edu/2009/tng/}}, +} + +@misc{ flash10security, + author = {{Adobe Systems, Inc.}}, + title = {{Adobe Flash Player 10} Security}, + month = nov, + year = 2008, + note = {\url{http://www.adobe.com/devnet/flashplayer/articles/flash_player10_security_wp.html}}, +} + +@misc{ flashplayer, + author = {{Adobe Systems, Inc.}}, + title = {Adobe Flash Player}, + month = jul, + year = 2010, + note = {\url{http://www.adobe.com/products/flashplayer/}}, +} + +@misc{ acrobat, + author = {{Adobe Systems, Inc.}}, + title = {Adobe Acrobat Reader}, + month = jul, + year = 2010, + note = {\url{http://get.adobe.com/reader/}}, +} + +@misc{ IIS-0534198, + author = {Vitaly Shmatikov and Joan Feigenbaum}, + title = {New Privacy Frameworks for Collaborative Information Sharing}, + note = {NSF grants IIS-0534198 and IIS-0534052, + awarded Jan 1, 2006--Dec 31, 2009. + \url{http://userweb.cs.utexas.edu/~shmat/privacyframeworks/}} +} + +@misc{ CNS-0716158, + author = {Vitaly Shmatikov and Joan Feigenbaum and Sampath Kannan}, + title = {Massive-Dataset Algorithmics for Network Security}, + note = {NSF grants CNS-0716158, CNS-0716172, and CNS-0716223, + awarded Oct 1, 2007 - Sep 30, 2010. + \url{http://userweb.cs.utexas.edu/~shmat/mds-security/}} +} + +@misc{ wsdef, + author = {W3C}, + title = {Web Services}, + year = 2002, + note = {\url{http://www.w3.org/2002/ws/desc/}}, +} + +@misc{ websocket, + author = {W3C}, + title = {The {WebSocket} {API} (draft)}, + year = 2011, + note = {\url{http://dev.w3.org/html5/websockets/}}, +} + +@misc{ cisco-rbscp, + author = {Cisco}, + title = "{Rate-Based Satellite Control Protocol}", + year = 2006, +} + +@misc{ cloc, + author = "Al Danial", + title = "{Counting Lines of Code}", + note = {\url{http://cloc.sourceforge.net/}} +} + +@misc{ NoQ, + author = {Marc Herbert}, + title = {NoQ: back-pressured/blocking IP networks}, + month = jan, + year = 2005, + note = {\url{http://marc.herbert.free.fr/noq/}}, +} + +@misc{ speex, + author = {Jean-Marc Valin}, + title = {The Speex Codec Manual Version 1.2 Beta 3}, + month = dec, + year = 2007, + note = {\url{http://www.speex.org/}}, +} + +@misc{ internet-speed, + author = {www.speedmatters.org}, + title = {2010 Report on Internet Speeds in All 50 States}, + month = Nov, + year = 2010, + note = {\url{http://www.speedmatters.org/content/internet-speed-report}}, +} + + +@misc{UTXO, + author = {Satoshi.info}, + title = {\href{https://statoshi.info/dashboard/db/unspent-transaction-output-set}{Unspent Transaction Output Set}}, + month = Feb, + year = 2017, +} + + + +@misc{blockchain_size, + author = {Blockchain.info}, + title = {\href{https://blockchain.info/charts/blocks-size}{Blockchain Size}}, + month = Feb, + year = 2017, +} + + +@misc{ zeromq, + title = {{\O{}MQ}: The Intelligent Transport Layer}, + note = {\url{http://www.zeromq.org}}, +} + +@inproceedings{ yang03superpeer, + author = {Beverly Yang, B. and Garcia-Molina, H.}, + booktitle = {\bibbrev{ICDE} International Conference on Data Engineering}, + title= {Designing a super-peer network}, + year= {2003}, + month= {march}, + pages= {49 - 60}, +} + +@inproceedings{ stjuste11litter, + author={Pierre St Juste and David Isaac Wolinsky and P. Oscar Boykin, Renato J. Figueiredo}, + booktitle={Social Computing (SocialCom), 2011 IEEE Third International Conference on}, + title={Litter: A Lightweight Peer-to-Peer Microblogging Service}, + year={2011}, + month={oct.}, +} + +@conference { bennet03gap, + title = {gap - Practical Anonymous Networking}, + booktitle = {Designing Privacy Enhancing Technologies}, + year = {2003}, + pages = {141{\textendash}160}, + author = {Krista Bennett and Christian Grothoff} +} + +@misc{ oikarinen93irc, + author = {J. Oikarinen and D. Reed}, + title = {{RFC} 1459 Internet Relay Chat Protocol}, + year = {1993}, + month = {May} +} + +@inproceedings{raymond00, + title = {{Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems}}, + author = {Jean-Fran\c{c}ois Raymond}, + booktitle = {Design Issues in Anonymity and Unobservability}, + year = {2000}, + month = {July}, +} + +@inproceedings{wright02, + title = {An Analysis of the Degradation of Anonymous Protocols}, + author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}, + booktitle = {Proceedings of NDSS '02}, + year = {2002}, + month = {February}, +} + +@inproceedings{onion-routing:ih96, + title = {{Hiding Routing Information}}, + author = {Goldschlag, David M. and Reed, Michael G. and Syverson, Paul F.}, + booktitle = {1st International Workshop on Information Hiding}, + year = {1996}, + month = {May}, +} + +@inproceedings{onion-routing:pet2000, + title = {{Towards an Analysis of Onion Routing Security}}, + author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr}, + booktitle = {Design Issues in Anonymity and Unobservability}, + year = {2000}, + month = {July} +} + +@misc{anonymizer, + key = {Anonymizer}, + title = {Anonymizer}, + note = {\url{http://anonymizer.com/}}, + year = {2012}, + month = {September} +} + +@inproceedings{rhea05planetlab, + author = {Rhea, Sean and Chun, Byung-Gon and Kubiatowicz, John and Shenker, Scott}, + title = {Fixing the embarrassing slowness of {OpenDHT} on {PlanetLab}}, + booktitle = {\bibconf{WORLDS}{Conference on Real, Large Distributed Systems}}, + year = {2005}, +} + +@inproceedings{ franklin06fingerprinting, + author = {Franklin, Jason and McCoy, Damon and Tabriz, Parisa and Neagoe, Vicentiu and Van Randwyk, Jamie and Sicker, Douglas}, + title = {Passive data link layer 802.11 wireless device driver fingerprinting}, + booktitle = {USENIX Security Symposium}, + year = {2006}, +} + +@inproceedings{ brik08fingerprinting, + author = {Brik, Vladimir and Banerjee, Suman and Gruteser, Marco and Oh, Sangho}, + title = {Wireless device identification with radiometric signatures}, + booktitle = {ACM International Conference on Mobile Computing and Networking (MobiCom)}, + year = {2008}, +} + +@misc{ panopticlick, + author = {Electronic Frontier Foundation}, + year = {2013}, + month = {Oct}, + howpublished = {\url{https://panopticlick.eff.org/}}, +} + +@misc{ mullenize, + author = {Washington Post}, + howpublished = {\url{http://apps.washingtonpost.com/g/page/world/gchq-report-on-mullenize-program-to-stain-anonymous-electronic-traffic/502/}}, + year = {2013}, + month = {oct}, + title = {{GCHQ} report on {`MULLENIZE'} program to `stain' anonymous electronic traffic}, +} + +@misc{ torpluggable, + author = {{Tor}}, + year = {2013}, + month = {oct}, + title = {PluggableTransports}, + howpublished = {\url{https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports}}, +} + +@misc{iPlane, + title = {{iPlane Datasets}}, + note = {\url{http://iplane.cs.washington.edu/data/data.html}} +} + +@misc{IXP, + title = {{IXPs Datasets}}, + note = {\url{http://www-rp.lip6.fr/~augustin/ixp/}} +} + +@misc{nsdminer, + title = {{NSDMiner}}, + note = {\url{http://sourceforge.net/projects/nsdminer}} +} + +@book{gano03apollo, + author = {Dean L Gano}, + title = {Apollo root cause analysis: {A} new way of thinking}, + publisher = {Apollonian Publications}, + year = 2003 +} + +@misc{hidemyass, + note = {\url{http://blog.hidemyass.com/2011/09/23/lulzsec-fiasco/}}, + title = {Lulzsec fiasco}, + author = {Hide My Ass!}, +} + +@misc{ geodns, + title = "Geo{DNS}", + key = "GeoDNS", + note = {\url{http://www.caraytech.com/geodns/}}, +} + +@misc{ ghedini18you, + title = {You get {TLS} 1.3! You get {TLS} 1.3! Everyone gets {TLS} 1.3!}, + author = {Alessandro Ghedini}, + month = may, + year = 2018, + howpublished = + {\url{https://blog.cloudflare.com/you-get-tls-1-3-you-get-tls-1-3-everyone-gets-tls-1-3/}} +} + +@inproceedings{recordon06openid, + title={{OpenID 2.0: A platform for user-centric identity management}}, + author={Recordon, David and Reed, Drummond}, + booktitle={Proceedings of the second ACM workshop on Digital identity management}, + year={2006}, + organization={ACM} +} + + +@misc{paypalapi, + title = {{Paypal Developer API}}, + key = {Paypal Developer API}, + note = {\url{https://developers.paypal.com/}}, +} + + +@misc{facebookgraph, + title = {{Facebook Graph API}}, + key = {Facebook Graph API}, + note = {\url{https://developers.facebook.com/}}, +} + +@misc{yalecas, + title = {Using {CAS} at Yale: A Quick Introduction}, + key = {Using CAS at Yale: A Quick Introduction}, + note = {\url{http://www.yale.edu/tp/auth/usingcasatyale.html}}, + year = 2015, + month = jan, +} + +@misc{github, + title = {{GitHub}}, + key = {GitHub}, + note = {\url{https://www.github.com}}, + year = {2015}, + month = jan, +} + +@misc{cothority, + title = {{DeDiS cothority}}, + key = {DeDiS Cothority}, + note = {\url{https://www.github.com/dedis/cothority}}, + year = {2016}, + month = sep, +} + +@misc{crypto, + title = {{Yale crypto library}}, + key = {Crypto Library}, + note = {\url{https://www.github.com/dedis/crypto}}, + year = {2016}, + month = sep, +} + +@misc{golang, + title = {\href{http://golang.org/}{The {Go} Programming Language}}, + key = {golang}, + year = {2018}, + month = feb, +} +% note = {\url{http://golang.org/}}, + +@misc{golang-tls, + title={Package tls}, + key = {golang-tls}, + note = {\url{https://golang.org/pkg/crypto/tls/}} +} + +@article{evans11certificate, + title={Certificate pinning extension for {HSTS}}, + author={Evans, Chris and Palmer, Chris}, + year={2011} +} + +@misc{privacyIdea, + title = {\href{https://www.privacyidea.org}{Authentication System privacyIDEA}}, + year={2016}, + month=may +} + +@misc{mininet, + key = {mininet}, + title = {\href{http://mininet.org/}{Mininet -- An Instant Virtual Network on your Laptop (or other PC)}}, + year={2018}, + month=feb +} + + +@misc{wikipedia16sharding, + title = {\href{https://en.wikipedia.org/wiki/Shard_(database_architecture) +}{Shard (database architecture)}}, + author = {Wikipedia}, + year={2017}, + month=feb +} + +@misc{wiki-atomicity, + title = {\href{https://en.wikipedia.org/wiki/Atomicity_(database_systems) +}{Atomicity (database systems)}}, + author = {Wikipedia}, + year={2017}, + month=feb +} + +@misc{wiki-AC, + title = {\href{https://en.wikipedia.org/wiki/Atomic_commit +}{Atomic commit}}, + author = {Wikipedia}, + year={2017}, + month=feb +} + +@misc{bitcoin-waste, + title = {\href{https://motherboard.vice.com/en_us/article/bitcoin-could-consume-as-much-electricity-as-denmark-by-2020 +}{Bitcoin Could Consume as Much Electricity as Denmark by 2020}}, + author = {Sebastiaan Deetman}, + year={2016}, + month=may +} + +@misc{bitcoin-centralized, + title = {\href{http://hackingdistributed.com/2014/06/13/time-for-a-hard-bitcoin-fork/ +}{It's Time For a Hard Bitcoin Fork}}, + author = {Ittay Eyal,Emin Gün Sirer}, + year={2014}, + month=jun +} + + diff --git a/pdf/os.bib b/pdf/os.bib new file mode 100644 index 0000000..9a76bc6 --- /dev/null +++ b/pdf/os.bib @@ -0,0 +1,10623 @@ +% PLEASE KEEP THE BIBLIOGRAPHY ENTRIES IN ALPHABETICAL ORDER! Thank you. -Bryan + +% A few stylistic standards used in these bib entries, +% designed for brevity without sacrificing essential completeness +% (most entries fit on two lines in footnotesize): +% - Short and long conference titles including conference numbers: +% e.g., \bibconf[17th]{SOSP}{ACM Symposium on Operating System Principles} +% - Use "and others" for papers with more than three or four authors +% - No publisher for conference proceedings; conference name is enough. + +%A + +@inproceedings{ abadi10case, + author = {Alexander Thomson and Daniel J. Abadi}, + title = {\href{https://dl.acm.org/doi/10.14778/1920841.1920855}{The case for determinism in database systems}}, + booktitle = {VLDB}, + month = sep, + year = 2010, + }, + +@article{abdelmalek05QU, + author = {Abd-El-Malek, Michael and Ganger, Gregory R. and Goodson, Garth R. and Reiter, Michael K. and Wylie, Jay J.}, + title = {\href{http://doi.acm.org/10.1145/1095809.1095817}{Fault-scalable Byzantine Fault-tolerant Services}}, + journal = {SIGOPS Operating Systems Review}, + issue_date = {December 2005}, + volume = {39}, + number = {5}, + month = oct, + year = {2005}, + issn = {0163-5980}, + pages = {59--74}, + numpages = {16}, + url = {http://doi.acm.org/10.1145/1095809.1095817}, + doi = {10.1145/1095809.1095817}, + acmid = {1095817}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {byzantine fault-tolerance, fault-scalability, quorums, replicated state machines, services}, +} + +@inproceedings{ abraham04compact, + author = {Ittai Abraham and others}, + title = {Compact Name-Independent Routing with Minimum Stretch}, + booktitle = {\bibconf[16th]{SPAA}{ACM Symposium on Parallelism + in Algorithms and Architectures}}, + month = jun, + year = 2004, + location = {Barcelona, Spain}, +} + +@misc{ abi08wifi, + author = {{ABI Research}}, + title = {{Wi-Fi} Hotspots Stay Hot in 2008}, + month = jul, + day = 17, + year = 2008, + url = {http://www.abiresearch.com/press/1187-Wi-Fi+Hotspots+Stay+Hot+in+2008}, +} + +@inproceedings{ acharya00mapbox, + author = {Anurag Acharya and Mandar Raje}, + title = {{MAPbox}: {U}sing Parameterized Behavior Classes + to Confine Applications}, + booktitle = {9th USENIX Security Symposium}}, + month = aug, + year = 2000, +} + +% author = {Onur Ac\i{}i\c{c}mez and \c{C}etin Kaya Ko\c{c} and +% Jean-Pierre Seifert}, + +@incollection{aciiccmez06cache, + title={Cache based remote timing attack on the {AES}}, + author={Ac{\i}i{\c{c}}mez, Onur and Schindler, Werner and Ko{\c{c}}, {\c{C}}etin K}, + booktitle={Topics in Cryptology--CT-RSA 2007}, + pages={271--286}, + year={2006}, + publisher={Springer} +} + +@inproceedings{ aciicmez07predicting, + author = {Onur Ac\i{}i\c{c}mez and others}, + title = {Predicting Secret Keys Via Branch Prediction}, + booktitle = {\bibconf{CT-RSA}{Cryptographers' Track - {RSA} Conference}}, + month = feb, + year = 2007, + location = {San Francisco, CA}, +} + +@inproceedings{ aciicmez07yet, + author = {Onur Ac\i{}i\c{c}mez}, + title = {Yet Another MicroArchitectural Attack: Exploiting {I-cache}}, + booktitle = {\bibconf[1st]{CCAW}{ACM Workshop on Computer Security Architecture}}, + month = nov, + year = 2007, + location = {San Jose, CA}, +} + +@inproceedings{ adams06vmware, + author = "Keith Adams and Ole Agesen", + title = "A Comparison of Software and Hardware Techniques + for x86 Virtualization", + booktitle = {\bibconf[12th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages and + Operating Systems}}, + month = dec, + year = 2006, +} + +@article{ adar00freeriding, + author = {Eytan Adar and Bernardo A. Huberman}, + title = {Free Riding on Gnutella}, + journal = {First Monday}, + volume = 5, + number = 10, + month = oct, + year = 2000, +} + +@inproceedings{ adibi06multipath, + author = {Sasan Adibi and Shervin Erfani}, + title = {A Multipath Routing Survey for Mobile Ad-Hoc Networks}, + booktitle = {\bibconf{CCNC}{IEEE Consumer Communications + and Networking Conference}}, + month = jan, + year = 2006, + location = {Las Vegas, NV}, +} + +@inproceedings{ adiseshu96reliable, + author = {H. Adiseshu and Guru Parulkar and George Varghese}, + title = {A Reliable and Scalable Striping Protocol}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + year = 1996, + month = aug +} + +@inproceedings{aditya95ph, + author = {Shail Aditya and Arvind and Lennart Augustsson and + Jan-Willem Maessen and Rishiyur S. Nikhil}, + title = {Semantics of p{H}: A parallel dialect of {H}askell}, + booktitle = {Proceedings of the {H}askell {W}orkshop}, + editor = {Paul Hudak}, + year = {1995}, + location = {La Jolla, CA}, + month = jun, + pages = {35--49}, +} + +@inproceedings{ adjie-winoto99ins, + author = "William Adjie-Winoto and others", + title = "The design and implementation of an intentional naming system", + booktitle = "\bibconf[17th]{SOSP}{ACM Symposium + on Operating System Principles}", + location = "Kiawah Island, SC", + month = dec, + year = "1999", + url = "http://nms.lcs.mit.edu/papers/ins-sosp99.html", +} + +@book{ adobe99postscript, + author = {{Adobe Systems Inc.}}, + title = {{PostScript} Language Reference}, + publisher = {Addison Wesley}, + year = 1999, + month = mar, + pages = {912}, + edition = {3rd}, + isbn = {0201379228}, +} + +@inproceedings{ afek89upper, + author = {Yehuda Afek and Eli Gafni and Moty Ricklin}, + title = {Upper and Lower Bounds for Routing Schemes + in Dynamic Networks}, + booktitle = {\bibconf[30th]{FOCS}{Annual Symposium on + Foundations of Computer Science (FOCS)}}, + month = oct, + year = 1989, + pages = "370-375", +} + +@article{agrawal91backtracking, + author={Agrawal, H. and De Millo, R.A. and Spafford, E.H.}, + journal={IEEE Software}, + title={An execution-backtracking approach to debugging}, + year={1991}, + month = may, + volume={8}, + number={3}, + pages={21--26}, +} + +@inproceedings{agrawal03information, + author = {Rakesh Agrawal and + Alexandre V. Evfimievski and + Ramakrishnan Srikant}, + title = {Information sharing across private databases}, + booktitle = {\bibconf{SIGMOD}{ACM International Conference on + Management of Data}}, + location = {San Diego, CA}, + month = jun, + year = 2003 +} + +@inproceedings{aguilera03performance, + author = {Marcos Kawazoe Aguilera and + Jeffrey C. Mogul and + Janet L. Wiener and + Patrick Reynolds and + Athicha Muthitacharoen}, + title = {Performance Debugging for Distributed Systems of + Black Boxes}, + booktitle = {\bibconf[19th]{SOSP}{ACM Symposium on Operating + Systems Principles}}, + location = {Bolton Landing, NY}, + month = oct, + year = 2003 +} + + +@inproceedings{ajmani02conchord, + author = {Sameer Ajmani and Dwaine E. Clarke and Chuang-Hue Moh and + Steven Richman}, + title = {{ConChord}: Cooperative {SDSI} Certificate Storage and Name + Resolution}, + booktitle = {\bibconf[1st]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + number = {2429}, + pages = {141--154}, + month = mar, + year = {2002} +} + +@article{ akyildiz01tcp, + author = {Ian F. Akyildiz and Giacomo Morabito and Sergio Palazzo}, + title = {{TCP-Peach}: A New Congestion Control Scheme for + Satellite {IP} Networks}, + journal = {Transactions on Networking}, + volume = 9, + number = 3, + month = jun, + year = 2001, +} + +@article{ akyildiz05wireless, + author = {Ian F. Akyildiz and Xudong Wang and Weilin Wang}, + title = {Wireless mesh networks: a survey}, + journal = {Computer Networks}, + volume = 47, + number = 4, + month = mar, + year = 2005, +} + +@article{ al04ls-sctp, + author = {Ahmed Abd El Al and Tarek Saadawi and Myung Lee}, + title = {{LS-SCTP}: a bandwidth aggregation technique for + stream control transmission protocol}, + journal = {Computer Communications}, + volume = 27, + number = 10, + pages = {1012-1024}, + month = jun, + year = 2004, +} + +@inproceedings{ albuquerque00network, + author = {C\'elio Albuquerque and Brett J. Vickers and Tatsuya Suda}, + title = {Network Border Patrol}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 2000, + location = {Tel-Aviv, Israel}, +} + +@article{ albuquerque04network, + author = {C\'elio Albuquerque and Brett J. Vickers and Tatsuya Suda}, + title = {Network Border Patrol: Preventing Congestion Collapse and + Promoting Fairness {in the Internet}}, + journal = {Transactions on Networking}, + volume = 12, + number = 1, + month = feb, + year = 2004, +} + +@misc{ alexandrov98consh, + author = "A. Alexandrov and P. Kmiec and K. Schauser", + title = "Consh: A confined execution environment + for Internet computations", + year = "1998", + url = "citeseer.ist.psu.edu/alexandrov99consh.html", +} + +@inproceedings{ allman96application, + author = {Mark Allman and Hans Kruse and Shawn Ostermann}, + title = {An Application-Level Solution to + {TCP}'s Satellite Inefficiencies}, + booktitle = {\bibconf[1st]{WOSBIS}{Workshop on Satellite-based + Information Services}}, + location = {Rye, New York}, + month = nov, + year = 1996, +} + +@inproceedings{ allman97tcp, + author = {Mark Allman and Chris Hayes and Hans Kruse + and Shawn Ostermann}, + title = {{TCP} Performance over Satellite Links}, + booktitle = {5th International Conference on Telecommunication Systems}, + location = {Nashville, TN}, + month = mar, + year = 1997, +} + +% Protean paper in HotOS '19 workshop +@inproceedings{ alp19rethinking, + author = {Enis Ceyhun Alp and Eleftherios Kokoris-Kogias and + Georgia Fragkouli and Bryan Ford}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/3317550.3321448}{Rethinking General-Purpose Decentralized Computing}}, + booktitle = {\bibconf{HotOS}{Workshop on Hot Topics in Operating Systems}}, + month = may, + year = 2019, + location = {Bertinoro Italy}, +} + +@inproceedings{ altman00fairness, + author = {Eitan Altman and Chadi Barakat and Emmanuel Laborde}, + title = {Fairness Analysis of {TCP/IP}}, + booktitle = {39th IEEE Conference on Decision and Control}, + month = dec, + year = 2000, +} + +@article{ almes85eden, + author = {Guy T. Almes and Andrew P. Black and + Edward D. Lazowska and Jerre D. Noe}, + title = {The {Eden} System: A Technical Review}, + journal = {IEEE Transactions on Software Engineering}, + volume = {SE-11}, + number = 1, + month = jan, + year = 1985, + pages = {43-59}, +} + +@misc{ amd02x86-64, + author = {{Advanced Micro Devices, Inc.}}, + title = {{AMD} x86-64 Architecture Programmer's Manual}, + year = 2002, + month = sep, +} + +@misc{ amd07, + author = {{Advanced Micro Devices, Inc.}}, + title = {{AMD64} Architecture Programmer's Manual}, + month = sep, + year = 2007, +} + +@article{ amir11byzantine, + author = {Yair Amir and Brian Coan and Jonathan Kirsch + and John Lane}, + title = {{Prime}: {Byzantine} Replication under Attack}, + journal = {IEEE Transactions on Dependable and Secure Computing}, + volume = 8, + number = 4, + month = jul, + year = 2011, + pages = {564-577}, +} + +@article{ amza96treadmarks, + author = {Cristiana Amza and Alan L. Cox and Sandhya Dwarkadas and + Pete Keleher and Honghui Lu and Ramakrishnan Rajamony and Weimin Yu + and Willy Zwaenepoel}, + title = {{TreadMarks}: Shared Memory Computing + on Networks of Workstations}, + journal = {IEEE Computer}, + month = feb, + year = 1996, + volume = 29, + number = 2, + pages = {18-28}, +} + +@misc{ anderson01analysis, + author = {Jason Anderson}, + title = {An Analysis of Fragmentation Attacks}, + month = mar, + day = 15, + year = 2001, + note = {\url{http://www.ouah.org/fragma.html}}, +} + +@inproceedings{ andersen01resilient, + author = "David G. Andersen and others", + title = "Resilient Overlay Networks", + booktitle = "\bibconf[18th]{SOSP}{ACM Symposium + on Operating Systems Principles}", + location = "Banff, Canada", + month = oct, + year = "2001", + url = "http://nms.lcs.mit.edu/projects/ron/", +} + +@inproceedings{ anglano04file, + author = {Cosimo Anglano and Massimo Canonico}, + title = {The File Mover: An Efficient Data Transfer System + for Grid Applications}, + booktitle = {\bibconf[2nd]{GAN}{International Workshop on + Grids and Advanced Networks}}, + location = {Chicago, IL}, + month = apr, + year = 2004, +} + +@misc{ ansi05ecdsa, + author = {{American National Standards Institute}}, + title = {Elliptic Curve Digital Signature Algorithm {(ECDSA)}}, + year = 2005, + note = {ANSI X9.62:2005}, +} + +@inproceedings{ apostolopoulos99transport, + author = {George Apostolopoulos and Vinod Peris and Debanjan Saha}, + title = {Transport Layer Security: How much does it really cost?}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 1999, + location = {New York, NY}, +} + +@inproceedings{ apostolopoulos02multiple, + author = {John Apostolopoulos and Tina Wong and Wai-tian Tan + and Susie Wee}, + title = {On Multiple Description Streaming with + Content Delivery Networks}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + month = jun, + year = 2002, + location = {New York, NY}, +} + +@inproceedings{appel99pca, + title = "Proof-Carrying Authentication", + author = "Andrew W. Appel and Edward W. Felten", + booktitle = "\bibconf[6th]{ACM CCS}{ACM Conference on + Computer and Communications Security}", + month = nov, + year = 1999, +} + +@inproceedings{ argyriou03bandwidth, + author = {Antonios Argyriou and Vijay Madisetti}, + title = {Bandwidth Aggregation with SCTP}, + booktitle = {\bibconf{GLOBECOM}{IEEE Global Telecommunications + Conference}}, + location = {San Francisco, CA}, + month = dec, + year = 2003, +} + +@inproceedings{ arias03compact, + author = "Marta Arias and others", + title = "Compact Routing with Name Independence", + booktitle = {\bibconf[15th]{SPAA}{ACM Symposium on Parallelism + in Algorithms and Architectures}}, + location = "San Diego, CA", + month = jun, + year = "2003", +} + +@inproceedings{ artho03high, + author = {Cyrille Artho and Klaus Havelund and Armin Biere}, + title = {High-Level Data Races}, + booktitle = {\bibconf{VVEIS}{Workshop on Verification and Validation + of Enterprise Information Systems}}, + pages = {82-93}, + location = {Angers, France}, + month = apr, + year = 2003, +} + +@misc{ armstrong08virtualization, + author = {Ben Armstrong}, + title = {Virtualization Clustering and Processor Compatibility}, + month = feb, + year = 2008, + note = {\url{http://blogs.msdn.com/virtual_pc_guy/archive/2008/02/19/virtualization-clustering-and-processor-compatibility.aspx}} +} + +@incollection{ arvind1988two, + author = {Arvind and Iannucci, Robert}, + title = {Two fundamental issues in multiprocessing}, + booktitle = {Parallel Computing in Science and Engineering}, + series = {Lecture Notes in Computer Science}, + editor = {Dierstein, R/"{u}diger and M/"{u}ller-Wichards, Dieter and + Wacker, Hans-Martin}, + pages = {61--88}, + volume = {295}, + note = {\url{http://dx.doi.org/10.1007/3-540-18923-8_15}}, + year = {1988}, +} + +@article{arvind1989Istructures, + author = {Arvind and Rishiyur S. Nikhil and Keshav K. Pingali}, + title = {{I}-structures: data structures for parallel computing}, + journal = {ACM Transactions on Programming Languages and Systems (TOPLAS)}, + issue_date = {Oct. 1989}, + volume = 11, + number = 4, + month = oct, + year = 1989, + issn = {0164--0925}, + pages = {598--632}, + numpages = {35}, + url = {\url{http://doi.acm.org/10.1145/69558.69562}}, + doi = {10.1145/69558.69562}, + acmid = {69562}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@article{arvind1990executing, + author={Arvind and Rishiyur S. Nikhil}, + title={Executing a program on the {MIT} tagged-token dataflow architecture }, + journal={IEEE Transactions on Computers}, + year={1990}, + month = mar, + volume={39}, + number={3}, + pages={300--318}, + doi={10.1109/12.48862}, + ISSN={0018-9340}, +} + +@article{ asanovic09landscape, + author = {Krste Asanovic and Rastislav Bodik and James Demmel and + Tony Keaveny and Kurt Keutzer and John Kubiatowicz and Nelson Morgan and + David Patterson and Koushik Sen and John Wawrzynek and David Wessel and + Katherine Yelick}, + title = {A view of the parallel computing landscape}, + journal = {Communications of the ACM}, + volume = {52}, + number = {10}, + month = oct, + year = {2009}, + pages = {56--67}, +} + +@article{aublin15bft, + author = {Aublin, Pierre-Louis and Guerraoui, Rachid and Kne\v{z}evi\'{c}, Nikola and Qu{\'e}ma, Vivien and Vukoli\'{c}, Marko}, + title = {The Next 700 {BFT} Protocols}, + journal = {ACM Trans. Comput. Syst.}, + issue_date = {January 2015}, + volume = {32}, + number = {4}, + month = jan, + year = {2015}, + issn = {0734-2071}, + pages = {12:1--12:45}, + articleno = {12}, + numpages = {45}, + url = {http://doi.acm.org/10.1145/2658994}, + doi = {10.1145/2658994}, + acmid = {2658994}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {Abstract, Byzantine, composability, fault tolerance, optimization, robustness}, +} + +@inproceedings{ aviram11workspace, + author = {Amittai Aviram and Bryan Ford and Yu Zhang}, + title = {{Workspace Consistency}: A Programming Model + for Shared Memory Parallelism}, + booktitle = {\bibconf[2nd]{WoDet}{Workshop on Determinism + and Correctness in Parallel Programming}}, + month = mar, + day = 6, + year = 2011, + location = {Newport Beach, CA}, +} + +@inproceedings{ aviram11deterministic, + author = {Amittai Aviram and Bryan Ford}, + title = {Deterministic {OpenMP} for Race-Free Parallelism}, + booktitle = {\bibconf[3rd]{HotPar}{USENIX Workshop on + Hot Topics in Parallelism}}, + month = may, + day = 26, + year = 2011, + location = {Berkeley, CA}, +} + +@inproceedings{ aviram12generalized, + author = {Amittai Aviram and Bryan Ford}, + title = {A Generalized Reduction Construct for Deterministic {OpenMP}}, + booktitle = {\bibconf[3rd]{WoDet}{Workshop on Determinism + and Correctness in Parallel Programming}}, + month = mar, + day = 4, + year = 2012, + location = {London, England}, +} + +@misc{aws17microservices, + author = {Matthias Jung and Peter Dalbhanjan and Peter Chapman and + Christoph Kassen}, + title = {\href{https://docs.aws.amazon.com/aws-technical-content/latest/microservices-on-aws/microservices-on-aws.pdf}{Microservices + on AWS}}, + month = sep, + year = 2017, +} + +%B + +@inproceedings{ backes09practical, + author = {Michael Backes and Peter Druschel and Andreas Haeberlen + and Dominique Unruh}, + title = {{CSAR}: A Practical and Provable Technique to Make + Randomized Systems Accountable}, + booktitle = {16th Annual Network \& Distributed System + Security Symposium (NDSS '09)}, + location = {San Diego, CA}, + month = feb, + year = 2009, +} + +@inproceedings{bacon00guava, + author = {Bacon, David F. and Strom, Robert E. and Tarafdar, Ashis}, + title = {Guava: a dialect of {J}ava without data races}, + booktitle = {\bibconf[15th]{OOPSLA}{ACM SIGPLAN Conference on + Object-Oriented Programming, Systems, Languages, and Applications}}, + year = {2000}, + pages = {382--400}, + location = {Minneapolis, MN} +} + +@inproceedings{ badrinath93handling, + author = {B. R. Badrinath and A. Bakre + and T. Imielinski and R. Marantz}, + title = {Handling Mobile Clients: A Case for Indirect Interaction}, + booktitle = {\bibconf[4th]{WWOS}{Workshop on Workstation + Operating Systems}}, + month = oct, + year = 1993, + location = {Napa, CA}, +} + +@inproceedings{ bahk92dynamic, + author = {Saewoong Bahk and Magda El Zarki}, + title = {Dynamic Multi-path Routing and How it Compares with other + Dynamic Routing Algorithms for High Speed Wide Area Networks}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1992, + location = {Baltimore, MD}, + pages = {53-64}, +} + +@inproceedings{ baiocchi07yeah, + author = {Andrea Baiocchi and Angelo P. Castellani + and Francesco Vacirca}, + title = {{YeAH-TCP}: Yet Another Highspeed {TCP}}, + booktitle = {\bibconf[5th]{PFLDnet}{Workshop on Protocols + for Fast Long-Distance Networks}}, + month = feb, + year = 2007, + location = {Los Angeles, CA}, +} + +@techreport{ baker77incremental, + author = {Henry G. {Baker, Jr.} and Carl Hewitt}, + title = {The Incremental Garbage Collection of Processes}, + institution = {\bibbrev{MIT AI Lab}{Massachusetts Institute + of Technology Artificial Intelligence Laboratory}}, + number = {AI Memo 454}, + year = 1977, + month = dec, +} + +% final journal version: bakre97implementation +@techreport{ bakre94itcp, + author = {Ajay Bakre and B.R. Badrinath}, + title = {{I-TCP}: Indirect {TCP} for Mobile Hosts}, + institution = {Rutgers University}, + location = {Piscataway, NJ}, + number = {DCS-TR-314}, + month = oct, + year = 1994, +} + +@article{ bakre97implementation, + author = {Ajay V. Bakre and B.R. Badrinath}, + title = {Implementation and Performance Evaluation of Indirect {TCP}}, + journal = {IEEE Transactions on Computers}, + volume = 46, + number = 3, + month = mar, + year = 1997, + pages = {260-278}, +} + +@inproceedings{ bakshi97improving, + author = {Brikam S. Bakshi and P. Krishna and N. H. Vaidya + and D. K. Pradhan}, + title = {Improving the Performance of {TCP} over Wireless Networks}, + booktitle = {\bibconf[17th]{ICDCS}{International Conference on + Distributed Computer Systems}}, + month = may, + year = 1997, + location = {Baltimore, Maryland}, +} + +@techreport{ bala99transparent, + author = "V. Bala and E. Duesterwald and S. Banerjia", + title = "Transparent Dynamic Optimization", + institution = "HP Laboratories", + location = "Cambridge", + number = "HPL-1999-77", + year = "1999", + month = jun, + url = "citeseer.ist.psu.edu/bala99transparent.html" +} + +@article{ bala00dynamo, + author = "Vasanth Bala and Evelyn Duesterwald and Sanjeev Banerjia", + title = "{Dynamo}: a transparent dynamic optimization system", + journal = "ACM SIG{\-}PLAN Notices", + volume = "35", + number = "5", + pages = "1--12", + year = "2000", + url = "citeseer.ist.psu.edu/bala00dynamo.html" +} + +@inproceedings{ balakrishnan95improving, + author = {Hari Balakrishnan and Srinivasan Seshan and Elan Amir + and Randy H. Katz}, + title = {Improving {TCP/IP} Performance over Wireless Networks}, + booktitle = {\bibconf[1st]{MOBICOM}{International Conference on Mobile + Computing and Networking}}, + month = nov, + year = 1995, + location = {Berkeley, CA}, +} + +@article{ balakrishnan97comparison, + author = {Hari Balakrishnan and Venkata N. Padmanabhan + and Srinivasan Seshan and Randy H. Katz}, + title = {A Comparison of Mechanisms for Improving + {TCP} Performance over Wireless Links}, + journal = {IEEE Transactions on Networking}, + volume = 5, + number = 6, + month = dec, + year = 1997, +} + +@inproceedings{ balakrishnan98tcp, + author = {Hari Balakrishnan and others}, + title = {{TCP} Behavior of a Busy {Internet} Server: + Analysis and Improvements}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 1998, +} + +@inproceedings{ balakrishnan98explicit, + author = {Hari Balakrishnan and Randy H. Katz}, + title = {Explicit Loss Notification and Wireless Web Performance}, + booktitle = {IEEE Globecom Internet Mini-Conference}, + month = nov, + year = 1998, + location = {Sydney, Australia}, +} + +@inproceedings{ balakrishnan99integrated, + author = {Hari Balakrishnan and Hariharan S. Rahul + and Srinivasan Seshan}, + title = {An Integrated Congestion Management Architecture + for {Internet} Hosts}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = sep, + year = 1999, +} + +@inproceedings{balakrishnan03semantic-free, + author = "Hari Balakrishnan and Scott Shenker and Michael Walfish", + title = {Semantic-Free Referencing in Linked Distributed Systems}, + booktitle = {\bibconf[2nd]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + year = 2003, + month = feb, +} + +@article{balakrishnan03looking, + title = {Looking Up Data in {P2P} Systems}, + author = {Hari Balakrishnan and others}, + journal = {Communications of the ACM}, + year = {2003}, + month = feb, +} + +@inproceedings{ balakrishnan04layered, + author = {Hari Balakrishnan and Karthik Lakshminarayanan and + Sylvia Ratnasamy and Scott Shenker and Ion Stoica and + Michael Walfish}, + title = {A Layered Naming Architecture for the Internet}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Portland, OR}, + month = sep, + year = {2004}, +} + +@inproceedings{ ballani09making, + author = {Hitesh Ballani and Paul Francis and Tuan Cao and Jia Wang}, + title = {Making Routers Last Longer with {ViAggre}}, + booktitle = {\bibconf[6th]{NSDI}{USENIX/ACM Symposium + on Networked Systems Design and Implementation}}, + month = apr, + year = 2009, + location = {Boston, MA}, +} + +@article{ banerjea96simulation, + author = {Anindo Banerjea}, + title = {Simulation study of the capacity effects of dispersity + routing for fault tolerant realtime channels}, + journal = {Computer Communications Review}, + volume = 26, + number = 4, + month = oct, + year = 1996, +} + +@techreport{ barakat99tcp, + author = {Chadi Barakat and Eitan Altman and Walid Dabbous}, + title = {On {TCP} Performance in an Heterogeneous Network: + A Survey}, + number = {3737}, + institution = {INRIA}, + location = {Sophia Antipolis, France}, + month = jul, + year = 1999, +} + +@article{ barakat00tcp, + author = {Chadi Barakat and Eitan Altman and Walid Dabbous}, + title = {On {TCP} Performance in a Heterogeneous Network: A Survey}, + journal = {IEEE Communications Magazine}, + volume = 38, + number = 1, + pages = {40-46}, + month = jan, + year = 2000, +} + + + +@article{ barakat02bandwidth, + author = {Chadi Barakat and Eitan Altman}, + title = {Bandwidth tradeoff between {TCP} and link-level {FEC}}, + journal = {Computer Networks}, + volume = 39, + pages = {133-150}, + year = 2002, +} + +@inproceedings{ baraz03ia, + author = {Leonid Baraz and Tevi Devor and Orna Etzion and Shalom Goldenberg + and Alex Skaletsky and Yun Wang and Yigal Zemach}, + title = {{IA-32 Execution Layer}: a two-phase dynamic translator designed + to support {IA-32} applications on {Itanium}-based systems}, + booktitle = {36th International Conference on Microarchitecture (MICRO36)}, + location = {San Diego, CA}, + year = 2003, + month = dec, + url = "citeseer.ist.psu.edu/baraz03ia.html" +} + +@inproceedings{barham04using, + author = {Paul Barham and + Austin Donnelly and + Rebecca Isaacs and + Richard Mortier}, + title = {Using {M}agpie for Request Extraction and + Workload Modelling}, + booktitle = {\bibconf[6th]{OSDI}{USENIX Symposium on Operating Systems + Design and Implementation}}, + location = {San Francisco, CA}, + month = dec, + year = 2004 +} + +@inproceedings{basescu12robust, + author = {Cristina Basescu and + Christian Cachin and + Ittay Eyal and + Robert Haas and + Alessandro Sorniotti and + Marko Vukolic and + Ido Zachevsky}, + title = {Robust Data Sharing with Key-Value Stores}, + booktitle = {\bibconf[42nd]{DSN}{Annual IEEE/IFIP International + Conference on Dependable Systems and Networks}}, + location = {Boston, MA}, + month = jun, + year = 2012 +} + +@inproceedings{basu11karma, + author = {Basu, Arkaprava and Bobba, Jayaram and Hill, Mark D.}, + title = {Karma: scalable deterministic record-replay}, + booktitle = {\bibconf{ICS}{International conference on Supercomputing}}, + year = {2011}, + location = {Tucson, Arizona, USA}, + pages = {359--368}, +} + +@misc{ battilana04gif, + author = "Michael C. Battilana", + title = "The {GIF} Controversy: A Software Developer's Perspective", + note = "{\tt http://lzw.info/}", + month = jun, + year = 2004, +} + +@article{ bearman99reality, + author = {David Bearman}, + title = {Reality and Chimeras + in the Preservation of Electronic Records}, + journal = {D-Lib Magazine}, + volume = 5, + number = 4, + year = 1999, + month = apr, +} + +@book{ bedford01probabilistic, + author = {Tim Bedford and Roger Cooke}, + title = {Probabilistic Risk Analysis: {F}oundations and Methods}, + publisher = {Cambridge University Press}, + year = 2001 +} + +@inproceedings{ bedichek90some, + author = "R. Bedichek", + title = "Some Efficient Architecture Simulation Techniques", + booktitle = "{USENIX} Winter 1990 Technical Conference", + location = "Washington, D.C.", + pages = "53--64", + year = "1990", +} + +@misc{ bellard05qemu, + title = {{QEMU}, a Fast and Portable Dynamic Translator}, + author = {Fabrice Bellard}, + booktitle = {USENIX Annual Technical Conference, FREENIX Track}, + location = {Anaheim, CA}, + month = apr, + year = 2005, + pages = {41--46}, +} + +@article{ bellare00authenticated, + author = {Mihir Bellare and Chanathip Namprempre}, + title = {Authenticated Encryption: Relations among notions + and analysis of the generic composition paradigm}, + journal = {\bibbrev{LNCS}{Lecture Notes in Computer Science}}, + volume = 1976, + month = sep, + year = 2000, + pages = {531-545}, +} + +@article{ beltrametti88control, + author = {Monica Beltrametti and Kenneth Bobey and John R. Zorbas}, + title = {The Control Mechanism for the + {Myrias} Parallel Computer System}, + journal = {Computer Architecture News}, + volume = 16, + number = 4, + month = sep, + year = 1988, + pages = {21-30}, +} + +@article{benet14ipfs, + title={Ipfs-content addressed, versioned, p2p file system}, + author={Benet, Juan}, + journal={arXiv preprint arXiv:1407.3561}, + year={2014} +} + +@inproceedings{ bennett96hierarchical, + author = {Jon C. R. Bennett and Hui Zhang}, + title = {Hierarchical packet fair queueing algorithms}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = {1996}, + isbn = {0-89791-790-1}, + pages = {143--156}, + location = {Palo Alto, California, United States}, + doi = {http://doi.acm.org/10.1145/248156.248170}, +} + +@article{ bennett99packet, + author = {Jon C. R. Bennett and Craig Partridge and Nicholas Shectman}, + title = {Packet Reordering is Not Pathological Network Behavior}, + journal = {Transactions on Networking}, + volume = 7, + issue = 6, + month = dec, + year = 1999, + pages = {789-798}, +} + +@inproceedings{ berenson95critique, + author = {Hal Berenson and Phil Bernstein and Jim Gray and + Jim Melton and Elizabeth O’Neil and Patrick O'Neil}, + title = {A Critique of {ANSI SQL} Isolation Levels}, + booktitle = {SIGMOD}, + month = jun, + year = 1995, + location = {San Jose, CA}, +} + +@inproceedings{ bergan10coredet, + author = {Tom Bergan and Owen Anderson and Joseph Devietti + and Luis Ceze and Dan Grossman}, + title = {{CoreDet}: A Compiler and Runtime System for + Deterministic Multithreaded Execution}, + booktitle = {\bibconf[15th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + month = mar, + year = 2010, + location = {Pittsburgh, PA}, +} + +@inproceedings{ bergan10deterministic, + author = {Tom Bergan and Nicholas Hunt and Luis Ceze + and Steven D. Gribble}, + title = {Deterministic Process Groups in {dOS}}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = oct, + year = 2010, + location = {Vancouver, BC, Canada}, +} + +@inproceedings{ berger09grace, + author = {Emery D. Berger and Ting Yang and Tongping Liu + and Gene Novark}, + title = {{Grace}: Safe Multithreaded Programming for {C/C++}}, + booktitle = {\bibconf[24th]{OOPSLA}{ACM SIGPLAN Conference on + Object-Oriented + Programming Languages, Systems, and Applications}}, + month = oct, + year = 2009, + location = {Orlando, FL}, +} + +@misc{ bernstein-ipv6, + author = {D. J. Bernstein}, + title = {The {IPv6} mess}, + note = {\url{http://cr.yp.to/djbdns/ipv6mess.html}}, +} + +@inproceedings{ bershad93midway, + author = {Brian N. Bershad and Matthew J. Zekauskas + and Wayne A. Sawdon}, + title = {The {Midway} Distributed Shared Memory System}, + booktitle = {CompCon}, + month = feb, + year = 1993, + pages = {528-537}, + location = {San Francisco, CA}, +} + +@inproceedings{ bershad95extensibility, + author = {Brian N. Bershad and + Stefan Savage and + Przemyslaw Pardyak and + Emin G{\"u}n Sirer and + Marc E. Fiuczynski and + David Becker and + Craig Chambers and + Susan J. Eggers}, + title = {Extensibility, Safety and Performance + in the {SPIN} Operating System}, + booktitle = {\bibconf[15th]{SOSP}{ACM Symposium on Operating System Principles}}, + location = {Copper Mountain, CO}, + year = 1995, +} + +@inproceedings{bessani11depsky, + author = {Alysson Neves Bessani and + Miguel P. Correia and + Bruno Quaresma and + Fernando Andr{\'e} and + Paulo Sousa}, + title = {{DepSky}: {D}ependable and Secure Storage in a + Cloud-of-clouds}, + booktitle = {\bibconf[6th]{EuroSys}{ACM SIGOPS/EuroSys + European Conference on Computer Systems}}, + location = {Salzburg, Austria}, + month = apr, + year = 2011 +} + +@inproceedings{ bessani14state, + author = {Alysson Bessani and Joao Sousa and Eduardo E.P. Alchieri}, + title = {State Machine Replication for the Masses with {BFT-SMART}}, + booktitle = {International Conference on Dependable Systems and Networks (DSN)}, + month = jun, + year = 2014, + pages = {355-362}, +} + +@inproceedings{bezerra14scalable, + title={\href{http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6903591}{Scalable state-machine replication}}, + author={Bezerra, Carlos Eduardo and Pedone, Fernando and Van Renesse, Robbert}, + booktitle={Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on}, + pages={331--342}, + year={2014}, + organization={IEEE} +} + +@inproceedings{ bhagwan04total, + author = {Ranjita Bhagwan and + Kiran Tati and + Yuchung Cheng and + Stefan Savage and + Geoffrey M. Voelker}, + title = {{T}otal {R}ecall: System Support for Automated Availability + Management}, + booktitle = {NSDI}, + month = mar, + year = {2004} +} + + +% Note: journal version is bhandarkar06ltcp +@inproceedings{ bhandarkar05improving, + title = {Improving {TCP} Performance in High Bandwidth High {RTT} Links + Using Layered Congestion Control}, + author = {Sumitha Bhandarkar and Saurabh Jain and A.L. Narasimha Reddy}, + booktitle = {\bibconf[3rd]{PFLDnet}{Workshop on Protocols + for Fast Long-Distance Networks}}, + month = feb, + year = 2005, + location = {Lyon, France} +} + +@article{ bhandarkar06ltcp, + title = {{LTCP}: Improving the Performance of {TCP} in Highspeed + Networks Using Layered Congestion Control}, + author = {Sumitha Bhandarkar and Saurabh Jain and A.L. Narasimha Reddy}, + journal = {Computer Communications Review}, + volume = 36, + number = 1, + month = jan, + year = 2006, +} + +@inproceedings{bhat14mined, + author = {Vasudev Bhat and + Adheesh Gokhale and + Ravi Jadhav and + Jagat Sastry Pudipeddi and + Leman Akoglu}, + title = {Min(e)d your tags: {A}nalysis of question response time in + {StackOverflow}}, + booktitle = {\bibconf{ASONAM}{IEEE/ACM International Conference on + Advances in Social Networks Analysis and Mining}}, + location = {Beijing, China}, + month = aug, + year = 2014 +} + +@inproceedings{ biggadike05natblaster, + author = {Andrew Biggadike and Daniel Ferullo and + Geoffrey Wilson and Adrian Perrig}, + title = {{NATBLASTER}: Establishing {TCP} Connections Between + Hosts Behind {NATs}}, + booktitle = {ACM SIGCOMM Asia Workshop}, + location = {Beijing, China}, + month = apr, + date = {12--14}, + year = {2005}, +} + +@inproceedings{ bienia08characterization, + author = {Christian Bienia and Sanjeev Kumar and Jaswinder Pal Singh + and Kai Li}, + title = {The {PARSEC} Benchmark Suite: + Characterization and Architectural Implications}, + booktitle = {\bibconf[17th]{PACT}{International Conference on + Parallel Architectures and Compilation Techniques}}, + year = {2008}, + month = {October}, + pages = {72--81}, + location = {Toronto, ON} +} + +@article{ billah91resonance, + author = {K. Yusuf Billah and Robert H. Scanlan}, + title = {Resonance, {Tacoma Narrows} bridge failure, + and undergraduate physics textbooks}, + journal = {American Journal of Physics}, + volume = 59, + number = 2, + month = feb, + year = 1991, +} + +@article{ birrell84implementing, + author = {Andrew D. Birrell and Bruce Jay Nelson}, + title = {Implementing Remote Procedure Calls}, + journal = {\bibconf{TOCS}{Transactions on Computer Systems}}, + volume = {2}, + number = {1}, + pages = {39--59}, + month = feb, + year = {1984}, +} + +@misc{ blackshear19move, + author = {Sam Blackshear and Evan Cheng and David L. Dill and + Victor Gao and Ben Maurer and Todd Nowacki and Alistair Pott and + Shaz Qadeer and Rain and Dario Russi and Stephane Sezer and + Tim Zakian and Runtian Zhou}, + title = {\href{https://developers.libra.org/docs/assets/papers/libra-move-a-language-with-programmable-resources.pdf}{Move: A Language With Programmable +Resources}}, + month = jun, + year = 2019, +} + +@article{ blanton02making, + author = "E. Blanton and M. Allman", + title = "On making {TCP} more robust to packet reordering", + journal = "Computer Communications Review", + volume = 32, + number = 1, + month = jan, + year = 2002, +} + +@article{ bloom70space, + author = {Burton H. Bloom}, + title = {Space/time trade-offs in hash coding with allowable errors}, + journal = {Communications of the ACM}, + volume = 13, + number = 7, + pages = {422-426}, + year = 1970, +} + +@inproceedings{blumofe95cilk, + author = {Robert D. Blumofe and Christopher F. Joerg and Bradley C. Kuszmaul and + Charles E. Leiserson and Keith H. Randall and Yuli Zhou}, + title = {{C}ilk: an efficient multithreaded runtime system}, + booktitle = {\bibconf[5th]{PPoPP}{ACM SIGPLAN Symposium on + Principles and Practice of Parallel Programming}}, + year = {1995}, + pages = {207--216}, + location = {Santa Barbara, CA} +} + +@inproceedings{ bocchino09parallel, + author = {Bocchino Jr., Robert L. and Adve, Vikram S. and + Adve, Sarita V. and Snir, Marc}, + title = {Parallel Programming Must Be Deterministic by Default}, + booktitle = {\bibconf[1st]{HotPar}{Workshop on + Hot Topics in Parallelism (HotPar '09)}}, + month = mar, + year = {2009}, + location = {Berkeley, California, USA}, + url = {http://www.usenix.org/event/hotpar09/tech/full_papers/bocchino/bocchino.pdf}, +} + +@inproceedings{ bocchino09dpj, + author = {Robert L. {Bocchino Jr.} and Vikram S. Adve and Danny Dig and + Sarita V. Adve and Stephen Heumann and Rakesh Komuravelli and + Jeffrey Overbey and Patrick Simmons and Hyojin Sung and + Mohsen Vakilian}, + title = {A Type and Effect System for Deterministic Parallel {Java}}, + booktitle = {OOPSLA}, + month = oct, + year = 2009, + location = {Orlando, FL}, + url = {http://dpj.cs.uiuc.edu/DPJ/Publications_files/paper_1.pdf}, +} + +@article{ boggs80pup, + author = {David R. Boggs and John F. Shoch and Edward A. Taft + and Robert M. Metcalfe}, + title = {Pup: An Internetwork Architecture}, + journal = {IEEE Transactions on Communications}, + volume = 28, + number = 4, + month = apr, + year = 1980, + pages = {612-624}, +} + +@inproceedings{ bohacek03tcppr, + author = {Stephan Bohacek and others}, + title = {{TCP-PR}: {TCP} for Persistent Packet Reordering}, + booktitle = {\bibconf[23rd]{ICDCS}{International Conference + on Distributed Computing Systems}}, + year = 2003, + month = may, + location = {Providence, RI}, +} + +@article{ boichat03deconstructing, + author = {Romain Boichat and Partha Dutta and Svend Frølund + and Rachid Guerraoui}, + title = {Deconstructing {Paxos}}, + journal = {ACM SIGACT News}, + volume = 34, + number = 1, + month = mar, + year = 2003, +} + +@book{ boleuf01wiki, + author = {Bo Leuf and Ward Cunningham}, + title = {The Wiki Way}, + publisher = {Addison-Wesley Longman}, + isbn = {0-201-71499-X}, + month = mar, + year = 2001, +} + +@inproceedings{bonvin10aself-organized, + author = {Nicolas Bonvin and + Thanasis G. Papaioannou and + Karl Aberer}, + title = {A Self-organized, Fault-tolerant and Scalable Replication + Scheme for Cloud Storage}, + booktitle = {\bibconf[1st]{SoCC}{ACM Symposium on Cloud Computing}}, + location = {Indianapolis, IN}, + month = jun, + year = 2010 +} + +@inproceedings{ boyd-wickizer08corey, + author = {Silas Boyd-Wickizer and others}, + title = {{Corey}: An Operating System for Many Cores}, + booktitle = {\bibconf[8th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + location = {San Diego, CA}, + month = dec, + year = 2008, +} + +@article{ brakmo95tcp, + author = "L. Brakmo and L. Peterson", + title = "{TCP Vegas}: End to End Congestion Avoidance + on a Global {Internet}", + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 13, + number = 8, + month = oct, + year = 1995, + pages = {1465-1480}, +} + +@techreport{ braun95experimental, + author = "T. Braun and C. Diot and A. Hoglander and V. Roca", + title = "An Experimental User Level Implementation of {TCP}", + institution = "INRIA", + location = "Sophia Antipolis, France", + number = "2650", + year = "1995", + month = sep, + url = "citeseer.ist.psu.edu/braun95experimental.html" +} + +@article{ bressoud96hypervisor, + author = {Thomas C. Bressoud and Fred B. Schneider}, + title = {Hypervisor-Based Fault-Tolerance}, + journal = {\bibconf{TOCS}{ACM Transactions on Computer Systems}}, + volume = 14, + number = 1, + month = feb, + year = 1996, + pages = {80-107}, +} + +@inproceedings{ brewer92proteus, + author = "Eric A. Brewer and Chrysanthos Dellarocas and Adrian Colbrook + and William E. Weihl", + title = "{PROTEUS}: A High-Performance Parallel-Architecture Simulator", + booktitle = "Measurement and Modeling of Computer Systems", + pages = "247-248", + year = "1992", + url = "citeseer.ist.psu.edu/article/brewer91proteus.html" +} + +@article{ bricklin00cornucopia, + author = "Dan Bricklin", + title = "The Cornucopia of the Commons: How to get volunteer labor", + month = aug, + year = "2000", +} + +@article{ briscoe07flow, + author = {Bob Briscoe}, + title = {Flow Rate Fairness: Dismantling a Religion}, + journal = {Computer Communications Review}, + volume = 37, + number = 2, + pages = {63-74}, + month = apr, + year = 2007, +} + +@inproceedings{ brumley03remote, + author = {David Brumley and Dan Boneh}, + title = {Remote Timing Attacks are Practical}, + booktitle = {12th USENIX Security Symposium}, + month = aug, + year = 2003, + location = {Washington, DC}, +} + +@inproceedings{ broder97resemblance, + author = {Andrei Z. Broder}, + title = {On the Resemblance and Containment of Documents}, + booktitle = {\bibconf{SEQUENCES}{Compression and Complexity of Sequences}}, + month = jun, + year = {1997}, + url = "citeseer.nj.nec.com/broder97resemblance.html" +} + +@inproceedings{ broder98resemblance, + author = "Andrei Z. Broder", + title = "On the Resemblance and Containment of Documents", + booktitle = "{SEQS}: Sequences '91", + year = "1998", + url = "citeseer.nj.nec.com/broder97resemblance.html" +} + +@article{ brown97mtcp, + author = {Kevin Brown and Suresh Singh}, + title = {{M-TCP}: {TCP} for Mobile Cellular Networks}, + journal = {Computer Communications Review}, + volume = 27, + number = 5, + month = oct, + year = 1997, + pages = {19--43}, +} + +@article{ budimlic10cnc, + author = {Zoran Budimli\'c and Michael Burke and Vincent Cav\'e and + Kathleen Knobe and Geoff Lowney and Ryan Newton and + Jens Palsberg and David Peixotto and Vivek Sarkar and + Frank Schlimbach and Sa\u{g}nak Ta\c{s}irlar}, + title = {Concurrent Collections}, + journal = {Scientific Programming}, + volume = 18, + number = 3, + year = 2010, + month = jan, + pages = {203--217}, +} + +@inproceedings{ budimlic11deterministic, + author = {Zoran Budimli\'c and Michael Burke and Kathleen Knobe and + Ryan Newton and David Peixotto and Vivek Sarkar and Edwin Westbrook}, + title = {Deterministic Reductions in an Asynchronous Parallel Language}, + booktitle = {\bibconf[2nd]{WoDet}{Workshop on Determinism + and Correctness in Parallel Programming}}, + month = mar, + day = 6, + year = 2011, + location = {Newport Beach, CA}, +} + +@inproceedings{ bull00jomp, + author = {J. M. Bull and M. E. Kambites}, + title = {{JOMP}---an {OpenMP}-like Interface for {Java}}, + booktitle = {\bibconf{Java Grande}{ACM Java Grande Conference}}, + month = jun, + year = 2000, + location = {San Francisco, CA}, +} + +@article{ bullot03evaluation, + author = {Hadrien Bullot and R. Les Cottrell and Richard Hughes-Jones}, + title = {Evaluation of Advanced TCP Stacks on + Fast Long-Distance Production Networks}, + journal = {Journal of Grid Computing}, + volume = 1, + number = 4, + month = dec, + year = 2003, +} + +@inproceedings{ burnim09asserting, + author = {Jacob Burnim and Koushik Sen}, + title = {Asserting and Checking Determinism for Multithreaded Programs}, + booktitle = {\bibconf{FSE}{ACM SIGSOFT Symposium on the + Foundations of Software Engineering}}, + month = aug, + year = 2009, + location = {Amsterdam, Netherlands}, +} + +@inproceedings{burckhardt10revisions, + title = {Concurrent programming with revisions and isolation types}, + author = {Sebastian Burckhardt and Alexandro Baldassin and + Daan Leijen}, + month = oct, + year = {2010}, + pages = {691-707}, + booktitle = {\bibconf{OOPSLA}{Proceedings of the 25th + {Annual ACM SIGPLAN} Conference on {O}bject-Oriented + Programming, Systems, Languages, and Applications}}, +} + +@misc{ bush08ipv6, + author = {Randy Bush}, + title = {{IPv6} Transition \& Operational Reality}, + booktitle = {AfNOG Conference}, + month = jun, + day = 3, + year = 2008, + location = {Rabat, Morocco}, + url = {http://www.afnog.org/afnog2008/conference/talks/IPv6_Transition.pdf}, +} + +%C + +@article{ caceres95improving, + author = {Ram\'on C\'aceres and Liviu Iftode}, + title = {Improving the Performance of Reliable Transport Protocols + in Mobile Computing Environments}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 13, + number = 5, + month = jun, + year = 1995, + pages = {850-857}, +} + + + +@article{cachin09trusting, + author = {Christian Cachin and + Idit Keidar and + Alexander Shraer}, + title = {{Trusting the Cloud}}, + journal = {SIGACT News}, + volume = {40}, + number = {2}, + year = {2009}, + pages = {81-86} +} + +@techreport{cachin10dependable, + author = {Christian Cachin and + Robert Haas and + Marko Vukolic}, + title = {{Dependable Storage in the Intercloud}}, + number = {{RZ3783}}, + institution = {{IBM Research, Zurich}}, + year = {2010}, + note = {Available at \url{http://domino.research.ibm.com/library/cyberdig.nsf/papers/630549C46339936C852577C200291E78/$File/rz3783.pdf}} +} + +@inproceedings{ caesar06virtual, + author = {Matthew Caesar and others}, + title = {Virtual Ring Routing: Network Routing Inspired by {DHTs}}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + year = 2006, + month = sep, +} + +@inproceedings{ caesar06rofl, + author = {Matthew Caesar and others}, + title = {{ROFL}: Routing on Flat Labels}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + year = 2006, + month = sep, +} + +@article{ caini04tcp, + author = {Carlo Cainini and Rosario Firrincieli}, + title = {{TCP Hybla}: a {TCP} enhancement for heterogeneous networks}, + journal = {International Journal of Satellite Communications + and Networking}, + volume = 22, + pages = {547-566}, + year = 2004, +} + +@article{ caini06transport, + author = {Carlo Caini and Rosario Firrincieli and Mario Marchese + and Tomaso de Cola and Michele Luglio + and Cesare Roseti and Nedo Celandroni + and Francesco Potort\'i}, + title = {Transport layer protocols and architectures + for satellite networks}, + journal = {International Journal of Satellite Communications + and Networking}, + volume = 25, + number = 1, + year = 2006, + pages = {1-26}, +} + +@inproceedings{calder11windows, + author = {Calder, Brad and Wang, Ju and Ogus, Aaron and + Nilakantan, Niranjan and Skjolsvold, Arild and McKelvie, Sam + and Xu, Yikang and Srivastav, Shashwat and Wu, Jiesheng and + Simitci, Huseyin and Haridas, Jaidev and + Uddaraju, Chakravarthy and Khatri, Hemal and Edwards, Andrew + and Bedekar, Vaman and Mainali, Shane and Abbasi, Rafay and + Agarwal, Arpit and Haq, Mian Fahim ul and + Haq, Muhammad Ikram ul and Bhardwaj, Deepali and + Dayanand, Sowmya and Adusumilli, Anitha and McNett, Marvin + and Sankaran, Sriram and Manivannan, Kavitha and + Rigas, Leonidas}, + title = {Windows Azure Storage: A Highly Available Cloud + Storage Service with Strong Consistency}, + series = {SOSP '11}, + booktitle = {\bibconf[23rd]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + year = {2011}, + location = {Cascais, Portugal}, +} + +@inproceedings{ carter91implementation, + author = {John B. Carter and John K. Bennett and Willy Zwaenepoel}, + title = {Implementation and Performance of {Munin}}, + booktitle = {\bibconf[2nd]{PPoPP}{ACM SIGPLAN Symposium on Principles and + Practice of Parallel Programming}}, + month = oct, + year = 1991, + location = {Pacific Grove, CA}, +} + +@inproceedings{ casado07peering, + author = {Martin Casado and Michael J. Freedman}, + title = {Peering Through the Shroud: + The Effect of Edge Opacity on IP-Based Client Identification}, + booktitle = {4th NSDI}, + location = {Cambridge, MA}, + month = apr, + year = 2007, +} + +@article{ case96implementing, + author = {Brian Case}, + title = {Implementing the {Java} Virtual Machine}, + journal = {Microprocessor Report}, + volume = {10}, + number = {4}, + pages = {12--17}, + month = mar, + date = {25}, + year = {1996}, +} + +@article{ casetti02tcp, + author = {Claudio Casetti and Mario Gerla and Saverio Mascolo and + M.Y. Sanadidi and Ren Wang}, + title = {{TCP Westwood}: End-to-End Congestion Control for + Wired/Wireless Networks}, + journal = {Wireless Networks}, + volume = 8, + number = 5, + pages = {467-479}, + month = sep, + year = 2002, +} + +% conference paper: castelluccia96generating +@techreport{ castelluccia95hippco, + author = {Claude Castelluccia and Walid Dabbous}, + title = {{HIPPCO}: A High Performance Protocol Code Optimizer}, + number = {2748}, + institution = {INRIA}, + location = {Sophia Antipolis, France}, + month = dec, + year = 1995, +} + +@inproceedings{ castelluccia96generating, + author = {Claude Castelluccia and Walid Dabbous}, + title = {Generating Efficient Protocol Code + from an Abstract Specification}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1996, + location = {Stanford University, CA}, +} + +@inproceedings{ castro99practical, + author = {Miguel Castro and Barbara Liskov}, + title = {\href{http://css.csail.mit.edu/6.824/2014/papers/castro-practicalbft.pdf}{Practical {Byzantine} Fault Tolerance}}, + booktitle = {\bibconf[3rd]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + location = {New Orleands, LA}, + month = feb, + year = 1999, +} + % url = {http://css.csail.mit.edu/6.824/2014/papers/castro-practicalbft.pdf}, + +@inproceedings{ castro02secure, + author = {Miguel Castro and others}, + title = {Secure routing for structured peer-to-peer overlay networks}, + booktitle = {\bibconf[5th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = dec, + year = 2002, + location = {Boston, MA}, +} + +@article{ cellan-jones08broadband, + author = {Rory Cellan-Jones}, + title = {Broadband --- are you mobile or fixed?}, + journal = {BBC News dot.life}, + month = aug, + day = 15, + year = 2008, + url = {http://www.bbc.co.uk/blogs/technology/2008/08/broadband_are_you_mobile_or_fi.html}, +} + +@article{ cen03endtoend, + author = {Song Cen and Pamela C. Cosman and Geoffrey M. Voelker}, + title = {End-to-end differentiation of congestion and wireless losses}, + journal = {Transactions on Networking}, + volume = 11, + number = 5, + pages = {703-717}, + month = oct, + year = 2003, +} + +% updated in chand19formal preprint with incomplete proof bug-fix +@inproceedings{chand16formal, + author = {Saksham Chand and Yanhong A. Liu and Scott D. Stoller}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-319-48989-6_8}{Formal Verification of Multi-Paxos for Distributed Consensus}}, + booktitle = {\bibconf[21st]{FM}{International Symposium on Formal Methods}}, + month = nov, + year = {2016}, +} + +@misc{chand19formal, + author = {Saksham Chand and Yanhong A. Liu and Scott D. Stoller}, + title = {\href{https://arxiv.org/abs/1606.01387}{Formal Verification of Multi-Paxos for Distributed Consensus}}, + month = nov, + year = {2019}, + eprint = {1606.01387}, + archivePrefix = {arXiv}, + primaryClass = {cs.DC} +} + +@techreport{ chandy93deterministic, + author = {K.M. Chandy and I. Foster}, + title = {A Deterministic Notation for Cooperating Processes}, + number = {MCS-P346-0193}, + institution = {Argonne National Lab}, + year = {1993}, +} + +@inproceedings{ chang02trustless, + author = "B. Chang and K. Crary and M. DeLap and R. Harper and + J. Liszka and T. Murphy~VII and F. Pfenning", + title = "Trustless grid computing in {ConCert}", + pages = "112--125", + booktitle = "Workshop on Grid Computing", + location = "Baltimore, MD", + year = "2002", + month = nov, + keywords = "certified code, proof carrying code, grid computing", + url = "citeseer.ist.psu.edu/chang02trustless.html" +} + +@inproceedings{ chang06bigtable, + author = {Fay Chang and others}, + title = {Bigtable: A Distributed Storage System for Structured Data}, + booktitle = {\bibconf[7th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = nov, + year = {2006}, +} + +@inproceedings{ chari02bluebox, + author = {Suresh N. Chari and Pau-Chen Cheng}, + title = {{BlueBox}: A Policy-Driven, Host-Based + Intrusion Detection System}, + booktitle = {Network and Distributed System Security}, + month = feb, + year = 2002, +} + +@inproceedings{ chawathe03gnutella, + author = {Yatin Chawathe and others}, + title = {Making {Gnutella}-like {P2P} Systems Scalable}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + year = 2003, + month = aug, + pages = {407-418}, +} + +@phdthesis{ chen99new, + author = {Johnny Chen}, + title = {New Approaches to Routing for Large-Scale Data Networks}, + school = {Rice University}, + month = jun, + year = 1999, +} + +@techreport{ chen02l+, + author = "Benjie Chen and Robert Morris", + title = "{L+}: Scalable Landmark Routing and Address Lookup + for Multi-hop Wireless Networks", + institution = "\bibbrev{MIT LCS}{Massachusetts Institute of Technology + Laboratory for Computer Science}", + number = "837", + month = mar, + year = "2002", +} + +@phdthesis{ chen04serverless, + author = "Benjie Chen", + title = "A Serverless, Wide-Area Version Control System", + school = "Massachusetts Institute of Technology", + year = "2004", +} + +@inproceedings{chen08automating, + author = {Xu Chen and + Ming Zhang and + Zhuoqing Morley Mao and + Paramvir Bahl}, + title = {Automating Network Application + Dependency Discovery: {E}xperiences, + Limitations, and New Solutions}, + booktitle = {\bibconf[8th]{OSDI}{USENIX Symposium on Operating Systems + Design and Implementation}}, + location = {San Diego, CA}, + month = dec, + year = 2008 +} + + +@inproceedings{ chen10side, + author = {Shuo Chen and Rui Wang and XiaoFeng Wang and Kehuan Zhang}, + title = {Side-Channel Leaks in Web Applications: + a Reality Today, a Challenge Tomorrow}, + booktitle = {{IEEE} Symposium on Security and Privacy}, + month = may, + year = 2010, + location = {Oakland, CA}, +} + +@article{Chen10lreplay, + author = {Chen, Yunji and Hu, Weiwu and Chen, Tianshi and Wu, Ruiyang}, + title = {LReplay: a pending period based deterministic replay scheme}, + journal = {SIGARCH Computer Architecture News}, + volume = {38}, + number = {3}, + month = jun, + year = {2010}, + pages = {187--197}, +} + +@misc{ chen17under, + author = {Ting Chen and Xiaoqi Li and Xiapu Luo and Xiaosong Zhang}, + title = {\href{https://arxiv.org/abs/1703.03994}{Under-Optimized Smart Contracts Devour Your Money}}, + month = mar, + year = 2017, +} + +@inproceedings{ cheng89loopfree, + author = "C. Cheng and R. Riley and S. P. R. Kumar and + J. J. Garcia-Luna-Aceves", + title = "A Loop-free {Bellman-Ford} Routing Protocol + Without Bouncing Effect", + booktitle = "\bibbrev{SIGCOMM}{ACM SIGCOMM}", + pages = "224-237", + month = sep, + year = "1989", +} + +@article{ cheng08confusion, + author = {Jacqui Cheng}, + title = {{.confusion}: {ICANN} opens up {Pandora's Box} of new {TLDs}}, + journal = {Ars Technica}, + month = jun, + day = 26, + year = 2008, + url = {http://arstechnica.com/news.ars/post/20080626-confusion-icann-opens-up-pandoras-box-of-new-tlds.html}, +} + +@article{ cheriton86vmtp, + author = {David R. Cheriton}, + title = {{VMTP}: A Transport Protocol for the Next Generation + of Communication Systems}, + journal = {Computer Communications Review}, + volume = {16}, + number = {3}, + month = aug, + year = {1986}, + pages = {406--415}, +} + +@inproceedings{ cheriton89sirpent, + author = {David R. Cheriton}, + title = {Sirpent: A High-Performance Internetworking Approach}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = sep, + year = 1989, + location = {Austin, TX}, +} + +@inproceedings{cheriton89-leases, + author = {C. Gray and D. Cheriton}, + title = {Leases: an efficient fault-tolerant mechanism for distributed file cache consistency}, + booktitle = {\bibconf[12th]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + year = {1989} +} + +@misc{ cheriton00triad, + author = "David R. Cheriton and Mark Gritter", + title = "{TRIAD}: A New Next-Generation {Internet} Architecture", + month = jul, + year = "2000", + url = "{\tt http://www.dsg.stanford.edu/triad}", +} + +@techreport{ cheriton00triad-nat, + author = {David R. Cheriton and Mark Gritter}, + title = {{TRIAD}: a Scalable Deployable {NAT}-based + {Internet} Architecture}, + institution = {Stanford University}, + month = jan, + year = "2000", + url = "{\tt http://www.dsg.stanford.edu/triad}", +} + +@article{ chernoff98fx32, + author = {A. Chernoff and M. Herdeg and R. Hookway and C. Reeve and + N. Rubin and T. Tye and S. Bharadwaj Yadavalli and J. Yates}, + title = {{FX!32}: a profile-directed binary translator}, + journal = {IEEE Micro}, + volume = {18}, + number = {2}, + issn = {0272-1732}, + pages = {56--64}, + month = mar, + year = {1998}, +} + +@misc{ cheshire05nat, + author = {Stuart Cheshire and Marc Krochmal and Kiren Sekar}, + title = {{NAT} Port Mapping Protocol}, + month = jun, + year = 2005, + day = 7, + note = "Internet-Draft (Work in Progress)", +} + +@book{ cheswick94firewalls, + author = {William R. Cheswick and Steven M. Bellovin + and Aviel D. Rubin}, + title = {Firewalls and Internet Security}, + publisher = {Addison-Wesley}, + month = feb, + day = 24, + year = 2003, +} + +@misc{ chiappa99endpoints, + author = {J. Noel Chiappa}, + title = {Endpoints and Endpoint Names: + A Proposed Enhancement to the Internet Architecture}, + year = 1999, + note = "Internet-Draft (Work in Progress)", +} + +@article{ chiu89analysis, + author = {Dah-Ming Chiu and Raj Jain}, + title = {Analysis of the Increase and Decrease Algorithms + for Congestion Avoidance in Computer Networks}, + journal = {Computer Networks and ISDN Systems}, + volume = 17, + number = 1, + month = jun, + year = 1989, + pages = {1-14}, +} + +@inproceedings{ chockalingam99wireless, + author = {A. Chockalingam and Michele Zorzi and Velio Tralli}, + title = {Wireless {TCP} performance with link layer {FEC/ARQ}}, + booktitle = {\bibconf{ICC}{IEEE International Conference + on Communications}}, + month = jun, + year = 1999, + location = {Vancouver, BC, Canada}, +} + +@techreport{ chung02fairplayer, + author = {Jae Chung and Yali Zhu and Mark Claypool}, + title = {{FairPlayer} or {FoulPlayer}? --- Head to Head + Performance of {RealPlayer} Streaming Video Over + {UDP} versus {TCP}}, + institution = {Worcester Polytechnic Institute}, + number = {WPI-CS-TR-02-17}, + month = may, + year = 2002, +} + +@inbook{ cisco08topology, + author = {Cisco Systems, Inc.}, + title = {Topology Hiding}, + booktitle = {{Cisco IOS XE} Integrated Session Border Controller + Configuration Guide for the {Cisco ASR 1000} Series + Aggregation Services Routers}, + month = oct, + year = 2008, +} + +@inproceedings{ clark88design, + author = {David D. Clark}, + title = {The Design Philosophy of the {DARPA} {Internet} protocols}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1988, + loation = {Stanford, CA}, +} + +@inproceedings{ clark90architectural, + author = {D. D. Clark and D. L. Tennenhouse}, + title = {Architectural considerations for a + new generation of protocols}, + booktitle = {ACM SIGCOMM}, + year = {1990}, + isbn = {0-89791-405-8}, + pages = {200--208}, + location = {Philadelphia, Pennsylvania, United States}, +} + +@inproceedings{ clark03fara, + author = {David Clark and Robert Braden and Aaron Falk and + Venkata Pingali}, + title = {{FARA}: Reorganizing the Addressing Architecture}, + booktitle = {\bibconf{FDNA}{ACM SIGCOMM Workshop on + Future Directions in Network Architecture}}, + location = {Karlsruhe, Germany}, + month = aug, + year = {2003}, +} + +@inproceedings{ clarke01freenet, + author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and + Theodore W. Hong}, + title = {\href{https://link.springer.com/chapter/10.1007/3-540-44702-4_4}{Freenet: A Distributed Anonymous Information Storage and Retrieval System}}, + booktitle = {International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability}, + month = jan, + year = 2001, +} + +@inproceedings{ clement09upright, + author = {Allen Clement and Manos Kapritsos and Sangmin Lee and + Yang Wang and Lorenzo Alvisi and Mike Dahlin and + Taylor Rich\'{e}}, + title = {{UpRight} Cluster Services}, + booktitle = {ACM Symposium on Operating Systems Principles (SOSP)}, + month = oct, + year = 2009, +} + +@article{ cmelik94shade, + author = "Bob Cmelik and David Keppel", + title = "{Shade}: A Fast Instruction-Set Simulator for Execution Profiling", + journal = "\bibconf{SIGMETRICS PER}{ACM SIGMETRICS + Performance Evaluation Review}", + volume = "22", + number = "1", + month = may, + pages = "128--137", + year = "1994", + url = "citeseer.ist.psu.edu/cmelik93shade.html" +} + +@misc{ coalson05flac, + author = {Josh Coalson}, + title = {Free lossless audio codec format}, + note = {\\ {\small\tt http://flac.sourceforge.net/format.html}}, +} + +@article{ coarfa06performance, + author = {Cristian Coarfa and Peter Druschel and Dan S. Wallach}, + title = {Performance Analysis of {TLS} Web Servers}, + journal = {\bibconf{TOCS}{Transactions on Computer Systems}}, + volume = 24, + number = 1, + month = feb, + year = 2006, + pages = {36-69}, +} + +@inproceedings{ cohen03incentives, + author = {Bram Cohen}, + title = {Incentives Build Robustness in {BitTorrent}}, + booktitle = {\bibconf[1st]{p2pecon}{Workshop on Economics + of Peer-to-Peer Systems}}, + month = jun, + year = 2003, + location = {Berkeley, CA}, +} + +@misc{ compaq98alpha, + author = {Compaq}, + title = {Alpha Architecture Handbook}, + month = oct, + year = 1998, +} + +@article{ cooper02peertopeer, + author = "Brian Cooper and Hector Garcia-Molina", + title = "Peer-to-peer data trading to preserve information", + journal = "Information Systems", + volume = "20", + number = "2", + pages = "133-170", + year = "2002", + url = "citeseer.ist.psu.edu/464407.html" +} + +@article{corbett13spanner, + author = {Corbett, James C. and Dean, Jeffrey and Epstein, Michael and Fikes, Andrew and Frost, Christopher and Furman, J. J. and Ghemawat, Sanjay and Gubarev, Andrey and Heiser, Christopher and Hochschild, Peter and Hsieh, Wilson and Kanthak, Sebastian and Kogan, Eugene and Li, Hongyi and Lloyd, Alexander and Melnik, Sergey and Mwaura, David and Nagle, David and Quinlan, Sean and Rao, Rajesh and Rolig, Lindsay and Saito, Yasushi and Szymaniak, Michal and Taylor, Christopher and Wang, Ruth and Woodford, Dale}, + title = {\href{http://doi.acm.org/10.1145/2491245}{Spanner: Google's Globally Distributed Database}}, + journal = {ACM Trans. Comput. Syst.}, + issue_date = {August 2013}, + volume = {31}, + number = {3}, + month = aug, + year = {2013}, + issn = {0734-2071}, + pages = {8:1--8:22}, + articleno = {8}, + numpages = {22}, + url = {http://doi.acm.org/10.1145/2491245}, + doi = {10.1145/2491245}, + acmid = {2491245}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {Distributed databases, concurrency control, replication, time management, transactions}, +} + +@article{corradi12vm, + title = {{VM} Consolidation: + {A} Real Case Based on OpenStack Cloud}, + author = {Corradi, Antonio and Fanelli, Mario and Foschini, Luca}, + journal = {Future Generation Computer Systems}, + year = 2012, + publisher = {Elsevier} +} + +@article{ correia06consensus, + author = {Miguel Correia and Nuno Ferreira Neves and Paulo Veríssimo}, + title = {From Consensus to Atomic Broadcast: + Time-Free {Byzantine}-Resistant Protocols without Signatures}, + journal = {The Computer Journal}, + volume = 49, + number = 1, + month = jan, + year = 2006, +} + +@article{ correia11byzantine, + author = {Miguel Correia and Giuliana Santos Veronese and + Nuno Ferreira Neves and Paulo Verissimo}, + title = {{Byzantine} consensus in asynchronous message-passing systems: + a survey}, + journal = {International Journal of Critical Computer-Based Systems}, + volume = 2, + number = 2, + month = jul, + year = 2011, + pages = {141-161}, +} + +@inproceedings{ costa05vigilante, + author = {Manuel Costa and others}, + title = {Vigilante: End-to-End Containment of Internet Worms}, + booktitle = {SOSP}, + month = oct, + year = 2005, +} + +@inproceedings{ cowan00subdomain, + author = {Crispin Cowan and others}, + title = {{SubDomain}: Parsimonious Server Security}, + booktitle = {LISA}, + location = {New Orleans, Louisiana}, + year = {2000}, +} + +@inproceedings{ cowen99compact, + author = {Lenore J. Cowen}, + title = {Compact Routing with Minimum Stretch}, + booktitle = {\bibconf[10th]{SODA}{Symposium on Discrete Algorithms}}, + year = {1999}, + isbn = {0-89871-434-6}, + pages = {255--260}, + location = {Baltimore, Maryland}, + address = {Philadelphia, PA}, +} + +@inproceedings{cowling06HQ, + author = {Cowling, James and Myers, Daniel and Liskov, Barbara and Rodrigues, Rodrigo and Shrira, Liuba}, + title = {\href{http://static.usenix.org/legacy/events/osdi06/tech/full_papers/cowling/cowling.pdf}{{HQ} Replication: A Hybrid Quorum Protocol for {Byzantine} Fault Tolerance}}, + booktitle = {7th Symposium on Operating Systems Design and Implementation}, + series = {OSDI '06}, + year = {2006}, + isbn = {1-931971-47-1}, + location = {Seattle, Washington}, + pages = {177--190}, + numpages = {14}, + url = {http://static.usenix.org/legacy/events/osdi06/tech/full_papers/cowling/cowling.pdf}, + acmid = {1298473}, + publisher = {USENIX Association}, + address = {Berkeley, CA, USA}, +} + +@inproceedings{ cox02serving, + title = {Serving {DNS} using {Chord}}, + author = {R. Cox and A. Muthitacharoen and R. Morris}, + booktitle = {\bibconf[1st]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + year = {2002}, + month = mar, +} + +@article{ creasy81origin, + author = {R. J. Creasy}, + title = {The Origin of the {VM/370} Time-Sharing System}, + journal = {IBM Journal of Research and Development}, + volume = 25, + number = 5, + year = 1981, + pages = {483-490}, +} + +@inproceedings{ crespo98archival, + author = "Arturo Crespo and Hector Garcia-Molina", + title = "Archival Storage for Digital Libraries", + booktitle = "International Conference on Digital Libraries", + year = "1998", + url = "citeseer.ist.psu.edu/crespo98archival.html" +} + +@article{ crowcroft98differentiated, + author = {Jon Crowcroft and Philippe Oechslin}, + title = {Differentiated End-to-End Internet Services using + a Weighted Proportional Fair Sharing {TCP}}, + journal = {ACM \bibbrev{CCR}{Computer Communications Review}}, + volume = 28, + number = 3, + month = jul, + year = 1998, + pages = {53-69}, +} + +@inproceedings{ crowcroft03plutarch, + author = {Jon Crowcroft and Steven Hand and Richard Mortier + and Timothy Roscoe and Andrew Warfield}, + title = {Plutarch: An Argument for Network Pluralism}, + booktitle = {\bibconf{FDNA}{ACM SIGCOMM Workshop on + Future Directions in Network Architecture}}, + location = {Karlsruhe, Germany}, + month = aug, + year = {2003}, +} + +@inproceedings{ crowcroft08sourceless, + author = {Jon Crowcroft}, + title = {Sourceless Network Architecture}, + booktitle = {Perspectives Workshop: + End-to-End Protocols for the Future {Internet}}, + location = {Schloss Dagstuhl, Germany}, + year = 2008, + month = jun, + day = 9, +} + +@inproceedings{ crowcroft03plutarch, + author = {Jon Crowcroft and Steven Hand and Richard Mortier and + Timothy Roscoe and Andrew Warfield}, + title = {Plutarch: An Argument for Network Pluralism}, + booktitle = {ACM SIGCOMM FDNA Workshop}, + location = {Karlsruhe}, + month = aug, + year = {2003}, +} + +@misc{ csharp-spec, + author = "{Microsoft Corporation}", + title = "C\# Language Specification, Version 3.0", + year = 2007, +} + +@inproceedings{ cui10stable, + author = {Heming Cui and Jingyue Wu and Junfeng Yang}, + title = {Stable Deterministic Multithreading + Through Schedule Memoization}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = oct, + year = 2010, + location = {Vancouver, BC, Canada}, +} + +@inproceedings{ cui11peregrine, + author = {Heming Cui and Jingyue Wu and John Gallagher and + huayang Guo and Junfeng Yang}, + title = {Efficient deterministic multithreading through + schedule relaxation}, + booktitle = {\bibconf[23rd]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + year = {2011}, + isbn = {978-1-4503-0977-6}, + location = {Cascais, Portugal}, + pages = {337-351}, + url = {http://doi.acm.org/10.1145/2043556.2043588}, + doi = {10.1145/2043556.2043588}, + acmid = {2043588}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +# author = {Heming Cui and Jiri Simsa and Yi-Hong Lin and Hao Li and +# Ben Blum and Xinan Xu and Junfeng Yang and +# Garth A. Gibson and Randal E. Bryant}, +# doi = {http://doi.acm.org/10.1145/2517349.2522735}, +# url = {http://dblp.uni-trier.de/db/conf/sosp/sosp2013.html#CuiSLLBXYGB13}, +@inproceedings{ cui13parrot, + author = {Heming Cui and Jiri Simsa and Yi-Hong Lin and others}, + title = {{Parrot}: a practical runtime for deterministic, stable, + and reliable threads}, + booktitle = {\bibconf[24th]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + year = {2013}, + isbn = {978-1-4503-2388-8}, + location = {Pennsylvania, USA}, + pages = {388-405}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + + +% XXX better reference: wittie86bugnet +@inproceedings{ curtis82bugnet, + author = {Ronald S. Curtis and Larry D. Wittie}, + title = {{BugNet}: A Debugging system for + parallel programming environments}, + booktitle = {\bibconf[3rd]{ICDCS}{International Conference + on Distributed Computing Systems}}, + month = oct, + year = 1982, + location = {Miami/Ft. Lauderdale, FL}, + pages = {394-400}, +} + +@inproceedings{ curtis94muds, + author = "Pavel Curtis and David A. Nichols", + title = "{MUDs} Grow Up: Social Virtual Reality in the Real World", + booktitle = "{COMPCON}", + pages = "193-200", + year = "1994", + url = "citeseer.ist.psu.edu/curtis93muds.html" +} + +%D + +@inproceedings{ dabek02chord, + author = "Frank Dabek and Emma Brunskill and M. Frans Kaashoek and + David Karger and Robert Morris and Ion Stoica and + Hari Balakrishnan", + title = "Building Peer-to-Peer Systems With {Chord}, + a Distributed Lookup Service", + booktitle = "\bibconf[8th]{HotOS}{Workshop on + Hot Topics in Operating Systems}", + month = may, + year = "2001", +} + +@article{ dalal75more, + author = {Yogen K. Dalal}, + title = {More on Selecting Sequence Numbers}, + journal = {SIGOPS Operating Systems Review}, + volume = {9}, + number = {3}, + month = jul, + year = {1975}, + pages = {25--36}, +} + +@inproceedings{ danezis05sybil, + author="G. Danezis and C. Lesniewski-Laas and F. Kaashoek + and R. Anderson", + title="Sybil-resistant {DHT} routing", + booktitle="ESORICS", + year=2005 +} + +@inproceedings{ datta03updates, + author = {A. Datta and M. Hauswirth and K. Aberer}, + title = {Updates in Highly Unreliable, Replicated Peer-to-Peer Systems}, + booktitle = {\bibconf[23rd]{ICDCS}{International Conference + on Distributed Computing Systems}}, + year = 2003, +} + +@article{ davies72control, + author = {Donald W. Davies}, + title = {The Control of Congestion in Packet Switching Networks}, + journal = {IEEE Transactions on Communications}, + month = jun, + year = 1972, + volume = 20, + number = 3, + pages = {546-550} +} + +@techreport{ davies94mable, + author = {Peter Davies and Philippe Lacroute and John Heinlein and + Mark Horowitz}, + title = {Mable: A Technique for Efficient Machine Simulation}, + year = {1994}, + source = {http://www.ncstrl.org:8900/ncstrl/servlet/search?formname=detail\&id=oai%3Ancstrlh%3Astan%3ASTAN%2F%2FCSL-TR-94-636}, + publisher = {Stanford University}, + location = {Stanford, CA}, + number = {CSL-TR-94-636}, +} + +@article{ davies09directaccess, + author = {Joseph Davies}, + title = {{DirectAccess} and the Thin Edge Network}, + journal = {Microsoft TechNet Magazine}, + month = may, + year = 2009, +} + +@article{dean08mapreduce, + author = {Dean, Jeffrey and Ghemawat, Sanjay}, + title = {{M}ap{R}educe: simplified data processing on large clusters}, + journal = {Communications of the ACM}, + volume = {51}, + number = {1}, + month = jan, + year = {2008}, + pages = {107--113}, +} + + +@inproceedings{decandia07dynamo, + author = {Giuseppe DeCandia and + Deniz Hastorun and + Madan Jampani and + Gunavardhan Kakulapati and + Avinash Lakshman and + Alex Pilchin and + Swaminathan Sivasubramanian and + Peter Vosshall and + Werner Vogels}, + title = {{Dynamo}: {A}mazon's Highly Available Key-value Store}, + booktitle = {\bibconf[21st]{SOSP}{ACM Symposium on Operating Systems + Principles}}, + location = {Stevenson, WA}, + month = oct, + year = 2007 +} + +@inproceedings{ dehnert03transmeta, + author = "J. Dehnert and B. Grant and J. Banning and R. Johnson and + T. Kistler and A. Klaiber and J. Mattson", + title = "The {Transmeta} Code Morphing Software: + Using Speculation, Recovery, and + Adaptive Retranslation to Address Real-life Challenges", + booktitle = "International Symposium on Code Generation + and Optimization", + pages = "15--24", + year = "2003", + url = "citeseer.ist.psu.edu/dehnert03transmeta.html" +} + +@inproceedings{ demers87epidemic, + author = {Alan Demers and others}, + title = {Epidemic algorithms for replicated database maintenance}, + booktitle = {\bibconf[6th]{PODC}{ACM Symposium on + Principles of Distributed Computing}}, + year = {1987}, + isbn = {0-89791-239-4}, + pages = {1--12}, + location = {Vancouver, British Columbia, Canada}, +} + +@article{ dennis66multiprogrammed, + author = {Jack B. Dennis and Earl C. Van Horn}, + title = {Programming semantics for multiprogrammed computations}, + journal = {Commun. ACM}, + volume = {9}, + number = {3}, + year = {1966}, + pages = {143--155}, +} + +@inproceedings{ desimone93throughput, + author = {Antonio DeSimone and Mooi Choo Chuah On-Ching Yue}, + title = {Throughput Performance of Transport-Layer Protocols + over Wireless {LANs}}, + booktitle = {\bibbrev{GLOBECOM}{IEEE GLOBECOM}}, + month = nov, + year = 1993, + location = {Houston, TX}, +} + +@article{ desnoyers12urcu, + author = {Mathieu Desnoyers and Paul E. McKenney and + Alan Stern and Michel R. Dagenais and Jonathan Walpole}, title = {User-Level Implementations of {Read-Copy Update}}, + journal = {IEEE Transactions on Parallel and Distributed Systems}, + volume = 23, + year = 2012, + issn = {1045-9219}, + pages = {375-382}, + doi = {http://doi.ieeecomputersociety.org/10.1109/TPDS.2011.159}, + publisher = {IEEE Computer Society}, + location = {Los Alamitos, CA, USA}, +} + +@inproceedings{ deutsch84efficient, + author = {L. Peter Deutsch and Allan M. Schiffman}, + title = {Efficient Implementation of the {Smalltalk-80} System}, + booktitle = {Principles of Programming Languages}, + location = {Salt Lake City, UT}, + month = jan, + year = 1984, + pages = {297-302}, +} + +@inproceedings{ devietti09dmp, + author = {Joseph Devietti and Brandon Lucia and Luis Ceze + and Mark Oskin}, + title = {{DMP}: Deterministic Shared Memory Multiprocessing}, + booktitle = {\bibconf[14th]{ASPLOS}{international Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + month = mar, + year = 2009, + location = {Washington, DC}, +} + +@unpublished{dijkstra88cruelty, + author = "Edsger W. Dijkstra", + title = "On the cruelty of really teaching computing science", + month = dec, + year = "1988", + note = {\url{http://www.cs.utexas.edu/users/EWD/ewd10xx/EWD1036.PDF}}, +} + +@article{ dipetrillo08migrating, + author = {Mike DiPetrillo}, + title = {Migrating from {Intel} to {AMD}}, + month = feb, + year = 2008, + note = {\url{http://www.mikedipetrillo.com/mikedvirtualization/2008/02/migrating-from-intel-to-amd.html}} +} + +@inproceedings{ dischinger07characterizing, + author = {Marcel Dischinger and Andreas Haeberlen and Krishna P. Gummadi and Stefan Saroiu}, + title = "Characterizing Residential Broadband Networks", + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = 2007, + location = {San Diego, CA} +} + +@inproceedings{ dischinger08detecting, + author = {Marcel Dischinger and Alan Mislove and Andreas Haeberlen + and Krishna P. Gummadi}, + title = {Detecting BitTorrent Blocking}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = 2008, + location = {Vouliagmeni, Greece}, +} + +@inproceedings{ dohrmann02publickey, + author = {Steve Dohrmann and Carl Ellison}, + title = {Public-key Support for Collaborative Groups}, + booktitle = {1st Annual PKI Research Workshop}, + month = apr, + year = 2002, +} + +@inproceedings{ donnelley81managing, + author = {James E. (Jed) Donnelley}, + title = {Managing Domains in a Network Operating System}, + booktitle = {Local Networks and Distributed Office Systems Conference}, + location = {London, UK}, + month = may, + year = 1981, + pages = {345-361}, +} + +@inproceedings{ douceur08leveraging, + author = {John R. Douceur and Jeremy Elson and Jon Howell + and Jacob R. Lorch}, + title = {Leveraging Legacy Code to Deploy Desktop Applications + on the {Web}}, + booktitle = {\bibconf[8th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = dec, + year = 2008, + location = {San Diego, CA}, +} + +@article{ drummond03reducing, + author = {L\'{u}cia M. A. Drummond and Valmir C. Barbosa}, + title = {\href{https://arxiv.org/pdf/cs/0309042.pdf}{On reducing the complexity of matrix clocks}}, + journal = {Parallel Computing}, + volume = 29, + number = 7, + month = jul, + year = 2003, + pages = {895-905}, +} + +@inproceedings{dunagan04fuse, + author = {John Dunagan and + Nicholas J. A. Harvey and + Michael B. Jones and + Dejan Kostic and + Marvin Theimer and + Alec Wolman}, + title = {{FUSE}: {L}ightweight Guaranteed Distributed + Failure Notification}, + booktitle = {\bibconf[6th]{OSDI}{USENIX Symposium on Operating Systems + Design and Implementation}}, + location = {San Francisco, CA}, + month = dec, + year = 2004 +} + + +@inproceedings{ dunlap02revirt, + author = {George W. Dunlap and Samuel T. King and Sukru Cinar and + Murtaza A. Basrai and Peter M. Chen}, + title = {{ReVirt}: Enabling Intrusion Analysis through + Virtual-Machine Logging and Replay}, + booktitle = {\bibconf[5th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = dec, + year = {2002}, + location = {Boston, MA}, +}, + +@inproceedings{ dunlap08execution, + author = {George W. Dunlap and Dominic G. Lucchetti and + Michael A. Fetterman and Peter M. Chen}, + title = {Execution Replay for Multiprocessor Virtual Machines}, + booktitle = {\bibconf{VEE}{Virtual Execution Environments}}, + month = mar, + year = 2008, + location = {Seattle, WA}, +} + + + +@inproceedings{ dunn12eternal, + Author = {Alan M. Dunn and Michael Z. Lee and Suman Jana and Sangman Kim and Mark Silberstein and Yuanzhong Xu and Vitaly Shmatikov and Emmett Witchel}, + Title = {Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels }, + booktitle = {\bibconf{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + Year = {2012} +} + +@inproceedings{ dutta01active, + author = {Debojyoti Dutta andYongguang Zhang}, + title = {An Active Proxy Based Architecture for {TCP} + in Heterogeneous Variable Bandwidth Networks}, + booktitle = {\bibconf{GLOBECOM}{IEEE GLOBECOM}}, + month = nov, + year = 2001, + location = {San Antonio, TX}, +} + +@misc{ dworkin01cipher, + author = {Morris Dworkin}, + title = {Recommendation for Block Cipher Modes of Operation}, + note = {NIST Special Publication 800-38A}, + month = dec, + year = 2001, +} + +%E + +@techreport{ebcioglu96daisy, + author = {Kemal Ebcioglu and Erik Altman}, + title = {{DAISY}: Dynamic Compilation for + 100\% Architectural Compatibility}, + institution = {IBM}, + number = {RC20538}, + year = {1996}, +} + +@article{ edwards95experiences, + author = {Aled Edwards and Steve Muir}, + title = {Experiences implementing a high performance {TCP} + in user-space}, + journal = {Computer Communications Review}, + volume = {25}, + number = {4}, + year = {1995}, + month = oct, + issn = {0146-4833}, + pages = {196--205}, + doi = {http://doi.acm.org/10.1145/217391.318122}, + publisher = {ACM Press}, + address = {New York, NY}, +} + +@article{ edwards06shim, + author = {Stephen A. Edwards and Olivier Tardieu}, + title = {{SHIM}: A Deterministic Model for + Heterogeneous Embedded Systems}, + journal = {\bibconf{VLSI}{IEEE Transactions on + Very Large Scale Integration Systems}}, + volume = 14, + number = 8, + month = aug, + year = 2006, + pages = {854-867}, +} + +@inproceedings{ edwards08programming, + author = {Stephen A. Edwards and Nalini Vasudevan and Olivier Tardieu}, + title = {Programming Shared Memory Multiprocessors with + Deterministic Message-Passing Concurrency: + Compiling {SHIM} to {Pthreads}}, + booktitle = {\bibconf{DATE}{Design, Automation, and Test in Europe}}, + month = mar, + year = 2008, + location = {Munich, Germany}, +} + +@inproceedings{ efstathopoulos05labels, + author = {Petros Efstathopoulos and others}, + title = {Labels and Event Processes in the {Asbestos} Operating System}, + booktitle = {\bibconf[20th]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + month = oct, + year = 2005, + location = {Brighton, UK}, +} + +@article{ eggert00effects, + author = "Lars Eggert and John Heidemann and Joe Touch", + title = "Effects of Ensemble-TCP", + journal = "{ACM} Computer Communication Review", + year = "2000", + volume = "30", + number = "1", + month = jan, + pages = "15--29", + keywords = "ensemble-tcp, tcp batching", + url = "http://www.isi.edu/~johnh/PAPERS/Eggert00a.html", + psurl = "http://www.isi.edu/~johnh/PAPERS/Eggert00a.ps.gz", + pdfurl = "http://www.isi.edu/~johnh/PAPERS/Eggert00a.pdf", + organization = "USC/Information Sciences Institute", + copyrightholder = "author", +} + +@inproceedings{elnozahy92checkpoints, + author={ Elmootazbellah Nabil Elnozahy and David B. Johnson and Willy Zwaenepoel}, + title={\href{https://infoscience.epfl.ch/record/55787/files/srds92.ps.pdf}{The Performance of Consistent Checkpointing}}, + booktitle={11th Symposium on Reliable Distributed Systems}, + year={1992}, + pages={39-47}, + doi={10.1109/RELDIS.1992.235144}, + publisher={IEEE}, +} + +@inproceedings{enck10taintdroid, + author = {Enck, William and Gilbert, Peter and Chun, Byung-Gon and Cox, Landon P. and Jung, Jaeyeon and McDaniel, Patrick and Sheth, Anmol N.}, + title = {TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones}, + booktitle = {\bibconf{OSDI}{USENIX Conference on Operating Systems Design and Implementation}}, + year = {2010}, +} + +@incollection{engelbart68research, + author = {D. Engelbart and W.K. English}, + title = {A research center for augmenting human intellect}, + editor = {I. Greif}, + booktitle = {Computer-Supported Cooperative Work: + A Book of Readings}, + publisher = {Morgan Kaufmann Publishers}, + address = {San Mateo, CA}, + pages = {81--105}, + year = {1968}, +} + +@inproceedings{ engler95exokernel, + author = {Dawson R. Engler and M. Frans Kaashoek and James O'Toole}, + title = {\href{https://dl.acm.org/citation.cfm?id=224076}{Exokernel: An Operating System Architecture + for Application-Level Resource Management}}, + booktitle = {\bibconf[15th]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + month = dec, + year = 1995, + location = {Copper Mountain, CO}, +} + +@inproceedings{ engler03racerx, + author = {Engler, Dawson and Ashcraft, Ken}, + title = {{RacerX}: effective, static detection of race conditions + and deadlocks}, + booktitle = {\bibconf[19th]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + month = oct, + year = 2003, + location = {Bolton Landing, NY}, +} + +@techreport{ eppinger05tcp, + author = "Jeffrey L. Eppinger", + title = "{TCP} Connections for {P2P} Apps: + A Software Approach to Solving the {NAT} Problem", + institution = "Carnegie Mellon University", + number = "CMU-ISRI-05-104", + month = jan, + year = 2005, +} + +@inproceedings{ eriksson03peernet, + author = "Jakob Eriksson and Michalis Faloutsos + and Srikanth Krishnamurthy", + title = "{PeerNet}: Pushing Peer-to-Peer Down the Stack", + booktitle = {\bibconf[2nd]{IPTPS}{International + Workshop on Peer-to-Peer Systems}}, + month = feb, + year = "2003", + location = "Berkeley, CA", +} + +@misc{ etsi01user, + author = {{European Telecommunications Standards Institute}}, + title = {User identification solutions in converging networks}, + number = {ETSI EG 201 940}, + year = 2001, + month = apr, +} + +@inproceedings{ evard93collaborative, + author = "R\'emy Evard", + title = "Collaborative Networked Communication: {MUD}s as Systems Tools", + booktitle = "Proceedings of the Seventh Systems Administration Conference (LISA VII)", + pages = "1--8", + year = "1993", + month = nov, + location = "Monterey, CA", + url = "citeseer.ist.psu.edu/evard93collaborative.html" +} + +%F + +@inproceedings{ faber99timewait, + author = {Theodore Faber and Joe Touch and Wei Yue}, + title = {The {{\tt TIME-WAIT}} state in {TCP} + and Its Effects on Busy Servers}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + year = 1999, + month = mar, + pages = {1573--1583}, + volume = 3, +} + +@inproceedings{ faustini82dataflow, + author = {Faustini, A. A.}, + title = {An operational semantics for pure dataflow}, + booktitle = {\bibconf[9th]{ICALP} + {International Colloquium on Automata, Languages and Programming}}, + month = jul, + year = 1982, + location = {Aarhus, Denmark}, + pages = {212--224}, +} + +@inproceedings{ feamster04case, + author = {Nick Feamster and Hari Balakrishnan and + Jennifer Rexford and Aman Shaikh and Jacobus {van der Merwe}}, + title = {The Case for Separating Routing from Routers}, + booktitle = {\bibconf{FDNA}{ACM SIGCOMM Workshop on + Future Directions in Network Architecture}}, + location = {Portland, OR}, + month = aug, + year = {2004}, +} + +@inproceedings{ feldman88igor, + author = {Stuart I. Feldman and Channing B. Brown}, + title = {{IGOR}: A System for Program Debugging + via Reversible Execution}, + booktitle = {\bibconf{WPDD}{Workshop on Parallel \& + Distributed Debugging}}, + location = {Madison, WI}, + pages = {112--123}, + month = may, + year = 1988, +} + +@inproceedings{ feldman10sporc, + author = {Ariel J. Feldman and William P. Zeller and + Michael J. Freedman and Edward W. Felten}, + title = + {\href{https://www.usenix.org/legacy/events/osdi10/tech/full_papers/Feldman.pdf} + {{SPORC}: Group Collaboration using Untrusted Cloud Resources}}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = oct, + year = 2010, + location = {Vancouver, BC, Canada}, +} + +@article{feldmann07internet, + author = {Anja Feldmann}, + title = {Internet Clean-Slate Design: What and Why?}, + journal = {\bibconf{CCR}{ACM Computer Communications Review}}, + volume = {37}, + number = {3}, + month = jul, + year = {2007}, + pages = {59--64}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{ feldmeier90multiplexing, + author = {David C. Feldmeier}, + title = {Multiplexing Issues in Communication System Design}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Philadelphia, PA}, + month = sep, + year = 1990, +} + +@article{ ferrill06network, + author = {Paul Ferrill}, + title = {Network Traffic Shaping Tools}, + journal = {Processor}, + month = apr, + day = 21, + year = 2006, + volume = 28, + number = 16, + pages = {4} +} + +@article{ floyd91traffic, + author = {Sally Floyd and Van Jacobson}, + title = {Traffic Phase Effects in Packet-Switched Gateways}, + journal = {\bibconf{CCR}{ACM Computer Communications Review}}, + volume = 21, + number = 2, + month = apr, + year = 1991, + pages = {26-42}, +} + +@article{ fidge91logical, + author = {Colin Fidge}, + title = {Logical Time in Distributed Computing Systems}, + journal = {IEEE Computer}, + month = aug, + year = 1991, + volume = 24, + number = 8, + pages = {28-33}, +} + +@article{ finn89connectionless, + author = {Gregory G. Finn}, + title = {A Connectionless Congestion Control Algorithm}, + journal = {\bibconf{CCR}{ACM Computer Communications Review}}, + volume = 19, + number = 5, + month = oct, + year = 1989, + pages = {12-31}, +} + +@inproceedings{ fischer82sacrificing, + author = {Michael J. Fischer and Alan Michael}, + title = {Sacrificing Serializability to Attain High Availability + of Data in an Unreliable Network}, + booktitle = {Symposium on Principles of Database Systems (PODS)}, + month = mar, + year = 1982, + pages = {70-75}, +} + +@inproceedings{flanagan96phluid, + author = {Flanagan, Cormac and Nikhil, Rishiyur S.}, + title = {pHluid: the design of a parallel functional language implementation on + workstations}, + booktitle = {\bibconf{ICFP}[1st]{{ACM} {SIGPLAN} + international conference on Functional programming}}, + year = {1996}, + month = may, + location = {Philadelphia, Pennsylvania, United States}, + pages = {169--179}, +} + +@article{ floyd91connections, + author = {Sally Floyd}, + title = {Connections with Multiple Congested Gateways in + Packet-Switched Networks, Part 1: One-way Traffic}, + journal = {\bibconf{CCR}{ACM Computer Communications Review}}, + volume = 21, + number = 5, + month = oct, + year = 1991, + pages = {30-47}, +} + +@article{ floyd93random, + author = {Sally Floyd and Van Jacobson}, + title = {Random Early Detection Gateways for Congestion Avoidance}, + journal = {Transactions on Networking}, + volume = 1, + number = 4, + month = aug, + year = 1993, + pages = {1063-6692}, +} + +@article{ floyd99promoting, + author = {Sally Floyd and Kevin Fall}, + title = {Promoting the Use of End-to-End Congestion Control + in {the Internet}}, + journal = {Transactions on Networking}, + volume = 7, + number = 4, + month = aug, + year = 1999, + pages = {458-472}, +} + +@inproceedings{ floyd00equation, + author = {Sally Floyd and Mark Handley and Jitendra Padhye + and Joerg Widmer}, + title = {Equation-Based Congestion Control for Unicast Applications}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2000, + location = {Stockholm, Sweden}, +} + +@article{fluet10manticore, + author = {Matthew Fluet and Mike Rainey and John Reppy and Adam Shaw}, + title = {Implicitly threaded parallelism in {M}anticore}, + journal = {Journal of Functional Programming}, + volume = 20, + issue = {5--6}, + month = nov, + year = 2010, + pages = {537--576}, +} + +@book{ ford62flows, + author = "L. R. Ford Jr. and D. R. Fulkerson", + title = "Flows in Networks", + publisher = "Princeton University Press", + address = "Princeton N.J.", + year = "1962", +} + +@inproceedings{ ford94evolving, + author = {Bryan Ford and Jay Lepreau}, + title = {Evolving Mach 3.0 to a Migrating Thread Model}, + booktitle = {Winter 1994 USENIX Conference}, + pages = {97-114}, + month = jan, + year = 1994, +} + +@inproceedings{ ford96microkernels, + author = {Bryan Ford and Mike Hibler and Jay Lepreau + and Patrick Tullmann and Godmar Back and Stephen Clawson}, + title = {Microkernels Meet Recursive Virtual Machines}, + booktitle = {\bibconf[2nd]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + pages = {137-151}, + year = {1996} +} + +@inproceedings{ ford96cpu, + author = {Bryan Ford and Sai R. Susarla}, + title = {{CPU} Inheritance Scheduling}, + booktitle = {\bibconf[2nd]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + pages = {91-105}, + month = oct, + year = 1996, +} + +@inproceedings{ ford97flux, + author = {Bryan Ford and Godmar Back and Greg Benson and Jay Lepreau + and Albert Lin and Olin Shivers}, + title = {The {Flux} {OSKit}: + A Substrate for Kernel and Language Research}, + booktitle = {16th \bibconf{SOSP}{{ACM} Symposium on + Operating Systems Principles (SOSP)}}, + month = oct, + year = 1997, +} + +@inproceedings{ ford99interface, + author = {Bryan Ford and Mike Hibler and Jay Lepreau + and Roland McGrath and and Patrick Tullmann}, + title = {Interface and Execution Models in the {Fluke} Kernel}, + booktitle = {3rd \bibconf{OSDI}{Symposium on + Operating Systems Design and Implementation}}, + month = feb, + day = 24, + year = 1999, + location = {New Orleands}, +} + +@inproceedings{ ford02icfp, + author = "Bryan Ford", + title = "Packrat Parsing: + Simple, Powerful, Lazy, Linear Time", + booktitle = "\bibconf{ICFP}{International Conference + on Functional Programming}", + year = "2002", + month = "Oct" +} + +@misc{ ford03vitalizing, + author = "Bryan Ford", + title = "Service Duality: Vitalizing the Commons", + month = jan, + year = "2003", + note = "Unpublished technical report." +} + +@techreport{ ford03scalable, + author = "Bryan Ford", + title = "Scalable {Internet} Routing on + Topology-Independent Node Identities", + institution = "\bibconf{MIT LCS}{MIT + Laboratory for Computer Science}", + number = "MIT-LCS-TR-926", + year = "2003", + month = oct, +} + +@inproceedings{ ford03uip, + author = "Bryan Ford", + title = "Unmanaged {Internet} Protocol: + Taming the Edge Network Management Crisis", + booktitle = {\bibconf{HotNets}{2nd Workshop + on Hot Topics in Networks}}, + month = nov, + year = "2003" +} + +@inproceedings{ ford04popl, + author = "Bryan Ford", + title = "Parsing Expression Grammars: + A Recognition-Based Syntactic Foundation", + booktitle = {\bibconf[31st]{POPL}{ACM Symposium on + Principles of Programming Languages}}, + year = "2004", + month = jan, + location = "Venice, Italy", +} + +% obsoleted by ford05p2p +@misc{ ford04p2p, + author = "Bryan Ford", + title = "Peer-to-Peer {(P2P)} communication across + Network Address Translators {(NATs)}", + month = jun, + year = "2004", + note = "Internet-Draft (Work in Progress)", +} + +@inproceedings{ ford05p2p, + author = "Bryan Ford", + title = "Peer-to-Peer Communication Across + Network Address Translators", + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = apr, + year = 2005, + location = "Anaheim, CA", +} + +@inproceedings{ ford05vxa, + author = "Bryan Ford", + title = "{VXA}: A Virtual Architecture for Durable Compressed Archives", + booktitle = "\bibconf[4th]{USENIX FAST}{USENIX Conference on + File and Storage Technologies}", + month = dec, + year = 2005, + location = "San Francisco, CA", +} + +@inproceedings{ ford06uia-iptps-old, + author = {Bryan Ford and others}, + title = {{User-Relative Names for Globally Connected Personal Devices}}, + booktitle = {\bibconf[5th]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + year = {2006}, + month = feb, +} + +@inproceedings{ ford06uia-iptps, + author={Bryan Ford and Jacob Strauss and Chris Lesniewski{-}Laas and Sean C. Rhea and M. Frans Kaashoek and Robert Tappan Morris}, + title={User-Relative Names for Globally Connected Personal Devices}, + booktitle={5th International workshop on Peer-To-Peer Systems, {IPTPS} 2006, Santa Barbara, CA, USA, February 27-28, 2006}, + year={2006}, +} + +@inproceedings{ ford06persistent, + author = {Bryan Ford and Jacob Strauss and Chris Lesniewski-Laas and Sean Rhea and Frans Kaashoek and Robert Morris}, + title = {\href{https://pdos.csail.mit.edu/papers/uia:osdi06.pdf}{Persistent Personal Names for + Globally Connected Mobile Devices}}, + booktitle = {\bibconf[7th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = nov, + year = {2006}, +} + +@inproceedings{ ford08vx32, + author = {Bryan Ford and Russ Cox}, + title = {{Vx32}: Lightweight User-level Sandboxing on the {x86}}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2008, + location = {Boston, MA}, +} + +@inproceedings{ford10availability, + author = {Daniel Ford and + Fran\c{c}ois Labelle and + Florentina I. Popovici and + Murray Stokely and + Van-Anh Truong and + Luiz Barroso and + Carrie Grimes and + Sean Quinlan}, + title = {Availability in Globally Distributed Storage Systems}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on Operating Systems + Design and Implementation}}, + location = {Vancouver, Canada}, + month = oct, + year = 2010 +} + +@inproceedings{ ford10determinating, + author = {Amittai Aviram and Sen Hu and Bryan Ford + and Ramakrishna Gummadi}, + title = {Determinating Timing Channels in Compute Clouds}, + booktitle = {\bibconf{CCSW}{ACM Cloud Computing Security Workshop}}, + month = oct, + year = 2010, + location = {Chicago, IL}, +} + +@inproceedings{ ford10efficient, + author = {Amittai Aviram and Shu-Chun Weng and Sen Hu and Bryan Ford}, + title = {Efficient System-Enforced Deterministic Parallelism}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + location = {Vancouver, BC, Canada}, + month = oct, + year = 2010, +} + +@inproceedings{ ford12plugging, + author = {Bryan Ford}, + title = {Plugging Side-Channel Leaks with + Timing Information Flow Control}, + booktitle = {\bibconf[4th]{HotCloud}{USENIX Workshop on + Hot Topics in Cloud Computing}}, + month = jun, + year = 2012, + location = {Boston, MA}, +} + +@inproceedings{ ford12icebergs, + author = {Bryan Ford}, + title = {Icebergs in the Clouds: + the {\em Other} Risks of Cloud Computing}, + booktitle = {\bibconf[4th]{HotCloud}{USENIX Workshop on + Hot Topics in Cloud Computing}}, + location = {Boston, MA}, + month = jun, + year = 2012 +} + +@misc{ ford19threshold, + author = {Bryan Ford}, + title = {\href{https://arxiv.org/abs/1907.07010}{Threshold Logical Clocks for Asynchronous Distributed Coordination and Consensus}}, + month = jul, + year = 2019, +} + +@misc{ ford19threshold-anon, + author = {Anonymous}, + title = {\href{https://drive.google.com/file/d/1Zcas7JXQ61fcNitUSbcZk9Y0tf8jTeIl/view?usp=sharing}{Threshold Logical Clocks for Asynchronous Distributed Coordination and Consensus}}, + note = {\url{https://drive.google.com/file/d/1Zcas7JXQ61fcNitUSbcZk9Y0tf8jTeIl/view?usp=sharing}}, + month = jul, + year = 2019, +} + +@inproceedings{frigo98cilk, + author = {Frigo, Matteo and Leiserson, Charles E. and + Randall, Keith H.}, + title = {The implementation of the {C}ilk-5 multithreaded language}, + booktitle = {\bibconf{PLDI}{Proceedings of the + {ACM SIGPLAN} conference on Programming language + design and implementation}}, + year = {1998}, + pages = {212--223}, +} + +@article{ foster95fortran, + author = {Ian T. Foster and K. Mani Chandy}, + title = {Fortran M: A Language for Modular Parallel Programming}, + journal = {Journal of Parallel and Distributed Computing}, + volume = {26}, + number = {1}, + year = {1995}, + pages = {24-35}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@inproceedings{ francis02ipnl, + author = {Paul Francis and Ramakrishna Gummadi}, + title = {{IPNL}: A {NAT}-extended {Internet} architecture}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Pittsburgh, PA}, + month = aug, + year = {2002}, +} + +@inproceedings{ fraser99hardening, + author = "Timothy Fraser and Lee Badger and Mark Feldman", + title = "Hardening {COTS} Software with Generic Software Wrappers", + booktitle = "{IEEE} Symposium on Security and Privacy", + pages = "2-16", + year = "1999", +} + +@inproceedings{ freedman05nontransitive, + author = {Michael J. Freedman and others}, + title = {Non-Transitive Connectivity and {DHTs}}, + booktitle = {USENIX WORLDS 2005}, + month = dec, + year = 2005, +} + +@inproceedings{ freire08tcp, + author = {S\'ergio Freire and Andr\'e Z\'uquete}, + title = {A {TCP}-layer name service for {TCP} ports}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2008, + location = {Boston, MA}, +} + +@article{ fu02sfsro, + author = "Kevin Fu and M. Frans Kaashoek and David Mazi\`eres", + title = "Fast and secure distributed read-only file system", + journal = {ACM \bibconf{TOCS}{Transactions on Computer Systems}}, + month = feb, + year = "2002", +} + +@article{ fu03tcp, + author = {Cheng Peng Fu and Soung C. Liew}, + title = {{TCP Veno}: {TCP} Enhancement for Transmission Over + Wireless Access Networks}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 21, + number = 2, + month = feb, + year = 2003, + pages = {216-228}, +} + +@inproceedings{ fu05delay, + author = {Qiang Fu and Jadwiga Indulska}, + title = {A Delay-Based Approach for {TCP} Parallelization}, + booktitle = {\bibconf][1st]{NGI}{Conference on + Next Generation Internet Networks}}, + month = apr, + year = 2005, + location = {Rome}, +} + +@article{fujimoto88efficient, + author = {Richard M. Fujimoto and William B. Campbell}, + title = {Efficient instruction level simulation of computers}, + journal = {Transactions of the Society for Computer Simulation International}, + volume = {5}, + number = {2}, + year = {1988}, + month = apr, + issn = {0740-6797}, + pages = {109--124}, + publisher = {Society for Computer Simulation International}, +} + +%G + +@inproceedings{garcia11efficient, + title={\href{http://dl.acm.org/citation.cfm?doid=1966445.1966456}{Efficient middleware for byzantine fault tolerant database replication}}, + author={Garcia, Rui and Rodrigues, Rodrigo and Pregui{\c{c}}a, Nuno}, + booktitle={Proceedings of the sixth conference on Computer systems}, + pages={107--122}, + year={2011}, + organization={ACM} +} + +@inproceedings{ garfinkel03traps, + author = "Tal Garfinkel", + title = "Traps and Pitfalls: Practical Problems in + System Call Interposition based Security Tools", + booktitle = "Network and Distributed System Security", + month = feb, + year = 2003, +} + +@inproceedings{ garfinkel03virtual, + author = {Tal Garfinkel and Mendel Rosenblum}, + title = {A Virtual Machine Introspection Based Architecture + for Intrusion Detection}, + booktitle = {\bibconf[10th]{NDSS}{Network and Distributed System + Security Symposium}}, + month = feb, + year = 2003, + location = {San Diego, CA}, +} + +@inproceedings{garfinkel04ostia, + author = {Tal Garfinkel and Ben Pfaff and Mendel Rosenblum}, + title = {Ostia: A Delegating Architecture for + Secure System Call Interposition}, + booktitle = {Network and Distributed System Security}, + month = feb, + year = 2004, +} + +@inproceedings{ garfinkel07compatibility, + author = {Tal Garfinkel and Keith Adams and Andrew Warfield + and Jason Franklin}, + title = {Compatibility is Not Transparency: + {VMM} Detection Myths and Realities}, + booktitle = {\bibconf[11th]{HotOS}{Workshop on + Hot Topics in Operating Systems}}, + month = may, + year = 2007, + location = {San Diego, CA}, +} + +@inproceedings { gassend03merkle, + author={Gassend, B. and Suh, G.E. and Clarke, D. and van Dijk, M. and Devadas, S}, + booktitle={\bibconf{HPCA}{High-Performance Computer Architecture}}, + title={Caches and hash trees for efficient memory integrity verification}, + year={2003}, +} + +@misc{ gettys96mux, + author = {Jim Gettys}, + title = {Simple {MUX} Protocol Specification}, + month = oct, + year = 1996, + note = "W3C Working Draft", +} + +@misc{ garrett96preserving, + author = "John Garrett and Donald Waters", + title = "Preserving Digital Information: + Report of the Task Force on Archiving of Digital Information", + month = may, + date = "1", + year = "1996", + url = {{\tt http://www.rlg.org/ArchTF}} +} + +@article{ gavoille01spaceefficiency, + author = "Cyril Gavoille and Marc Gengler", + title = "Space-Efficiency for Routing Schemes of Stretch Factor Three", + journal = "\bibconf{JPDC}{Journal of Parallel and Distributed Computing}", + volume = "61", + number = "5", + pages = "679--687", + year = "2001", + url = "citeseer.ist.psu.edu/article/gavoille97spaceefficiency.html" +} + +@article{ gerla80flow, + author = {Mario Gerla and Len Kleinrock}, + title = {Flow Control : A Comparative Survey}, + journal = {IEEE Transactions on Communications}, + month = apr, + year = 1980, + volume = 28, + number = 4, + pages = {553-574} +} + +@inproceedings{ gerla00landmark, + author = "Mario Gerla and Xiaoyan Hong and Guangyu Pei", + title = "Landmark Routing for Large Ad Hoc Wireless Networks", + booktitle = {\bibconf{GLOBECOM}{IEEE GLOBECOM}}, + location = "San Francisco, CA", + month = nov, + year = "2000", + url = "citeseer.nj.nec.com/gerla00landmark.html", +} + +@inproceedings{ gharachorloo90memory, + author={Kourosh Gharachorloo and Daniel Lenoski and James Laudon + and Phillip Gibbons and Anoop Gupta and John Hennessy}, + title={Memory Consistency and Event Ordering in + Scalable Shared-Memory Multiprocessors}, + booktitle = {\bibconf[17th]{ISCA}{International Symposium on + Computer Architecture}}, + year={1990}, + month={May}, + pages={15-26}, + location = {Seattle, WA}, +} + +@inproceedings{ ghormley98slic, + author = {Douglas P. Ghormley and David Petrou and + Steven H. Rodrigues and Thomas E. Anderson}, + title = {{SLIC}: An Extensibility System + for Commodity Operating Systems}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 1998, +} + +@misc{ gnu12libgomp, + author = {Gnu}, + title = {Gnu libgomp}, + url = {\url{http://gcc.gnu.org/onlinedocs/libgomp}} +} + +@misc{ ghuloum10arbb, + author = {Anwar Ghuloum and Amanda Sharp and Noah Clemons and + Stefanus Du Toit and Rama Malladi and Mukesh Gangadhar and + Michael McCool and Hans Pabst}, + title = {{A}rray {B}uilding {B}locks: A Flexible Parallel + Programming Model for Multicore and Many-Core + Architectures}, + month = sep, + year = 2010, + url = {\url{http://drdobbs.com/go-parallel/article/showArticle.jhtml?articleID=227300084}} +} + +@inproceedings{gill08flattening, + author = {Phillipa Gill and Martin F. Arlitt and Zongpeng Li + and Anirban Mahanti}, + booktitle = {PAM}, + pages = {1-10}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + title = {The Flattening Internet Topology: Natural Evolution, + Unsightly Barnacles or Contrived Collapse?}, + volume = {4979}, + year = {2008}, +} + +@inproceedings{ godfrey08pathlet, + author = {Philip Brighten Godfrey and Scott Shenker and Ion Stoica}, + title = {Pathlet Routing}, + booktitle = {\bibconf[7th]{HotNets}{7th Workshop + on Hot Topics in Networks}}, + location = {Calgary, Alberta, Canada}, + month = oct, + day = 6, + year = 2008, +} + +@inproceedings{ goldberg96secure, + author = "Ian Goldberg and David Wagner and Randi Thomas and + Eric A. Brewer", + title = "A Secure Environment for Untrusted Helper Applications", + booktitle = "6th USENIX Security Symposium", + location = "San Jose, CA", + year = "1996", + url = "citeseer.ist.psu.edu/goldberg96secure.html" +} + +@inproceedings{ goldberg98towards, + author = "Andrew V. Goldberg and Peter N. Yianilos", + title = "Towards an Archival Intermemory", + booktitle = "{IEEE} Advances in Digital Libraries", + publisher = "IEEE Computer Society", + location = "Santa Barbara, CA", + pages = "147--156", + year = "1998", + url = "citeseer.ist.psu.edu/goldberg98towards.html" +} + +@article{ gong01jxta, + author = {Li Gong}, + title = {{JXTA}: A Network Programming Environment}, + journal = {IEEE Internet Computing}, + volume = {5}, + number = {3}, + pages = {88-95}, + year = {2001}, + month = may, +} + +@misc{ gosling96java, + author = {James Gosling and Henry McGilton}, + title = {The {Java} Language Environment}, + month = may, + year = 1996, + note = {\\ {\footnotesize\tt http://java.sun.com/docs/white/langenv/}}, +} + +@book{ gosling00java, + author = {James Gosling and Bill Joy and Guy Steele and Gilad Bracha}, + title = {The {Java} Language Specification}, + edition = {second}, + publisher = {Addison-Wesley}, + year = {2000}, + month = jun, +} + +@book{ greenberg95groupware, + author = {Saul Greenberg and Stephen Hayne and Roy {Rada (editors)}}, + title = {Groupware for Real-Time Drawing: A Designer's Guide}, + isbn = {0-07-707899-3}, + publisher = {McGraw-Hill Book Company}, + location = {Berkshire, England}, + year = {1995}, + pages = {248}, +} + +@inproceedings{ gritter01content, + author = "M. Gritter and D. R. Cheriton", + title = "An Architecture for Content Routing Support in the {Internet}", + booktitle = "\bibconf{USITS}{USENIX Symposium on + Internet Technologies and Systems}", + month = mar, + year = "2001", +} + +@techreport{grune86concurrent, + author = {Dick Grune}, + title = {Concurrent Versions System, + A Method for Independent Cooperation}, + institution = {Vrije Universiteit}, + location = {Amsterdam}, + year = 1986, + number = {IR 113}, +} + +@inproceedings{ gu11certikos, + author = {Liang Gu and Alexander Vaynberg and Bryan Ford + and Zhong Shao and David Costanzo}, + title = {{CertiKOS}: A Certified Kernel for Secure Cloud Computing}, + booktitle = {\bibconf[2nd]{APSys}{ACM SIGOPS Asia-Pacific + Workshop on Systems}}, + month = jul, + year = 2011, + location = {Shanghai, China}, +} + +@inproceedings{ guha04nutss, + author = "Saikat Guha and Yutaka Takeday and Paul Francis", + title = "{NUTSS}: A {SIP}-based Approach + to {UDP} and {TCP} Network Connectivity", + booktitle = "SIGCOMM 2004 Workshops", + year = "2004", + month = aug, + date = "30", + location = "Portland, OR", +} + +@inproceedings{ guha05characterization, + author = {Saikat Guha and Paul Francis}, + title = {Characterization and Measurement of {TCP} Traversal + through {NATs} and Firewalls}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = 2005, + location = {Berkeley, CA}, +} + +@inproceedings{ guha07end, + author = "Saikat Guha and Paul Francis", + title = "{An End-Middle-End Approach to Connection Establishment}", + booktitle = "SIGCOMM 2007", + year = "2007", + month = aug, + location = "Kyoto, Japan", +} + +@inproceedings{guo13failure, + author = {Zhenyu Guo and + Sean McDirmid and + Mao Yang and + Li Zhuang and + Pu Zhang and + Yingwei Luo and + Tom Bergan and + Peter Bodik and + Madan Musuvathi and + Zheng Zhang and + Lidong Zhou}, + title = {Failure Recovery: {W}hen the Cure Is + Worse Than the Disease}, + booktitle = {\bibconf[14th]{HotOS}{Workshop on Hot Topics in Operating + Systems}}, + location = {Santa Ana Pueblo, NM}, + month = may, + year = 2013 +} + +@article{ gustafsson97literature, + author = {Eva Gustafsson and Gunnar Karlsson}, + title = {A literature survey on traffic dispersion}, + journal = {IEEE Network}, + volume = 11, + number = 2, + month = mar, + year = 1997, + pages = {28-36}, +} + +@inproceedings{ guy90implementation, + author = {Richard G. Guy and others}, + booktitle = {USENIX Summer Conference}, + title = {Implementation of the {Ficus} Replicated File System}, + month = jun, + pages = "63--71", + year = "1990", + url = "citeseer.ist.psu.edu/guy90implementation.html" +} + +@inproceedings{ guy93consistency, + author = {R. G. Guy and G. J. Popek and T. W. {Page, Jr.}}, + title = {Consistency Algorithms for Optimisic Replication}, + booktitle = {First International Conference on Network Protocols}, + year = "1993", + url = "citeseer.ist.psu.edu/guy93consistency.html" +} + +@inproceedings{ guy98rumor, + author = {Richard Guy and others}, + title = {Rumor: Mobile Data Access Through + Optimistic Peer-to-Peer Replication}, + booktitle = {{ER} Workshops}, + year = 1998, + pages = {254-265}, +} + + +%H + +@inproceedings{ habib01unresponsive, + author = {Ahsan Habib and Bharat Bhargava}, + title = {Unresponsive Flow Detection and Control Using the + Differentiated Services Framework}, + booktitle = {\bibconf{PDCS}{IASTED International Conference on + Parallel and Distributed Computing Systems}}, + month = aug, + year = 2001, + location = {Anaheim, CA}, +} + + +@inproceedings{ hacker02endtoend, + author = {Thomas J. Hacker and Brian D. Athey}, + title = {The End-to-End Performance Effects of Parallel {TCP} Sockets + on a Lossy Wide-Area Network}, + booktitle = {\bibconf{IPDPS}{International Parallel and + Distributed Processing Symposium}}, + location = {Fort Lauderdale, FL}, + month = apr, + year = 2002, +} + +@inproceedings{ hacker04improving, + author = {Thomas J. Hacker and Brian D. Noble and Brian D. Athey}, + title = {Improving Throughput and Maintaining Fairness + using {Parallel TCP}}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + month = nov, + year = 2004, + location = {Dallas, TX}, +} + + +@inproceedings{ haeberlen05glacier, + author = {Andreas Haeberlen and + Alan Mislove and + Peter Druschel}, + title = {{Glacier}: + {H}ighly Durable, Decentralized Storage Despite Massive + Correlated Failures}, + booktitle = {\bibconf[2nd]{NSDI}{Symposium on Networked Systems + Design and Implementation}}, + location = {Boston, MA}, + month = may, + year = 2005 +} + + +@inproceedings{ haeberlen07peerreview, + author = {Andreas Haeberlen and Petr Kouznetsov and Peter Druschel}, + title = {\href{http://www.sosp2007.org/papers/sosp118-haeberlen.pdf}{{PeerReview}: Practical Accountability for Distributed Systems}}, + booktitle = {\bibconf[21st]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + location = {Stevenson, WA}, + month = oct, + year = 2007, +} + +@inproceedings{haeberlen09case, + author = {Andreas Haeberlen}, + title = {A Case for the Accountable Cloud}, + booktitle = {\bibconf[3rd]{LADIS}{ACM SIGOPS International Workshop on + Large-Scale Distributed Systems and Middleware}}, + location = {Big Sky, MT}, + month = oct, + year = 2009 +} + +@inproceedings{ haeberlen09fault, + author = {Andreas Haeberlen and Petr Kuznetsov}, + title = {The Fault Detection Problem}, + booktitle = {13th International Conference on + Principles of Distributed Systems (OPODIS '09)}, + location = {N\^imes, France}, + month = dec, + year = 2009, +} + +@inproceedings{ haeberlen10accountable, + author = {Andreas Haeberlen and Paarijaat Aditya and Rodrigo Rodrigues + and Peter Druschel}, + title = {\href{https://www.usenix.org/conference/osdi10/accountable-virtual-machines}{Accountable Virtual Machines}}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + location = {Vancouver, BC, Canada}, + month = oct, + year = 2010, +} + +@inproceedings{hajjat10cloudward, + author = {Mohammad Y. Hajjat and + Xin Sun and + Yu-Wei Eric Sung and + David A. Maltz and + Sanjay G. Rao and + Kunwadee Sripanidkulchai and + Mohit Tawarmalani}, + title = {Cloud{W}ard Bound: {P}lanning for Beneficial Migration of + Enterprise Applications to the Cloud}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {New Delhi, India}, + month = aug, + year = 2010 +} + + +@article{halbwachs91lustre, + author={Halbwachs, N. and Caspi, P. and Raymond, P. and Pilaud, D.}, + journal={Proceedings of the IEEE}, title={The synchronous data + flow programming language {LUSTRE}}, + year={1991}, + month = sep, + volume={79}, + number={9}, + pages={1305--1320}, +} + +@misc{ hall11mandelbrot, + author = {Brian ``Beej Jorgenson'' Hall}, + title = {Command-line Mandelbrot Set generator with OpenMP support}, + year = 2011, + url = {https://github.com/beej71/goatbrot} +} + +@article{ hall06wan, + author = {Michael Hall}, + title = {{WAN} Optimization Dominated by Startups, Growing Fast}, + journal = {Enterprise Networking Planet}, + month = apr, + day = 17, + year = 2006, + url = {http://www.enterprisenetworkingplanet.com/nethub/article.php/3599576}, +} + +@article{ halstead85multilisp, + author = {Robert H. {Halstead, Jr.}}, + title = {{Multilisp}: A Language for Concurrent Symbolic Computation}, + journal = {\bibconf{TOPLAS}{ACM Transactions on Programming Languages + and Systems}}, + volume = 7, + number = 4, + month = oct, + year = 1985, + pages = {501-538}, +} + +@misc{ hammond-functional, + author = {Kevin Hammond}, + title = {Parallel Functional Programming: An Introduction}, + url = {http://pdf.aminer.org/000/213/977/bwm_a_concrete_machine_for_graph_reduction.pdf}, +} + +@book{ hammond99research, + author = {Kevin Hammond and Greg Michaelson}, + title = {Research Directions in Parallel Functional Programming}, + publisher = {Springer}, + location = {UK}, + month = nov, + year = 1999, +} + +@inproceedings{ han04overlay, + author = {H. Han and others}, + title = {Overlay TCP for multi-path routing and congestion control}, + booktitle = {IMA Workshop on Measurements and Modeling of the Internet}, + year = 2004, + month = jan +} + +@article{ hanbali05survey, + author = {Ahmad Al Hanbali and Eitan Altman and Philippe Nain}, + title = {A Survey of TCP over Ad Hoc Networks}, + journal = {IEEE Surveys \& Tutorials}, + volume = 7, + number = 3, + year = 2005, +} + +@article{hankin81cajole, + author = {Hankin, C. L. and Glaser, H. W.}, + title = {The data flow programming language {CAJOLE} -- an informal introduction}, + journal = {ACM SIGPLAN Notices}, + volume = {16}, + number = {7}, + month = jul, + year = {1981}, + pages = {35--44}, +} + +@inproceedings{ hanrot07worst, + author = {Guillaume Hanrot and Vincent Lef\`evre and Damien Stehl\'e + and Paul Zimmermann}, + title = {Worst Cases of a Periodic Function for Large Arguments}, + booktitle = {18th IEEE Symposium on Computer Arithmetic}, + location = {Montpellier, France}, + month = jun, + year = 2007, +} + +@techreport{ hanushevsky01peer, + author = {Andrew Hanushevsky and Artem Trunov and Les Cottrell}, + title = {Peer-to-Peer Computing for + Secure High Performance Data Copying}, + institution = {Stanford National Accelerator Laboratory}, + number = {SLAC-PUB-9173}, + month = sep, + year = 2001, +} + +@book{ hare96internet, + author = {Chris Hare and Karanjit Siyan}, + title = {{Internet} Firewalls and Network Security}, + publisher = {New Riders}, + location = {Indianapolis, Indiana}, + year = 1996, + isbn = {1-56205-632-8}, +} + +@book{ harris10tm, + author = {Tim Harris and James Larus and Ravi Rajwar}, + title = {Transactional Memory}, + edition = {2nd}, + publisher = {Morgan \& Claypool}, + year = 2010, + isbn = 9781608452361, +} + + +@article{ hasegawa07receiver, + author = {Go Hasegawa and Masashi Nakata and Hirotaka Nakano}, + title = {Receiver-Based {ACK} Splitting Mechanism for {TCP} + over Wired/Wireless Heterogeneous Networks}, + journal = {IEICE Transactions on Communications}, + volume = {E90-B}, + number = 5, + month = may, + year = 2007, +} + +@inproceedings{he13next, + author = {Keqiang He and + Alexis Fisher and + Liang Wang and + Aaron Gember and + Aditya Akella and + Thomas Ristenpart}, + title = {Next step, the cloud: {U}nderstanding modern web service + deployment in {EC2} and {A}zure}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + location = {Barcelona, Spain}, + month = oct, + year = 2013 +} + + +@inproceedings{ helmy00multicastbased, + author = "Ahmed Helmy", + title = "A multicast-based protocol for {IP} mobility support", + booktitle = "Networked Group Communication", + pages = "49-58", + year = "2000", + url = "citeseer.nj.nec.com/464678.html" +} + +@article{ henderson99transport, + author = {Thomas R. Henderson and Randy H. Katz}, + title = {Transport Protocols for + Internet-Compatible Satellite Networks}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 17, + number = 2, + month = feb, + year = 1999, + pages = {326-344}, +} + +@incollection {hendren92mccat, + author = {Hendren, L. and Donawa, C. and Emami, M. + and Gao, G. and Justiani, and Sridharan, B.}, + title = {Designing the {McCAT} compiler based on a family of + structured intermediate representations}, + booktitle = {Languages and Compilers for Parallel Computing}, + series = {Lecture Notes in Computer Science}, + publisher = {Springer Berlin / Heidelberg}, + pages = {406--420}, + volume = {757}, + year = {1993} +} + +@inproceedings{ herlihy93transactional, + author = {Maurice Herlihy and J. Eliot B. Moss}, + title = {Transactional Memory: Architectural Support for + Lock-Free Data Structures}, + booktitle = {\bibconf[20th]{ISCA}{International Symposium on + Computer Architecture}}, + location = {San Diego, CA}, + pages = {289-300}, + month = may, + year = 1993, +} + +@techreport{ hogan96hierarchical, + author = {David Hogan}, + title = {Hierarchical Fair Queuing}, + institution = {University of Sydney}, + number = {506}, + month = may, + year = 1996, + isbn = {1-86451-024-2}, +} + +@article{ holland02analysis, + author = {Gavin Holland and Nitin Vaidya}, + title = {Analysis of {TCP} Performance over Mobile Ad Hoc Networks}, + journal = {Wireless Networks}, + volume = 8, + number = 2, + month = mar, + year = 2002, +} + +@mastersthesis{ honda09bidimensional, + author = {Michio Honda}, + title = {Bidimensional-Probe Multipath Congestion Control + for Shared Bottleneck Fairness}, + school = {Keio University}, + year = 2009, +} + +@inproceedings{ honda09multipath, + author = {Michio Honda and Yoshifumi Nishida and Lars Eggert + and Pasi Sarolahti and Hideyuki Tokuda}, + title = {Multipath Congestion Control for Shared Bottleneck}, + booktitle = {\bibconf{PFLDnet}{International Workshop on Protocols + for Future Large-Scale and Diverse Network Transports}}, + month = may, + days = {21-22}, + year = 2009, + location = {Akihabara, Tokyo, Japan}, +} + +@book{ honeywell83gcos, + author = {Honeywell Inc.}, + title = {{GCOS} Environment Simulator}, + month = dec, + year = 1983, + note = {Order Number AN05-02A}, +} + +@inproceedings{ hooff15scalable, + author = {Jelle van den Hooff and + David Lazar and + Matei Zaharia and + Nickolai Zeldovich}, + title = {Scalable Private Messaging Resistant to Traffic Analysis}, + booktitle = {\bibconf[25th]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + location = {Monterey, CA}, + month = oct, + year = 2015 +} + +@article{houmansadr12sweet, + author = {Amir Houmansadr and + Wenxuan Zhou and + Matthew Caesar and + Nikita Borisov}, + title = {SWEET: Serving the Web by Exploiting Email Tunnels}, + journal = {CoRR}, + volume = {abs/1211.3191}, + year = {2012}, + ee = {http://arxiv.org/abs/1211.3191}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@article{ howard15raft, + author = {Heidi Howard and Malte Schwarzkopf and Anil Madhavapeddy + and Jon Crowcroft}, + title = {{Raft} Refloated: Do We Have Consensus?}, + journal = {ACM SIGOPS Operating Systems Review}, + volume = 49, + number = 1, + month = jan, + year = 2015, + pages = {12-21}, +} + +% edition = "Third", +@book{ hp94parisc, + title = "PA-RISC 1.1 Architecture and Instruction Set Reference Manual", + publisher = "Hewlett-Packard", + year = "1994", + month = feb, +} + +@inproceedings{ hsieh02ptcp, + title = {{pTCP}: An End-to-End Transport Layer Protocol + for Striped Connections}, + author = {Hung-Yun Hsieh and Raghupathy Sivakumar}, + booktitle = {\bibconf[10th]{ICNP}{International Conference on + Network Protocols}}, + location = {Paris, France}, + month = nov, + year = 2002, +} + +@inproceedings{ hsieh02transport, + title = {A transport layer approach for achieving aggregate bandwidths + on multi-homed mobile hosts}, + author = {Hung-Yun Hsieh and Raghupathy Sivakumar}, + booktitle = "\bibconf[8th]{MOBICOM}{International Conference on Mobile + Computing and Networking}", + location = {Atlanta, GA}, + month = sep, + year = 2002, +} + +@misc{ hughes17radix, + author = {Dan Hughes}, + title = {\href{https://papers.radixdlt.com/tempo/}{Radix -- Tempo}}, + month = sep, + year = 2017, +} + +# author = {Nicholas Hunt and Tom Bergan and Luis Ceze and +# Steven D. Gribble}, +@inproceedings{ hunt13ddos, + author = {Nicholas Hunt and others}, + title = {{DDOS}: Taming Nondeterminism in Distributed Systems}, + booktitle = "\bibconf[18th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages and + Operating Systems}", + year = {2013}, + isbn = {978-1-4503-1870-9}, + location = {Houston, Texas, USA}, + pages = {499-508}, + url = {http://doi.acm.org/10.1145/2451116.2451170}, + doi = {10.1145/2451116.2451170}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {determinism, distributed systems, record/replay}, +} + +@article{ hutchinson91xkernel, + author = {Norman C. Hutchinson and Larry L. Peterson}, + title = {The {x-Kernel}: An Architecture for + Implementing Network Protocols}, + journal = {IEEE Transactions on Software Engineering}, + volume = 17, + number = 1, + month = jan, + year = 1991, +} + +%I + +@misc{ icann08biggest, + author = {ICANN}, + title = {Biggest Expansion in {gTLDs} Approved for Implementation}, + month = jun, + day = 26, + year = 2008, + note = {\url{http://www.icann.org/en/announcements/announcement-4-26jun08-en.htm}}, +} + +@misc{ id05q3engine, + author = {{Id Software}}, + title = {{Id Tech} 3 engine (ioquake3)}, + month = aug, + day = 19, + year = 2005, + note = {\url{ftp://ftp.idsoftware.com/idstuff/source/quake3-1.32b-source.zip}}, +} + +@misc{ idhistory, + author = {{Id Software}}, + title = {{Id Software} History}, + note = {\url{http://www.idsoftware.com/business/history/}}, +} + +@misc{ ieee94boot, + author = {IEEE}, + title = {Std 1275-1994: Boot Firmware}, + year = 1994, + isbn = {1-55937-426-8}, +} + +@misc{ ieee802-3, + author = {IEEE}, + title = {Std 802.3-2005}, + month = dec, + year = 2005, + isbn = {0-7381-4740-0}, +} + +@misc{ ieee802-11i, + author = {IEEE}, + title = {Std 802.11i-2004}, + month = jul, + year = 2004, + isbn = {0-7381-4074-0}, +} + +@inproceedings{ inamura04impact, + author = {Hiroshi Inamura and Osamu Takahashi and Hirotaka Nakano and + and Taro Ishikawa and Hiroshi Shigeno}, + title = {Impact of Layer Two {ARQ} on {TCP} Performance + in {W-CDMA} Networks}, + booktitle = {\bibconf{ICDCS}{International Conference on + Distributed Computing Systems}}, + location = {Tokyo, Japan}, + month = mar, + year = 2004, +} + +@inproceedings{ ingram12treehouse, + author = {Lon Ingram and Michael Walfish}, + title = {{TreeHouse}: {JavaScript} sandboxes to help {Web} developers + help themselves}, + booktitle = {\bibconf{ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2012, + location = {Boston, MA}, +} + +@misc{ intel05ia32, + author = {{Intel Corporation}}, + title = {{IA-32} {Intel} Architecture Software Developer's Manual}, + year = 2005, + month = jun, +} + +@misc{ intel09, + author = {{Intel Corporation}}, + title = {{Intel\textregistered\ 64} and {IA-32} Architectures + Software Developer's Manual}, + month = mar, + year = 2009, +} + +@misc{ intel12tbb, + author = {{Intel Corporation}}, + title = {{Intel\textregistered Threading Building Blocks} Reference Manual}, + month = jan, + year = 2012, +} + +@inproceedings{ iverson62apl, + author = {Kenneth Iverson}, + title = {A Programming Language}, + booktitle = {Proceedings of the May 1--3, 1962, spring joint + computer conference}, + year = 1962, + location = {San Francisco, CA}, + pages = {345--351}, +} + +@inproceedings{ iyengar04concurrent, + author = {Janardhan R. Iyengar and Keyur C. Shah and Paul D. Amer + and Randall Stewart}, + title = {Concurrent Multipath Transfer Using {SCTP} Multihoming}, + booktitle = {\bibconf{SPECTS}{Symposium on Performance Evaluation + of Computer and Telecommunication Systems}}, + location = {San Jose, CA}, + month = jul, + year = 2004, +} + + +@article{ iyengar06concurrent, + author = {Janardhan R. Iyengar and Paul D. Amer and Randall Stewart}, + title = {Concurrent Multipath Transfer Using {SCTP} Multihoming + Over Independent End-to-End Paths}, + journal = {Transactions on Networking}, + volume = {14}, + number = {5}, + month = oct, + year = {2006}, + pages = {951--964}, +} + +%J + +@article{ jacobson88congestion, + author = {Van Jacobson}, + title = {Congestion Avoidance and Control}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1988, + location = {Stanford, CA}, + pages = {314-329}, +} + +@inproceedings{ jain99userlevel, + author = "K. Jain and R. Sekar", + title = "User-Level Infrastructure for System Call Interposition: + A Platform for Intrusion Detection and Confinement", + booktitle = {Network and Distributed System Security}, + month = feb, + year = 2000, +} + +@article{ jefferson85virtual, + author = {David R. Jefferson}, + title = {Virtual Time}, + journal = {ACM Transactions on Programming Languages and Systems}, + volume = 7, + number = 3, + month = jul, + year = 1985, +} + +@inproceedings{jensen09technical, + title={On technical security issues in cloud computing}, + author={Jensen, Meiko and Schwenk, J{\"o}rg and Gruschka, Nils and Iacono, Luigi Lo}, + booktitle={Cloud Computing, 2009. CLOUD'09. IEEE International Conference on}, + pages={109--116}, + year={2009}, + organization={IEEE} +} + +@article{jhawar13fault, + author = {Ravi Jhawar and + Vincenzo Piuri and + Marco D. Santambrogio}, + title = {Fault Tolerance Management in Cloud Computing: + {A} System-Level Perspective}, + journal = {IEEE Systems Journal}, + volume = {7}, + number = {2}, + year = {2013}, + pages = {288-297} +} + + +@article{ jin03spectrum, + author = {Shudong Jin and Liang Guo and Ibrahim Matta + and Azer Bestavros}, + title = {A Spectrum of {TCP}-Friendly Window-Based + Congestion Control Algorithms}, + journal = {Transactions on Networking}, + volume = 11, + number = 3, + pages = {341-355}, + month = jun, + year = 2003, +} + +@techreport{ jin99openmp, + author = {H. Jin and M. Frumkin and J. Yan}, + title = {The {OpenMP} Implementation of {NAS} Parallel Benchmarks + and Its Performance}, + institution = {NASA Ames Research Center}, + number = {NAS-99-011}, + month = oct, + year = 1999, +} + + +@techreport{ wijingaar02mpi, + author = {Rob F. Van der Wijingaart}, + title = {{NAS} Parallel Benchmarks Version 2.4}, + institution = {NASA Ames Research Center}, + number = {NAS-02-007}, + month = oct, + year = 2002, +} + +@inproceedings{ sodan05mpvssm, + author = {Angela C. Sodan}, + title = {Message-Passing and Shared-Data Programming Models -- Wish vs. Reality}, + booktitle = {\bibconf{19th HPCA}{19th International Symposium on High Performance Computing Systems and Applications}}, + month = may, + year = 2005, +} + +@inproceedings{ jin99spack, + author = {Kyohong Jin and Kilyeon Kim and Jungtae Lee}, + title = {{SPACK}: rapid recovery of the {TCP} performance + using split-ack in mobile communication environments}, + booktitle = {IEEE Region 10 Conference}, + month = sep, + year = 1999, +} + +@article{ johnson89xerox, + author = {Jeff Johnson and Teresa L. Roberts}, + title = {The {Xerox} {``Star''}: A Retrospective}, + journal = {IEEE Computer}, + year = {1989}, + month = sep, +} + +% first DSR paper +@inproceedings{ johnson94routing, + author = "David B. Johnson", + title = "Routing in Ad Hoc Networks of Mobile Hosts", + booktitle = "{IEEE} Workshop on + Mobile Computing Systems and Applications", + pages = "158-163", + month = dec, + year = "1994", +} + +@article{ johnston00us, + author = {Margret Johnston}, + title = {{U.S.} Relaxes Encryption Export Policy}, + journal = {PC World}, + month = jan, + day = 13, + year = 2000, + url = {http://www.pcworld.com/article/14768/us_relaxes_encryption_export_policy.html}, +} + +@article{johnston04dataflow, + author = {Johnston, Wesley M. and Hanna, J. R. Paul and Millar, Richard J.}, + title = {Advances in dataflow programming languages}, + journal = {ACM Computing Surveys}, + volume = {36}, + number = {1}, + month = mar, + year = 2004, + pages = {1--34}, +} + +@inproceedings{joukov11static, + author = {Nikolai Joukov and + Vasily Tarasov and + Joel Ossher and + Birgit Pfitzmann and + Sergej Chicherin and + Marco Pistoiz and + Takaaki Tateishi}, + title = {Static discovery and remediation of code-embedded resource + dependencies}, + booktitle = {Integrated Network Management}, + pages = {233-240}, + year = 2011 +} + +@article{jujjuri10virtfs, + title = {VirtFS--A virtualization aware File System pass-through}, + author = {Venkateswararao Jujjuri and Eric Van Hensbergen and Anthony Liguori and Badari Pulavarty}, + booktitle = {Ottawa Linux Symposium}, + year = {2010}, + month = {June}, +} + +@inproceedings{junqueira05surviving, + author = {Flavio Paiva Junqueira and + Ranjita Bhagwan and + Alejandro Hevia and + Keith Marzullo and + Geoffrey M. Voelker}, + title = {Surviving {I}nternet catastrophes}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + booktitle = {USENIX Annual Technical Conference}, + location = {Anaheim, CA}, + month = apr, + year = 2005 +} + +%K + +@inproceedings{keidar95increasing, + title={Increasing the resilience of atomic commit, at no additional cost}, + author={Keidar, Idit and Dolev, Danny}, + booktitle={Proceedings of the fourteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems}, + pages={245--254}, + year={1995}, + organization={ACM} +} + +@article{kemme00new, + title={\href{http://dl.acm.org/citation.cfm?doid=363951.363955}{A new approach to developing and implementing eager database replication protocols}}, + author={Kemme, Bettina and Alonso, Gustavo}, + journal={ACM Transactions on Database Systems (TODS)}, + volume={25}, + number={3}, + pages={333--379}, + year={2000}, + publisher={ACM} +} + +@inproceedings{ kahn74semantics, + author = {Kahn, Gilles}, + title = {The Semantics of a Simple Language for Parallel Programming}, + booktitle = {Information Processing}, + year = {1974}, + pages = {471-475}, + publisher = {North-Holland}, + address = {Amsterdam, Netherlands}, +} + +@techreport{ kaiser94cooperative, + author = "Gail E. Kaiser", + title = "Cooperative Transactions for Multi-User Environments", + institution = "Columbia University Department of Computer Science", + number = "CUCS-006-93", + year = "1994", + url = "citeseer.ist.psu.edu/kaiser94cooperative.html" +} + +@article{ kaiser98wwwbased, + author = "Gail E. Kaiser and Stephen E. Dossick and Wenyu Jiang and + Jack Jingshuang Yang and Sonny Xi Ye", + title = "{WWW}-Based Collaboration Environments with + Distributed Tool Services", + journal = "World Wide Web", + volume = "1", + number = "1", + pages = "3-25", + year = "1998", + month = jan, + url = "citeseer.ist.psu.edu/kaiser97wwwbased.html" +} + +@inproceedings{ kalofonos08mynet, + author = {D. N. Kalofonos and Z. Antoniou and F. D. Reynolds + and M. Van-Kleek and J. Strauss and P. Wisner}, + title = {{MyNet}: a Platform for Secure {P2P} Personal + and Social Networking Services}, + booktitle = {\bibconf[6th]{PerCom}{Annual IEEE Conference on + Pervasive Computing and Communications}}, + month = mar, + year = 2008, + location = {Hong Kong}, +} + +@inproceedings{kamvar03eigentrust, + author = {Sepandar D. Kamvar and + Mario T. Schlosser and + Hector Garcia{-}Molina}, + title = {\href{https://dl.acm.org/citation.cfm?id=775242}{The EigenTrust Algorithm for Reputation Management in P2P Networks}}, + booktitle = {\bibconf{WWW}{International World Wide Web Conference}}, + month = may, + year = 2003, + pages = {640-651}, + location = {Budapest, Hungary} +} + +@inproceedings{ kapoor05achieving, + author = {Aman Kapoor and Aaron Falk and Ted Faber and Yuri Pryadkin}, + title = {Achieving Faster Access to Satellite Link Bandwidth}, + booktitle = {8th IEEE Global Internet Symposium}, + month = mar, + year = 2005, + location = {Miami, FL}, +} + +@inproceedings{ katabi02internet, + author = {Dina Katabi and Mark Handley and Charles Rohrs}, + title = {Internet Congestion Control for + High Bandwidth-Delay Product Networks}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2002, + location = {Pittsburgh, PA}, +} + +@inproceedings{ keleher92lazy, + author = {Pete Keleher and Alan L. Cox and Willy Zwaenepoel}, + title = {Lazy Release Consistency for + Software Distributed Shared Memory}, + booktitle = {\bibconf{ISCA}{13th International Symposium + on Computer Architecture}}, + month = may, + year = 1992, + pages = {13-21}, + location = {Gold Coast, Queensland, Australia}, +} + +@inproceedings{ keller10nohype, + author = {Eric Keller and Jakub Szefer and Jennifer Rexford + and Ruby B. Lee}, + title = {{NoHype}: Virtualized Cloud Infrastructure + without the Virtualization}, + booktitle = {\bibconf[37th]{ISCA}{International Symposium on + Computer Architecture}}, + location = {Saint-Malo, France}, + month = jun, + year = 2010, +} + +@article{ kelly03scalable, + author = {Tom Kelly}, + title = {Scalable {TCP}: Improving Performance in + Highspeed Wide Area Networks}, + journal = {Computer Communications Review}, + volume = 33, + number = 2, + month = apr, + year = 2003, + pages = {83-91}, +} + +@article{ kelly05stability, + author = {Frank Kelly and Thomas Voice}, + title = {Stability of end-to-end algorithms for joint routing + and rate control}, + journal = {Computer Communications Review}, + volume = 35, + number = 2, + month = apr, + year = 2005, + pages = {5-12}, +} + +@inproceedings{ kempf03evolving, + author = "James Kempf", + title = "Evolving the Internet Addressing Architecture", + booktitle = "International Symposium on Applications and the Internet + (SAINT '04)", + month = jan, + year = "2004", + location = "Tokyo, Japan", +} + +@article{ kemmerer83shared, + author = {Richard A. Kemmerer}, + title = {Shared Resource Matrix Methodology: + An Approach to Identifying Storage and Timing Channels}, + journal = {\bibconf{TOCS}{Transactions on Computer Systems}}, + volume = 1, + number = 3, + month = aug, + year = 1983, + pages = {256-277}, +} + +@inproceedings{ kim03dynamic, + author = "Ho-Seop Kim and James E. Smith", + title = "Dynamic Binary Translation for Accumulator-Oriented Architectures", + booktitle = "International Symposium on Code Generation and Optimization", + year = "2003", + month = mar, + location = "San Francisco, CA", + url = "citeseer.ist.psu.edu/kim03dynamic.html" +} + +% Note: conference version is king05tcp +@inproceedings{ king05evaluating, + title = {Evaluating and Improving {TCP-Africa}: an Adaptive and Fair + Rapid Increase Rule for Scalable {TCP} + Using Layered Congestion Control}, + author = {Ryan King and Rudolf Riedi and Richard Baraniuk}, + booktitle = {\bibconf[3rd]{PFLDnet}{Workshop on Protocols + for Fast Long-Distance Networks}}, + month = feb, + year = 2005, + location = {Lyon, France}, +} + +@inproceedings{ king05tcp, + title = {{TCP-Africa}: an Adaptive and Fair + Rapid Increase Rule for Scalable {TCP}}, + author = {Ryan King and Richard Baraniuk and Rudolf Riedi}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 2005, + location = {Miami, FL} +} + +@inproceedings{king05debugging, + author = {Samuel T. King and George W. Dunlap and Peter M. Chen}, + title = {Debugging operating systems with + time-traveling virtual machines}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = apr, + year = 2005, + pages = {1-15}, +} + +@misc{ kiriansky02secure, + author = "Vladimir Kiriansky and Derek Bruening and Saman Amarasinghe", + title = "Secure execution via program shepherding", + booktitle = "11th USENIX Security Symposium", + month = aug, + year = 2002, +} + +@inproceedings{ kissel09improving, + author = {Ezra Kissel and Martin Swany and Aaron Brown}, + title = {Improving {GridFTP} Performance + Using The {Phoebus} Session Layer}, + booktitle = {\bibconf{SC}{International Conference for + High Performance Computing, Networking, + Storage and Analysis}}, + month = nov, + year = 2009, + location = {Portland, OR}, +} + +@inproceedings{ kistler91disconnected, + author = "James J. Kistler and M. Satyanarayanan", + title = "Disconnected Operation in the {Coda} File System", + booktitle = "\bibconf[13th]{SOSP}{{ACM} Symposium on + Operating Systems Principles}", + pages = "213--225", + year = "1991", + url = "citeseer.ist.psu.edu/kistler92disconnected.html" +} + +@inproceedings{ klein09sel4, + author = {Gerwin Klein and others}, + title = {{seL4}: formal verification of an {OS} kernel}, + booktitle = {\bibconf[22nd]{SOSP}{ACM Symposium + on Operating System Principles}}, + month = oct, + year = 2009, + location = {Big Sky, MT}, +} + +@article{ kleinrock77hierarchical, + author = {Leonard Kleinrock and Farouk Kamoun}, + title = {Hierarchical routing for large networks: + Performance evaluation and optimization}, + journal = {Computer Networks}, + volume = 1, + number = 3, + pages = {155-174}, + year = 1977, +} + +@inproceedings{ ko98locationaided, + author = "Young-Bae Ko and Nitin H. Vaidya", + title = "Location-Aided Routing ({LAR}) in Mobile Ad Hoc Networks", + booktitle = "Mobile Computing and Networking", + pages = "66-75", + year = "1998", + url = "citeseer.nj.nec.com/ko98locationaided.html" +} + +@inproceedings{ kodialam06versatile, + author = {M. Kodialam and others}, + title = {A Versatile Scheme for Routing Highly Variable Traffic in + Service Overlays and IP Backbones}, + booktitle = {INFOCOMM}, + year = 2006, + month = apr +} + +@inproceedings{ kohler06dccp, + author = {Eddie Kohler and Mark Handley and Sally Floyd}, + title = {Designing {DCCP}: Congestion Control Without Reliability}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + year = 2006, +} + +@inproceedings{ kong08deconstructing, + author = {Jingfei Kong and Onur Ac\i{}i\c{c}mez and Jean-Pierre Seifert + and Huiyang Zhou}, + title = {Deconstructing New Cache Designs for + Thwarting Software Cache-based Side Channel Attacks}, + booktitle = {\bibconf[1st]{CSAW}{ACM Computer Security + Architecture Workshop}}, + month = oct, + year = 2008, + location = {Fairfax, VA}, +} + +@book{ kopetz11real-time, + author = {Hermann Kopetz}, + title = {Real-Time Systems: + Design Principles for Distributed Embedded Applications}, + publisher = {Springer}, + month = apr, + year = 2011, + isbn = {978-1441982360}, + pages = {378}, +} + +@inproceedings{ kopparty02split, + author = {Swastik Kopparty and Srikanth V. Krishnamurthy and + Michalis Faloutsos and Satish K. Tripathi}, + title = {Split {TCP} for Mobile Ad Hoc Networks}, + booktitle = {IEEE GLOBECOM}, + month = nov, + year = 2002, +} + +@inproceedings{ korman06dynamic, + author = {Amos Korman and David Peleg}, + title = {Dynamic Routing Schemes for General Graphs}, + booktitle = {\bibconf[33rd]{ICALP}{International Colloquium on + Automata, Languages and Programming}}, + month = jul, + year = 2006, + location = {Venice, Italy}, +} + +@inproceedings{ kortebi04crossprotect, + author = {A. Kortebi and S. Oueslati and J. Roberts}, + title = {Cross-protect: implicit service differentiation and + admission control}, + booktitle = {\bibconf{HPSR}{Workshop on High Performance + Switching and Routing}}, + month = apr, + year = 2004, +} + +% subsumed by full paper: kortebi05evaluating +@inproceedings{ kortebi04scalability, + author = {A. Kortebi and L. Muscariello and S. Oueslati and J. Roberts}, + title = {On the Scalability of Fair Queueing}, + booktitle = {\bibconf[3rd]{HotNets}{Workshop + on Hot Topics in Networks}}, + location = {San Diego, CA}, + month = nov, + year = 2004, +} + +@inproceedings{ kortebi05evaluating, + author = {A. Kortebi and L. Muscariello and S. Oueslati and J. Roberts}, + title = {Evaluating the Number of Active Flows in a Scheduler + Realizing Fair Statistical Bandwidth Sharing}, + booktitle = {\bibconf{SIGMETRICS}{ACM SIGMETRICS Conference on + Measurement and Modeling of Computer Systems}}, + location = {Banff, Alberta, Canada}, + month = jun, + year = 2005, +} + +@inproceedings{kotla07safestore, + author = {Ramakrishna Kotla and + Lorenzo Alvisi and + Michael Dahlin}, + title = {{SafeStore}: {A} Durable and Practical Storage System}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + location = {Santa Clara, CA}, + month = jun, + year = 2007 +} + +@inproceedings{ kotla07zyzzyva, + title={\href{http://www.sosp2007.org/papers/sosp052-kotla.pdf}{Zyzzyva: Speculative {Byzantine} Fault Tolerance}}, + author={Kotla, Ramakrishna and Alvisi, Lorenzo and Dahlin, Mike and Clement, Allen and Wong, Edmund}, + booktitle={21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP)}, + month=oct, + year={2007}, + organization={ACM}, + url={http://www.sosp2007.org/papers/sosp052-kotla.pdf}, +} + +@article{ kotla09zyzzyva, + author = {Ramakrishna Kotla and Lorenzo Alvisi and Mike Dahlin and + Allen Clement and Edmund Wong}, + title = {{Zyzzyva}: Speculative {Byzantine} fault tolerance}, + journal = {ACM Transactions on Computer Systems (TOCS)}, + volume = 27, + number = 4, + month = dec, + year = 2009, +} + +@inproceedings{ krall98efficient, + author = "Andreas Krall", + title = "Efficient {JavaVM} Just-in-Time Compilation", + booktitle = "Parallel Architectures and Compilation Techniques", + location = "Paris, France", + month = oct, + year = 1998, + pages = "54--61", + url = "sherry.ifi.unizh.ch/krall98efficient.html" +} + +@inproceedings{ krioukov04compact, + author = {Dmitri Krioukov and Kevin Fall and Xiaowei Yang}, + title = {Compact Routing on {Internet}-Like Graphs}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + year = 2004, +} + +@article{ krioukov07compact, + author = {Dmitri Krioukov and kc claffy and Kevin Fall + and Arthur Brady}, + title = {On Compact Routing for the {Internet}}, + journal = {Computer Communications Review}, + volume = {37}, + number = {3}, + year = {2007}, + issn = {0146-4833}, + pages = {41--52}, + doi = {http://doi.acm.org/10.1145/1273445.1273450}, + publisher = {ACM Press}, + address = {New York, NY, USA}, +} + +@inproceedings{ krohn07information, + author = {Maxwell Krohn and Alexander Yip and Micah Brodsky + and Natan Cliffer and M. Frans Kaashoek + and Eddie Kohler and Robert Morris}, + title = {Information Flow Control for Standard OS Abstractions}, + booktitle = {\bibconf[21st]{SOSP}{ACM Symposium + on Operating System Principles}}, + month = oct, + year = 2007, + location = {Stevenson, WA}, +} + +@inproceedings{ kubiatowicz00oceanstore, + author = "John Kubiatowicz and others", + title = "OceanStore: An Architecture for Global-Scale Persistent Storage ", + booktitle = "Ninth international Conference on + Architectural Support for Programming Languages + and Operating Systems (ASPLOS 2000)", + month = nov, + year = "2000", +} + +@inproceedings{ kuenzer19unleashing, + author = {S. Kuenzer and S. Santhanam and Yuri Volchkov and + Florian Schmidt and Felipe Huici and Joel Nider and + Mike Rapoport and Costin Lupu}, + title = {\href{https://dl.acm.org/doi/10.1145/3319647.3325856}{Unleashing the Power of Unikernels with Unikraft}}, + booktitle = {\bibconf[12th]{SYSTOR}{ACM International Conference on Systems and Storage}}, + month = may, + year = 2019, +} + +@inproceedings{ kung93fcvc, + author = {H. T. Kung and Alan Chapman}, + title = {The {FCVC} (Flow-Controlled Virtual Channels) Proposal + for {ATM} Networks: A Summary}, + booktitle = {\bibconf[1st]{ICNP}{International Conference on + Network Protocols}}, + month = oct, + year = 1993, + location = {San Francisco, CA}, +} + +@article{khanna07automated, + author = {Gunjan Khanna and + Mike Yu Cheng and + Padma Varadharajan and + Saurabh Bagchi and + Miguel P. Correia and + Paulo Ver\'{\i}ssimo}, + title = {Automated Rule-Based Diagnosis through a + Distributed Monitor System}, + journal = {IEEE Trans. Dependable Sec. Comput.}, + volume = {4}, + number = {4}, + year = {2007}, + pages = {266-279} +} + + +%L + +@misc{ labview12, + author = {National Instruments}, + title = {Lab{VIEW}}, + url = {http://www.ni.com/labview} +} + + + +@article{ lakshman97performance, + author = {T. V. Lakshman and Upamanyu Madhow}, + title = {The Performance of {TCP/IP} for Networks with + High Bandwidth-Delay Products and Random Loss}, + journal = {Transactions on Networking}, + volume = 5, + number = 3, + month = jun, + year = 1997, +} + +@article{lakshman10cassandra, + title={Cassandra: a decentralized structured storage system}, + author={Lakshman, Avinash and Malik, Prashant}, + journal={ACM SIGOPS Operating Systems Review}, + volume={44}, + number={2}, + pages={35--40}, + year={2010}, + publisher={ACM} +} + +@article{ lamport78time, + author = {Leslie Lamport}, + title = {Time, Clocks, and the Ordering of Events + in a Distributed System}, + journal = {Communications of the ACM}, + month = jul, + year = 1978, + volume = 21, + number = 7, + pages = {558-565}, +} + +@article{ lamport79multi, + author = "Leslie Lamport", + title = "How to Make a Multiprocessor Computer that + Correctly Executes Multiprocess Programs", + journal = "{IEEE} Transactions on Computers", + month = sep, + year = 1979, + volume = "28", + number = "9", + pages = "690-691", +} + +@article{lamport82byzantine, + author = {Lamport, Leslie and Shostak, Robert and Pease, Marshall}, + title = {\href{http://research.microsoft.com/en-us/um/people/lamport/pubs/byz.pdf}{The {Byzantine} Generals Problem}}, + journal = {\bibconf{TOPLAS}{ACM Transactions on Programming Languages and Systems}}, + volume={4}, + number={3}, + pages={382--401}, + year={1982}, + publisher={ACM}, + url={http://research.microsoft.com/en-us/um/people/lamport/pubs/byz.pdf}, +} + +@article{lamport84using, + author = {Leslie Lamport}, + title = {Using Time Instead of Timeout + for Fault-Tolerant Distributed Systems}, + journal = {\bibconf{TOPLAS}{ACM Transactions on Programming Languages + and Systems}}, + volume = 6, + number = 4, + month = apr, + year = 1984, + pages = {254-280}, +} + +@inproceedings{ lampson96how, + author = {Lampson, Butler W.}, + title = {\href{https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.72.5429&rep=rep1&type=pdf}{How to Build a Highly Available System Using Consensus}}, + year = {1996}, + publisher = {Springer-Verlag}, + address = {Berlin, Heidelberg}, + booktitle = {Proceedings of the 10th International Workshop on Distributed Algorithms}, + pages = {1--17}, + numpages = {17}, + series = {WDAG ’96} +} + +@inproceedings{ lampson01abcd, + author = {Lampson, Butler W.}, + title = {\href{https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.595.4829&rep=rep1&type=pdf}{The ABCD’s of Paxos}}, + year = {2001}, + booktitle = {Proceedings of the 20th Annual ACM Symposium on Principles of Distributed Computing}, + series = {PODC ’01} +} + % pages = {13}, + % numpages = {1}, + % publisher = {Association for Computing Machinery}, + % address = {New York, NY, USA}, + % location = {Newport, Rhode Island, USA}, + + +@inproceedings{ lang01bounds, + author = {Tomas Lang and Jean-Michel Muller}, + title = {Bounds on Runs of Zeros and Ones for Algebraic Functions}, + booktitle = {\bibconf[15th]{ARITH}{15th IEEE Symposium + on Computer Arithmetic}}, + location = {Vail, Colorado}, + pages = {13-20}, + year = 2001, +} + +@article{ lamport01paxos, + author = {Leslie Lamport}, + title = {Paxos Made Simple}, + journal = {ACM SIGACT News}, + volume = 32, + number = 4, + month = dec, + year = 2001, + pages = {51-58}, +} + +@inproceedings{ laoutaris09delay, + author = {Nikolaos Laoutaris and Georgios Smaragdakis and + Pablo Rodriguez and Ravi Sundaram}, + title = {Delay Tolerant Bulk Data Transfers on the {Internet}}, + booktitle = {\bibconf{SIGMETRICS}{ACM SIGMETRICS Conference on + Measurement and Modeling of Computer Systems}}, + month = jun, + year = 2009, + location = {Seattla, WA}, +} + +@misc{ lea00dlmalloc, + author = {Doug Lea}, + title = {A Memory Allocator}, + year = 2000, + url = {http://g.oswego.edu/dl/html/malloc.html}, + lastchecked = {24 Sep 2012}, +} + +@article{ leblanc87debugging, + author = {Thomas J. Leblanc and John M. Mellor-Crummey}, + title = {Debugging Parallel Programs with Instant Replay}, + journal = {IEEE Transactions on Computers}, + volume = {C-36}, + number = 4, + month = apr, + year = 1987, + pages = {471-482}, +} + +@inproceedings{ lee01applied, + author = {Jason Lee and Dan Gunter and Brian Tierney and Bill Allcock + and Joe Bester and John Bresnahan and Steve Tueckek}, + title = {Applied Techniques for High Bandwidth Data Transfers + across Wide Area Networks}, + booktitle = {\bibconf{CHEP}{Computing in High Energy + and Nuclear Physics}}, + month = sep, + year = 2001, +} + +@inproceedings{ lee01split, + author = {Sung-Ju Lee and Mario Gerla}, + title = {Split Multipath Routing with Maximally Disjoint Paths + in Ad hoc Networks}, + booktitle = {\bibconf{ICC}{IEEE International Conference + on Communications}}, + month = jun, + year = 2001, + location = {St. Petersburg, Russia}, +} + +@article{ lee02improving, + author = {Youngseok Lee and Ilkyu Park and Yanghee Choi}, + title = {Improving {TCP} Performance in + Multipath Packet Forwarding Networks}, + journal = {Journal of Communications and Networks}, + volume = 4, + number = 2, + month = jun, + year = 2002, + pages = {148-157}, +} + +@inproceedings{ leesatapornwongsa16taxdc, + author = {Tanakorn Leesatapornwongsa and Jeffrey F. Lukman and + Shan Lu and Haryadi S. Gunawi}, + title = {\href{https://ucare.cs.uchicago.edu/pdf/asplos16-TaxDC.pdf}{TaxDC: A Taxonomy of Non-Deterministic Concurrency Bugs in Datacenter Distributed Systems}}, + booktitle = {\bibconf[21th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + month = apr, + year = 2016, +} + +@inproceedings{ lefevre01worst, + author = {Vincent Lef\`evre and Jean-Michel Muller}, + title = {Worst Cases for Correct Rounding of the Elementary Functions + in Double Precision}, + booktitle = {\bibconf[15th]{ARITH}{IEEE Symposium + on Computer Arithmetic}}, + location = {Vail, Colorado}, + pages = {111-118}, + year = 2001, +} + +@inproceedings{ leith04htcp, + title = {{H-TCP}: {TCP} for high-speed and long-distance networks}, + author = {D. Leith and R. Shorten}, + booktitle = {\bibconf[2nd]{PFLDnet}{Workshop on Protocols + for Fast Long-Distance Networks}}, + month = feb, + year = 2004, + location = {Argonne, Illinois} +}, + +@inproceedings{ lepreau93inkernel, + author = {Jay Lepreau and Mike Hibler and Bryan Ford and Jeffrey Law}, + title = {In-Kernel Servers on {Mach 3.0}: + Implementation and Performance}, + booktitle = {3rd USENIX Mach Symposium}, + pages = {39-55}, + month = apr, + year = 1993, +} + +@inproceedings{ lesniewski-laas07alpaca, + author = {Christopher Lesniewski-Laas and Bryan Ford and Jacob Strauss + and M. Frans Kaashoek and Robert Morris}, + title = {{Alpaca}: extensible authorization for distributed services}, + booktitle = {ACM Computer and Communications Security}, + location = {Alexandria, VA}, + month = oct, + year = 2007, +} + +@book{ levy84capability, + author = {Henry M Levy}, + title = {Capability-based Computer Systems}, + publisher = {Digital Press}, + isbn = {0932376223}, + pages = 220, + year = 1984, +} + +@inproceedings{ li00scalable, + author = "J. Li and J. Jannotti and D. {De Couto} and D. Karger and R. Morris", + title = "A scalable location service for geographic ad-hoc routing", + booktitle = "\bibconf[6th]{MOBICOM}{{ACM} International Conference on Mobile + Computing and Networking}", + year = "2000", + month = aug, + pages = {120--130}, + url = "citeseer.nj.nec.com/li00scalable.html" +} + +@inproceedings{ li04first, + author = {Lun Li and David Alderson and Walter Willinger + and John Doyle}, + title = {A First-Principles Approach to Understanding the + {Internet}'s Router-level Topology}, + booktitle = {\bibbrev{}{ACM }SIGCOMM}, + location = {Portland, OR}, + month = aug, + year = {2004}, +} + +@inproceedings{ li04sundr, + author = {Jinyuan Li and Maxwell Krohn and David Mazi\`eres + and Dennis Shasha}, + title = {\href{https://www.usenix.org/legacy/event/osdi04/tech/full_papers/li_j/li_j.pdf}{Secure Untrusted Data Repository {(SUNDR)}}}, + booktitle = {\bibconf[6th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = dec, + year = 2004, + location = {San Francisco, CA}, +} + +@inproceedings{ li05bandwidth, + author = {Jinyang Li and Jeremy Stribling and Robert Morris + and M. Frans Kaashoek}, + title = {Bandwidth-efficient management of {DHT} routing tables}, + booktitle = {\bibconf[2nd]{NSDI}{Symposium on + Networked Systems Design and Implementation}}, + month = may, + year = 2005, + location = {Boston, MA}, +} + +@inproceedings{li05qos, + author = {Wen-Syan Li and + Vishal S. Batra and + Vijayshankar Raman and + Wei Han and + Inderpal Narang}, + title = {{QoS}-based Data Access + and Placement for Federated Information Systems}, + booktitle = {\bibconf[31st]{VLDB}{Very Large Data Bases}}, + location = {Trondheim, Norway}, + month = aug, + year = 2005 +} + +@inproceedings{ li06f2f, + author = {Jinyang Li and Frank Dabek}, + title = {{F2F}: Reliable Storage in Open Networks}, + booktitle = {5th IPTPS}, + year = {2006}, + month = feb, + location = {Santa Barbara, CA}, +} + +@inproceedings{li10cloudcmp, + author = {Ang Li and + Xiaowei Yang and + Srikanth Kandula and + Ming Zhang}, + title = {{CloudCmp}: {C}omparing Public Cloud Providers}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + location = {Melbourne, Australia}, + month = nov, + year = 2010 +} + + +@article{ liao01grid, + author = "Wen-Hwa Liao and Jang-Ping Sheu and Yu-Chee Tseng", + title = "{GRID}: A Fully Location-Aware Routing Protocol for Mobile Ad Hoc Networks", + journal = "Telecommunication Systems", + volume = "18", + number = "1-3", + pages = "37-60", + year = "2001", + url = "citeseer.nj.nec.com/liao01grid.html" +} + +@article{ licklider68computer, + author = "J.C.R. Licklider", + title = "The Computer as a Communication Device", + journal = "Science and Technology", + month = apr, + year = "1968", +} + +@inproceedings{ liedtke93persistent, + author = "Jochen Liedtke", + title = "A persistent system in real use: + experiences of the first 13 years", + booktitle = {\bibconf{IWOOOS}{International Workshop on + Object-Orientation in Operating Systems}}, + year = 1993, +} + +@inproceedings{ liedtke93microkernel, + author = {Jochen Liedtke}, + title = {On Micro-kernel Construction}, + booktitle = {\bibconf[15th]{SOSP}{ACM Symposium + on Operating System Principles}}, + location = {Copper Mountain, CO}, + year = 1995, +} + +@techreport{ liedtke95improved, + author = {Jochen Liedtke}, + title = {Improved Address-Space Switching on {Pentium} Processors + by Transparently Multiplexing User Address Spaces}, + institution = {GMD --- German National Research Center + for Information Technology}, + location = {Sankt Augustin, Germany}, + number = {No. 933}, + month = nov, + year = 1995, +} + +@misc{ liedtke00ubiquitous, + author = "Jochen Liedtke and others", + title = "An Unconventional Proposal: Using the x86 Architecture As + The Ubiquitous Virtual Standard Architecture", + publisher = "IBM T. J. Watson Research Center", + year = "2000", + note = "Unpublished Report.", +} + +@techreport{ liefke99xmill, + author = "Hartmut Liefke and Dan Suciu", + title = "{XMill:} an Efficient Compressor for {XML} Data", + institution = "University of Pennsylvania", + location = "Philadelphia, PA", + number = "MS-CIS-99-26", + year = "1999", +} + +@inproceedings{ lim03tcp, + author = {Haejung Lim and Kaixin Xu and Mario Gerla}, + title = {{TCP} Performance over Multipath Routing in + Mobile Ad Hoc Networks}, + booktitle = {\bibconf{ICC}{IEEE International Conference + on Communications}}, + month = may, + year = 2003, + location = {Anchorage, Alaska}, +} + +@inproceedings{ liskov86highly, + author = {Barbara Liskov and Rivka Ladin}, + title = {Highly-Available Distributed Services and + Fault-Tolerant Distributed Garbage Collection}, + booktitle = {Principles of Distributed Computing}, + month = aug, + year = 1986, + pages = {29-39}, +} + +@article{ liu01atcp, + author = {Jian Liu and Suresh Singh}, + title = {{ATCP}: {TCP} for Mobile Ad Hoc Networks}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 19, + number = 7, + month = jul, + year = 2001, + pages = {1300-1315}, +} + +@inproceedings{liu02analyzingsecurity, + author = {Lin Liu and Eric Yu and John Mylopoulos}, + title = {Analyzing security requirements as relationships among strategic actors}, + booktitle = {\bibconf[2nd]{SREIS}{Symposium on Requirements Engineering for + Information Security}}, + month = {oct}, + year = {2002}, +} + +@inproceedings{liu09hide, + author = {Yali Liu and + Dipak Ghosal and + Frederik Armknecht and + Ahmad{-}Reza Sadeghi and + Steffen Schulz and + Stefan Katzenbeisser}, + title = {Hide and Seek in Time -- {R}obust Covert Timing Channels}, + booktitle = {\bibconf[14th]{ESORICS}{European Symposium on Research + in Computer Security}}, + location = {Saint-Malo, France}, + month = sep, + year = 2009 +} + +@inproceedings{liu11dthreads, + author = {Tongping Liu and Charlie Curtsinger and Emery Berger}, + title = {Dthreads: efficient deterministic multithreading}, + booktitle = {\bibconf{SOSP '11}{Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles}}, + month = {oct}, + year = {2011}, + pages = {327--336}, +} + +@inproceedings{liu10balanced, + author = {Wei Liu and others}, + title = {A balanced programming model for emerging heterogeneous + multicore systems}, + booktitle = {\bibconf{HotPar '10}{2nd USENIX Workshop on Hot Topics + in Parallelism (HotPar '10)}}, + month = jun, + year = 2010, +} + +@inproceedings{ liu01impact, + author = {Yong Liu and Weibo Gong and Prashant Shenoy}, + title = {On the Impact of Concurrent Downloads}, + booktitle = {\bibconf{WSC}{Winter Simulation Conference}}, + year = 2001, +} + +@article{ lochert07survey, + author = {Christian Lochert and Bj\"orn Scheuermann and Martin Mauve}, + title = {A Survey on Congestion Control for Mobile Ad-Hoc Networks}, + journal = {\bibconf{WCMC}{Wireless Communications \& Mobile Computing}}, + volume = 7, + number = 5, + month = jun, + year = 2007, + pages = {655-676}, +} + +@article{ loidl03comparing, + author = {H-W. Loidl and others}, + title = {Comparing parallel functional languages: + Programming and performance}, + journal = {Higher-order and Symbolic Computation}, + volume = {16}, + number = {3}, + year = {2003}, +} + +@inproceedings{ lokhava19fast, + author = {Marta Lokhava and Giuliano Losa and David Mazi\`eres and + Graydon Hoare and Nicolas Barry and Eli Gafni and + Jonathan Jove and Rafa\l{} Malinowsky and Jed McCaleb}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/3341301.3359636}{Fast and secure global payments with Stellar}}, + booktitle = {\bibconf[27th]{SOSP}{ACM Symposium on Operating System Principles}}, + month = oct, + year = 2019, + pages = {80-96}, +} + +@inproceedings{ lokhmotov07delayed, + author = {Anton Lokhmotov and Alan Mycroft and Andrew Richards}, + title = {Delayed Side-effects Ease Multi-core Programming}, + booktitle = {EuroPar}, + month = aug, + year = 2007, + location = {Rennes, France}, +} + +@inproceedings{ lopez-pacheco06xcp-i, + author={D. M. Lopez-Pacheco and C. Pham and L. Lef\`evre}, + title = {{XCP-i} : e{X}plicit Control Protocol for heterogeneous + inter-networking of high-speed networks}, + booktitle = {IEEE GLOBECOM}, + month = nov, + year = 2006, + location = {San Francisco, CA}, +} + +@techreport{ lorie00archiving, + author = {Raymond A. Lorie}, + title = {Long-Term Archiving of Digital Information}, + institution = {IBM Almaden Research Center}, + location = {San Jose, CA}, + number = {RJ 10185}, + year = 2000, + month = may, + day = 18, +} + +@misc{ lorie02uvc, + author = {Raymond A. Lorie}, + title = {The {UVC}: a Method for Preserving Digital Documents, + proof of concept}, + institution = {IBM Netherlands}, + note = {IBM/KB Long-Term Preservation Study Report Series Number 4}, + location = {Amsterdam}, + year = 2002, +} + +@inproceedings{ lou01multipath, + author = {Wenjing Lou and Yuguang Fang}, + title = {A multipath routing approach for secure data delivery}, + booktitle = {MILCOM}, + month = oct, + year = 2001, + location = {Vienna, VA}, +} + +@inproceedings{ lu08learning, + author = {Shan Lu and Soyeon Park and Eunsoo Seo and Yuanyuan Zhou}, + title = {Learning from Mistakes --- A Comprehensive Study + on Real World Concurrency Bug Characteristics}, + booktitle = {\bibconf[13th]{ASPLOS}{international Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + location = {Seattle, WA}, + month = mar, + year = 2008, + pages = {329-339}, +} + +@article{ lua05survey, + author = {Eng Keong Lua and Jon Crowcroft and Marcelo Pias + and Ravi Sharma and Steven Lim}, + title = {A Survey and Comparison of + Peer-to-Peer Overlay Network Schemes}, + journal = {IEEE Communications Surveys \& Tutorials}, + volume = 7, + number = 2, + year = 2005, + pages = {72-93}, +} + +@article{ lucco95omniware, + author = "S. Lucco and O. Sharp and R. Wahbe", + title = "{Omniware: A Universal Substrate for Web Programming}", + journal = "World Wide Web Journal", + volume = "1", + number = "1", + address = "Boston, MA, USA", + pages = "359--368", + year = "1995", + url = "citeseer.ist.psu.edu/lucco95omniware.html" +} + +@inproceedings{ luk05pin, + author = {Chi-Keung Luk and others}, + title = {Pin: building customized program analysis tools with dynamic instrumentation}, + booktitle = {PLDI}, + month = jun, + year = 2005 +} + + +@article{lundstrom86mimd, + author = {Lundstrom, S F and Barnes, G H}, + title = {A controllable {MIMD} architecture}, + book = {Advanced computer architecture}, + year = {1986}, + pages = {30--38}, + publisher = {IEEE Computer Society Press}, + address = {Los Alamitos, CA, USA}, +} + +%M + +@inproceedings{ mackall06revlog, + author = {Matt Mackall}, + title = {Towards a Better {SCM}: {Revlog} and {Mercurial}}, + booktitle = {Linux Symposium}, + month = jul, + year = 2006, + location = {Ottawa, Ontario, Canada}, +} + +@inproceedings{ madhavapeddy13unikernels, + author = {Anil Madhavapeddy and Richard Mortier and + Charalampos Rotsos and David Scott and Balraj Singh and + Thomas Gazagnaire and Steven Smith and Steven Hand and + Jon Crowcroft}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/2490301.2451167}{Unikernels: library operating systems for the cloud}}, + booktitle = {\bibconf[18th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + month = mar, + year = 2013, + location = {Houston, Texas}, + } + +@inproceedings{ magalhaes01transport, + author = {Luiz Magalhaes and Robin Kravets}, + title = {Transport Level Mechanisms for Bandwidth Aggregation + on Mobile Hosts}, + booktitle = {\bibconf[9th]{ICNP}{International Conference on + Network Protocols}}, + location = {Riverside, CA}, + month = nov, + year = 2001, +} + +@inproceedings{ mahadevan07orbis, + author = {Priya Mahadevan and Calvin Hubble and Dmitri Krioukov + and Bradley Huffaker and Amin Vahdat}, + title = {Orbis: Rescaling Degree Correlations to Generate + Annotated Internet Topologies}, + booktitle = {\bibbrev{}{ACM } SIGCOMM}, + month = aug, + year = 2007, + location = {Kyoto, Japan}, +} + +@article{ mahajan02controlling, + author = {Ratul Mahajan and others}, + title = {Controlling High Bandwidth Aggregates in the Network}, + journal = {Computer Communications Review}, + volume = 32, + number = 3, + month = jul, + year = 2002, + pages = {62-73}, +} + +@article{ maniatis99mobile, + author = {Petros Maniatis and others}, + title = {The Mobile People Architecture}, + journal = {Mobile Computing and Communications Review}, + volume = 3, + number = 3, + month = jul, + year = 1999, + pages = {36-42}, +} + +@inproceedings{ maniatis03historic, + author = {Petros Maniatis and Mary Baker}, + title = {A Historic Name-Trail Service}, + booktitle = {\bibconf[5th]{WMCSA}{Workshop on Mobile Computing Systems + and Applications}}, + year = 2003, + month = oct, + location = {Monterey, CA}, +} + +@article{ maniatis05lockss, + author = {Petros Maniatis and Mema Roussopoulos and T. J. Giuli and + David S. H. Rosenthal and Mary Baker}, + title = {The {LOCKSS} peer-to-peer digital preservation system}, + journal = {\bibbrev{TOCS}{Transactions on Computer Systems}}, + volume = {23}, + number = {1}, + year = {2005}, + pages = {2--50}, + publisher = {ACM Press}, + address = {New York, NY, USA}, +} + +@inproceedings{ mantei91experiences, + author = {Marilyn M. Mantei and Ronald M. Baecker and Abigail J. Sellen and + William A. S. Buxton and Thomas Milligan and Barry Wellman}, + title = {Experiences in the use of a media space}, + booktitle = {SIGCHI Conference on Human Factors in Computing Systems}, + year = {1991}, + pages = {203--208}, + location = {New Orleans, LA}, + publisher = {ACM Press}, +} + +@inproceedings{ marandi10ring, + author = {Parisa Jalili Marandi and Marco Primi and Nicolas Schiper and Fernando Pedone}, + title = {\href{https://www.inf.usi.ch/faculty/pedone/Paper/2010/2010DSN.pdf}{Ring Paxos: A High-Throughput Atomic Broadcast Protocol}}, + booktitle = {\bibconf{DSN}{Dependable Systems and Networks}}, + month = jun, + year = 2010, +} + +@inproceedings{marandi11high, + title={\href{http://ieeexplore.ieee.org/document/5958258/}{High performance state-machine replication}}, + author={Marandi, Parisa Jalili and Primi, Marco and Pedone, Fernando}, + booktitle={Dependable Systems \& Networks (DSN), 2011 IEEE/IFIP 41st International Conference on}, + pages={454--465}, + year={2011}, + organization={IEEE} +} + +@inproceedings{ marina01ondemand, + author = {Mahesh K. Marina and Samir R. Das}, + title = {On-demand Multipath Distance Vector Routing + in Ad Hoc Networks}, + booktitle = {\bibconf[9th]{ICNP}{International Conference + on Network Protocols}}, + month = nov, + year = 2001, + location = {Riverside, CA}, +} + +@inproceedings{ markopoulou04characterization, + author={Athina Markopoulou and Gianluca Iannaccone + and Supratik Bhattacharyya and Chen-Nee Chuah + and Christophe Diot}, + title={Characterization of failures in an {IP} backbone}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + year = 2004, + month = mar, +} + +@article{ martell08atom, + author = {Duncan Martell}, + title = {Atom Sales Help {Intel} Expand Beyond {PC} Market}, + journal = {NewsFactor Network}, + month = aug, + day = 15, + year = 2008, +} + +@inproceedings{ marti04dht, + author = {Sergio Marti and Prasanna Ganesan and Hector Garcia-Molina}, + title = {{DHT} Routing Using Social Links}, + booktitle = {\bibconf[3rd]{IPTPS}{International Workshop + on Peer-to-Peer Systems (IPTPS)}}, + month = feb, + year = 2004, + location = {San Diego, CA}, +} + +@inproceedings{ marti04sprout, + author="Sergio Marti and Prasanna Ganesan and Hector Garcia-Molina", + title="{SPROUT}: {P2P} routing with social networks", + booktitle="\bibconf[1st]{P2P\&DB}{International Workshop on + Peer-to-Peer Computing and Databases}", + month=mar, + year=2004, +} + +@inproceedings{ martignoni12cloud, + author = {Lorenzo Martignoni and Pongsin Poosankam and Matei Zaharia + and Jun Han and Stephen McCamant and Dawn Song + and Vern Paxson and Adrian Perrig and Scott Shenker + and Ion Stoica}, + booktitle = {\bibconf{ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2012, + location = {Boston, MA}, +} + +@inproceedings{ mathis96forward, + author = {M. Mathis and J. Mahdavi}, + title = {Forward Acknowledgement: Refining {TCP} Congestion Control}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1996, +} + +@journal{ mathis97macroscopic, + author = {Matthew Mathis and others}, + title = {The Macroscopic Behavior of the + {TCP} Congestion Avoidance Algorithm}, + journal = {Computer Communications Review}, + volume = 25, + number = 3, + month = jul, + year = 1997, + pages = {67-82}, +} + +@inproceedings{ mattern89virtual, + author = {Friedemann Mattern}, + title = {\href{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.63.4399&rep=rep1&type=pdf}{Virtual Time and Global States of Distributed Systems}}, + booktitle = {International Workshop on Parallel and Distributed Algorithms}, + year = 1989, +} + % location = {Chateau De Bonas, Gers, France}, + % pages = {215--226}, + +@inproceedings{ maxemchuk75dispersity, + author = {N. F. Maxemchuk}, + title = {Dispersity Routing}, + booktitle = {ICC}, + month = jun, + year = 1975, + location = {San Francisco, CA}, +} + +@inproceedings{may87mimic, + author = {C. May}, + title = {Mimic: A Fast {System/370} Simulator}, + booktitle = {SIGPLAN '87: Papers of the Symposium on Interpreters + and Interpretive Techniques}, + year = {1987}, + isbn = {0-89791-235-7}, + pages = {1--13}, + location = {St. Paul, Minnesota, United States}, + doi = {http://doi.acm.org/10.1145/29650.29651}, +} + + +@article{ maymounkov02kademlia-lncs, + author = "Petar Maymounkov and David Mazi\`eres", + title = "Kademlia: A peer-to-peer information system + based on the {XOR} metric.", + journal = "\bibbrev{LNCS}{Lecture Notes in Computer Science}", + month = jan, + year = "2002", + volume = "2429", + pages = "53-65", +} + +@inproceedings{ maymounkov02kademlia, + author = "Petar Maymounkov and David Mazi\`eres", + title = "Kademlia: A peer-to-peer information system + based on the {XOR} metric.", + booktitle = {\bibconf[1st]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + month = "March", + year = "2002", +} + +@inproceedings{ mazieres99separating, + title = {{S}eparating key management from file system security}, + author = {D. Mazi{\`e}res and M. Kaminsky and M. F. Kaashoek and +E. Witchel}, + booktitle = {\bibconf[17th]{SOSP}{ACM Symposium on Operating System Principles}}, + month = dec, + year = {1999} +} + +@inproceedings{mazieres02building, + title={\href{https://dl.acm.org/citation.cfm?id=571840}{Building secure file systems out of Byzantine storage}}, + author={Mazieres, David and Shasha, Dennis}, + booktitle={Proceedings of the twenty-first annual symposium on Principles of distributed computing}, + pages={108--117}, + year={2002}, + organization={ACM} +} + +@inproceedings{ mccamant06evaluating, + title = {Evaluating {SFI} for a {CISC} Architecture}, + author = {Stephen McCamant and Greg Morrisett}, + booktitle = {15th USENIX Security Symposium}, + location = {Vancouver, BC, Canada}, + month = aug, + year = 2006, +} + +@inproceedings{ mccool10structured, + author = {Michael McCool}, + title = {Structured Parallel Programming with Deterministic Patterns}, + booktitle = {\bibconf{HotPar '10}{2nd USENIX Workshop on Hot Topics + in Parallelism (HotPar '10)}}, + month = jun, + year = 2010, +} + + +@article{ mcgillicuddy09wan, + author = {Shamus McGillicuddy}, + title = {{WAN} optimization market passes \$1 billion; + {Cisco} takes the lead}, + journal = {SearchEnterpriseWAN.com}, + month = mar, + day = 11, + year = 2009, + url = {http://searchenterprisewan.techtarget.com/news/article/0,289142,sid200_gci1350518,00.html}, +} + +@article{ mckenna99large, + author = {P.J. McKenna}, + title = {Large Torsional Oscillations in Suspension Bridges Revisited: + Fixing an Old Approximation}, + journal = {The American Mathematical Monthly}, + volume = 106, + number = 1, + month = jan, + year = 1999, +} + +@inproceedings{ mckenney98rcu, + author = {Paul E. McKenney and John D. Slingwine}, + title = {{Read-Copy Update}: Using Execution History to + Solve Concurrency Problems}, + booktitle = {\bibconf[10th]{PDCS'98}{International Conference on + Parallel and Distributed Computing and Systems}}, + month = oct, + year = 1998, + pages = {509-518}, + location = {Las Vegas, NV}, +} +@phdthesis{ mckenney04rcu, + author ={Paul E. Mc{K}enney}, + title = {Exploiting Deferred Destruction: An Analysis of + {Read-Copy-Update} Techniques in Operating System Kernels}, + school = {OGI School of Science and Engineering at + Oregon Health and Sciences University}, + year = 2004, + note = {\url{http://www.rdrop.com/users/paulmck/RCU/RCUdissertation.2004.07.14e1.pdf}} +} + +@article{ merlin79failsafe, + author = "P. M. Merlin and A. Segall", + title = "A Failsafe Distributed Routing Protocol", + journal = "IEEE Transactions on Communications", + volume = "COM-27", + number = "9", + pages = "1280-1287", + month = sep, + year = "1979", +} + +@inproceedings{ mickens11atlantis, + author = {James Mickens and Mohan Dhawan}, + title = {Atlantis: Robust, Extensible Execution Environments + for Web Applications}, + booktitle = {\bibconf[23rd]{SOSP}{ACM Symposium + on Operating System Principles}}, + month = oct, + year = 2011, + location = {Cascais, Portugal}, +} + +@misc{ microsoft98apipa, + author = {{Microsoft Corporation}}, + title = "Plug and Play Networking with {Microsoft} Automatic Private {IP} Addressing", + month = mar, + year = "1998", +} + +@inproceedings{ miller03paradigm, + author = {Mark S. Miller and Jonathan S. Shapiro}, + title = {Paradigm Regained: Abstraction Mechanisms for Access Control}, + booktitle = {Eighth Asian Computing Science Conference}, + location = {Mumbai, India}, + year = {2003}, + month = dec, + date = {10--12}, +} + +@inproceedings{ mishra92hopbyhop, + author = {Partho P. Mishra and Hemant Kanakia}, + title = {A Hop by Hop Rate-based Congestion Control Scheme}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1992, + location = {Baltimore, MD}, +} + +@article{ mishra96hopbyhop, + author = {Partho Pratim Mishra and Hemant Kanakia + and Satish K. Tripathi}, + title = {On Hop-by-Hop Rate-Based Congestion Control}, + journal = {Transactions on Networking}, + volume = 4, + number = 2, + month = apr, + year = 1996, + pages = {224-239}, +} + +@inproceedings{ mo99analysis, + author = {Jeonghoon Mo and Richard J. La and Venkat Anantharam + and Jean Walrand}, + title = {Analysis and Comparison of {TCP Reno} and {Vegas}}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 1999, + location = {New York, NY}, +} + +@inproceedings{ mogul87packet, + author = {Jeffrey C. Mogul and + Richard F. Rashid and + Michael J. Accetta}, + title = {The Packet Filter: An Efficient Mechanism for User-level + Network Code}, + booktitle = {Symposium on Operating System Principles}, + location = {Austin, TX}, + year = {1987}, + month = nov, + pages = {39-51}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@inproceedings{ mogul06emergent, + author = {Jeffrey C. Mogul}, + title = {Emergent (mis)behavior vs. complex software systems}, + booktitle = {\bibconf[1st]{EuroSys}{ACM SIGOPS/EuroSys European + Conference on Computer Systems}}, + location = {Leuven, Belgium}, + month = apr, + year = 2006 +} + +@inproceedings{ morris99click, + author = {Robert Morris and Eddie Kohler and John Jannotti + and M. Frans Kaashoek}, + title = {The {Click} modular router}, + booktitle = {\bibconf[17th]{SOSP}{ACM Symposium + on Operating System Principles}}, + location = {Kiawah Island, SC}, + month = dec, + year = 1999, +} + +@article{ mosberger93mcm, + author = {Mosberger, David}, + title = {Memory consistency models}, + journal = {SIGOPS Operating Systems Review}, + volume = {27}, + number = {1}, + month = jan, + year = 1993, + pages = {18--26}, +} + +@inproceedings{ motiwala07path, + author = "Murtaza Motiwala and Nick Feamster and Santosh Vempala", + title = "{Path Splicing: Reliable Connectivity with Rapid Recovery}", + booktitle = "{HOTNETS-VI}", + year = 2007, + month = nov +} + +@inproceedings{ motiwala08path, + author = {Murtaza Motiwala and Megan Elmore and Nick Feamster + and Santosh Vempala}, + title = {Path Splicing}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + year = 2008, + month = aug +} + +% see also tanenbaum86using +@article{ mullender86design, + author = {S. J. Mullender and A. S. Tanenbaum}, + title = {The Design of a Capability-Based Distributed Operating System}, + journal = {Computer Journal}, + volume = 29, + number = 4, + pages = {289-299}, + year = 1986, +} + +@inproceedings{ murthy96congestion, + author = {Shree Murthy and J.J. Garcia-Luna-Aceves}, + title = {Congestion-Oriented Shortest Multipath Routing}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 1996, + location = {San Francisco, CA}, +} + +@article{ murthy96efficient, + author = "Shree Murthy and J. J. Garcia-Luna-Aceves", + title = "An Efficient Routing Protocol for Wireless Networks", + journal = "Mobile Networks and Applications", + volume = "1", + number = "2", + pages = "183-197", + year = "1996", + url = "citeseer.nj.nec.com/murthy96efficient.html" +} + +@inproceedings{muthitacharoen02ivy, + title = {Ivy: A Read/Write Peer-to-peer File System}, + author = {A. Muthitacharoen and R. Morris and T. Gil and B. Chen}, + booktitle = {\bibconf[5th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + year = {2002} +} + +@inproceedings{ myers97decentralized, + author = {Andrew C. Myers and Barbara Liskov}, + title = {A Decentralized Model for Information Flow Control}, + booktitle = {\bibconf[16th]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + location = {Saint-Malo, France}, + month = oct, + year = 1997, +} + +@inproceedings{mysore97multicasting, + author = {Jayanth Mysore and Vaduvur Bharghavan}, + title = {A new multicasting-based architecture for {Internet} host mobility}, + booktitle = {\bibconf[3rd]{MOBICOM}{{ACM/IEEE} International Conference + on Mobile Computing and Networking}}, + year = {1997}, + isbn = {0-89791-988-2}, + pages = {161--172}, + location = {Budapest, Hungary}, + doi = {http://doi.acm.org/10.1145/262116.262144}, + publ = {ACM Press}, +} + +%N + +@inproceedings{nath06subtleties, + author = {Suman Nath and + Haifeng Yu and + Phillip B. Gibbons and + Srinivasan Seshan}, + title = {Subtleties in Tolerating Correlated Failures in Wide-area + Storage Systems}, + booktitle = {\bibconf[3rd]{NSDI}{USENIX/ACM Symposium + on Networked Systems Design and Implementation}}, + location = {San Jose, CA}, + month = may, + year = 2006 +} + +@inproceedings{narayan12djoin, + author = {Arjun Narayan and + Andreas Haeberlen}, + title = {D{J}oin: {D}ifferentially Private Join Queries over + Distributed Databases}, + booktitle = {\bibconf[10th]{OSDI}{USENIX Symposium on Operating Systems + Design and Implementation}}, + location = {Hollywood, CA}, + month = oct, + year = 2012 +} + +@inproceedings{ necula96safe, + author = {George C. Necula and Peter Lee}, + title = {Safe Kernel Extensions Without Run-Time Checking}, + booktitle = {\bibconf[2nd]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation (OSDI)}}, + year = {1996}, + pages = {229-243}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@article{ nelson89lzw, + author = {Mark Nelson}, + title = {{LZW} Data Compression}, + journal = {Dr. Dobb's Journal}, + month = oct, + year = 1989, + url = {http://www.dogma.net/markn/articles/lzw/lzw.htm}, +} + +% NOTE: obsoleted by nethercote07valgrind below +@inproceedings{ nethercote03valgrind, + author = {Nicholas Nethercote and Julian Seward}, + title = {Valgrind: A Program Supervision Framework}, + booktitle = {Third Workshop on Runtime Verification (RV'03)}, + location = {Boulder, CO}, + month = jul, + year = 2003, +} + + +@article{nethercote07valgrind, + author = {Nethercote, Nicholas and Seward, Julian}, + title = {Valgrind: a framework for heavyweight dynamic binary instrumentation}, + journal = {ACM SIGPLAN Notices}, + volume = {42}, + number = {6}, + year = {2007}, + pages = {89--100}, + } + + +@inproceedings{ nguyen03path, + author = {Thinh Nguyen and Avideh Zakhor}, + title = {Path Diversity with Forward Error Correction {(PDF)} + System for Packet Switched Networks}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 2003, + location = {San Francisco, CA}, +} + +@misc{ nielsen97network, + author = {H. F. Nielsen and others}, + title = {Network Performance Effects of {HTTP/1.1}, {CSS1}, and {PNG}}, + month = jun, + year = 1997, + note = {W3C NOTE-pipelining-970624} +} + +@misc{ nider19unicore, + author = {Joel Nider and Felipe Huici and Bryan Ford and + Costin Raiciu and Caterina Parals and Laurent Mathy and + Trevor Moore and Herbert Bos and Nicola Ciulli and + Thierry Masson and Cristian Patachia-Sultanoiu and + Radu Stoenescu}, + title = {\href{https://cordis.europa.eu/project/id/825377}{UNICORE: A Common Code Base and Toolkit for Deployment of Applications to Secure and Reliable Virtual Execution Environments}}, + note = {EU H2020 grant 825377}, + month = dec, + year = 2019, +} + +@techreport{nikhil93id, + author = {Rishiyur S. Nikhil}, + title = {An Overview of the Parallel Language {I}d (a foundation for pH, a parallel dialect of {H}askell)}, + institution = {Digital Equipment Corporation, Cambridge Research Laboratory}, + year = {1993} +} + +@misc{ nist00dss, + author = {{National Institute of Standards and Technology}}, + title = {Digital Signature Standard {(DSS)}}, + month = jan, + year = 2000, + note = {FIPS PUB 186-2}, +} + +%O + +@article{ obanaik05secure, + author = {Venkatesh Obanaik and Lillykutty Jacob and A.L. Ananda}, + title = {Secure performance enhancing proxy: + To ensure end-to-end security and enhance {TCP} performance + over {IPv6} wireless networks}, + journal = {Computer Networks}, + volume = 50, + number = 13, + month = sep, + year = 2006, + pages = {2225-2238}, +} + +@inproceedings{ olszewski09kendo, + author = {Marek Olszewski and Jason Ansel and Saman Amarasinghe}, + title = {Kendo: Efficient Deterministic Multithreading in Software}, + booktitle = {\bibconf[14th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + month = mar, + year = 2009, + location = {Washington, DC}, +} + +@inproceedings{ olszewski11kendo, + author = {Marek Olszewski and Jason Ansel and Saman Amarasinghe}, + title = {Scaling Deterministic Multithreading}, + booktitle = {\bibconf[2nd]{WoDet}{Workshop on Determinism + and Correctness in Parallel Programming}}, + month = mar, + day = 6, + year = 2011, + location = {Newport Beach, CA}, +} + +@article{ omalley92dynamic, + author = {Sean W. O'Malley and Larry L. Peterson}, + title = {A Dynamic Network Architecture}, + journal = {\bibbrev{TOCS}{Transactions on Computer Systems}}, + volume = 10, + number = 2, + month = may, + year = 1992, + pages = {110-143}, +} + +@article{ ou06truth, + author = {George Ou}, + title = {The truth about the {IPv6} transition}, + journal = {ZDNet}, + month = nov, + day = 13, + year = 2006, + note = {\url{http://blogs.zdnet.com/Ou/?p=367}}, +} + +@inproceedings{ ozveren94reliable, + author = {C\"uneyt M. \"Ozveren and Robert J. Simcoe + and George Varghese}, + title = {Reliable and Efficient Hop-by-Hop Flow Control}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1994, + location = {London, UK}, +} + +%P + +@inproceedings{ pacheco06xcpi, + author = {Dino M. Lopez-Pacheco and Cong-Duc Pham and Laurent Lefevre}, + title = {XCP-i : eXplicit Control Protocol for heterogeneous inter-networking of high-speed networks}, + booktitle = {IEEE Globecom}, + month = nov, + year = 2006, + location = {San Fransisco, CA}, +} + +@article{ padmanabhan95improving, + author = {Venkata N. Padmanabhan and Jeffrey C. Mogul}, + title = {Improving {HTTP} Latency}, + journal = {Computer Networks and ISDN Systems}, + volume = 28, + number = {1--2}, + month = dec, + year = 1995, + pages = {25--35}, +} + +@phdthesis{ padmanabhan98addressing, + author = {Venkata Narayana Padmanabhan}, + title = {Addressing the Challenges of Web Data Transport}, + school = {UC Berkeley}, + month = sep, + year = 1998, +} + +@inproceedings{ padmanabhan99coordinating, + author = {Venkata N. Padmanabhan}, + title = {Coordinating Congestion Management and Bandwidth Sharing + for Heterogeneous Data Streams}, + booktitle = {\bibconf[9th]{NOSSDAV}{Network and Operating System + Support for Digital Audio and Video}}, + month = jun, + year = 1999, + location = {Basking Ridge, NJ}, +} + +@article{ palsingh94parallel, + author = {Jaswinder Pal Singh and Anoop Gupta and Marc Levoy}, + title = {Parallel visualization algorithms: performance + and architectural implications}, + journal = {IEEE Computer}, + volume = 27, + number = 7, + month = jul, + year = 1994, + pages = {45--55}, +} + +@inproceedings{ paluska03footloose, + author = {J.M. Paluska and others}, + title = {Footloose: A Case for Physical Eventual Consistency + and Selective Conflict Resolution}, + booktitle = {\bibconf[5th]{WMCSA}{Workshop on + Mobile Computing Systems and Applications}}, + location = {Monterey, CA}, + year = 2003, + day = {9-10}, +} + +@inproceedings{ pan88supporting, + author = {Douglas Z. Pan and Mark A. Linton}, + title = {Supporting Reverse Execution of Parallel Programs}, + booktitle = {\bibconf{PADD}{Workshop on + Parallel and Distributed Debugging}}, + year = {1988}, + pages = {124--129}, + location = {Madison, Wisconsin}, + address = {New York, NY, USA}, +} + +@article{ pancake90parallel, + author = {Cherri M. Pancake and Donna Bergmar}, + title = {Do parallel languages respond to the needs of + scientific programmers?}, + journal = {Computer}, + volume = {23}, + number = {12}, + month = dec, + year = 1990, + pages = {13-23}, +} + +@inproceedings{papadimitriou13towards, + author = {Antonis Papadimitriou and + Mingchen Zhao and + Andreas Haeberlen}, + title = {Towards privacy-preserving fault detection}, + booktitle = {\bibconf[9th]{HotDep}{Workshop on Hot Topics in Dependable + Systems}}, + location = {Nemacolin Woodlands Resort, PA}, + month = nov, + year = 2013 +} + +@inproceedings{ park97highly, + author = {Vincent D. Park and M. Scott Corson}, + title = {A Highly Adaptive Distributed Routing Algorithm + for Mobile Wireless Networks}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = apr, + year = 1997, + location = {Kobe, Japan}, +} + +@article{ parker83detection, + author = {D. Stott {Parker, Jr.} and others}, + title = {Detection of Mutual Inconsistency in Distributed Systems}, + journal = {IEEE Transactions on Software Engineering}, + volume = {SE-9}, + number = 3, + month = may, + year = 1983, +} + +@inproceedings{ partridge87implementing, + author = {Craig Partridge}, + title = {Implementing the Reliable Data Protocol {(RDP)}}, + booktitle = {USENIX Summer Conference}, + month = jun, + year = 1987, +} + +@article{ partridge97tcpip, + author = {Craig Partridge and Timothy J. Shepard}, + title = {{TCP/IP} Performance over Satellite Links}, + journal = {IEEE Network}, + volume = 11, + number = 5, + month = sep, + year = 1997, + pages = {44-49}, +} + +@article{ patterson10multicore, + author={Patterson, D.}, + journal={Spectrum, IEEE}, + title={The trouble with multi-core}, + year={2010}, + month=jul, + volume={47}, + number={7}, + pages={28 -- 32, 53}, +} + + + +@inproceedings{ paul95asymmetric, + author = {S. Paul and others}, + title = {An Asymmetric Protocol for Digital Cellullar Communications}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = apr, + year = 1995, + location = {Boston, MA}, +} + +@inproceedings{ pearlman00impact, + author = {Marc R. Pearlman and others}, + title = {On the Impact of Alternate Path Routing for Load Balancing + in Mobile Ad Hoc Networks}, + booktitle = {\bibconf[1st]{MobiHoc}{Workshop on Mobile Ad Hoc + Networking \& Computing}}, + month = aug, + year = 2000, + location = {Boston, MA}, +} + +@inproceedings{pearson09privacy, + author = {Pearson, Siani}, + title = {Taking account of privacy when designing cloud computing services}, + booktitle = {\bibconf{ICSE-Cloud}{ICSE Workshop on + Software Engineering Challenges of Cloud Computing}}, + month = may, + year = 2009, + pages = {44--52}, + location = {Vancouver, BC, Canada} +} + +@inproceedings{ pei00fisheye, + author = "Guangyu Pei and Mario Gerla and Tsu-Wei Chen", + title = "Fisheye State Routing: + A Routing Scheme for Ad Hoc Wireless Networks", + booktitle = {\bibconf{ICC}{IEEE International Conference + on Communications}}, + pages = "70-74", + month = jun, + year = "2000", + location = "New Orleans, LA", + url = "citeseer.nj.nec.com/article/pei00fisheye.html" +} + +@inproceedings{ peng01improving, + author = {Jing Peng and Peter Andreadis and Claude B\'elisle + and Michel Barbeau}, + title = {Improving {TCP} Performance over Long Delay Satellite Links}, + booktitle = {OPNETWORK}, + year = 2001, +} + +@inproceedings{ percival05cache, + author = {Colin Percival}, + title = {Cache Missing for Fun and Profit}, + booktitle = {BSDCan}, + month = may, + year = 2005, + location = {Ottawa, Canada}, +} + +@inproceedings{ perkins94highly, + author = "Charles E. Perkins and Pravin Bhagwat", + title = "Highly Dynamic Destination-Sequenced Distance-Vector Routing ({DSDV}) for Mobile Computers", + booktitle = "{ACM} {SIGCOMM}'94 Conference on Communications Architectures, Protocols and Applications", + pages = "234--244", + year = "1994", +} + +@inproceedings{ perkins99adhoc, + author = "Charles E. Perkins and Elizabeth M. Belding-Royer", + title = "Ad Hoc On-Demand distance Vector Routing", + booktitle = "2nd IEEE Workshop on + Mobile Computing Systems and Applications", + pages = "90-100", + location = "New Orleans, LA", + month = feb, + year = "1999", +} + +@inproceedings{ peterson02flexible, + author = {David S. Peterson and Matt Bishop and Raju Pandey}, + title = {A Flexible Containment Mechanism for Executing Untrusted Code}, + booktitle = {11th USENIX Security Symposium}, + location = {San Francisco, CA}, + month = aug, + year = {2002}, + address = {Berkeley, CA, USA}, +} + +@inproceedings{ peterson04overcoming, + author = {Larry Peterson and Scott Shenker and Jonathan Turner}, + title = {Overcoming the {Internet} Impasse through Virtualization}, + booktitle = {\bibconf[3rd]{HotNets}{Workshop on Hot Topics in Networks}}, + location = {San Diego, CA}, + month = nov, + year = 2004, +} + +@article{peytonjones89parallel, + author = {Peyton Jones, Simon L.}, + title = {Parallel Implementations of Functional Programming Languages}, + volume = {32}, + number = {2}, + pages = {175--186}, + year = 1989, + journal = {The Computer Journal} +} + +@article{ pike95plan9, + author = {Rob Pike and others}, + title = {{Plan 9} from {Bell Labs}}, + journal = "Computing Systems", + volume = "8", + number = "3", + month = "Summer", + year = "1995", + pages = "221--254", +} + +@inproceedings{ plakal98lamport, + author = {Manoj Plakal and Daniel J. Sorin and Anne E. Condon and + Mark D. Hill}, + title = {\href{https://dl.acm.org/citation.cfm?doid=277651.277672}{Lamport Clocks: Verifying a Directory Cache-Coherence Protocol}}, + booktitle = {\bibconf[10th]{SPAA}{Symposium on Parallel Algorithms and Architectures}}, + month = jun, + year = 1998, + location = {Puerto Vallarta, Mexico}, +} + +@article{poddar16arx, + title={Arx: A strongly encrypted database system.}, + author={Poddar, Rishabh and Boelter, Tobias and Popa, Raluca Ada}, + journal={IACR Cryptology ePrint Archive}, + volume={2016}, + pages={591}, + year={2016} +} + +@inproceedings{popescu04turtle, + author="B. Popescu and B. Crispo and A. Tanenbaum", + title="Safe and Private Data Sharing with {Turtle}: + Friends Team-Up and Beat the System", + booktitle="\bibconf[12th]{SPW}{Cambridge Workshop on Security Protocols}", + year=2004 +} + +@inproceedings{ porter09operating, + author = {Donald E. Porter and Owen S. Hofmann and + Christopher J. Rossbach and Alexander Benn and Emmett Witchel}, + title = {Operating System Transactions}, + booktitle = {\bibconf[22nd]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + month = oct, + year = 2009, + location = {Big Sky, MT}, +} + +@inproceedings{potharaju13network, + author = {Rahul Potharaju and + Navendu Jain}, + title = {When the Network Crumbles: An Empirical Study + of Cloud Network Failures and their Impact + on Services}, + booktitle = {\bibconf[4th]{SoCC}{ACM Symposium on Cloud Computing}}, + location = {Santa Clara, CA}, + month = oct, + year = 2013 +} + +@inproceedings{ potlapally06satisfiability, + author = {Nachiketh R. Potlapally and Anand Raghunathan and + Srivaths Ravi and Niraj K. Jha and Ruby B. Lee}, + title = {Satisfiability-based Framework for Enabling + Side-channel Attacks on Cryptographic Software}, + booktitle = {\bibconf{DATE}{Design, Automation, and Test in Europe}}, + month = mar, + year = 2006, + location = {Munich, Germany}, +} + +@inproceedings{ pouwelse06tribler, + author = {J.A. Pouwelse and others}, + title = {Tribler: A Social-Based Peer-to-Peer System}, + booktitle = {\bibconf[5th]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + year = 2006, + month = feb, +} + +@inproceedings{prasad04effects, + author = {Ravi Prasad and Manish Jain and Constantinos Dovrolis}, + title = {Effects of Interrupt Coalescence on Network Measurements}, + booktitle = {Workshop on Passive and Active Measurements (PAM)}, + year = {2004} +} + +@inproceedings{ prasad07queueing, + author = {Ravi Prasad and others}, + title = {Queuing Delays in Randomized Load Balanced Networks}, + booktitle = {INFOCOMM}, + year = 2007, + month = may +} + +@inproceedings{ provos03improving, + author = {Niels Provos}, + title = {Improving Host Security with System Call Policies}, + booktitle = {12th USENIX Security Symposium}, + month = aug, + year = 2003, +} + +@article{pugh90skip, + author = {William Pugh}, + title = {Skip lists: a probabilistic alternative to balanced trees}, + journal = {Communications of the ACM}, + volume = {33}, + number = {6}, + year = {1990}, + pages = {668--676}, + publisher = {ACM Press}, +} + +@inproceedings{ quinlan02venti, + author = {S. Quinlan and S. Dorward}, + title = {{Venti}: a new approach to archival storage}, + booktitle = {\bibconf[1st]{FAST}{USENIX Conference on + File and Storage Technologies}}, + location = {Monterey, CA}, + year = {2002}, +} + +%R + +@inproceedings{ raffetseder07detecting, + author = {Thomas Raffetseder and Christopher Kruegel and Engin Kirda}, + title = {Detecting System Emulators}, + booktitle = {10th Information Security Conference}, + month = oct, + year = 2007, + location = {Valparaiso, Chile}, +} + +@inproceedings{ raghavendra08power, + author = {Raghavendra, Ramya and Ranganathan, Parthasarathy and + Talwar, Vanish and Wang, Zhikui and Zhu, Xiaoyun}, + title = {No ``power'' struggles: coordinated multi-level + power management for the data center}, + booktitle = {\bibconf[13th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + year = {2008}, + isbn = {978-1-59593-958-6}, + location = {Seattle, WA, USA}, + pages = {48--59}, + numpages = {12}, + url = {http://doi.acm.org/10.1145/1346281.1346289}, + doi = {10.1145/1346281.1346289}, + acmid = {1346289}, +} + +@techreport{ raiciu09practical, + author = {Costin Raiciu and Damon Wischik and Mark Handley}, + title = {Practical Congestion Control for + Multipath Transport Protocols}, + institution = {University College London}, +} + +@inproceedings{ raju99new, + author = {Jyoti Raju and J.J. Garcia-Luna-Aceves}, + title = {A New Approach to On-demand Loop-Free Multipath Routing}, + booktitle = {\bibconf[8th]{ICCCN}{International Conference on + Computer Communications and Networks}}, + month = oct, + year = 1999, + location = {Boston, MA}, +} + +@inproceedings{ramamoorthy77fault, + author = {Chittoor V. Ramamoorthy and + Gary S. Ho and + Yih-Wu Han}, + title = {Fault tree analysis of computer systems}, + booktitle = {AFIPS National Computer Conference}, + year = 1977 +} + +@inproceedings{ raman00universal, + author = {Bhaskaran Raman and Randy H. Katz and Anthony D. Joseph}, + title = {{Universal Inbox}: + Providing Extensible Personal Mobility and Service Mobility in + an Integrated Communication Network}, + booktitle = {\bibconf[3rd]{WMCSA}{IEEE Workshop on + Mobile Computing Systems and Applications}}, + year = 2000, + month = dec, + location = {Monterey, CA}, +} + +@inproceedings{ ramasubramanian04design, + author = {Venugopalan Ramasubramanian and Emin G\"un Sirer}, + title = "The design and implementation of a next generation name service + for the {Internet}", + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + year = 2004, + month = aug, +} + +@inproceedings{ ramasubramanian09cimbiosys, + author = {Venugopalan Ramasubramanian and Thomas L. Rodeheffer and + Douglas B. Terry and Meg Walraed-Sullivan and + Ted Wobber and Catherine C. Marshall and Amin Vahdat}, + title = {Cimbiosys: A Platform for Content-based Partial Replication}, + booktitle = {\bibconf[6th]{NSDI}{USENIX Symposium + on Networked Systems Design and Implementation}}, + month = apr, + year = 2009, + location = {Boston, MA}, +} + +@inproceedings{ rangarajan99eruf, + author = {Anand Rangarajan and Anurag Acharya}, + title = {{ERUF}: Early Regulation of Unresponsive Best-Effort Traffic}, + booktitle = {\bibconf[7th]{ICNP}{International Conference on + Network Protocols}}, + month = oct, + year = 1999, + location = {Toronto, Canada}, +} + +@inproceedings{ranger07mapreduce, + author={Ranger, C. and Raghuraman, R. and Penmetsa, A. and Bradski, G. and + Kozyrakis, C.}, + booktitle={\bibconf[13th]{HPCA}{IEEE International Symposium + on High Performance Computer Architecture}}, + title={Evaluating {M}ap{R}educe for Multi-core and Multiprocessor Systems}, + year={2007}, + month=feb, + pages={13 -- 24}, +} + +@inproceedings{ rashid81accent, + author = {Richard F. Rashid and George G. Robertson}, + title = {Accent: A Communication Oriented Network + Operating System Kernel}, + booktitle = {\bibconf[5th]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + month = dec, + year = 1981, + location = {Pacific Grove, CA}, +} + +@inproceedings{ ratnasamy01scalable, + author = {Sylvia Ratnasamy and Paul Francis and Mark Handley + and Richard Karp and Scott Shenker}, + title = {A Scalable Content-Addressable Network}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2001, + location = {San Diego, CA}, +} + +@inproceedings{ ratnasamy05towards, + author = {Sylvia Ratnasamy and Scott Shenker and Steven McCanne}, + title = {Towards an Evolvable Internet Architecture}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2005, + location = {Philadelphia, PA}, +} + +@inproceedings{ ravichandran10collaborative, + author = {Kaushik Ravichandran and Romain Cledat and Santosh Pande}, + title = {Collaborative Threads: Exposing and Leveraging Dynamic Thread + State for Efficient Computation}, + booktitle = {\bibconf{HotPar '11}{2nd USENIX Workshop on Hot Topics in + Parallelism (HotPar '10)}}, + month = jun, + year = 2010, +} + +@article{ raynal92about, + author = {Michel Raynal}, + title = {About logical clocks for distributed systems}, + journal = {ACM SIGOPS Operating Systems Review}, + volume = 26, + number = 1, + month = jan, + year = 1992, +} + +@article{ reavis99trends, + author = {Jim Reavis}, + title = {Trends in government encryption policies}, + journal = {NetworkWorldFusion}, + month = aug, + day = 18, + year = 1999, + url = {http://www.networkworld.com/newsletters/sec/0816sec2.html}, +} + +@inproceedings{ reed10differential, + author = {Jason Reed and Adam J. Aviv and Daniel Wagner and + Andreas Haeberlen and Benjamin C. Pierce and + Jonathan M. Smith}, + title = {Differential Privacy for Collaborative Security}, + booktitle = {European Workshop on System Security (EuroSec '10)}, + location = {Paris, France}, + month = apr, + year = 2010, +} + +@inproceedings{ reiher94resolving, + author = "Peter Reiher and John Heidemann and David Ratner and + Greg Skinner and Gerald Popek", + title = "Resolving File Conflicts in the Ficus File System", + booktitle = "{USENIX} Summer", + pages = "183-195", + year = "1994", + url = "citeseer.ist.psu.edu/reiher94resolving.html" +} + +@article{ renesse15paxos, + author = {Robbert Van Renesse and Deniz Altinbuken}, + title = {{Paxos} Made Moderately Complex}, + journal = {ACM Computing Surveys (CSUR)}, + volume = 47, + number = 3, + month = apr, + year = 2015, +} + +@incollection {reppy93cml, + author = {Reppy, John}, + title = {Concurrent ML: Design, application and semantics}, + booktitle = {Functional Programming, Concurrency, Simulation and + Automated Reasoning}, + editor = {Lauer, Peter}, + publisher = {Springer}, + location = { Berlin / Heidelberg }, + pages = {165--198}, + volume = {693}, + year = {1993} +} + +@article{ richtel08smaller, + author = {Matt Richtel}, + title = {Smaller {PCs} Cause Worry for Industry}, + booktitle = {The New York Times}, + month = jul, + day = 21, + year = 2008, +} + +@inproceedings{ riedel98active, + author = {Erik Riedel and Garth Gibson and Christos Faloutsos}, + title = {Active Storage For Large-Scale Data Mining and Multimedia}, + booktitle = {Very Large Databases (VLDB)}, + location = {New York, NY}, + month = aug, + year = 1998, +} + +@inproceedings{ristenpart09cloud, + author = {Thomas Ristenpart and Eran Tromer and Hovav Shacham + and Stefan Savage}, + title = + {\href{https://css.csail.mit.edu/6.858/2011/readings/get-off-my-cloud.pdf}{Hey, + You, Get Off of My Cloud: Exploring Information Leakage + in Third-Party Compute Clouds}}, + booktitle = {\bibconf[16th]{CCS}{ACM Conference on + Computer and Communications Security}}, + year = {2009}, + pages = {199--212} +} + +@misc{ riverbed08rios, + author = {{Riverbed Technology, Inc.}}, + title = {The {Riverbed} Optimization System {(RiOS)} 5.5: + A Technical Overview}, + year = 2008, + note = {\url{http://www.riverbed.com/docs/TechOverview-Riverbed-RiOS_5.5.pdf}}, +} + +@misc{ rivest96sdsi, + author = "R.L. Rivest and B. Lampson", + title = {\href{http://theory.lcs.mit.edu/~cis/sdsi.html}{SDSI: A Simple + Distributed Security Infrastructure}}, + month = apr, + year = "1996", +} + +@inproceedings{ roberts70computer, + author = "Lawrence G. Roberts and Barry D. Wessler", + title = "Computer Network Development to Achieve Resource Sharing", + booktitle = "Spring Joint Computer Conference", + location = "Atlantic City, New Jersey", + month = may, + year = "1970", +} + +@inproceedings{ roberts03next, + author = {Lawrence G. Roberts}, + title = {The Next Generation of {IP} --- Flow Routing}, + booktitle = {\bibconf{SSGRR}{International Conference on Advances + in Infrastructure for Electronic Business, Science, + Education, Medicine, and Mobile Technologies + on the Internet}}, + location = {L'Aquila, Italy}, + month = jul, + year = 2003, +} + +@article{ roberts04internet, + author = {J. W. Roberts}, + title = {Internet Traffic, {QoS} and Pricing}, + journal = {Proceedings of the IEEE}, + volume = 92, + number = 9, + month = sep, + year = 2004, + pages = {1389- 1399}, +} + +@misc{ roberts08does, + author = {Lawrence G. Roberts}, + title = {Does {TCP} Need an Overhaul?}, + month = apr, + day = 3, + year = 2008, + note = {\url{http://www.internetevolution.com/author.asp?section_id=499}}, +} + +@inproceedings{rodrigues07large, + title={\href{https://www.net.t-labs.tu-berlin.de/papers/RKB-LBFTSNAL-07.pdf}{Large-scale Byzantine fault tolerance: Safe but not always live}}, + author={Rodrigues, Rodrigo and Kouznetsov, Petr and Bhattacharjee, Bobby}, + booktitle={Proceedings of the 3rd Workshop on Hot Topics in System Dependability}, + year={2007} +} + +@article{ roseman96building, + author = "Mark Roseman and Saul Greenberg", + title = "Building real-time groupware with {GroupKit}, a groupware toolkit", + journal = "ACM Transactions on Computer-Human Interaction", + volume = "3", + number = "1", + pages = "66--106", + year = "1996", + month = mar, + url = "citeseer.ist.psu.edu/roseman96building.html" +} + +@inproceedings{ roseman96teamrooms, + author = "Mark Roseman and Saul Greenberg", + title = "TeamRooms: Network Places for Collaboration", + booktitle = "Computer Supported Cooperative Work", + publisher = "ACM Press", + pages = "325-333", + year = "1996", + month = nov, + url = "citeseer.ist.psu.edu/roseman96teamroom.html" +} + +@article{ rosenblum97simos, + author = {Mendel Rosenblum and Edouard Bugnion and Scott Devine + and Stephen A. Herrod}, + title = {Using the {SimOS} Machine Simulator + to Study Complex Computer Systems}, + journal = {Modeling and Computer Simulation}, + year = 1997, + volume = 7, + number = 1, + pages = {78-103}, +} + +@article{ rosenthal05transparent, + author = {David S. H. Rosenthal and Thomas Lipkis and + Thomas S. Robertson and Seth Morabito}, + title = {Transparent Format Migration of Preserved Web Content}, + journal = {D-Lib Magazine}, + volume = {11}, + number = {1}, + month = jan, + year = 2005, + issn = {1082-9873}, + url = {http://www.dlib.org/dlib/january05/rosenthal/01rosenthal.html}, +} + +@article{ rothenberg95ensuring, + author = {Jeff Rothenberg}, + title = {Ensuring the Longevity of Digital Documents}, + journal = {Scientific American}, + month = jan, + year = 1995, + volume = 272, + number = 1, + pages = {24-29}, +} + +@inproceedings{ rowstron01past, + author = {Antony Rowstron and Peter Druschel}, + title = {\href{https://dl.acm.org/citation.cfm?id=502053}{Storage management and caching in PAST, + a large-scale, persistent peer-to-peer storage utility}}, + booktitle = {\bibconf[18th]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + location = {Banff, Canada}, + month = oct, + year = {2001}, +} + +@inproceedings{ rowstron01pastry, + author = "A. Rowstron and P. Druschel", + title = "Pastry: Scalable, distributed object location and routing + for large-scale peer-to-peer systems", + booktitle = "\bibconf{Middleware}{International Conference on + Distributed Systems Platforms}", + year = "2001" +} + +@article{ royer99review, + author = "E. Royer and C. Toh", + title = "A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks", + journal = "IEEE Personal Communications", + month = apr, + year = "1999", + url = "citeseer.nj.nec.com/royer99review.html" +} + +@inproceedings{ ruget94cheaper, + author = {Fr\'{e}d\'{e}ric Ruget}, + title = {\href{https://pdfs.semanticscholar.org/e060/433cd977fc11c29919bb01bc7c8b9500a144.pdf}{Cheaper matrix clocks}}, + booktitle = {International Workshop on Distributed Algorithms (WDAG)}, + month = sep, + year = 1994, + pages = {355-369}, +} + +@article{ ryu03advances, + author = {Seungwan Ryu and Christopher Rump and Chunming Qiao}, + title = {Advances in {Internet} Congestion Control}, + journal = {IEEE Communications Surveys}, + volume =5, + number = 1, + year = 2003, +} + +%S + +@book{saaty88analytic, + title={What is the analytic hierarchy process?}, + author={Saaty, Thomas L}, + year={1988}, + publisher={Springer} +} + +@inproceedings{ sadowski09singletrack, + author = {Caitlin Sadowski and Stephen N. Freund and Cormac Flanagan}, + title = {{SingleTrack}: A Dynamic Determinism Checker + for Multithreaded Programs}, + booktitle = {\bibconf[18th]{ESOP}{European Symposium on Programming}}, + month = mar, + year = 2009, + location = {York, United Kingdom}, +} + +@inproceedings{ salmon09perspective, + author = {Brandon Salmon and Steven W. Schlosser and + Lorrie Faith Cranor and Gregory R. Ganger}, + title = {Perspective: Semantic data management for the home}, + booktitle = {\bibconf[7th]{USENIX FAST}{USENIX Conference on + File and Storage Technologies}}, + month = feb, + year = 2009, + location = {San Francisco, CA}, +} + +@inproceedings{ saltz03tesla, + author = "Jon Salz and Alex C. Snoeren and Hari Balakrishnan", + title = "{TESLA: A Transparent, Extensible Session-Layer Architecture for End-to-End Network Services}", + booktitle = "4th Usenix Symposium on Internet Technologies and Systems", + location = "Seattle, Washington", + month = mar, + year = "2003", +} + +% same as rfc1498? +@incollection{ saltzer82naming, + author = {J. Saltzer}, + title = {On the Naming and Binding of Network Destinations}, + editor = {P. {Ravasio et al.}}, + booktitle = {Local Computer Networks}, + publisher = {North-Holland}, + address = {Amsterdam}, + pages = {311--317}, + year = {1982}, + note = {RFC 1498}, +} + +@article{ saltzer84endtoend, + author = {J. H. Saltzer and D. P. Reed and D. D. Clark}, + title = {End-To-End Arguments in System Design}, + journal = {\bibbrev{TOCS}{Transactions on Computer Systems}}, + volume = 2, + number = 4, + month = nov, + year = 1984, + pages = {277-288}, +} + +@inproceedings{santhanam05sandbox, + title = {Deploying Virtual Machines as Sandboxes for the Grid}, + author = {Sriya Santhanam and Pradheep Elango and Andrea Arpaci Dusseau and +Miron Livny}, + booktitle = {WORLDS}, + year = {2005}, + howpublished = "\url{http://www.cs.wisc.edu/~pradheep/SandboxingWorlds05.pdf}" +} + +@article{ santoro85labelling, + author = {Nicola Santoro and Ramez Khatib}, + title = {Labelling and Implicit Routing in Networks}, + journal = {Computer Journal}, + volume = 28, + number = 1, + pages = {5-8}, + year = 1985, +} + +@inproceedings{ santos09trusted, + author = {Nuno Santos and Krishna P. Gummadi and Rodrigo Rodrigues}, + title = {Towards Trusted Cloud Computing}, + booktitle = {\bibconf[1st]{HotCloud}{USENIX Workshop on + Hot Topics in Cloud Computing}}, + month = jun, + year = 2009, + location = {San Diego, CA}, +} + + +@inproceedings{santos12policy, + title = {Policy-Sealed Data: {A} New Abstraction for Building + Trusted Cloud Services}, + author = {Santos, Nuno and + Rodrigues, Rodrigo and + Gummadi, Krishna P and + Saroiu, Stefan}, + booktitle = {\bibconf[21st]{USENIX Security}{USECIX Security Symposium}}, + location = {Bellevue, WA}, + month = aug, + year = 2012 +} + + +@inproceedings{ santry99elephant, + author = {Douglas S. Santry and Michael J. Feeley and + Norman C. Hutchinson and Alistair C. Veitch and + Ross W. Carton and Jacob Ofir}, + title = {Deciding when to forget in the {Elephant} file system}, + booktitle = {\bibconf[17th]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + month = dec, + year = 1999, + location = {Charleston, SC}, +} + +@article{ sarin87discarding, + author = {Sunil K. Sarin and Nancy A. Lynch}, + title = {Discarding Obsolete Information in a + Replicated Database System}, + journal = {IEEE Transactions on Software Engineering}, + volume = {SE-13}, + number = 1, + month = jan, + year = 1987, +} + +@inproceedings{ saroiu02measurement, + author = "Stefan Saroiu and P. Krishna Gummadi and Steven D. Gribble", + title = "A Measurement Study of Peer-to-Peer File Sharing Systems", + booktitle = "Multimedia Computing and Networking (MMCN) 2002", + location = "San Jose, CA, USA", + month = jan, + year = 2002, +} + +@article{ sathaye99boa, + author = "S. Sathaye and P. Ledak and J. LeBlanc and S. Kosonocky and + M. Gschwind and J. Fritts and Z. Filan and A. Bright and + D. Appenzeller and E. Altman and C. Agricola", + title = "{BOA}: Targeting MultiGigahertz with Binary Translation", + journal = "IEEE TCCA Newsletter", + year = 1999, + month = "Fall", + pages = "2--11", + url = "citeseer.ist.psu.edu/sathaye99boa.html" +} + +@inproceedings{ savage99endtoend, + author = {Stefan Savage and Andy Collins and Eric Hoffman and + John Snell and Thomas Anderson}, + title = {The End-to-End Effects of Internet Path Selection}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1999, + location = {Cambridge, MA}, +} + +@article{ savage99tcp, + author = {Stefan Savage and Neal Cardwell and David Wetherall + and Tom Anderson}, + title = {{TCP} Congestion Control with a Misbehaving Receiver}, + journal = {Computer Communications Review}, + volume = 29, + number = 5, + month = oct, + year = 1999, +} + +@inproceedings{ scharf06headofline, + author = {Michael Scharf and Sebastian Kiesel}, + title = {Head-of-line Blocking in {TCP} and {SCTP}: + Analysis and Measurements}, + booktitle = {IEEE GLOBECOM}, + month = nov, + year = 2006, + location = {San Francisco, CA}, +} + +@inproceedings{scheurich87cache, + author = {Scheurich, C. and Dubois, M.}, + title = {Correct memory operation of cache-based multiprocessors}, + booktitle = {Proceedings of the 14th annual international symposium on + Computer architecture}, + year = 1987, + pages = {234--243}, +} + +@misc{ schoen07detecting, + author = {Seth Schoen}, + title = {Detecting Packet Injection: + A Guide to Observing Packet Spoofing by {ISPs}}, + howpublished = {Electronic Frontier Foundation whitepaper}, + month = nov, + year = 2007, + url = {http://www.eff.org/wp/detecting-packet-injection}, +} + +@article{schneider90implementing, + author = {Fred B. Schneider}, + title = {Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial}, + journal = {{ACM} Computing Surveys}, + volume = {22}, + number = {4}, + pages = {299--319}, + month = dec, + year = {1990}, + url = {http://doi.acm.org/10.1145/98163.98167}, + doi = {10.1145/98163.98167}, + timestamp = {Mon, 05 Dec 2011 18:03:13 +0100}, + biburl = {https://dblp.org/rec/bib/journals/csur/Schneider90}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@article{ schroeder91autonet, + author = {Michael D. Schroeder and others}, + title = {Autonet: a high-speed, self-configuring local area network + using point-to-point links}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 9, + number = 8, + month = oct, + year = 1991, + pages = {1318-1335}, +} + +% schulte94hardware is apparently the journal equivalent +@inproceedings{ schulte93exact, + author = {Michael Schulte and Earl Swartzlander}, + title = {Exact Rounding of Certain Elementary Functions}, + booktitle = {11th IEEE Symposium on Computer Arithmetic}, + location = {Windsor, Canada}, + month = jun, + year= 1993, + pages = {138-145}, +} + +@article{ schulte94hardware, + author = {M.J. Schulte and E.E. Swartzlander}, + title = {Hardware designs for exactly rounded elementary functions}, + journal = {IEEE Transactions on Computers}, + volume = 43, + number = 8, + pages = {964-973}, + month = aug, + year = 1994, +} + +@misc{ schwartz80burroughs, + author = {Jacob T. Schwartz}, + title = {The Burroughs {FMP} Machine}, + month = jan, + year = 1980, + note = {Ultracomputer Note \#5}, +} + +@inproceedings{schwarzkopf12seven, + author = {Malte Schwarzkopf and + Derek G. Murray and + Steven Hand}, + title = {The Seven Deadly Sins of Cloud Computing Research}, + booktitle = {\bibconf[4th]{HotCloud}{USENIX Workshop on + Hot Topics in Cloud Computing}}, + month = jun, + year = 2012, + location = {Boston, MA} +} + +@mastersthesis{ scofield07hopbyhop, + author = {Dan Scofield}, + title = {Hop-by-hop Transport Control for Multi-Hop Wireless Networks}, + school = {Brigham Young University}, + month = apr, + year = 2007, +} + +@inproceedings{ scott04overhead, + author = {K. Scott and others}, + title = {Overhead reduction techniques for + software dynamic translation}, + booktitle = {NSF Workshop on Next Generation Software}, + month = apr, + year = 2004, +} + +@inproceedings{ scott11toward, + author = {Michael L. Scott and Li Lu}, + title = {Toward a Formal Semantic Framework for + Deterministic Parallel Programming}, + booktitle = {\bibconf[2nd]{WoDet}{Workshop on Determinism + and Correctness in Parallel Programming}}, + month = mar, + day = 6, + year = 2011, + location = {Newport Beach, CA}, +} + +@inproceedings{ seshan97spand, + author = "Srinivasan Seshan and Mark Stemm and Randy Katz", + title = {SPAND: Shared Passive Network Performance Discovery}, + booktitle = {\bibconf{USITS}{USENIX Symposium on Internet Technologies + and Systems}}, + year = 1997 +} + +@inproceedings{ seward05valgrind, + author = {Julian Seward and Nicholas Nethercote}, + title = {Using {Valgrind} to detect undefined value errors + with bit-precision}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + location = {Anaheim, CA}, + month = apr, + year = 2005, +} + +@misc{ seward11valgrind, + author = {Julian Seward and others}, + title = {Valgrind}, + howpublished = {\url{http://valgrind.org/}}, + year = {2003 -- 2011}, +} + +@article{sezgin05sequential, + author = "Ali Sezgin and Ganesh Gopalakrishnan", + title = "On the definition of sequential consistency", + journal = "Information Processing Letters", + volume = "96", + number = "6", + pages = "193 -- 196", + year = "2005", +} + + +@inproceedings{ shah07auditing, + author = {Mehul A. Shah + and Mary Baker + and Jeffrey C. Mogul + and Ram Swaminathan}, + title = {Auditing to Keep Online Storage Services Honest}, + booktitle = {\bibconf[11th]{HotOS}{Workshop on Hot Topics + in Operating Systems}}, + month = may, + year = 2007, + location = {San Diego, CA}, +} + + +@inproceedings{sharma11cost, + title = {A Cost-Aware Elasticity Provisioning System for the Cloud}, + author = {Sharma, Upendra + and Shenoy, Prashant + and Sahu, Sambit + and Shaikh, Anees}, + booktitle= {\bibconf[31st]{ICDCS}{International Conference on + Distributed Computing Systems}}, + location = {Minneapolis, MN}, + month = jun, + year = 2011 +} + +@article{ shavit97software, + author = {Nir Shavit and Dan Touitou}, + title = {Software Transactional Memory}, + journal = {Distributed Computing}, + volume = 10, + number = 2, + month = feb, + year = 1997, + pages = {99-116}, +} + +@misc{ shenker93scheduling, + author = "S. Shenker and D. Clark and L. Zhang", + title = "A Scheduling Service Model and a Scheduling Architecture + for an Integrated Services Packet Network preprint", + text = "S. Shenker, D. Clark, and L. Zhang. A Scheduling Service Model and a Scheduling + Architecture for an Integrated Services Packet Network", + year = "1993", + url = "citeseer.ist.psu.edu/article/shenker93scheduling.html" +} + +@article{ shenker94making, + author = {Scott Shenker}, + title = {Making Greed Work in Networks: + A Game-Theoretic Analysis of Switch Service Disciplines}, + journal = {Computer Communications Review}, + volume = 24, + number = 4, + month = oct, + year = 1994, + pages = {47-57}, +} + +@inproceedings{shieh10seawall, + author = {Shieh, Alan and Kandula, Srikanth and Greenberg, Albert and Kim, Changhoon}, + title = {Seawall: Performance Isolation for Cloud Datacenter Networks}, + booktitle={\bibconf[2nd]{HotCloud}{USENIX Workshop on + Hot Topics in Cloud Computing}}, + year = {2010}, +} + +@article{ shirky00inpraise, + author = "Clay Shirky", + title = "In Praise of Freeloaders", + journal = "openp2p.com", + publisher = "O'Reilly", + month = dec, + year = "2000", +} + +@inproceedings{ shoch78internetwork, + author = {John F. Shoch}, + title = {Inter-Network Naming, Addressing, and Routing}, + booktitle = {IEEE COMPCON Fall}, + year = 1978, + pages = {72-79}, +} + +@book{ sidhu90inside, + author = {Gursharan S. Sidhu and Richard F. Andrews + and Alan B. Oppenheimer}, + title = {Inside {Appletalk}}, + publisher = {Addison-Wesley}, + year = 1990, + pages = {600}, + edition = {2rd}, + isbn = {0-201-55021-0}, +} + +@misc{ silverpeak09overview, + author = {{Silver Peak Systems, Inc.}}, + title = {An Overview of {Silver Peak's} {WAN} Acceleration Technology}, + year = 2009, + note = {\url{http://www.silver-peak.com/assets/download/pdf/wp_SilverPeak_Technology_Overview.pdf}}, +} + +@misc{ simulink12, + author = {The MathWorks}, + title = {Simulink}, + url = {http://www.mathworks.com/products/simulink} +} + +@article{ sinha02wtcp, + author = {Prasun Sinha and others}, + title = {{WTCP}: A Reliable Transport Protocol + for Wireless Wide-Area Networks}, + journal = {Wireless Networks}, + volume = 8, + number = 2, + month = mar, + year = 2002, + pages = {301-316}, +} + +@inproceedings{ sit02security, + author = {Emil Sit and Robert Morris}, + title = {Security Considerations for Peer-to-Peer + Distributed Hash Tables}, + booktitle = {\bibconf[1st]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + month = mar, + year = 2002, + location = {Cambridge, MA}, +} + +@article{ sites92alpha, + author = {Richard L. Sites}, + title = {{Alpha AXP} Architecture}, + journal = {Digital Technical Journal}, + volume = 4, + number = 4, + year = 1992, +} + +@article{sites93binary, + author = {Richard L. Sites and Anton Chernoff and Matthew B. Kirk + and Maurice P. Marks and Scott G. Robinson}, + title = {Binary translation}, + journal = {Communications of the ACM}, + volume = {36}, + number = {2}, + year = {1993}, + issn = {0001-0782}, + pages = {69--81}, + doi = {http://doi.acm.org/10.1145/151220.151227}, + publisher = {ACM Press}, +} + +@inproceedings{ sivakumar00psockets, + author = {H. Sivakumar and S. Bailey and R.L. Grossman}, + title = {{PSockets}: The Case for Application-level Network Striping + for Data Intensive Applications + using High Speed Wide Area Networks}, + booktitle = {\bibconf{SC}{Conference on High Performance + Networking and Computing}}, + month = nov, + year = 2000, + location = {Dallas, TX}, +}, + +@article{ siw08top, + author = {{SecurityInfoWatch.com}}, + title = {Top computer security risks for healthcare}, + month = mar, + day = 21, + year = 2008, + url = {http://www.securityinfowatch.com/article/article.jsp?id=14710}, +} + +@book{ skillicorn05foundations, + author = {David Skillicorn}, + title = {Foundations of Parallel Programming}, + year = 2005, + publisher = {Cambridge University Press} +} + +@inproceedings{ small96comparison, + author = {Christopher Small and Margo Seltzer}, + title = {A Comparison of {OS} Extension Technologies}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + location = {San Diego, CA}, + month = jan, + year = 1996, +} + +@article{ small98misfit, + author = {Christopher Small and Margo Seltzer}, + title = {{MiSFIT}: {C}onstructing Safe Extensible Systems}, + journal = {{IEEE} Concurrency}, + volume = 6, + number = 3, + year = 1998, + pages = {34--41}, +} + +@inproceedings{ snoeren99adaptive, + author = {Alex C. Snoeren}, + title = {Adaptive Inverse Multiplexing for Wide-Area Wireless Networks}, + booktitle = {IEEE Globecom}, + year = 1999, + month = dec +} + +@inproceedings{ snoeren00endtoend, + author = "Alex C. Snoeren and Hari Balakrishnan", + title = "An End-to-End Approach to Host Mobility", + booktitle = "\bibconf[6th]{MOBICOM}{ACM/IEEE International Conference on + Mobile Computing and Networking}", + month = aug, + year = "2000", +} + +@inproceedings{ snoeren01reconsidering, + author = "Alex C. Snoeren and Hari Balakrishnan and M. Frans Kaashoek", + title = "Reconsidering {Internet} Mobility", + booktitle = "\bibconf[8th]{HotOS}{Workshop on + Hot Topics in Operating Systems}", + month = may, + year = "2001", + url = "http://nms.lcs.mit.edu/papers/migrate-hotOS.html", +} + +@inproceedings{ soltesz07container, + author = {Stephen Soltesz and Herbert P\"otzl and Marc E. Fiuczynski + and Andy Bavier and Larry Peterson}, + title = {Container-based Operating System Virtualization: + A Scalable, High-performance Alternative to Hypervisors}, + booktitle = {EuroSys}, + month = mar, + year = 2007, + location = {Lisbon, Portugal}, +} + +% XXX this bib entry is pretty incomplete +@inproceedings{ song01timing, + author = {D. Song and D. Wagner and X. Tian}, + title = {Timing analysis of keystrokes and {SSH} timing attacks}, + booktitle = {{USENIX} Security Symposium}, + year = 2001, +} + +@book{sorensen48method, + title = {A Method of Establishing Groups of Equal Amplitude in Plant + Sociology Based on Similarity of Species Content and Its + Application to Analyses of the Vegetation on {D}anish Commons}, + author = {S{\o}rensen, T.}, + lccn = {a49002195}, + url={http://books.google.co.in/books?id=rpS8GAAACAAJ}, + year={1948}, + publisher={I kommission hos E. Munksgaard} +} + +@inproceedings{ srinavasan04flashback, + author = {Sudarshan Srinivasan and Srikanth Kandula and + Christopher Andrews and Yuanyuan Zhou}, + title = {Flashback: a lightweight extension for rollback and deterministic replay + for software debugging}, + booktitle = {USENIX Annual Technical Conference}, + month = jun, + year = 2004, + location = {Boston, MA}, +} + +@inproceedings{ srivatsa04vulnerabilities, + author = {Mudhakar Srivatsa and Ling Liu}, + title = {Vulnerabilities and Security Threats in Structured + Peer-to-Peer Systems: A Quantitative Analysis}, + booktitle = {20th \bibconf{ACSAC}{Annual Computer Security + Applications Conference}}, + month = dec, + year = 2004, + location = {Tucson, AZ}, +} + +@inproceedings{ stajano99resurrecting, + author = {Frank Stajano and Ross Anderson}, + title = {The Resurrecting Duckling: + Security Issues for Ad-hoc Wireless Networks}, + booktitle = {7th International Workshop on Security Protocols}, + location = {Cambridge, UK}, + month = apr, + year = 1999, +} + +@article{stancevic03zero, + title={Zero copy I: user-mode perspective}, + author={Stancevic, Dragan}, + journal={Linux Journal}, + volume={2003}, + number={105}, + pages={3}, + year={2003}, + publisher={Belltown Media} +} + +@inproceedings{ stanojevic08can, + author = {Milan Stanojevic and Ratul Mahajan and Todd Millstein + and Madanlal Musuvathi}, + title = {Can You Fool Me? + Towards Automatically Checking Protocol Gullibility}, + booktitle = {\bibconf[7th]{HotNets}{Workshop + on Hot Topics in Networks}}, + location = {Calgary, Alberta, Canada}, + month = oct, + day = 6, + year = 2008, +} + +@inproceedings{ stark87semantics, + author = {Stark, E. W.}, + title = {Concurrent transition system semantics of process networks}, + booktitle = {\bibconf[14th]{POPL}{{ACM SIGACT-SIGPLAN} + symposium on Principles of programming languages}}, + location = {Munich, West Germany}, + month = jan, + year = 1987, + pages = {199-210}, +} + +@inproceedings{ stein99sbox, + author = {Lincoln D. Stein}, + title = {{SBOX}: Put {CGI} Scripts in a Box}, + booktitle = {USENIX}, + month = jun, + year = 1999, +} + +@inproceedings{ stoica98core, + author = {Ion Stoica and Scott Shenker and Hui Zhang}, + title = {Core-Stateless Fair Queueing: A Scalable Architecture to + Approximate Fair Bandwidth Allocations in High Speed Networks}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1998, + location = {Vancouver, BC, Canada}, +} + +@inproceedings{stoica01chord, + author = {Ion Stoica and + Robert Tappan Morris and + David R. Karger and + M. Frans Kaashoek and + Hari Balakrishnan}, + title = {\href{https://dl.acm.org/citation.cfm?id=383071}{Chord: {A} scalable peer-to-peer lookup service for internet applications}}, + booktitle = {{SIGCOMM}}, + pages = {149--160}, + year = {2001}, + url = {http://doi.acm.org/10.1145/383059.383071}, + doi = {10.1145/383059.383071}, + timestamp = {Tue, 24 Oct 2017 18:34:07 +0200}, + biburl = {https://dblp.org/rec/bib/conf/sigcomm/StoicaMKKB01}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{ stoica02internet, + author = "Ion Stoica and others", + title = "Internet Indirection Infrastructure", + booktitle = "\bibbrev{SIGCOMM}{ACM SIGCOMM}", + year = "2002", + month = aug, + date = {19-23}, + location = {Pittsburgh, PA} +} + +@article{ stone08whats, + author = {Brad Stone}, + title = {What's in a domain name? {Serious} money}, + journal = {International Herald Tribune}, + month = jan, + day = 31, + year = 2008, +} + +@inproceedings{ strauss10eyo, + author = {Jacob Strauss and Justin Mazzola Paluska and + Chris Lesniewski-Laas and Bryan Ford and Robert Morris + and Frans Kaashoek}, + title = {Eyo: Device-Transparent Personal Storage}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2010, + location = {Boston, MA}, +} + +@book{ stroustrup97c++, + author = "Bjarne Stroustrup", + title = "The C++ Programming Language", + edition = "3rd", + publisher = "Addison-Wesley", + month = "June", + year = "1997", + isbn = "0201889544", +} + +@inproceedings{ subramanian04overqos, + author = {Lakshminarayanan Subramanian and Ion Stoica + and Hari Balakrishnan and Randy Katz}, + title = {{OverQoS}: An Overlay Based Architecture + for Enhancing {Internet} {QoS}}, + booktitle = {\bibconf[1st]{NSDI}{USENIX/ACM Symposium + on Networked Systems Design and Implementation}}, + location = "San Francisco, CA", + month = mar, + year = 2004, +} + +@inproceedings{ sugarman01virtualizing, + author = {Jeremy Sugerman and Ganesh Venkitachalam and Beng-Hong Lim}, + title = {Virtualizing {I/O} Devices + on {VMware Workstation}'s Hosted Virtual Machine Monitor}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + location = {Boston, MA}, + month = jun, + year = 2001, +} + +@inproceedings{ sundaresan03atp, + author = {K. Sundaresan and V. Anantharaman and H. Hsieh and R. Sivakumar}, + title = {{ATP}: A Reliable Transport Protocol for Ad-hoc Networks}, + booktitle = {\bibconf{MOBIHOC}{ACM International Symposium + on Mobile Ad Hoc Networking and Computing}}, + location = {Annapolis, MD}, + month = jun, + year = 2003, +} + +@article{ sunshine78connection, + author = {Carl A. Sunshine and Yogen K. Dalal}, + title = {Connection Management in Transport Protocols}, + journal = {Computer Networks}, + volume = {2}, + number = {6}, + pages = {454-473}, + month = dec, + year = 1978, +} + +@inproceedings{ swany04improving, + author = {Martin Swany}, + title = {Improving Throughput for Grid Applications + with Network Logistics}, + booktitle = {\bibconf{SC}{High Performance Computing, + Networking and Storage Conference}}, + month = nov, + year = 2004, + location = {Pittsburgh, PA}, +} + +@inproceedings{ swierk00roma, + author = {E. Swierk and E. K\i c\i man and V. Laviano + and M. Baker}, + title = {The {Roma} Personal Metadata Service}, + booktitle = {\bibconf[3rd]{WMCSA}{IEEE Workshop on + Mobile Computing Systems and Applications}}, + year = 2000, + month = dec, +} + +@inproceedings{ swift03improving, + author = {Michael M. Swift and Brian N. Bershad and Henry M. Levy}, + title = {Improving the reliability of commodity operating systems}, + booktitle = {\bibconf[19th]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + year = {2003}, + location = {Bolton Landing, NY, USA}, +} + +%T + +@inproceedings{ takeda02online, + author = {Toshiyuki Takeda and Daniel Suthers}, + title = {Online Workspaces for Annotation and Discussion of Documents}, + booktitle = {International Conference on Computers in Education}, + month = dec, + date = {3--6}, + year = 2002, + location = {Auckland, New Zealand}, +} + +@inproceedings{ tai08making, + author = {Chia-Hui Tai and Jiang Zhu and Nandita Dukkipati}, + title = {Making large scale deployment of {RCP} practical + for real networks}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = apr, + year = 2008, + location = {Phoenix, AZ}, +} + +@inproceedings{ tan06compound, + author = {Kun Tan and Jingmin Song and Qian Zhang and Murari Sridharan}, + title = {{Compound TCP}: A Scalable and {TCP}-Friendly + Congestion Control for High-speed Networks}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = apr, + year = 2006, + location = {Barcelona, Spain}, +} + +@inproceedings{ tang10trust, + author = {Shuo Tang and Haohui Mai and Samuel T. King}, + title = {Trust and Protection in the Illinois Browser Operating System}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + location = {Vancouver, BC, Canada}, + month = oct, + year = 2010, +} + +@inproceedings{ tang12cleanos, + author = {Tang, Yang and Ames, Phillip and Bhamidipati, Sravan and Bijlani, Ashish and Geambasu, Roxana and Sarda, Nikhil}, + title = {CleanOS: limiting mobile data exposure with idle eviction}, + booktitle = {\bibbrev{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}}, + month = oct, + year = {2012}, +} + +@inproceedings{ tardieu06scheduling, + author = {Olivier Tardieu and Stephen A. Edwards}, + title = {Scheduling-Independent Threads and Exceptions in {SHIM}}, + booktitle = {\bibconf[6th]{EMSOFT}{Conference on Embedded Software}}, + month = oct, + year = 2006, + pages = {142-151}, + location = {Seoul, Korea}, +} + +% see also mullender86design +@inproceedings{ tanenbaum86using, + author = {Andrew S. Tanenbaum and Sape J. Mullender + and Robbert van Renesse}, + title = {Using Sparse Capabilities in a Distributed Operating System}, + booktitle = {\bibconf[6th]{ICDCS}{International Conference on + Distributed Computing Systems}}, + month = may, + year = 1986, + location = {Cambridge, MA}, +} + +@inproceedings{ tolia06architecture, + author = {Niraj Tolia and Michael Kaminsky and David G. Andersen + and Swapnil Patil}, + title = {An Architecture for {I}nternet Data Transfer}, + booktitle = {\bibconf[3rd]{NSDI}{USENIX/ACM Symposium + on Networked Systems Design and Implementation}}, + month = may, + year = 2006, + location = {San Jose, CA}, +} + +@article{ tsuchiya93extending, + author = {Paul F. Tsuchiya and Tony Eng}, + title = {Extending the {IP} Internet Through Address Reuse}, + journal = {Computer Communications Review}, + volume = 23, + number = 1, + pages = {16-33}, + month = jan, + year = 1993, +} + +@inproceedings{ tennenhouse89layered, + author = {David L. Tennenhouse}, + title = {Layered Multiplexing Considered Harmful}, + booktitle = {1st International Workshop on + Protocols for High-Speed Networks}, + location = {Zurich, Switzerland}, + month = may, + year = 1989, + isbn = {0-444-88536-6}, +} + +@article{ tennenhouse97survey, + author = "David L. Tennenhouse and Jonathan M. Smith and + W. David Sincoskie and David J. Wetherall and Gary J. Minden", + title = "A Survey of Active Network Research", + journal = "IEEE Communications Magazine", + volume = "35", + number = "1", + pages = "80--86", + year = "1997", + url = "citeseer.ist.psu.edu/tennenhouse97survey.html" +} + +@inproceedings{teregowda10citeseerx, + title={Cite{S}eer$^x$: {A} Cloud Perspective}, + author={Teregowda, Pradeep B and Urgaonkar, Bhuvan and Giles, C Lee}, + booktitle={\bibconf[2nd]{HotCloud}{USENIX Workshop on + Hot Topics in Cloud Computing}}, + location = {Boston, MA}, + month = jun, + year = 2010 +} + + +@inproceedings{ terry95managing, + author = "Douglas B. Terry and others", + title = "Managing Update Conflicts in {Bayou}, + a Weakly Connected Replicated Storage System", + booktitle = {\bibconf[15th]{SOSP}{ACM Symposium on + Operating System Principles}}, + year = "1995" +} + +@inproceedings{ thorup01approximate, + author = "Mikkel Thorup and Uri Zwick", + title = "Approximate distance oracles", + booktitle = "{ACM} Symposium on Theory of Computing", + pages = "183-192", + year = "2001", + url = "citeseer.ist.psu.edu/thorup01approximate.html" +} + +@inproceedings{thorup01compact, + author = {Mikkel Thorup and Uri Zwick}, + title = {Compact routing schemes}, + booktitle = {\bibconf{SPAA}{ACM Symposium on Parallel Algorithms + and Architectures}}, + year = {2001}, + isbn = {1-58113-409-6}, + pages = {1--10}, + location = {Crete Island, Greece}, + doi = {http://doi.acm.org/10.1145/378580.378581}, + publisher = {ACM Press}, + address = {New York, NY, USA}, +} + +@article{ tomlinson75selecting, + author = {Raymond S. Tomlinson}, + title = {Selecting Sequence Numbers}, + journal = {SIGOPS Operating Systems Review}, + volume = {9}, + number = {3}, + month = jul, + year = {1975}, + pages = {11--23}, +} + +@techreport{ touch06recursive, + author = {Joseph D. Touch and Yu-Shun Wang and Venkata Pingali}, + title = {A Recursive Network Architecture}, + institution = {University of Southern California + Information Sciences Institute}, + number = {ISI-TR-2006-626}, + month = oct, + year = 2006, +} + +@article{ trinder02parallel, + author = {P.W. Trinder and H-W. Loidl and R.F. Pointon}, + title = {Parallel and Distributed {H}askells}, + journal = {Journal of Functional Programming}, + volume = {12}, + number = {4\&5}, + pages = {469--510}, + year = {2002}, + url = {overcite.lcs.mit.edu/trinder02parallel.html}, +} + +@misc{ tis95elf, + author = {{Tool Interface Standard {(TIS)} Committee}}, + title = {Executable and Linking Format {(ELF)} Specification}, + month = may, + year = {1995}, +} + +@article{trinder98algorithm, + author = {Trinder, P. W. and Hammond, K. and Loidl, H.-W. and Peyton Jones, Simon L.}, + title = {Algorithm + strategy = parallelism}, + journal = {Journal of Functional Programming}, + volume = {8}, + number = {1}, + month = jan, + year = 1998, + pages = {23--60}, +} + +@inproceedings{ tsuchiya88landmark, + author = "Paul Francis Tsuchiya", + title = "The {Landmark} Hierarchy: A New Hierarchy for Routing + in Very Large Networks", + booktitle = "\bibbrev{SIGCOMM}{ACM SIGCOMM}", + pages = "35--42", + location = "Stanford, CA", + month = aug, + year = "1988", +} + +@inproceedings{ tzicker99integrating, + author = {{Tzi-cker} Chiueh and + Ganesh Venkitachalam and + Prashant Pradhan}, + title = {Integrating segmentation and paging protection for safe, + efficient and transparent software extensions}, + booktitle = "\bibconf[17th]{SOSP}{ACM Symposium + on Operating System Principles}", + month = dec, + year = {1999}, + pages = {140--153}, + ee = {http://www.acm.org/pubs/citations/proceedings/sigops/319151/p140-chiueh/}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +%U + +@misc{ upnp01igd, + author = "{UPnP Forum}", + title = "Internet Gateway Device {(IGD)} Standardized + Device Control Protocol", + month = nov, + year = "2001", + note = "\url{http://www.upnp.org/}", +} + +%V + +@inproceedings{van04chain, + title={Chain Replication for Supporting High Throughput and Availability.}, + author={Van Renesse, Robbert and Schneider, Fred B}, + booktitle={OSDI}, + volume={4}, + pages={91--104}, + year={2004} +} + +@article{valiant79thecomplexity, + author = {Leslie G. Valiant}, + title = {The Complexity of Enumeration and Reliability Problems}, + journal = {SIAM J. Comput.}, + volume = {8}, + number = {3}, + year = {1979}, + pages = {410-421} +} + +@article{ vamosi06security, + author = {Robert Vamosi}, + title = {Security Watch: Don't get burned by viruses and hackers}, + publisher = {CNET Reviews}, + month = sep, + day = 15, + year = 2006, + url = {http://reviews.cnet.com/4520-3513_7-6638552-1.html}, +} + +@inproceedings{ vangala03tcp, + author = {Sarma Vangala and Miguel A. Labrador}, + title = {The {TCP SACK}-Aware Snoop Protocol for {TCP} + over Wireless Networks}, + booktitle = {Vehicular Technology Conference}, + month = oct, + day = 9, + year = 2003, + location = {Orlando, FL}, +} + +@inproceedings{ vaziri06associating, + author = {Mandana Vaziri and Frank Tip and Julian Dolby}, + title = {Associating Synchronization Constraints with + Data in an Object-Oriented Language}, + booktitle = {\bibconf[33rd]{POPL}{ACM Symposium on + Principles of Programming Languages}}, + month = jan, + year = 2006, + location = {Charleston, SC}, + pages = {334-345}, +} + +@inproceedings{ vechev10automatic, + author = {Martin Vechev and Eran Yahav and Raghavan Raman + and Vivek Sarkar}, + title = {Automatic Verification of Determinism + for Structured Parallel Programs}, + booktitle = {\bibconf{SAS}{Static Analysis Symposium}}, + month = sep, + year = 2010, +} + +@article{veeraraghavan11doubleplay, + author = {Veeraraghavan, Kaushik and Lee, Dongyoon and Wester, Benjamin + and Ouyang, Jessica and Chen, Peter M. and Flinn, Jason and + Narayanasamy, Satish}, + title = {Double{P}lay: parallelizing sequential logging and replay}, + journal = {ACM SIGPLAN Notices}, + volume = {47}, + number = {4}, + month = mar, + year = {2011}, + pages = {15--26}, +} + +@misc{ versit96vcard, + author = {{versit} Consortium}, + title = {{vCard}: The Electronic Business Card}, + month = sep, + year = 1996, +} + + +@book{ vesely81fault, + author = {William E. Vesely and Francine F. Goldberg + and Norman H. Roberts and David F. Haasl}, + title = {Fault Tree Handbook}, + publisher = {U.S. Nuclear Regulatory Commission}, + month = jan, + year = 1981, +} + + +@inproceedings{ vuillaume06flexible, + author = {Camille Vuillaume and Katsuyuki Okeya}, + title = {Flexible Exponentiation with Resistance + to Side Channel Attacks}, + booktitle = {\bibconf[4th]{ACNS}{Conference on Applied Cryptography + and Network Security}}, + month = jun, + year = 2006, + pages = {268-283}, +} + +%W + +@book{ wadge85lucid, + author = {William W. Wadge and Edward A. Ashcroft}, + title = {Lucid, the Dataflow Programming Language}, + publisher = {Academic Press}, + location = {New York, NY}, + year = 1985, +} + +@article{ wadlow81xerox, + author = {Thomas A Wadlow}, + title = {The {Xerox} {Alto} Computer}, + journal = {Byte}, + year = {1981}, + month = sep, + volume = {6}, + number = {9}, + pages = {58--68}, +} + +@article{ wahbe93efficient, + author = "Robert Wahbe and Steven Lucco and Thomas E. Anderson + and Susan L. Graham", + title = "Efficient Software-Based Fault Isolation", + journal = "ACM SIGOPS Operating Systems Review", + volume = "27", + number = "5", + month = dec, + pages = "203--216", + year = "1993", + url = "citeseer.ist.psu.edu/wahbe93efficient.html" +} + +@inproceedings{ waldspurger94lottery, + author = {Carl A. Waldspurger and William E. Weihl}, + title = {Lottery Scheduling: Flexible Proportional-Share + Resource Management}, + booktitle = {\bibconf[1st]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = nov, + year = 1994, + location = {Monterey, CA}, +} + +@inproceedings{ walfish04middleboxes, + author = {Michael Walfish and Jeremy Stribling and Maxwell Krohn and + Hari Balakrishnan and Robert Morris and Scott Shenker}, + title = {Middleboxes No Longer Considered Harmful}, + booktitle = {USENIX Symposium on + Operating Systems Design and Implementation}, + location = {San Francisco, CA}, + month = dec, + year = {2004}, +} + +@inproceedings{ walfish04untangling, + author = "Michael Walfish and Hari Balakrishnan and Scott Shenker", + title = "Untangling the {Web} from {DNS}", + booktitle = "\bibconf[1st]{NSDI}{USENIX/ACM Symposium + on Networked Systems Design and Implementation}", + location = "San Francisco, CA", + month = mar, + year = "2004", +} + +@article{ walker83locus, + author = {Bruce Walker and Gerald Popek and Robert English + and Charles Kline and Greg Thiel}, + title = {The {LOCUS} Distributed Operating System}, + journal = {\bibbrev{OSR}{SIGOPS Operating Systems Review}}, + volume = 17, + number = 5, + month = oct, + year = 1983, +} + +@article{walker08benchmarking, + title ={Benchmarking Amazon {EC2} for High-Performance Scientific Computing}, + author ={Walker, Edward}, + journal ={{USENIX Login}}, + volume ={33}, + number ={5}, + pages ={18--23}, + year ={2008} +} + + +@article{ wallace91jpeg, + author = {G.K. Wallace}, + title = {The {JPEG} still picture compression standard}, + journal = {Communications of the ACM}, + volume = {34}, + number = {4}, + pages = {30-44}, + month = apr, + year = 1991, +} + +@inproceedings{walsh06experience, + author = {Kevin Walsh and Emin G{\"u}n Sirer}, + title = {Experience with an object reputation system for {P}eer-to-{P}eer + filesharing}, + booktitle = {\bibconf[3rd]{NSDI}{USENIX Symposium on Networked Systems Design and Implementation}}, + location = {San Jose, CA}, + month = may, + year = 2006 +} + +@article{ wang05tcp, + author = {Ren Wang and others}, + title = {{TCP} With Sender-Side Intelligence to Handle + Dynamic, Large, Leaky Pipes}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 23, + number = 2, + month = feb, + year = 2005, +} + +@inproceedings{ wang06covert, + author = {Zhenghong Wang and Ruby B. Lee}, + title = {Covert and Side Channels due to Processor Architecture}, + booktitle = {22nd \bibconf{ACSAC}{Annual Computer Security + Applications Conference}}, + month = dec, + year = 2006, + location = {Miami Beach, FL}, +} + +@inproceedings{ watson07exploiting, + author = {Robert N. M. Watson}, + title = {Exploiting Concurrency Vulnerabilities + in System Call Wrappers}, + booktitle = {1st USENIX Workshop on Offensive Technologies}, + month = aug, + year = 2007, +} + +@article{ wan05psfq, + author = {Chieh-Yih Wan and Andrew T. Campbell and + Lakshman Krishnamurthy}, + title = {{PSFQ}: A Reliable Transport Protocol for Sensor Networks}, + journal = {\bibbrev{IEEE JSAC}{IEEE Journal on Selected Areas in Communication}}, + volume = 23, + number = 4, + month = apr, + year = 2005, +} + +@inproceedings{wei05new, + author = {Wei Wei and Bart Selman}, + title = {A new approach to model counting}, + booktitle = {\bibconf[8th]{SAT}{Internal Conference on Theory and Applications of Satisfiability Testing}}, + month = jun, + year = 2005, + location = {St. Andrews, Scotland}, +} + +@inproceedings{ wei05tocttou, + author = {Jinpeng Wei and Calton Pu}, + title = {{TOCTTOU} Vulnerabilities in {UNIX}-Style File Systems: + An Anatomical Study}, + booktitle = {\bibconf[4th]{USENIX FAST}{USENIX Conference on + File and Storage Technologies}}, + month = dec, + year = 2005, + location = {San Francisco, CA}, +} + +@article{ wei06fast, + author = {David X. Wei and others}, + title = {{FAST TCP}: Motivation, Architecture, Algorithms, Performance}, + journal = {Transactions on Networking}, + volume = 14, + number = 6, + month = dec, + year = 2006, +} + +@techreport{ weinberger00loco-i, + author = {Marcelo J. Weinberger and Gadiel Seroussi and + Guillermo Sapiro}, + title = {The {LOCO-I} Lossless Image Compression Algorithm: + Principles and Standardization into {JPEG-LS}}, + institution = {Hewlett-Packard Laboratories}, + number = {HPL-98-193R1}, + month = nov, + year = 1998, +} + +@article{ weiser99mobile, + author = {Mark Weiser}, + title = {The computer for the 21st century}, + journal = {Mobile Computing and Communications Review}, + volume = 3, + number = 3, + month = jul, + year = 1999, +} + +@article{ weitzner08information, + author = {Daniel J. Weitzner and Hal Abelson and Tim Berners-Lee and + Joan Feigenbaum and James Hendler and Gerald Sussman}, + title = {Information Accountability}, + journal = {Communications of the ACM}, + volume = 51, + year = 2008, + pages = {82-88}, +} + + + +@article{whiting94dataflow, + author={Whiting, P.G. and Pascoe, R.S.V.}, + journal={Annals of the History of Computing, IEEE}, + title={A history of data-flow languages}, + year={1994}, + month={winter }, + volume={16}, + number={4}, + pages={38 -59}, +} + +@article{ widmer01tcp, + author = {Joerg Widmer and Robert Denda and Martin Mauve}, + title = {A Survey on {TCP}-Friendly Congestion Control}, + journal = {IEEE Network}, + month = may, + year = 2001, + pages = {28-37}, +} + +@inproceedings{wieder12orchestrating, + author = {Alexander Wieder and + Pramod Bhatotia and + Ansley Post and + Rodrigo Rodrigues}, + title = {Orchestrating the Deployment of Computations in the Cloud + with Conductor}, + booktitle = {\bibconf[9th]{NSDI}{USENIX Symposium on Networked Systems + Design and Implementation}}, + location = {San Jose, CA}, + month = Apr, + year = 2012 +} + + +@article{ williams83lisa, + author = {Geoff Williams}, + title = {The {Lisa} Computer System}, + journal = {Byte}, + volume = {8}, + number = {2}, + pages = {33--55}, + month = feb, + year = {1983}, +} + +@article{williams84apple, + author = "Geoff Williams", + title = "The {Apple Macintosh} Computer", + journal = "Byte", + volume = "9", + number = "2", + pages = "30--54", + month = feb, + year = "1984", + CODEN = "BYTEDJ", + ISSN = "0360-5280", + keywords = "olit-appl macintosh", +} + +@inproceedings{ williams12xen, + author = {Dan Williams and Hani Jamjoom and Hakim Weatherspoon}, + title = {The {Xen-Blanket}: Virtualize Once, Run Everywhere}, + booktitle = {\bibconf{EuroSys}{European Conference + on Computer Systems}}, + month = apr, + year = 2012, + location = {Bern, Switzerland}, +} + +@techreport{winick02inet, + author = "Jared Winick and Sugih Jamin", + title = "{Inet-3.0: {Internet} Topology Generator}", + institution = "University of Michigan", + number = "CSE-TR-456-02", + year = "2002" +} + +@inproceedings{ winterbottom97design, + author = "Phil Winterbottom and Rob Pike", + title = "The Design of the {Inferno} Virtual Machine", + booktitle = "Hot Chips 9 Symposium", + year = "1997", + month = aug, + url = "citeseer.ist.psu.edu/winterbottom97design.html" +} + +@inproceedings{ witchel96embra, + author = "Emmett Witchel and Mendel Rosenblum", + title = "Embra: Fast and Flexible Machine Simulation", + booktitle = "Measurement and Modeling of Computer Systems", + pages = "68-79", + year = "1996", + url = "citeseer.ist.psu.edu/witchel96embra.html" +} + +@inproceedings{ wittie86bugnet, + author = {Larry Wittie}, + title = {The {Bugnet} Distributed Debugging System}, + booktitle = {\bibbrev{Making Distributed Systems Work}{ + Second European SIGOPS Workshop on + ``Making Distributed Systems Work''}}, + month = sep, + year = 1986, + location = {Amsterdam, Netherlands}, +} + +@book{witten05data, + title={Data Mining: Practical machine learning tools and techniques}, + author={Witten, Ian H and Frank, Eibe}, + publisher = {}, + year={2005}, +} + +@inproceedings{ wong99improving, + author = {Jackson W.K. Wong and Victor C.M. Leung}, + title = {Improving End-to-End Performance of {TCP} Using + Link-Layer Retransmissions over Mobile Internetworks}, + booktitle = {\bibconf{ICC}{IEEE International Conference + on Communications}}, + month = jun, + year = 1999, + location = {Vancouver, BC, Canada}, +} + +@inproceedings{ woo95splash2, + author = {Steven Cameron Woo and Moriyoshi Ohara and Evan Torrie + and Jaswinder Pal Singh and Anoop Gupta}, + title = {The {SPLASH-2} Programs: Characterization and + Methodological Considerations}, + booktitle = {\bibconf[22nd]{ISCA}{International Symposium on + Computer Architecture}}, + month = jun, + year = 1995, + pages = {24-36}, +} + +@inproceedings{ wray91analysis, + author = {John C. Wray}, + title = {An Analysis of Covert Timing Channels}, + booktitle = {{IEEE} Symposium on Security and Privacy}, + month = may, + year = 1991, + location = {Oakland, CA}, +} + +@inproceedings{ wu01direct, + author = {Haitao Wu and Keping Long and Shiduan Cheng and Jian Ma}, + title = {Direct Congestion Control Scheme{(DCCS)} for + Differentiated Services {IP} Networks}, + booktitle = {\bibconf{GLOBECOM}{IEEE Global Telecommunications + Conference}}, + month = dec, + year = 2001, + location = {San Antonio, TX}, +} + +@inproceedings{ wuu84efficient, + author = {Gene T.J. Wuu and Arthur J. Bernstein}, + title = {Efficient Solutions to the Replicated Log and Dictionary Problems}, + booktitle = {Principles of Distributed Computing}, + month = aug, + year = 1984, + pages = {232-242}, +} + +%X + +@inproceedings{ xia03analysis, + author = {Ye Xia and David Tse}, + title = {Analysis on Packet Resequencing + for Reliable Network Protocols}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = apr, + year = 2003, + location = {San Francisco, CA}, +} + +@inproceedings{ xiong10adhoc, + author = {WeiWei Xiong and Soyeon Park and Jiaqi Zhang and + Yuanyuan Zhou and Zhiqiang Ma}, + title = {Ad Hoc Synchronization Considered Harmful}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + location = {Vancouver, BC, Canada}, + month = oct, + year = 2010, +} +@misc{ xiph04vorbis, + author = {{Xiph.org Foundation}}, + title = {{Vorbis I} Specification}, + note = {\\ {\small\tt http://www.xiph.org/ogg/vorbis/}} +} + +@inproceedings{xu03replay, + author = {Xu, Min and Bodik, Rastislav and Hill, Mark D.}, + title = {A "flight data recorder" for enabling full-system multiprocessor deterministic replay}, + booktitle = {\bibconf[30th]{ISCA}{annual international symposium + on Computer architecture}}, + month = jun, + year = 2003, + pages = {122--135}, + location = {San Diego, California}, +} + +@inproceedings{ xu04binary, + author = {Lisong Xu and Khaled Harfoush and Injong Rhee}, + title = {Binary Increase Congestion Control {(BIC)} + for Fast Long-Distance Networks}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 2004, + location = {Hong Kong}, +} + +@article{ xu07extending, + author = {Lisong Xu}, + title = {Extending equation-based congestion control to + high-speed and long-distance networks}, + journal = {Computer Networks}, + volume = 51, + number = 7, + month = may, + year = 2007, + pages = {1847-1859}, +} + + +@inproceedings{xu09detecting, + author = {Wei Xu and Ling Huang and Armando Fox + and David Patterson and Michael I. Jordan}, + title = {Detecting large-scale system problems by mining console + logs}, + booktitle = {\bibconf[22nd]{SOSP}{ACM Symposium on Operating Systems Principles}}, + location = {Big Sky, MT}, + month = oct, + year = 2009 +} + +%Y + +@article{yang12data, + author = {Kan Yang and + Xiaohua Jia}, + title = {Data storage auditing service in cloud + computing: {C}hallenges, + methods and opportunities}, + journal = {World Wide Web}, + volume = {15}, + number = {4}, + year = {2012}, + pages = {409-428} +} + + +@inproceedings{ yavatkar94improving, + author = {Raj Yavatkar and Namrata Bhagawat}, + title = {Improving End-to-End Performance of {TCP} + over Mobile Internetworks}, + booktitle = {Workshop on Mobile Computing Systems and Applications}, + month = dec, + year = 1994, + location = {Santa Cruz, CA}, +} + +@inproceedings{ ye06monitoring, + author = {Bin Ye and Anura P. Jayasumana and Nischal M. Piratla}, + title = {On Monitoring of End-to-End Packet Reordering + over the {Internet}}, + booktitle = {\bibconf{INCS}{International Conference on + Networking and Services}}, + month = jul, + year = 2006, +} + +@inproceedings{ yee09native, + author = {Bennet Yee and David Sehr and Gregory Dardyk and + J. Bradley Chen and Robert Muth and Tavis Ormandy and + Shiki Okasaka and Neha Narula and Nicholas Fullagar}, + title = {Native Client: A Sandbox for Portable, Untrusted + x86 Native Code}, + booktitle = {{IEEE} Symposium on Security and Privacy}, + month = may, + year = 2009, + location = {Oakland, CA}, +} + +@inproceedings{ yi04hopbyhop, + author = {Yung Yi and Sanjay Shakkottai}, + title = {Hop-by-hop Congestion Control over a + Wireless Multi-hop Network}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + location = {Hong Kong}, + month = mar, + year = 2004, +} + +@article{ yi07hopbyhop, + author = {Yung Yi and Sanjay Shakkottai}, + title = {Hop-by-hop Congestion Control over a + Wireless Multi-hop Network}, + journal = {IEEE Transactions on Networking}, + volume = 15, + number = 1, + month = feb, + year = 2007, + pages = {133-144}, +} + +@inproceedings{ yip06pastwatch, + author = {Alexander Yip and Benjie Chen and Robert Morris}, + title = {Pastwatch: a Distributed Version Control System}, + booktitle = {\bibconf[3rd]{NSDI}{Symposium + on Networked Systems Design and Implementation}}, + month = may, + year = 2006, + location = {San Jose, CA}, +} + +@misc{ ylonen02ssh, + author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and S. Lehtinen", + title = "{SSH} Protocol Architecture", + month = sep, + year = "2002", + note = "Internet-Draft (Work in Progress)", +} + +@inproceedings{young87mach, + author = {Michael Young and + Avadis Tevanian and + Richard F. Rashid and + David B. Golub and + Jeffrey L. Eppinger and + Jonathan Chew and + William J. Bolosky and + David L. Black and + Robert V. Baron}, + title = {\href{https://doi.org/10.1145/41457.37507}{The Duality of Memory and Communication in the Implementation of a + Multiprocessor Operating System}}, + booktitle = {Proceedings of the Eleventh {ACM} Symposium on Operating System Principles, + {SOSP} 1987, Stouffer Austin Hotel, Austin, Texas, USA, November 8-11, + 1987}, + pages = {63--76}, + year = {1987}, + url = {https://doi.org/10.1145/41457.37507}, +} + +@inproceedings{ yu06sybilguard, + author = {Haifeng Yu and Michael Kaminsky and Phillip B. Gibbons + and Abraham Flaxman}, + title = {{SybilGuard}: Defending Against Sybil Attacks + via Social Networks}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + location = {Pisa, Italy}, + month = sep, + year = 2006 +} + + + +%Z + +@inproceedings{ zandy02reliable, + author = "Victor C. Zandy and Barton P. Miller", + title = "Reliable Network Connections", + booktitle = "\bibconf[8th]{MOBICOM}{ACM International Conference on + Mobile Computing and Networking}", + location = "Atlanta, GA", + month = sep, + year = "2002", + pages = "95--106", +} + +@inproceedings{ zeldovich06making, + author = {Nickolai Zeldovich and Silas Boyd-Wickizer and Eddie Kohler + and David Mazi\`eres}, + title = {Making Information Flow Explicit in {HiStar}}, + booktitle = {\bibconf[7th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = nov, + year = 2006, + location = {Seattle, WA}, +} + +@inproceedings{zhai13anuntold, + author = {Ennan Zhai and + Ruichuan Chen and + David Isaac Wolinsky and + Bryan Ford}, + title = {An Untold Story of Redundant Clouds: + {M}aking Your Service Deployment Truly Reliable}, + booktitle = {\bibconf[9th]{HotDep}{Workshop on Hot Topics in Dependable + Systems}}, + location = {Nemacolin Woodlands Resort, PA}, + month = nov, + year = 2013 +} + + +@techreport{zhai13auditing, + author = {Ennan Zhai and + David Isaac Wolinsky and + Hongda Xiao and + Hongqiang Liu and + Xueyuan Su and + Bryan Ford}, + title = {{Auditing the Structural Reliability of the Clouds}}, + number = {{YALEU/DCS/TR-1479}}, + institution = {{Department of Computer Science, Yale University}}, + year = {2013}, + note = {Available at \url{http://www.cs.yale.edu/homes/zhai-ennan/sra.pdf}} +} + +@inproceedings{zhai14heading, + author = {Ennan Zhai and + Ruichuan Chen and + David Isaac Wolinsky and + Bryan Ford}, + title = {Heading off correlated failures through {I}ndependence-as-a-{s}ervice}, + booktitle = {\bibconf[11th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}}, + location = {Broomfield, CO}, + month = oct, + year = 2014 +} + + +@inproceedings{ zhang91comparison, + author = "Hui Zhang and Srinivasan Keshav", + title = "Comparison of Rate-Based Service Disciplines", + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + pages = "113-121", + year = "1991", + url = "citeseer.ist.psu.edu/zhang91comparison.html" +} + +@inproceedings{ zhang00speeding, + author = {Yin Zhang and Lili Qiu and Srinivasan Keshav}, + title = {Speeding Up Short Data Transfers: Theory, Architectural + Support and Simulation Results}, + booktitle = {\bibconf[10th]{NOSSDAV}{Network and Operating System + Support for Digital Audio and Video}}, + month = jun, + year = 2000 +} + +@techreport{ zhang02improving, + author = {Ming Zhang and Brad Karp and Sally Floyd and Larry Peterson}, + title = {Improving {TCP}'s Performance under Reordering with {DSACK}}, + institution = {International Computer Science Institute}, + location = {Berkeley, CA}, + number = "TR-02-006", + year = "2002", + month = jul, +} + +@inproceedings{ zhang03rrtcp, + author = {Ming Zhang and Brad Karp and Sally Floyd and Larry Peterson}, + title = {{RR-TCP}: a reordering-robust {TCP} with {DSACK}}, + booktitle = {\bibconf[11th]{ICNP}{International Conference on + Network Protocols}}, + month = nov, + year = 2003, + location = {Atlanta, GA}, +} + +@inproceedings{ zhang04transport, + author = {Ming Zhang and Junwen Lai and Arvind Krishnamurthy + and Larry Peterson and Randolph Wang}, + title = {A transport layer approach for improving end-to-end + performance and robustness using redundant paths}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2004, +} + +@article{ zhang06reasons, + author = {Zongsheng Zhang and Go Hasegawa and Masayuki Murata}, + title = {Reasons not to Parallelize {TCP} Connections + for Long Fat Networks}, + journal = {Simulation Series}, + volume = 38, + number = 3, + pages = {354-362}, + year = 2006, +} + +@inproceedings{ zhang11cloudvisor, + author = {Fengzhe Zhang and Jin Chen and Haibo Chen and Binyu Zang}, + title = {{CloudVisor}: Retrofitting Protection of Virtual Machines + in Multi-tenant Cloud with Nested Virtualization}, + booktitle = {\bibconf[23rd]{SOSP}{{ACM} Symposium on + Operating Systems Principles (SOSP)}}, + month = oct, + year = 2011, + location = {Cascais, Portugal}, +} + +@inproceedings{ zhang11virtual, + author = {Yu Zhang and Bryan Ford}, + title = {A Virtual Memory Foundation for + Scalable Deterministic Parallelism}, + booktitle = {\bibconf[2nd]{APSys}{ACM SIGOPS Asia-Pacific + Workshop on Systems}}, + month = jul, + year = 2011, + location = {Shanghai, China}, +} + +@inproceedings{ zhang13lazy, + author = {Yu Zhang and Bryan Ford}, + title = {{Lazy Tree Mapping}: Generalizing and Scaling + Deterministic Parallelism}, + booktitle = {\bibconf[4th]{APSys}{ACM SIGOPS Asia-Pacific + Workshop on Systems}}, + month = jul, + year = 2013, + location = {Singapore, Singapore}, +} + +@inproceedings{ zhang11homealone, + author={Zhang, Yinqian and Juels, Ari and Oprea, Alina and Reiter, Michael K}, + booktitle={\bibconf{SP}{IEEE Security and Privacy}}, + title={{HomeAlone}: Co-residency Detection in the Cloud via Side-Channel Analysis}, + pages={313--328}, + year={2011}, +} + +@inproceedings{ zhang12cloud, + author = {Zhang, Yinqian and Juels, Ari and Reiter, Michael K. and Ristenpart, Thomas}, + booktitle = {\bibconf{CCS}{ACM Conference on Computer and Communications Security}}, + title = {Cross-{VM} side channels and their use to extract private keys.}, + year = 2012 +} + +@article{ zhao04tapestry, + author = {Ben Y. Zhao and Ling Huang and Jeremy Stribling + and Sean C. Rhea and Anthony D. Joseph + and John D. Kubiatowicz}, + title = {\href{https://ieeexplore.ieee.org/document/1258114}{Tapestry: A Resilient Global-scale Overlay for + Service Deployment}}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 22, + number = 1, + month = jan, + year = 2004, + pages = {41-53}, +} + +@inproceedings{zhao14iprof, + author = {Xu Zhao and + Yongle Zhang and + David Lion and + Muhammad Faizan Ullah and + Yu Luo and + Ding Yuan and + Michael Stumm}, + title = {lprof: {A} Non-intrusive Request Flow Profiler for + Distributed Systems}, + booktitle = {\bibconf[11th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}}, + location = {Broomfield, CO}, + month = oct, + year = 2014 +} + +@inproceedings{zheng10ftcloud, + author = {Zibin Zheng and + Tom Chao Zhou and + Michael R. Lyu and + Irwin King}, + title = {{FTCloud}: {A} Component Ranking Framework for Fault-Tolerant Cloud Applications}, + booktitle = {ISSRE}, + year = {2010} +} + +@inproceedings{zhong08replication, + author = {Ming Zhong and + Kai Shen and + Joel I. Seiferas}, + title = {Replication Degree Customization for High Availability}, + booktitle = {\bibconf{EuroSys}{ACM SIGOPS/EuroSys European Conference + on Computer Systems}}, + location = {Glasgow, Scotland}, + month = mar, + year = 2008 +} + + +@article{ zimmermann80osi, + author = {Hubert Zimmermann}, + title = {{OSI} Reference Model---The {ISO} Model of Architecture + for Open Systems Interconnection}, + journal = {IEEE Transactions on Communications}, + volume = 28, + number = 4, + month = apr, + year = 1980, + pages = {425-432}, +} + + +%%%%% Misc + +@misc{ apple-mobileme, + author = {{Apple Computer, Inc.}}, + title = {{MobileMe}}, + note = {\url{http://www.apple.com/mobileme/}}, +} + +@misc{ amazon-ec2, + author = {{Amazon Web Services}}, + title = {Amazon Elastic Compute Cloud ({Amazon EC2})}, + note = {\url{http://aws.amazon.com/ec2/}}, +} + +@misc{ filevault, + author = {{Apple Computer, Inc.}}, + title = {{FileVault}}, + note = {\url{http://www.apple.com/macosx/features/filevault/}}, +} + +@misc{ bamboo, + key = {Bamboo}, + title = {The Bamboo Distributed Hash Table}, + note = {\url{http://bamboo-dht.org/}}, +} + +@misc{ bbftp, + author = {Tim Adye and others}, + title = {{bbFTP}}, + note = {\url{http://doc.in2p3.fr/bbftp/index.html}}, +} + +@misc{ bonjour, + author = {{Apple Computer, Inc.}}, + title = {Bonjour}, + note = {\url{http://developer.apple.com/networking/bonjour/}}, +} + +@misc{ cisco04rate, + author = {{Cisco, Inc.}}, + title = {Rate Based Satellite Control Protocol}, + year = 2004, + url = {http://www.cisco.com/en/US/docs/ios/12_3t/12_3t7/feature/guide/gt_rbscp.html}, +} + +@misc{ csharp-spec, + author = "{Microsoft Corporation}", + title = "C\# Language Specification, Version 3.0", + year = 2007, +} + +@misc{ dimes, + author = "{The DIMES project}", + note = "\texttt{http://www.netdimes.org/}" +} + +@misc{ firefox-pipelining, + author = {{Mozilla.org}}, + title = {Firefox Tips \& Tricks: Pipelining}, + note = {\url{http://www.mozilla.org/support/firefox/tips#oth_pipelining}} +} + +@misc{ facebook, + title = "Facebook", + key = "Facebook", + note = "{\tt http://www.facebook.com/}", +} + +@misc{ freenet, + note = "http://freenetproject.org/", +} + +@misc{ freepastry14, + title = {Freepastry release notes}, + note = {http://freepastry.rice.edu/FreePastry/README-1.4.1.html}, + month = may, + year = 2005, +} + +@misc{ friendster, + title = "Friendster", + key = "Friendster", + note = "{\tt http://www.friendster.com/}", +} + +@misc{ guha-stunt, + author = {Saikat Guha and Paul Francis}, + title = {Simple Traversal of {UDP} Through {NATs} and {TCP} too + {(STUNT)}}, + note = {{\tt http://nutss.gforge.cis.cornell.edu/}} +} + +@misc{ gurbani06handling, + author = {V. Gurbani and S. Lawrence}, + title = {Handling Large User Datagram Protocol {(UDP)} Responses + in the Session Initiation Protocol {(SIP)}}, + month = oct, + year = 2006, + note = "Internet-Draft (Work in Progress)", +} + +@misc{ ietf-behave, + author = {{Internet Engineering Task Force (IETF)}}, + title = {Behavior Engineering for Hindrance Avoidance (behave)}, + note = {\url{http://www.ietf.org/html.charters/behave-charter.html}}, +} + +@misc{ ita, + title = {The {Internet} Traffic Archive}, + key = {Internet Traffic Archive}, + note = {\url{http://ita.ee.lbl.gov/}}, +} + +@misc{ info-zip, + title = {{Info-ZIP}}, + key = {{Info-ZIP}}, + note = {{\tt http://www.info-zip.org/}}, +} + +@misc{ iso00jpeg, + author = {{International Standards Organization}}, + title = {{JPEG 2000} image coding system}, + year = 2000, + note = {ISO/IEC 15444-1}, +} + +@misc{ kafka, + key = {kafka}, + title = {kafka - A Distributed Streaming Platform}, + note = {\url{http://kafka.apache.org.}}, +} + +@misc{ + kegel99nat, + author = "Dan Kegel", + title = "{NAT} and Peer-to-Peer Networking", + month = jul, + year = "1999", + note = "\url{http://www.alumni.caltech.edu/~dank/peer-nat.html}" +} + +@article{ kudalur05ie7, + author = {Venkat Kudallur and others}, + title = {{IE7} Networking improvements + in content caching and decompression}, + journal = {IEBlog}, + month = oct, + year = 2005, + url = "{\tt http://blogs.msdn.com/ie/archive/2005/10/31/487509.aspx}" +} + +@misc{ mojonation, + note = "http://mojonation.net/", +} + +@misc{ mpi09, + author = {{Message Passing Interface Forum}}, + title = {{MPI}: A Message-Passing Interface Standard Version 2.2}, + month = sep, + year = 2009, +} + +@misc{ mpich2, + author = {{Mathematics and Computer Science Division Argonne National Laboratory}}, + title = {{MPICH2-1.4}: a high-performance and widely portable implementation of the {MPI} standard ( both MPI-1 and MPI-2 )}, + month = Jun, + year = 2011, + url = {\url{http://www.mcs.anl.gov/research/projects/mpich2/}} +} + + +@misc{ ms-livemesh, + author = {{Microsoft Corporation}}, + title = {{Live Mesh} tech preview}, + note = {\url{https://www.mesh.com/}}, +} + +@misc{ msjpegbug, + author = {{Microsoft Corporation}}, + title = "Buffer Overrun in {JPEG} Processing {(GDI+)} + Could Allow Code Execution (833987)", + note = "Microsoft Security Bulletin MS04-028", + year = 2004, + month = sep, + date = 14, +} + +@misc{ natcheck, + key = "NAT Check", + title = "{NAT} Check", + note = "{\tt http://midcom-p2p.sourceforge.net/}", +} + +@misc{ nats, + key = {NATS}, + title = {NATS - The Cloud Native Messaging System}, + note = {\url{http://nats.io}}, +} + +@misc{ openarena, + title = {{OpenArena} Project}, + note = {\url{http://openarena.ws/}} +} + +@misc{ openmp08, + author = {{OpenMP Architecture Review Board}}, + title = {{OpenMP} Application Program Interface Version 3.0}, + month = may, + year = 2008, + url = {\url{http://www.openmp.org/mp-documents/spec30.pdf}} +} + +@misc{ openmp05, + author = {OpenMP Architecture Review Board}, + title = {{OpenMP} Application Program Interface Version 2.5}, + month = may, + year = 2005, + note = {\url{http://www.openmp.org/mp-documents/spec25.pdf}} +} + +@misc{ openssl, + author = {OpenSSL Software Foundation}, + title = {\href{https://www.openssl.org/}{{OpenSSL} Project}}, + key = {OpenSSL}, +} + note = {\url{http://www.openssl.org/}}, + +@misc{ openssh, + title = "{OpenSSH} Project", + key = "OpenSSH", + note = "\url{http://www.openssh.org/}", +} + +@misc{ openvpn, + title = "{OpenVPN} Project", + key = "OpenVPN", + note = "\url{http://openvpn.net/}", +} + +@misc{ orkut, + title = "Orkut", + key = "Orkut", + note = "{\tt http://www.orkut.com/}", +} + +@misc{ pkzip, + title = {{PKZIP}}, + author = {{PKWARE Inc.}}, + note = {{\tt http://www.pkware.com/}}, +} + +@misc{ python, + key = {Python}, + title = {The {Python} Programming Language}, + note = {\url{http://www.python.org/}}, +} + +@misc{ rabbitmq, + key = {rabbitmq}, + title = {RabbitMQ - An Open Source Multi-Protocol Messaging Broker}, + note = {\url{https://www.rabbitmq.com/}}, +} + +@misc{ redis, + key = {Redis}, + title = {The Redis Pub Sub}, + note = {\url{http://redis.io/topics/pubsub}}, +} + +@misc{ trolltech-qt, + author = {Trolltech}, + title = {Qt Cross-Platform Application Framework}, + note = {\url{http://trolltech.com/products/qt/}} +} + +% obsoleted by rfc5533 +@misc{ shim6, + key = {Shim6}, + title = {Site Multihoming by {IPv6} Intermediation {(shim6)}}, + note = {\url{http://www.ietf.org/html.charters/shim6-charter.html}}, +} + +@misc{ skitter, + author = "CAIDA", + title = {Macroscopic Topology {AS} Adjacencies}, + note = "\url{http://www.caida.org/tools/measurement/ + skitter/as_adjacencies.xml}" +} + +@misc{ uberti04, + author = "Justin Uberti", + title = "E-mail on {IETF} {MIDCOM} mailing list", + year = "2004", + month = feb, + day = "13", + note = "Message-ID: \url{<402CEB11.1060906@aol.com>}" +} + +@misc{ zeroconf, + title = "Zero Configuration Networking {(Zeroconf)}", + key = "Zeroconf", + note = "{\tt http://www.zeroconf.org/}", +} + +@misc{ via04esther, + title = "Next Generation {C5J} {Esther} Processor Core + With Advanced Features For Securing {E}-Commerce Transactions", + author = "VIA Technologies", + year = "2004", + month = may, + note = "News Release", +} + +@misc{ via05padlock, + author = {{VIA Technologies, Inc.}}, + title = {{VIA} {PadLock} Security Engine}, + month = aug, + year = 2005, + note = {Technology Brief}, +} + +@misc{ openoffice-xml, + author = {{Sun Microsystems}}, + title = {{OpenOffice.org} {XML} File Format 1.0}, + month = dec, + year = 2002, + note = {{\small\tt xml.openoffice.org}} +} + +@misc{ openajax-two-http, + author = {OpenAjax Alliance}, + title = {The Two HTTP Connection Limit Issue}, + note = {\url{http://www.openajax.org/runtime/wiki/The_Two_HTTP_Connection_Limit_Issue}}, +} + +@misc{ mit-jos, + author = {Frans Kaashoek and others}, + title = {6.828: Operating System Engineering}, + note = {\url{http://pdos.csail.mit.edu/6.828/}}, +} + +@misc{ osi, + author = {{Open Source Initiative}}, + note = {\url{http://www.opensource.org/}}, +} + +@misc{ pios, + author = {Bryan Ford}, + title = {{PIOS}: Parallel Instructional Operating System}, + year = 2010, + note = {\url{http://zoo.cs.yale.edu/classes/cs422/pios}}, +} + +@misc{ git-scm, + key = {Git}, + title = {\href{http://git-scm.com/}{Git: The Fast Version Control System}}, +} + note = {\url{http://git-scm.com/}}, + +@misc{ mercurial-scm, + key = {Mercurial}, + title = {mercurial: distributed source control management}, + note = {\\ \url{http://mercurial.selenic.com/}}, +} + +@misc{ svn-scm, + key = {Subversion}, + title = {{Apache Subversion}}, + note = {\url{http://subversion.apache.org/}}, +} + +@misc{ skip-deltas, + key = {Skip-Deltas}, + title = {Skip-Deltas in Subversion}, + note = {\url{http://svn.apache.org/repos/asf/subversion/trunk/notes/skip-deltas}}, +} + +@misc{ xdelta, + key = {xdelta}, + title = {xdelta: open-source binary diff}, + note = {\url{http://xdelta.org}}, +} + +@article{anderson92scheduler, + author = {Thomas E. Anderson and Brian N. Bershad and Edward D. Lazowska and Henry M. Levy}, + title = {Scheduler Activations: Effective Kernel Support for the User-Level Management of Parallelism}, + journal = {ACM Transactions on Computer Systems}, + year = {1992}, + volume = {10}, + pages = {95--109} +} + +@article{ohearn07resources, +title = "Resources, concurrency, and local reasoning", +journal = "Theoretical Computer Science", +volume = "375", +number = "1-3", +pages = "271 - 307", +year = "2007", +note = "Festschrift for John C. Reynolds's 70th birthday", +issn = "0304-3975", +doi = "DOI: 10.1016/j.tcs.2006.12.035", +url = "http://www.sciencedirect.com/science/article/B6V1G-4MPKBVB-7/2/8ea8fc4dcd92e12ba34dbfacfd6a714a", +author = "Peter W. O'Hearn", +keywords = "Concurrency", +keywords = "Logics of programs", +keywords = "Separation logic" +} + + +@inproceedings{igarashi01piCalculus, + author = {Igarashi, Atsushi and Kobayashi, Naoki}, + title = {A generic type system for the Pi-calculus}, + booktitle = {POPL '01: Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages}, + year = {2001}, + isbn = {1-58113-336-7}, + pages = {128--141}, + location = {London, United Kingdom}, + doi = {http://doi.acm.org/10.1145/360204.360215}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + + +@inproceedings{ isard07automatic, + author = "Isard, Michael and Birrell, Andrew", + title = "Automatic Mutual Exclusion", + booktitle = "\bibconf[11th]{HotOS}{Workshop on + Hot Topics in Operating Systems}", + month = may, + year = "2007", + url = "https://www.usenix.org/events/hotos07/tech/full_papers/isard/isard.pdf", + location = "San Diego, California, USA", + organization = "USENIX", + publisher = "USENIX", +} + +@inproceedings{joshi05detecting, + author = {Joshi, Ashlesha and King, Samuel T. and Dunlap, George W. + and Chen, Peter M.}, + title = {Detecting past and present intrusions through + vulnerability-specific predicates}, + booktitle = {\bibconf[20th]{SOSP}{{ACM} Symposium on + Operating Systems Principles (SOSP)}}, + year = {2005}, + isbn = {1-59593-079-5}, + pages = {91--104}, + location = {Brighton, UK}, + doi = {http://doi.acm.org/10.1145/1095810.1095820}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + + +@misc{leiserson97cilk, + author = {Charles E. Leiserson and Aske Plaat}, + title = {Programming Parallel Applications in {C}ilk}, + year = 1997, + url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.31.3848&rep=rep1&type=pdf} +} + +@unpublished{leiserson98minicourse, + author = "Leiserson, Charles E. and Prokop, Harald", + title = "A Minicourse on Multithreaded Programming", + year = "1998", + note = "\url{http://supertech.csail.mit.edu/papers/minicourse.pdf}", +} + +@inproceedings{musuvathi08heisenbugs, + author = {Madanlal Musuvathi and Shaz Qadeer and Thomas Ball and + Gerard Basler}, + title = {Finding and Reproducing {Heisenbugs} in Concurrent Programs}, + booktitle = {\bibconf[8th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + year = {2008}, + publisher = {USENIX Association}, + location = {San Diego, California, USA}, + address = {Berkeley, California, USA}, + pages = {267-280}, +} + +@inproceedings{choi98deterministic, + author = {Choi, Jong-Deok and Srinivasan, Harini}, + title = {Deterministic replay of {Java} multithreaded applications}, + booktitle = {SPDT '98: Proceedings of the SIGMETRICS symposium on Parallel and distributed tools}, + year = {1998}, + isbn = {1-58113-001-5}, + pages = {48--59}, + location = {Welches, Oregon, United States}, + doi = {http://doi.acm.org/10.1145/281035.281041}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@inproceedings{emrath88automatic, + author = {Emrath, Perry A. and Padua, David A.}, + title = {Automatic detection of nondeterminacy in parallel programs}, + booktitle = {PADD '88: Proceedings of the 1988 ACM SIGPLAN and SIGOPS workshop on Parallel and distributed debugging}, + year = {1988}, + isbn = {0-89791-296-9}, + pages = {89--99}, + location = {Madison, Wisconsin, United States}, + doi = {http://doi.acm.org/10.1145/68210.69224}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@inproceedings{ pool07relaxed, + author = "Pool, Jesse and Wong, Ian Sin Kwok and Lie, David", + title = "Relaxed Determinism: Making Redundant Execution on Multiprocessors Practical", + booktitle = "\bibconf[11th]{HotOS}{Workshop on + Hot Topics in Operating Systems}", + month = may, + year = "2007", + url = "http://www.usenix.org/events/hotos07/tech/full_papers/pool/pool.pdf", + location = "San Diego, California, USA", + organization = "USENIX", + publisher = "USENIX", +} + +@inproceedings{rajagopalan07thread, + author = "Rajagopalan, Mohan and Lewis, Brian T. and Anderson, Todd A.", + title = "Thread Scheduling for Multi-Core Platforms", + booktitle = "\bibconf[11th]{HotOS}{Workshop on + Hot Topics in Operating Systems}", + month = may, + year = "2007", + url = "http://www.usenix.org/events/hotos07/tech/full_papers/rajagopalan/rajagopalan.pdf", + location = "San Diego, California, USA", + organization = "USENIX", + publisher = "USENIX", +} + +@phdthesis{roe91parallel, + author = "Roe, Paul", + title = "Parallel Programming using Functional Languages", + school = "University of Glasgow", + year = "1991", + month = "feb", + note = "\url{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.46.7763&rep=rep1&type=pdf}", +} + +@article{stumm90algorithms, +title={Algorithms implementing distributed shared memory}, +author={Stumm, M. and Zhou, S.}, +journal={Computer}, +year={1990}, +month={May}, +volume={23}, +number={5}, +pages={54-64}, +keywords={local area networks, multiprogramming, network operating systemsapplication-level access behavior, distributed shared memory, environment, local area network, local virtual address spaces, memory access behavior, multiple hosts, performance, shared memory algorithms, virtual memory systems}, +doi={10.1109/2.53355}, +ISSN={0018-9162}, +} + +@inproceedings{aspnes00deterministic, + author = {Aspnes, James}, + title = {Fast deterministic consensus in a noisy environment}, + booktitle = {PODC '00: Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing}, + year = {2000}, + isbn = {1-58113-183-6}, + pages = {299--308}, + location = {Portland, Oregon, United States}, + doi = {http://doi.acm.org/10.1145/343477.343631}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@inproceedings{barnes93method, + author = {Barnes, Greg}, + title = {A method for implementing lock-free shared-data structures}, + booktitle = {SPAA '93: Proceedings of the Fifth Annual ACM Symposium on + Parallel Algorithms and architectures}, + year = {1993}, + isbn = {0-89791-599-2}, + pages = {261--270}, + location = {Velen, Germany}, + doi = {http://doi.acm.org/10.1145/165231.165265}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{dolev08carSTM, + author = {Dolev, Shlomi and Hendler, Danny and Suissa, Adi}, + title = {{CAR-STM}: scheduling-based collision avoidance and + resolution for software transactional memory}, + booktitle = {PODC '08: Proceedings of the {T}wenty-{S}eventh ACM + {S}ymposium on {P}rinciples of {D}istributed {C}omputing}, + year = {2008}, + isbn = {978-1-59593-989-0}, + pages = {125--134}, + location = {Toronto, Canada}, + doi = {http://doi.acm.org/10.1145/1400751.1400769}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@TechReport{fraser04practical, + author = {Fraser, Keir}, + title = {{Practical lock-freedom}}, + year = 2004, + month = feb, + url = {http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-579.pdf}, + institution = {University of Cambridge, Computer Laboratory}, + issn = {1476-2986}, + number = {UCAM-CL-TR-579} +} + +@inproceedings{herlihy03stm, + author = {Herlihy, Maurice and Luchangco, Victor and Moir, Mark and Scherer,III, William N.}, + title = {Software transactional memory for dynamic-sized data structures}, + booktitle = {PODC '03: Proceedings of the twenty-second annual symposium on Principles of distributed computing}, + year = {2003}, + isbn = {1-58113-708-7}, + pages = {92--101}, + location = {Boston, Massachusetts}, + doi = {http://doi.acm.org/10.1145/872035.872048}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@article{herlihy91waitFree, + author = {Herlihy, Maurice}, + title = {Wait-free synchronization}, + journal = {ACM Trans. Program. Lang. Syst.}, + volume = {13}, + number = {1}, + year = {1991}, + issn = {0164-0925}, + pages = {124--149}, + doi = {http://doi.acm.org/10.1145/114005.102808}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@inproceedings{herlihy93tm, + author = {Herlihy, Maurice and Moss, J. Eliot B.}, + title = {Transactional memory: architectural support for lock-free data structures}, + booktitle = {ISCA '93: Proceedings of the 20th annual international symposium on Computer architecture}, + year = {1993}, + isbn = {0-8186-3810-9}, + pages = {289--300}, + location = {San Diego, California, United States}, + doi = {http://doi.acm.org/10.1145/165123.165164}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@inproceedings{herlihy93methodology, + author = {Herlihy, Maurice and Moss, J. Eliot B.}, + title = {Transactional memory: architectural support for lock-free data structures}, + booktitle = {ISCA '93: Proceedings of the 20th annual international symposium on Computer architecture}, + year = {1993}, + isbn = {0-8186-3810-9}, + pages = {289--300}, + location = {San Diego, California, United States}, + doi = {http://doi.acm.org/10.1145/165123.165164}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@article{hoare69axiomatic, + author = {Hoare, C. A. R.}, + title = {An axiomatic basis for computer programming}, + journal = {Communications of the ACM}, + volume = {12}, + number = {10}, + year = {1969}, + issn = {0001-0782}, + pages = {576--580}, + doi = {http://doi.acm.org/10.1145/363235.363259}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@book{ gosling05java, + author = {James Gosling and Bill Joy and Guy Steele and Gilad Bracha}, + title = {The {Java} Language Specification}, + edition = {third}, + publisher = {Addison-Wesley}, + year = {2005}, + month = may, +} + +@book{larus06tm, + author = {Larus, James R. and Rajwar, Ravi}, + title = {Transactional Memory}, + year = {2006}, + publisher = {Morgan \& Claypool}, + urlpage = {http://www.morganclaypool.com/doi/abs/10.2200/S00070ED1V01Y200611CAC002}, +} + + + +@inproceedings{seward05using, + author = {Seward, Julian and Nethercote, Nicholas}, + title = {Using Valgrind to detect undefined value errors with bit-precision}, + booktitle = {ATEC '05: Proceedings of the annual conference on USENIX Annual Technical Conference}, + year = {2005}, + pages = {2--2}, + location = {Anaheim, CA}, + publisher = {USENIX Association}, + address = {Berkeley, CA, USA}, + } + + +@article{nethercote03redux, +title = "Redux: A Dynamic Dataflow Tracer", +journal = "Electronic Notes in Theoretical Computer Science", +volume = "89", +number = "2", +pages = "149 - 170", +year = "2003", +note = "RV '2003, Run-time Verification (Satellite Workshop of CAV '03)", +issn = "1571-0661", +doi = "DOI: 10.1016/S1571-0661(04)81047-8", +url = "http://www.sciencedirect.com/science/article/B75H1-4DDWKTJ-PN/2/c52b80355187c6fb842f5b2f2ac32b8e", +author = "Nicholas Nethercote and Alan Mycroft" +} + +@inproceedings{reynolds02separation, +title={Separation logic: a logic for shared mutable data structures}, +author={Reynolds, J.C.}, +booktitle={Logic in Computer Science, 2002. Proceedings. 17th Annual IEEE Symposium on}, +year={2002}, +month={}, +volume={}, +number={}, +pages={ 55-74}, +keywords={ computational complexity, data structures, formal logic Hoare logic, address arithmetic, heap, imperative programming language, low-level imperative programs, program logic, reasoning, recursive procedures, separation logic, shared mutable data structures}, +doi={10.1109/LICS.2002.1029817}, +ISSN={1043-6871 }, +} + + +@inproceedings{nethercote07shadow, + author = {Nethercote, Nicholas and Seward, Julian}, + title = {How to shadow every byte of memory used by a program}, + booktitle = {VEE '07: Proceedings of the 3rd international conference on Virtual execution environments}, + year = {2007}, + isbn = {978-1-59593-630-1}, + pages = {65--74}, + location = {San Diego, California, USA}, + doi = {http://doi.acm.org/10.1145/1254810.1254820}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@article{nethercote03valgrind, +title = "Valgrind: A Program Supervision Framework", +journal = "Electronic Notes in Theoretical Computer Science", +volume = "89", +number = "2", +pages = "44 - 66", +year = "2003", +note = "RV '2003, Run-time Verification (Satellite Workshop of CAV '03)", +issn = "1571-0661", +doi = "DOI: 10.1016/S1571-0661(04)81042-9", +url = "http://www.sciencedirect.com/science/article/B75H1-4DDWKTJ-PG/2/49e9f28ff4e74ceeb8e34e4bf4050f5b", +author = "Nicholas Nethercote and Julian Seward" +} + +@inproceedings{feng07assumeGuarantee, + author = "Feng, Xinyu and Ferreira, Rodrigo and Shao, Zhong", + title = "On the Relationship Between Concurrent Separation Logic and Assume-Guarantee Reasoning", + booktitle = {\bibconf[16th]{ESOP}{European Symposium on Programming}}, + year = "2007", + pages = "173--188", + location = "Braga, Portugal", + month = jul, +} + +@inproceedings{ohearn01local, + author = "OÕHearn, Peter and Reynolds, John and Yang, Hongseok", + title = "Local Reasoning about Programs that Alter Data Structures", + booktitle = "Computer Science Logic: 15th International Workshop (CSL 2001)", + year = "2001", + pages = "1--19", + location = "Paris, France", +} +address = "Berlin, Germany", + +@article{Brookes07semantics, + title = "A semantics for concurrent separation logic", + journal = "Theoretical Computer Science", + volume = "375", + number = "1-3", + pages = "227 - 270", + year = "2007", + note = "Festschrift for John C. Reynolds's 70th birthday", + author = "Stephen Brookes", +} + +@article{terauchi08capabilityCalculus, + author = {Terauchi, Tachio and Aiken, Alex}, + title = {A capability calculus for concurrency and determinism}, + journal = {ACM Trans. Program. Lang. Syst.}, + volume = {30}, + number = {5}, + year = {2008}, + issn = {0164-0925}, + pages = {1--30}, + doi = {http://doi.acm.org/10.1145/1387673.1387676}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@inproceedings{saraswat07memmodels, + author = {Saraswat, Vijay A. and Jagadeesan, Radha and Michael, Maged and von Praun, Christoph}, + title = {A theory of memory models}, + booktitle = {PPoPP '07: Proceedings of the 12th ACM SIGPLAN symposium on Principles and practice of parallel programming}, + year = {2007}, + isbn = {978-1-59593-602-8}, + pages = {161--172}, + location = {San Jose, California, USA}, + doi = {http://doi.acm.org/10.1145/1229428.1229469}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@article{li89memoryCoherence, + author = {Li, Kai and Hudak, Paul}, + title = {Memory coherence in shared virtual memory systems}, + journal = {ACM Trans. Comput. Syst.}, + volume = {7}, + number = {4}, + year = {1989}, + issn = {0734-2071}, + pages = {321--359}, + doi = {http://doi.acm.org/10.1145/75104.75105}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@article{hudak86parafunctional, +title = {Para-Functional Programming}, +author = {Hudak, P.}, +journal = {Computer}, +year = 1986, +month = aug, +volume = 19, +number = 8, +pages={60--70}, +doi={10.1109/MC.1986.1663309}, +ISSN={0018-9162}, +} + +@article{kitchin06orc, + author = {Kitchin, David and Cook, William and Misra, Jayadev}, + title = {A Language for Task Orchestration and Its Semantic Properties}, + booktitle = {\bibconf[17th]{CONCUR}{International Conference on Concurrency Theory}}, + year = {2006}, + pages = {477--491}, + location = {Bonn, Germany}, +} + +@article{ackerman82dataflow, +title={Data Flow Languages}, +author={Ackerman, W.B.}, +journal={Computer}, +year={1982}, +month={Feb}, +volume={15}, +number={2}, +pages={ 15-25}, +doi={}, +ISSN={0018-9162}, +} + +@article{lee06problem, +title={The problem with threads}, +author={Lee, E.A.}, +journal={Computer}, +year={2006}, +month={May}, +volume={39}, +number={5}, +pages={ 33-42}, +keywords={ message passing, multi-threading MPI, OpenMP, PVM, computer architectures, concurrent programming, data-parallel language extension, general-purpose architectures, message-passing libraries, operating system, programming languages, sequential processes, software engineering, threads programming model}, +doi={10.1109/MC.2006.180}, +ISSN={0018-9162}, +} + +@article{rinard98jade, + author = {Rinard, Martin C. and Lam, Monica S.}, + title = {The design, implementation, and evaluation of Jade}, + journal = {ACM Trans. Program. Lang. Syst.}, + volume = {20}, + number = {3}, + year = {1998}, + issn = {0164-0925}, + pages = {483--545}, + doi = {http://doi.acm.org/10.1145/291889.291893}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@inproceedings{chakravarty07parallelHaskell, + author = {Chakravarty, Manuel M. T. and Leshchinskiy, Roman and + Jones, Simon Peyton and Keller, Gabriele and Marlow, Simon}, + title = {{D}ata {P}arallel {H}askell: a status report}, + booktitle = {\bibconf{DAMP}{Workshop on Declarative + Aspects of Multicore Programming}}, + year = {2007}, + isbn = {978-1-59593-690-5}, + pages = {10--18}, + location = {Nice, France}, + doi = {http://doi.acm.org/10.1145/1248648.1248652}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@book{brinchHansen02origin, + editor = {Brinch Hansen, Per}, + title = {The Origin of Concurrent Programming: From Semaphores to Remote Procedure Calls}, + year = {2002}, + publisher = {Springer-Verlag}, + address = {Berlin, Germany}, + } + +@inproceedings{hoare72theory, +author = {Hoare, C. A. R}, +title = {Towards a Theory of Parallel Programming}, +booktitle = {Operating Systems Techniques: Proceedings of a Seminar at Queen's University}, +location = {Belfast, Northern Ireland}, +year = {1972}, +editor = {Hoare, C. A. R. and Perrott, R. H.}, +publisher = {Academic Press}, +address = {New York, New York, USA}, +pages = {61--71}, +note = {Reprinted in \cite{brinchHansen02origin}, 231--244.}, +} + + +@techreport{jones93implicitExplicit, +author = {Jones, Mark and Hudak, Paul}, +title = {Implicit and Explicit Parallel Programming in {H}askell}, +institution = {Yale University}, +year = {1993}, +type = {Research Report}, +number = {YALEU/DCS/RR-982}, +month = {Aug}, +address = {New Haven, Connecticut, USA}, +note = {\url{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.125.3273&rep=rep1&type=pdf}}, +} + +@article{terauchi05witnessingSideEffects, + author = {Terauchi, Tachio and Aiken, Alex}, + title = {Witnessing side effects}, + journal = {ACM Trans. Program. Lang. Syst.}, + volume = {30}, + number = {3}, + year = {2008}, + issn = {0164-0925}, + pages = {1--42}, + doi = {http://doi.acm.org/10.1145/1353445.1353449}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@inproceedings{boyland03checkingInterference, + author = {Boyland, John}, + title = {Checking Interference with Fractional Permissions}, + booktitle = {\bibconf{SAS}{International Symposium on Static Analysis}}, + pages = {1075--1075}, + location = {San Diego, California, USA}, + month = {Jun}, + year = {2003}, +} + + +@article{ohearn99logicBunchedImplications, + title = {The Logic of Bunched Implications}, + author = {O'Hearn, Peter W. and Pym, David J.}, + journal = {The Bulletin of Symbolic Logic}, + volume = {5}, + number = {2}, + pages = {215--244}, + note = {\url{http://www.jstor.org/stable/421090}}, + issn = {10798986}, + year = {1999}, + publisher = {Association for Symbolic Logic}, +} + + + +@inproceedings{tesler68languageDesign, + author = {Tesler, L. G. and Enea, H. J.}, + title = {A language design for concurrent processes}, + booktitle = {AFIPS '68 (Spring): Proceedings of the April 30--May 2, 1968, spring joint computer conference}, + year = {1968}, + pages = {403--408}, + location = {Atlantic City, New Jersey}, + doi = {http://doi.acm.org/10.1145/1468075.1468134}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + + @inproceedings{anderson08sharC, + author = {Anderson, Zachary and Gay, David and Ennals, Rob and Brewer, Eric}, + title = {{SharC}: checking data sharing strategies for multithreaded {C}}, + booktitle = {PLDI '08: Proceedings of the 2008 ACM SIGPLAN conference on Programming language design and implementation}, + year = {2008}, + isbn = {978-1-59593-860-2}, + pages = {149--158}, + location = {Tucson, AZ, USA}, + doi = {http://doi.acm.org/10.1145/1375581.1375600}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@article{sutter05softwareConcurrencyRevolution, + author = {Sutter, Herb and Larus, James}, + title = {Software and the Concurrency Revolution}, + journal = {Queue}, + volume = {3}, + number = {7}, + year = {2005}, + issn = {1542-7730}, + pages = {54--62}, + doi = {http://doi.acm.org/10.1145/1095408.1095421}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@article{adl-tabatabai06unlockingConcurrency, + author = {Adl-Tabatabai, Ali-Reza and Kozyrakis, Christos and Saha, Bratin}, + title = {Unlocking Concurrency}, + journal = {Queue}, + volume = {4}, + number = {10}, + year = {2007}, + issn = {1542-7730}, + pages = {24--33}, + doi = {http://doi.acm.org/10.1145/1189276.1189288}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@techreport{anderson08sharCtechReport, + author = {Anderson, Zachary and Gay, David and Ennals, Rob and Brewer, Eric}, + title = {SharC: checking data sharing strategies for multithreaded C}, + institution = {\bibbrev{UCB EECS}{Department of Electrical Engineering and Computer Science, + University of California, Berkeley}}, + year = 2008, + type = {Technical Report}, + number = {UCB/EECS-2008-25}, + address = {Berkeley, California, USA}, + month = mar, + note = {\url{http://www.eecs.berkeley.edu/Pubs/TechRpts/2008/EECS-2008-25.pdf}}, +} + +@article{hudak89conceptionEvolutionApplication, + author = {Hudak, Paul}, + title = {Conception, evolution, and application of functional programming languages}, + journal = {ACM Comput. Surv.}, + volume = {21}, + number = {3}, + year = {1989}, + issn = {0360-0300}, + pages = {359--411}, + doi = {http://doi.acm.org/10.1145/72551.72554}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@article{savage97eraser, + author = {Savage, Stefan and Burrows, Michael and Nelson, Greg and Sobalvarro, Patrick and Anderson, Thomas}, + title = {Eraser: a dynamic data race detector for multithreaded programs}, + journal = {ACM Trans. Comput. Syst.}, + volume = {15}, + number = {4}, + year = {1997}, + issn = {0734-2071}, + pages = {391--411}, + doi = {http://doi.acm.org/10.1145/265924.265927}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + + + +@inproceedings{dubois86memoryAccessBuffering, + author = {Dubois, M. and Scheurich, C. and Briggs, F.}, + title = {Memory access buffering in multiprocessors}, + booktitle = {ISCA '86: Proceedings of the 13th annual international symposium on Computer architecture}, + year = {1986}, + isbn = {0-8186-0719-X}, + pages = {434--442}, + location = {Tokyo, Japan}, + doi = {http://doi.acm.org/10.1145/17407.17406}, + publisher = {IEEE Computer Society Press}, + address = {Los Alamitos, CA, USA}, +} + + +@book{reynolds98theories, + author = {Reynods, John C.}, + title = {Theories of Programming Languages}, + publisher = {Cambridge University Press}, + year = {1998}, + address = {Cambridge, UK}, +} + +@inbook{reynolds98nondeterminism, + author = {Reynods, John C.}, + title = {Chapter 7. Nondeterminism and Guarded Commands}, + booktitle = {Theories of Programming Languages}, + pages = {136--154}, + publisher = {Cambridge University Press}, + year = {1998}, + address = {Cambridge, UK}, +} + +@inbook{reynolds98concurrency, + author = {Reynods, John C.}, + title = {Chapter 8. {S}hared Variable Concurrency}, + booktitle = {Theories of Programming Languages}, + pages = {155--1180}, + publisher = {Cambridge University Press}, + year = {1998}, + address = {Cambridge, UK}, +} + +@inproceedings{bennett90munin, + author = {Bennett, J. K. and Carter, J. B. and Zwaenepoel, W.}, + title = {Munin: distributed shared memory based on + type-specific memory coherence}, + booktitle = {\bibconf[2nd]{PPOPP}{{ACM SIGPLAN} symposium on {P}rinciples \& practice + of parallel programming}}, + year = {1990}, + pages = {168--176}, + location = {Seattle, WA} +} + + +@article{muehlenfeld07faultDetection, +title = "Fault Detection in Multi-Threaded C++ Server Applications", +journal = "Electronic Notes in Theoretical Computer Science", +volume = "174", +number = "9", +pages = "5 - 22", +year = "2007", +note = "Proceedings of the Thread Verification Workshop (TV 2006)", +issn = "1571-0661", +doi = "DOI: 10.1016/j.entcs.2007.04.004", +url = "http://www.sciencedirect.com/science/article/B75H1-4NYD490-2/2/181e46d1b8e986484db0d034546ac20f", +author = "Arndt Mühlenfeld and Franz Wotawa", +} + + + +@inproceedings{ritchie80unix, + author = {Ritchie, Dennis}, + title = {The evolution of the {Unix} time-sharing system}, + booktitle = {Language Design and Programming Methodology}, + series = {\bibbrev{LNCS}{Lecture Notes in Computer Science}}, + pages = {25--35}, + year = 1980, + location = {Sydney, Australia}, + month = sep, + publisher = {Springer-Verlag}, + address = {Berlin, Germany}, +} + +@inproceedings{behren03, + author={Rob von Behren and Jeremy Condit and Feng Zhou + and George C. Necula and Eric Brewer}, + title={Capriccio: {S}calable Threads for Internet Services}, + booktitle={{SOSP}'03}, +} + +@misc{ ford10pios, + author = {Bryan Ford}, + title = {{PIOS}: Parallel Instructional Operating System}, + month = may, + year = 2010, + note = {\url{http://zoo.cs.yale.edu/classes/cs422/pios}} +} + +@misc{ domp, + author = {Amittai and Bryan Ford}, + title = {Deterministic {OpenMP}}, + month = jan, + year = 2010, + note = {\em Under submission.}, +} + +@misc{kvm, + author = {Qumranet}, + title = {Kernel-based Virtual Machine for Linux}, + howpublished = {\url{http://kvm.qumranet.com/kvmwiki}}, + month = {March}, + day = {14}, + year = {2007} +} + +@misc{aufs, + author = {Junjiro R. Okajima}, + year = {2013}, + month = {January}, + howpublished = {\url{http://aufs.sourceforge.net/}}, + title = {Aufs3 -- advanced multi layered unification filesystem version 3.3}, +} + +@misc{peacekeeper, + author = {Futuremark}, + title = {Peacekeeper -- The Universal Browser Test}, + year = {2013}, + month = {January}, + howpublished = {\url{http://peacekeeper.futuremark.com}}, +} + +@misc{hpopenview, + title = {{Open View: HP Technologies Inc.}}, + note = {\url{http://www.openview.hp.com.}} +} + +@misc{iCloud, + title = {{Apple's iCloud runs on Microsoft's Azure and Amazon's cloud}}, + note = {\url{http://venturebeat.com/2011/09/03/icloud-azure-amazon/}} +} + +@misc{lshw, + title = {{Hardware Lister (lshw)}}, + note = {\url{http://ezix.org/project/wiki/HardwareLiSter}} +} + +@misc{Azure, + title = {{Microsoft Azure}}, + note = {\url{http://www.windowsazure.com/}} +} + +@misc{EC2, + title = {{Amazon EC2 Web Services}}, + note = {\url{http://aws.amazon.com/ec2/}} +} + +@misc{S3, + title = {{Amazon S3's Redundant Storage}}, + note = {\url{http://aws.amazon.com/s3/faqs/}} +} + +@misc{HDFS, + title = {{Hadoop distributed file system (HDFS)}}, + note = {\url{http://www-01.ibm.com/software/data/infosphere/hadoop/hdfs/}} +} + +@misc{Netflix, + title = {Netflix}, + note = {\url{https://signup.netflix.com/}} + +} + +@misc{Beat, + title = {{How Netflix, Zynga Beat Amazon Cloud Failure}}, + note = {\url{http://www.informationweek.com/news/cloud-computing/infrastructure/232200511}} + +} + +@misc{Zynga, + title = {Zynga}, + note = {\url{https://zynga.com/}} +} + +@misc{hurricanesandy12, + title = {{Hurricane Sandy takes data centers + offline with flooding, power outages}}, + author = {Jon Brodkin}, + year = {2012}, + month = {10}, + note = {\url{http://arstechnica.com/information-technology/2012/10/hurricane_sandy_takes_data_centers_offline_with_flooding_power_outages/}} +} + +@misc{powerOut, + title = {{Netflix Outage}}, + note = {\url{http://www.huffingtonpost.com/2012/07/02/amazon-power-outage-cloud-computing_n_1642700.html}} +} + +@misc{christmasoutage12, + title = {{EC2 Outages on Christmas Day of 2012}}, + note = {\url{http://my.chicagotribune.com/#section/-1/ + article/p2p-73813597/}} +} + +@misc{EC2Crash11, + title = {{EC2 Crash in April of 2011}}, + note = {\url{http://money.cnn.com/2011/04/21/technology/ + amazon_server_outage/index.htm}} + +} + +@misc{storm12, + title = {{Internet Outages Highlight Problem for + Cloud Computing: Actual Clouds}}, + note = {\url{http://www.slate.com/blogs/future_tense/2012/07/02/ + amazon_ec2_outage_netflix_pinterest_instagram_ + down_after_aws_cloud_loses_power.html}} +} + +@misc{amazon12summary, + title = {{Summary of the Amazon EC2, Amazon EBS, + and Amazon RDS Service Event in the EU West Region}}, + note = {\url{http://aws.amazon.com/message/2329B7/}} +} + +@misc{ebscorrelated, + title = {{Correlated Failures within EBS and EC2}}, + note = {\url{https://aws.amazon.com/message/680342/}} +} + +@misc{networkx, + title = {{NetworkX}}, + note = {\url{http://networkx.github.com/}} +} + +@misc{EBS, + title = {{Amazon EBS}}, + note = {\url{http://aws.amazon.com/ebs/}} +} + +@misc{iCloudEvent, + title = {{iCloud Outage}}, + note = {\url{http://reviews.cnet.com/8301-13727_7-57511311-263/icloud-outage-affecting-users-for-two-days-running/}} +} + +@misc{Top10-2013, + title = {{The 10 Biggest Cloud Outages of 2013}}, + note = {\url{http://www.crn.com/slide-shows/cloud/240158298/the-10-biggest-cloud-outages-of-2013-so-far.htm?pgno=1}} +} + +@misc{zoo, + title = {{Yale Cluster}}, + note = {\url{http://zoo.cs.yale.edu/}} +} + +@misc{OpenStack, + title = {{OpenStack}}, + note = {\url{http://www.openstack.org/}} +} + +@misc{secrec, + title = {{The SecreC Language}}, + note = {\url{http://sharemind.cyber.ee/the-secrec-language}} +} + +@misc{wd, + title = {{Western digital support}}, + note = {\url{http://www.wdc.com/en/}} +} + +@misc{openstack-overview, + title = {{An Overview of OpenStack}}, + note = {\url{http://www.openstack.org/downloads/openstack-compute-datasheet.pdf}} +} + +@misc{Riak, + title = {{Riak 1.3.1}}, + note = {\url{http://docs.basho.com/riak/1.3.1/downloads/}} +} + +@misc{Baltimore2001, + author="The Associated Press", + title="Fire in Baltimore Snarls {I}nternet Traffic, Too", + year="2001", + month="July", + day="20", + note = {\url{http://www.nytimes.com/2001/07/20/technology/20BALT.html}} +} + +@misc{loadbalance, + title = {{ELB Service outage due to the failure of load balancers}}, + note = {\url{http://aws.amazon.com/message/680587/}} +} + +@misc{amazondc, + title = {{A Look Inside Amazon's Data Centers.}}, + note = {\url{http://www.datacenterknowledge.com/archives/2011/06/09/a-look-inside-amazons-data-centers/}} +} + +@misc{survey09, + title = {{Survey: Cloud computing `No Hype', but fear of security and control slowing adoption}}, + note = {\url{http://www.circleid.com/posts/20090226_cloud_computing_hype_security}} +} + +@article{euro11, + author = {Jack Clark}, + title = {Lightning strikes {A}mazon's {E}uropean cloud}, + journal = {ZDNet}, + month = aug, + year = 2011, + note = + {\url{http://www.zdnet.com/lightning-strikes-amazons-european-cloud-3040093641/}, + accessed on Sep 9, 2014} +} + +@misc{thep, + title = {Homomorphic Encryption Project}, + note = {\url{https://code.google.com/p/thep/}} +} + +@inproceedings{aviram2012generalized, + title={A generalized reduction construct for deterministic OpenMP}, + author={Aviram, Amittai and Ford, Bryan}, + booktitle={3rd Workshop on Determinism and Correctness in Parallel Programming (WoDet), London, England}, + year={2012} +} + +@misc{dep, + title = {Package dependency graph generation tool}, + note = {\url{https://apps.ubuntu.com/cat/applications/quantal/debtree/}} +} + +@misc{dep2, + title = {apt-rdepends}, + note = {\url{http://packages.debian.org/sid/apt-rdepends}} +} + +@misc{Zynge, + title = {Zynga}, + note = {\url{https://zynga.com}} +} + +@misc{NetflixandZynga, + title = {{How Netflix, Zynga Beat Amazon Cloud Failure}}, + note = {\url{http://www.informationweek.com/news/cloud-computing/infrastructure/232200511}} +} + +@misc{andinverter, + title = {And-Inverter Graph}, + note = {\url{http://en.wikipedia.org/wiki/And-inverter_graph}} +} + +@misc{keepass, + title = {{KeePass}}, + note = {\url{http://keepass.info/}}, +} + +@misc{opencv, + title = {{OpenCV}}, + note = {\url{http://opencv.org}}, +} + +@misc{vmwarefusionmigrate, + title = {Migrating a {Windows PC} to run in {VMWare Fusion}}, + year = {2008}, + howpublished = {\url{https://www.vmware.com/pdf/migrating_physical_pc_to_fusion.pdf}}, +} + +@misc{gplv2, + title = {{GNU} General Public License, version 2}, + year = {1991}, + month = {june}, + howpublished = {\url{http://www.gnu.org/licenses/gpl-2.0.html}}, +} + +@misc{cvss, + author = {{National Institute of Standards and Technology}}, + title = {{Common Vulnerability Scoring System (CVSS)}}, + note = {\url{http://nvd.nist.gov/cvss.cfm}, accessed on Sep 9, 2014} +} + + +@misc{snort, + title = {snort}, + note = {\url{http://www.snort.org}}, +} + +@misc{stackoverflow-dataset, + title = {StackOverflow Dataset}, + note = {\url{http://www.ics.uci.edu/~duboisc/stackoverflow/}} +} diff --git a/pdf/sec.bib b/pdf/sec.bib new file mode 100644 index 0000000..685a091 --- /dev/null +++ b/pdf/sec.bib @@ -0,0 +1,7701 @@ +%A + +@inproceedings{abe00secure, + title={Provably secure partially blind signatures}, + author={Abe, Masayuki and Okamoto, Tatsuaki}, + booktitle={\bibconf[20th]{CRYPTO}{International Cryptology Conference}}, + location = {Santa Barbara, CA}, + mon = aug, + year=2000 +} + +@inproceedings{abe02one, + title={1-out-of-$n$ signatures from a variety of keys}, + author={Abe, M. and Ohkubo, M. and Suzuki, K.}, + booktitle={{ASIACRYPT}}, + pages={639--645}, + year={2002}, + publisher={Springer} +} + +@article{abraham16solidus, + author = {Ittai Abraham and + Dahlia Malkhi and + Kartik Nayak and + Ling Ren and + Alexander Spiegelman}, + title = {\href{http://arxiv.org/abs/1612.02916}{Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless + Byzantine Consensus}}, + journal = {CoRR}, + volume = {abs/1612.02916}, + year = {2016}, + url = {http://arxiv.org/abs/1612.02916}, + timestamp = {Sat, 11 Feb 2017 15:57:00 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/corr/AbrahamMNRS16}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + +@techreport{ abraham17state, + author = {Ronald Abraham and Elizabeth S. Bennett and + Noopur Sen and Neil Buddy Shah}, + title = {\href{https://stateofaadhaar.in/wp-content/uploads/State-of-Aadhaar-Full-Report-2016-17-IDinsight.pdf}{State of Aadhaar Report 2016-17}}, + institution = {IDinsight}, + month = may, + year = 2017, +} + +@misc{ abraham17revisiting, + author = {Ittai Abraham and Guy Gueta and Dahlia Malkhi and + Lorenzo Alvisi and Rama Kotla and Jean-Philippe Martin}, + title = {\href{https://arxiv.org/pdf/1712.01367.pdf}{Revisiting Fast Practical Byzantine Fault Tolerance}}, + month = dec, + year = 2017, +} + +@misc{ abraham18dfinity, + author = {Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren}, + title = {\href{https://eprint.iacr.org/2018/1153}{Dfinity Consensus, Explored}}, + howpublished = {Cryptology ePrint Archive, Report 2018/1153}, + month = nov, + year = 2018, +} + +@techreport{ abraham18state, + author = {Ronald Abraham and Elizabeth S. Bennett and + Rajesh Bhusal and Shreya Dubey and Qian (Sindy) Li and + Akash Pattanayak and Neil Buddy Shah}, + title = {\href{https://stateofaadhaar.in/wp-content/uploads/State-of-Aadhaar-Report_2017-18.pdf}{State of Aadhaar Report 2017-18}}, + institution = {IDinsight}, + month = may, + year = 2018, +} + +% obsoleted by conference paper: abraham19vaba +@article{abraham18vaba, + author = {Ittai Abraham and + Dahlia Malkhi and + Alexander Spiegelman}, + title = {\href{https://arxiv.org/abs/1811.01332}{Validated Asynchronous Byzantine Agreement with Optimal Resilience and Asymptotically Optimal Time and Word Communication}}, + journal = {CoRR}, + volume = {abs/1811.01332}, + year = {2018}, + url = {https://arxiv.org/abs/1811.01332}, +} + +@inproceedings{ abraham19vaba, + author = {Ittai Abraham and Dahlia Malkhi and Alexander Spiegelman}, + title = {\href{https://dahliamalkhi.files.wordpress.com/2019/06/vaba-podc2019-2.pdf}{Asymptotically Optimal Validated Asynchronous Byzantine Agreement}}, + booktitle = {\bibconf{PODC}{ACM Symposium on Principles of Distributed Computing}}, + month = jul, + year = 2019, + location = {Toronto, Ontario, Canada}, +} + +@misc{ abley10dnssec, + author = {Joe Abley and David Blacka and David Conrad and Richard Lamb and Matt Larson and Fredrik Ljunggren and David Knight and Tomofumi Okubo and Jakob Schlyter}, + title = {\href{http://www.root-dnssec.org/wp-content/uploads/2010/06/draft-icann-dnssec-arch-v1dot4.pdf}{DNSSEC Root Zone -- High Level Technical Architecture}}, + month = jun, + year = 2010, + note = {Version 1.4}, +} + +@article{ ackerman15fbi, + author = {Spencer Ackerman}, + title = {\href{http://www.theguardian.com/technology/2015/jul/08/fbi-chief-backdoor-access-encryption-isis}{FBI chief wants 'backdoor access' to encrypted communications to fight Isis}}, + journal = {The Guardian}, + month = jul, + year = 2015, +} + +@article{adams01internet, + title={Internet {X}.509 Public Key Infrastructure Time Stamp Protocol {(TSP)}}, + author={Adams, Carlisle and Pinkas, Denis}, + year={2001} +} + +@inproceedings{ adida08helios, + author = {Ben Adida}, + title = {Helios: Web-based Open-Audit Voting}, + booktitle={USENIX Security Symposium}, + month = jul, + year = 2008, + location = {San Jose, CA}, +} + +@inproceedings{adleman83implementing, + title={Implementing an electronic notary public}, + author={Adleman, Leonard M}, + booktitle={Advances in Cryptology}, + year={1983}, +} + +@inproceedings{adrian15imprefect, + title = {\href{https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf}{Imperfect Forward Secrecy: {H}ow {D}iffie-{H}ellman Fails in Practice}}, + author = {David Adrian and Karthikeyan Bhargavan and Zakir Durumeric + and Pierrick Gaudry and Matthew Green and J. Alex + Halderman and Nadia Heninger and Drew Springall and + Emmanuel Thom\'e and Luke Valenta and Benjamin + VanderSloot and Eric Wustrow and Santiago + Zanella-B\'eguelin and Paul Zimmermann}, + booktitle = {ACM Conference on Computer and Communications Security}, + month = oct, + year = 2015 +} + +@incollection{ aggarwal08general, + author = {Charu C. Aggarwal and Philip S. Yu}, + title = {A General Survey of Privacy-Preserving Data Mining Models + and Algorithms}, + booktitle = {Privacy-Preserving Data Mining: Models and Algorithms}, + isbn = {978-0-387-70991-8}, + publisher = {Springer}, + year = 2008, + chapter = {2}, + pages = {11-52}, +} + +@article{ akamai16akamai, + author = {Akamai Technologies, Inc.}, + title = {\href{https://www.akamai.com/}{Akamai: Content Delivery Network (CDN) \& Cloud Computing + }}, + month = may, + year = 2016, +} + + +@inproceedings{ alhamed13opensource, + author = {Alhamed, Khalid and Silaghi, Marius C. and Hussien, Ihsan and + Yang, Yi}, + title = + {\href{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.381.4290&rep=rep1&type=pdf} + {Security by Decentralized Certification of Automatic-Updates for Open Source + Software controlled by Volunteers}}, + booktitle = {Workshop on Decentralized Coordination}, + year = {2013} +} + + +@inproceedings{ alhamed13stacking, + author = {Alhamed, Khalid and Silaghi, Marius C. and Hussien, Ihsan and + Stansifer, Ryan and Yang, Yi}, + title = {\href{http://dx.doi.org/10.1109/WI-IAT.2013.123}{"Stacking the Deck" + Attack on Software Updates: Solution by Distributed Recommendation of + Testers}}, + booktitle = {Proceedings of the 2013 IEEE/WIC/ACM International Joint + Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) + - Volume 02}, + series = {WI-IAT '13}, + year = {2013}, + pages = {293--300}, + numpages = {8}, + publisher = {IEEE Computer Society}, +} + + +@inproceedings{al18chainspace, + author = {Mustafa Al{-}Bassam and Alberto Sonnino and Shehar Bano and + Dave Hrycyszyn and George Danezis}, + title = {\href{https://arxiv.org/pdf/1708.03778.pdf}{Chainspace: {A} Sharded Smart Contracts Platform}}, + booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} + 2018, San Diego, California, USA, February 18-21, 2018}, + year = {2018}, +} + + +@inproceedings{ali16blockstack, + author = {Muneeb Ali and Jude Nelson and Ryan Shea and Michael J. Freedman}, + title = {\href{https://www.usenix.org/conference/atc16/technical-sessions/presentation/ali}{Blockstack: A Global Naming and Storage System Secured by Blockchains}}, + booktitle = {2016 USENIX Annual Technical Conference (USENIX ATC 16)}, + year = {2016}, + month = Jun, + isbn = {978-1-931971-30-0}, + address = {Denver, CO}, + pages = {181--194}, + publisher = {USENIX Association}, +} + +@inproceedings{ alicherry09doublecheck, + author = {Mansoor Alicherry and Angelos D. Keromytis}, + title = {{DoubleCheck}: Multi-path Verification Against + Man-in-the-Middle Attacks}, + booktitle = {\bibconf[14th]{ISCC}{IEEE Symposium on + Computers and Communications}}, + month = jul, + year = 2009, +} + +@misc{ allen18evoting, + author = {Jeff R. Allen}, + title = {\href{https://blog.dedis.ch/post/evoting/}{E-voting at EPFL}}, + howpublished = {\href{https://blog.dedis.ch}{DEDIS laboratory blog}}, + month = jul, + year = 2018, +} + +@inproceedings{ ambrosin14updaticator, + author={Ambrosin, Moreno and Busold, Christoph + and Conti, Mauro and Sadeghi, Ahmad-Reza and Schunter, Matthias}, + editor={Kuty{\l}owski, Miros{\l}aw and Vaidya, Jaideep}, + title={\href{http://www.schunter.org/blog/wp-content/uploads/2014/09/main.pdf} + {Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure + Software Update Distribution over Untrusted Cache-enabled Networks}}, + booktitle={Computer Security - ESORICS 2014: 19th European Symposium on + Research in Computer Security, Proceedings, Part I}, + year= {2014} +} + + +@article{amroudi17verifiable, + title={\href{https://link.springer.com/article/10.1007/s11277-017-4245-9}{A Verifiable (k, n, m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem}}, + author={Amroudi, Ali Nakhaei and Zaghain, Ali and Sajadieh, Mahdi}, + journal={Wireless Personal Communications}, + volume={96}, + number={1}, + pages={1393--1405}, + year={2017}, + publisher={Springer} +} + + +@misc{ andresen16classic, + author = {Gavin Andresen}, + title = {\href{http://gavinandresen.ninja/classic-unlimited-xt-core}{{Classic? Unlimited? XT? Core?}}}, + month = jan, + year = 2016, + url = {http://gavinandresen.ninja/classic-unlimited-xt-core}, +} + +@inproceedings{andrychowicz14secure, + title={\href{https://ieeexplore.ieee.org/abstract/document/6956580}{Secure multiparty computations on bitcoin}}, + author={Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz}, + booktitle={Security and Privacy (SP), 2014 IEEE Symposium on}, + pages={443--458}, + year={2014}, + organization={IEEE} +} + +@inproceedings{androulaki08reputation, + author = {Elli Androulaki and + Seung Geol Choi and + Steven M. Bellovin and + Tal Malkin}, + title = {Reputation systems for anonymous networks}, + booktitle = {\bibconf[8th]{PETS}{Privacy Enhancing Technologies}}, + location = {Leuven, Belgium}, + month = jul, + year = 2008 +} + +@inproceedings{androulaki18hyperledger, + author = {Elli Androulaki and + Artem Barger and + Vita Bortnikov and + Christian Cachin and + Konstantinos Christidis and + Angelo De Caro and + David Enyeart and + Christopher Ferris and + Gennady Laventman and + Yacov Manevich and + others}, + title = {\href{https://arxiv.org/pdf/1801.10228v1.pdf}{Hyperledger fabric: a distributed operating system for permissioned + blockchains}}, + booktitle = {Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, + Portugal, April 23-26, 2018}, + pages = {30:1--30:15}, + year = {2018}, + url = {http://doi.acm.org/10.1145/3190508.3190538}, + doi = {10.1145/3190508.3190538}, + timestamp = {Wed, 18 Apr 2018 10:45:31 +0200}, + biburl = {https://dblp.org/rec/bib/conf/eurosys/AndroulakiBBCCC18}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{androulaki18channels, + title={\href{https://link.springer.com/chapter/10.1007/978-3-319-99073-6_6}{Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains}}, + author={Androulaki, Elli and Cachin, Christian and De Caro, Angelo and Kokoris-Kogias, Eleftherios}, + booktitle={European Symposium on Research in Computer Security}, + pages={111--131}, + year={2018}, + organization={Springer} +} + +@article{ anderson13cell, + author = {Nate Anderson}, + title = {\href{http://arstechnica.com/tech-policy/2013/08/how-cell-tower-dumps-caught-the-high-country-bandits-and-why-it-matters/}{How ``cell tower dumps'' caught the {High Country Bandits}---and why it matters}}, + journal = {arstechnica}, + month = aug # "~29,", + year = 2013, + day = 29, +} + +@misc{ ansi16trusted, + author = {{American National Standards Institute}}, + title = {\href{https://webstore.ansi.org/standards/ascx9/ansix9952016}{ANSI X9.95-2016: Trusted Time Stamp Management And Security}}, + month = dec, + year = 2016, +} + +@article{apostolaki16hijacking, + title={\href{http://arxiv.org/abs/1605.07524}{Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies}}, + author={Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent}, + journal = {38th IEEE Symposium on Security and Privacy}, + month = may, + year = {2017}, + location = {San Jose, CA}, +} + +@misc{ apple14icloud, + author = {Apple Support}, + title = {\href{https://support.apple.com/en-us/HT204085}{Frequently asked questions about iCloud Keychain}}, + month = may, + year = 2016, +} + +@inproceedings{ ariyapperuma07security, + author = {Suranjith Ariyapperuma and Chris J. Mitchell}, + title = {\href{https://repository.royalholloway.ac.uk/file/f209fcf0-4b82-e17c-656d-e832730b2037/10/svidad.pdf}{Security vulnerabilities in {DNS} and {DNSSEC}}}, + booktitle = {\bibconf[2nd]{ARES}{International Conference on + Availability, Reliability and Security}}, + month = apr, + year = 2007, +} + +@article{ arthur11diginotar, + author = { Charles Arthur}, + title = {\href{http://www.theguardian.com/technology/2011/sep/05/diginotar-certificate-hack-cyberwar}{DigiNotar SSL certificate hack amounts to cyberwar, says expert}}, + journal = {The Guardian}, + month = sep, + year = 2011, + day = 5, +} + +@article{ateniese06improved, + title={\href{https://dl.acm.org/citation.cfm?id=1127346}{Improved proxy re-encryption schemes with applications to secure distributed storage}}, + author={Ateniese, Giuseppe and Fu, Kevin and Green, Matthew and Hohenberger, Susan}, + journal={ACM Transactions on Information and System Security (TISSEC)}, + volume={9}, + number={1}, + pages={1--30}, + year={2006}, + publisher={ACM} +} + +@article{arma14disable, + author = {Arma}, + title = {\href{https://blog.torproject.org/blog/possible-upcoming-attempts-disable-tor-network}{Possible upcoming attempts to disable the Tor network}}, + journal = {Tor Project Blog}, + month = december, + year = 2014, + day = 19, +} + +@inproceedings{ateniese00practical, + title={A practical and provably secure coalition-resistant group signature scheme}, + author={Ateniese, Giuseppe and Camenisch, Jan and Joye, Marc and Tsudik, Gene}, + booktitle={\bibconf[20th]{CRYPTO}{International Cryptology Conference}}, + location = {Santa Barbara, CA}, + mon = aug, + year=2000 +} + +@inproceedings{ateniese03quasi, + title={Quasi-efficient revocation of group signatures}, + author={Ateniese, Giuseppe and Song, Dawn and Tsudik, Gene}, + booktitle={\bibconf[7th]{FC}{Financial Cryptography Conference}}, + location = {Guadeloupe, France}, + month = jan, + year = 2003 +} + +@article{ attah19five, + author = {Elikem Attah}, + title = {\href{https://cryptoslate.com/prolific-51-attacks-crypto-verge-ethereum-classic-bitcoin-gold-feathercoin-vertcoin/}{Five most prolific 51\% attacks in crypto: Verge, Ethereum Classic, Bitcoin Gold, Feathercoin, Vertcoin}}, + journal = {Cryptoslate}, + month = apr, + year = 2019, +} + +@inproceedings{atzei17attacks, + author = {Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana}, + title = {\href{https://doi.org/10.1007/978-3-662-54455-6_8}{A Survey of Attacks on Ethereum Smart Contracts SoK}}, + booktitle = {Proceedings of the 6th International Conference on Principles of Security and Trust - Volume 10204}, + year = {2017}, + pages = {164--186}, + publisher = {Springer-Verlag New York, Inc.}, +} + +@misc{ augur, + title = {\href{https://www.augur.net/}{Augur: A Decentralized Oracle \& Prediction Market + Protocol}}, +} + +@inproceedings{ aura06scanning, + author = {Aura, Tuomas and Kuhn, Thomas A. and Roe, Michael}, + title = {Scanning electronic documents + for personally identifiable information}, + booktitle = {\bibconf[5th]{WPES}{ACM workshop on Privacy in electronic society}}, + year = {2006}, + location = {Alexandria, Virginia, USA}, + pages = {41--50}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{au08practical, + author = {Man Ho Au and + Willy Susilo and + Yi Mu}, + title={Practical anonymous divisible E-Cash from bounded accumulators}, + booktitle={\bibconf[12th]{FC}{Financial Cryptography and Data Security}}, + location = {Cozumel, Mexico}, + month = jan, + year=2008 +} + +@inproceedings{au12blacr, + title={{BLACR}: {TTP}-Free Blacklistable Anonymous Credentials with Reputation}, + author={Man H Au and + Apu Kapadia and + Willy Susilo}, + booktitle={\bibconf[19th]{NDSS}{Annual Network \& Distributed System Security + Symposium}}, + location = {San Diego, CA}, + month = Feb, + year=2012 +} + +@misc{ aubort18epfl, + author = {Sarah Aubort}, + title = {\href{https://actu.epfl.ch/news/epfl-uses-blockchain-technology-to-secure-e-voting/}{EPFL uses blockchain technology to secure e-voting systems}}, + howpublished = {EPFL News}, + month = jun, + year = 2018, +} + +@inproceedings{azaria16medrec, + title={\href{https://ieeexplore.ieee.org/abstract/document/7573685/}{Medrec: Using blockchain for medical data access and permission management}}, + author={Azaria, Asaph and Ekblaw, Ariel and Vieira, Thiago and Lippman, Andrew}, + booktitle={Open and Big Data (OBD), International Conference on}, + pages={25--30}, + year={2016}, + organization={IEEE} +} + +%B + +@inproceedings{backes14backref, + author = {Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter}, + title = {{BackRef}: Accountability in Anonymous Communication Networks}, + booktitle = {\bibbrev{ACNS}{Applied Cryptography and Network Security}}, + year = {2014}, +} + +@inproceedings{backstrom07wherefore, + author = {Lars Backstrom and + Cynthia Dwork and + Jon M. Kleinberg}, + title = {Wherefore art thou r3579x?: anonymized social networks, + hidden patterns, and structural steganography}, + booktitle = {\bibconf[16th]{WWW}{International Conference + on World Wide Web}}, + month = may, + year = 2007, + location = {Canada} +} + +@misc{ badertscher19ouroboros, + author = {Christian Badertscher and Peter Ga\u{z}i and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, + title = {\href{https://eprint.iacr.org/2019/838}{Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake}}, + howpublished = {Cryptology ePrint Archive, Report 2019/838}, + year = {2019}, +} + +@inproceedings{ baek04identity, + author = {Joonsang Baek and Yuliang Zheng}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-540-24632-9_19}{Identity-Based Threshold Decryption}}, + booktitle = {\bibconf[7th]{PKC}{International Workshop on Theory and Practice in Public Key Cryptography}}, + month = mar, + year = 2004, + location = {Singapore}, +} + +@inproceedings{ bagherzandi08multisignatures, + author = {Ali Bagherzandi and Jung Hee Cheon and Stanis\l{}aw Jarecki}, + title = {Multisignatures Secure under the Discrete Logarithm Assumption and a Generalized Forking Lemma}, + booktitle = {\bibconf[15th]{CCS}{ACM Conference on Computer and Communications Security}}, + month = oct, + year = 2008, +} + +@misc{baigneres15curve, + author = {Thomas Baign\`{e}res and C\'{e}cile Delerabl\'{e}e and Matthieu Finiasz and Louis Goubin and Tancr\`{e}de Lepoint and Matthieu Rivain}, + title = {\href{http://eprint.iacr.org/2015/1249}{Trap Me If You Can -- Million Dollar Curve}}, + howpublished = {Cryptology ePrint Archive, Report 2015/1249}, + year = {2015}, +} + +@techreport{ baird16hashgraph, + author = {Leemon Baird}, + title = {\href{http://www.swirlds.com/wp-content/uploads/2016/06/2016-05-31-Swirlds-Consensus-Algorithm-TR-2016-01.pdf}{Hashgraph Consensus: fair, fast, {Byzantine} fault tolerance}}, + institution = {Swirlds}, + number = {TR-2016-01}, + month = may, + year = 2016, +} + +@article{ ball13NSA, + author = { James Ball and Dominic Rushe}, + title = {\href{http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data}{NSA Prism program taps in to user data of Apple, Google and others +}}, + month = oct, + year = 2013, +} + +@inproceedings{ballani2007hijacking, + title={\href{https://people.mpi-sws.org/~francis/sigcomm07-interception.pdf} + {A Study of Prefix Hijacking and Interception in the Internet}}, + author={Ballani, Hitesh and Francis, Paul and Zhang, Xinyang}, + booktitle={ACM SIGCOMM Computer Communication Review}, + volume={37}, + number={4}, + year={2007}, + organization={ACM} +} + +@inproceedings{ bao09liveness, + author = {Wei Bao and Hong Li and Nan Li and Wei Jiang}, + title = {\href{https://ieeexplore.ieee.org/document/5054589}{A Liveness Detection Method for Face Recognition Based on Optical Flow Field}}, + booktitle = {International Conference on Image Analysis and Signal Processing}, + month = apr, + year = 2009, + location = {Taizhou, China}, +} + +@misc{barme97great, + title = {\href{http://www.wired.com/1997/06/china-3/}{The Great Firewall of China}}, + author = { GEREMIE R. BARME AND SANG YE. }, + year={1997}, +} + +@inproceedings{ barrera14baton, + author = {Barrera, David and McCarney, Daniel and Clark, Jeremy and van + Oorschot, Paul C.}, + title = {\href{http://doi.acm.org/10.1145/2627393.2627397}{Baton: + Certificate Agility for Android's Decentralized Signing Infrastructure}}, + booktitle = {Proceedings of the 2014 ACM Conference on Security and Privacy + in Wireless \& Mobile Networks}, + series = {WiSec '14}, + year = {2014}, + location = {Oxford, United Kingdom}, + numpages = {12}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{ barrera12meteor, + title={\href{http://www.enck.org/pubs/most12.pdf}{Meteor: Seeding a + Security-Enhancing Infrastructure for Multi-market Application Ecosystems}}, + author={Barrera, David and Enck, William and van Oorschot, Paul C.}, + booktitle={Mobile Security Technologies 2012}, + year={2012}, + organization={IEEE} +} + +@article{ barret10OPM, + author = {Devlin Barret}, + title = {\href{http://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888}{U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say}}, + month = jun, + year = 2015, +} + + +@inproceedings{ basin14arpki, + author = {David Basin and Cas Cremers and Tiffany Hyun-Jin Kim and + Adrian Perrig and Ralf Sasse and Pawel Szalachowski}, + title = {\href{http://www.netsec.ethz.ch/research/arpki/}{{ARPKI}: Attack Resilient Public-Key Infrastructure}}, + booktitle = {\bibconf{CCS}{ACM Conference on + Computer and Communications Security}}, + year = 2014, +} + +@inproceedings{ bates14forced, + author = {Adam Bates and Joe Pletcher and Tyler Nichols and + Braden Hollembaek and Kevin R. B. Butler}, + title = {Forced Perspectives: + Evaluating an {SSL} Trust Enhancement at Scale}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = nov, + year = 2014, + location = {Vancouver, BC, Canada}, +} + +@inproceedings{bauer03new, + title = {New covert channels in {HTTP}: + adding unwitting {Web} browsers to anonymity sets}, + author = {Bauer, Matthias}, + booktitle = {\bibconf[1st]{WPES}{ACM + Workshop on Privacy in the Electronic Society}}, + pages = {72--78}, + year = {2003}, +} + +% author = {Bauer, Kevin and McCoy, Damon and Grunwald, Dirk and Sicker, Douglas}, +@inproceedings{bauer05bittorrent, + author = {Bauer, Kevin and others}, + title = {BitBlender: light-weight anonymity for {BitTorrent}}, + booktitle = {\bibbrev{AIPACa}{Workshop on Applications of private and anonymous communications}}, + year = {2008}, +} + +@misc{beacon14reddit, + key={Reddit}, + title = {Reddit: {NIST} {R}andomness {B}eacon}, + howpublished = {\url{http://www.reddit.com/r/crypto/comments/21apkx/nist_randomness_beacon/}}, +} + +@misc{beacon14se, + key={StackExchenge}, + title = {How useful is {NIST}'s {R}andomness {B}eacon for cryptographic use?}, + howpublished = {\url{http://crypto.stackexchange.com/questions/15225/how-useful-is-nists-randomness-beacon-for-cryptographic-use}}, +} + +@inproceedings{ bellare93random, + title = {Random oracles are practical: A paradigm for designing efficient protocols}, + author = {Bellare, Mihir and Rogaway, Phillip}, + booktitle = {\bibconf[1st]{CCS}{ACM Conference on + Computer and Communications Security}}, + pages = {62--73}, + year = {1993}, +} + + +@inproceedings{ bellare94optimal, + author = {Mihir Bellare and Phillip Rogaway}, + title = {Optimal Asymmetric Encryption -- How to Encrypt with {RSA}}, + booktitle = {Eurocrypt}, + month = may, + year = 1994, + location = {Perugia, Italy}, +} + +@inproceedings{ bellare09hedged, + title = {Hedged public-key encryption: How to protect against bad randomness}, + author = {Bellare, Mihir and Brakerski, Zvika and + Naor, Moni and Ristenpart, Thomas and Segev, Gil and Shacham, Hovav and Yilek, Scott}, + booktitle = {{ASIACRYPT}}, + pages = {232--249}, + year = {2009}, + publisher = {Springer} +} + +@inproceedings{bellare06multi, + title={Multi-signatures in the plain public-key model and a general forking lemma}, + author={Bellare, Mihir and Neven, Gregory}, + booktitle = {\bibconf{CCS}{ACM Conference on + Computer and Communications Security}}, + year={2006}, +} + +@inproceedings{ bellare09format, + title={\href{https://eprint.iacr.org/2009/251.pdf}{Format-preserving + encryption}}, + author={Bellare, Mihir and Ristenpart, Thomas and Rogaway, Phillip and + Stegers, Till}, + booktitle={International Workshop on Selected Areas in Cryptography}, + pages={295--312}, + month = aug, + year={2009} +} + +@inproceedings{ bellissimo06secure, + author = {Anthony Bellissimo and John Burgess and Kevin Fu}, + title = {\href{https://www.usenix.org/legacy/event/hotsec06/tech/full_papers/bellissimo/bellissimo.pdf}{Secure Software Updates: Disappointments and New Challenges}}, + booktitle = {\bibconf[1st]{HotSec}{USENIX Workshop on Hot Topics in Security}}, + month = jul, + year = 2006, + location = {Vancouver, BC, Canada}, +} + +@inproceedings{ bencsath12duqu, + title={\href{https://www.crysys.hu/publications/files/BencsathPBF12eurosec.pdf}{Duqu: Analysis, Detection, and Lessons Learned}}, + author={Bencs{\'a}th, Boldizs{\'a}r and P{\'e}k, G{\'a}bor and Butty{\'a}n, + Levente and F{\'e}legyh{\'a}zi, M{\'a}rk}, + booktitle={ACM European Workshop on System Security (EuroSec)}, + year={2012} +} + +@inproceedings{bendavid08fairplaymp, + title={{FairplayMP}: a system for secure multi-party computation}, + author={Ben-David, Assaf and Nisan, Noam and Pinkas, Benny}, + booktitle={{ACM} Conference on Computer and Communications Security}, + month={October}, + year={2008} +} + +@inproceedings{bender06ring, + title={Ring signatures: Stronger definitions, and constructions without random oracles}, + author={Bender, A. and Katz, J. and Morselli, R.}, + booktitle={\bibconf[3rd]{TCC}{Theory of Cryptography Conference}}, + pages={60--79}, + year={2006}, + publisher={Springer} +} + +@article {bender09ring, + title = {Ring signatures: Stronger definitions, and constructions without random oracles}, + journal = {Journal of Cryptology}, + year = {2009}, + author = {Bender,A. and Katz, Jonathan and Morselli,R.} +} + +@misc{bentov16snow, + author = {Iddo Bentov and Rafael Pass and Elaine Shi}, + title = {\href{http://eprint.iacr.org/2016/919}{Snow White: Provably Secure Proofs of Stake}}, + howpublished = {Cryptology ePrint Archive, Report 2016/919}, + year = {2016}, +} + + +@article{ bernstein12highspeed, + author = {Daniel J. Bernstein and Niels Duif and Tanja Lange + and Peter Schwabe and Bo-Yin Yang}, + title = {\href{http://link.springer.com/article/10.1007/s13389-012-0027-1}{High-speed high-security signatures}}, + journal = {Journal of Cryptographic Engineering}, + volume = 2, + number = 2, + pages = {77-89}, + year = 2012, + url = {http://link.springer.com/article/10.1007/s13389-012-0027-1}, +} + +@inproceedings{ bernstein13elligator, + title={\href{https://elligator.cr.yp.to/elligator-20130828.pdf}{Elligator: + Elliptic-curve points indistinguishable from uniform random strings}}, + author={Bernstein, Daniel J and Hamburg, Mike and Krasnova, Anna and + Lange, Tanja}, + booktitle = {ACM CCS}, + month = nov, + year = 2013 +} + +@misc{bernstein15dualec, + title = {\href{http://eprint.iacr.org/2015/767}{Dual {EC}: {A Standardized Back Door}}}, + author = {{Bernstein}, Daniel J. and {Lange}, Tanja and {Niederhagen}, Ruben}, + howpublished = {Cryptology ePrint Archive, Report 2015/767}, + year = {2015}, +} + +@inproceedings{berthold00cascade, + title = {The disadvantages of free {MIX} routes and how to overcome them}, + author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke}, + booktitle = {Workshop on Design Issues in Anonymity and Unobservability}, + year = {2000}, + month = {July}, + pages = {30--45}, +} + +@inproceedings{berthold00anonymity, + author = {Berthold, Oliver and Federrath, Hannes and K\"{o}hntopp, Marit}, + title = {Project ``anonymity and unobservability in the Internet''}, + booktitle = {\bibbrev{CFP}{Conference on Computers, freedom and privacy: challenging the assumptions}}, + year = {2000}, + month = {April} +} + +@inproceedings{ berthold02dummy, + author = {Berthold, Oliver and Langos, Heinrich}, + title = {Dummy traffic against long term intersection attacks}, + booktitle = {\bibconf[2nd]{PET}{Workshop on Privacy Enhancing Technologies}}, + year = {2002}, +} + +@inproceedings{bethencourt10signatures, + author = {John Bethencourt and + Elaine Shi and + Dawn Song}, + title = {Signatures of Reputation}, + booktitle = {\bibconf[14th]{FC}{Financial Cryptography and Data Security}}, + location = {Canary Islands, Spain}, + month = jan, + year = 2010 +} + +@inproceedings{bian2007off, + title={Off-the-record instant messaging for group conversation}, + author={Bian, Jiang and Seker, Remzi and Topaloglu, Umit}, + booktitle={Information Reuse and Integration, 2007. IRI 2007. IEEE International Conference on}, + year={2007}, +} + +@article{ bier09rules, + author={Bier, E. and Chow, R. and Golle, + P. and King, T.H. and Staddon, J.}, + journal={Security Privacy, IEEE}, + title={The Rules of Redaction: Identify, Protect, Review (and Repeat)}, + year={2009}, + month={nov.-dec. }, + volume={7}, + number={6}, + pages={46 -53}, +} + +@article{ bischoff18passports, + author = {Paul Bischoff}, + title = {\href{https://www.comparitech.com/blog/vpn-privacy/passports-on-the-dark-web-how-much-is-yours-worth/}{Passports on the dark web: how much is yours worth?}}, + journal = {Comparitech}, + month = oct, + year = 2018, + day = 4, +} + +@inproceedings{bhattacharya11computer, + title={Computer viruses in urban {Indian} telecenters: Characterizing an unsolved problem}, + author={Bhattacharya, Prasanta and Thies, William}, + booktitle={\bibconf[5th]{NSDR}{ACM workshop on Networked systems for developing regions}}, + year={2011}, + month=jun, +} + +@inproceedings{bhargavan14triple, + title={\href{https://www.ieee-security.org/TC/SP2014/papers/TripleHandshakesandCookieCutters_c_BreakingandFixingAuthenticationoverTLS.pdf}{Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS}}, + author={Bhargavan, Karthikeyan and Lavaud, Antoine Delignat and Fournet, C{\'e}dric and Pironti, Alfredo and Strub, Pierre Yves}, + booktitle={IEEE Symposium on Security and Privacy}, + year={2014} +} + +@inproceedings{blakley79keys, + title = {\href{https://www.computer.org/csdl/proceedings/afips/1979/5087/00/50870313.pdf}{Safeguarding cryptographic keys}}, + author={Blakley, George Robert}, + booktitle={Proceedings of the national computer conference}, + volume={48}, + pages={313--317}, + year={1979} +} + +@inproceedings{blomer15anonymous, + author = {Johannes Bl{\"{o}}mer and + Jakob Juhnke and + Christina Kolb}, + title = {Anonymous and publicly linkable reputation systems}, + booktitle = {\bibconf[19th]{FC}{Financial Cryptography and Data Security}}, + location = {Puerto Rico}, + month = jan, + year = 2015 +} + +@techreport{blough11ct, + title={CT-T: MedVault-ensuring security and privacy for electronic medical records}, + author={Blough, Douglas M and Liu, Ling and Sainfort, Francois and Ahamad, Mustaque}, + year={2011}, + institution={Georgia Institute of Technology} +} + +@article{blum86prng, + author = {Blum, Lenore and Blum, Manuel and Shub, Michael}, + title = {A simple unpredictable pseudo random number generator}, + journal = {SIAM J. Comput.}, + year = {1986} +} + +@inproceedings{blum19synchronous, + title={Synchronous Consensus with Optimal Asynchronous Fallback Guarantees}, + author={Blum, Erica and Katz, Jonathan and Loss, Julian}, + booktitle={Theory of Cryptography Conference}, + pages={131--150}, + year={2019}, + organization={Springer} +} + +@incollection{blundo94randomness, + author = {Blundo, Carlo and + De Santis, Alfredo and + Vaccaro, Ugo}, + title = {Randomness in distribution protocols}, + booktitle = {Automata, Languages and Programming}, + volume = {820}, + series = {Lecture Notes in Computer Science}, + editor = {Abiteboul, Serge and Shamir, Eli}, + publisher = {Springer Berlin Heidelberg}, + pages = {568-579}, + year = {1994}, + language = {English}, + doi = {10.1007/3-540-58201-0_99}, + url = {http://dx.doi.org/10.1007/3-540-58201-0_99}, + isbn = {978-3-540-58201-4}, +} + +@inproceedings{blundo12espresso, + author = {Carlo Blundo and + Emiliano de Cristofaro and + Paolo Gasti}, + title = {{EsPRESSo}: Efficient Privacy-Preserving Evaluation + of Sample Set Similarity}, + booktitle = {DPM/SETOP}, + month = sep, + year = 2012 +} + +@article{blundo14espresso, + author = {Carlo Blundo and + Emiliano de Cristofaro and + Paolo Gasti}, + title = {{EsPRESSo}: {E}fficient Privacy-Preserving Evaluation + of Sample Set Similarity}, + journal = {Journal of Computer Security}, + volume = {22}, + number = {3}, + pages = {355--381}, + year = 2014 +} + +@inproceedings{ bobbio14reproducible, + author = {J\'er\'emy {Bobbio (Lunar)}}, + title = {\href{https://archive.fosdem.org/2014/schedule/event/reproducibledebian/}{Reproducible Builds for Debian}}, + booktitle = {FOSDEM}, + month = feb, + year = 2014, +} + +@article{bogdanov13pushing, + title={Pushing back the rain\ --\ how to create trustworthy services in the cloud}, + author={Bogdanov, Dan and Kalu, Aivo}, + journal={{ISACA} Journal}, + volume={3}, + year={2013}, + pages={49--51} +} + +@inproceedings{ bogetoft09secure, + author = {Peter Bogetoft and Dan Lund Christensen and Ivan Dam\r{g}ard and + Martin Geisler and Thomas Jakobsen and Mikkel Kr\o{}igaard and + Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and + Jakob Pagter and Michael Schwartzbach and Tomas Toft}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-642-03549-4_20}{Secure Multiparty Computation Goes Live}}, + booktitle = {\bibconf[13th]{FC}{International Conference on Financial Cryptography and Data Security}}, + month = feb, + year = 2009, + location = {Accra Beach, Barbados}, +} + +@incollection { boneh98decision, + author = {Dan Boneh}, + title = {The Decision {Diffie-Hellman} problem}, + booktitle = {Algorithmic Number Theory}, + series = {Lecture Notes in Computer Science}, + editor = {Joe Buhler}, + publisher = {Springer Berlin / Heidelberg}, + pages = {48-63}, + volume = {1423}, + note = {10.1007/BFb0054851}, + year = {1998} +} + +@incollection{ boneh01identity, + author = {Dan Boneh and Matt Franklin}, + title = {Identity-Based Encryption from the {Weil} Pairing}, + booktitle = {\bibconf[21st]{CRYPTO}{IACR International Cryptology Conference}}, + year = {2001} +} + +@article{boneh1998decision, + title={The decision diffie-hellman problem}, + author={Boneh, Dan}, + journal={Algorithmic number theory}, + pages={48--63}, + year={1998}, + publisher={Springer} +} + +@inproceedings{boneh01short, + title = {\href{https://www.iacr.org/archive/asiacrypt2001/22480516.pdf}{Short signatures from the Weil pairing}}, + author={Boneh, Dan and Lynn, Ben and Shacham, Hovav}, + booktitle={International Conference on the Theory and Application of Cryptology and Information Security}, + pages={514--532}, + year={2001}, + organization={Springer} +} + +@article{boneh03survey, + title={A survey of two signature aggregation techniques}, + author={Boneh, Dan and Gentry, Craig and Lynn, Ben and Shacham, Hovav and others}, + journal={RSA cryptobytes}, + year={2003} +} + +@inproceedings{ boneh04efficient, + title = {Efficient {selective-ID} secure identity-based encryption without random oracles}, + author = {Boneh, Dan and Boyen, Xavier}, + booktitle = {\bibconf{Eurocrypt}{International Conference on the + Theory and Applications of Cryptographic Techniques}}, + pages = {223--238}, + year = {2004}, +} + +@inproceedings{boneh04short, + title={Short group signatures}, + author={Boneh, Dan and Boyen, Xavier and Shacham, Hovav}, + booktitle={\bibconf[24th]{CRYPTO}{International Cryptology Conference}}, + location = {Santa Barbara, CA}, + mon = aug, + year=2004 +} + +@inproceedings{ boneh16balloon, + author = {Dan Boneh and Henry Corrigan-Gibbs and Stuart Schechter}, + title = {\href{https://eprint.iacr.org/2016/027}{Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks}}, + booktitle = {Asiacrypt}, + month = dec, + year = 2016, + location = {Hanoi, Vietnam}, +} + +@inproceedings{ boneh18compact, + author = {Dan Boneh and Manu Drijvers and Gregory Neven}, + title = {\href{https://eprint.iacr.org/2018/483}{Compact Multi-Signatures for Smaller Blockchains}}, + booktitle = {Advances in Cryptology -- ASIACRYPT 2018}, + month = dec, + year = 2018, +} + +@inproceedings{ boneh18verifiable, + author = {Dan Boneh and Joseph Bonneau and Benedikt B\"unz and Ben Fisch}, + title = {Verifiable Delay Functions}, + booktitle = {\bibconf[38th]{CRYPTO}{Advances in Cryptology}}, + month = aug, + year = 2018, + location = {Santa Barbara, CA, USA}, +} + +@misc{ bonneau15bitcoin, + author = {Joseph Bonneau and Jeremy Clark and Steven Goldfeder}, + title = {\href{https://eprint.iacr.org/2015/1015.pdf}{On Bitcoin as a public randomness source}}, + howpublished = {{IACR} eprint archive}, + month = oct, + year = 2015, +} + +@inproceedings{ bonneau16ethiks, + author={Bonneau, Joseph}, + title={\href{https://link.springer.com/chapter/10.1007/978-3-662-53357-4_7}{EthIKS: Using Ethereum to Audit a CONIKS Key Transparency Log}}, + booktitle={\bibconf{FC}{Financial Cryptography and Data Security}}, + pages={95--105}, + year={2016}, + publisher={Springer Berlin Heidelberg}, + isbn={978-3-662-53357-4}, + doi={10.1007/978-3-662-53357-4_7}, + url={http://dx.doi.org/10.1007/978-3-662-53357-4_7} +} + +@inproceedings{borge17PoP, + title={\href{http://bford.info/pub/dec/pop-abs}{{Proof-of-Personhood}: Redemocratizing Permissionless Cryptocurrencies}}, + booktitle={\href{http://prosecco.gforge.inria.fr/ieee-blockchain2016/}{1st IEEE Security and Privacy on the Blockchain}}, + author = {Maria Borge and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Nicolas Gailly and Linus Gasser and Bryan Ford}, + month = apr, + year={2017}, +} + +@inproceedings{borisov2004off, + title={Off-the-record communication, or, why not to use PGP}, + author={Borisov, Nikita and Goldberg, Ian and Brewer, Eric}, + booktitle = {\bibconf{WPES}{ACM workshop on Privacy in the electronic society}}, + year={2004}, +} + +% obsoleted by conference version: boldyreva03threshold +@inproceedings{boldyreva02threshold, + title={\href{https://eprint.iacr.org/2002/118}{Threshold Signatures, Multisignatures and Blind Signatures Based on the {Gap-Diffie-Hellman-Group} Signature Scheme}}, + author={Boldyreva, Alexandra}, + booktitle={Public Key Cryptography -- PKC 2003}, + publisher= {Springer}, + year={2002}, +} + +@inproceedings{boldyreva03threshold, + title = {\href{https://link.springer.com/chapter/10.1007/3-540-36288-6_3}{Threshold Signatures, Multisignatures and Blind Signatures Based on the {Gap-Diffie-Hellman-Group} Signature Scheme}}, + author = {Boldyreva, Alexandra}, + booktitle = {\bibconf[6th]{PKC}{International Workshop on Practice and Theory in Public Key Cryptography}}, + month = jan, + year = 2003, + location = {Miami, FL, USA}, +} + +@inproceedings{bos2014elliptic, + title={Elliptic curve cryptography in practice}, + author={Bos, Joppe W and Halderman, J Alex and Heninger, Nadia and Moore, Jonathan and Naehrig, Michael and Wustrow, Eric}, + booktitle={International Conference on Financial Cryptography and Data Security}, + pages={157--175}, + year={2014}, + organization={Springer} +} + +@inproceedings{bos15post, + title={\href{https://ieeexplore.ieee.org/abstract/document/7163047}{Post-quantum key exchange for the TLS protocol from the ring learning with errors problem}}, + author={Bos, Joppe W and Costello, Craig and Naehrig, Michael and Stebila, Douglas}, + booktitle={Security and Privacy (SP), 2015 IEEE Symposium on}, + pages={553--570}, + year={2015}, + organization={IEEE} +} + +@misc{boyle11coin, + author = {Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai}, + title = {\href{https://eprint.iacr.org/2011/291.pdf}{Leakage-Resilient Coin Tossing}}, + howpublished = {Cryptology ePrint Archive, Report 2011/291}, + year = {2011}, +} + +@article{brennan12stylometry, + author = {Brennan, Michael and Afroz, Sadia and Greenstadt, Rachel}, + title = {Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity}, + journal = {\bibconf{TISSEC}{ACM Transactions on Information and System Security}}, +month = nov, +year = {2012}, +} + +@inproceedings{ bresson02dynamic, + author = {Bresson, Emmanuel and Chevassut, Olivier and Pointcheval, David}, + title = {Dynamic Group {Diffie-Hellman} Key Exchange under Standard Assumptions}, + booktitle = {Proceedings of the International Conference on the Theory and + Applications of Cryptographic Techniques: Advances in Cryptology}, + series = {Eurocrypt}, + year = {2002}, + isbn = {3-540-43553-0}, + pages = {321--336}, + publisher = {Springer-Verlag}, + address = {London, UK, UK}, +} + +@article{ bright11diginotar, + author = { Peter Bright}, + title = {\href{http://arstechnica.com/security/2011/08/earlier-this-year-an-iranian/}{Another fraudulent certificate raises the same old questions about certificate authorities}}, + journal = {arstechnica}, + month = aug, + year = 2011, + day = 29, +} + + +@article{ bright11comodo, + author = { Peter Bright}, + title = {\href{http://arstechnica.com/security/2011/03/how-the-comodo-certificate-fraud-calls-ca-trust-into-question/}{How the Comodo certificate fraud calls CA trust into questions}}, + journal = {arstechnica}, + month = mar, + year = 2011, + day = 24, +} + +@inproceedings{buchmann07merkle, + title = {Merkle Signatures with Virtually Unlimited Signature Capacity.}, + author = {Buchmann, Johannes and Dahmen, Erik and Klintsevich, Elena and Okeya, Katsuyuki and Vuillaume, Camille}, + booktitle = {\bibbrev{ACNS}{Applied Cryptography and Network Security}}, + year = 2007 +} + +@thesis{buchman16tendermint, + title={\href{https://atrium.lib.uoguelph.ca/xmlui/bitstream/handle/10214/9769/Buchman_Ethan_201606_MAsc.pdf?sequence=7&isAllowed=y}{Tendermint: Byzantine Fault Tolerance in the Age of Blockchains}}, + author={Buchman, Ethan}, + year={2016} +} + +@misc{ robinson17using, + author = {David ``Karit'' Robinson}, + title = {\href{https://zxsecurity.co.nz/presentations/201707_Defcon-ZXSecurity-GPSSpoofing.pdf}{Using GPS Spoofing to Control Time}}, + howpublished = {DEFCON 25}, + month = jul, + year = 2017, +} + +@article{bunz17proofs, + author = {Benedikt B{\"{u}}nz and + Jonathan Bootle and + Dan Boneh and + Andrew Poelstra and + Pieter Wuille and + Greg Maxwell}, + title = {\href{https://eprint.iacr.org/2017/1066.pdf}{Bulletproofs: Short Proofs for Confidential Transactions and + More}}, + journal = {{IACR} Cryptology ePrint Archive}, + volume = {2017}, + pages = {1066}, + year = {2017}, + url = {http://eprint.iacr.org/2017/1066}, + timestamp = {Mon, 19 Mar 2018 14:21:51 +0100} +} + +@article{ burgess15un, + author = {Matt Burgess}, + title = {\href{http://www.wired.co.uk/news/archive/2015-11/10/surveillance-investigatory-powers-scary-joseph-cannataci}{UN privacy chief: UK surveillance bill is 'worse than scary'}}, + journal = {Wired.co.uk}, + month = nov, + year = 2015, + day = 10, +} + +@inproceedings{burkhart10sepia, + title={Sepia: Privacy-preserving aggregation of multi-domain network events and statistics}, + author={Burkhart, Martin and Strasser, Mario and Many, Dilip and Dimitropoulos, Xenofontas}, + booktitle={{USENIX} Security Symposium}, + month={August}, + year={2010} +} + +@inproceedings{burrows06chubby, + title={The Chubby lock service for loosely-coupled distributed systems}, + author={Burrows, Mike}, + booktitle={Proceedings of the 7th symposium on Operating systems design and implementation}, + pages={335--350}, + year={2006} +} + +@misc{buterin15notes, + title={\href{https://pdfs.semanticscholar.org/ae5b/c3aaf0e02a42f4cd41916072c87db0e04ac6.pdf}{Notes on Scalable Blockchain Protocols (verson 0.3)}}, + author={Buterin, Vitalik and Coleman, Jeff and Wampler-Doty, Matthew}, + year={2015} +} + +@article{buterin2016hardfork, + author = {Vitalik Buterin}, + title = {\href{https://blog.ethereum.org/2016/07/20/hard-fork-completed/}{Hard fork completed}}, + year={2016} +} + +@article{ byers04leakage, + author = {Simon Byers}, + title = {Information Leakage Caused by Hidden + Data in Published Documents}, + journal ={IEEE Security and Privacy}, + volume = {2}, + year = {2004}, + pages = {23-27}, + publisher = {IEEE Computer Society}, + address = {Los Alamitos, CA, USA}, +} + +%C + +@misc{ c4ads19above, + author = {C4ADS}, + title = {\href{https://www.c4reports.org/aboveusonlystars}{Above Us Only Stars: Exposing GPS Spoofing in Russia and Syria}}, + month = apr, + year = 2019, +} + +@inproceedings{cachin16architecture, + title={\href{https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf}{Architecture of the Hyperledger blockchain fabric}}, + author={Cachin, Christian}, + booktitle={Workshop on Distributed Cryptocurrencies and Consensus Ledgers}, + year={2016} +} + +@inproceedings{ cachin00random, + author = {Christian Cachin and Klaus Kursawe and Victor Shoup}, + title = {\href{http://link.springer.com/article/10.1007/s00145-005-0318-0}{Random Oracles in {Constantinople}: + Practical Asynchronous {Byzantine} Agreement + Using Cryptography}}, + booktitle = {19th ACM Symposium on Principles of Distributed Computing + (PODC)}, + year = 2000, +} + % month = jul, + % url = {http://link.springer.com/article/10.1007/s00145-005-0318-0}, + +@inproceedings{ cachin01secure, + author = {Christian Cachin and Klaus Kursawe and Frank Petzold + and Victor Shoup}, + title = {\href{http://www.zurich.ibm.com/~cca/papers/abc.pdf}{Secure and Efficient Asynchronous Broadcast Protocols}}, + booktitle = {Advances in Cryptology (CRYPTO)}, + year = 2001, +} + % month = aug, + % url = {http://www.zurich.ibm.com/~cca/papers/abc.pdf}, + +@inproceedings{ cachin02asynchronous, + author = {Christian Cachin and Klaus Kursawe and Anna Lysyanskaya and + Reto Strobl}, + title = {\href{https://dl.acm.org/citation.cfm?id=586124}{Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems}}, + booktitle = {\bibconf[9th]{CCS}{ACM Conference on + Computer and Communications Security}}, + month = nov, + year = 2002, +} + +@inproceedings{ cachin02secure, + author = {Christian Cachin and Jonathan A. Poritz}, + title = {\href{https://cachin.com/cc/papers/sintra.pdf}{Secure Intrusion-tolerant Replication on the Internet}}, + booktitle = {\bibconf{DSN}{Dependable Systems and Networks}}, + month = jun, + year = 2002, + location = {Bethesda, MD, USA}, +} + +@inproceedings{ cachin04secure, + author = {Christian Cachin and Asad Samar}, + title = {Secure distributed {DNS}}, + booktitle = {Dependable Systems and Networks (DSN)}, + month = jul, + year = 2004, + url = {http://www.zurich.ibm.com/~cca/papers/dnsrepl.pdf}, +} + +@article{ cachin05random, + title={Random oracles in {Constantinople}: Practical asynchronous Byzantine agreement using cryptography}, + author={Cachin, Christian and Kursawe, Klaus and Shoup, Victor}, + journal={Journal of Cryptology}, + volume={18}, + number={3}, + pages={219--246}, + year={2005}, + publisher={Springer} +} + +@inproceedings{ cai12touching, + author = {Xiang Cai and Xin Cheng Zhang and Brijesh Joshi + and Rob Johnson}, + title = {\href{https://nymity.ch/tor-dns/pdf/Cai2012a.pdf}{Touching from a Distance: Website Fingerprinting Attacks and Defenses}}, + booktitle = {ACM Conference on Computer and Communications Security}, + month = oct, + year = 2012, +} + +@inproceedings{ calandrino07machine, + author = {Joseph A. Calandrino and J. Alex Halderman and Edward W. Felten}, + title = {\href{https://www.usenix.org/legacy/event/evt07/tech/full_papers/calandrino/calandrino_html/}{Machine-Assisted Election Auditing}}, + booktitle = {\bibconf{ETV}{USENIX/ACCURATE Electronic Voting Technology Workshop}}, + month = aug, + year = 2007, +} + +@misc{callas07openpgp, + title={\href{https://tools.ietf.org/html/rfc4880}{RFC 4880: OpenPGP Message Format}}, + author={Callas, J. and Donnerhacke, L. and Finney, H. and Shaw, D. and Thayer, R.}, + year={2007}, +} + +@inproceedings{ camenisch97efficient, + title={Efficient group signature schemes for large groups}, + author={Camenisch, Jan and Stadler, Markus}, + booktitle={CRYPTO '97}, + month=aug, + year={1997}, + location={Santa Barbara, CA}, +} + +@inproceedings{ camenisch01efficient, + title={An efficient system for non-transferable anonymous credentials with optional anonymity revocation}, + author={Jan Camenisch and Anna Lysyanskaya}, + booktitle={EUROCRYPT}, + month = may, + year=2001 +} + +@inproceedings{ camenisch02dynamic, + title={Dynamic accumulators and application to efficient revocation of + anonymous credentials}, + author={Jan Camenisch and Anna Lysyanskaya}, + booktitle={\bibconf[22nd]{CRYPTO}{Annual International Cryptology Conference}}, + location={Santa Barbara, CAT}, + month=aug, + year=2001 +} + +@inproceedings{camenisch05compact, + author = {Camenisch, Jan and + Hohenberger, Susan and + Lysyanskaya, Anna}, + title = {Compact e-cash}, + booktitle = {\bibconf[24th]{EUROCRYPT}{International Conference + on the theory and Applications of Cryptographic Techniques}}, + location = {Aarhus, Denmark}, + month = may, + year = 2005 +} + +@inproceedings{camenisch06balancing, + author={Jan Camenisch and + Susan Hohenberger and + Anna Lysyanskaya}, + title={Balancing Accountability and Privacy Using E-Cash (Extended Abstract)}, + booktitle = {\bibconf[5th]{SCN}{Security and Cryptography for Networks}}, + location = {Maiori, Italy}, + month = sep, + year = 2006 +} + +@inproceedings{camenisch07endorsed, + author={Jan Camenisch and + Anna Lysyanskaya and + Mira Meyerovich}, + title={Endorsed e-cash}, + booktitle={\bibconf[28th]{S{\&}P}{IEEE Symposium on Security and Privacy}}, + location={Oakland, CA}, + month=may, + year=2007 +} + +@inproceedings{camenisch08cred, + author = {Camenisch, Jan and Gro\ss, Thomas}, + title = {Efficient attributes for anonymous credentials}, + booktitle = {Proceedings of the 14th ACM Conference on Computer and Communications Security}, + series = {{CCS}}, year = {2008}, + pages = {345--356}, + publisher = {ACM}, +} + + +@inproceedings{ cao13redefining, + author = {Yinzhi Cao and Vaibhav Rastogi and Zhichun Li and Yan Chen + and Alexander Moshchuk}, + title = {Redefining Web Browser Principals with a + Configurable Origin Policy}, + booktitle = {\bibconf[43rd]{DSN}{IEEE/IFIP International Conference + on Dependable Systems and Networks}}, + month = jun, + year = 2013, + location = {Budapest}, +} + +@inproceedings{ cappos08look, + author = {Justin Cappos and Justin Samuel and Scott Baker + and John H. Hartman}, + title = {\href{http://www.cs.arizona.edu/stork/packagemanagersecurity/ccs2008.pdf}{A Look In the Mirror: Attacks on Package Managers}}, + booktitle = {\bibconf[15th]{CCS}{ACM Conference on + Computer and Communications Security}}, + month = oct, + year = 2008, + location = {Alexandria, VA}, +} + +@inproceedings{ cappos13avoiding, + author = {Justin Cappos}, + title = {Avoiding Theoretical Optimality to Efficiently + and Privately Retrieve Security Updates}, + booktitle = {\bibconf[17th]{FC}{Financial Cryptography and Data Security}}, + month = apr, + year = 2013, +} + +@inproceedings{ cascudo17scrape, + author = {Ignacio Cascudo and Bernardo David}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-319-61204-1_27}{SCRAPE: Scalable Randomness Attested by Public Entities}}, + booktitle = {\bibconf[15th]{ACNS}{International Conference on Applied Cryptography and Network Security}}, + month = jul, + year = 2017, + location = {Kanazawa, Japan}, +} + +@article{ castiglione07advantages, + author = "A. Castiglione and A. De Santis and C. Soriente", + title = "Taking advantages of a disadvantage: Digital forensics and steganography using document metadata", + journal = "Journal of Systems and Software", + volume = "80", + number = "5", + pages = "750 - 764", + year = "2007", +} + +@inproceedings{cha03identity, + title={An identity-based signature from gap Diffie-Hellman groups}, + author={Cha, Jae Choon and Cheon, Jung Hee}, + booktitle={{PKC}}, + volume={2567}, + pages={18--30}, + year={2003} +} + +@inproceedings{chandra07paxos, + title={Paxos made live: an engineering perspective}, + author={Chandra, Tushar D and Griesemer, Robert and Redstone, Joshua}, + booktitle={Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing}, + pages={398--407}, + year={2007} +} + +@article{ chanthadavong15biometrics, + author = {Aimee Chanthadavong}, + title = {\href{https://www.zdnet.com/article/biometrics-the-password-you-cannot-change/}{Biometrics: The password you cannot change}}, + journal = {ZDNet}, + month = aug, + year = 2015, +} + +@inproceedings{chase16transparency, + title={Transparency Overlays and Applications}, + author={Chase, Melissa and Meiklejohn, Sarah}, + booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, + pages={168--179}, + year={2016}, + organization={ACM} +} + +@inproceedings{chaum82blind, + title={Blind Signatures for Untraceable Payments.}, + author={Chaum, David}, + booktitle = {\bibconf{CRYPTO}{International Cryptology Conference}}, + year={1982} +} + +@inproceedings{chaum86demonstrating, + title={Demonstrating possession of a discrete logarithm without revealing it}, + author={Chaum, David and Evertse, Jan-Hendrik and van de Graaf, Jeroen and Peralta, Ren{\'e}}, + booktitle={Conference on the Theory and Application of Cryptographic Techniques}, + pages={200--212}, + year={1986}, + organization={Springer} +} + +@inproceedings{ chaum88untraceable, + author = {David Chaum and Amos Fiat and Moni Naor}, + title = {Untraceable Electronic Cash}, + booktitle = {\bibconf{CRYPTO}{International Cryptology Conference}}, + month = aug, + year = 1988, + location = {Santa Barbara, CA}, +} + +@inproceedings{chaum91group, + title={Group signatures}, + author={Chaum, David and Van Heyst, Eug{\`e}ne}, + booktitle={\bibconf{EUROCRYPT}{Advances in Cryptology}}, + month = apr, + year = 1991 +} + +@inproceedings{ chaum92wallet, + author = {Chaum, David and Pedersen, Torben P.}, + title = {Wallet Databases with Observers}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + year = {1992}, +} + +@misc{ chaum16random, + author = {David Chaum}, + title = {\href{https://rsvoting.org/whitepaper/white_paper.pdf}{Random-Sample Voting}}, + year = 2016, +} + +@inproceedings{checkoway11comprehensive, + title={Comprehensive Experimental Analyses of Automotive Attack Surfaces}, + author={Checkoway, Stephen and McCoy, Damon and + Kantor, Brian and Anderson, Danny and Shacham, Hovav and Savage, Stefan and + Koscher, Karl and Czeskis, Alexei and Roesner, Franziska and Kohno, Tadayoshi}, + booktitle={{USENIX} Security Symposium}, + year={2011} +} + +@inproceedings{checkoway14practical, + title={On the practical exploitability of {Dual EC} in {TLS} implementations}, + author={Checkoway, Stephen and Fredrikson, Matthew and Niederhagen, Ruben and Everspaugh, Adam and Green, Matthew and Lange, Tanja and Ristenpart, Thomas and Bernstein, Daniel J and Maskiewicz, Jake and Shacham, Hovav}, + booktitle={USENIX Security Symposium}, + year={2014} +} + + +@inproceedings{chen13splitx, + author = {Ruichuan Chen and + Istemi Ekin Akkus and + Paul Francis}, + title = {Split{X}: {H}igh-Performance Private Analytics}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Hong Kong, China}, + month = aug, + year = 2013 +} + +@article{cheng18ekiden, + title={\href{https://arxiv.org/pdf/1804.05141.pdf}{Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and + Performant Smart Contract Execution}}, + author={Cheng, Raymond and Zhang, Fan and Kos, Jernej and He, Warren and Hynes, Nicholas and Johnson, Noah and Juels, Ari and Miller, Andrew and Song, Dawn}, + journal={arXiv preprint arXiv:1804.05141}, + year={2018} +} + +@inproceedings{cherif11optimistic, + title={\href{https://dl.acm.org/citation.cfm?id=1982374}{Optimistic + access control for distributed collaborative editors}}, + author={Cherif, Asma and Imine, Abdessamad and Rusinowitch, + Micha{\"e}l}, + booktitle={ACM Symposium on Applied Computing}, + pages={861--868}, + year={2011} +} + +@article{ chesney18deep, + author = {Robert Chesney and Danielle Keats Citron}, + title = {\href{https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3213954}{Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security}}, + journal = {California Law Review}, + month = jul, + year = 2018, +} + +Chesney, Robert and Citron, Danielle Keats, Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security (July 14, 2018). 107 California Law Review (2019, Forthcoming); U of Texas Law, Public Law Research Paper No. 692; U of Maryland Legal Studies Research Paper No. 2018-21. Available at SSRN: https://ssrn.com/abstract=3213954 or http://dx.doi.org/10.2139/ssrn.3213954 + +@incollection{ chevallier06encoding, + author = {Chevallier-Mames, Benoît and Paillier, Pascal and Pointcheval, David}, + title = {Encoding-Free ElGamal Encryption Without Random Oracles}, + booktitle = {Public Key Cryptography - PKC 2006}, + series = {Lecture Notes in Computer Science}, + editor = {Yung, Moti and Dodis, Yevgeniy and Kiayias, Aggelos and Malkin, Tal}, + publisher = {Springer Berlin / Heidelberg}, + pages = {91-104}, + volume = {3958}, + year = {2006} +} + +@article{chokhani99internet, + title={Internet {X.509} public key infrastructure certificate policy and certification practices framework}, + author={Chokhani, Santosh and Ford, Warwick}, + year={1999}, + note={RFC 2527}, +} + +@inproceedings{ chor85verifiable, + author = {Benny Chor and Shafi Goldwasser and Silvio Micali and Baruch Awerbuch}, + title = {\href{https://ieeexplore.ieee.org/document/4568164}{Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults}}, + booktitle = {\bibconf[26th]{SFCS}{Symposium on Foundations of Computer Science}}, + month = oct, + year = 1985, + location = {Portland, OR, USA}, +} + +@article{christin13incognisense, + author = {Delphine Christin and + Christian Ro{\ss}kopf and + Matthias Hollick and + Leonardo A. Martucci and + Salil S. Kanhere}, + title = {Incogni{S}ense: {A}n anonymity-preserving reputation + framework for participatory sensing applications}, + journal = {Pervasive and Mobile Computing}, + volume = {9}, + number = {3}, + pages = {353--371}, + year = 2013 +} + +@inproceedings{clark10beacon, + author = {Jeremy Clark and Urs Hengartner}, + title = {\href{https://www.usenix.org/conference/evtwote-10/use-financial-data-random-beacon}{On the Use of Financial Data as a Random Beacon}}, + booktitle = {\bibconf{EVT/WOTE}{Electronic Voting Technology Workshop/Workshop on Trustworthy Elections}}, + month = aug, + year = {2010}, + location = {Washington, DC, USA}, +} + +@inproceedings{clark13sok, + title={{SoK}: {SSL} and {HTTPS}: Revisiting past challenges and evaluating certificate trust model enhancements}, + author={Clark, Jeremy and van Oorschot, Paul C}, + booktitle = {{IEEE} Symposium on Security and Privacy}, + booktitle = {IEEE \bibconf[34th]{SP}{Symposium on Security and Privacy}}, + month = may, + year = {2013}, +} + +@inproceedings{clauss13kanonymous, + author = {Sebastian Clau{\ss} and + Stefan Schiffner and + Florian Kerschbaum}, + title = {\emph{k}-anonymous reputation}, + booktitle = {\bibconf[8th]{AsiaCCS}{ACM Symposium on Information, + Computer and Communications Security}}, + location = {Hangzhou, China}, + month = may, + year = 2013 +} + +@inproceedings{clement09making, + title={\href{https://www.usenix.org/legacy/events/nsdi09/tech/full_papers/clement/clement.pdf}{Making {Byzantine} Fault Tolerant Systems Tolerate Byzantine Faults}}, + author={Clement, Allen and Wong, Edmund L and Alvisi, Lorenzo and Dahlin, Michael and Marchetti, Mirco}, + booktitle={6th USENIX Symposium on Networked Systems Design and Implementation}, + year={2009}, +} + % month = apr, + % url={https://www.usenix.org/legacy/events/nsdi09/tech/full_papers/clement/clement.pdf}, + +@article{ cloudflare16cloudflare, + author = {CloudFlare, Inc.}, + title = {\href{https://www.cloudflare.com/}{CloudFlare - The web performance \& security company + }}, + month = may, + year = 2016, +} + +@article{ cohen08bittorent, + author = {Bram Cohen}, + title = {\href{http://www.bittorrent.org/beps/bep_0003.html}{The BitTorrent Protocol Specification}}, + month = jan, + year = 2008, +} + +@misc{coindesk180x, + author = {CoinDesk}, + title = {\href{https://www.coindesk.com/decentralized-exchange-crypto-dex}{Decentralized Exchanges Aren’t Living Up to Their Name - And Data Proves It}}, + month = jul, + year = 2018, +} + +@misc{coindeskethupgrade, + author = {CoinDesk}, + title = {\href{https://www.coindesk.com/ethereum-network-draws-developer-ire-after-scheduling-new-years-day-upgrade}{Ethereum Network Draws Developer Ire After Scheduling New Year’s Day Upgrade}}, + month = dec, + year = 2019, +} + +@article{ comodo11comodo, + author = {Comodo Group}, + title = {\href{https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html}{Comodo Fraud Incident +}}, + month = jul, + year = 2015, +} + +@misc{ conner-simons19programmers, + author = {Adam Conner-Simons}, + title = {\href{https://www.csail.mit.edu/news/programmers-solve-mits-20-year-old-cryptographic-puzzle}{Programmers solve MIT’s 20-year-old cryptographic puzzle}}, + month = apr, + year = 2019, +} + +@inproceedings{ corrigangibbs13conscript, + author = {Corrigan-Gibbs, Henry and Ford, Bryan}, + title = {Conscript your friends into larger anonymity sets with {JavaScript}}, + booktitle = {\bibconf{WPES}{Workshop in Privacy in the Electronic Society}}, + month = nov, + year = {2013}, + comment = {workshop}, +} + +@misc{ corrigangibbs13conscript-ext, + year = {2013}, + month = sep, + title = {Conscript Your Friends into Larger Anonymity Sets with {JavaScript} + (Extended version)}, + howpublished = {\url{http://arxiv.org/abs/1309.0958}}, + author = {Henry Corrigan-Gibbs and Bryan Ford}, +} + +@inproceedings{ corrigangibbs13ensuring, + author = {Corrigan-Gibbs, Henry and Mu, Wendy and Boneh, Dan and Ford, Bryan}, + title = {Ensuring High-Quality Randomness in Cryptographic Key Generation}, + booktitle = {\bibconf[20th]{CCS}{ACM Conference on + Computer and Communications Security}}, + month = nov, + year = {2013}, + comment = {conference}, + day = {4}, + venueurl = {www.sigsac.org/ccs/CCS2013/}, +} + +@inproceedings{ corrigangibbs13proactively, + author = {Corrigan-Gibbs, Henry and Wolinsky, David Isaac + and Ford, Bryan}, + title={Proactively Accountable Anonymous Messaging in {Verdict}}, + booktitle={22nd USENIX Security Symposium}, + month = aug, + year = 2013, + location = {Washington, DC}, +} + +@techreport{ corrigangibbs13proactively-tr, + title={Proactively Accountable Anonymous Messaging in {Verdict}}, + author={Henry Corrigan-Gibbs and David Isaac Wolinsky and Bryan Ford}, + number = {YALEU/DCS/TR1478}, + month = jun, + year = 2013, + institution = {Department of Computer Science, Yale University}, +} + +@inproceedings{ costello15geppetto, + author = {Craig Costello and C\'edric Fournet and Jon Howell and + Markulf Kohlweiss and Benjamin Kreuter and Michael Naehrig and + Bryan Parno and Samee Zahur}, + title = {\href{https://ieeexplore.ieee.org/abstract/document/7163030}{Geppetto: Versatile Verifiable Computation}}, + booktitle = {IEEE Security and Privacy}, + month = may, + year = 2015, +} + +@misc{coyne14keybase, + title = {\href{https://keybase.io}{Keybase.io}}, + author = {Chris Coyne and Maxwell Krohn}, + year = 2014, +} + +@inproceedings{ cramer94proofs, + title={Proofs of partial knowledge and simplified design of witness hiding protocols}, + author={Cramer, Ronald and Damg{\aa}rd, Ivan and Schoenmakers, Berry}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + pages={174--187}, + year={1994}, +} + +@inproceedings{ cramer97advances, + author = {Ronald Cramer and + Rosario Gennaro and + Berry Schoenmakers}, + title={A Secure and Optimally Efficient Multi-Authority Election Scheme}, + booktitle = {\bibconf{EUROCRYPT}{{Conference on Theory and applications + of cryptographic techniques}}}, + location = {Konstanz, Germany}, + month = may, + year = 1997 +} + +@incollection{ cramer98zero, + year={1998}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + volume={1462}, + series={Lecture Notes in Computer Science}, + editor={Krawczyk, Hugo}, + title={Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free?}, + author={Cramer, Ronald and Damgård, Ivan}, + pages={424-441} +} + +@inproceedings{ cramer00general, + author = {Ronald Cramer and Ivan Dam\r{g}ard and Ueli Maurer}, + title = {\href{https://link.springer.com/chapter/10.1007/3-540-45539-6_22}{General Secure Multi-party Computation from any Linear Secret-Sharing Scheme}}, + booktitle = {Eurocrypt}, + month = may, + year = 2000, + location = {Bruges, Belgium}, +} + +@article{cramer01design, + author = {Ronald Cramer and Victor Shoup}, + title = {Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack}, + journal = {SIAM Journal on Computing}, + year = {2001}, + volume = {33}, + pages = {167--226} +} + +@inproceedings{ cramer01multiparty, + author = {Ronald Cramer and Ivan Damg\r{a}rd and Jesper B. Nielsen}, + title = {\href{https://link.springer.com/chapter/10.1007/3-540-44987-6_18}{Multiparty Computation from Threshold Homomorphic Encryption}}, + booktitle = {Eurocrypt}, + month = may, + year = 2001, +} + +@inproceedings{cristofaro12fast, + author = {Emiliano De Cristofaro and + Paolo Gasti and + Gene Tsudik}, + title = {Fast and Private Computation of Cardinality of Set Intersection + and Union}, + booktitle = {CANS}, + month = dec, + year = 2012 +} + +@inproceedings{cristofaro13linear, + author = {Emiliano De Cristofaro and + Jihye Kim and + Gene Tsudik}, + title = {Linear-Complexity Private Set Intersection Protocols Secure + in Malicious Model}, + booktitle = {ASIACRYPT}, + year = {2010} +} + +@inproceedings{ croman16scaling, + author = {Kyle Croman and Christian Decke and Ittay Eyal and Adem Efe Gencer and Ari Juels and Ahmed Kosba and Andrew Miller and Prateek Saxena and Elaine Shi and Emin Gun Sirer and Dawn Song an and Roger Wattenhofer}, + title = {\href{http://fc16.ifca.ai/bitcoin/papers/CDE+16.pdf}{On Scaling Decentralized Blockchains (A Position Paper)}}, + booktitle = {3rd Workshop on Bitcoin and Blockchain Research}, + year = {2016}, + url = {http://fc16.ifca.ai/bitcoin/papers/CDE+16.pdf}, +} + +@inproceedings{ crosby09efficient, + author = {Scott A. Crosby and Dan S. Wallach}, + title = {Efficient Data Structures for Tamper-Evident Logging}, + booktitle = {USENIX Security Symposium}, + month = aug, + year = 2009, + location = {Montreal, Canada}, +} + +@misc{curiousmind18firelotto, + author = {CuriosMind}, + title = {\href{https://medium.com/@Curious_Mind/worlds-hottest-decentralized-lottery-powered-by-blockchain-90a35bad464a}{World's Hottest Decentralized Lottery Powered by Blockchain}}, + month = feb, + year = 2018, +} + +@inproceedings{cui15paxos, + title={Paxos made transparent}, + author={Cui, Heming and Gu, Rui and Liu, Cheng and Chen, Tianyu and Yang, Junfeng}, + booktitle={Proceedings of the 25th Symposium on Operating Systems Principles}, + pages={105--120}, + year={2015} +} + +@misc{ czernik18frontrunning, + author = {Matt Czernik}, + title = {\href{https://medium.com/@matt.czernik/on-blockchain-frontrunning-part-i-cut-the-line-or-make-a-new-one-b33850663b55}{On Blockchain Frontrunning}}, + month = feb, + year = 2018, +} + +%D + +@inproceedings{dachman-soled09efficient, + author = {Dana Dachman-Soled and + Tal Malkin and + Mariana Raykova and + Moti Yung}, + title = {Efficient Robust Private Set Intersection}, + booktitle = {\bibbrev{ACNS}{Applied Cryptography and Network Security}}, + year = {2009} +} + +@inproceedings{ dacosta12trust, + author = {Italo Dacosta and Mustaque Ahamad and Patrick Traynor}, + title = {Trust No One Else: Detecting {MITM} Attacks against {SSL/TLS} + without Third-Parties}, + booktitle = {\bibconf[17th]{ESORICS}{European Symposium on + Research in Computer Security}}, + month = sep, + year = 2012, + location = {Pisa, Italy}, +} + +@misc{ dai96pipenet, + author = {Wei Dai}, + title = {{PipeNet 1.1}}, + year = 1996, + month = aug, + note = {UseNet post. \url{http://www.weidai.com/pipenet.txt}}, +} + +@article{daian2016dao, + author = {Phil Daian}, + title = {\href{https://web.archive.org/web/20191001182349/https://hackingdistributed.com/2016/06/18/analysis-of-the-dao-exploit/}{Analysis of the DAO exploit}}, + year={2016} +} + +@misc{ daian18on-chain, + author = {Philip Daian and Tyler Kell and Ian Miers and Ari Juels}, + title = {\href{http://hackingdistributed.com/2018/07/02/on-chain-vote-buying/}{On-Chain Vote Buying and the Rise of Dark DAOs}}, + month = jul, + day = 2, + year = 2018, + note = {\href{http://hackingdistributed.com}{Hacking, Distributed}}, +} + +@inproceedings{ damgaard01generalisation, + title={A Generalisation, a Simpli. cation and Some Applications of Paillier's Probabilistic Public-Key System}, + author={Damg{\aa}rd, Ivan and Jurik, Mads}, + booktitle={Public Key Cryptography}, + pages={119--136}, + year={2001}, + organization={Springer} +} + +@inproceedings{damgard09asynchronous, + title={Asynchronous multiparty computation: Theory and implementation}, + author={Damg{\aa}rd, Ivan and Geisler, Martin and Kroig{\aa}rd, Mikkel and Nielsen, Jesper Buus}, + booktitle={International Conference on Practice and Theory in Public-Key Cryptography}, + publisher={Springer}, + month={March}, + year={2009} +} + +@misc{damgard02sigma, + title={\href{http://www.cs.au.dk/~ivan/Sigma.pdf}{On {$\Sigma$}-protocols}}, + author={Damg\r{a}rd, Ivan}, + year = 2010, +} + +@article{danezis16centrally, + title={\href{https://eprint.iacr.org/2015/502.pdf}{Centrally Banked Cryptocurrencies}}, + author={Danezis, George and Meiklejohn, Sarah}, + journal={\bibconf[23rd]{NDSS}{Annual Network \& Distributed System Security + Symposium}}, + location = {San Diego, CA}, + month = Feb, + year=2016 +} + +@article{danezis18blockmania, + title={Blockmania: from Block DAGs to Consensus}, + author={Danezis, George and Hrycyszyn, David}, + journal={arXiv preprint arXiv:1809.01620}, + year={2018} +} + + +@inproceedings{ danezis04statistical, + title = {Statistical Disclosure or Intersection Attacks on Anonymity Systems}, + author = {Danezis, George and Serjantov, Andrei}, + booktitle = {Workshop on Information Hiding}, + year = {2004}, + month = {May}, + location = {Toronto, Ontario, Canada}, +} + +@article{ davidson13strongbox, + author = {Amy Davidson}, + title = {Introducing Strongbox}, + journal = {The New Yorker}, + month = may, + day = 15, + year = 2013, +} + +@article{ davis96kerberos, + author = {Donald T. Davis and Daniel E. Geer and Theodore Ts'o}, + title = {\href{https://www.usenix.org/legacy/publications/compsystems/1996/win_davis.pdf}{Kerberos With Clocks Adrift: History, Protocols, and Implementation}}, + journal = {Computing systems}, + volume = 9, + number = 1, + year = 1996, + pages = {29-46}, +}, + +@InProceedings{decker16bitcoin, + author = {Christian Decker and Jochen Seidel and Roger Wattenhofer}, + title = {\href{http://www.tik.ee.ethz.ch/file/ed3e5da74fbca5584920e434d9976a12/peercensus.pdf}{Bitcoin Meets Strong Consistency}}, + booktitle = {{17th International Conference on Distributed Computing and Networking (ICDCN), Singapore}}, + month = {January}, + year = {2016}, + url = {http://www.tik.ee.ethz.ch/file/ed3e5da74fbca5584920e434d9976a12/peercensus.pdf}, +} + + +@misc{ delacruz18blockchain, + author = {Juan Delacruz, IBM Blockchain}, + title = {\href{https://www.ibm.com/blogs/blockchain/2018/02/blockchain-is-tackling-the-challenge-of-data-sharing-in-government/}{Blockchain is tackling the challenge of data sharing in government}}, + month = may, + year = 2018, +} + +@inproceedings{ delaune06coercion, + author = {Ste\'ephanie Delaune and Steve Kremer and Mark Ryan}, + title = {\href{https://ieeexplore.ieee.org/abstract/document/1648706}{Coercion-Resistance and Receipt-Freeness in Electronic Voting}}, + booktitle = {\bibconf[19th]{CSFW}{IEEE Computer Security Foundations Workshop}}, + month = jul, + year = 2006, +} + +@inproceedings{delmolino16step, + title={\href{https://link.springer.com/chapter/10.1007/978-3-662-53357-4_6}{Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab}}, + author={Delmolino, Kevin and Arnett, Mitchell and Kosba, Ahmed and Miller, Andrew and Shi, Elaine}, + booktitle={International Conference on Financial Cryptography and Data Security}, + pages={79--94}, + year={2016}, + organization={Springer} +} + +@article{denning96key, + title={Key escrow encryption systems}, + author={Denning, Dorothy E and Branstad, Dennis K}, + journal={Communications of the ACM}, + volume={39}, + number={3}, + pages={35}, + year={1996} +} + +@inproceedings{ desmedt87tampering, + title={Public-key systems based on the difficulty of tampering (Is there a difference between {DES} and {RSA}?)}, + author={Desmedt, Yvo and Quisquater, Jean-Jacques}, + booktitle={\bibconf{CRYPTO}{Advances in Cryptology}}, + year={1987}, +} + +@inproceedings{ desmedt89threshold, + author = {Yvo Desmedt and Yair Frankel}, + title = {Threshold cryptosystems}, + booktitle = {\bibconf{CRYPTO}{Advances in Cryptology}}, + month = aug, + year = 1989, +} + +@article{ dey10pseudoid, + title={{PseudoID}: Enhancing privacy in federated login}, + author={Dey, Arkajit and Weis, Stephen}, + journal={\bibconf{HotPETs}{Hot topics in privacy enhancing technologies}}, + year={2010} +} + +@inproceedings{di2006deniable, + title={Deniable authentication and key exchange}, + author={Di Raimondo, Mario and Gennaro, Rosario and Krawczyk, Hugo}, + booktitle = {\bibconf{CCS}{ACM conference on computer and + communications security}}, + year={2006}, +} + +@inproceedings{diaz02measuring, + author = {D\'{\i}az, Claudia and Seys, Stefaan and Claessens, Joris and Preneel, Bart}, + title = {Towards measuring anonymity}, + booktitle = {Proceedings of the 2nd international conference on Privacy enhancing technologies}, + series = {PET'02}, + year = {2003}, +} + +@incollection{diaz07accountable, + title={Accountable anonymous communication}, + author={Diaz, Claudia and Preneel, Bart}, + booktitle={Security, Privacy, and Trust in Modern Data Management}, + pages={239--253}, + year={2007}, + publisher={Springer} +} + +@inproceedings{dingledine03reputation, + author = {Roger Dingledine and Nick Mathewson and Paul Syverson}, + title = {Reputation in P2P Anonymity Systems}, + booktitle = {In Workshop on Economics of Peer-to-Peer Systems}, + year = {2003} +} + +@inproceedings{ dingledine09performance, + author = {Roger Dingledine and Steven J. Murdoch}, + title = {Performance Improvements on {Tor} or, + Why {Tor} is slow and what we're going to do about it}, + booktitle = {DEFCON 17}, + month = jul, + year = 2009, + location = {Las Vegas, NV}, + url = {http://www.hackerjeopardy.com/images/defcon-17/dc-17-presentations/defcon-17-roger_dingledine-tor.pdf}, +} + +@article{dierks08transport, + title={The transport layer security (TLS) protocol version 1.2}, + author={Dierks, Tim}, + year={2008} +} + +@article{diffie76new, + title={New directions in cryptography}, + author={Diffie, Whitfield and Hellman, Martin E}, + journal={IEEE \bibconf{IT}{Transactions on Information Theory}}, + year={1976}, +} + +@misc{digistamp, + key = {digistamp}, + title = {Digi{S}tamp - {T}rusted {T}ime{S}tamp {A}uthority}, + howpublished = {\url{https://www.digistamp.com/}} +} + +@inproceedings{dinur03revealing, + title={\href{https://dl.acm.org/citation.cfm?id=773173}{Revealing information while preserving privacy}}, + author={Dinur, Irit and Nissim, Kobbi}, + booktitle={Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems}, + pages={202--210}, + year={2003}, + organization={ACM} +} + +@article{ doctorow16using, + author = {Cory Doctorow}, + title = {\href{http://boingboing.net/2016/03/10/using-distributed-code-signatu.html}{Using distributed code-signatures to make it much harder to order secret backdoors}}, + journal = {BoingBoing}, + month = mar, + year = 2016, +} + +@inproceedings{ dodis04anonymous, + title={Anonymous identification in ad hoc groups}, + author={Dodis, Y. and Kiayias, A. and Nicolosi, A. and Shoup, V.}, + booktitle={Eurocrypt}, + pages={609--626}, + year={2004}, +} + +@inproceedings{dodis05verifiable, + title={A verifiable random function with short proofs and keys}, + author={Dodis, Yevgeniy and Yampolskiy, Aleksandr}, + booktitle={International Workshop on Public Key Cryptography}, + pages={416--431}, + year={2005}, + organization={Springer} +} + +@inproceedings{ dodis18fast, + title={\href{https://eprint.iacr.org/2019/016.pdf}{Fast message franking: From invisible salamanders to encryptment}}, + author={Dodis, Yevgeniy and Grubbs, Paul and Ristenpart, Thomas and Woodage, Joanne}, + booktitle={Annual International Cryptology Conference (CRYPTO)}, + pages={155--186}, + year={2018} +} + +@inproceedings{dong13private, + author = {Changyu Dong and Liqun Chen and Zikai Wen}, + title = {When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol}, + booktitle = {\bibconf{CCS}{ACM Conference on Computer and Communications Security}}, + year = {2013}, + moth = nov +} + +@inproceedings{ dong13protecting, + author = {Xinshu Dong and Zhaofeng Chen and Hossein Siadati and + Shruti Tople and Prateek Saxena and Zhenkai Liang}, + title = {Protecting Sensitive Web Content from + Client-side Vulnerabilities with {CRYPTONs}}, + booktitle = {\bibconf[20th]{CCS}{ACM conference on + Computer and communications security}}, + month = nov, + year = 2013, + location = {Berlin, Germany}, +} + +@inproceedings{ dorrendorf07cryptanalysis, + author = {Dorrendorf, Leo and Gutterman, Zvi and Pinkas, Benny}, + title = {Cryptanalysis of the {Windows} Random Number Generator}, + booktitle = {Proceedings of the 14th ACM Conference on Computer and Communications Security}, + series = {{CCS}}, + year = {2007}, + pages = {476--485}, +} + + +@inproceedings{ drijvers19security, + author = {Manu Drijvers and Kasra Edalatnejad and Bryan Ford and Eike Kiltz + and Julian Loss and Gregory Neven and Igors Stepanovs}, + title = {On the Security of Two-Round Multi-Signatures}, + booktitle = {\bibconf[40th]{SP}{IEEE Symposium on Security and Privacy}}, + month = may, + year = 2019, +} + + +@inproceedings{ duan18beat, + author = {Sisi Duan and Michael K. Reiter and Haibin Zhang}, + title = {\href{https://dl.acm.org/citation.cfm?id=3243812}{BEAT: Asynchronous BFT Made Practical}}, + booktitle = {\bibconf{CCS}{Computer and Communications Security}}, + month = oct, + year = 2018, + location = {Toronto, Canada}, +} + +@article{dubovitskaya17secure, + title={\href{https://arxiv.org/pdf/1709.06528.pdf}{Secure and Trustable Electronic Medical Records Sharing using Blockchain}}, + author={Dubovitskaya, Alevtina and Xu, Zhigang and Ryu, Samuel and Schumacher, Michael and Wang, Fusheng}, + journal={arXiv preprint arXiv:1709.06528}, + year={2017} +} + +@article{ dufaux08scrambling, + author = {Fr\'ed\'eric Dufaux and Touradj Ebrahimi}, + title = {Scrambling for Privacy Protection in + Video Surveillance Systems}, + journal = {IEEE Transactions on Circuits and Systems + for Video Technology}, + volume = 18, + number = 8, + year = 2008, + pages = {1168--1174}, +} + +@inproceedings{dunn12eternal, + title={Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels}, + author={Dunn, Alan M and Lee, Michael Z and Jana, Suman and Kim, Sangman and Silberstein, Mark and Xu, Yuanzhong and Shmatikov, Vitaly and Witchel, Emmett}, + booktitle={Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)}, + year={2012} +} + +@article{ durden15tiger, + author = {Tyler Durden}, + title = {\href{https://www.zerohedge.com/news/2015-08-13/1300-tiger-penis-800k-snipers-complete-black-market-price-guide}{From \$1,300 Tiger Penis To \$800K Snipers: The Complete Black Market Price Guide}}, + journal = {ZeroHedge}, + month = aug, + day = 13, + year = 2015, +} + +@misc{durham11namecoin, + title = {\href{https://namecoin.info/}{Namecoin}}, + author={Vincent Durham}, + year={2011}, +} + +@inproceedings{ dwork92pricing, + author = {Cynthia Dwork and Moni Naor}, + title = {\href{https://link.springer.com/chapter/10.1007%2F3-540-48071-4_10}{Pricing via Processing or Combatting Junk Mail}}, + booktitle = {\bibconf[12th]{CRYPTO}{Advances in Cryptology}}, + month = aug, + year = 1992, + location = {Santa Barbara, California, USA}, +} + +@inproceedings{ dwork08differential, + author = {Cynthia Dwork}, + title = {Differential Privacy: A Survey of Results}, + booktitle = {International Conference on Theory and Applications + of Models of Computation (TAMC)}, + year = 2008, +} + +@inproceedings{ dyer12peekaboo, + author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart + and Thomas Shrimpton}, + title={\href{https://kpdyer.com/publications/oakland2012-peekaboo.pdf}{Peek-a-Boo, {I} Still See You: Why Efficient Traffic Analysis Countermeasures Fail}}, + booktitle = {IEEE Symposium on Security and Privacy}, + month = may, + year = 2012 +} + +@inproceedings{ dziembowski15proofs, + author = {Stefan Dziembowski and Sebastian Faust and + Vladimir Kolmogorov and Krzysztof Pietrzak}, + title = {\href{https://eprint.iacr.org/2013/796.pdf}{Proofs of Space}}, + booktitle = {35th International Cryptology Conference (CRYPTO)}, + month = aug, + year = 2015, +} + +%E + +@misc{eff11observatory, + title = {\href{https://www.eff.org/observatory}{The EFF SSL Observatory}}, + author={{Electronic Frontier Foundation}}, + year={2011}, +} + +@inproceedings{egele13empirical, + title={An Empirical Study of Cryptographic Misuse in {Android} Applications}, + author={Egele, Manuel and Brumley, David and Fratantonio, Yanick and Kruegel, Christopher}, + booktitle = {\bibconf[20th]{CCS}{ACM conference on computer and + communications security}}, + year={2013}, + month=nov, +} + +@misc{eip18, + title={\href{http://eips.ethereum.org/EIPS/eip-665}{EIP 665: Add precompiled contract for Ed25519 signature + verification}}, + author={Oberstein, Tobias}, + month=mar, + year=2018, +} + +@inproceedings{el12efficient, + title={\href{https://link.springer.com/chapter/10.1007%2F978-3-642-30955-7_14}{An efficient lattice-based secret sharing construction}}, + author={El Bansarkhani, Rachid and Meziani, Mohammed}, + booktitle={IFIP International Workshop on Information Security Theory and Practice}, + pages={160--168}, + year={2012}, + organization={Springer} +} + +@article{elgamal85crypto, + author={Taher Elgamal}, + journal={IEEE Transactions on Information Theory}, + title={\href{https://ieeexplore.ieee.org/abstract/document/1057074/}{A public key cryptosystem and a signature scheme based on discrete logarithms}}, + year={1985}, + volume={31}, + number={4}, + pages={469-472}, + doi={10.1109/TIT.1985.1057074}, + ISSN={0018-9448}, + month={July}, +} + +@article{elkins96mime, + title={MIME security with pretty good privacy}, + author={Elkins, M.}, + year={1996} +} + +@article{EU16GDPR, + title={\href{https://www.eugdpr.org/}{General Data Protection Regulation (GDPR)}}, + author={{European Parliament and Council of the European Union}}, + journal={Official Journal of the European Union (OJ)}, + volume={\href{https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679}{L119}}, + pages={1--88}, + year={2016}, +} + +@article{ellis14guardian, + title={\href{https://www.theguardian.com/technology/2014/jun/05/guardian-launches-securedrop-whistleblowers-documents}{The Guardian introduces SecureDrop for document leaks}}, + author={Ellis, Justin}, + journal={Nieman Journalism Lab}, + year={2014} +} + +@misc{ellison07ceremony, + author = {Carl M. Ellison}, + title = {\href{http://eprint.iacr.org/2007/399}{Ceremony Design and Analysis}}, + journal = {{IACR} Cryptology ePrint Archive}, + pages = {399}, + year = {2007}, + url = {http://eprint.iacr.org/2007/399}, +} + +@misc{eos, + title={\href{https://eos.io/}{eosio | Blockchain software architecture}}, +} + +@inproceedings{ eskandari19transparent, + author = {Shayan Eskandari and Seyedehmahsa Moosavi and Jeremy Clark}, + title = {\href{http://fc19.ifca.ai/wtsc/TransparentDishonesty.pdf}{Transparent Dishonesty: front-running attacks on Blockchain}}, + booktitle = {\bibconf[3rd]{WTSC}{Workshop on Trusted Smart Contracts}}, + month = feb, + year = 2019, +} + +@inproceedings{ evans09practical, + author = {Nathan S. Evans and Roger Dingledine and Christian Grothoff}, + title = {A Practical Congestion Attack on {Tor} Using Long Paths}, + booktitle={18th USENIX Security Symposium}, + month = aug, + year = 2009, + location = {Montreal, Canada}, +} + +@article{everspaugh15pythia, + title={\href{https://eprint.iacr.org/2015/644.pdf}{The Pythia PRF Service.}}, + author={Everspaugh, Adam and Chatterjee, Rahul and Scott, Samuel and Juels, Ari and Ristenpart, Thomas and Tech, Cornell}, + journal={IACR Cryptology ePrint Archive}, + volume={2015}, + pages={644}, + year={2015} +} + + +@inproceedings{evfimievski03limiting, + author = {Alexandre V. Evfimievski and + Johannes Gehrke and + Ramakrishnan Srikant}, + title = {Limiting privacy breaches in privacy preserving data mining}, + booktitle = {PODS}, + year = {2003} +} + +@misc{ ey18health, + author = {Ernst \& Young}, + title = {\href{https://www.hyperledger.org/wp-content/uploads/2016/10/ey-blockchain-in-health.pdf}{Blockchain in health}}, + month = may, + year = 2018, +} + +@inproceedings{eyal16bitcoinng, + title = {\href{https://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-eyal.pdf}{{Bitcoin-NG}: A Scalable Blockchain Protocol}}, + author = {Eyal, Ittay and Gencer, Adem Efe and Sirer, Emin G\"un and van Renesse, Robbert}, + booktitle = {13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)}, + year = {2016}, + month = Mar, + address = {Santa Clara, CA}, + url = {https://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-eyal.pdf}, + publisher = {USENIX Association}, +} + +@incollection{eyal14majority, + title={\href{https://www.cs.cornell.edu/~ie53/publications/btcProcFC.pdf}{Majority is not enough: {Bitcoin} mining is vulnerable}}, + author={Eyal, Ittay and Sirer, Emin G{\"u}n}, + booktitle={Financial Cryptography and Data Security}, + pages={436--454}, + year={2014}, + publisher={Springer}, + url={https://www.cs.cornell.edu/~ie53/publications/btcProcFC.pdf}, +} + + +%F + +@inproceedings{fahl14apptransparency, + author = {Fahl, Sascha and Dechand, Sergej and Perl, Henning and Fischer, Felix and Smrcek, Jaromir and Smith, Matthew}, + title = {\href{https://dl.acm.org/citation.cfm?id=2660311}{Hey, {NSA}: Stay Away from My Market! {Future} Proofing App Markets Against Powerful Attackers}}, + booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security}, + year = {2014}, + isbn = {978-1-4503-2957-6}, + numpages = {13}, + url = {http://doi.acm.org/10.1145/2660267.2660311}, + doi = {10.1145/2660267.2660311}, + acmid = {2660311}, + publisher = {ACM}, +} + location = {Scottsdale, Arizona, USA}, + keywords = {android, apps, market, nsa, security, transparency}, + address = {New York, NY, USA}, + pages = {1143--1155}, + series = {CCS '14}, + + + +@article{fan12somewhat, + title={\href{https://eprint.iacr.org/2012/144.pdf}{Somewhat Practical Fully Homomorphic Encryption.}}, + author={Fan, Junfeng and Vercauteren, Frederik}, + journal={IACR Cryptology ePrint Archive}, + volume={2012}, + pages={144}, + year={2012}, + publisher={Citeseer} +} + +@misc { federrath11monitor, + author = {Hannes Federrath}, + title = {The {Anonym-O-Meter}}, + howpublished = {\url{http://anon.inf.tu-dresden.de/help/jap_help/en/help/jap.JAPNewView_anonymometer.html}}, + year = {2013}, + month = {July} +} + +@inproceedings{feigenbaum17multiple, + title={\href{https://link.springer.com/chapter/10.1007/978-3-319-71075-4_2}{Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion)}}, + author={Feigenbaum, Joan}, + booktitle={Cambridge International Workshop on Security Protocols}, + pages={9--17}, + year={2017}, + organization={Springer} +} + + +@article{ feinberg15gogo, + author = {Ashley Feinberg}, + title = {\href{http://gizmodo.com/gogo-is-using-man-in-the-middle-malware-tactics-on-its-1677559652}{{Gogo} {Wi-Fi} Is Using Man-in-the-Middle Malware Tactics on Its Own Users}}, + journal = {Gizmodo}, + month = jan, + year = 2015, +} + +@inproceedings{feldman87practical, + title={\href{https://ieeexplore.ieee.org/abstract/document/4568297/}{A practical scheme for non-interactive verifiable secret sharing}}, + author={Feldman, Paul}, + booktitle={Foundations of Computer Science, 1987., 28th Annual Symposium on}, + pages={427--438}, + year={1987}, + organization={IEEE} +} + +@inproceedings{ fiat87prove, + title={How to prove yourself: practical solutions to identification and signature problems}, + author={Fiat, Amos and Shamir, Adi}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + pages={186--194}, + year={1987}, +} + +@article{ fienberg71randomization, + author = {Stephen E. Fienberg}, + title = {\href{https://science.sciencemag.org/content/171/3968/255}{Randomization and Social Affairs: The 1970 Draft Lottery}}, + journal = {Science}, + volume = 171, + number = 3968, + month = jan, + year = 1971, + pages = {255-261}, + doi = {10.1126/science.171.3968.255}, +} + +@misc{firelotto, + title = {\href{https://firelotto.io/}{Fire Lotto blockchain lottery}}, + year = {2018}, +} + + +@misc{fleischer12tor, + author = {Gregory Fleischer}, + month = {July}, + year = {2009}, + booktitle = {DEFCON 17}, + howpublished = {\url{http://ww.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-gregory_fleischer-attacking_tor.pdf}}, + title = {Attacking Tor at the Application Layer}, +} + +@misc{ ford15verify, + author = {Bryan Ford}, + title = {\href{https://bford.info/2015/10/07/names.html}{Let's verify real people, not real names.}}, + month = oct, + year = 2015, +} + +@article{ ford16apple, + author = {Bryan Ford}, + title = {\href{https://freedom-to-tinker.com/blog/bford/apple-fbi-and-software-transparency/}{Apple, FBI, and Software Transparency}}, + journal = {\href{https://freedom-to-tinker.com/}{Freedom to Tinker}}, + month = mar, + year = 2016, +} + +@misc{ ford17technology, + author = {Bryan Ford}, + title = {\href{https://bford.info/2017/06/23/turing50/}{Technology Governs Us. Will it Govern Us Well? + +}}, + month = jun, + year = 2017, + note = {Opening remarks to panel ``Restoring Personal Privacy without Compromising National Security'' at \href{https://www.acm.org/turing-award-50/conference}{50 Years of the ACM Turing Award Celebration}}, +} + +@misc{ ford19privacy, + author = {Bryan Ford}, + title = {Privacy-preserving foundation for online personal identity}, + month = may, + year = 2019, + note = {ONR grant N000141912361}, +} + +@misc{ ford19rationality, + author = {Bryan Ford and Rainer B\"ohme}, + title = {\href{https://arxiv.org/abs/1910.08820}{Rationality is Self-Defeating in Permissionless Systems}}, + month = sep, + year = 2019, +} + +@article{ forgrave18man, + author = {Reid Forgrave}, + title = {\href{https://www.nytimes.com/interactive/2018/05/03/magazine/money-issue-iowa-lottery-fraud-mystery.html}{The Man Who Cracked the Lottery}}, + journal = {The New York Times Magazine}, + month = may, + year = 2018, +} + +@inproceedings{ franklin97fair, + author = {Matthew K. Franklin and Michael K. Reiter}, + title = {Fair Exchange with a Semi-Trusted Third Party}, + booktitle = {\bibbrev{CCS}{ACM Conference on + Computer and Communications Security}}, + month = apr, + year = 1997, +} + +@inproceedings{ franklin06passive, + title = {{Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting}}, + author = {Franklin, Jason and Mccoy, Damon and Tabriz, Parisa and Neagoe, Vicentiu and Van Randwyk, Jami and Sicker, Douglas}, + booktitle = {USENIX Security}, + year = {2006}, + month = {July}, + pages = {167--178}, +} + +@article{franklin13unique, + title={\href{https://eprint.iacr.org/2012/577.pdf}{A Framework for Unique Ring Signatures.}}, + author={Franklin, Matthew K and Zhang, Haibin}, + journal={IACR Cryptology ePrint Archive}, + volume={2012}, + pages={577}, + year={2012}, + url = {https://eprint.iacr.org/2012/577.pdf}, +} + +@misc{freeTSA, + key={Free Timestamping Authority}, + title = {Free {T}imestamping {A}uthority}, + howpublished = {\url{http://www.freetsa.org/}} +} + +@inproceedings{freedman04efficient, + author = {Michael J. Freedman and + Kobbi Nissim and + Benny Pinkas}, + title = {Efficient Private Matching and Set Intersection}, + booktitle = {\bibconf{EUROCRYPT}{{Conference on Theory and applications + of cryptographic techniques}}}, + location = {Interlaken, Switzerland}, + month = may, + year = 2004 +} + +@inproceedings{frikken07privacy, + author = {Keith B. Frikken}, + title = {Privacy-Preserving Set Union}, + booktitle = {\bibbrev{ACNS}{Applied Cryptography and Network Security}}, + year = {2007} +} + +@journal{ froelicher17unlynx, + author = {David Froelicher and Patricia Egger and Jo\~ao S\'a Sousa and + Jean Louis Raisaro and Zhicong Huang and Christian Mouchet and + Bryan Ford and Jean-Pierre Hubaux}, + title = {\href{https://content.sciendo.com/view/journals/popets/2017/4/article-p232.xml}{UnLynx: A Decentralized System for Privacy-Conscious Data Sharing}}, + journal = {Proceedings on Privacy Enhancing Technologies}, + volume = 2017, + number = 4, + month = oct, + year = 2017, + pages = {232–250}, +} + +@thesis{ fu05distribution, + author={Fu, Kevin E.}, + title={\href{http://dspace.mit.edu/handle/1721.1/34464}{Integrity and + Access Control in Untrusted Content Distribution Networks}}, + school={Massachusetts Institute of Technology}, + year={2005} +} + +@inproceedings{ fujisaki01rsa, + title={{RSA-OAEP} is secure under the {RSA} assumption}, + author={Fujisaki, Eiichiro and Okamoto, Tatsuaki and Pointcheval, David and Stern, Jacques}, + pages={260--274}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + year={2001}, + organization={Springer} +} + +%G + +@inproceedings{ galindo15neuchatel, + author = {David Galindo and Sandra Guasch and Jordi Puiggal\'i}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-319-22270-7_1}{Neuch\^atel’s Cast-as-Intended Verification Mechanism}}, + booktitle = {International Conference on E-Voting and Identity}, + month = sep, + year = 2015, + pages = {3-18}, +} + +@article{ gallagher13snowden, + author = {Ryan Gallagher}, + title = {New {Snowden} Documents Show {NSA} Deemed {Google} Networks + a ``Target''}, + journal = {Slate}, + month = sep # "~9,", + day = 9, + year = 2013, +} + +@inproceedings{gafni98round, + title={Round-by-Round Fault Detectors, Unifying Synchrony and Asynchrony (Extendeda Abstract)}, + author={Gafni, Eli}, + booktitle={Proc. 17th Annual ACM Symposium on Principles of Distributed Computing (PODC), Puerto Vallarta, Mexico, June}, + pages={143--152}, + year={1998} +} + + +@article{ ganeriwal08secure, + author = {Saurabh Ganeriwal and Christina P\"opper and + Srdjan \v{C}apkun and Mani B. Srivastava}, + title = {\href{https://dl.acm.org/citation.cfm?doid=1380564.1380571}{Secure Time Synchronization in Sensor Networks}}, + journal = {ACM Transactions on Information and System Security (TISSEC)}, + volume = 11, + number = 4, + month = jul, + year = 2008, +} + +@inproceedings{garay07practical, + author = {Juan A. Garay and + Berry Schoenmakers and + Jos{\'{e}} Villegas}, + title = {Practical and secure solutions for integer comparison}, + booktitle = {\bibconf[10th]{PKC}{Public Key Cryptography}}, + location = {Beijing, China}, + month = apr, + year = 2007 +} + +@incollection{garay15bitcoin, + title={\href{https://eprint.iacr.org/2014/765.pdf}{The {Bitcoin} backbone protocol: Analysis and applications}}, + author={Garay, Juan and Kiayias, Aggelos and Leonardos, Nikos}, + booktitle={EUROCRYPT 2015}, + pages={281--310}, + year={2015}, + publisher={Springer}, + url={https://eprint.iacr.org/2014/765.pdf}, +} + +@inproceedings{garcia18paxos, + title={Paxos consensus, deconstructed and abstracted}, + author={Garc{\'\i}a-P{\'e}rez, {\'A}lvaro and Gotsman, Alexey and Meshman, Yuri and Sergey, Ilya}, + booktitle={European Symposium on Programming}, + pages={912--939}, + year={2018}, + organization={Springer, Cham} +} + +@inproceedings{geambasu09vanish, + title={\href{https://www.usenix.org/legacy/events/sec09/tech/full_papers/sec09_crypto.pdf}{Vanish: Increasing Data Privacy with Self-Destructing Data.}}, + author={Geambasu, Roxana and Kohno, Tadayoshi and Levy, Amit A and Levy, Henry M}, + booktitle={USENIX Security Symposium}, + pages={299--316}, + year={2009} +} + + + +@inproceedings{ geddes13cover, + author = {John Geddes and Max Schuchard and Nicholas Hopper}, + title = {Cover Your {ACKs}: Pitfalls of Covert Channel + Censorship Circumvention}, + booktitle = {\bibbrev[20th]{CCS}{ACM Conference on + Computer and Communications Security}}, + month = nov, + year = {2013}, +} + +@article{gellman13broke, + author = {Gellman, Barton}, + title = {{NSA} broke privacy rules thousands of times per year, audit finds}, + journal = {The New York Times}, + month = Aug # {~15,}, + year = {2013} +} + +@article{ gellman13secret, + author={Gellman, Barton and Timberg, Craig and Rich, Steven}, + title={Secret {NSA} documents show campaign against {Tor} encrypted network}, + journal={The Washington Post}, + year=2013, + month=Oct # {~4,}, +} + +@article{ gellman13nsa, + author = {Barton Gellman and Ashkan Soltani}, + title = {{NSA} tracking cellphone locations worldwide, + {Snowden} documents show}, + journal = {The Washington Post}, + year = 2013, + month = dec # {~4,}, +} + +@article{gellman14offensive, + author = {Barton Gellman and Ellen Nakashima}, + title = {\href{www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html}{U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show}}, + journal = {The Washington Post}, + month = aug, + year = 2013, + day = 30, +} + +@misc{ genecoin18make, + author = {Genecoin}, + title = {\href{http://genecoin.me/}{Make a Backup of Yourself Using Bitcoin}}, + month = may, + year = 2018, +} + + + +@inproceedings{ gencer18decentralization, + author = {Adem Efe Gencer and Soumya Basu and Ittay Eyal and + Robbert van Renesse and Emin G\"un Sirer}, + title = {\href{https://fc18.ifca.ai/preproceedings/75.pdf}{Decentralization in Bitcoin and Ethereum Networks}}, + booktitle = {Financial Cryptography and Data Security}, + month = feb, + year = 2018, + url = {https://fc18.ifca.ai/preproceedings/75.pdf}, +} + +@article{gencer17aspen, + author = {Adem Efe Gencer and + Robbert van Renesse and + Emin G{\"{u}}n Sirer}, + title = {\href{http://fc17.ifca.ai/preproceedings/paper_73.pdf}{ Short Paper: Service-Oriented Sharding for Blockchains}}, + journal={Financial Cryptography and Data Security 2017}, + year = {2017}, + url = {http://fc17.ifca.ai/preproceedings/paper_73.pdf}, +} + +@inproceedings{ gennaro98simplified, + author = {Rosario Gennaro and Michael O. Rabin and Tal Rabin}, + title = {\href{https://dl.acm.org/citation.cfm?doid=277697.277716}{Simplified VSS and Fast-track Multiparty Computations with Applications to Threshold Cryptography}}, + booktitle = {\bibconf[17th]{PODC}{Principles of Distributed Computing}}, + month = jun, + year = 1998, + location = {Puerto Vallarta, Mexico}, +} + +% obsoleted by journal version: gennaro07secure +@inproceedings{ gennaro99secure, + title={\href{https://link.springer.com/chapter/10.1007/3-540-48910-X_21}{Secure distributed key generation for discrete-log based cryptosystems}}, + author={Gennaro, Rosario and Jarecki, Stanis{\l}aw and Krawczyk, Hugo and + Rabin, Tal}, + booktitle={Eurocrypt}, + volume={99}, + pages={295--310}, + year={1999}, + organization={Springer} +} + +@article{ gennaro07secure, + author = {Rosario Gennaro and Stanis\l{}aw Jarecki and Hugo Krawczyk and Tal Rabin}, + title = {\href{https://link.springer.com/article/10.1007/s00145-006-0347-3}{Secure Distributed Key Generation for Discrete-Log Based Cryptosystems}}, + month = jan, + year = 2007, + volume = 20, + number = 1, + pages = {51-83}, +} + +@inproceedings{ gentry09fully, + author = {Craig Gentry}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/1536414.1536440}{Fully Homomorphic Encryption Using Ideal Lattices}}, + booktitle = {\bibconf{STOC}{ACM Symposium on Theory of Computing}}, + month = may, + year = 2009, + location = {Bethesda, Maryland}, +} + +@article{ gervais14bitcoin, + author = {Arthur Gervais and Ghassan O. Karame and Srdjan Capkun + and Vedran Capkun}, + title = {\href{https://www.ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/system-security-group-dam/research/publications/pub2014/spmagazine_gervais.pdf}{Is Bitcoin a Decentralized Currency?}}, + journal = {IEEE Security and Privacy Magazine}, + year = 2014, + volume={12}, + number={3}, + pages={54--60}, + url = {https://www.ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/system-security-group-dam/research/publications/pub2014/spmagazine_gervais.pdf}, +} + +@inproceedings{gervais15tampering, + title={\href{https://eprint.iacr.org/2015/578.pdf}{Tampering with the Delivery of Blocks and Transactions in {Bitcoin}}}, + author={Gervais, Arthur and Ritzdorf, Hubert and Karame, Ghassan O and Capkun, Srdjan}, + booktitle={22nd ACM SIGSAC Conference on Computer and Communications Security}, + pages={692--705}, + year={2015}, + organization={ACM}, + url = {https://eprint.iacr.org/2015/578.pdf}, +} + +@inproceedings{ gervais16security, + title={\href{https://dl.acm.org/citation.cfm?id=2976749.2978341}{On the Security and Performance of Proof of Work Blockchains}}, + author={Gervais, Arthur and Karame, Ghassan O and W\"ust, Karl and Glykantzis, Vasileios and Ritzdorf, Hubert and \v{C}apkun, Srdjan}, + month = oct, + year = 2016, + location = {Hofburg Palace, Vienna, Austria}, +} + +@inproceedings{georgiev12most, + title={The most dangerous code in the world: validating + {SSL} certificates in non-browser software}, + author={Georgiev, Martin and Iyengar, Subodh and Jana, Suman and + Anubhai, Rishita and Boneh, Dan and Shmatikov, Vitaly}, + booktitle={\bibconf[19th]{CCS}{ACM conference on Computer and communications security}}, + year={2012}, + month=oct, +} + + +@inproceedings{ghosh14torpath, + author = {Mainak Ghosh and Miles Richardson and Bryan Ford + and Rob Jansen}, + title = {A {TorPath} to {TorCoin}: + Proof-of-Bandwidth Altcoins for Compensating Relays}, + booktitle = {Workshop on Hot Topics in Privacy Enhancing Technologies + (HotPETs)}, + year = 2014, + location = {Amsterdam, Netherlands}, +} + +@misc{gilad17algorand, + author = {Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich}, + title = {\href{https://dl.acm.org/authorize?N47148}{Algorand: Scaling Byzantine Agreements for Cryptocurrencies}}, + booktitle = {26th ACM Symposium on Operating Systems Principles (SOSP)}, + month = oct, + year = {2017}, +} + +@misc{ gill13characterizing, + author = {Phillipa Gill and others}, + title = {Characterizing Censorship of {Web} Content Worldwide}, + year = 2013, + note = {\url{http://www.cs.stonybrook.edu/~phillipa/papers/GCDG_May8.pdf}}, +} + +@inproceedings{goldreich01secure, + author = {Oded Goldreich}, + title = {Secure multi-party computation}, + month = jun, + year = 2001, + note = {\url{http://www.wisdom.weizmann.ac.il/~odedg/pp.html}} +} + +@inproceedings{goldberg09multi, + title={Multi-party off-the-record messaging}, + author={Goldberg, Ian and Ustao{\u{g}}lu, Berkant and Van Gundy, Matthew D and Chen, Hao}, + booktitle = {\bibconf{CCS}{ACM Conference on Computer and Communications Security}}, + year={2009}, +} + +@article{goldberg96randomness, + title = {Randomness and the {Netscape} browser}, + author = {Goldberg, Ian and Wagner, David}, + journal = {Dr. {Dobb}'s Journal--Software Tools for the Professional Programmer}, + volume = {21}, + number = {1}, + pages = {66--71}, + year = {1996}, +} + + +@article{ goodin13attackers, + author = {Dan Goodin}, + title = {Attackers wield {Firefox} exploit + to uncloak anonymous {Tor} users}, + journal = {ars technica}, + month = aug, + day = 5, + year = 2013, +} + +@article{ goodin13crack, + author = {Dan Goodin}, + title = {\href{http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/}{Crack in {Internet’s} foundation of trust allows {HTTPS} session hijacking}}, + month = sep, + year = 2012, + journal = {ars technica}, +} + +@inproceedings{goyal06attribute, + title={Attribute-based encryption for fine-grained access control of encrypted data}, + author={Goyal, Vipul and Pandey, Omkant and Sahai, Amit and Waters, Brent}, + booktitle={Proceedings of the 13th ACM conference on Computer and communications security}, + pages={89--98}, + year={2006}, + organization={Acm} +} + +@article{ greer14heartbleed, + author = {Dan Greer}, + title = {Heartbleed as Metaphor}, + journal = {Lawfare}, + month = apr, + day = 21, + year = 2014, + note = {\url{http://www.lawfareblog.com/2014/04/heartbleed-as-metaphor/}, + accessed on Sep 9, 2014} +} + +@article{ greenberg15tor, + title = {\href{http://www.wired.com/2015/11/tor-says-feds-paid-carnegie-mellon-1m-to-help-unmask-users/}{Tor Says Feds Paid Carnegie Mellon \$1M to Help Unmask Users}}, + journal = {Wired}, + month = nov, + year = 2015, +} + +@inproceedings{groth04evaluating, + author = {Jens Groth}, + title = {Evaluating security of voting schemes in the universal + composability framework}, + booktitle = {\bibconf[2nd]{ACNS}{Applied Cryptography + and Network Security}}, + location = {Yellow Mountain, China}, + month = Jun, + year = 2004 +} + +@phdthesis{ groth04honest, + title = {Honest verifier zero-knowledge arguments applied}, + author = {Jens Groth}, + school = {University of Aarhus}, + year = {2004}, + month = {October}, +} + +@inproceedings{groth05noninteractive, + author = {Jens Groth}, + title = {Non-interactive zero-knowledge arguments for voting}, + booktitle = {\bibconf[3rd]{ACNS}{Applied Cryptography + and Network Security}}, + location = {New York, NY}, + month = Jun, + year = 2005 +} + +% journal version of a 2003 conference paper in PKC +@article{ groth10verifiable, + author = {Jens Groth}, + title = {\href{https://link.springer.com/article/10.1007/s00145-010-9067-9}{A Verifiable Secret Shuffle of Homomorphic Encryptions}}, + journal = {Journal of Cryptology}, + volume = 23, + pages = {546-579}, + month = may, + year = 2010, +} + +@inproceedings{ grubbs17leakage, + title={\href{https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7958603}{Leakage-abuse + attacks against order-revealing encryption}}, + author={Grubbs, Paul and Sekniqi, Kevin and Bindschaedler, Vincent and + Naveed, Muhammad and Ristenpart, Thomas}, + booktitle={IEEE Symposium on Security and Privacy (SP)}, + pages={655--672}, + year={2017} +} + +@inproceedings{guarnizo2019pdfs, + title= {\href{https://arxiv.org/pdf/1808.06641.pdf}{PDFS: Practical Data Feed Service for Smart Contracts}}, + author={Guarnizo, Juan and Szalachowski, Pawel}, + booktitle={European Symposium on Research in Computer Security}, + pages={767--789}, + year={2019}, + organization={Springer} +} + +@article{guerraoui02non, + title={\href{https://pdfs.semanticscholar.org/1998/ddf989eb4bb7ba8fe1e678c26f2029e9911f.pdf}{Non-blocking atomic commit in asynchronous distributed systems with failure detectors}}, + author={Guerraoui, Rachid}, + journal={Distributed Computing}, + volume={15}, + number={1}, + pages={17--25}, + year={2002}, + publisher={Springer} +} + +@inproceedings{guerraoui13byzantine, + author = {Guerraoui, Rachid and Huc, Florian and Kermarrec, Anne-Marie}, + title = {Highly Dynamic Distributed Computing with Byzantine Failures}, + booktitle = {Proceedings of the 2013 ACM Symposium on Principles of Distributed Computing}, + series = {PODC '13}, + year = {2013}, + pages = {176--183}, + numpages = {8}, + publisher = {ACM}, + address = {New York, NY, USA}, + isbn = {978-1-4503-2065-8}, + url = {http://doi.acm.org/10.1145/2484239.2484263}, + doi = {10.1145/2484239.2484263}, + acmid = {2484263}, +} + +@inproceedings{ gutterman05hold, + author = {Zvi Gutterman and Dahlia Malkhi}, + title = {Hold Your Sessions: An Attack on {Java} Session-Id Generation}, + booktitle = {{CT-RSA}}, + year = 2005, + pages = {44-57}, +} + +@inproceedings{ gutterman06analysis, + author = {Zvi Gutterman and Benny Pinkas and Tzachy Reinman}, + title = {Analysis of the {Linux} Random Number Generator}, + booktitle = {{IEEE} Symposium on Security and Privacy}, + year = {2006}, + pages = {371-385}, +} + +%H + +@article{ haber91how, + author = {Stuart Haber and W. Scott Stornetta}, + title = {How to Time-Stamp a Digital Document}, + journal = {Journal of Cryptology}, + year = 1991, +} + +@misc { hanke18dfinity, + author = {Timo Hanke and Mahnush Movahedi and Dominic Williams}, + title = {\href{https://arxiv.org/abs/1805.04548}{DFINITY Technology Overview Series: Consensus System}}, + month = may, + year = 2018, +} + +@inproceedings{haeberlen11fuzz, + author = {Andreas Haeberlen and + Benjamin C. Pierce and + Arjun Narayan}, + title = {Differential Privacy Under Fire}, + booktitle = {\bibconf[20th]{USENIX Security}{Proceedings of USENIX Security Symposium}}, + location = {San Francisco, CA}, + month = aug, + year = 2011 +} + +@inproceedings{ haenni16cast, + author = {Rolf Haenni and Reto E. Koenig and Eric Dubuis}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-319-52240-1_5}{Cast-as-Intended Verification in Electronic Elections Based on Oblivious Transfer}}, + booktitle = {International Joint Conference on Electronic Voting}, + month = oct, + year = 2016, + location = {Bregenz, Austria}, +} + +@misc{ haenni19chvote, + author = {Rolf Haenni and Reto E. Koenig and Philipp Locher and Eric Dubuis}, + title = {\href{https://eprint.iacr.org/2017/325.pdf}{CHVote System Specification}}, + month = dec, + year = 2019, +} + +@inproceedings{halderman07harvesting, + author = {Halderman, J. Alex and Waters, Brent}, + title = {{Harvesting Verifiable Challenges from Oblivious Online Sources}}, + booktitle = {Proceedings of the 14th ACM Conference on Computer and Communications Security}, + series = {CCS '07}, + year = {2007}, + pages = {330--341}, + publisher = {ACM}, + address = {New York, NY, USA}, + isbn = {978-1-59593-703-2}, + location = {Alexandria, Virginia, USA}, + numpages = {12}, + url = {http://doi.acm.org/10.1145/1315245.1315287}, + doi = {10.1145/1315245.1315287}, + acmid = {1315287}, +} + +@inproceedings{hunt10zookeeper, + title={ZooKeeper: Wait-free Coordination for Internet-scale Systems.}, + author={Hunt, Patrick and Konar, Mahadev and Junqueira, Flavio Paiva and Reed, Benjamin}, + booktitle={USENIX annual technical conference}, + volume={8}, + number={9}, + year={2010} +} + +@inproceedings{hardjono2016cloud, + title={\href{https://hardjono.mit.edu/sites/default/files/documents/hardjono-smith-acm-iotpts2016.pdf}{Cloud-based commissioning of constrained devices using permissioned + blockchains}}, + author={Hardjono, Thomas and Smith, Ned}, + booktitle={Proceedings of the 2nd ACM International Workshop on IoT Privacy, + Trust, and Security}, + pages={29--36}, + year={2016}, + organization={ACM} +} + +@inproceedings{ hatsukazu87ibe, + author = {Hatsukazu Tanaka}, + title = {A Realization Scheme for the Identity-Based Cryptosystem}, + booktitle = {\bibconf{CRYPTO}{Advances in Cryptology}}, + year = {1987}, +} + +@misc{ havocscope19fake, + author = {Havocscope}, + title = {\href{https://www.havocscope.com/fake-id/}{Fake ID Cards, Driver Licenses, and Stolen Passports}}, + year = 2019, +} + +@article{he04quest, + title = {The quest for personal control over mobile location privacy}, + author = {Qi He and Dapeng Wu and Khosla, P.}, + journal = {Communications Magazine, IEEE}, + year = {2004}, + month = {may}, + volume = {42}, + number = {5}, + pages = {130 -- 136}, +} + +@inproceedings{heilman15eclipse, + title={\href{https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-heilman.pdf}{Eclipse Attacks on {Bitcoin}'s Peer-to-Peer Network}}, + author={Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon}, + booktitle={24th USENIX Security Symposium}, + pages={129--144}, + year={2015}, + url={https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-heilman.pdf}, +} + + +@inproceedings{henry10making, + title={Making a nymbler nymble using verbs}, + author={Henry, Ryan and Henry, Kevin and Goldberg, Ian}, + booktitle={PETS}, + year=2010 +} + +@inproceedings{henecka10tasty, + author={Henecka, Wilko and K\"ogl, Stefan and Sadeghi, Ahmad-reza and Schneider, Thomas and Wehrenberg, Immo}, + title={Tasty: Tool for Automating Secure Two-partY computations}, + booktitle={{ACM} Conference on Computer and Communications Security}, + month={August}, + year={2010} +} + +@inproceedings{ heninger12mining, + author = {Heninger, Nadia and Durumeric, Zakir and Wustrow, Eric and Halderman, J. Alex}, + title = {Mining Your {$P$}s and {$Q$}s: Detection of Widespread Weak Keys in Network Devices}, + year = 2012, + month = aug, + booktitle = {21st {USENIX} Security Symposium} +} + +@inproceedings{ herrmann09website, + author = {Dominik Herrmann and Rolf Wendolsky and Hannes Federrath}, + title = {Website Fingerprinting: Attacking Popular + Privacy Enhancing Technologies + with the Multinomial Na\"ive-Bayes Classifier}, + booktitle = {CCSW}, + month = nov, + year = 2009, +} + +@article{ herzberg95proactive, + title={\href{https://link.springer.com/chapter/10.1007/3-540-44750-4_27}{Proactive Secret Sharing Or: How to Cope With Perpetual Leakage}}, + author={Herzberg, Amir and Jarecki, Stanis{\l}aw and Krawczyk, Hugo and Yung, Moti}, + booktitle = {\bibconf[15th]{CRYPTO}{Advances in Cryptology}}, + pages={339--352}, + month=aug, + year={1995}, + location = {Santa Barbara, California, USA}, +} + +@inproceedings{ hildenbrandt18kevm, + author = {Everett Hildenbrandt and Manasvi Saxena and Nishant Rodrigues and + Xiaoran Zhu and Philip Daian and Dwight Guth and + Brandon Moore and Daejun Park and Yi Zhang and + Andrei Stefanescu and Grigore Rosu}, + title = {\href{https://ieeexplore.ieee.org/abstract/document/8429306}{KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine}}, + booktitle = {\bibconf[31st]{CSF}{Computer Security Foundations Symposium}}, + month = jul, + year = 2018, +} + +@article{ hirt00player, + author = {Martin Hirt and Ueli Maurer}, + title = {\href{https://link.springer.com/article/10.1007/s001459910003}{Player Simulation and General Adversary Structures in Perfect Multiparty Computation}}, + volume = 31, + pages = {31-60}, + month = apr, + year = 2000, +} + +@misc{ hoffman-andrews14verizon, + author = {Jacob Hoffman-Andrews}, + title = {Verizon Injecting Perma-Cookies to Track Mobile Customers, + Bypassing Privacy Controls}, + publisher = {Electronic Frontier Foundation}, + month = nov, + year = 2014, +} + +@inproceedings{ hohenberger14anonize, + author = {Susan Hohenberger and Steven Myers and Rafael Pass + and abhi shelat}, + title = {{ANONIZE}: A Large-Scale Anonymous Survey System}, + booktitle = {IEEE Security and Privacy}, + month = may, + year = 2014, +} + +@inproceedings{hohenberger06privacy, + author = {Susan Hohenberger and + Stephen A. Weis}, + title = {Honest-Verifier Private Disjointness Testing Without Random + Oracles}, + booktitle = {\bibconf{PETS}{Privacy Enhancing Technologies}}, + location = {New York, NY}, + month = jun, + year = 2006 +} + + +@inproceedings{holzer12secure, + author={Holzer, Andreas and Franz, Martin and Katzenbeisser, Stefan and Veith, Helmut}, + title={Secure two-party computations in {ANSI C}}, + booktitle={{ACM} Conference on Computer and Communications Security}, + month={October}, + year={2012} +} + + +@inproceedings{ hopper06on, + author = {Nicholas Hopper and Eugene Y. Vasserman}, + title = {On the Effectiveness of $k$-Anonymity Against + Traffic Analysis and Surveillance}, + booktitle = {WPES}, + month = oct, + year = 2006, + location = {Alexandria, VA}, +} + +@article{ horowitz18mystery, + author = {Jason Horowitz}, + title = {\href{https://www.nytimes.com/2018/02/28/world/europe/italy-election-davide-casaleggio-five-star.html}{The Mystery Man Who Runs Italy’s `Five Star' From the Shadows}}, + journal = {The New York Times}, + month = feb, + day = 28, + year = 2018, +} + +@inproceedings{houmansadr13freewave, + title={{I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention}}, + author={Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer}, + booktitle={\bibbrev{NDSS}{Network and Distributed System Security Symposium}}, + year={2013} +} + +@inproceedings{ houmansadr13parrot, + author = {Houmansadr, Amir and Brubaker, Chad and Shmatikov, Vitaly}, + title = {The Parrot is Dead: + Observing Unobservable Network Communications}, + booktitle = {IEEE \bibconf[34th]{SP}{Symposium on Security and Privacy}}, + month = may, + year = {2013}, +} + + +@inproceedings{huang12private, + author = {Yan Huang and + David Evans and + Jonathan Katz}, + title = {Private Set Intersection: Are Garbled Circuits Better than + Custom Protocols?}, + booktitle = {NDSS}, + year = {2012} +} + +@article{huang2017seshare, + title={\href{https://onlinelibrary.wiley.com/doi/full/10.1002/cpe.4359}{SeShare: Secure cloud data sharing based on blockchain and public auditing}}, + author={Huang, Longxia and Zhang, Gongxuan and Yu, Shui and Fu, Anmin and Yearwood, John}, + journal={Concurrency and Computation: Practice and Experience}, + publisher={Wiley Online Library} +} + + + +@inproceedings{ huhnlein03ibe, + title={Towards practical non-interactive public key cryptosystems using non-maximal imaginary quadratic orders}, + author={H{\"u}hnlein, Detlef and Jacobson, Michael and Weber, Damian}, + booktitle={Journal Designs, Codes and Cryptography}, + year={2003}, +} + +@inproceedings{ huisman06temporal, + author = {Marieke Huisman and + Pratik Worah and + Kim Sunesen}, + title = {A temporal logic characterisation of observational determinism}, + booktitle = {IEEE \bibconf[19th]{CSFW}{computer Security Foundation Workshop}}, + month = jul, + year = {2006}, +} + + +%I + +@misc{ intel14software, + author = {{Intel}}, + title = {\href{https://software.intel.com/sites/default/files/managed/48/88/329298-002.pdf}{Software Guard Extensions Programming Reference}}, + month = oct, + year = 2014, +} + +@inproceedings{ ioannidis06privacy, + author = {Ioannidis, Sotiris and + Sidiroglou, Stelios and Keromytis, Angelos D.}, + title = {Privacy as an operating system service}, + booktitle = {Proceedings of the 1st USENIX + Workshop on Hot Topics in Security}, + series = {HOTSEC'06}, + year = {2006}, + location = {Vancouver, B.C., Canada}, + pages = {8--8}, + publisher = {USENIX Association}, + address = {Berkeley, CA, USA}, +} + + + +%J + + +@article{jaccard, + author = {Paul Jaccard}, + journal = {Bulletin de la Soci\'et\'e Vaudoise des Sciences Naturelles}, + title = {{\'Etude} comparative de la distribution florale dans une portion des {A}lpes et du {J}ura}, + volume = 37, + number = 142, + pages = {547-579}, + month = jun, + year = 1901, +} + + + + +@inproceedings{jansen14onions, + author = {Rob Jansen and Andrew Miller and Paul Syverson + and Bryan Ford}, + title = {From Onions to Shallots: Rewarding {Tor} Relays with {TEARS}}, + booktitle = {Workshop on Hot Topics in Privacy Enhancing Technologies + (HotPETs)}, + month = jul, + year = 2014, + location = {Amsterdam, Netherlands}, +} + +@inproceedings{jakobsson00addition, + title={Addition of {El Gamal} Plaintexts}, + author={Jakobsson, Markus and Juels, Ari}, + booktitle={\bibconf{ASIACRYPT}{Advances in Cryptology}}, + year={2000}, +} + +@inproceedings{jakobsson99quorum, + title={\href{https://link.springer.com/chapter/10.1007/3-540-49162-7_9}{On quorum controlled asymmetric proxy re-encryption}}, + author={Jakobsson, Markus}, + booktitle={Public key cryptography}, + pages={632--632}, + year={1999}, + organization={Springer} +} + +@inproceedings{ jarabek12thinav, + author = {Jarabek, Chris and Barrera, David and Aycock, John}, + title = {\href{http://doi.acm.org/10.1145/2420950.2420983}{ThinAV: Truly + Lightweight Mobile Cloud-based Anti-malware}}, + booktitle = {Proceedings of the 28th Annual Computer Security Applications + Conference}, + series = {ACSAC '12}, + year = {2012}, + location = {Orlando, Florida, USA}, + numpages = {10}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{ji15your, + author = {Shouling Ji and + Weiqing Li and + Neil Zhenqiang Gong and + Prateek Mittal and + Raheem A. Beyah}, + title = {On Your Social Network De-anonymizablity: + {Q}uantification and Large Scale Evaluation with Seed Knowledge}, + booktitle = {\bibconf[22nd]{NDSS}{Network and Distributed System Security + Symposium}}, + location = {San Diego, CA}, + month = apr, + year = 2015 +} + +@inproceedings{ jiang07preserving, + author = {Jiang, Tao and Wang, Helen J. and Hu, Yih-Chun}, + title = {Preserving location privacy in wireless lans}, + booktitle = {Proceedings of the 5th international conference on Mobile systems, applications and services}, + series = {MobiSys '07}, + year = {2007}, + location = {San Juan, Puerto Rico}, + pages = {246--257}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{ johansen07firepatch, + author={Johansen, H{\aa}vard and Johansen, Dag and van Renesse, Robbert}, + editor={Venter, Hein and Eloff, Mariki and Labuschagne, Les and Eloff, Jan + and von Solms, Rossouw}, + title={\href{http://dl.ifip.org/db/conf/sec/sec2007/JohansenJR07.pdf} + {FirePatch: Secure and Time-Critical Dissemination of Software Patches}}, + bookTitle={New Approaches for Security, Privacy and Trust in Complex + Environments: Proceedings of the IFIP TC-11 22nd International Information + Security Conference (SEC 2007)}, + month={may}, + year={2007} +} + + + +@inproceedings{ johnson13users, + author = {Johnson, Aaron and Wacek, Chris and Jansen, Rob and Sherr, Micah and Syverson, Paul}, + title = {Users Get Routed: Traffic Correlation on {Tor} by Realistic Adversaries}, + booktitle = {\bibconf[20th]{CCS}{ACM Conference on + Computer and Communications Security}}, + month = nov, + year = {2013}, +} + +@inproceedings{johnson07nymble, + title={Nymble: {A}nonymous {IP}-address blocking}, + author={Johnson, Peter C and Kapadia, Apu and Tsang, Patrick P and Smith, Sean W}, + booktitle={PETS}, + year=2007 +} + +@article{josang07survey, + title={A survey of trust and reputation systems for online service provision}, + author={J{\o}sang, Audun and Ismail, Roslan and Boyd, Colin}, + journal={Decision support systems}, + volume={43}, + number={2}, + pages={618--644}, + year={2007}, + publisher={Elsevier} +} + +@misc{ jovanovic16byzcoin, + title = {\href{http://hackingdistributed.com/2016/08/04/byzcoin/}{ByzCoin: Securely Scaling Blockchains}}, + author = {Philipp Jovanovic}, + month = {August}, + year = {2016}, + howpublished = {\href{http://hackingdistributed.com/}{Hacking, Distributed}}, +} + +@inproceedings{ juels02verifiable, + author = {Juels, Ari and Guajardo, Jorge}, + title = {{RSA} Key Generation with Verifiable Randomness}, + year = 2002, + month = feb, + booktitle = {Public Key Cryptography} +} + +@inproceedings{ juels16investigating, + author = {Ari Juels and Ahmed Kosba and Elaine Shi}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/2976749.2978362}{The Ring of Gyges: Investigating the Future of Criminal Smart Contracts}}, + booktitle = {\bibconf{CCS}{ACM Conference on Computer and + Communications Security}}, + month = oct, + year = 2016, +} + +@inproceedings{junqueira11zab, + title={Zab: High-performance broadcast for primary-backup systems}, + author={Junqueira, Flavio P and Reed, Benjamin C and Serafini, Marco}, + booktitle={2011 IEEE/IFIP 41st International Conference on Dependable Systems \& Networks (DSN)}, + pages={245--256}, + year={2011}, + organization={IEEE} +} + +%K + +@inproceedings{kalodner2018arbitrum, + title={Arbitrum: Scalable, private smart contracts}, + author={Kalodner, Harry and Goldfeder, Steven and Chen, Xiaoqi and Weinberg, S Matthew and Felten, Edward W}, + booktitle={Proceedings of the 27th USENIX Conference on Security Symposium}, + pages={1353--1370}, + year={2018}, + organization={USENIX Association} +} + +@inproceedings{karame12double, + title={\href{https://eprint.iacr.org/2012/248.pdf}{Double-spending fast payments in {Bitcoin}}}, + author={Karame, Ghassan O and Androulaki, Elli and Capkun, Srdjan}, + booktitle={19th ACM Conference on Computer and communications security}, + pages={906--917}, + year={2012}, + organization={ACM}, + url={https://eprint.iacr.org/2012/248.pdf}, +} + + +@INPROCEEDINGS{ karger05multilevel, + author = {Paul A. Karger}, + title = {Multi-level security requirements for hypervisors}, + booktitle = {Computer Security Applications Conference, 21st Annual}, + series = {ACSAC '05}, + year = {2005}, + month = {Dec.}, +} + +@inproceedings{kate09distributed, + title={\href{https://ieeexplore.ieee.org/abstract/document/5158416/}{Distributed Key Generation for the Internet}}, + author={Kate, Aniket and Goldberg, Ian}, + booktitle={\bibconf[29th]{ICDCS}{International Conference on Distributed Computing Systems}}, + pages={119--128}, + month=jun, + year={2009}, + organization={IEEE} +} + +@inproceedings{ kate10distributed, + author = {Aniket Kate and Ian Goldberg}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-642-15317-4_27}{Distributed Private-Key Generators for Identity-Based Cryptography}}, + booktitle = {\bibconf[7th]{SCN}{Security and Cryptography for Networks}}, + month = sep, + year = 2010, + location = {Amalfi, Italy}, +} + +@misc{ kate12distributed, + author = {Aniket Kate and Yizhou Huang and Ian Goldberg}, + title = {\href{https://eprint.iacr.org/2012/377.pdf}{Distributed Key Generation in the Wild}}, + howpublished = {Cryptology ePrint Archive, Report 2012/377}, + month = jul, + year = 2012, +} + +@incollection{katz01cryptographic, + title={Cryptographic counters and applications to electronic voting}, + author={Katz, Jonathan and Myers, Steven and Ostrovsky, Rafail}, + booktitle={Eurocrypt}, + pages={78--92}, + year={2001}, + publisher={Springer} +} + + +@misc{keating07arrested, + title = {Use Tor P2P - Get Arrested}, + author = {Tom Keating}, + publisher = {{TMC}net}, + month = "September", + day = 17, + year = 2007, + note = {\url{http://blog.tmcnet.com/blog/tom-keating/p2p/use-tor-p2p-get-arrested.asp}} +} + +@inproceedings{kedogan02limits, + author = {Kedogan, Dogan and Agrawal, Dakshi and Penz, Stefan}, + title = {Limits of Anonymity in Open Environments}, + booktitle = {Workshop on Information Hiding}, + month = oct, + year = {2002}, +} + +@phdthesis{kelly09taxonomy, + author = {Kelly, Douglas J.}, + title = {A taxonomy for and analysis of anonymous communications networks}, + year = {2009}, + isbn = {978-1-109-07876-3}, + note = {AAI3351544}, + publisher = {Air Force Institute of Technology}, + address = {Wright Patterson AFB, OH, USA}, +} + +@inproceedings{kelly08towards, + title={Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary}, + author={Kelly, Douglas and Raines, Richard and Baldwin, Rusty and Mullins, Barry and Grimaila, Michael}, + booktitle={\bibbrev{IPCCC}{International Performance, Computing, + and Communications Conference}}, + pages={524--531}, + year={2008}, + organization={IEEE} +} + +@misc{ kessem15CaaS, + author = {Limor Kessem}, + title = {\href{https://securityintelligence.com/certificates-as-a-service-code-signing-certs-become-popular-cybercrime-commodity/}{Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity +}}, + month = sep, + year = 2015, +} + + +@article{ kessem15certificates, + author = {Limor Kessem}, + title = {\href{https://securityintelligence.com/certificates-as-a-service-code-signing-certs-become-popular-cybercrime-commodity/}{Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity}}, + month = sep, + year = 2015, + journal = {Security Intelligence}, +} + +@inproceedings{kirsch08paxos, + title={Paxos for system builders: An overview}, + author={Kirsch, Jonathan and Amir, Yair}, + booktitle={Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware}, + pages={1--6}, + year={2008} +} + + +@article{khattak11trust, + title={Analysis of Open Environment Sign-in Schemes-Privacy Enhanced \& Trustworthy Approach}, + author={Khattak, Zubair Ahmad and Manan, Jamalul-lail Ab and Sulaiman, Suziah and others}, + journal={Journal of Advances in Information Technology}, + year={2011} +} + +@article{ khrennikov14putin, + author = {Ilya Khrennikov}, + title = {\href{http://www.bloomberg.com/news/2014-07-29/putin-sets-110-000-bounty-for-cracking-tor-as-anonymous-internet-usage-in-russia-surges.html}{Putin Sets \$110,000 Bounty for Cracking Tor as Anonymous Internet Usage in Russia Surges}}, + journal = {Bloomberg Business}, + month = jul, + year = 2014, +} + +@misc{ kiayias16ouroboros, + author = {Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov}, + title = {\href{http://eprint.iacr.org/2016/889}{Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol}}, + howpublished = {Cryptology ePrint Archive, Report 2016/889}, + year = {2016}, +} + +@inproceedings{kiayias05testing, + author = {Aggelos Kiayias and + Antonina Mitrofanova}, + title = {Testing Disjointness of Private Datasets}, + booktitle = {Financial Cryptography and Data Security}, + year = {2005} +} + +@techreport{kiayias15speed, + title={\href{https://eprint.iacr.org/2015/1019.pdf}{Speed-Security Tradeoffs in Blockchain Protocols}}, + author={Kiayias, Aggelos and Panagiotakos, Giorgos}, + year={2015}, + institution={IACR: Cryptology ePrint Archive} +} + +@inproceedings{kim01communication, + title={\href{https://netsec.ethz.ch/publications/papers/ifip-sec-2001.pdf}{Communication-efficient group key agreement}}, + author={Kim, Yongdae and Perrig, Adrian and Tsudik, Gene}, + booktitle={IFIP International Information Security Conference}, + pages={229--244}, + year={2001} +} + +@inproceedings{ kim13accountable, + author = {Tiffany Hyun-Jin Kim and Lin-Shung Huang and Adrian Perrig and Collin Jackson and Virgil Gligor}, + title = {\href{https://www.cs.cmu.edu/~xia/resources/Documents/kim-www13.pdf}{Accountable Key Infrastructure {(AKI)}: A Proposal for a Public-Key Validation Infrastructure}}, + booktitle = {\bibconf{WWW}{International Word Wide Web Conference}}, + year = 2014, +} + +@article{ kirk13could, + author = {Jeremy Kirk}, + title = {\href{http://www.computerworld.com/article/2498077/desktop-apps/could-the-bitcoin-network-be-used-as-an-ultrasecure-notary-service-.html}{Could the {Bitcoin} network be used as an ultrasecure notary service?}}, + month = may, + year = 2013, + journal = {Computerworld}, +} + +@inproceedings{kissner05privacy, + author = {Lea Kissner and + Dawn Xiaodong Song}, + title = {Privacy-Preserving Set Operations}, + booktitle = {\bibconf[25th]{CRYPTO}{Annual International + Cryptology Conference}}, + publisher = {Springer}, + location = {Santa Barbara, CA}, + month = aug, + year = 2005 +} + +@article{ kline08security, + author = {Candice L. Kline}, + title = {\href{https://heinonline.org/HOL/LandingPage?handle=hein.journals/utol39&div=34}{Security Theater and Database-Driven Information Markets: a Case for an Omnibus U.S. Data Privacy Statute}}, + journal = {The University of Toledo Law Review}, + volume = 39, + number = 1, + month = feb, + year = 2008, +} + +@inproceedings{ knockel11three, + author = {Jeffrey Knockel and Jedidiah R. Crandall and Jared Saia}, + title = {Three Researchers, Five Conjectures: + An Empirical Analysis of {TOM-Skype} Censorship and Surveillance}, + booktitle = {\bibbrev{FOCI}{USENIX Workshop on Free and Open + Communications on the Internet}}, + month = aug, + year = 2011, + location = {San Francisco, CA}, +} + +@article{ kobeissi13cryptocat, + title={Cryptocat: Adopting Accessibility and Ease of Use as Security Properties}, + author={Kobeissi, Nadim and Breault, Arlo}, + journal={arXiv preprint arXiv:1306.5156}, + year={2013} +} + +@inproceedings{ kokoris16enhancing, + author = {Eleftherios Kokoris-Kogias and Philipp Jovanovic and Nicolas Gailly and Ismail Khoffi and Linus Gasser and Bryan Ford}, + title = {\href{http://arxiv.org/abs/1602.06997}{Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing}}, + booktitle = {Proceedings of the 25th USENIX Conference on Security Symposium}, + year = {2016}, +} + +@inproceedings{ kokoris16enhancing-short, + author = {Eleftherios Kokoris-Kogias and others}, + title = {\href{http://arxiv.org/abs/1602.06997}{Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing}}, + booktitle = {25th USENIX Conference on Security Symposium}, + year = {2016}, +} + +@techreport{kokoris16managing, + title={\href{https://www.securityweek2016.tu-darmstadt.de/fileadmin/user_upload/Group_securityweek2016/pets2016/1_Managing_identities_bryan_ford_etc.pdf}{Managing Identities Using Blockchains and CoSi}}, + author={Kokoris-Kogias, Eleftherios and Gasser, Linus and Khoffi, Ismail and Jovanovic, Philipp and Gailly, Nicolas and Ford, Bryan}, + year={2016}, + institution={9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016)} +} + +@inproceedings{kokoris17omniledger, + title={\href{https://eprint.iacr.org/2017/406.pdf}{OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding}}, + author={Kokoris-Kogias, Eleftherios and Jovanovic, Philipp and Gasser, Linus and Gailly, Nicolas and Syta, Ewa and Ford, Bryan}, + booktitle={39th {IEEE Symposium on Security and Privacy}}, + pages={19--34}, + year={2018}, + organization={IEEE} +} + +@misc{kokoris18calypso, + author = {Eleftherios Kokoris-Kogias and Enis Ceyhun Alp and Sandra Deepthy Siby and Nicolas Gailly and Linus Gasser and Philipp Jovanovic and Ewa Syta and Bryan Ford}, + title = {\href{https://eprint.iacr.org/2018/209}{Verifiable Management of Private Data under Byzantine Failures}}, + howpublished = {Cryptology ePrint Archive, Report 2018/209}, + year = {2018}, +} + +@phdthesis{kokoris19secure, + title={\href{https://drive.google.com/open?id=1tl1nNqLUhgubzxlRkNfMBcWZVl_N0WT3}{Secure, Confidential Blockchains Providing High Throughput and Low Latency}}, + author={Kokoris-Kogias, Eleftherios}, + school = {\'Ecole Polytechnique F\'ed\'erale de Lausanne (EPFL)}, + month = may, + year = 2019, +} + +@misc{ kokoris19bootstrapping, + author = {Eleftherios Kokoris-Kogias and Alexander Spiegelman and + Dahlia Malkhi and Ittai Abraham}, + title = {\href{https://eprint.iacr.org/2019/1015.pdf}{Bootstrapping + Consensus Without Trusted Setup: + Fully Asynchronous Distributed Key Generation}}, + month = sep, + year = 2019, + howpublished = {Cryptology ePrint Archive Report 2019/1015}, +} + +@inproceedings{kosba2016hawk, + title={Hawk: The blockchain model of cryptography and privacy-preserving smart contracts}, + author={Kosba, Ahmed and Miller, Andrew and Shi, Elaine and Wen, Zikai and Papamanthou, Charalampos}, + booktitle={2016 IEEE symposium on security and privacy (SP)}, + pages={839--858}, + year={2016}, + organization={IEEE} +} + +@inproceedings{koscher10experimental, + title={Experimental security analysis of a modern automobile}, + author={Koscher, Karl and Czeskis, Alexei and Roesner, Franziska and + Patel, Shwetak and Kohno, Tadayoshi and Checkoway, Stephen and + McCoy, Damon and Kantor, Brian and Anderson, Danny and Shacham, Hovav and + Savage, Stefan}, + booktitle={IEEE Security and Privacy}, + year={2010}, + month=may, +} + +@misc{ kozlov19league, + author = {Dina Kozlov}, + title = {\href{https://blog.cloudflare.com/league-of-entropy/}{League of Entropy: Not All Heroes Wear Capes}}, + howpublished = {CloudFlare Blog}, + month = jun, + year = 2019, +} + +@inproceedings{ kranch15upgrading, + author = {Michael Kranch and Joseph Bonneau}, + title = {Upgrading {HTTPS} in Mid-Air: An Empirical Study of + Strict Transport Security and Key Pinning}, + booktitle = {Network and Distributed System Security Symposium (NDSS)}, + month = feb, + year = 2015, +} + + +@inproceedings{kreuter13pcf, + author={Kreuter, Ben and Mood, Benjamin and shelat, abhi and Butler, Kevin}, + title={{PCF}: A Portable Circuit Format for Scalable Two-Party Secure Computation}, + booktitle={{USENIX} Security Symposium}, + month={August}, + year={2013}, +} + +@misc{ kroll14secure, + author = {Joshua A. Kroll and Edward W. Felten and Dan Boneh}, + title = {\href{https://freedom-to-tinker.com/blog/felten/secure-protocols-for-accountable-warrant-execution/}{Secure protocols for accountable warrant execution}}, + month = apr, + year = 2014, +} + +@inproceedings{krohn04fly, + title={On-the-fly verification of rateless erasure codes for efficient content distribution}, + author={Krohn, Maxwell N and Freedman, Michael J and Mazieres, David}, + booktitle={Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on}, + pages={226--240}, + year={2004}, + organization={IEEE} +} + + +@inproceedings{kulynych17claimchain, + title={\href{https://dl.acm.org/citation.cfm?id=3268947}{ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging}}, + author={Kulynych, Bogdan and Lueks, Wouter and Isaakidis, Marios and Danezis, George and Troncoso, Carmela}, + booktitle={Proceedings of the 2018 Workshop on Privacy in the Electronic Society}, + pages={86--103}, + year={2018}, + organization={ACM} +} + +@inproceedings{kumaresan15use, + title={\href{https://people.csail.mit.edu/ranjit/papers/poker.pdf}{How to use bitcoin to play decentralized poker}}, + author={Kumaresan, Ranjit and Moran, Tal and Bentov, Iddo}, + booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, + pages={195--206}, + year={2015}, + organization={ACM} +} + +@inproceedings{ kuppusamy16diplomat, + author = {Trishank Karthik Kuppusamy and Santiago Torres-Arias and Vladimir Diaz and Justin Cappos}, + title = {\href{https://www.usenix.org/node/194973}{Diplomat: Using Delegations to Protect Community Repositories}}, + booktitle = {\bibconf[13th]{NSDI}{USENIX Symposium on Networked Systems Design and Implementation}}, + month = mar, + year = 2016, +} + +@inproceedings{kwon16riffle, + author = {Albert Kwon and + David Lazar and + Srinivas Devadas and + Bryan Ford}, + title = {Riffle: {A}n efficient communication system with strong + anonymity}, + booktitle = {\bibconf[16th]{PETS}{Privacy Enhancing Technologies}}, + location = {Darmstadt, Germany}, + month = jul, + year = 2016 +} + +@article{kwon14tendermint, + title={\href{http://tendermint.com/docs/tendermint.pdf}{TenderMint: Consensus without Mining}}, + author={Kwon, Jae}, + year={2014} +} + +@article{kwon16atom, + author = {Albert Kwon and + Henry Corrigan{-}Gibbs and + Srinivas Devadas and + Bryan Ford}, + title = {Atom: Scalable Anonymity Resistant to Traffic Analysis}, + journal = {CoRR}, + volume = {abs/1612.07841}, + year = {2016}, + url = {http://arxiv.org/abs/1612.07841}, + archivePrefix = {arXiv}, + eprint = {1612.07841}, + timestamp = {Wed, 07 Jun 2017 14:40:14 +0200}, + biburl = {http://dblp.org/rec/bib/journals/corr/KwonCDF16}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + +@misc{kyber, + title = {\href{https://github.com/dedis/kyber}{The {Kyber} Cryptography Library}}, + key = {kyber}, + year = {2010 -- 2018}, +} + +%L + +@article{lampson1992, + Author = {Lampson, Butler and Abadi, Mart\'{\i}n and Burrows, Michael and Wobber, Edward}, + Journal = {ACM Trans. Comput. Syst.}, + Title = {Authentication in distributed systems: theory and practice}, + Year = {1992} + } + +@inproceedings{lampson96build, + title={How to build a highly available system using consensus}, + author={Lampson, Butler W}, + booktitle={International Workshop on Distributed Algorithms}, + pages={1--17}, + year={1996}, + organization={Springer} +} + +@article{langley13anssi, + author = {Adam Langley}, + title = {\href{http://googleonlinesecurity.blogspot.com/2013/12/further-improving-digital-certificate.html}{Further improving digital certificate security}}, + journal = {Google Online Security Blog}, + month = dec, + year = 2013, + day = 7, +} + +@article{langley15cnnic, + author = {Adam Langley}, + title = {\href{http://googleonlinesecurity.blogspot.nl/2015/03/maintaining-digital-certificate-security.html?m=1}{Maintaining digital certificate security }}, + journal = {Google Online Security Blog}, + month = mar, + year = 2015, + day = 23, +} + +@article{laurie14CT, + author = {Laurie, Ben}, + title = {\href{https://queue.acm.org/detail.cfm?id=2668154}{Certificate Transparency}}, + journal = {ACM Queue}, + month = sep, + year = {2014}, + volume = 12, + number = 8, +} + +@misc{laurie13CTrfc, + title={RFC 6962: Certificate transparency}, + author={Laurie, Ben and Langley, Adam and Kasper, Emilia}, + month = jun, + year={2013}, +} + +@misc{ laurie15improving, + author = {Ben Laurie}, + title = {\href{https://www.certificate-transparency.org/ev-ct-plan}{Improving the Security of EV Certificates}}, + month = may, + year = 2015, +} + +@inproceedings{leblond2014ngo, + title={A look at targeted attacks through the lense of an {NGO}}, + author={Le Blond, Stevens and Uritesc, Adina and Gilbert, Cedric and Leong Chua, Zheng + and Saxena, Prateek and Kirda, Engin}, + booktitle={USENIX Security}, + year={2014} +} + +@inproceedings{ leblond18enforcing, + author = {Stevens Le Blond and Alejandro Cuevas and + Juan Ramón Troncoso-Pastoriza and Philipp Jovanovic and + Bryan Ford and Jean-Pierre Hubaux}, + title = {\href{https://bford.info/pub/dec/immunity-abs/}{On Enforcing the Digital Immunity of a Large Humanitarian Organization}}, + booktitle = {\bibconf{S\&P}{IEEE Symposium on Security and Privacy}}, + month = may, + year = 2018, +} + +@inproceedings{lee13anon, + title={Anon-pass: Practical anonymous subscriptions}, + author={Lee, Michael Z and Dunn, Alan M and Waters, Brent and Witchel, Emmett and Katz, Jonathan}, + booktitle = {\bibconf{S\&P}{IEEE Symposium on Security and Privacy}}, + year={2013}, +} + +@article{ lenstra12ron, + title = {Ron was wrong, Whit is right}, + author = {Lenstra, Arjen K and Hughes, James P and + Augier, Maxime and Bos, Joppe W and Kleinjung, Thorsten and Wachter, Christophe}, + journal = {{IACR} eprint archive}, + volume = 64, + year = 2012, +} + +@misc{ lenstra15random, + author = {Arjen K. Lenstra and Benjamin Wesolowski}, + title = {\href{https://eprint.iacr.org/2015/366.pdf}{A random zoo: sloth, unicorn, and trx}}, + howpublished = {{IACR} eprint archive}, + month = apr, + year = 2015, +} + +@article{ lemos11effobs, + author = {Robert Lemos}, + title = {\href{http://www.infoworld.com/article/2620473/encryption/eff-builds-system-to-warn-of-certificate-breaches.html}{EFF builds system to warn of certificate breaches}}, + journal = {InfoWorld }, + month = september, + year = 2011, + day = 21, +} + +@misc{lee11litecoin, + title={\href{https://bitcointalk.org/index.php?topic=47417.0}{Litecoin -- A Light Version of Bitcoin}}, + author={Charlie Lee}, + year={2011} +} + +@inproceedings{ lee20replicated, + author = {Jonathan Lee and Kirill Nikitin and Srinath Setty}, + title = {\href{https://eprint.iacr.org/2020/195.pdf}{Replicated state machines + without replicated execution}}, + booktitle = {To appear in the IEEE Symposium on Security and Privacy}, + month = may, + year = {2020}, +} + + +@article{levy03poisoning, + author={E. Levy}, + journal={IEEE Security Privacy}, + title={\href{http://ieeexplore.ieee.org/document/1203227/}{Poisoning the + software supply chain}}, + year={2003}, + volume={1}, + number={3}, + pages={70-73}, + month={may} +} + +@inproceedings{lewenberg15inclusive, + title={\href{https://link.springer.com/chapter/10.1007/978-3-662-47854-7_33}{Inclusive block chain protocols}}, + author={Lewenberg, Yoad and Sompolinsky, Yonatan and Zohar, Aviv}, + booktitle={International Conference on Financial Cryptography and Data Security}, + pages={528--547}, + year={2015}, + organization={Springer} +} + +@inproceedings{li04secure, + title={Secure untrusted data repository (SUNDR)}, + author={Li, Jinyuan and Krohn, Maxwell N and Mazi{\`e}res, David and Shasha, Dennis}, + booktitle={OSDI}, + year={2004} +} + +@inproceedings{ li06bar, + author = {Harry C. Li and Allen Clement and Edmund L. Wong and Jeff Napper + and Indrajit Roy and Lorenzo Alvisi and Michael Dahlin}, + title = {\href{https://dl.acm.org/citation.cfm?id=1298474}{BAR Gossip}}, + booktitle = {\bibconf[7th]{OSDI}{Operating Systems Design and Implementation}}, + month = nov, + year = 2006, + location = {Seattle, Washington, USA}, +} + +@article{ li06revere, + author = {Li, Jun and Reiher, P. L. and Popek, G. J.}, + title = + {\href{http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1258125}{Resilient + Self-organizing Overlay Networks for Security Update Delivery}}, + journal = {IEEE J.Sel. A. Commun.}, + issue_date = {September 2006}, + volume = {22}, + number = {1}, + month = sep, + year = {2006}, + numpages = {14}, + publisher = {IEEE Press}, +} + +@inproceedings{liang06index, + title={The Index Poisoning Attack in P2P File Sharing Systems.}, + author={Liang, Jian and Naoumov, Naoum and Ross, Keith W}, + booktitle={INFOCOM}, + pages={1--12}, + year={2006}, + organization={Citeseer} +} + +@article{ lindeman12gentle, + author = {Mark Lindeman and Philip B. Stark}, + title = {\href{https://ieeexplore.ieee.org/document/6175884}{A Gentle Introduction to Risk-Limiting Audits}}, + journal = {IEEE Security \& Privacy}, + volume = 10, + number = 5, + month = sep, + year = 2012, +} + +@inproceedings{linn16blockchain, + title={\href{https://www.healthit.gov/sites/default/files/11-74-ablockchainforhealthcare.pdf}{Blockchain for health data and its potential use in health it and health care related research}}, + author={Linn, Laure A and Koo, Martha B}, + booktitle={ONC/NIST Use of Blockchain for Healthcare and Research Workshop. Gaithersburg, Maryland, United States: ONC/NIST}, + year={2016} +} + +@misc{linux16hyperledger, + title = {\href{https://www.hyperledger.org/}{Hyperledger Project}}, + author = {{Linux Foundation}}, + url = {https://www.hyperledger.org/}, + year = {2016}, +} + + +@inproceedings{liu05linkable, + author = {Liu, Joseph K and + Wong, Duncan S}, + title = {Linkable ring signatures: {S}ecurity models and new schemes}, + booktitle = {\bibconf{ICCSA}{Computational Science and Its Applications}}, + location = {Singapore}, + month = may, + year=2005 +} + +@inproceedings{ liu13screenpass, + author = {Dongtao Liu and Eduardo Cuervo and Valentin Pistol and + Ryan Scudellari and Landon P. Cox}, + title = {ScreenPass: Secure Password Entry on Touchscreen Devices}, + booktitle = {\bibconf[11th]{MobiSys}{International Conference on + Mobile Systems, Applications, and Services}}, + month = jun, + year = 2013, + location = {Taipei, Taiwan}, +} + +@inproceedings{ liu15end, + author = {Yabing Liu and Will Tome and Liang Zhang and David Choffnes + and Dave Levin and Bruce Maggs and Alan Mislove + and Aaron Schulman and Christo Wilson}, + title = {\href{http://conferences2.sigcomm.org/imc/2015/papers/p183.pdf}{An End-to-End Measurement of Certificate Revocation in the Web's PKI}}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = 2015, + location = {Tokyo, Japan}, +} + +@inproceedings{liu2013improved, + title={Improved group off-the-record messaging}, + author={Liu, Hong and Vasserman, Eugene Y and Hopper, Nicholas}, + booktitle = {\bibconf{WPES}{ACM workshop on Privacy in the electronic society}}, + year={2013}, +} + +@misc{loss18combining, + author = {Julian Loss and Tal Moran}, + title = {\href{https://eprint.iacr.org/2018/235}{Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds}}, + howpublished = {Cryptology ePrint Archive, Report 2018/235}, + year = {2018}, +} + +@article{ loucaides19what, + author = {Darren Loucaides}, + title = {\href{https://www.wired.com/story/italy-five-star-movement-techno-utopians/}{What Happens When Techno-Utopians Actually Run a Country}}, + journal = {Wired}, + month = feb, + day = 14, + year = 2019, +} + +@article{lu08pseudotrust, + author={Li Lu and Jinsong Han and Yunhao Liu and Lei Hu + and Jin-Peng Huai and Ni, L. and Jian Ma}, + journal={Parallel and Distributed Systems, IEEE Transactions on}, + title={Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps}, + year={2008}, + month= oct, + volume={19}, + number={10}, + pages={1325 -1337}, +} + + + +@incollection{lu06sequential, + title={Sequential aggregate signatures and multisignatures without random oracles}, + author={Lu, Steve and Ostrovsky, Rafail and Sahai, Amit and Shacham, Hovav and Waters, Brent}, + booktitle={\bibconf{EUROCRYPT}{Conference on Theory and application of cryptographic techniques}}, + year={2006}, + +} + +@article{lu08pseudotrust, + author={Li Lu and Jinsong Han and Yunhao Liu and Lei Hu + and Jin-Peng Huai and Ni, L. and Jian Ma}, + journal={Parallel and Distributed Systems, IEEE Transactions on}, + title={Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps}, + year={2008}, + month= oct, + volume={19}, + number={10}, + pages={1325 -1337}, +} + +@inproceedings{lucas09flybynight, + author = {Matthew M. Lucas and + Nikita Borisov}, + title = {{flyByNight}: mitigating the privacy risks of social networking}, + booktitle = {\bibconf{SOUPS}{Symposium on Usable Privacy and Security}}, + year = {2009}, +} + +@inproceedings{ luckie15resilience, + author = {Matthew Luckie and Robert Beverly and Tiange Wu and Mark Allman and + kc claffy}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/2815675.2815700}{Resilience of Deployed TCP to Blind Attacks}}, + booktitle = {\bibbrev{IMC}{Internet Measurement Conference}}, + year = 2015, +} +% month = oct, + +@phdthesis{lueks17security, + title={\href{http://repository.ubn.ru.nl/bitstream/handle/2066/176475/176475.pdf?sequence=1}{Security and Privacy via Cryptography Having your cake and eating it too}}, + author={Lueks, W}, + year={2017}, + school={[Sl: sn]} +} + + +@inproceedings{luo09facecloak, + author = {Wanying Luo and + Qi Xie and + Urs Hengartner}, + title = {{FaceCloak}: {A}n Architecture for User Privacy on + Social Networking Sites}, + booktitle = {\bibconf{CSE}{International Conference on + Computational Science and Engineering}}, + year = {2009} +} + +@inproceedings{luu15demystifying, + author = {Luu, Loi and Teutsch, Jason and Kulkarni, Raghav and Saxena, Prateek}, + title = {\href{http://doi.acm.org/10.1145/2810103.2813659}{Demystifying + Incentives in the Consensus Computer}}, + booktitle = {Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security}, + series = {CCS '15}, + year = {2015}, + location = {Denver, Colorado, USA}, + pages = {706--719}, + numpages = {14}, + publisher = {ACM}, +} + +@inproceedings{luu16secure, + author = {Luu, Loi and Narayanan, Viswesh and Zheng, Chaodong and Baweja, Kunal and Gilbert, Seth and Saxena, Prateek}, + title = {\href{http://doi.acm.org/10.1145/2976749.2978389}{A Secure Sharding Protocol For Open Blockchains}}, + booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, + series = {CCS '16}, + year = {2016}, + isbn = {978-1-4503-4139-4}, + location = {Vienna, Austria}, + pages = {17--30}, + numpages = {14}, + url = {http://doi.acm.org/10.1145/2976749.2978389}, + doi = {10.1145/2976749.2978389}, + acmid = {2978389}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {bitcoin, consensus protocol, sharding}, +} + +@phdthesis{ lynn07pairing, + author = {Lynn, Ben}, + title = {On the implementation of pairing-based cryptosystems}, + year = {2007}, + publisher = {Stanford University}, + school = {Stanford University}, + address = {Stanford, CA, USA}, +} + +@inproceedings{ lysyanskaya00pseudonym, + title={Pseudonym systems}, + author={Lysyanskaya, Anna and Rivest, Ronald L and Sahai, Amit and Wolf, Stefan}, + booktitle={Selected Areas in Cryptography}, + pages={184--199}, + year={2000}, + organization={Springer} +} + + + +%M + +@article{ ma09new, + author = {Di Ma and Gene Tsudik}, + title = {A New Approach to Secure Logging}, + journal = {ACM Transactions on Storage}, + volume = 5, + number = 1, + month = mar, + year = 2009, +} + +@article{macaskill13decoded, + author = {Ewen Macaskill and Gabriel Dance}, + title = {\href{http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded}{NSA Files Decoded}}, + journal = {the Guardian}, + month = november, + year = 2013, + day = 1, +} + +@article{ macaskill13gchq, + author = {Ewen MacAskill and Julian Borger and Nick Hopkins and + Nick Davies and James Ball}, + title = {{GCHQ} taps fibre-optic cables for secret access + to world's communications}, + journal = {The Guardian}, + month = jun, + day = 21, + year = 2013, + note = {\url{http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa}}, +} + +@article{ mack18psa, + author = {David Mack}, + title = {\href{https://www.buzzfeednews.com/article/davidmack/obama-fake-news-jordan-peele-psa-video-buzzfeed}{This PSA About Fake News From Barack Obama Is Not What It Appears}}, + journal = {Buzzfeed News}, + month = apr, + year = 2018, +} + +@inproceedings{maesa17blockchain, + title={\href{https://scholar.googleusercontent.com/scholar.bib?q=info:9OGqDno-XxgJ:scholar.google.com/&output=citation&scisig=AAGBfm0AAAAAWvLFmOBeDy6bsqG1HLtJ9UOamXOaHd8B&scisf=4&ct=citation&cd=-1&hl=en}{Blockchain based access control}}, + author={Maesa, Damiano Di Francesco and Mori, Paolo and Ricci, Laura}, + booktitle={IFIP International Conference on Distributed Applications and Interoperable Systems}, + pages={206--220}, + year={2017}, + organization={Springer} +} + + + +@inproceedings{ maheswaran13cryptobook, + title={{Crypto-Book}: {A}n Architecture for Privacy Preserving Online Identities}, + author={Maheswaran, John and Wolinsky, David Isaac and Ford, Bryan}, + booktitle={\bibconf[12th]{HotNets}{ACM Workshop on Hot Topics + in Networks}}, + location = {College Park, MD}, + month = Nov, + year = 2013 +} + +@inproceedings{ maheswaran16building, + author = {John Maheswaran and Daniel Jackowitz and Ennan Zhai and David Isaac Wolinsky and Bryan Ford}, + title = {\href{http://dedis.cs.yale.edu/dissent/papers/cryptobook-abs}{Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities}}, + booktitle = {CODASPY}, + month = mar, + year = 2016, +} + +@inproceedings{mahlki2004fairplay, + title={Fairplay\ --\ a secure two-party computation system}, + author={Malkhi, Dahlia and Nisan, Noam and Pinkas, Benny and Sella, Yaron}, + booktitle={{USENIX} Security Symposium}, + month={August}, + year={2004} +} + +@incollection{mahmoody11time, + title={\href{https://link.springer.com/chapter/10.1007%2F978-3-642-22792-9_3}{Time-Lock Puzzles in the Random Oracle Model}}, + author={Mahmoody, Mohammad and Moran, Tal and Vadhan, Salil}, + booktitle={\bibconf{CRYPTO}{Advances in Cryptology}}, + pages={39--50}, + year={2011}, + publisher={Springer} +} + +@misc{maidsafe16project, + title={\href{https://github.com/maidsafe/Whitepapers/blob/master/Project-Safe.md}{MaidSafe.net announces project SAFE to the community}}, + author={Maidsafe}, + year={2016} + } + +@inproceedings{ maniatis02secure, + author = {Petros Maniatis and Mary Baker}, + title = {Secure History Preservation through Timeline Entanglement}, + booktitle = {11th USENIX Security Symposium}, + month = aug, + year = 2002, + location = {San Francisco, CA}, +} + +@article{maram19dynamic, + title={Dynamic-Committee Proactive Secret Sharing}, + author={Maram, Sai Krishna Deepak and Zhang, Fan and Wang, Lun and Low, Andrew and Zhang, Yupeng and Juels, Ari and Song, Dawn}, + year = {2019}, +} + + +% previously malhotra15attacking (eprint) +@inproceedings{ malhotra16attacking, + author = {Aanchal Malhotra and Isaac E. Cohen and Erik Brakke + and Sharon Goldberg}, + title = {\href{https://www.ndss-symposium.org/wp-content/uploads/2017/09/attacking-network-time-protocol.pdf}{Attacking the Network Time Protocol}}, + booktitle = {\bibconf{NDSS}{Network and Distributed System Security Symposium}}, + month = feb, + year = 2016, + location = {San Diego, CA, USA}, +} + +@article{ malhotra16broadcast, + author = {Aanchal Malhotra and Sharon Goldberg}, + title = {\href{http://www.sigcomm.org/node/3899}{Attacking NTP’s Authenticated Broadcast Mode}}, + journal = {ACM SIGCOMM Computer Communication Review}, + month = apr, + year = 2016, + volume = 46, + number = 2, +} + +@inproceedings{ malhotra17security, + author = {Aanchal Malhotra and Matthew Van Gundy and Mayank Varia and + Haydn Kennedy and Jonathan Gardner and Sharon Goldberg}, + title = {\href{https://fc17.ifca.ai/preproceedings/paper_29.pdf}{The Security of NTP’s Datagram Protocol}}, + booktitle = {\bibconf{FC}{Financial Cryptography and Data Security}}, + month = apr, + year = 2017, + location = {Malta}, +} + +@article{ malkhi98byzantine, + author = {Dahlia Malkhi and Michael Reiter}, + title = {\href{https://dl.acm.org/doi/abs/10.1007/s004460050050}{Byzantine Quorum Systems}}, + journal = {Distributed Computing}, + month = oct, + year = 1998, + volume = 11, + number = 4, +} + +@inproceedings{malkhi19flexible, + title={Flexible Byzantine fault tolerance}, + author={Malkhi, Dahlia and Nayak, Kartik and Ren, Ling}, + booktitle={Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security}, + pages={1041--1053}, + year={2019} +} + +@inproceedings{matsumoto2017ikp, + title={\href{https://ieeexplore.ieee.org/document/7958590}{IKP: Turning a PKI + around with decentralized automated incentives}}, + author={Matsumoto, Stephanos and Reischuk, Raphael M}, + booktitle={Security and Privacy (SP), 2017 IEEE Symposium on}, + pages={410--426}, + year={2017}, + organization={IEEE} +} + +@article{ manils10compromising, + title = {Compromising {Tor} anonymity exploiting {P2P} information leakage}, + author = {Manils, P. and Abdelberri, C. and Blond, S.L. + and Kaafar, M.A. and Castelluccia, C. and Legout, A. and Dabbous, W.}, + journal = {arXiv preprint arXiv:1004.1461}, + year = {2010}, +} + +@misc{ marlinspike13trust, + author = {M. Marlinspike and T. {Perrin, Ed.}}, + title = {Trust Assertions for Certificate Keys}, + month = jan, + year = 2013, + note = {Internet-Draft draft-perrin-tls-tack-02.txt (Work in Progress)}, +} + +@inproceedings{ marlinspike11ssl, + author = {Moxie Marlinspike}, + title = {{SSL} And The Future Of Authenticity}, + booktitle = {BlackHat USA}, + month = aug, + year = 2001, +} + +@article{ mathews16flaws, + author = {Hans Verghese Mathews}, + title = {\href{https://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html}{Flaws in the UIDAI Process}}, + journal = {Economic \& Political Weekly}, + volume = 51, + number = 9, + month = feb, + year = 2016, +} + +@inproceedings { mathewson04disclosure, + author = {Mathewson, Nick and Dingledine, Roger}, + title = {Practical traffic analysis: extending and resisting statistical disclosure}, + booktitle = {\bibconf[4th]{PETS}{International Workshop on + Privacy Enhancing Technologies}}, + year = {2004}, + month = {May}, +} + +@misc{mazieres07paxos, + title={Paxos made practical}, + author={Mazieres, David}, + year={2007} +} + +@inproceedings{ maurer91ibe, + title={Non-interactive public-key cryptography}, + author={Maurer, Ueli and Yacobi, Yacov}, + booktitle={\bibconf{EUROCRYPT}{Conference on Theory and application of cryptographic techniques}}, + year={1991}, +} + +@inproceedings{mccorry2017smart, + title={\href{https://eprint.iacr.org/2017/110.pdf}{A Smart Contract for + Boardroom Voting with Maximum Voter Privacy}}, + author={McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng}, + booktitle={International Conference on Financial Cryptography and Data Security}, + pages={357--375}, + year={2017}, +} + +@inproceedings{ mccoy08shining, + title = {Shining light in dark places: Understanding the {Tor} network}, + author = {McCoy, D. and Bauer, K. and Grunwald, D. and Kohno, T. and Sicker, D.}, + booktitle = {Privacy Enhancing Technologies}, + pages = {63--76}, + year = {2008}, +} + +@misc{ mcgonaghy16dcs, + author = {Trent McConaghy}, + title = {\href{https://blog.bigchaindb.com/the-dcs-triangle-5ce0e9e0f1dc}{The DCS Triangle}}, + month = jun, + year = 2016, +} + +@inproceedings{melara15coniks, + title={\href{https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf}{{CONIKS}: Bringing Key Transparency to End Users}}, + author={Melara, Marcela S and Blankstein, Aaron and Bonneau, Joseph and Felten, Edward W and Freedman, Michael J}, + booktitle={Proceedings of the 24th USENIX Conference on Security Symposium}, + pages={383--398}, + year={2015}, + organization={USENIX Association} +} + + +%author={Melara, Marcela S and Blankstein, Aaron and Bonneau, Joseph and Felten, Edward W and %Freedman, Michael J} +@inproceedings{melara15coniks2, + title={\href{https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf}{{CONIKS}: Bringing key transparency to end users}}, + author={Melara and others}, + booktitle={24th USENIX Conference on Security Symposium}, + year={2015}, +} + +@article{ menezes93elliptic, + author = {Menezes, Alfred J. and Vanstone, Scott A.}, + title = {Elliptic curve cryptosystems and their implementation}, + journal = {Journal of Cryptology}, + publisher = {Springer New York}, + issn = {0933-2790}, + keyword = {Computer Science}, + pages = {209-224}, + volume = {6}, + issue = {4}, + year = {1993} +} + +@phdthesis{ merkle79secrecy, + title = {\href{http://www.merkle.com/papers/Thesis1979.pdf}{Secrecy, Authentication, and Public Key Systems}}, + author = {Ralph Charles Merkle}, + school = {Stanford University}, + month = jun, + year = {1979}, + url = {http://www.merkle.com/papers/Thesis1979.pdf}, +} + +@inproceedings{merkle89certified, + title={\href{https://link.springer.com/chapter/10.1007%2F0-387-34805-0_21?LI=true}{A certified digital signature}}, + author={Merkle, Ralph}, + booktitle={Advances in Cryptology—CRYPTO 89 Proceedings}, + pages={218--238}, + year={1990}, + organization={Springer} +} + +@inproceedings{ micali99verifiable, + author = {Micali, Silvio and Vadhan, Salil and Rabin, Michael}, + title = {\href{https://people.csail.mit.edu/silvio/Selected%20Scientific%20Papers/Pseudo%20Randomness/Verifiable_Random_Functions.pdf}{Verifiable Random Functions}}, + booktitle = {Proceedings of the 40th Annual Symposium on Foundations of Computer Science}, + series = {FOCS '99}, + year = {1999}, + pages = {120--130}, + publisher = {IEEE Computer Society}, +} + +@inproceedings{micali01accountable, + title={Accountable-subgroup multisignatures}, + author={Micali, Silvio and Ohta, Kazuo and Reyzin, Leonid}, + booktitle = {\bibconf{CCS}{ACM Conference on Computer and + Communications Security}}, + year={2001}, +} + +@inproceedings{michels96risk, + title={On the risk of disruption in several multiparty signature schemes}, + author={Michels, Markus and Horster, Patrick}, + booktitle={\bibconf{ASIACRYPT}{Advances in Cryptology}}, + year={1996}, +} + +@inproceedings{ miers13zerocoin, + author = {Ian Miers and + Christina Garman and + Matthew Green and + Aviel D. Rubin}, + title = {\href{https://ieeexplore.ieee.org/abstract/document/6547123/}{Zerocoin: + Anonymous Distributed E-Cash from {Bitcoin}}}, + booktitle = {\bibconf[34th]{S{\&}P}{IEEE Symposium on Security and Privacy}}, + location = {San Francisco, CA}, + month = may, + year = 2013 +} + +@techreport{miller14anonymous, + title={Anonymous {Byzantine} Consensus from Moderately-Hard Puzzles: + A Model for {Bitcoin}}, + author={Miller, Andrew and LaViola Jr., Joseph J.}, + institution={University of Central Florida}, + number={CS-TR-14-01}, + month=apr, + year={2014}, + url={https://socrates1024.s3.amazonaws.com/consensus.pdf}, +} + +@inproceedings{miller15shadow, + title={\href{https://www.usenix.org/conference/cset15/workshop-program/presentation/miller}{Shadow-Bitcoin: scalable simulation via direct execution of multi-threaded applications}}, + author={Miller, Andrew and Jansen, Rob}, + booktitle={8th Workshop on Cyber Security Experimentation and Test (CSET 15)}, + year={2015}, + url={https://www.usenix.org/conference/cset15/workshop-program/presentation/miller}, +} + +% obsoleted by conference version miller16honey +@techreport{miller16honey-eprint, + title={\href{https://eprint.iacr.org/2016/199.pdf}{The Honey Badger of BFT protocols}}, + author={Miller, Andrew and Xia, Yu and Croman, Kyle and Shi, Elaine and Song, Dawn}, + year={2016}, + institution={Cryptology ePrint Archive 2016/199} + +} + +@inproceedings{miller16honey, + author = {Miller, Andrew and Xia, Yu and Croman, Kyle and Shi, Elaine and Song, Dawn}, + title = {\href{https://eprint.iacr.org/2016/199.pdf}{The Honey Badger of BFT Protocols}}, + booktitle = {\bibconf{CCS}{Computer and Communications Security}}, + year = {2016}, + keywords = {BFT, asynchronous, atomic broadcast, blockchain}, +} + +@inproceedings{ miller14know, + author = {Brad Miller and Ling Huang andA.D.Joseph and J.D. Tygar}, + title = {I Know Why You Went to the Clinic: + Risks and Realization of {HTTPS} Traffic Analysis}, + booktitle = {PETS}, + month = jul, + year = 2014, +} + +@article { mimoso15dlink, + author = {Michael Mimoso}, + title = {\href{https://threatpost.com/d-link-accidentally-leaks-private-code-signing-keys/114727/}{D-Link Accidentally Leaks Private Code-Signing Keys}}, + journal = {ThreatPost}, + month = sep, + year = 2015, +} + +@inproceedings{minkus14know, + author = {Tehila Minkus and + Keith W. Ross}, + title = {I Know What You're Buying: {P}rivacy breaches on e{B}ay}, + booktitle = {\bibconf[14th]{PETS}{International Symposium on Privacy + Enhancing Technologies}}, + location = {Amsterdam, Netherlands}, + month = jul, + year = 2014 +} + +@inproceedings{ mislove08ostra, + author = {Alan Mislove and Ansley Post and Peter Druschel and + Krishna P. Gummadi}, + title = {Ostra: Leveraging trust to thwart unwanted communication}, + booktitle = {\bibconf[5th]{NSDI}{USENIX Symposium on Networked Systems Design and Implementation}}, + month = apr, + year = 2008, + pages = {15-30}, +} + +@misc{ moeller00mixmaster, + author = {Moeller, Ulf and Cottrell, Lance}, + month = jan, + year = 2003, + title = {Mixmaster Protocol: Version 2}, + howpublished = {\url{http://freehaven.net/anonbib/cache/mixmaster-spec.txt}} +} + +@inproceedings{moniz06randomized, + author = {Moniz, Henrique and Neves, Nuno Ferreira and Correia, Miguel and Verissimo, Paulo}, + title = {\href{https://www.gsd.inesc-id.pt/~mpc/pubs/hmoniz-randomized.pdf}{Randomized Intrusion-Tolerant Asynchronous Services}}, + year = {2006}, + booktitle = {Proceedings of the International Conference on Dependable Systems and Networks}, + pages = {568--577}, + series = {DSN ’06} +} + +@inproceedings{ mont03hp, + author = {Marco Casassa Mont and Keith Harrison and Martin Sadler}, + title = {The {HP} Time Vault Service: Exploiting {IBE} + for Timed Release of Confidential Information}, + booktitle = {\bibconf[12th]{WWW}{International World Wide Web Conference}}, + month = may, + year = 2003, +} + +@misc{ moore13unplug, + author = {{HD} Moore}, + month = jan, + year = 2013, + title = {Whitepaper: Security Flaws in Universal Plug and Play: Unplug, Don't Play}, + howpublished = {\url{https://community.rapid7.com/docs/DOC-2150}}, +} + +@inproceedings{morenosanchezk15privacy, + author = {Pedro Moreno{-}Sanchez and + Aniket Kate and + Matteo Maffei and + Kim Pecina}, + title = {Privacy Preserving Payments in Credit Networks: + {E}nabling trust with privacy in online marketplaces}, + booktitle = {\bibconf[22th]{NDSS}{Annual Network and Distributed System + Security Symposium}}, + location = {San Diego, CA}, + month = feb, + year = 2015 +} + +@article{ morris14inside, + author = {David Z. Morris}, + title = {\href{http://fortune.com/2014/04/09/inside-the-world-of-national-cryptocurrencies/}{Inside the world of national cryptocurrencies}}, + journal = {Fortune}, + month = apr, + year = 2014, +} + +@techreport{ moshchuk12content, + author = {Alexander Moshchuk and Helen J. Wang and Yunxin Liu}, + title = {Content-Based Isolation: + Rethinking Isolation Policy in Modern Client Systems}, + number = {MSR-TR-2012-82}, + month = aug, + year = 2012, + institution = {Microsoft Research}, +} + +@article{movahedi14broadcast, + author = {Mahnush Movahedi and + Jared Saia and + Mahdi Zamani}, + title = {Secure Anonymous Broadcast}, + journal = {CoRR}, + volume = {abs/1405.5326}, + year = {2014}, + url = {http://arxiv.org/abs/1405.5326}, +} + +@inproceedings{ murdoch07sampled, + author = {Murdoch, Steven J. and Zieli\'{n}ski, Piotr}, + title = {Sampled Traffic Analysis by {Internet}-Exchange-Level Adversaries}, + booktitle = {\bibconf[7th]{PETS}{Privacy Enhancing Technologies Symposium}}, + year = {2007}, +} + +%N + +@misc{ nakamoto08bitcoin, + author = {Satoshi Nakamoto}, + title = {\href{https://bitcoin.org/bitcoin.pdf}{Bitcoin: A Peer-to-Peer Electronic Cash System}}, + year = 2008, +} + month = oct, + + +@INPROCEEDINGS{naor02deniable, + author = {Moni Naor}, + title = {Deniable Ring Authentication}, + booktitle = {\bibconf['02]{CRYPTO}{Advances in Cryptology}}, + year = {2002}, +} + + + +@inproceedings{narayanan11location, + title={Location privacy via private proximity testing}, + author={Narayanan, Arvind and Thiagarajan, Narendran and Lakhani, Mugdha and Hamburg, Michael and Boneh, Dan}, + booktitle={Proc. of NDSS}, + volume={2011}, + year={2011} +} + +@inproceedings{narayanan08robust, + author = {Arvind Narayanan and + Vitaly Shmatikov}, + title = {Robust de-anonymization of large sparse datasets}, + booktitle = {\bibconf[29th]{IEEE S{\&}P}{IEEE Symposium on Security and + Privacy}}, + month = may, + year = 2008, + location = {Oakland, CA} +} + +@inproceedings{narayanan12feasibility, + author = {Arvind Narayanan and + Hristo S. Paskov and + Neil Zhenqiang Gong and + John Bethencourt and + Emil Stefanov and + Eui Chul Richard Shin and + Dawn Song}, + title = {On the feasibility on {I}nternet-scale author identification}, + booktitle = {\bibconf{S{\&}P}{IEEE Symposium on Security and + Privacy}}, + month = may, + year = 2012, + location = {San Francisco, CA} +} + +@inproceedings{narayanan10socialkeys, + title={{SocialKeys}: Transparent Cryptography via Key Distribution over Social Networks}, + booktitle={IAB Workshop on Internet Privacy}, + year={2010}, + author={Narayanan, Arvind}, +} + + +@inproceedings{ narula18zkledger, + author = {Neha Narula and Willy Vasquez and Madars Virza}, + title = {\href{https://www.usenix.org/conference/nsdi18/presentation/narula}{{zkLedger}: Privacy-Preserving Auditing for Distributed Ledgers}}, + booktitle = {15th USENIX Symposium on Networked Systems Design and Implementation (NSDI)}, + month = apr, + year = 2018, + url = {https://www.usenix.org/conference/nsdi18/presentation/narula}, +} + +@inproceedings{nayak15stubborn, + title={\href{http://eprint.iacr.org/2015/796.pdf}{Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack}}, + booktitle={1st IEEE European Symposium on Security and Privacy}, + author={Nayak, Kartik and Kumar, Srijan and Miller, Andrew and Shi, Elaine}, + month = mar, + year={2015}, + url={http://eprint.iacr.org/2015/796.pdf}, +} + +@inproceedings{neisse2017blockchain, + title={\href{https://scholar.googleusercontent.com/scholar.bib?q=info:kywG5E9XAn4J:scholar.google.com/&output=citation&scisig=AAGBfm0AAAAAWvLF7wUSaMoQQGWDZfAxB_86sCVMGCJ5&scisf=4&ct=citation&cd=-1&hl=en}{A Blockchain-based Approach for Data Accountability and Provenance Tracking}}, + author={Neisse, Ricardo and Steri, Gary and Nai-Fovino, Igor}, + booktitle={Proceedings of the 12th International Conference on Availability, Reliability and Security}, + pages={14}, + year={2017}, + organization={ACM} +} + + +@article{nguyen06verifiable, + author = {Lan Nguyen and + Reihaneh Safavi{-}Naini and + Kaoru Kurosawa}, + title = {Verifiable shuffles: a formal model and a {P}aillier-based + three-round construction with provable security}, + journal = {Int. J. Inf. Sec.}, + volume = {5}, + number = {4}, + pages = {241--255}, + year = 2006 +} + + +@inproceedings {nikitin17chainiac, + author = {Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Nicolas Gailly and Linus Gasser and Ismail Khoffi and Justin Cappos and Bryan Ford}, + title = {\href{https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/nikitin}{{CHAINIAC}: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds}}, + booktitle = {26th {USENIX} Security Symposium}, + year = {2017}, + pages = {1271--1287} +} + +@article{ nikitin19reducing, + author = {Kirill Nikitin and Ludovic Barman and Wouter Lueks and + Matthew Underwood and Jean-Pierre Hubaux and Bryan Ford}, + title = {\href{https://content.sciendo.com/view/journals/popets/2019/4/article-p6.xml}{Reducing Metadata Leakage from Encrypted Files and Communication with {PURBs}}}, + journal = {Proceedings on Privacy Enhancing Technologies}, + volume = 2019, + number = 4, + month = jul, + year = 2019 +} + +% obsoleted by NISTIR 8213 +@misc{nist-beacon, + author={{National Institute of Standards and Technology}}, + title = {\href{https://csrc.nist.gov/Projects/Interoperable-Randomness-Beacons}{Interoperable Randomness Beacons}}, + year={2017}, +} + +@misc{ nist09fips186, + author = {{National Institute of Standards and Technology}}, + title = {{FIPS PUB 186-3: Digital Signature Standard (DSS)}}, + year = {2009} +} + +@misc{ nist12recommendation, + author = {{National Institute of Standards and Technology}}, + title = {{Special Publication 800-57: Recommendation for Key Management}}, + year = {2012} +} + +@inbook{nist15security, + title = {\href{http://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.7966.pdf}{Security of Interactive and automated Access +Management Using Secure Shell (SSH)}}, +chapter = "5.1.2", + author={{NIST}}, + year={2015}, +} + +@techreport{ nist19reference, + author = {John Kelsey and Lu\'is T. A. N. Brand\~ao and Rene Peralta + and Harold Booth}, + title = {\href{https://csrc.nist.gov/publications/detail/nistir/8213/draft}{A Reference for Randomness Beacons: Format and Protocol Version 2}}, + month = may, + year = 2019, + institution = {{National Institute of Standards and Technology}}, + number = {NISTIR 8213 (DRAFT)} +} + +@misc{ nordberg15gossiping, + author = {L. Nordberg and D. Gillmor and T. Ritter}, + title = {\href{https://tools.ietf.org/html/draft-linus-trans-gossip-ct-02}{Gossiping in CT}}, + howpublished = {Internet-Draft draft-linus-trans-gossip-ct-02}, + month = jul, + year = 2015, +} + +@misc{ nullbyte14hack, + author = {{Null Byte}}, + title = {\href{http://null-byte.wonderhowto.com/how-to/hack-like-pro-hijack-software-updates-install-rootkit-for-backdoor-access-0149225/}{Hack Like a Pro: How to Hijack Software Updates to Install a Rootkit for Backdoor Access}}, + howpublished = {WonderHowTo}, + year = 2014, +} + +%O + +@misc{ ocean18data, + author = {{Ocean Protocol Foundation}}, + title = {\href{https://oceanprotocol.com/#papers}{Ocean Protocol: A Decentralized Substrate for AI Data \& Services}}, + month = may, + year = 2018, +} + +@article{okamoto99multi, + title={Multi-signature schemes secure against active insider attacks}, + author={Ohta, Kazuo and Okamoto, Tatsuaki}, + journal={IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences}, + month=jan, + year={1999}, +} + +@inproceedings{oluwasanmi:2012:beacon, + author = {Oluwasanmi, Olumuyiwa and Saia, Jared}, + title = {{Scalable Byzantine Agreement with a Random Beacon}}, + booktitle = {Stabilization, Safety, and Security of Distributed Systems}, + volume = {7596}, + series = {Lecture Notes in Computer Science}, + editor = {Richa, Andr\'{e}a W. and Scheideler, Christian}, + publisher = {Springer Berlin Heidelberg}, + pages = {253-265}, + year = {2012}, + isbn = {978-3-642-33535-8}, + doi = {10.1007/978-3-642-33536-5_25}, + url = {http://dx.doi.org/10.1007/978-3-642-33536-5_25}, +} + +@misc{oraclize, + title = {\href{http://www.oraclize.it/}{Oraclize - blockchain oracle + service, enabling data-rich smart contracts}}, +} + +@inproceedings{oswald05sidechannel, + author = {Elisabeth Oswald and + Stefan Mangard and + Norbert Pramstaller and + Vincent Rijmen}, + title = {A side-channel analysis resistant description of the {AES} + {S-Box}}, + booktitle = {\bibconf{FSE}{Fast Software Encryption Workshop}}, + location = {Paris, France}, + month = feb, + year = 2005 +} + +@article{ouaddah2016fairaccess, + title={FairAccess: a new Blockchain-based access control framework for the Internet of Things}, + author={Ouaddah, Aafaf and Abou Elkalam, Anas and Ait Ouahman, Abdellah}, + journal={Security and Communication Networks}, + volume={9}, + number={18}, + pages={5943--5964}, + year={2016}, + publisher={Wiley Online Library} +} + +%P + +@techreport{pagnia99impossibility, + title={\href{https://pdfs.semanticscholar.org/208b/22c7a094ada20736593afcc8c759c7d1b79c.pdf}{On the impossibility of fair exchange without a trusted third party}}, + author={Pagnia, Henning and G{\"a}rtner, Felix C}, + year={1999}, + institution={Technical Report TUD-BS-1999-02, Darmstadt University of Technology, Department of Computer Science, Darmstadt, Germany} +} + +@inproceedings{paillier99public, + author = {Pascal Paillier}, + title = {Public-{K}ey Cryptosystems Based on Composite + Degree Residuosity Classes}, + booktitle = {\bibconf{EUROCRYPT}{Advances in Cryptology}}, + month = may, + year = 1999 +} + +@inproceedings{ palomar06p2p, + author={Palomar, E. and Estevez-Tapiador, J.M. and Hernandez-Castro, J.C. + and Ribagorda, A.}, + title={\href{http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1698436} + {A Protocol for Secure Content Distribution in Pure P2P Networks}}, + booktitle={Proceeding of the 17th International Conference on Database and + Expert Systems Applications}, + year={2006} +} + +@incollection{ pan08liveness, + author = {Gang Pan and Zhaohui Wu and Lin Sun}, + title = {\href{https://www.intechopen.com/books/recent_advances_in_face_recognition/liveness_detection_for_face_recognition/}{Liveness Detection for Face Recognition}}, + booktitle = {Recent Advances in Face Recognition}, + publisher = {IntechOpen}, + month = dec, + year = 2008, +} + +@inproceedings{ pang07fingerprinting, + author = {Pang, Jeffrey and Greenstein, Ben and Gummadi, Ramakrishna and Seshan, Srinivasan and Wetherall, David}, + title = {802.11 user fingerprinting}, + booktitle = {ACM International Conference on Mobile Computing and Networking (MobiCom)}, + year = {2007}, + pages = {99--110}, +} + +@article{parity2017alert, + author = {}, + title = {\href{https://paritytech.io/security-alert-2/}{Parity Wallet Security Alert}}, + year={2017} +} + +@misc{ park18spacemint, + author = {Sunoo Park and Albert Kwon and Georg Fuchsbauer + and Peter Ga\v{z}i and Jo\"el Alwen + and Krzysztof Pietrzak}, + title = {\href{https://fc18.ifca.ai/preproceedings/78.pdf}{SpaceMint: A Cryptocurrency Based on Proofs of Space}}, + booktitle = {Financial Cryptography and Data Security}, + month = feb, + year = 2018, + url = {https://fc18.ifca.ai/preproceedings/78.pdf}, +} + +% obsoleted by pass17hybrid +@misc{pass16hybrid, + author = {Rafael Pass and Elaine Shi}, + title = {\href{http://eprint.iacr.org/2016/917}{Hybrid Consensus: Efficient Consensus in the Permissionless Model}}, + howpublished = {Cryptology ePrint Archive, Report 2016/917}, + year = {2016}, +} + +@article{pass16analysis, + title={\href{https://eprint.iacr.org/2016/454.pdf}{Analysis of the Blockchain Protocol in Asynchronous Networks}}, + author={Pass, Rafael and Tech, Cornell and Seeman, Lior}, + journal={Annual International Conference on the Theory and Applications of Cryptographic Techniques ({EUROCRYPT})}, + year={2017}, + organization={Springer} +} + +@inproceedings{ pass17hybrid, + author = {Rafael Pass and Elaine Shi}, + title = {\href{http://drops.dagstuhl.de/opus/volltexte/2017/8004/}{Hybrid Consensus: Efficient Consensus in the Permissionless Model}}, + booktitle = {\bibconf[31st]{DISC}{International Symposium on Distributed Computing}}, + month = oct, + year = {2017}, + location = {Vienna, Austria}, +} + +@inproceedings{ pass17fruitchains, + author = {Rafael Pass and Elaine Shi}, + title = {\href{https://dl.acm.org/citation.cfm?id=3087809}{FruitChains: A Fair Blockchain}}, + booktitle = {\bibconf{PODC}{ACM Symposium on Principles of Distributed Computing}}, + month = jul, + year = 2017, + location = {Washington, DC, USA}, +} + +@incollection{pass03deniability, + title={On deniability in the common reference string and random oracle model}, + author={Pass, Rafael}, + booktitle={Advances in Cryptology-CRYPTO 2003}, + pages={316--337}, + year={2003}, + publisher={Springer} +} + +@inproceedings{pavlov04supporting, + author = {Elan Pavlov and + Jeffrey S. Rosenschein and + Zvi Topol}, + title = {Supporting privacy in decentralized additive reputation + systems}, + booktitle = {\bibconf[2nd]{iTrust}{Trust Management}}, + location = {Oxford, UK}, + month = mar, + year = 2004 +} + +@inproceedings{pedersen1991non, + title={Non-interactive and information-theoretic secure verifiable secret sharing.}, + author={Pedersen, Torben P and others}, + organization={Springer} +} + + +@inproceedings{peng06secrecy, + author = {Pai Peng and + Peng Ning and + Douglas S. Reeves}, + title = {On the secrecy of timing-based active watermarking trace-back + techniques}, + booktitle = {\bibconf{S{\&}P}{IEEE Symposium on Security and Privacy}}, + location = {Berkeley, CA}, + month = may, + year = 2006 +} + +@inproceedings{peng06ciphertext, + author = {Kun Peng and + Colin Boyd and + Ed Dawson and + Byoungcheon Lee}, + title = {Ciphertext comparison, a new solution + to millionaire problem}, + booktitle = {\bibconf[7th]{ICICS}{Information and Communications Security}}, + location = {Beijing, China}, + month = dec, + year = 2005 +} + +@article{ peralta92distribution, + author = {Ren\'e Peralta}, + title = {On the Distribution of Quadratic Residues and Nonresidues Modulo a Prime Number}, + journal = {Mathematics of Computation}, + year = {1992}, + pages = {443--440}, + volume = {58}, + number = {197}, +} + +@inproceedings{ petullo13minimalt, + author = {W. Michael Petullo and Xu Zhang and Jon A. Solworth + and Daniel J. Bernstein and Tanja Lange}, + title = {\href{http://cr.yp.to/tcpip/minimalt-20130522.pdf}{MinimaLT: Minimal-latency Networking Through Better Security}}, + booktitle = {ACM CCS}, + month = nov, + year = 2013, +} + +@inproceedings{pfitzmann91isdn, + title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}}, + author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, + booktitle = {GI/ITG Conference on Communication in Distributed Systems}, + year = {1991}, + month = {February}, +} + +@inproceedings{pfitzmann01anonymity, + title={Anonymity, unobservability, and pseudonymity? proposal for terminology}, + author={Pfitzmann, Andreas and K{\"o}hntopp, Marit}, + booktitle={Designing privacy enhancing technologies}, + pages={1--9}, + year={2001}, + organization={Springer} +} + +@misc{ pfitzmann10terminology, + title = {A terminology for talking about privacy by data minimization: + Anonymity, Unlinkability, Undetectability, Unobservability, + Pseudonymity, and Identity Management}, + author = {Andreas Pfitzmann and Marit Hansen}, + month = aug, + year = 2010, +} + +@article{pilkington15blockchain, + title={\href{https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2662660}{Blockchain Technology: Principles and Applications}}, + author={Pilkington, Marc}, + journal={Research Handbook on Digital Transformation}, + year={2015} +} + +@misc{poa, + title={\href{https://poa.network/}{POA Network}}, +} + +@inproceedings{poddebniak18efail, + author = {Damian Poddebniak and Christian Dresen and Jens Müller and + Fabian Ising and Sebastian Schinzel and Simon Friedberger and Juraj + Somorovsky and Jörg Schwenk}, + title = {\href{https://efail.de/efail-attack-paper.pdf}{Efail: Breaking + S/MIME and OpenPGP Email Encryption using Exfiltration Channels}}, + booktitle = {{USENIX} Security Symposium}, + year = {2018} +} + +@article{pohlig78improved, + author = {Stephen C. Pohlig and + Martin E. Hellman}, + title = {An improved algorithm for computing logarithms over + {GF(p)} and its cryptographic significance ({C}orresp.)}, + journal = {IEEE Transactions on Information Theory}, + volume = {24}, + number = {1}, + year = {1978}, + pages = {106-110} +} + +@misc{popov16rnd, + author = {Serguei Popov}, + title = {\href{http://eprint.iacr.org/2016/228}{On a decentralized trustless pseudo-random number generation algorithm}}, + howpublished = {Cryptology ePrint Archive, Report 2016/228}, + year = {2016}, +} + + +@misc{ popov18tangle, + author = {Serguei Popov}, + title = {\href{https://www.iota.org/research/academic-papers}{The Tangle}}, + month = apr, + year = 2018, +} + +@article{ porup15how, + author = {J.M. Porup}, + title = {\href{http://motherboard.vice.com/read/how-debian-is-trying-to-shut-down-the-cia-and-make-software-trustworthy-again}{How Debian Is Trying to Shut Down the CIA and Make Software Trustworthy Again}}, + journal = {Motherboard}, + month = sep, + day = 7, + year = 2015, +} + +@article{ poulsen13feds, + author = {Kevin Poulsen}, + title = {Feds Are Suspects in New Malware That Attacks {Tor} Anonymity}, + journal = {Wired}, + month = aug # "~5,", + year = 2013, + url = {http://www.wired.com/threatlevel/2013/08/freedom-hosting/}, +} + +@misc{ provable, + title = {\href{https://provable.xyz/}{Provable - Oraclize 2.0 - + blockchain oracle service, enabling data-rich smart contracts}}, +} + +@article{ psiaki16gnss, + author = {Mark L. Psiaki and Todd E. Humphreys}, + title = {\href{https://ieeexplore.ieee.org/document/7445815}{GNSS Spoofing and Detection}}, + journal = {Proceedings of the IEEE}, + volume = 104, + number = 6, + month = apr, + year = 2016, +} + +%Q + +%R + +@article{ rabin80probabilistic, + title={Probabilistic algorithm for testing primality}, + author={Rabin, Michael O}, + journal={Journal of number theory}, + volume={12}, + number={1}, + pages={128--138}, + year={1980}, + publisher={Elsevier} +} + +@article{rabin83beacons, + title = {Transaction {{Protection}} by {{Beacons}}}, + author = {{Rabin}, Michael O.}, + volume = {27}, + number = {2}, + journal = {Journal of Computer and System Sciences}, + year = {1983}, + pages = {256--267}, + doi = {10.1016/0022-0000(83)90042-9}, +} + +@inproceedings{ rabin98simplified, + author = {Tal Rabin}, + title = {\href{https://doi.org/10.1007/BFb0055722}{A Simplified Approach to Threshold and Proactive {RSA}}}, + booktitle = {\bibconf{CRYPTO}{Advances in Cryptology}}, + month = aug, + year = 1998, +} + +@inproceedings{ rackoff91noninteractive, + year={1991}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + title={Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack}, + author={Rackoff, Charles and Simon, Daniel R.}, + pages={433-444}, +} + +@article{raisaro19medco, + title = {MedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data}, + author = {Raisaro, Jean Louis and Troncoso-Pastoriza, Juan Ramón and Misbach, Mickaël and Gomes de Sá E Sousa, Joao André and Pradervand, Sylvain and Missiaglia, Edoardo and Michielin, Olivier and Ford, Bryan Alexander and Hubaux, Jean-Pierre}, + journal = {IEEE/ACM Transactions on Computational Biology and Bioinformatics}, + number = {4}, + volume = {16}, + pages = {1328-1341}, + year = {2019}, + abstract = {The increasing number of health-data breaches is creating a complicated environment for medical-data sharing and, consequently, for medical progress. Therefore, the development of new solutions that can reassure clinical sites by enabling privacy-preserving sharing of sensitive medical data in compliance with stringent regulations (e.g., HIPAA, GDPR) is now more urgent than ever. In this work, we introduce MedCo, the first operational system that enables a group of clinical sites to federate and collectively protect their data in order to share them with external investigators without worrying about security and privacy concerns. MedCo uses (a) collective homomorphic encryption to provide trust decentralization and end-to-end confidentiality protection, and (b) obfuscation techniques to achieve formal notions of privacy, such as differential privacy. A critical feature of MedCo is that it is fully integrated within the i2b2 (Informatics for Integrating Biology and the Bedside) framework, currently used in more than 300 hospitals worldwide. Therefore, it is easily adoptable by clinical sites. We demonstrate MedCo’s practicality by testing it on data from The Cancer Genome Atlas in a simulated network of three institutions. Its performance is comparable to the ones of SHRINE (networked i2b2), which, in contrast, does not provide any data protection guarantee.}, + url = {http://infoscience.epfl.ch/record/256348}, + doi = {10.1109/TCBB.2018.2854776}, +} + +@article{rajabi18verifiable, + title={\href{https://www.sciencedirect.com/science/article/pii/S0020025516316152}{A Verifiable Threshold Secret Sharing Scheme Based On Lattices}}, + author={Rajabi, Bahman and Eslami, Ziba}, + journal={Information Sciences}, + year={2018}, + publisher={Elsevier} +} + +@inproceedings{ ramasamy06parsimonious, + author = {HariGovind V. Ramasamy and Christian Cachin}, + title = {Parsimonious Asynchronous {Byzantine}-Fault-Tolerant + Atomic Broadcast}, + booktitle = {9th International Conference on Principles of Distributed Systems (OPODIS)}, + month = dec, + year = 2005, + url = {https://www.zurich.ibm.com/~cca/papers/oabc.pdf}, +} + +@inproceedings{raymond00traffic, + author = {Jean-Fran\c{c}ois Raymond}, + title = {Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems}, + booktitle = {Workshop on Design Issues in Anonymity and Unobservability}, + year = {2000}, +} + +@misc{randao18, + author = {randao.org}, + title = {\href{https://www.randao.org}{Randao: Blockchain Based Verifiable Random Number Generator}}, + year = {2018}, +} + +@inproceedings{reardon13sok, + title={Sok: Secure data deletion}, + author={Reardon, Joel and Basin, David and Capkun, Srdjan}, + booktitle={Security and Privacy (SP), 2013 IEEE Symposium on}, + pages={301--315}, + year={2013}, + organization={IEEE} +} + +@inproceedings{ reiter94secure, + author = {Michael K. Reiter}, + title = {\href{https://dl.acm.org/citation.cfm?id=191194}{Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart}}, + booktitle = {\bibconf[2nd]{CCS}{Computer and Communications Security}}, + year = 1994, +} + % month = nov, + % location = {Fairfax, Virginia, USA}, + +@misc{ reitman13securedrop, + title = {Freedom of the Press Foundation Launches {SecureDrop}, + an Open-Source Submission Platform for Whistleblowers}, + author = {Rainey Reitman}, + publisher = {Freedom of the Press Foundation}, + month = oct, + day = 15, + year = 2013, + note = {\url{https://pressfreedomfoundation.org/blog/2013/10/freedom-press-foundation-launches-securedrop}} +} + +@article{reutov2018ethereumprngs, + author = {Arseny Reutov}, + title = {\href{https://blog.positive.com/predicting-random-numbers-in-ethereum-smart-contracts-e5358c6b8620}{Predicting Random Numbers in Ethereum Smart Contracts}}, + year={2018} +} + +@article{risen13nsa, + author = {Risen, James and Poitras, Laura}, + title = {{NSA} Report Outlined Goals for More Power}, + journal = {The New York Times}, + month = Nov # {~22,}, + year = {2013} +} + +@inproceedings{ ristenpart10good, + title = {When good randomness goes bad: + Virtual machine reset vulnerabilities and hedging deployed cryptography}, + author = {Ristenpart, Thomas and Yilek, Scott}, + booktitle = {Network and Distributed System Security Symposium}, + year = {2010}, +} + +@techreport{rivest96time, + author = {Ronald L. Rivest and Adi Shamir and David A. Wagner}, + title={\href{https://dl.acm.org/citation.cfm?id=888615}{Time-lock puzzles and timed-release crypto}}, + month=mar, + year={1996}, + publisher={Massachusetts Institute of Technology}, + address = {Cambridge, MA, USA}, +} + +@article{rivest78rsa, + title={A method for obtaining digital signatures and public-key cryptosystems}, + author={Rivest, Ronald L and Shamir, Adi and Adleman, Len}, + journal={Communications of the ACM}, + year={1978}, +} + +@inproceedings{rivest06how, + author = {Ronald Rivest and + Adi Shamir and + Yael Tauman}, + title = {How to Leak a Secret: Theory and Applications of Ring Signatures}, + booktitle = {Essays in Memory of Shimon Even}, + year = {2006}, + pages = {164-186}, + ee = {http://dx.doi.org/10.1007/11685654_7}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@inproceedings{rogaway02authenticated, + title={Authenticated-encryption with associated-data}, + author={Rogaway, Phillip}, + booktitle={Proceedings of the 9th ACM conference on Computer and communications security}, + pages={98--107}, + year={2002} +} + +@inproceedings{ roesner12user, + author = {Franziska Roesner and Tadayoshi Kohno and + Alexander Moshchuk and Bryan Parno and Helen J. Wang and + Crispin Cowan}, + title = {User-Driven Access Control: + Rethinking Permission Granting in Modern Operating Systems}, + booktitle = {IEEE Symposium on Security and Privacy}, + month = may, + year = 2012, + location = {San Francisco, CA}, +} + +@incollection{ roosta07time, + author = {Tanya Roosta and Mike Manzo and Shankar Sastry}, + title = {\href{https://link.springer.com/chapter/10.1007%2F978-0-387-46276-9_14}{Time Synchronization Attacks in Sensor Networks}}, + booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, + editor = {Radha Poovendran and Cliff Wang and Sumit Roy}, + publisher = {Springer}, + year = 2007, + pages = {325-345}, +} + +@inproceedings{ roth13secure, + title={A Secure Submission System for Online Whistleblowing Platforms}, + author={Roth, Volker and G{\"u}ldenring, Benjamin and + Rieffel, Eleanor and Dietrich, Sven and Ries, Lars}, + year = 2013, + month = apr, + booktitle = {\bibconf[17th]{FC}{Financial Cryptography and Data Security}} +} + +@article{rosenblatt15superfish, + author = {Seth Rosenblatt}, + title = {\href{http://www.cnet.com/news/superfish-torments-lenovo-owners-with-more-than-adware/}{Lenovo's Superfish security snafu blows up in its face}}, + journal = {CNET}, + month = february, + year = 2015, + day = 20, +} + +@inproceedings{ruffing14coinshuffle, + author = {Tim Ruffing and Pedro Moreno{-}Sanchez and + Aniket Kate}, + title = {\href{https://petsymposium.org/2014/papers/Ruffing.pdf}{{CoinShuffle}: {P}ractical Decentralized Coin Mixing for {Bitcoin}}}, + booktitle = {Privacy Enhancing Technologies Symposium (PETS)}, + month = jul, + year = 2014, + location = {Amsterdam, Netherlands}, + url = {https://petsymposium.org/2014/papers/Ruffing.pdf}, +} + +@inproceedings{ ryan14enhanced, + author = {Mark D. Ryan}, + title = {Enhanced Certificate Transparency and + End-to-end Encrypted Mail}, + booktitle = {\bibconf{NDSS}{Network and Distributed System + Security Symposium}}, + month = feb, + year = 2014, +} + +@article{ ryge16most, + author = {Leif Ryge}, + title = {\href{http://arstechnica.com/security/2016/02/most-software-already-has-a-golden-key-backdoor-its-called-auto-update/}{Most software already has a ``golden key'' backdoor: the system update}}, + journal = {arstechnica}, + month = feb, + year = 2016, +} + +%S + +%FC 2016 citation pending + +@misc{safeTSA, + key={Safe creative TSA}, + title = {Safe {C}reative {T}imestamping {A}uthority {(TSA)} server}, + howpublished = {\url{http://tsa.safecreative.org/}} +} + +@misc{saia:2014:scalable-mpc, + author = {Jared Saia and Mahdi Zamani}, + title = {\href{http://eprint.iacr.org/2014/872}{Recent Results in Scalable Multi-Party Computation}}, + howpublished = {Cryptology ePrint Archive, Report 2014/872}, + year = {2014}, +} + +@inproceedings{ samuel10survivable, + author = {Justin Samuel and Nick Mathewson and Justin Cappos + and Roger Dingledine}, + title = {\href{http://justinsamuel.com/papers/survivable-key-compromise-ccs2010.pdf}{Survivable Key Compromise in Software Update Systems}}, + booktitle={\bibconf[17th]{CCS}{ACM Conference on + Computer and Communications security}}, + month = oct, + year = 2010, + location = {Chicago, IL}, +} + +@inproceedings{ sandler07casting, + author = {Daniel Sandler and Dan S. Wallach}, + title = {Casting Votes in the {Auditorium}}, + booktitle = {\bibconf{EVT}{USENIX/ACCURATE Electronic + Voting Technology Workshop}}, + month = aug, + year = 2007, + location = {Boston, MA}, +} + +@inproceedings{sapirshtein15optimal, + title={Optimal Selfish Mining Strategies in {Bitcoin}}, + author={Sapirshtein, Ayelet and Sompolinsky, Yonatan and Zohar, Aviv}, + booktitle={Financial Cryptography and Data Security}, + month=feb, + year={2016}, + url={http://fc16.ifca.ai/preproceedings/30_Sapirshtein.pdf}, +} + + +@inproceedings{sasson2014zerocash, + title={\href{https://ieeexplore.ieee.org/abstract/document/6956581/}{Zerocash: Decentralized anonymous payments from {B}itcoin}}, + author={Sasson, Eli Ben and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars}, + booktitle={Security and Privacy (SP), 2014 IEEE Symposium on}, + pages={459--474}, + year={2014}, + organization={IEEE} +} + + +@inproceedings{schechter99auth, + author = {Schechter, Stuart and Parnell, Todd and Hartemink, Alexander}, + title = {Anonymous Authentication of Membership in Dynamic Groups}, + booktitle = {Proceedings of the Third International Conference on Financial Cryptography}, + series = {FC '99}, + year = {1999}, + pages = {184--195}, + publisher = {Springer-Verlag}, + address = {London, UK, UK}, +} + +@inproceedings{schiffner11limits, + author = {Stefan Schiffner and + Andreas Pashalidis and + Elmar Tischhauser}, + title = {On the limits of privacy in reputation systems}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the Electronic Society}}, + location = {Chicago, IL}, + month = oct, + year = 2011 +} + +@article{schlichting83fail, + title={Fail-stop processors: an approach to designing fault-tolerant computing systems}, + author={Schlichting, Richard D and Schneider, Fred B}, + journal={ACM Transactions on Computer Systems (TOCS)}, + volume={1}, + number={3}, + pages={222--238}, + year={1983}, + publisher={ACM New York, NY, USA} +} + +% journal version: schneier99secure +@inproceedings{ schneier98cryptographic, + author = {Bruce Schneier and John Kelsey}, + title = {Cryptographic Support for Secure Logs on Untrusted Machines}, + booktitle = {7th USENIX Security Symposium}, + month = jan, + year = 1998, + location = {San Antonio, Texas}, +} + + +@article{ schneier99secure, + author = {Bruce Schneier and John Kelsey}, + title = {Secure Audit Logs to Support Computer Forensics}, + journal = {ACM Transactions on Information and System Security}, + volume = 2, + number = 2, + year = 1999, +} + % month = may, + % pages = {159-176}, + +@article{ schneier13attacking, + author = {Bruce Schneier}, + title = {Attacking {Tor}: how the {NSA} targets users' online anonymity}, + journal = {The Guardian}, + month = oct, + day = 4, + year = 2013, +} + +@article{ schneier09tigers, + author = {Bruce Schneier}, + title = {\href{https://www.theguardian.com/technology/2009/jan/08/identity-fraud-security-biometrics-schneier-id}{Tigers use scent, birds use calls -- biometrics are just animal instinct}}, + journal = {The Guardian}, + month = jan, + year = 2009, +} + +@article{ schneier13nsa, + author = {Bruce Schneier}, + title = {NSA surveillance: A guide to staying secure}, + journal = {The Guardian}, + month = sep, + day = 6, + year = 2013, +} + +@article{schneier13offensive, + author = {Bruce Schneier}, + title = {\href{https://www.schneier.com/blog/archives/2013/06/us_offensive_cy.html}{US Offensive Cyberwar Policy}}, + journal = {Schneier on Security}, + month = jun, + year = 2013, + day = 21, +} + +@article{ schnorr91efficient, + title = {\href{https://www.researchgate.net/profile/Claus_Schnorr/publication/227088517_Efficient_signature_generation_by_smart_cards/links/0046353849579ce09c000000.pdf}{Efficient signature generation by smart cards}}, + author = {Schnorr, Claus P.}, + journal = {Journal of Cryptology}, + volume = {4}, + number = {3}, + pages = {161--174}, + year = {1991}, + publisher = {Springer}, + url = {https://www.researchgate.net/profile/Claus_Schnorr/publication/227088517_Efficient_signature_generation_by_smart_cards/links/0046353849579ce09c000000.pdf}, +} + +@inproceedings{ schoenmakers99simple, + title = {\href{https://link.springer.com/chapter/10.1007/3-540-48405-1_10}{A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting}}, + author = {Schoenmakers, Berry}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + pages = {784--784}, + month = aug, + year = {1999}, +} + +@article{ schryen09security, + author = {Guido Schryen and Eliot Rich}, + title = {\href{https://ieeexplore.ieee.org/document/5272405}{Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}}, + journal = {IEEE Transactions on Information Forensics and Security}, + volume = 4, + number = 4, + month = dec, + year = 2009, + pages = {729-744}, +} + +@article{schwartz14ripple, + title={\href{https://ripple.com/files/ripple_consensus_whitepaper.pdf}{The Ripple protocol consensus algorithm}}, + author={Schwartz, David and Youngs, Noah and Britto, Arthur}, + journal={Ripple Labs Inc White Paper}, + pages={5}, + year={2014} +} + +@misc{secbit18fomo3d, + author = {SECBIT}, + title = {\href{https://medium.com/coinmonks/how-the-winner-got-fomo3d-prize-a-detailed-explanation-b30a69b7813f}{How the winner got Fomo3D prize - A Detailed Explanation}}, + month = aug, + year = 2018, +} + +@misc{ sedgwick08charlie, + year={2008}, + month = {May}, + howpublished = {\url{http://www.bostonmagazine.com/articles/2008/04/the-shaggy-god/}}, + author = {John Sedgwick}, + title = {The Shaggy God}, +} + +@inproceedings{ segal14catching, + author = {Aaron Segal and Bryan Ford and Joan Feigenbaum}, + title = {Catching Bandits and Only Bandits: + Privacy-Preserving Intersection Warrants + for Lawful Surveillance}, + booktitle = {4th USENIX Workshop on Free and Open Communications + on the Internet (FOCI'14)}, + month = aug, + year = 2014, +} + +@inproceedings{ segal16privacy, + author = {Aaron Segal and Joan Feigenbaum and Bryan Ford}, + title = {\href{https://dedis.cs.yale.edu/dissent/papers/wpes16-chaining-abs/}{Privacy-Preserving Lawful Contact Chaining}}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the Electronic Society}}, + month = oct, + year = 2016, +} + +@article{seres18evoting, + author = {István András Seres}, + title = {\href{https://medium.com/coinmonks/implementing-an-e-voting-protocol-with-blind-signatures-on-ethereum-411e88af044a}{Implementing an e-voting protocol with blind signatures on Ethereum}}, + year={2018} +} + +@article{sermersheim06lightweight, + title={Lightweight directory access protocol (LDAP): The protocol}, + author={Sermersheim, Jim}, + year={2006} +} + +@article{serjantov05passive, + year={2005}, + journal={International Journal of Information Security}, + title={Passive-attack analysis for connection-based anonymity systems}, + author={Serjantov, Andrei and Sewell, Peter}, + pages={172-180}, +} + +@inproceedings{serjantov02metric, + author = {Serjantov, Andrei and Danezis, George}, + title = {Towards an information theoretic metric for anonymity}, + booktitle = {Proceedings of the 2nd international conference on Privacy enhancing technologies}, + series = {PET'02}, + year = {2003}, +} + +@inproceedings{ sethi18security, + author = {Tegjyot Singh Sethi and Mehmed Kantardzic and Joung Woo Ryu}, + title = {\href{https://www.springerprofessional.de/en/security-theater-on-the-vulnerability-of-classifiers-to-explorat/12276254}{`Security Theater': On the Vulnerability of Classifiers to Exploratory Attacks}}, + booktitle = {\bibconf[12th]{PAISI}{Pacific Asia Workshop on Intelligence and Security Informatics}}, + month = may, + year = 2017, + location = {Jeju Island, South Korea}, +} + +@inproceedings{ setty12taking, + title={Taking proof-based verified computation a few steps closer to practicality}, + author={Setty, Srinath and Vu, Victor and Panpalia, Nikhil and Braun, Benjamin and Blumberg, Andrew J. and Walfish, Michael}, + booktitle={USENIX Security Symposium}, + year={2012} +} + +@article{sfox19eth2, + author = {SFOX}, + title = {\href{https://blog.sfox.com/ethereum-2-0-what-the-next-three-years-of-ethereum-will-look-like-b366a46f9704}{Ethereum 2.0: What the Next Three Years of Ethereum Will Look Like}}, + year={2019} +} + +@inproceedings{shafagh2017towards, + title={\href{https://dl.acm.org/citation.cfm?id=3140656}{Towards Blockchain-based Auditable Storage and Sharing of IoT Data}}, + author={Shafagh, Hossein and Burkhalter, Lukas and Hithnawi, Anwar and + Duquennoy, Simon}, + booktitle={Proceedings of the 2017 on Cloud Computing Security Workshop}, + pages={45--50}, + year={2017}, + organization={ACM} +} + + +@article{shah08privacy, + author = {Mehul A. Shah and + Ram Swaminathan and + Mary Baker}, + title = {Privacy-Preserving Audit and Extraction of + Digital Contents}, + journal = {IACR Cryptology ePrint Archive}, + volume = {2008}, + year = {2008}, + pages = {186} +} + +% was incorrectly labeled shamir85ibe +@inproceedings{shamir84identity, + title = {\href{https://link.springer.com/chapter/10.1007/3-540-39568-7_5}{Identity-Based Cryptosystems and Signature Schemes}}, + author = {Shamir, Adi}, + booktitle = {\bibconf{CRYPTO}{Advances in Cryptology}}, + month = aug, + year = 1984, + pages = {47-53}, +} + +@article{shamir79share, + author = {Adi Shamir}, + title = {\href{https://cs.jhu.edu/~sdoshi/crypto/papers/shamirturing.pdf}{How to Share a Secret}}, + journal = {Communications of the ACM}, + volume = {22}, + number = {11}, + year = {1979}, + pages = {612-613} +} + +@inproceedings{shamir79mental, + title = {Mental Poker}, + author = {Adi Shamir and + Ron Rivest and + Leonard Adleman}, + booktitle = {{MIT} {R}eport, {LCS/TM}-125}, + month = feb, + year = 1979 +} + +@inproceedings{shelat2011two, + author={shelat, abhi and Shen, Chih-Hao}, + title={Two-output secure computation with malicious adversaries}, + booktitle={International Conference on Theory and Applications of Cryptographic Techniques}, + publisher={Springer}, + month={March}, + year={2011} +} + +@article{shen11blind, + author = {Victor R. L. Shen and + Yu fang Chung and + Tzer Shyong Chen and + Yu An Lin}, + title = {A blind signature based on discrete logarithm problem}, + journal = {ICIC}, + volume = 7, + number = 9, + month = sep, + year = 2011 +} + +@INPROCEEDINGS{sherwood02p5, + author={Sherwood, R. and Bhattacharjee, B. and Srinivasan, A.}, + booktitle={Security and Privacy}, + title={P5 : a protocol for scalable anonymous communication}, + year={2002}, + pages={58-70}, +} + +@inproceedings{ shmatikov06measuring, + author = {Vitaly Shmatikov and Ming-Hsiu Wang}, + title = {Measuring Relationship Anonymity in Mix Networks}, + booktitle = {WPES}, + month = oct, + year = 2006, + location = {Alexandria, VA}, +} + +@inproceedings{ shmatikov06timing, + title={\href{https://www.cs.cornell.edu/~shmat/shmat_esorics06.pdf}{Timing analysis in low-latency mix networks: Attacks and defenses}}, + author={Shmatikov, Vitaly and Wang, Ming-Hsiu}, + booktitle={European Symposium on Research in Computer Security}, + month = sep, + year={2006} +} + +@article{shor99polynomial, + title={\href{https://epubs.siam.org/doi/10.1137/S0036144598347011}{Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer}}, + author={Shor, Peter W}, + journal={SIAM review}, + volume={41}, + number={2}, + pages={303--332}, + year={1999}, + publisher={SIAM} +} + +@article{shoup98securing, + title={\href{https://link.springer.com/chapter/10.1007/BFb0054113}{Securing threshold cryptosystems against chosen ciphertext attack}}, + author={Shoup, Victor and Gennaro, Rosario}, + journal={Advances in Cryptology --- EUROCRYPT'98}, + pages={1--16}, + year={1998}, + publisher={Springer} +} + +@inproceedings{ shue13street, + author = {Craig A. Shue and Nathanael Paul and Curtis R. Taylor}, + title = {From an {IP} Address to a Street Address: + Using Wireless Signals to Locate a Target}, + booktitle = {\bibbrev[7th]{WOOT}{USENIX Workshop + on Offensive Technologies}}, + month = aug, + year = 2013, +} + +@misc{shumow07dualec, + author = {Dan Shumow and Niels Ferguson}, + title = {\href{http://rump2007.cr.yp.to/15-shumow.pdf}{On the Possibility of a Back Door in the NIST SP800-90 Dual EC PRNG}}, + howpublished = {CRYPTO 2007 Rump Session}, + year = {2007}, + note = {\url{http://rump2007.cr.yp.to/15-shumow.pdf}} +} + + + +@inproceedings{singh06eclipse, + author = {Atul Singh and Tseun Ngan and Peter Druschel and Dan Wallach}, + title = {Eclipse Attacks on Overlay Networks: Threats and Defenses}, + booktitle = {Proceedings of IEEE INFOCOM}, + year = {2006}, + month = {April}, + address = {Barcelona, Spain} +} + + +@misc{simoens10pvdkg, + author = {Koen Simoens and Roel Peeters and Bart Preneel}, + title = {{Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares}}, + howpublished = {Cryptology ePrint Archive, Report 2010/207}, + year = {2010}, + note = {\url{http://eprint.iacr.org/2010/207}}, +} + +@misc{ sirer13introducing, + author = {Emin G\"un Sirer}, + title = {\href{http://hackingdistributed.com/2013/06/20/virtual-notary-intro/}{Introducing Virtual Notary}}, + month = jun, + year = 2013, +} + +@inproceedings{ smith98secure, + author = {Geoffrey Smith and + Dennis M. Volpano}, + title = {Secure information flow in a multi-threaded imperative language}, + booktitle = {\bibconf[25th]{POPL}{Symposium on Principles of Programming + Languages}}, + month = jan, + year = 1998, +} + + +@article{snow14factom, + title={Factom Business Processes Secured by Immutable Audit Trails on the Blockchain}, + author={Snow, Paul and Deery, Brian and Lu, Jack and Johnston, David and Kirby, Peter}, + journal={Whitepaper, Factom, November}, + year={2014} +} + +@article{ soghoian12petraeus, + title = {Surveillance and Security Lessons From the {Petraeus} Scandal}, + author = {Soghoian, Chris}, + journal = {ACLU Blog}, + month = nov # "~13,", + year = {2012}, + url = {http://www.aclu.org/blog/technology-and-liberty-national-security/surveillance-and-security-lessons-petraeus-scandal}, +} + +@inproceedings{ soghoian11certified, + author = {Soghoian, Christopher and Stamm, Sid}, + title = {\href{https://s3.amazonaws.com/files.cloudprivacy.net/ssl-mitm.pdf}{Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL}}, + booktitle = {Proceedings of the 15th International Conference on Financial Cryptography and Data Security}, + series = {FC'11}, + year = {2012}, + numpages = {10}, + publisher = {Springer-Verlag} +} + +@article{soltani13new, + author={Soltani, Ashkan and Gellman, Barton}, + title={\href{http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/}{New documents show how the {NSA} infers relationships based on mobile location data}}, + journal = {The Washington Post}, + year = 2013, + month = dec # {~10,}, +} + + +@misc{sompolinsky13fastbitcoin, + author = {Yonatan Sompolinsky and Aviv Zohar}, + title = {\href{http://eprint.iacr.org/2013/881}{Accelerating {Bitcoin}'s Transaction Processing. + Fast Money Grows on Trees, Not Chains}}, + month = dec, + year = {2013}, + url = {http://eprint.iacr.org/2013/881}, +} + +@inproceedings{son2010dnscache, + title={\href{https://www.cs.cornell.edu/~shmat/shmat_securecomm10.pdf}{The + Hitchhiker’s Guide to DNS Cache Poisoning}}, + author={Son, Sooel and Shmatikov, Vitaly}, + booktitle={International Conference on Security and Privacy in Communication + Systems}, + pages={466--483}, + year={2010}, + organization={Springer} +} + +@misc{song18guess, + author = {Jonghyuk Song}, + title = + {\href{https://medium.com/coinmonks/attack-on-pseudo-random-number-generator-prng-used-in-1000-guess-an-ethereum-lottery-game-7b76655f953d}{Attack + on Pseudo-random number generator (PRNG) used in 1000 Guess, an + Ethereum lottery game (CVE-2018–12454)}}, + month = jul, + year = 2018, +} + + +@article{sonnino18coconut, + title={\href{https://arxiv.org/abs/1802.07344}{Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers}}, + author={Sonnino, Alberto and Al-Bassam, Mustafa and Bano, Shehar and Danezis, George}, + journal={arXiv preprint arXiv:1802.07344}, + year={2018} +} + +@article{ sputnik15russia, + key = {Sputnik}, + title = {\href{http://sputniknews.com/business/20150918/1027204933/russian-national-cryptocurrency.html}{Russia's Bitruble to be World's First State-Controlled Cryptocurrency}}, + journal = {Sputnik}, + month = sep, + year = 2015, +} + +@inproceedings{ spycher10coercion, + author = {Oliver Spycher and Rolf Haenni and Eric Dubuis}, + title = {\href{https://dl.gi.de/handle/20.500.12116/19498}{Coercion-Resistant Hybrid Voting Systems}}, + booktitle = {4th International Conference on Electronic Voting}, + month = jul, + year = 2010, +} + +@inproceedings{ srinivasan08protecting, + author = {Vijay Srinivasan and John Stankovic and Kamin Whitehouse}, + title = {Protecting your Daily In-Home Activity Information from a + Wireless Snooping Attack}, + booktitle = {UbiComp}, + month = sep, + year = 2008, +} + +@inproceedings{ stark09symmetric, + title = {Symmetric cryptography in {JavaScript}}, + author = {Stark, Emily and Hamburg, Michael and Boneh, Dan}, + booktitle = {Computer Security Applications Conference}, + pages = {373--381}, + year = {2009}, + organization = {{IEEE}} +} + +@inproceedings{stefanov12policy, + author = {Emil Stefanov and + Elaine Shi and + Dawn Song}, + title = {Policy-Enhanced Private Set Intersection: {S}haring Information While Enforcing Privacy Policies}, + booktitle = {Public Key Cryptography}, + year = {2012} +} + + +@article{subramanian17decentralized, + title={\href{https://dl.acm.org/citation.cfm?id=3158333}{Decentralized blockchain-based electronic marketplaces}}, + author={Subramanian, Hemang}, + journal={Communications of the ACM}, + volume={61}, + number={1}, + pages={78--84}, + year={2017}, + publisher={ACM} +} + + + +@book{swan15blockchain, + title={\href{http://shop.oreilly.com/product/0636920037040.do}{Blockchain: Blueprint for a new economy}}, + author={Swan, Melanie}, + year={2015}, + publisher={O'Reilly Media, Inc.} +} + + + +@misc{ swende17frontrunning, + author = {Martin Holst Swende}, + title = {\href{http://swende.se/blog/Frontrunning.html}{Blockchain Frontrunning}}, + month = oct, + year = 2017, +} + +@article{ sweeney96replacing, + author = {Latanya Sweeney}, + title = {Replacing personally-identifying information in medical records, the scrub system}, + journal = {Journal of the American Medical Informatics Association}, + year = {1996} +} + +@article{ syta14security, + author = {Ewa Syta and Aaron Johnson and Henry Corrigan-Gibbs and + Shu-Chun Weng and David Isaac Wolinsky and Bryan Ford}, + title = {Security Analysis of Accountable Anonymity in {Dissent}}, + journal = {\bibconf{TISSEC}{ACM Transactions on Information and System Security}}, + month = aug, + year = 2014, +} + +@misc{ syta14deniable, + author = {Ewa Syta and Benjamin Peterson and David Isaac Wolinsky and + Michael Fischer and Bryan Ford}, + title = {\href{https://cpsc.yale.edu/sites/default/files/files/TR1486.pdf}{Deniable Anonymous Group Authentication}}, + institution = {Yale University}, + number = {YALEU/DCS/TR-1486}, + month = feb, + year = 2014, +} + +% formerly used incorrect key syta15decentralizing +@inproceedings{ syta16keeping, + title={\href{http://dedis.cs.yale.edu/dissent/papers/witness-abs}{Keeping Authorities ``Honest or Bust'' with Decentralized Witness Cosigning}}, + author={Syta, Ewa and Tamas, Iulia and Visher, Dylan and Wolinsky, David Isaac and Jovanovic, Philipp and Gasser, Linus and Gailly, Nicolas and Khoffi, Ismail and Ford, Bryan}, + booktitle = {37th IEEE Symposium on Security and Privacy}, + month = may, + year={2016}, +} + +% formerly syta16scalable +@inproceedings{syta17scalable, + author = {Ewa Syta and Philipp Jovanovic and Eleftherios Kokoris-Kogias and Nicolas Gailly and Linus Gasser and Ismail Khoffi and Michael J. Fischer and Bryan Ford}, + title = {\href{https://www.ieee-security.org/TC/SP2017/papers/413.pdf}{Scalable Bias-Resistant Distributed Randomness}}, + booktitle = {38th IEEE Symposium on Security and Privacy}, + month = may, + year = {2017}, + location = {San Jose, CA}, +} + +@inproceedings{syverson09entropist, + author = {Paul Syverson}, + title = {Why {I'm} not an entropist}, + booktitle = {17th International Workshop on Security Protocols}, + month = apr, + year = {2009}, +} + +% later published version: szabo97formalizing +@article{szabo94smart, + title={Smart contracts}, + author={Szabo, Nick}, + journal={Unpublished manuscript}, + year={1994} +} + +@article{ szabo97formalizing, + author = {Nick Szabo}, + title = {\href{https://firstmonday.org/ojs/index.php/fm/article/view/548}{Formalizing and Securing Relationships on Public Networks}}, + journal = {First Monday}, + month = sep, + year = 1997, + volume = 2, + number = 9, +} + +@inproceedings{ szalachowski14policert, + author = {Pawel Szalachowski and Stephanos Matsumoto and Adrian Perrig}, + title = {\href{http://www.netsec.ethz.ch/publications/papers/ccsfp512-szalachowskiA.pdf}{{PoliCert}: Secure and Flexible {TLS} Certificate Management}}, + booktitle = {\bibconf{CCS}{ACM Conference on Computer and + Communications Security}}, + year = 2014, +} + +@inproceedings{ szalachowski16pkisn, + author = {Pawel Szalachowski and Laurent Chuat and Adrian Perrig}, + title = {\href{http://arxiv.org/abs/1601.03874}{{PKI} Safety Net {(PKISN):} Addressing the Too-Big-to-Be-Revoked Problem of the {TLS} Ecosystem}}, + booktitle = {1st IEEE European Symposium on Security and Privacy}, + month = mar, + year = {2016}, +} + +@inproceedings{ szalachowski18towards, + author = {Pawel Szalachowski}, + title = {\href{https://ieeexplore.ieee.org/document/8525399}{Towards More Reliable Bitcoin Timestamps}}, + booktitle = {Crypto Valley Conference}, + month = jun, + year = 2018, + location = {Zug, Switzerland} +} + + +%T + +@article{ taylor11behind, + author = {Taylor, Greg and Cox, George}, + title = {Behind Intel's New Random-Number Generator}, + year = 2011, + month = sep, + journal = {{IEEE} Spectrum}, +} + + +@article{thomas15interledger, + title={\href{https://interledger.org/interledger.pdf}{A protocol for interledger payments}}, + author={Thomas, Stefan and Schwartz, Evan}, + url={https://interledger.org/interledger.pdf}, + year={2015} +} + + +@article{thompson84reflections, + author = {Thompson, Ken}, + title = {\href{https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf}{Reflections on Trusting Trust}}, + journal = {Commun. ACM}, + volume = {27}, + number = {8}, + month = aug, + year = {1984}, + pages = {761--763}, + publisher = {ACM}, +} + +@article{ thomsen15ashley, + author = {Simon Thomsen}, + title = {\href{http://uk.businessinsider.com/cheating-affair-website-ashley-madison-hacked-user-data-leaked-2015-7?r=US&IR=T}{Ashley Madison data breach +}}, + month = jul, + year = 2015, +} + +@inproceedings{tomescu17catena, + author={Alin Tomescu and Srini Devadas}, + title={\href{https://people.csail.mit.edu/devadas/pubs/catena.pdf}{Catena: Efficient Non-equivocation via Bitcoin}}, + booktitle={38th IEEE Symposium on Security and Privacy}, + year={2017}, + pages={393-409}, + doi={10.1109/SP.2017.19}, + month={May}, +} + +@inproceedings{ topalovic12towards, + author = {Emin Topalovic and Brennan Saeta and Lin-Shung Huang and + Collin Jackson and Dan Boneh}, + title = {\href{http://www.ieee-security.org/TC/W2SP/2012/papers/w2sp12-final9.pdf}{Towards Short-Lived Certificates}}, + booktitle = {\bibconf{W2SP}{Web 2.0 Security \& Privacy}}, + month = may, + year = 2012, + location = {San Francisco, CA, USA}, +} + +@inproceedings{torres16omitting, + author = {Santiago Torres-Arias and Anil Kumar Ammula and Reza Curtmola + and Justin Cappos}, + title = + {\href{https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_torres-arias.pdf} + {On Omitting Commits and Committing Omissions: Preventing Git Metadata + Tampering That (Re)introduces Software Vulnerabilities}}, + booktitle = {\bibconf[25th]{USENIX Security 16}{USENIX Security Symposium}}, + year = {2016}, + month=aug +} + +@misc{ tsakalaki13ensure, + author = {Elpiniki Tsakalaki}, + title = {{MSC32-C}. Ensure your random number generator is properly seeded}, + howpublished = {\url{https://www.securecoding.cert.org/confluence/display/seccode/MSC32-C.+Ensure+your+random+number+generator+is+properly+seeded}}, +} + +@inproceedings{tsang07blacklistable, + title={Blacklistable anonymous credentials: {B}locking + misbehaving users without {TTP}s}, + author={Tsang, Patrick P and Au, Man Ho and Kapadia, Apu and Smith, Sean W}, + booktitle={\bibconf[14th]{CCS}{Proceedings of the 14th + ACM conference on Computer and communications security}}, + month=oct, + year=2007 +} + +@inproceedings{ tsang10blac, + author = {Patrick P. Tsang and Man Ho Au and Apu Kapadia and + Sean W. Smith}, + title = {BLAC: Revoking Repeatedly Misbehaving Anonymous Users + Without Relying on TTPs}, + journal = {ACM Transactions on Information and System Security (TISSEC)}, + volume = 13, + number = 4, + month = dec, + year = 2010, +} + + + + + +@inproceedings{tsang08perea, + author = {Tsang, Patrick P. and Au, Man Ho and Kapadia, Apu and Smith, Sean W.}, + title = {PEREA: towards practical TTP-free revocation in anonymous authentication}, + booktitle = {Proceedings of the 15th ACM conference on Computer and communications security}, + booktitle = {\bibconf{CCS}{ACM conference on computer and + communications security}}, + year = {2008}, + pages = {333--344}, + numpages = {12}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@incollection{ tsiounis98security, + year = {1998}, + booktitle = {Public Key Cryptography}, + volume = {1431}, + series = {Lecture Notes in Computer Science}, + editor = {Imai, Hideki and Zheng, Yuliang}, + title = {On the security of {ElGamal} based encryption}, + publisher = {Springer Berlin Heidelberg}, + author = {Tsiounis, Yiannis and Yung, Moti}, + pages ={117-134} + } + +@article{ tsujii89ibe, + title={An {ID}-based cryptosystem based on the discrete logarithm problem}, + author={Tsujii, Shigeo and Itoh, Toshiya}, + journal={{IEEE} Journal on Selected Areas in Communications}, + year={1989}, +} + +@misc{tor-directory, + key={Tor directory protocol}, + title = {Tor directory protocol, version 3}, + howpublished = {\url{https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt}}, + year = 2014, +} + +@article{ tung15google, + author = {Liam Tung}, + title = {\href{http://www.zdnet.com/article/google-banishes-chinas-main-digital-certificate-authority-cnnic/}{Google boots China's main digital certificate authority CNNIC}}, + journal = {ZDNet}, + month = apr, + day = 2, + year = 2015, +} + +%V + +@article{ vaas13use, + author = {Lisa Vaas}, + title = {\href{http://nakedsecurity.sophos.com/2013/12/20/use-of-tor-pointed-fbi-to-harvard-university-bomb-hoax-suspect/}{Use of Tor pointed FBI to Harvard University bomb hoax suspect}}, + journal = {Naked Security}, + month = dec # "~20,", + year = 2013, +} + +@article{vaidya05secure, + author = {Jaideep Vaidya and Chris Clifton}, + title = {Secure set intersection cardinality with application to + association rule mining}, + journal = {Journal of Computer Security}, + volume = {13}, + number = {4}, + year = 2005, + pages = {593-622} +} + +@misc{ valverde15replay, + author = {Thiago Valverde}, + title = {\href{http://blog.valverde.me/2015/12/07/bad-life-advice/}{Bad life advice -- Replay attacks against {HTTPS}}}, + month = dec, + year = 2015, + note = {Blog}, +} + +@inproceedings{van2018foreshadow, + title={Foreshadow: Extracting the Keys to the Intel $\{$SGX$\}$ Kingdom with Transient Out-of-Order Execution}, + author={Van Bulck, Jo and Minkin, Marina and Weisse, Ofir and Genkin, Daniel and Kasikci, Baris and Piessens, Frank and Silberstein, Mark and Wenisch, Thomas F and Yarom, Yuval and Strackx, Raoul}, + booktitle={27th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 18)}, + pages={991--1008}, + year={2018} +} + +@article{van15paxos, + title={Paxos made moderately complex}, + author={Van Renesse, Robbert and Altinbuken, Deniz}, + journal={ACM Computing Surveys (CSUR)}, + volume={47}, + number={3}, + pages={1--36}, + year={2015}, + publisher={ACM New York, NY, USA} +} + + +@misc{ venkatanarayanan17enrolment, + author = {Anand Venkatanarayanan}, + title = {\href{https://medium.com/karana/aadhaar-enrollment-rejections-are-accelerating-5aa76191d9a9}{Enrolment rejections are accelerating}}, + howpublished = {Medium}, + month = nov, + year = 2017, +} + +@inproceedings{venkatadri18privacy, + title={\href{https://mislove.org/publications/PII-Oakland.pdf}{Privacy Risks with Facebook’s PII-based Targeting: Auditing a Data Broker’s Advertising Interface}}, + author={Venkatadri, Giridhari and Andreou, Athanasios and Liu, Yabing and Mislove, Alan and Gummadi, Krishna P and Loiseau, Patrick and Goga, Oana}, + booktitle={IEEE Symposium on Security and Privacy (SP)}, + pages={221--239}, + year={2018} +} + + +@inproceedings{ verde14no, + author = {Nino Vincenzo Verde and Giuseppe Ateniese + and Emanuele Gabrielli and Luigi Vincenzo Mancini + and Angelo Spognardi}, + title = {``No NAT'd User left Behind'': Fingerprinting Users + behind {NAT} from {NetFlow} Records alone}, + booktitle = {\bibconf[34th]{ICDCS}{International Conference on Distributed Computing Systems}}, + month = jul, + year = 2014, +} + +@inproceedings{ verkamp12inferring, + author = {John-Paul Verkamp and Minaxi Gupta}, + title = {Inferring Mechanics of {Web} Censorship Around the World}, + booktitle = {\bibconf[2nd]{FOCI}{USENIX Workshop on + Free and Open Communications on the Internet}}, + month = aug, + year = 2012, + location = {Bellevue, WA}, +} + +@inproceedings{ viswanath10analysis, + author = {Bimal Viswanath and Ansley Post}, + title = {\href{http://ccr.sigcomm.org/online/files/p363.pdf}{An Analysis of Social Network-Based Sybil Defenses}}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2010, + location = {New Delhi, India}, +} + +@misc{ voisin13mat, + year = {2013}, + month = {may}, + title = {The Metadata Anonymization Toolkit}, + howpublished = {\url{http://arxiv.org/abs/1212.3648}}, + author = {Julien Voisin and Christophe Guyeux and Jacques M. Bahi}, +} + +@inproceedings{ volpano97eliminating, + author = {Dennis M. Volpano and + Geoffrey Smith}, + title = {Eliminating covert flows with minimum typings}, + booktitle = {\bibconf[10th]{CSFW}{Computer Security Foundations Workshop}}, + month = jun, + year = 1997, +} + +@misc{ vorick18state, + author = {David Vorick}, + title = {\href{https://blog.sia.tech/the-state-of-cryptocurrency-mining-538004a37f9b}{The State of Cryptocurrency Mining}}, + month = may, + year = 2018, + url = {https://blog.sia.tech/the-state-of-cryptocurrency-mining-538004a37f9b}, +} + +@inproceedings{von06selectively, + title={Selectively traceable anonymity}, + author={von Ahn, Luis and Bortz, Andrew and Hopper, Nicholas J and O?eill, Kevin}, + booktitle={Privacy Enhancing Technologies}, + pages={208--222}, + year={2006}, + organization={Springer} +} + +@inproceedings{ vratonjic11inconvenient, + author = {Nevena Vratonjic and Julien Freudiger and Vincent Bindschaedler and Jean-Pierre Hubaux}, + title = {\href{https://link.springer.com/chapter/10.1007%2F978-1-4614-1981-5_5}{The Inconvenient Truth about Web Certificates}}, + booktitle = {\bibconf[10th]{WEIS}{Workshop on Economics of Information Security}}, + month = jun, + year = 2011, + pages = {79-117}, +} + +@inproceedings{vukolic15quest, + title={\href{http://vukolic.com/iNetSec_2015.pdf}{The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication}}, + author={Vukoli{\'c}, Marko}, + booktitle={International Workshop on Open Problems in Network Security}, + pages={112--125}, + year={2015}, + organization={Springer} +} + +%W + +@inproceedings{wang08cache, + author = {Zhenhong Wang and + Ruby B. Lee}, + title = {A novel cache architecture with enhanced performance and security}, + booktitle = {IEEE/ACM \bibconf[41th]{Micro}{International Symposium on Microarchitecture}}, + year = 2008 +} + +@inproceedings{wang10privacy, + author = {Cong Wang and + Qian Wang and + Kui Ren and + Wenjing Lou}, + title = {Privacy-Preserving Public Auditing for Data Storage Security + in Cloud Computing}, + booktitle = {\bibconf[29th]{INFOCOM}{IEEE INFOCOM}}, + location = {San Deigo, CA}, + month = mar, + year = 2010 +} + + +@article{wang10publicly, + author = {Cong Wang and + Kui Ren and + Wenjing Lou and + Jin Li}, + title = {Toward publicly auditable secure + cloud data storage services}, + journal = {IEEE Network}, + volume = {24}, + number = {4}, + year = {2010}, + pages = {19-24} +} + +@article{wang11enabling, + author = {Qian Wang and + Cong Wang and + Kui Ren and + Wenjing Lou and + Jin Li}, + title = {Enabling Public Auditability and Data Dynamics for Storage + Security in Cloud Computing}, + journal = {IEEE Transactions on Parallel and Distributed Systems}, + volume = {22}, + number = {5}, + year = {2011}, + pages = {847-859} +} + +@article{wang13privacy, + author = {Cong Wang and + Sherman S. M. Chow and + Qian Wang and + Kui Ren and + Wenjing Lou}, + title = {Privacy-Preserving Public Auditing for + Secure Cloud Storage}, + journal = {IEEE Transactions on Computers}, + volume = {62}, + number = {2}, + year = {2013}, + pages = {362-375} +} + +@inproceedings{ wang12censorspoofer, + author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and + Amir Houmansadr and Nikita Borisov}, + title = {{CensorSpoofer}: Asymmetric Communication using {IP} Spoofing + for Censorship-Resistant Web Browsing}, + booktitle = {\bibconf[19th]{CCS}{ACM Conference on + Computer and Communications Security}}, + location = {Raleigh, NC}, + month = oct, + year = 2012, +} + +@inproceedings{ wang14effective, + author = {Tao Wang and Xiang Cai and Rishab Nithyanand and Rob + Johnson and Ian Goldberg}, + title = + {\href{https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/wang_tao} + {Effective Attacks and Provable Defenses for Website Fingerprinting}}, + booktitle = {{USENIX} Security Symposium}, + month = aug, + year = 2014 +} + +@article{watanabe11signature, + title={Account Management Method with Blind Signature Scheme}, + author={Watanabe, Ryu and Miyake, Yutaka}, + journal={Engineering and Technology, World of Science}, + year={2011} +} + +@inproceedings{waters04dosresistance, + author = {Waters, Brent and Juels, Ari and Halderman, J. Alex and Felten, Edward W.}, + title = {{New Client Puzzle Outsourcing Techniques for DoS Resistance}}, + booktitle = {Proceedings of the 11th ACM Conference on Computer and Communications Security}, + series = {CCS '04}, + year = {2004}, + isbn = {1-58113-961-6}, + location = {Washington DC, USA}, + pages = {246--256}, + numpages = {11}, + url = {http://doi.acm.org/10.1145/1030083.1030117}, + doi = {10.1145/1030083.1030117}, + acmid = {1030117}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {DoS, client puzzles, denial-of-service}, +} + +@inproceedings{ waters05efficient, + author = {Brent Waters}, + title = {\href{https://link.springer.com/chapter/10.1007%2F11426639_7}{Efficient Identity-Based Encryption Without Random Oracles}}, + booktitle = {Eurocrypt}, + month = may, + year = 2005, +} + +@article{ watts13rowling, + author = {Robert Watts}, + title = {{JK Rowling} unmasked as author of acclaimed detective novel}, + journal = {The Telegraph}, + month = jul # "~13,", + year = 2013, + url = {http://www.telegraph.co.uk/culture/books/10178344/JK-Rowling-unmasked-as-author-of-acclaimed-detective-novel.html} +} + +@article{ weissman15how, + author = {Cale Guthrie Weissman}, + title = {\href{https://www.businessinsider.in/How-a-man-who-worked-for-the-Lottery-Association-may-have-hacked-the-system-for-a-winning-ticket/articleshow/46913403.cms}{How a man who worked for the Lottery Association may have hacked the system for a winning ticket}}, + journal = {Business Insider}, + month = apr, + day = 13, + year = 2015, +} + +@inproceedings{ wesolowski19efficient, + author = {Benjamin Wesolowski}, + title = {\href{https://link.springer.com/chapter/10.1007%2F978-3-030-17659-4_13}{Efficient Verifiable Delay Functions}}, + booktitle = {Eurocrypt}, + month = may, + year = 2019, +} + +@article{ wen15face, + author = {Di Wen and Hu Hanand Anil K. Jain}, + title = {\href{https://ieeexplore.ieee.org/document/7031384}{Face Spoof Detection With Image Distortion Analysis}}, + journal = {IEEE Transactions on Information Forensics and Security}, + volume = 10, + number = 4, + month = apr, + year = 2015, +} + +@inproceedings{ wendlandt08perspectives, + author = {Dan Wendlandt and David G. Andersen and Adrian Perrig}, + title = {Perspectives: Improving {SSH}-style Host Authentication + with Multi-Path Probing}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2008, + location = {Boston, MA}, +} + +@inproceedings{ whitten99johnny, + author = {Whitten, Alma and Tygar, J. D.}, + title = {Why Johnny can't encrypt: a usability evaluation of PGP 5.0}, + booktitle = {Proceedings of the 8th conference on USENIX Security Symposium - Volume 8}, + series = {SSYM'99}, + year = {1999}, + location = {Washington, D.C.}, + pages = {14--14}, + publisher = {USENIX Association}, + address = {Berkeley, CA, USA}, +} + +@inproceedings{ wikstrom05sender, + author = {Douglas Wikstr\"om}, + title = {\href{https://link.springer.com/chapter/10.1007/11593447_15}{A Sender Verifiable Mix-Net and a New Proof of a Shuffle}}, + booktitle = {Advances in Cryptology -- ASIACRYPT}, + month = dec, + year = 2005, + location = {Chennai, India}, +} + +@book{william04recommendation, + title={Recommendation for the triple data encryption algorithm ({TDEA}) block cipher}, + author={Barker, William Curt}, + year={2004}, + publisher={US Department of Commerce, Technology Administration, National Institute of Standards and Technology} +} + +@inproceedings{wolchok10defeating, + title={Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.}, + author={Wolchok, Scott and Hofmann, Owen S and Heninger, Nadia and Felten, Edward W and Halderman, J Alex and Rossbach, Christopher J and Waters, Brent and Witchel, Emmett}, + booktitle={NDSS}, + year={2010} +} + +@inproceedings{ wolinsky14managing, + author = {David Isaac Wolinsky and Daniel Jackowitz and Bryan Ford}, + title = {Managing {NymBoxes} for Identity and Tracking Protection}, + booktitle = {USENIX Conference on Timely Results in Operating Systems}, + month = oct, + year = 2014, + location = {Broomfield, CO}, +} + +@inproceedings{wong02verifiable, + title={\href{https://dl.acm.org/citation.cfm?id=830217}{Verifiable secret redistribution for archive systems}}, + author={Wong, Theodore M and Wang, Chenxi and Wing, Jeannette M}, + booktitle={Security in Storage Workshop, 2002. Proceedings. First International IEEE}, + pages={94--105}, + year={2002}, + organization={IEEE} +} + +@article{wood14ethereum, + title={\href{https://github.com/ethereum/wiki/wiki/White-Paper}{Ethereum: A Secure Decentralised Generalised Transaction Ledger}}, + author={Wood, Gavin}, + journal={Ethereum Project Yellow Paper}, + year={2014} +} + +@inproceedings{ wright03defending, + author = {Matthew Wright and Micah Adler and Brian N. Levine + and Clay Shields}, + title = {Defending Anonymous Communications Against + Passive Logging Attacks}, + booktitle = {IEEE Security and Privacy}, + month = may, + year = 2003, +} + +@inproceedings{wright18crypto, + title={\href{https://web.cecs.pdx.edu/~cvwright/papers/crumplezones.pdf}{Crypto Crumple Zones: Enabling limited Access without Mass Surveillance}}, + author={Wright, Charles and Varia, Mayank}, + booktitle={2018 IEEE European Symposium on Security and Privacy (EuroS\&P)}, + pages={288--306}, + year={2018}, + organization={IEEE} +} + +@article{wright08passive, + author = {Wright, Matthew K. and Adler, Micah and Levine, Brian Neil and Shields, Clay}, + title = {Passive-Logging Attacks Against Anonymous Communications Systems}, + journal = {\bibbrev{TISSEC}{ACM Transactions on Information and System Security}}, + month = may, + year = {2008}, +} + +@inproceedings{ wu15deterland, + author = {Weiyi Wu and Bryan Ford}, + title = {\href{https://dedis.cs.yale.edu/cloud/papers/trios15-deterland-abs/}{Deterministically Deterring Timing Attacks in Deterland}}, + booktitle = {Conference on Timely Results in Operating Systems (TRIOS)}, + month = oct, + year = 2015, +} + +%X + +@article{xia17bbds, + title={BBDS: Blockchain-based data sharing for electronic medical records in cloud environments}, + author={Xia, Qi and Sifah, Emmanuel Boateng and Smahi, Abla and Amofa, Sandro and Zhang, Xiaosong}, + journal={Information}, + volume={8}, + number={2}, + pages={44}, + year={2017}, + publisher={Multidisciplinary Digital Publishing Institute} +} + + + +@article{xia17medshare, + title={MeDShare: Trust-Less Medical Data Sharing Among Cloud Service + Providers via Blockchain}, + author={Xia, Qi and Sifah, Emmanuel Boateng and Asamoah, Kwame Omono and Gao, + Jianbin and Du, Xiaojiang and Guizani, Mohsen}, + journal={IEEE Access}, + volume={5}, + pages={14757--14767}, + year={2017}, + publisher={IEEE} +} + +@inproceedings{xiao13structural, + author = {Hongda Xiao and + Bryan Ford and + Joan Feigenbaum}, + title = {Structural Cloud Audits that Protect Private Information}, + booktitle = {\bibconf{CCSW}{ACM Cloud Computing Security Workshop}}, + location = {Berlin, Germany}, + month = nov, + year = 2013 +} + + +%Y + +@inproceedings{yao82protocols, + author = {Andrew Chi-Chih Yao}, + title = {Protocols for Secure Computations ({E}xtended Abstract)}, + booktitle = {\bibconf[23rd]{FOCS}{Annual Symposium on Foundations of + Computer Science}}, + location = {Chicago, IL}, + month = nov, + year = 1982 +} + + +@article{yermack17corporate, + title={\href{https://academic.oup.com/rof/article/21/1/7/2888422}{Corporate governance and blockchains}}, + author={Yermack, David}, + journal={Review of Finance}, + volume={21}, + number={1}, + pages={7--31}, + year={2017}, + publisher={Oxford University Press} +} + + +@inproceedings{ yilek09private, + author = {Scott Yilek and Eric Rescorla and Hovav Shacham and + Brandon Enright and Stefan Savage}, + title = {When Private Keys are Public: Results From the 2008 + {Debian} {OpenSSL} Vulnerability}, + booktitle = {Proceedings of IMC}, + year = 2009, + editor = {Anja Feldmann and Laurent Mathy}, + month = nov, + publisher = {ACM Press}, + pages = {15-27} +} + +@inproceedings{ yin19hotstuff, + author = {Maofan Yin and Dahlia Malkhi and Michael K. Reiter and Guy Golan Gueta and Ittai Abraham}, + title = {\href{https://research.vmware.com/files/attachments/0/0/0/0/0/7/7/podc.pdf}{HotStuff: BFT Consensus with Linearity and Responsiveness}}, + booktitle = {\bibconf{PODC}{Principles of Distributed Computing}}, + month = jul, + year = 2019, + location = {Toronto, Ontario, Canada}, +} + +@article{ylonen06secure, + title={The secure shell (SSH) protocol architecture}, + author={Ylonen, Tatu and Lonvick, Chris}, + year={2006} +} + + +@inproceedings{ young97kleptography, + title = {Kleptography: Using cryptography against cryptography}, + author = {Young, Adam and Yung, Moti}, + booktitle = {{EUROCRYPT}}, + pages = {62--74}, + year = {1997}, +} + +@inproceedings{ yu08sybillimit, + author = {Haifeng Yu and Phillip B. Gibbons and Michael Kaminsky + and Feng Xiao}, + title = {\href{https://www.iscs.nus.edu.sg/~yuhf/sybillimit-tr.pdf}{{SybilLimit}: {A} Near-Optimal Social Network Defense + against Sybil Attacks}}, + booktitle = {\bibconf[29th]{S{\&}P}{IEEE Symposium on Security and + Privacy}}, + location = {Oakland, CA}, + month = may, + year = 2008, + url = {https://www.iscs.nus.edu.sg/~yuhf/sybillimit-tr.pdf}, +} + +@inproceedings{yu09dsybil, + author = {Haifeng Yu and + Chenwei Shi and + Michael Kaminsky and + Phillip B. Gibbons and + Feng Xiao}, + title = {D{S}ybil: {O}ptimal Sybil-resistance for recommendation systems}, + booktitle = {\bibconf[30th]{S{\&}P}{IEEE Symposium on Security and Privacy}}, + location = {Oakland, CA}, + month = may, + year = 2009 +} + + + +%Z + +@misc{zamani14mpc, + author = {Mahdi Zamani and Mahnush Movahedi and Jared Saia}, + title = {\href{https://eprint.iacr.org/2014/149.pdf}{Millions of Millionaires: Multiparty Computation in Large Networks}}, + howpublished = {Cryptology ePrint Archive, Report 2014/149}, + year = {2014}, +} + +@inproceedings{zander13scalable, + author = {Sebastian Zander and + Lachlan L. H. Andrew and + Grenville Armitage}, + title = {Scalable private set intersection cardinality for + capture-recapture with multiple private datasets}, + booktitle = {Centre for Advanced Internet Architectures, Technical + Report 130930A}, + year = 2013 +} + + + +@inproceedings{zhai16anonrep, + author = {Ennan Zhai and + David Isaac Wolinsky and + Ruichuan Chen and + Ewa Syta and + Chao Teng and + Bryan Ford}, + title = {Anon{R}ep: {T}owards tracking-resistant anonymous + reputation}, + booktitle = {\bibconf[13th]{NSDI}{USENIX Symposium on Networked + Systems Design and Implementation}}, + location = {Santa Clara, CA}, + month = mar, + year = 2016 +} + +@inproceedings{ zhang11inferring, + author = {Zhang, Fan and He, Wenbo and Liu, Xue and Bridges, Patrick G. Bridges}, + title = + {\href{http://www.math.unipd.it/~conti/teaching/CNS1415/atpapers/Profiling/profiling.pdf} + {Inferring Users' Online Activities Through Traffic Analysis}}, + booktitle = {WiSec}, + month = jun, + year = 2011 +} + +@inproceedings{ zhang16towncrier, + author = {Zhang, Fan and Cecchetti, Ethan and Croman, Kyle and Juels, Ari and Shi, Elaine}, + title = {\href{https://dl.acm.org/citation.cfm?id=2978326}{Town Crier: An Authenticated Data Feed for Smart Contracts}}, + booktitle = {2016 ACM SIGSAC Conference on Computer and Communications Security}, + series = {CCS '16}, + year = {2016}, + month = nov, + location = {Vienna, Austria}, + pages = {270--282}, + numpages = {13}, +} + +@misc{zhang17rem, + author = {Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse}, + title = {\href{http://eprint.iacr.org/2017/179.pdf}{REM: Resource-Efficient Mining for Blockchains}}, + howpublished = {Cryptology ePrint Archive, Report 2017/179}, + year = {2017}, + note = {\url{http://eprint.iacr.org/2017/179}}, +} + +@inproceedings{zhang2013picco, + author={Zhang, Yihua and Steele, Aaron and Blanton, Marina}, + title={Picco: A general-purpose compiler for private distributed computation}, + booktitle={{ACM} Conference on Computer and Communications Security}, + month={November}, + year={2013} +} + +@inproceedings{ zhang19statement, + author = {Bingsheng Zhang and Hong-Sheng Zhou}, + title = {\href{https://fc19.ifca.ai/preproceedings/97-preproceedings.pdf}{Statement Voting}}, + booktitle = {\bibconf[23rd]{FC}{International Conference on Financial Cryptography and Data Security 2019}}, + month = feb, + year = 2019, + location = {St. Kitts}, +} + +@article{zhang2019deco, + title={\href{https://arxiv.org/pdf/1909.00938.pdf}{DECO: Liberating Web Data + Using Decentralized Oracles for TLS}}, + author={Zhang, Fan and Maram, Sai Krishna Deepak and Malvai, Harjasleen and Goldfeder, Steven and Juels, Ari}, + journal={arXiv preprint arXiv:1909.00938}, + year={2019} +} + +@article{zhou02coca, + title={\href{http://www.cs.cornell.edu/fbs/publications/cocaTOCS.pdf}{COCA: A Secure Distributed Online Certification Authority}}, + author={Zhou, Lidong and Schneider, Fred B and Van Renesse, Robbert}, + journal={ACM Transactions on Computer Systems (TOCS)}, + volume={20}, + number={4}, + pages={329--368}, + year={2002}, + publisher={ACM} +} + +@article{ zhou05apss, + author = {Lidong Zhou and Fred B. Schneider and Robbert Van Renesse}, + title = {\href{https://dl.acm.org/citation.cfm?id=1085127}{APSS: Proactive Secret Sharing in Asynchronous Systems}}, + journal = {ACM Transactions on Information and System Security (TISSEC)}, + volume = 8, + number = 3, + month = aug, + year = 2005, + pages = {259-286}, +} + +@inproceedings{ zhou12droidranger, + series = {CODASPY '12}, + title = + {\href{https://www.internetsociety.org/sites/default/files/07_5.pdf}{Hey, + {{You}}, + {{Get Off}} of {{My Market}}: {{Detecting Repackaged + Smartphone Applications}} in {{Third}}-party {{Android Marketplaces}}}}, + booktitle = {Proceedings of the {{Second ACM Conference}} on {{Data}} and + {{Application Security}} and {{Privacy}}}, + publisher = {{ACM}}, + author = {Zhou, Wu and Zhou, Yajin and Jiang, Xuxian and Ning, Peng}, + year = {2012} +} + +@techreport{zamyatin19sok, + title={Sok: Communication across distributed ledgers}, + author={Zamyatin, Alexei and Al-Bassam, Mustafa and Zindros, Dionysis and Kokoris-Kogias, Eleftherios and Moreno-Sanchez, Pedro and Kiayias, Aggelos and Knottenbelt, William J}, + year={2019}, + institution={IACR Cryptology ePrint Archive, 2019: 1128} +} + +@article{zyskind2015enigma, + title={\href{https://arxiv.org/pdf/1506.03471.pdf}{Enigma: Decentralized computation platform with guaranteed privacy}}, + author={Zyskind, Guy and Nathan, Oz and Pentland, Alex}, + journal={arXiv preprint arXiv:1506.03471}, + year={2015} +} + +@inproceedings{zyskind2015decentralizing, + title={\href{https://ieeexplore.ieee.org/abstract/document/7163223/}{Decentralizing privacy: Using blockchain to protect personal data}}, + author={Zyskind, Guy and Nathan, Oz and others}, + booktitle={Security and Privacy Workshops (SPW), 2015 IEEE}, + pages={180--184}, + year={2015}, + organization={IEEE} +} + + + +% Misc... + +@misc{bbc12cispa, + author = {{BBC}}, + month = {April}, + year = {2012}, + title = {Cyber-security bill Cispa passes US House}, + howpublished = {\url{http://www.bbc.co.uk/news/world-us-canada-17864539}} +} + +@misc{cnn12wikileaks, + author = {Laura Smith-Spark}, + month = {July}, + year = {2012}, + title = {Extradition deadline passes for WikiLeaks' Assange}, + booktitle = {{CNN}}, + howpublished = {\url{http://articles.cnn.com/2012-07-07/world/world_europe_uk-sweden-assange_1_julian-assange-swedish-prosecution-authority-wikileaks-assange}} +} + +@misc{ debian-snapshots, + author = {Debian}, + key = {debian-snapshots}, + title = {\href{http://snapshot.debian.org/} {snapshot.debian.org}} +} + + +@misc{ debian16repository, + author = {Debian}, + title = + {\href{https://wiki.debian.org/DebianRepository}{Debian Repository}}, + month = aug, + year = 2016 +} + + +@misc{ git-notes, + key = {Gitnotes}, + title = {\href{https://git-scm.com/docs/git-notes}{Git-notes Documentation}}, + month = sep, + year = 2016 +} + + +@misc{ google16play, + author = {Google Inc.}, + title = + {\href{https://play.google.com/store?hl=en}{Google Play}}, + month = sep, + year = 2016 +} + + + +@misc{ intercept15strawhorse, + author = {The Intercept}, + title = + {\href{https://theintercept.com/document/2015/03/10/strawhorse-attacking-macos-ios-software-development-kit/} + {Strawhorse: Attacking the macOS and iOS Software Development Kit}}, + day = 10, + month = mar, + year = {2015} +} + +@misc{ keybase, + key = {Keybase}, + title = {\href{https://keybase.io/}{Keybase -- Public Key Crypto for Everyone, Publicly Auditable Proofs of Identity}}, + year = {2016} +} + +@misc{ mozilla-cors, + title = {{HTTP} access control ({CORS})}, + author = {{Mozilla Developer Network}}, + howpublished = {\url{https://developer.mozilla.org/en-US/docs/HTTP/Access_control_CORS}} +} + +@misc{ openpgpjs, + title = {{OpenPGP.js}}, + key = {OpenPGP.js}, + howpublished = {\url{http://openpgpjs.github.io/}}, +} + +@misc{pbc, + author = {Stanford University}, + title = {The Pairing-Based Cryptography Library}, + howpublished = {\url{http://crypto.stanford.edu/pbc/}} +} + +@misc{perry11firefox, + author = {Mike Perry}, + month = {May}, + year = {2011}, + howpublished = {\url{https://blog.torproject.org/blog/toggle-or-not-toggle-end-torbutton}}, + title = {To Toggle, or not to Toggle: The End of Torbutton}, +} + +@misc{ python-pypi, + author = {Python Community}, + title = {\href{https://pypi.python.org/pypi}{PyPI - the Python Package Index}}, + month = sep, + year = 2016 +} + +@misc{ sjcl-ecc, + title = {Stanford {Javascript} Crypto Library - {ECC} branch}, + key = {Stanford {Javascript} Crypto Library - {ECC} branch}, + howpublished = {\url{https://github.com/bitwiseshiftleft/sjcl/tree/ecc}}, +} + + +@misc{ sourceforge, + author = {SourceFroge}, + key = {sourceforge}, + note = {\url{https://sourceforge.net/}} +} + +@misc{ ubuntu16repositories, + author = {Canonical Ltd.}, + title = {\href{https://help.ubuntu.com/community/Repositories/Ubuntu}{Ubuntu Repositories}}, + month = sep, + year = 2016 +} + +@misc{ windows16store, + author = {Microsoft Inc.}, + title = + {\href{https://www.microsoft.com/en-us/store/apps/windows}{Windows Apps + - Microsoft Store}}, + month = sep, + year = 2016 +} + +@misc{ www13cross, + title = {Cross-Origin Resource Sharing}, + editor = {Anne van Kesteren}, + year = 2013, + month = jan, + day = 29, + publisher = {{W3C}}, + key = {van Kesteren}, + howpublished = {\url{http://www.w3.org/TR/2013/CR-cors-20130129/}}, +} + + + + +% To fix POSITION + + +@misc{ frields08fedora, + title = {\href{https://www.redhat.com/archives/fedora-announce-list/2008-August/msg00012.html}{Infrastructure Report}}, + author = {{Frields, Paul W.}}, + month = aug, + year = {2008} +} + +@misc{ freebsd12incident, + title = {\href{https://www.freebsd.org/news/2012-compromise.html}{Security + Incident on FreeBSD Infrastructure}}, + author = {{The FreeBSD Project}}, + month =nov, + year={2012}, +} + +@misc{ quintin16canary, + title = + {\href{https://www.eff.org/deeplinks/2016/05/canary-watch-one-year-later}{Canary + Watch – One Year Later}}, + author = {{Quintin, Cooper}}, + month = may, + year = {2016}, +} + +@misc{ redhat08openssh, + title = {\href{https://rhn.redhat.com/errata/RHSA-2008-0855.html} {Critical: OpenSSH Security Update}}, + author = {Red Hat}, + month = aug, + year = {2008} +} + +@misc{ zetter13flame, + title = + {\href{https://www.wired.com/2013/03/flame-windows-update-copycat/} + {Flame {{Windows Update Attack Could Have Been Repeated}} in 3 + {{Days}}, {{Says Microsoft}}}}, + journaltitle = {WIRED}, + author = {Zetter, Kim}, + month = mar, + year = {2013} +} + +@article{ zetter19experts, + author = {Kim Zetter}, + title = {\href{https://motherboard.vice.com/en_us/article/vbwz94/experts-find-serious-problems-with-switzerlands-online-voting-system-before-public-penetration-test-even-begins}{Experts Find Serious Problems With Switzerland's Online Voting System Before Public Penetration Test Even Begins}}, + journal = {Motherboard}, + month = feb, + day = 21, + year = 2019, +} + +@misc{libreoffice, + title = {\href{https://www.libreoffice.org/about-us/who-are-we/} {LibreOffice}}, + author = {The Document Foundation}, + month = sep, + year = 2016 +} + +@misc{ gimp, + author = {The GIMP Team}, + title = {\href{http://www.gimp.org/}{GNU Image Manipulation Program}}, + month = sep, + year = 2016 +} + + +@misc{string16introducing, + title = {\href{http://string.technology/2016/09/14/threshold-relay-random-beacon.en/}{Intoducing Random Beascons Using Threshold Relay Chains}}, + author = {Timo Hanke and Dominic Williams}, + month= sep, + year= 2016 +} + + +@misc{scaling, + title = {\href{https://en.bitcoin.it/wiki/Scalability}{Scalability}}, + author = {{Bitcoin Wiki}}, + url = {https://en.bitcoin.it/wiki/Scalability}, + year = {2016}, +} + +@misc{uport, + title = "UPORT: A PLATFORM FOR SELF-SOVEREIGN IDENTITY", + author = "Dr. Christian Lundkvist and Rouven Heck and Joel Torstensson and Zac Mitton and Michael Sena", + url = {\href{https://whitepaper.uport.me/uPort_whitepaper_DRAFT20170221.pdf}}, + year = "2017", +} + +@misc{civic, + title = "Civic", + author = "Civic team", + url = {\href{https://tokensale.civic.com/CivicTokenSaleWhitePaper.pdf}}, + year = "2017", +} + +@misc{VISA, + title = {\href{https://usa.visa.com/dam/VCOM/download/corporate/media/visa-fact-sheet-Jun2015.pdf}{Visa Inc. at a Glance}}, + author = {{Visa}}, + year = {2017}, +} + + + +@misc{murmur, + title = {Murmur Hash}, + note = {\url{http://en.wikipedia.org/wiki/MurmurHash}} +} + +@misc{health16blockchain, + author = {{The Office of the National Coordinator for Health Information Technology}}, + title = {Use of Blockchain in Health IT and Health-related Research Challenge}, + year = {2016}, + month = {Sep}, +} + +@misc{PoE, + author = {{Wikipedia}}, + title = {\href{http://en.wikipedia.org/wiki/Proof_of_Existence}{Proof of Existence}}, + year = {2017}, + month = {April}, +} + + +@misc{securedrop, + title = {{SecureDrop}}, + key = {SecureDrop}, + note = {\url{https://pressfreedomfoundation.org/securedrop/}}, +} + +@misc{random-org, + author = {{Randomness and Integrity Services Ltd.}}, + title = {\url{random.org}}, + year = 1998, +}, + + +@misc{ debian16APT, + author = {Debian}, + title = {\href{https://wiki.debian.org/Apt}{Advanced Package Tool}}, + month = may, + year = 2016 +} + +@misc{ yum16YUM, + author = {YUM}, + title = {\href{http://yum.baseurl.org/}{Yellowdog Updater Modified}}, + month = may, + year = 2016 +} + +@misc{ homebrew16BREW, + author = {Max Howell}, + title = {\href{http://brew.sh/}{Homebrew -- The Missing Packet Manager for macOS}}, + month = may, + year = 2016 +} + +@misc{ easyinstall16python, + author = {Python Community}, + title = {\href{https://wiki.python.org/moin/EasyInstall}{EasyInstall Module}}, + month = may, + year = 2016, +} + + + + + + + + + +%%%%%% +% Vulnerabilites from the CVD + +@misc{ cve-2000-0357, + key = {cve-2000-0357}, + title = {{CVE-2000-0357}: {ORBit} and esound in + {Red Hat Linux} do not use sufficiently random numbers}, + year = 1999, + month = dec, +} + +@misc{ cve-2001-0950, + key = {cve-2001-0950}, + title = {{CVE-2001-0950}: {ValiCert Enterprise Validation Authority} + uses insufficiently random data}, + year = 2001, + month = jan, +} + +@misc{ cve-2001-1141, + key = {cve-2001-1141}, + title = {{CVE-2001-1141}: {PRNG} in {SSLeay} and {OpenSSL} + could be used by attackers to predict future pseudo-random numbers}, + year = 2001, + month = jul, +} + +@misc{ cve-2001-1467, + key = {cve-2001-1467}, + title = {{CVE-2001-1467}: mkpasswd, as used by {Red Hat Linux}, + seeds its random number generator with its process {ID}}, + year = 2001, + month = apr, +} + +@misc{ cve-2003-1376, + key = {cve-2003-1376}, + title = {{CVE-2003-1376}: {WinZip} uses weak random number generation + for password protected {ZIP files}}, + year = 2003, + month = dec, +} + +@misc{ cve-2005-3087, + key = {cve-2005-3087}, + title = {{CVE-2005-3087}: {SecureW2 TLS} implementation uses weak random + number generators during generation of the pre-master secret}, + year = 2005, + month = sep, +} + +@misc{ cve-2006-1378, + key = {cve-2006-1378}, + title = {{CVE-2006-1378}: {PasswordSafe} uses a weak random number generator}, + year = 2006, + month = mar, +} + +@misc{ cve-2006-1833, + key = {cve-2006-1833}, + title = {{CVE-2006-1833}: {Intel RNG Driver} in {NetBSD} may + always generate the same random number}, + year = 2006, + month = apr, +} + +@misc{ cve-2007-2453, + key = {cve-2007-2453}, + title = {{CVE-2007-2453}: Random number feature in {Linux} kernel + does not properly seed pools when there is no entropy}, + year = 2007, + month = jun, +} + +@misc{ cve-2008-0141, + key = {cve-2008-0141}, + title = {{CVE-2008-0141}: {WebPortal CMS} generates + predictable passwords containing only the time of day}, + year = 2008, + month = jan, +} + +@misc{ cve-2008-0166, + key = {cve-2008-0166}, + title = {{CVE-2008-0166}: {OpenSSL} on {Debian}-based operating + systems uses a random number generator + that generates predictable numbers}, + year = 2008, + month = jan, +} + +@misc{ cve-2008-2108, + key = {cve-2008-2108}, + title = {{CVE-2008-2108}: {GENERATE\_SEED} macro in PHP + produces 24 bits of entropy and simplifies brute force attacks against + the rand and mt\_rand functions}, + year = 2008, + month = may, +} + +@misc{ cve-2008-5162, + key = {cve-2008-5162}, + title = {{CVE-2008-5162}: The arc4random function in {FreeBSD} + does not have a proper entropy source + for a short time period immediately after boot}, + year = 2008, + month = nov, +} + +@misc{ cve-2009-0255, + key = {cve-2009-0255}, + title = {{CVE-2009-0255}: {TYPO3} creates the encryption key with an insufficiently random seed}, + year = 2009, + month = jan, +} + +@misc{ cve-2009-3238, + key = {cve-2009-3238}, + title = {{CVE-2009-3238}: {Linux} kernel produces insufficiently random numbers}, + year = 2009, + month = sep, +} + +@misc{ cve-2009-3278, + key = {cve-2009-3278}, + title = {{CVE-2009-3278}: {QNAP} uses rand library function to generate a certain recovery key}, + year = 2009, + month = sep, +} + +@misc{ cve-2011-3599, + key = {cve-2011-3599}, + title = {{CVE-2011-3599}: {Crypt::DSA} for Perl, when /dev/random is absent, + uses the {Data::Random} module}, + year = 2011, + month = oct, + +} + +%%%%% FIPS +@misc{ dsa, + author = {{Federal Information Processing Standards Publication}}, + title = {Digital Signature Standard ({DSS})}, + year = {2013}, + month = {July}, + note = {FIPS 186-4}, +} diff --git a/pdf/soc.bib b/pdf/soc.bib new file mode 100644 index 0000000..3700889 --- /dev/null +++ b/pdf/soc.bib @@ -0,0 +1,3562 @@ + +%A + +@article{ abdul-rahman97pgp, + author = {Alfarez Abdul-Rahman}, + title = {\href{https://ldlus.org/college/WOT/The_PGP_Trust_Model.pdf}{The PGP Trust Model}}, + journal = {Journal of Electronic Commerce}, + volume = 10, + number = 3, + pages = {27-31}, + month = apr, + year = 1997, +} + +@misc{ abhishek17digital, + author = {Kumar Abhishek and Diwakar Mandal}, + title = {\href{https://gomedici.com/diving-deep-into-id-verification-market-comprehensive-evaluation-of-competitive-landscape/}{Digital ID Verification: Competitive Analysis of Key Players}}, + howpublished = {MEDICI}, + month = oct, + year = 2017, +} + +@incollection{ abramowitz12grand, + author = {Alan I. Abramowitz}, + title = {\href{https://faculty.washington.edu/jwilker/353/AbramowitzTea.pdf}{Grand Old Tea Party: Partisan Polarization and the Rise of the Tea Party Movement}}, + booktitle = {Steep: The Precipitous Rise of the Tea Party}, + year = 2012, + isbn = {9780520274235}, +} + +@article{ acemoglu18power, + author = {Daron Acemoglu and Tarek A. Hassan and Ahmed Tahoun}, + title = {\href{https://academic.oup.com/rfs/article/31/1/1/4060544}{The Power of the Street: Evidence from Egypt’s Arab Spring}}, + journal = {The Review of Financial Studies}, + volume = 31, + number = 1, + month = jan, + year = 2018, + pages = {1-42}, +} + +@article{ agarwal18on-chain, + author = {Arpit Agarwal}, + title = {\href{https://medium.com/coinmonks/on-chain-liquid-democracy-c08ed8c07f6e}{On-chain Liquid Democracy}}, + journal = {Medium}, + month = nov, + year = 2018, +} + +@article{ agrawal12corporate, + author = {Ashwini K. Agrawal}, + title = {\href{https://www.jstor.org/stable/41302016}{Corporate Governance Objectives of Labor Union Shareholders: Evidence from Proxy Voting}}, + journal = {The Review of Financial Studies}, + volume = 25, + number = 1, + month = jan, + year = 2012, + pages = {187-226}, +} + +@inproceedings{ ahn03captcha, + author = {Luis von Ahn and Manuel Blum and Nicholas J. Hopper + and John Langford}, + title = {{CAPTCHA:} Using Hard {AI} Problems for Security}, + booktitle = {Eurocrypt}, + year = 2003, +} + +@article{ aker10mobile, + author = {Jenny C. Aker and Isaac M. Mbiti}, + title = {\href{https://www.aeaweb.org/articles?id=10.1257/jep.24.3.207}{Mobile Phones and Economic Development in Africa}}, + journal = {Journal of Economic Perspectives}, + volume = 24, + number = 3, + month = sep, + year = 2010, + pages = {207-232}, +} + +@article{ akst95, + author = {Daniel Akst}, + title = {The Cutting Edge: + The {Helsinki} Incident and the Right to Anonymity}, + journal = {L.A. Times}, + month = feb, + day = 22, + year = 1995, + pages = {D1}, +} + +@article{ alam15digital, + author = {Khorshed Alam and Sophia Imran}, + title = {\href{https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2014-0083/full/html}{The digital divide and social inclusion among refugee migrants: A case in regional Australia}}, + journal = {Information Technology \& People}, + month = jun, + year = 2015, +} + +@article{ alger06voting, + author = {Dan Alger}, + title = {\href{https://link.springer.com/content/pdf/10.1007/s11127-006-3059-1.pdf}{Voting by Proxy}}, + journal = {Public Choice}, + volume = 126, + number = {1/2}, + month = jan, + year = 2006, + pages = {1-26}, +} + +@article{ allcott17social, + author = {Hunt Allcott and Matthew Gentzkow}, + title = {\href{https://pubs.aeaweb.org/doi/pdfplus/10.1257/jep.31.2.211}{Social Media and Fake News in the 2016 Election}}, + volume = 31, + number = 2, + year = 2017, + pages = {211–236}, +} + +@article{ allen05roots, + author = {Neal Allen and Brian J. Brox}, + title = {\href{http://www.tulane.edu/~bbrox/Allen%26Brox.pdf}{The Roots of Third Party Voting}}, + journal = {Party Politics}, + volume = 11, + number = 5, + pages = {623-637}, +} + +@article{ alvarez09internet, + author = {R. Michael Alvarez and Thad E. Hall and + Alexander H. Trechsel}, + title = {Internet Voting in Comparative Perspective: + The Case of {E}stonia}, + journal = {Political Science \& Politics}, + volume = 42, + number = 3, + month = jun, + year = 2009, + pages = {497-505}, +} + +% superseded by ananny18presence +@misc{ ananny18silence, + author = {Mike Ananny}, + title = {What to do with silence? Exploring the political significances of sociotechnical absences}, + month = jun, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ ananny18presence, + author = {Mike Ananny}, + title = {Presence of Absence:Exploring the democratic significance of silence}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@article{ armingeon14social, + author = {Klaus Armingeon and Lisa Sch\"{a}del}, + title = {\href{https://www.tandfonline.com/doi/abs/10.1080/01402382.2014.929341}{Social Inequality in Political Participation: The Dark Sides of Individualisation}}, + journal = {West European Politics}, + volume = 38, + number = 3, + month = jan, + year = 2015, +} + +@article{ asongu13how, + author = {Asongu, Simplice A.}, + title = {\href{https://www.tandfonline.com/doi/abs/10.1080/15228916.2013.765309}{How has Mobile Phone Penetration Stimulated Financial Development in Africa?}}, + journal = {Journal of African Business}, + volume = 14, + number = 1, + month = apr, + year = 2013, + pages = {7-18}, +} + +@techreport{ asongu13impact, + author = {Asongu, Simplice A.}, + title = {\href{https://www.econstor.eu/handle/10419/123599}{The impact of mobile phone penetration on African inequality}}, + institution = {African Governance and Development Institute (AGDI)}, + number = {AGDI Working Paper, No. WP/13/021}, + year = 2013, +} + +@article{ arthur95, + author = {Charles Arthur}, + title = {Identity Crisis on the Internet}, + journal = {New Scientist}, + month = mar, + day = 11, + year = 1995, +} + +@article{atzori2015blockchain, + title={Blockchain technology and decentralized governance: Is the state still necessary?}, + author={Atzori, Marcella}, + year={2015} +} + +@inproceedings{ aziz15computational, + author = {Haris Aziz and Serge Gaspers and Joachim Gudmundsson and + Simon Mackenzie and Nicholas Mattei and Toby Walsh}, + title = {\href{https://dl.acm.org/citation.cfm?id=2772896}{Computational Aspects of Multi-Winner Approval Voting}}, + booktitle = {International Conference on Autonomous Agents and Multiagent Systems (AAMAS)}, + month = may, + year = 2015, + location = {Istanbul, Turkey}, + pages = {107-115}, +} + + +%B + +@misc{ back02hashcash, + author = {Adam Back}, + title = {\href{http://www.hashcash.org/papers/hashcash.pdf}{Hashcash -- A Denial of Service Counter-Measure}}, + month = aug, + year = 2002, +} + note = {\url{http://www.cypherspace.org/adam/hashcash/}}, + +@inproceedings{ backstrom07wherefore, + author = {Lars Backstrom and Cynthia Dwork and Jon Kleinberg}, + title = {Wherefore Art Thou {R3579X}? + Anonymized Social Networks, Hidden Patterns, + and Structural Steganography}, + booktitle = {\bibconf[16th]{WWW}{World Wide Web Conference}}, + month = may, + year = 2007, + location = {Banff, Alberta, Canada}, +} + +@book{ balinski11majority, + author = {Michel Balinski and Rida Laraki}, + title = {Majority Judgment: Measuring, Ranking, and Electing}, + publisher = {The MIT Press}, + month = jan, + year = 2011, +} + +@article{ balkin04digital, + author = {Jack M. Balkin}, + title = {Digital Speech and Democratic Culture: + A Theory of Freedom of Expression for the Information Society}, + journal = {Faculty Scholarship Series}, + year = 2004, + note = {Paper 240}, +} + +@misc{ ball14case, + author = {Laurence M. Ball}, + title = {\href{https://www.imf.org/en/Publications/WP/Issues/2016/12/31/The-Case-for-a-Long-Run-Inflation-Target-of-Four-Percent-41625}{The Case for a Long-Run Inflation Target of Four Percent}}, + howpublished = {International Monetary Fund}, + note = {Working Paper No. 14/92}, + month = jun, + day = 9, + year = 2014, + isbn = {9781498395601/1018-5941}, +} + +@article{ ball18donald, + author = {Molly Ball}, + title = {\href{http://time.com/5422644/trump-white-women-2016/}{Donald Trump Didn't Really Win 52\% of White Women in 2016}}, + journal = {TIME}, + month = oct, + day = 18, + year = 2018, +} + +@article{ barbera15tweeting, + author = {Pablo Barber\'{a} and John T. Jost and Jonathan Nagler and + Joshua A. Tucker and Richard Bonneau}, + title = {\href{https://journals.sagepub.com/doi/10.1177/0956797615594620}{Tweeting From Left to Right: Is Online Political Communication More Than an Echo Chamber?}}, + journal = {Psychological Science}, + volume = 26, + number = 10, + month = oct, + year = 2015, + pages = {1531-1542}, +} + +@misc{ bbc16switzerland, + author = {{BBC News}}, + title = {\href{https://www.bbc.com/news/world-europe-36454060}{Switzerland's voters reject basic income plan}}, + month = jun, + day = 5, + year = 2016, +} + +@article{ becker12liquid, + author = {Sven Becker}, + title = {\href{http://www.spiegel.de/international/germany/liquid-democracy-web-platform-makes-professor-most-powerful-pirate-a-818683.html}{Liquid Democracy: Web Platform Makes Professor Most Powerful Pirate}}, + journal = {Spiegel Online}, + month = mar, + day = 2, + year = 2012, +} + +@article{ behrens14evolution, + author = {Jan Behrens}, + title = {\href{https://liquid-democracy-journal.org/issue/1/The_Liquid_Democracy_Journal-Issue001-04-The_evolution_of_proportional_representation_in_LiquidFeedback.html}{The evolution of proportional representation in {LiquidFeedback}}}, + journal = {Liquid Democracy Journal}, + month = mar, + year = 2014, + volume = 1, +} + +@misc{ benes12chicago, + author = {Jaromir Benes and Michael Kumhof}, + title = {\href{https://www.imf.org/external/pubs/ft/wp/2012/wp12202.pdf}{The Chicago Plan Revisited}}, + month = aug, + year = 2012, + url = {https://www.imf.org/external/pubs/ft/wp/2012/wp12202.pdf}, + note = {IMF Working Paper}, +} + +@book{ benkler07wealth, + author = {Yochai Benkler}, + title = {The Wealth of Networks: How Social Production Transforms Markets and Freedom}, + publisher = {Yale University Press}, + month = oct, + year = 2007, + isbn = {978-0300125771}, +} + +@incollection{ benkler15peer, + author = {Yochai Benkler and Aaron Shaw and Benjamin Mako Hill}, + title = {\href{https://mako.cc/academic/benkler_shaw_hill-peer_production_ci.pdf}{Peer Production: A Form of Collective Intelligence}}, + booktitle = {\href{https://mitpress.mit.edu/books/handbook-collective-intelligence}{Handbook of Collective Intelligence}}, + month = oct, + year = 2015, + isbn = {9780262029810}, +} + +@misc{ berger18bot, + author = {Andreas Berger}, + title = {\href{https://singularityhub.com/2018/07/07/bot-vs-bot-will-the-internet-soon-be-a-place-without-humans/#sm.0001ny1wyu1iuco7q081h41v7wnyr}{Bot vs. Bot: Will the Internet Soon Be a Place Without Humans?}}, + howpublished = {Singularity Hub}, + month = jul, + year = 2018, +} + +@misc{ bernholz18emerging, + author = {Lucy Bernholz}, + title = {The Emerging Apparatus for Digitized Data}, + month = jun, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ bernholz18toward, + author = {Lucy Bernholz}, + title = {Toward a new nonprofit: Civil society institutions in the digital age}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@article{ bessi16social, + author = {Alessandro Bessi and Emilio Ferrara}, + title = {\href{https://firstmonday.org/ojs/index.php/fm/article/view/7090/5653}{Social bots distort the 2016 U.S. Presidential election online discussion}}, + journal = {First Monday}, + volume = 21, + number = 11, + month = nov, + year = 2016, +} + +@article{ bhatia17indias, + author = {Amiya Bhatia and Jacqueline Bhabha}, + title = {\href{https://www.tandfonline.com/doi/full/10.1080/13600818.2016.1263726}{India’s Aadhaar scheme and the promise of inclusive social protection}}, + journal = {Oxford Development Studies}, + volume = 45, + number = 1, + month = jan, + year = 2017, + pages = {64-79}, +} + +@article{ bidadanure19political, + author = {Juliana Uhuru Bidadanure}, + title = {\href{https://www.annualreviews.org/doi/10.1146/annurev-polisci-050317-070954}{The Political Theory of Universal Basic Income}}, + journal = {Annual Review of Political Science}, + volume = 22, + month = may, + year = 2019, +} + +@article{ bieber02meeting, + author = {Meredith A. Bieber}, + title = {Meeting the Statute or Beating It: + Using {John Doe} Indictments Based on {DNA} + to Meet the Statute of Limitations}, + journal = {University of Pennsylvania Law Review}, + year = 2002, + volume = 150, + number = 3, + pages = {1079-1098}, +} + +@article{ blais90proportional, + author = {Andr\'e Blais and R.K. Carty}, + title = {\href{https://doi.org/10.1111/j.1475-6765.1990.tb00227.x}{Does proportional representation foster voter turnout?}}, + journal = {European Journal of Political Research}, + month = mar, + year = 1990, + volume= 18, + number = 2, +} + +@misc{ blakely07, + author = {Rhys Blakely}, + title = {Spam menace spreads to mobile phones}, + month = oct, + day = 5, + year = 2007, + url = {http://business.timesonline.co.uk/tol/business/industry_sectors/telecoms/article2591888.ece}, +} + +@article{ blinder19new, + author = {Alan Blinder}, + title = {\href{https://www.nytimes.com/2019/02/21/us/mark-harris-nc-voter-fraud.html}{New Election Ordered in North Carolina Race at Center of Fraud Inquiry}}, + journal = {The New York Times}, + month = feb, + day = 21, + year = 2019, +} + +@article{ blum16liquid, + author = {Christian Blum and Christina Isabel Zuber}, + title = {Liquid Democracy: Potentials, Problems, and Perspectives}, + journal = {The Journal of Political Philosophy}, + volume = 24, + number = 2, + month = jun, + year = 2016, + pages = {162-182}, +} + +@article{ blumler01new, + author = {Jay G. Blumler and Michael Gurevitch}, + title = {\href{https://www.tandfonline.com/doi/abs/10.1080/713768514}{The New Media and Our Political Communication Discontents: Democratizing Cyberspace}}, + volume = 4, + number = 1, + pages = {1-13}, + year = 2001, +}, + +@article{ boldi11viscous, + author = {Paolo Boldi and Francesco Bonchi and Carlos Castillo + and Sebastiano Vigna}, + title = {Viscous Democracy for Social Networks}, + journal = {Communications of the ACM}, + volume = 54, + number = 6, + month = jun, + year = 2011, +} + +@incollection{ brams14satisfaction, + author = {Steven J. Brams and D. Marc Kilgour}, + title = {\href{https://doi.org/10.1007/978-3-319-05158-1_18}{Satisfaction Approval Voting}}, + booktitle = {Voting Power and Procedures}, + publisher = {Springer, Cham}, + month = apr, + year = 2014, + pages = {323-346}, +} + +@article{ branscomb95, + author = {Anne Wells Branscomb}, + title = {Anonymity, Autonomy, and Accountability: + Challenges to the First Amendment in Cyberspaces}, + journal = {Yale Law Journal}, + volume = 104, + number = 7, + month = may, + year = 1995, + pages = {1639-1679}, +} + +@article{ braverman16more, + author = {Beth Braverman}, + title = {\href{http://www.businessinsider.com/more-than-a-million-americans-will-leave-us-for-medical-care-this-year-2016-8}{More than one million Americans will leave the US for medical care this year}}, + journal = {Business Insider}, + month = aug, + year = 2016, +} + +@misc{ brennan08keysigning, + author = {V. Alex Brennen}, + title = {\url{https://web.archive.org/web/20080518042553/http://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html}{The Keysigning Party HOWTO}}, + month = jan, + year = 2008, +} + +@book{ brewster03unaccountable, + author = {Mike Brewster}, + title = {Unaccountable: How the Accounting Profession Forfeited a Public Trust}, + publisher = {Wiley}, + month = mar, + year = 2003, + isbn = {978-0471423621}, +} + +@book{ brin05kiln, + author = {David Brin}, + title = {Kiln People}, + publisher = {Tor Books}, + month = oct, + year = 2005, + isbn = {0765342618}, +} + +@article{ broniatowski18weaponized, + author = {David A. Broniatowski and Amelia M. Jamison and SiHua Qi and Lulwah AlKulaib and Tao Chen and Adrian Benton and Sandra C. Quinnand Mark Dredze}, + title = {\href{https://ajph.aphapublications.org/doi/10.2105/AJPH.2018.304567}{Weaponized Health Communication: Twitter Bots and Russian Trolls Amplify the Vaccine Debate}}, + journal = {American Journal of Public Health}, + month = sep, + year = 2018, +} + +@article{ browning18suffocation, + author = {Christopher R. Browning}, + title = {\href{https://www.nybooks.com/articles/2018/10/25/suffocation-of-democracy/}{The Suffocation of Democracy}}, + journal = {New York Review of Books}, + month = oct, + day = 25, + year = 2018, +} + +@article{ brugger02ban, + title = {Ban on or Protection of Hate Speech-Some Observations Based on {German} and {American} Law}, + author = {Brugger, Winfried}, + journal = {Tul. Eur. \& Civ. LF}, + volume = {17}, + pages = {1--21}, + year = {2002}, + publisher = {HeinOnline}, +} + +@article{ bu13sock, + author = {Zhan Bu and Zhengyou Xia and Jiandong Wang}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S0950705112002365}{A sock puppet detection algorithm on virtual spaces}}, + journal = {Knowledge-Based Systems}, + volume = 37, + month = jan, + year = 2013, + pages = {366-377}, +} + +@article{ budak16fair, + author = {Ceren Budak and Sharad Goel and Justin M. Rao}, + journal = {\href{https://academic.oup.com/poq/article/80/S1/250/2223443}{Fair and Balanced? Quantifying Media Bias through Crowdsourced Content Analysis}}, + volume = 80, + number = {S1}, + month = jan, + year = 2016, + pages = {250–271}, +} + +@article{ bugnion04international, + author = {Bugnion, Francois}, + title = {The International Committee of the Red Cross + and the Development of International Humanitarian Law}, + journal = {Chicago Journal of International Law}, + volume = 5, + number = 1, + year = 2004, +} + +%C + +@misc{ cage18philanthropy, + author = {Julia Cag\'{e}}, + title = {From Philanthropy to Democracy: Rethinking Governance and Funding of High-Quality News in the Digital Age}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@book{ cahn92time, + author = {Edgar S. Cahn}, + title = {{Time Dollars}: The New Currency That Enables {Americans} to + Turn Their Hidden Resource-Time-Into Personal Security and + Community Renewal}, + publisher = {Rodale}, + month = jan, + day = 1, + year = 1992, + isbn = {978-0878579853}, +} + +@misc{ caplan18artisan, + author = {Robyn Caplan}, + title = {The Artisan and the Decision Factory: How Organizational Dynamics Impact Speech Regulation at a Global Scale}, + month = jun, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ caplan18content, + author = {Robyn Caplan}, + title = {Content Standards and the (Private) Governance of Speech}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@article{ carey18human, + author = {Bridget Carey}, + title = {\href{https://www.cnet.com/news/google-duplex-assistant-bot-deception-scary-ethics-question/}{Human or bot? Google Duplex scares me}}, + journal = {\href{https://www.cnet.com/}{CNet}}, + month = may, + day = 11, + year = 2018, +} + +@article{ carter02proportional, + author = {Elisabeth L. Carter}, + title = {\href{https://www.tandfonline.com/doi/pdf/10.1080/713601617?casa_token=e0_e5lqLeaMAAAAA:V0r3xNNzbANLyePg2K3eKxId3wpmoM9sooodrypkZ-Qv_IJq2khL82Y-pYG2qQgoKZUfipUC5azZ1P8}{Proportional Representation and the Fortunes of Right-Wing Extremist Parties}}, + journal = {West European Politics}, + year = 2002, + month = jun, + volume = 25, + number = 3, + pages = {125-146}, +} + +@inproceedings{ casado07peering, + author = {Martin Casado and Michael J. Freedman}, + title = {Peering Through the Shroud: + The Effect of Edge Opacity on {IP}-Based Client Identification}, + booktitle = {4th NSDI}, + address = {Cambridge, MA}, + month = apr, + year = 2007, +} + +@article{ champ08stamp, + author = {Bruce Champ}, + title = {\href{https://www.clevelandfed.org/newsroom-and-events/publications/economic-commentary/economic-commentary-archives/2008-economic-commentaries/ec-20080401-stamp-scrip-money-people-paid-to-use.aspx}{Stamp Scrip: Money People Paid to Use}}, + day = 4, + month = jan, + year = 2008, + url = {https://www.clevelandfed.org/newsroom-and-events/publications/economic-commentary/economic-commentary-archives/2008-economic-commentaries/ec-20080401-stamp-scrip-money-people-paid-to-use.aspx}, +} + +@article{ chaudhuri17aadhaar, + author = {Bidisha Chaudhuri and Lion K\"{o}nig}, + title = {\href{https://www.tandfonline.com/doi/full/10.1080/09584935.2017.1369934}{The Aadhaar scheme: a cornerstone of a new citizenship regime in India?}}, + journal = {Contemporary South Asia}, + volume = 26, + number = 2, + month = sep, + year = 2017, + pages = {127-142}, +} + +@inproceedings{ chellapilla05computers, + author = "Kumar Chellapilla and Kevin Larson and Patrice Simard + and Mary Czerwinski", + title = "Computers Beat Humans at Single Character Recognition in + Reading based Human Interaction Proofs {(HIPs)}", + booktitle = "2nd Conference on E-mail and Anti-Spam", + month = jul, + year = 2005, + url = "http://www.ceas.cc/papers-2005/160.pdf", +} + +@article{ cho15how, + author = {Youngho Cho}, + title = {\href{https://journals.sagepub.com/doi/10.1111/1467-9248.12088}{How Well are Global Citizenries Informed about Democracy? Ascertaining the Breadth and Distribution of Their Democratic Enlightenment and Its Sources}}, + journal = {Political Studies}, + volume = 63, + number = 1, + month = mar, + year = 2015, + pages = {240-258}, +} + +@article{ chong03, + author = "Curtis Chong", + title = "Graphical Verification: Another Accessibility Challenge", + journal = "The Braille Monitor", + month = nov, + year = 2003, + url = "http://www.nfb.org/Images/nfb/Publications/bm/bm03/bm0311/bm031104.htm", +} + +@article{ citrin09proposition, + author = {Jack Citrin}, + title = {\href{https://cloudfront.escholarship.org/dist/prd/content/qt7mt1q84g/qt7mt1q84g.pdf}{Proposition 13 and the Transformation of California Government}}, + journal = {The California Journal of Politics \& Policy}, + volume = 1, + number = 1, + month = apr, + year = 2009, +} + +@misc{ clinton10freedom, + author = "Clinton, Hillary Rodham", + title = "Remarks on Internet Freedom", + howpublished = {\url{http://www.state.gov/secretary/rm/2010/01/135519.htm}}, + month = jan, + year = 2010, + note = {Accessed on 30/01/2013}, +} + +@article{ cohen96, + author = {Julie E. Cohen}, + title = {A Right to Read Anonymously: + A Closer Look at “Copyright Management” in Cyberspace}, + journal = {Connecticut Law Review}, + volume = 28, + pages = {981–1039}, + year = 1996, +} + +@misc{ cohen18democracy, + author = {Joshua Cohen and Archon Fung}, + title = {Democracy, Design, and the Digital Public Sphere}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@article{ collins02studies, + author = {H.M. Collins and Robert Evans}, + title = {\href{https://journals.sagepub.com/doi/10.1177/0306312702032002003}{The Third Wave of Science Studies: Studies of Expertise and Experience}}, + volume = 32, + number = 2, + month = apr, + year = 2002, + pages = {235-296}, +} + +@misc{ comninos11twitter, + author = {Alex Comninos}, + title = {\href{https://www.apc.org/sites/default/files/AlexComninos_MobileInternet.pdf}{Twitter revolutions and cyber crackdowns: User-generated content and social networking in the Arab spring and beyond}}, + publisher = {Association for Progressive Communications}, + month = jun, + year = 2011, +} + +@techreport{ conyon08ranking, + author = {M. J. Conyon and M. R. Muldoon}, + title = {Ranking the Importance of Boards of Directors}, + month = jan, + year = 2008, + institution = {Manchester Institute for Mathematical Sciences}, + number = {2006.65}, +} + +@inproceedings{ corrigangibbs13welcome, + author = {Henry Corrigan-Gibbs and Bryan Ford}, + title = {Welcome to the World of Human Rights: Please Make Yourself Uncomfortable}, + booktitle = {\bibconf{CREDS}{Cyber-security Research Ethics Dialog and Strategy Workshop}}, + month = may, + year = 2013, +} + +@book{ cost15republic, + author = {Jay Cost}, + title = {A Republic No More: Big Government and the Rise of American Political Corruption}, + publisher = {Encounter Books}, + month = feb, + year = 2015, + isbn = {978-1594037276}, +} + +@article{ cranor98spam, + author = {Lorrie Faith Cranor and Brian A. LaMacchia}, + title = {\href{https://dl.acm.org/citation.cfm?id=280336}{Spam!}}, + journal = {Communications of the ACM}, + volume = 41, + number = 8, + month = aug, + year = 1998, +} + +@misc{ creditsuisse17global, + author = {{Credit Suisse Research Institute}}, + title = {\href{https://www.credit-suisse.com/corporate/en/research/research-institute/global-wealth-report.html}{Global Wealth Report 2017}}, + month = nov, + year = 2017, +} + +@article{ crichton18liquid, + author = {Danny Crichton}, + title = {\href{https://techcrunch.com/2018/02/24/liquid-democracy-uses-blockchain/}{Liquid democracy uses blockchain to fix politics, and now you can vote for it}}, + journal = {TechCrunch}, + month = feb, + day = 24, + year = 2018, +} + +@article{ curtice08exit, + author = {John Curtice and David Firth}, + title = {\href{https://www.jstor.org/stable/30135085}{Exit polling in a cold climate: the {BBC–ITV} experience in Britain in 2005}}, + journal = {Journal of the Royal Statistical Society}, + year = 2008, + volume = 171, + number = 3, + pages = {509-539}, +} + +%D + +@book{ dahl61who, + author = {Robert A. Dahl}, + title = {\href{https://yalebooks.yale.edu/book/9780300103922/who-governs}{Who Governs? Democracy and Power in an American City}}, + publisher = {Yale University Press}, + year = 1961, + isbn = {978-0585354538}, +} + +@book{ dahl89democracy, + author = {Robert A. Dahl}, + title = {\href{https://yalebooks.yale.edu/book/9780300049381/democracy-and-its-critics}{Democracy and Its Critics}}, + publisher = {Yale University Press}, + year = 1989, + isbn = {978-0300044096}, +} + +@inproceedings{ datta16algorithmic, + author = {Anupam Datta and Shayak Sen and Yair Zick}, + title = {\href{https://ieeexplore.ieee.org/abstract/document/7546525}{Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems}}, + booktitle = {IEEE Symposium on Security and Privacy}, + month = may, + year = 2016, +} + +@article{ davenport02, + author = {David Davenport}, + title = {Anonymity on the {Internet}: why the price may be too high}, + journal = {Communications of the ACM}, + volume = 45, + number = 4, + pages = {33-35}, + month = apr, + year = 2002, +} + +@inproceedings{dantu05voipspam, + author = {Ram Dantu and Prakash Kolan}, + title = {Detecting spam in {VoIP} networks}, + booktitle = {Proc. SRUTI}, + year = {2005}, + location = {Cambridge, MA}, +} + +@article{ davis07business, + author = {Gerald F. Davis and E. Han Kim}, + title = {\href{https://econpapers.repec.org/article/eeejfinec/v_3a85_3ay_3a2007_3ai_3a2_3ap_3a552-570.htm}{Business ties and proxy voting by mutual funds}}, + journal = {Journal of Financial Economics}, + volume = 85, + number = 2, + year = 2007, + pages = {552-570}, +} + +@misc{ dcc, + author = {{Distributed Checksum Clearinghouse}}, + note = {\url{http://www.dcc-servers.net/dcc/graphs/}}, + url = {http://www.dcc-servers.net/dcc/graphs/}, +} + +@article{ defila94wir, + author = {Heidi Defila}, + title = {\href{https://web.archive.org/web/20061017101214/http://www.reinventingmoney.com/wirbusiness.php}{60 Years WIR Business Circle Cooperative -- Origins and Ideology}}, + journal = {WIR Magazin}, + month = sep, + year = 1994, + url = {https://web.archive.org/web/20061017101214/http://www.reinventingmoney.com/wirbusiness.php}, + note = {Translation, by Frederika Almstedt with assistance from Thomas Greco}, +} + +@book{ deibert08access, + author = {Ronald Deibert and John Palfrey and Rafal Rohozinski + and Jonathan Zittrain}, + title = {Access Denied: The Practice and Policy of + Global {Internet} Filtering}, + month = jan, + year = 2008, + publisher = {MIT Press}, + isbn = {0262541963}, +} + +@article{ devereaux14data, + author = {Ryan Devereaux and Glenn Greenwald and Laura Poitras}, + title = {\href{https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/}{Data Pirates of the {Caribbean}: The {NSA} Is Recording Every Cell Phone Call in the {Bahamas}}}, + journal = {The Intercept}, + year = 2014, + month = may # {~20,}, +} + +@article{ diakopoulos16algorithmic, + author = {Nicholas Diakopoulos and Michael Koliska}, + title = {\href{https://www.tandfonline.com/doi/abs/10.1080/21670811.2016.1208053?journalCode=rdij20}{Algorithmic Transparency in the News Media}}, + journal = {Digital Journalism}, + volume = 5, + number = 7, + month = jul, + year = 2016, +} + +@misc{ digiconomist19bitcoin, + author = {Digiconomist}, + title = {\href{https://digiconomist.net/bitcoin-energy-consumption}{Bitcoin Energy Consumption Index}}, + year = 2019, +} + +@article{ dijk06digital, + author = {{Jan A.G.M.} {van Dijk}}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S0304422X06000167}{Digital divide research, achievements and shortcomings}}, + journal = {Poetics}, + volume = 34, + number = {4--5}, + month = aug, + year = 2006, + pages = {221-235}, +} + +@article{ dixon17failure, + author = {Pam Dixon}, + title = {\href{https://link.springer.com/article/10.1007/s12553-017-0202-6}{A Failure to ``Do No Harm'' -- India's Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S.}}, + journal = {Health and Technology}, + volume = 7, + number = 4, + month = dec, + year = 2017, + pages = {539-567}, +} + +@article{ doctorow04solving, + author = "Cory Doctorow", + title = "Solving and creating {CAPTCHAs} with free porn", + journal = "Boing Boing", + month = jan, + year = 2004, + url = "http://www.boingboing.net/2004/01/27/solving_and_creating.html", +} + +@book{ dodgson84principles, + author = {Charles L. Dodgson}, + title = {The Principles of Parliamentary Representation}, + publisher = {Harrison and Sons}, + year = {1884}, +} + +@article{ donaghue10human, + title = {Human Rights, Development INGOs and Priorities for Action}, + author = {Donaghue, K.}, + journal = {Ethical questions and international NGOs}, + pages = {39--63}, + year = {2010}, + publisher = {Springer}, +} + +@article{ donnelly18finland, + author = {Grace Donnelly}, + title = {\href{http://fortune.com/2018/04/19/finland-universal-basic-income-experiment-ending/}{Finland's Basic Income Experiment Will End in 2019}}, + journal = {Fortune}, + month = apr, + day = 19, + year = 2018, +} + +@article{ doughty05know, + author = {Caroline Doughty}, + title = {\href{https://journals.sagepub.com/doi/10.1177/0266382105060603}{Know your customer: Automation is key to comply with legislation}}, + journal = {Business Information Review}, + volume = 22, + number = 4, + month = dec, + year = 2005, + pages = {248-252}, +} + +@misc{ douglas39program, + title = {\href{https://web.archive.org/web/20121103110209/http://home.comcast.net/~zthustra/pdf/a_program_for_monetary_reform.pdf}{A Program for Monetary Reform}}, + author = {Paul H. Douglas and Irving Fisher and Frank D. Graham and + Earl J. Hamilton and Willford I. King and + Charles R. Whittlesey}, + year = 1939, +} + +@article{ doward18big, + author = {Jamie Doward}, + title = {\href{https://www.theguardian.com/technology/2018/jan/28/tech-backlash-facebook-google-fake-news-business-monopoly-regulation}{The big tech backlash: Tech giants are drawing political fire over fake news and Russian meddling}}, + journal = {The Guardian}, + month = jan, + year = 2018, +} + +@book{ dowlen08political, + author = {Oliver Dowlen}, + title = {The Political Potential of Sortition: A Study of the Random Selection of Citizens for Public Office}, + publisher = {Imprint Academic}, + month = aug, + year = 2008, + pages = 264, + isbn = {978-1845401375}, +} + +@misc{ dropbox17retention, + title = + {\href{https://www.theregister.co.uk/2017/01/24/dropbox_brings_old_files_back_from_dead/}{Dropbox: + Oops, yeah, we didn't actually delete all your files - this bug + kept them in the cloud}}, + author = {Shaun Nichols}, + month = jan, + year = {2017 (accessed on Jan 10, 2019)}, +} + +@article{ dubois18echo, + author = {Elizabeth Dubois and Grant Blank}, + title = {\href{https://www.tandfonline.com/doi/full/10.1080/1369118X.2018.1428656}{The echo chamber is overstated: the moderating effect of political interest and diverse media}}, + volume = 21, + number = 5, + month = jan, + year = 2018, + pages = {729-745}, +} + +@article{ duhigg12how, + author = {Charles Duhigg}, + title = {How Companies Learn Your Secrets}, + journal = {The New York Times}, + month = feb, + day = 16, + year = 2012, + note = {\url{http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html}}, +} + +@inproceedings{ durst04landsgemeinde, + author = {Hansj\"{o}rg D\"{u}rst}, + title = {\href{https://cladista.clad.org/bitstream/handle/123456789/2992/0049818.pdf}{The ``landsgemeinde'': the cantonal assembly of Glarus (Switzerland), history, present and future}}, + booktitle = {IX Congreso Internacional del CLAD sobre la Reforma del Estado y de la Administraci\'{o}n P\'{u}blica}, + month = nov, + year = 2004, + location = {Madrid, Spain}, +} + +%E + +@article{ eberl15one, + author = {Jakob-Moritz Eberl and Hajo G. Boomgaarden and Markus Wagner}, + title = {\href{https://journals.sagepub.com/doi/10.1177/0093650215614364}{One Bias Fits All? Three Types of Media Bias and Their Effects on Party Preferences}}, + journal = {Communication Research}, + volume = 44, + number = 8, + month = nov, + year = 2015, + pages = {1125-1148}, +} + +@article{ edens12hired, + author = {Edens, John F. and Smith, Shannon Toney and Magyar, Melissa S. + and Mullen, Kacy and Pitta, Amy and Petrila, John}, + title = {\href{https://psycnet.apa.org/fulltext/2012-10753-001.pdf}{``Hired Guns,'' ``Charlatans,'' and Their ``Voodoo Psychobabble'': Case Law References to Various Forms of Perceived Bias Among Mental Health Expert Witnesses}}, + journal = {Psychological Services}, + volume = 9, + number = 3, + month = aug, + year = 2012, + pages = {259-271}, +} + +@misc{embury18british, + title = {\href{https://www.independent.co.uk/travel/british-airways-website-theft-customer-data-stolen-flights-credit-card-a8526376.html}{British Airways website theft: Customers urged to contact banks as airline launches investigation over stolen data}}, + author = {Tom Embury-Dennis and Simon Calder}, + month = sep, + year = {2018 (accessed on Oct 27, 2018)}, +} + +@misc{ enikolopov18social, + author = {Ruben Enikolopov and Alexey Makarin and Maria Petrova}, + title = {\href{https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2696236}{Social Media and Protest Participation: Evidence from Russia}}, + month = oct, + year = 2018, +} + +@article{ esau17design, + author = {Katharina Esau and Dennis Friess and Christiane Eilders}, + title = {\href{https://onlinelibrary.wiley.com/doi/full/10.1002/poi3.154}{Design Matters! An Empirical Analysis of Online Deliberation on Different News Platforms}}, + journal = {Policy and Internet}, + volume = 9, + number = 3, + month = sep, + year = 2017, + pages = {321-342}, +}, + +@misc{ eternalgloom18overview, + author = {{eternalgloom}}, + title = {\href{https://bitcointalk.org/index.php?topic=3242065.0}{Overview of Universal Basic Income Crypto Projects}}, + howpublished = {Bitcoin Forum}, + month = apr, + year = 2018, +} + +@misc{ ethics12about, + title = {About | {Ethics \& International Affairs}}, + note = {Accessed on 24/01/2013}, + howpublished = {\url{http://www.ethicsandinternationalaffairs.org/about/}}, +} + +@article{ evers05, + author = {Joris Evers}, + title = {{ISPs} versus the zombies}, + journal = {CNET News}, + month = jul, + day = 19, + year = 2005, + url = {http://news.com.com/ISPs+versus+the+zombies/2100-7349_3-5793719.html}, +} + +%F + +% obsoleted by farrell18democratic +@misc{ farrell18fake, + author = {Henry Farrell and Melissa Schwartzberg}, + title = {In fake news we trust? Epistemic trust and + the transformation of the media}, + month = jun, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ farrell18democratic, + author = {Henry Farrell and Melissa Schwartzberg}, + title = {The Democratic Consequences of the New Public Sphere}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ federal15why, + author = {{Federal Reserve}}, + title = {\href{https://www.federalreserve.gov/faqs/economy_14400.htm}{Why does the Federal Reserve aim for 2 percent inflation over time?}}, + month = jan, + year = 2015, + url = {https://www.federalreserve.gov/faqs/economy_14400.htm}, +} + +@inproceedings{feigenbaum11accountability, + title={Accountability and deterrence in online life}, + author={Feigenbaum, Joan and Hendler, James A and Jaggard, Aaron D and Weitzner, Daniel J and Wright, Rebecca N}, + booktitle = {\bibconf['11]{ICWS}{International Conference on Web Science, ACM}}, + year={2011} +} + +@article{ feigenbaum14data, + author = {Joan Feigenbaum and Bryan Ford}, + title = {\href{http://www.huffingtonpost.com/joan-feigenbaum/data-hoarding-surveillance_b_5179305.html}{Is Data Hoarding Necessary for Lawful Surveillance?}}, + journal = {The Huffington Post}, + month = apr # {~19,}, + year = 2014, +} + +@book{ feldman06citizens, + author = {Leonard C. Feldman}, + title = {Citizens without Shelter: Homelessness, Democracy, and Political Exclusion}, + publisher = {Cornell University Press}, + month = jan, + year = 2006, + isbn = {978-0801472909}, +} + +@article{ ferrara16rise, + author = {Emilio Ferrara and Onur Varol and Clayton Davis and + Filippo Menczer and Alessandro Flammini}, + title = {\href{https://dl.acm.org/citation.cfm?id=2818717}{The Rise of Social Bots}}, + journal = {Communications of the ACM}, + volume = 59, + number = 7, + month = jul, + year = 2016, +} + +@article{ filetti16participating, + author = {Andrea Filetti}, + title = {\href{http://siba-ese.unisalento.it/index.php/paco/article/viewFile/15893/13784}{Participating Unequally? Assessing the Macro-Micro Relationship Between Income Inequality and Political Engagement in Europe}}, + journal = {Partecipazione e Conflitto}, + volume = 9, + number = 1, + year = 2016, +} + +@inproceedings{ fiore02observed, + author = {Andrew T. Fiore and Scott LeeTiernan and Marc A. Smith}, + title = {\href{https://dl.acm.org/citation.cfm?id=503434}{Observed Behavior and Perceived Value of Authors in Usenet Newsgroups: Bridging the Gap}}, + booktitle = {Proceedings of the SIGCHI Conference on Human Factors in Computing Systems}, + month = apr, + year = 2002, + pages = {323-330}, +} + +@book{ fishkin93democracy, + author = {James S. Fishkin}, + title = {Democracy and Deliberation: + New Directions for Democratic Reform}, + publisher = {Yale University Press}, + month = sep, + year = 1993, + isbn = {978-0300051636}, +} + +@article{ fishkin05experimenting, + author = {James S Fishkin and Robert C Luskin}, + title = {\href{https://link.springer.com/article/10.1057%2Fpalgrave.ap.5500121}{Experimenting with a Democratic Ideal: Deliberative Polling and Public Opinion}}, + journal = {Acta Politica}, + month = sep, + year = 2005, + volume = 40, + number = 3, + pages = {284–298}, +} + +@article{ flavin15campaign, + author = {Patrick Flavin}, + title = {\href{https://doi.org/10.1177%2F1065912914554041}{Campaign Finance Laws, Policy Outcomes, and Political Equality in the American States}}, + journal = {Political Research Quarterly}, + volume = 68, + number = 1, + year = 2015, +} + +@misc{ ford02delegative, + author = {Bryan Ford}, + title = {\href{http://bford.info/deleg/deleg.pdf}{Delegative Democracy}}, + month = may, + year = 2002, +} + +@inproceedings{ford08nyms, + author = {Bryan Ford and Jacob Strauss}, + title = {\href{http://bford.info/pub/net/sybil.pdf}{An offline foundation for online accountable pseudonyms}}, + booktitle = {1st International Workshop on Social Network Systems (SocialNets)}, + year = {2008}, + url = {http://bford.info/pub/net/sybil.pdf}, +} + +@misc{ ford14delegative, + author = {Bryan Ford}, + title = {\href{https://bford.github.io/2014/11/16/deleg.html}{Delegative Democracy Revisited}}, + month = nov, + day = 16, + year = 2014, +} + +@misc{ ford19remote, + author = {Bryan Ford}, + title = {\href{https://bford.info/2019/02/22/voting/}{The Remote Voting Minefield: from North Carolina to Switzerland}}, + month = feb, + year = 2019, +} + +@misc{ ford19liquid, + author = {Bryan Ford}, + title = {\href{https://bford.info/book/}{A Liquid Perspective on Democratic Choice}}, + note = {Draft (forthcoming)}, + year = 2020, +} + +@misc{ ford19money, + author = {Bryan Ford}, + title = {\href{https://bford.info/book/}{Democratic Value and Money for Decentralized Digital Society}}, + note = {Draft (forthcoming)}, + year = 2020, +} + +@misc{ ford19expert, + author = {Bryan Ford}, + title = {\href{https://bford.info/book/}{Experts and Charlatans, Breakthroughs and Bandwagons: Collectively Distinguishing Signal from Noise Under Attack}}, + note = {Draft (forthcoming)}, + year = 2020, +} + +@misc{ ford19ident, + author = {Bryan Ford}, + title = {To Divide or Unite People Online: + Digital Identity, Personhood, and Citizenship}, + note = {Draft (forthcoming)}, + year = 2020, +} + +@incollection{ford20technologizing, + author = {Bryan Ford}, + title = {\href{https://bford.info/pub/soc/dt2-chapter-abs}{Technologizing Democracy or Democratizing Technology? {A} Layered-Architecture Perspective on Potentials and Challenges}}, + booktitle = {Digital Technology and Democratic Theory (forthcoming)}, + publisher = {University of Chicago Press}, + month = may, + year = 2020, + note = {Preprint: \url{https://bford.info/pub/soc/dt2-chapter-abs}} +} + +@article{ forget11town, + author = {Evelyn L. Forget}, + title = {\href{https://utpjournals.press/doi/full/10.3138/cpp.37.3.283}{The Town with No Poverty: The Health Effects of a Canadian Guaranteed Annual Income Field Experiment}}, + volume = 37, + number = 3, + month = sep, + year = 2011, + pages = {283-305}, +} + +@article{ friedman01socialcost, + author = {Friedman, E. and P. Resnick}, + title = {{The Social Cost of Cheap Pseudonyms}}, + journal = {Journal of Economics and Management Strategy}, + Volume = {10}, + Number = {2}, + pages = {173--199} +} + +@inproceedings{ freitas15reverse, + author = {Carlos A. Freitas and Fabricio Benevenuto and + Saptarshi Ghosh and Adriano Veloso}, + title = {\href{https://dl.acm.org/citation.cfm?doid=2808797.2809292}{Reverse Engineering Socialbot Infiltration Strategies in Twitter}}, + booktitle = {\bibconf{ASONAM}{Advances in Social Networks Analysis and Mining}}, + month = aug, + year = 2015, + pages = {25-32}, + location = {Paris, France}, +} + +@article{ froomkin96, + author = {A. Michael Froomkin}, + title = {Flood Control on the Information Ocean: + Living With Anonymity, Digital Cash, and Distributed Databases}, + journal = {Law and Commerce}, + volume = 15, + pages = {395-515}, + year = 1996, +} + +@article{ froomkin99, + author = {A. Michael Froomkin}, + title = {Legal Issues in Anonymity and Pseudonymity}, + journal = {Information Society}, + volume = 15, + number = 2, + pages = {11327}, + month = apr, + year = 1999, +} + +@misc{ ftc10protecting, + author = {{Federal Trade Commission}}, + title = {Protecting Consumer Privacy in an Era of Rapid Change}, + month = dec, + year = 2010, + note = {Preliminary FTC Staff Report}, +} + +@article{ funk10social, + author = {Patricia Funk}, + title = {\href{https://www.jstor.org/stable/25700915}{Social incentives and voter turnout: evidence from the Swiss mail ballot system}}, + journal = {Journal of the European Economic Association}, + volume = 8, + number = 5, + month = sep, + year = 2010, +} + +@misc{ fxssi18top, + author = {{FXSSI}}, + title = {\href{https://fxssi.com/top-10-of-the-weakest-world-currencies-in-current-year}{TOP 10 The Weakest World Currencies in 2018}}, + month = mar, + year = 2018, +} + +%G + +@misc{ gangadharan18digital, + author = {Seeta Gangadharan}, + title = {Digital Exclusion as a Political Resource}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@article{ garzia12voting, + author = {Diego Garzia and Stefan Marschall}, + title = {\href{https://core.ac.uk/download/pdf/45682386.pdf}{Voting Advice Applications under review: the state of research}}, + journal = {International Journal of Electronic Governance}, + volume = 5, + number = {3/4}, + year = 2012, +} + +@techreport{ gasser09three, + author = {Jan Gerlach and Urs Gasser}, + title = {\href{https://cyber.harvard.edu/sites/cyber.harvard.edu/files/Gerlach-Gasser_SwissCases_Evoting.pdf}{Three Case Studies from Switzerland: {E-Voting}}}, + institution = {Berkman Center}, + number = {Research Publication No. 2009-03.1}, + month = mar, + year = 2009, +} + +@article{ gellman09privacy, + author = {Robert Gellman}, + title = {Privacy in the Clouds: Risks to Privacy and Confidentiality + from Cloud Computing}, + journal = {World Privacy Forum}, + year = 2009, + pages = {1-16}, +}, + +@article{ gemberling14expert, + author = {Tess M. Gemberling and Robert J. Cramer}, + title = {\href{https://psycnet.apa.org/fulltext/2014-13439-004.pdf}{Expert testimony on sensitive myth-ridden topics: Ethics and recommendations for psychological professionals}}, + journal = {Professional Psychology: Research and Practice}, + volume = 45, + number = 2, + month = apr, + year = 2014, + pages = {120-127}, +} + +@article{ germann17internet, + author = {Micha Germann and Uwe Serd\"{u}lt}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S026137941630453X}{Internet voting and turnout: Evidence from {Switzerland}}}, + journal = {Electoral Studies}, + volume = 47, + month = jun, + year = 2017, + pages = {1-12}, +} + +@book{ gervais15collective, + author = {Daniel Gervais}, + title = {Collective Management of Copyright and Related Rights}, + edition = {3rd}, + publisher = {Wolters Kluwer}, + month = nov, + year = 2015, + isbn = {978-9041154415}, +} + +@book{ gesell58natural, + author = {Silvio Gesell}, + title = {The Natural Economic Order}, + publisher = {Peter Owen Limited}, + location = {London}, + note = {Translated by Philip Pye M.A.}, + year = 1958, +} + +@inproceedings{ ghosh12understanding, + author = {Saptarshi Ghosh and Bimal Viswanath and Farshad Kooti and + Naveen Kumar Sharma and Gautam Korlam and + Fabricio Benevenuto and Niloy Ganguly and + Krishna Phani Gummadi}, + title = {\href{https://dl.acm.org/citation.cfm?id=2187846}{Understanding and Combating Link Farming in the Twitter Social Network}}, + booktitle = {\bibconf[21st]{WWW}{International Conference on World Wide Web}}, + month = apr, + year = 2012, + location = {Lyon, France}, +} + +@article{ gilens14theories, + author = {Martin Gilens and Benjamin I. Page}, + title = {\href{http://piketty.pse.ens.fr/files/GilensPage2014.pdf}{Testing Theories of American Politics: Elites, Interest Groups, and Average Citizens}}, + journal = {Perspectives on Politics}, + volume = 12, + number = 3, + month = sep, + year = 2014, + pages = {564-581}, +} + +@book{ glover95hometown, + author = {Paul Glover}, + title = {Hometown money: How to enrich your community with local currency}, + publisher = {Ithaca Money}, + isbn = {978-0962291135}, + year = 1995, +} + +@article{ golder16far, + author = {Matt Golder}, + title = {\href{https://www.annualreviews.org/doi/full/10.1146/annurev-polisci-042814-012441}{Far Right Parties in Europe}}, + journal = {Annual Review of Political Science}, + volume = 19, + pages = {477-497}, + month = may, + year = 2016, +} + +@misc{ golz18fluid, + author = {Paul G\"{o}lz and Anson Kahng and Simon Mackenzie and + Ariel D. Procaccia}, + title = {\href{https://arxiv.org/abs/1808.01906}{The Fluid Mechanics of Liquid Democracy}}, + month = aug, + year = 2018, + howpublished = {arXiv preprint 1808.01906v1}, +} + +@misc{ greene13eff, + author = {David Greene}, + title = {{EFF} Files 22 Firsthand Accounts of How {NSA} Surveillance + Chilled the Right to Association}, + month = nov, + day = 6, + year = 2013, + note = {\url{https://www.eff.org/press/releases/eff-files-22-firsthand-accounts-how-nsa-surveillance-chilled-right-association}}, +} + +@misc{ green-armytage04proposal, + author = {James Green-Armytage}, + title = {\href{http://web.archive.org/web/20040603225236/http://fc.antioch.edu/~jarmyta@antioch-college.edu/voting_methods/proxy.htm}{A Proposal for Direct Democracy Based on a Non-Binding Proxy System}}, + month = jun, + year = 2004, +} + +@misc{ green-armytage05direct, + author = {James Green-Armytage}, + title = {\href{http://web.archive.org/web/20050428192452/http://fc.antioch.edu/~james_green-armytage/vm/proxy.htm}{Direct Democracy by Delegable Proxy}}, + month = apr, + year = 2005, +} + +@article{ green-armytage14direct, + author = {James Green-Armytage}, + title = {\href{https://link.springer.com/article/10.1007/s10602-014-9176-9}{Direct Voting and Proxy Voting}}, + journal = {Constitutional Political Economy}, + volume = 26, + number = 2, + month = dec, + year = 2014, + pages = {190–220}, +} + +@article{ greenwald13NSA, + author = {Glenn Greenwald}, + title = {\href{http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order/}{{NSA} collecting phone records of millions of Verizon customers daily}}, + journal = {The Guardian}, + year = 2013, + month = jun # {~6,}, +} + +@article{ gronlund09challenge, + author = {Kimmo Gr\"{o}nlund and Kim Strandberg and Staffan Himmelroos}, + title = {The challenge of deliberative democracy online -- + A comparison of face-to-face and virtual experiments + in citizen deliberation}, + journal = {Information Polity}, + volume = 14, + number = 3, + month = aug, + year = 2009, + pages = {187-201}, +} + +%H + +@article{ hacker05abandoning, + author = {Jacob S. Hacker and Paul Pierson}, + title = {\href{https://www.jstor.org/stable/3688109}{Abandoning the Middle: The Bush Tax Cuts and the Limits of Democratic Control}}, + journal = {Perspectives on Politics}, + volume = 3, + number = 1, + month = mar, + year = 2005, +} + +@article{ hafner06, + author = {Katie Hafner}, + title = {Growing {Wikipedia} Refines Its `Anyone Can Edit' Policy}, + journal = {New York Times}, + month = jun, + day = 17, + year = 2006, + url = {http://www.nytimes.com/2006/06/17/technology/17wiki.html}, +} + +@article{ hajnal17voter, + author = {Zoltan Hajnal and Nazita Lajevardi and Lindsay Nielson}, + title = {\href{https://www.journals.uchicago.edu/doi/10.1086/688343}{Voter Identification Laws and the Suppression of Minority Votes}}, + journal = {The Journal of Politics}, + volume = 79, + number = 2, + month = apr, + year = 2017, + pages = {363-379}, +} + +@misc{ hardt15google, + author = {Steve Hardt and Lia C. R. Lopes}, + title = {\href{https://www.tdcommons.org/dpubs_series/79/}{Google Votes: A Liquid Democracy Experiment on a Corporate Social Network}}, + institution = {Technical Disclosure Commons}, + month = jun, + year = 2015, +} + +@article{ hargrave07, + author = {Sean Hargrave}, + title = {Why {VoIP} is the next target for spammers}, + journal = {The Guardian}, + month = nov, + day = 1, + year = 2007, + url = {http://www.guardian.co.uk/technology/2007/nov/01/news.hacking} +} + +@book{ hauben97netizens, + author = {Michael Hauben and Ronda Hauben}, + title = {\href{https://www.wiley.com/en-us/Netizens%3A+On+the+History+and+Impact+of+Usenet+and+the+Internet-p-9780818677069}{Netizens: On the History and Impact of Usenet and the Internet}}, + publisher = {IEEE Computer Society Press}, + isbn = {978-0-818-67706-9}, + month = apr, + year = 1997, +} + +@misc{ hawkins18hidden, + author = {Stephen Hawkins and Daniel Yudkin and M\'{i}riam Juan-Torres + and Tim Dixon}, + title = {\href{https://www.moreincommon.com/hidden-tribes/}{Hidden Tribes: A Study of America’s Polarized Landscape}}, + howpublished = {More in Common report}, + month = oct, + year = 2018, +} + +@article{ healy03fall, + author = {Paul M. Healy and Krishna G. Palepu}, + title = {The Fall of {Enron}}, + journal = {Journal of Economic Perspectives}, + volume = 17, + number = 2, + year = 2003, + pages = {3-26}, +} + +@inproceedings{ heckle07, + author = {Rosa R. Heckle and Wayne G. Lutters}, + title = {Privacy Implications for Single Sign-on Authentication + In a Hospital Environment (poster)}, + booktitle = {Symposium on Usable Privacy and Security}, + location = {Pittsburgh, PA}, + month = jul, + day = {18-20}, + year = 2007, +} + +@book{ heinlein66moon, + author = {Robert A. Heinlein}, + title = {The Moon is a Harsh Mistress}, + publisher = {G. P. Putnam's Sons}, + month = jun, + year = 1966, +} + +@article{ hermann06special, + author = {Gretchen M. Hermann}, + title = {\href{https://search.proquest.com/docview/205167848}{Special Money: {Ithaca HOURS} and Garage Sales}}, + journal = {Ethnology}, + volume = 45, + number = 2, + year = 2006, + url = {https://search.proquest.com/docview/205167848}, +} + +@misc{ hern2018china, + title = {\href{https://www.theguardian.com/world/2018/aug/02/google-working-on-censored-search-engine-for-china}{Google 'working on censored search engine' for China}}, + author = {Alex Hern}, + month = aug, + year = {2018 (accessed on Jan 10, 2019)}, +} + +@article{ hicks15principle, + author = {William D. Hicks and Seth C. McKee and Mitchell D. Sellers + and Daniel A. Smith}, + title = {\href{https://journals.sagepub.com/doi/10.1177/1065912914554039}{A Principle or a Strategy? Voter Identification Laws and Partisan Competition in the American States}}, + journal = {Political Research Quarterly}, + month = mar, + year = 2015, + volume = 68, + number = 1, + pages = {18-33}, +} + +@article{ highton17voter, + author = {Benjamin Highton}, + title = {\href{https://www.annualreviews.org/doi/10.1146/annurev-polisci-051215-022822}{Voter Identification Laws and Turnout in the United States}}, + volume = 20, + month = may, + year = 2017, + pages = {149-167}, +} + +@article{ hill87algorithm, + author = {I. D. Hill and B. A. Wichmann and D. R. Woodall}, + title = {\href{https://doi.org/10.1093/comjnl/30.3.277}{Algorithm 123 — Single Transferable Vote by Meek’s Method}}, + journal = {The Computer Journal}, + volume = 30, + number = 3, + month = jan, + year = 1987, + pages = {277–281}, +} + +@article{ hill99internet, + author = {Kevin A. Hill and John E. Hughes}, + title = {\href{https://www.tandfonline.com/doi/abs/10.1080/13510349908403613}{Is the Internet an Instrument of Global Democratization?}}, + journal = {Democratization}, + volume = 6, + number = 2, + month = sep, + year = 2007, + pages = {99-127}, + doi = {10.1080/13510349908403613}, +} + +@article{ hill05meek, + author = {I. D. Hill and C. H. E. Warren}, + title = {\href{http://www.votingmatters.org.uk/ISSUE20/I20P1.PDF}{Meek versus Warren}}, + journal = {Voting matters}, + volume = 20, + month = jun, + year = 2005, +} + +@article{ hill12target, + author = {Kashmir Hill}, + title = {How Target Figured Out A Teen Girl Was Pregnant + Before Her Father Did}, + journal = {Forbes}, + month = feb, + day = 16, + year = 2012, + note = {\url{http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/}}, +} + +@article{ hill14pregnancy, + author = {Kashmir Hill}, + title = {You Can Hide Your Pregnancy Online, + But You'll Feel Like A Criminal}, + journal = {Forbes}, + month = apr, + day = 29, + year = 2014, + note = {\url{http://www.forbes.com/sites/kashmirhill/2014/04/29/you-can-hide-your-pregnancy-online-but-youll-feel-like-a-criminal/}}, +} + +@article{hollis16share, + title={\href{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5001759/}{To Share or Not to Share: Ethical Acquisition and Use of Medical Data}}, + author={Hollis, Kate Fultz}, + journal={AMIA Summits on Translational Science Proceedings}, + volume={2016}, + pages={420}, + year={2016}, + publisher={American Medical Informatics Association} +} + +@incollection{ hilty13collective, + author = {Reto M. Hilty and Sylvie N\'erisson}, + title = {\href{https://pure.mpg.de/pubman/faces/ViewItemFullPage.jsp?itemId=item_1758891}{Collective Copyright Management and Digitization: The European Experience}}, + booktitle = {Handbook on the Digital Creative Economy}, + editor = {Ruth Towse and Christian Handke}, + pages = {222-234}, + year = 2013, +} + +@book{ howard13democracy, + author = {Philip N. Howard and Muzammil M. Hussain}, + title = {Democracy's Fourth Wave? Digital Media and the Arab Spring}, + month = mar, + year = 2013, + publisher = {Oxford University Press}, + isbn = {0199936978}, +} + +@misc{ hipaa17benefits, + author = {{HIPAA Journal}}, + title = {\href{https://www.hipaajournal.com/blockchain-medical-records/}{The Benefits of Using Blockchain for Medical Records}}, + month = sep, + year = 2017, +} + +@book{ hobbes1651leviathan, + author = {Thomas Hobbes}, + title = {Leviathan}, + year = 1651, + isbn = {978-1439297254}, +} + +@article{ hougan18bitcoin, + author = {Matt Hougan}, + title = {\href{https://www.forbes.com/sites/matthougan/2018/04/23/bitcoin-hodling-is-the-best-strategy-with-one-big-caveat/}{For Bitcoin, HODLing Is The Best Strategy... With One Big Caveat}}, + journal = {Forbes}, + month = apr, + year = 2018, +} + +@misc{ hrc14right, + author = {{Human Rights Council}}, + title = {\href{http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf}{The right to privacy in the digital age: + Report of the Office of the United Nations High Commissioner + for Human Rights}}, + month = jun, + day = 30, + year = 2014, +} + +@article{ hsieh06doonesbury, + author = {Hannah Hsieh}, + title = {{Doonesbury} Online Poll Hacked in Favor of {MIT}}, + journal = {MIT Tech}, + volume = 126, + number = 27, + month = jun, + day = 9, + year = 2006, +} + +@misc{ hudson93lost, + author = {Michael Hudson}, + title = {\href{http://michael-hudson.com/wp-content/uploads/2010/03/HudsonLostTradition.pdf}{The Lost Tradition of {Biblical} Debt Cancellations}}, + year = 1993, + location = {New York}, +} + +%I + +@misc{ ifes06, + author = {{IFES and UNDP}}, + title = {Getting to the {CORE}: + A Global Survey on the Cost of Registration and Elections}, + month = jun, + day = 30, + year = 2006, +} + +@article{ isbister10whose, + title = {Whose Impact, and Is It All About Impact?}, + author = {Isbister, J.}, + journal = {Ethical Questions and International NGOs}, + pages = {147--156}, + year = {2010}, + publisher = {Springer}, +} + +@article{ israel17cognitive, + author = {Jonas Israel and Stefan Marschall and Martin Schultze}, + title = {\href{https://www.tandfonline.com/doi/full/10.1080/17457289.2016.1268142}{Cognitive dissonance and the effects of Voting Advice Applications on voting behaviour: evidence from the European Elections 2014}}, + journal = {Journal of Elections, Public Opinion and Parties}, + volume = 27, + number = 1, + year = 2017, + pages = {56-74}, +} + +@misc{ ito03emergent, + author = {Joi Ito}, + title = {Emergent Democracy}, + month = apr, + year = 2003, + note = {\url{http://joi.ito.com/joiwiki/EmergentDemocracyPaper}}, +} + +@inproceedings{ iyengar03facilitating, + author = {Shanto Iyengar and Robert C. Luskin and James S. Fishkin}, + title = {\href{https://pcl.stanford.edu/common/docs/research/iyengar/2003/facilitating.pdf}{Facilitating Informed Public Opinion: Evidence from Face-to-face and Online Deliberative Polls}}, + booktitle = {Annual Meeting of the American Political Science Association}, + year = 2003, +} + +@article{ iyengar15fear, + author = {Shanto Iyengar and Sean J. Westwood}, + title = {\href{https://www.jstor.org/stable/24583091}{Fear and Loathing across Party Lines: New Evidence on Group Polarization}}, + journal = {American Journal of Political Science}, + volume = 59, + number = 3, + month = jul, + year = 2015, + pages = {690-707}, +} + +%J + +@techreport{ jackson18post, + author = {Tim Jackson}, + title = {\href{https://www.cusp.ac.uk/themes/aetw/wp12/}{The Post-Growth Challenge -- Secular Stagnation, Inequality and the Limits to Growth}}, + institution = {Centre for the Understanding of Sustainable Prosperity}, + number = {Working Paper No 12}, + month = may, + year = 2018, +} + +@techreport{ jackson18confronting, + author = {Tim Jackson and Peter Victor}, + title = {\href{https://www.cusp.ac.uk/themes/s2/wp11/}{Confronting inequality in a post-growth world -- Basic income, factor substitution and the future of work}}, + institution = {Centre for the Understanding of Sustainable Prosperity}, + number = {Working Paper No 11}, + month = apr, + year = 2018, +} + +@article{ jacob12social, + author = {Jeffrey Jacob and Merlin Brinkerhoff and Emily Jovic and Gerald Wheatley}, + title = {\href{https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.525.6764&rep=rep1&type=pdf}{The Social and Cultural Capital of Community Currency: An {Ithaca} {HOURS} Case Study Survey}}, + journal = {International Journal of Community Currency Research}, + volume = 8, + number = 42, + month = may, + day = 23, + year = 2012, +} + +@book{ jamieson93dirty, + author = {Kathleen Hall Jamieson}, + title = {Dirty Politics: Deception, Distraction, and Democracy}, + publisher = {Oxford University Press}, + month = oct, + year = 1993, + isbn = {978-0195085532}, +} + +%K + +@article{ kalla16campaign, + author = {Joshua L. Kalla and David E. Broockman}, + title = {\href{https://doi.org/10.1111/ajps.12180}{Campaign Contributions Facilitate Access to Congressional Officials: A Randomized Field Experiment}}, + journal = {American Journal of Political Science}, + volume = 60, + number = 3, + month = jul, + year = 2016, + pages = {545-558}, +} + +@misc{ kalsey04, + author = {Adam Kalsey}, + title = {Why {IP} banning is useless}, + note = {\url{http://kalsey.com/2004/02/why_ip_banning_is_useless}}, + month = feb, + year = 2004, +} + +@inproceedings{ kamara14restructuring, + author = {Seny Kamara}, + title = {\href{http://outsourcedbits.org/2014/03/10/restructuring-the-nsa-metadata-program/}{Restructuring the {NSA} Metadata Program}}, + booktitle = {\bibconf{WAHC}{Workshop on + Applied Homomorphic Cryptography}}, + month = mar, + day = 7, + year = 2014, + url = {http://outsourcedbits.org/2014/03/10/restructuring-the-nsa-metadata-program/}, +} + +@book{ kara17modern, + author = {Siddharth Kara}, + title = {\href{https://cup.columbia.edu/book/modern-slavery/9780231158466}{Modern Slavery: A Global Perspective}}, + publisher = {Columbia University Press}, + month = oct, + year = 2017, + isbn = {9780231158466}, +} + +@article{ kayany98contexts, + author = {Joseph M. Kayany}, + title = {\href{https://doi.org/10.1002/(SICI)1097-4571(1998)49:12%3C1135::AID-ASI8%3E3.0.CO;2-W}{Contexts of uninhibited online behavior: Flaming in social newsgroups on usenet}}, + journal = {Journal of the Association for Information Science and Technol;ogy}, + month = dec, + year = 1998, +} + +@article{ kaye16across, + author = {Barbara K. Kaye and Thomas J. Johnson}, + title = {\href{https://www.tandfonline.com/doi/full/10.1080/08838151.2016.1234477}{Across the Great Divide: How Partisanship and Perceptions of Media Bias Influence Changes in Time Spent with Media}}, + journal = {Journal of Broadcasting \& Electronic Media}, + volume = 60, + number = 4, + month = nov, + year = 2016, + pages = {604-623}, +} + +@article{ keller15partisan, + author = {Eric Keller and Nathan J. Kelly}, + title = {\href{https://doi.org/10.1177/1065912915591218}{Partisan Politics, Financial Deregulation, and the New Gilded Age}}, + journal = {Political Research Quarterly}, + month = jun, + year = 2015, + volume = 68, + number = 3, + pages = {428–442}, +} + +@incollection{ kelly16party, + author = {Norm Kelly}, + title = {\href{http://press-files.anu.edu.au/downloads/press/n2109/pdf/ch03.pdf}{Party registration and political participation: Regulating small and `micro' parties}}, + booktitle = {\href{https://press.anu.edu.au/publications/party-rules}{Party Rules?}}, + chapter = {3}, + month = oct, + year = 2016, + isbn = {9781760460778}, +} + +@book{ keynes65general, + author = {John Maynard Keynes}, + title = {The General Theory of Employment, Interest and Money}, + publisher = {Harcourt, Brace \& World}, + month = may, + year = 1965, + isbn = {978-0156347112}, +} + +@incollection{ kilgour10approval, + author = {D. Marc Kilgour}, + title = {\href{https://doi.org/10.1007/978-3-642-02839-7_6}{Approval Balloting for Multi-winner Elections}}, + booktitle = {Handbook on Approval Voting}, + publisher = {Springer}, + month = apr, + year = 2010, + pages = {105-124}, +} + +@article{kim17factors, + title={\href{https://bmcmedethics.biomedcentral.com/articles/10.1186/s12910-017-0185-x}{Factors affecting willingness to share electronic health data among California consumers}}, + author={Kim, Katherine K and Sankar, Pamela and Wilson, Machelle D and Haynes, Sarah C}, + journal={BMC medical ethics}, + volume={18}, + number={1}, + pages={25}, + year={2017}, + publisher={BioMed Central} +} + +@article{ knight05, + author = {Will Knight}, + title = {{Wikipedia} tightens editorial rules after complaint}, + url = {http://www.newscientist.com/article.ns?id=dn8425}, + journal = {New Scientist}, + month = dec, + year = 2005, +} + +@article{ koistinen14good, + author = {Pertti Koistinen and Johanna Perki\"o}, + title = {\href{https://search.proquest.com/docview/1703954350}{Good and Bad Times of Social Innovations: The Case of Universal Basic Income in Finland}}, + journal = {Basic Income Studies}, + volume = 9, + number = {1--2}, + year = 2014, +} + +@article{korsmo13high, + title={\href{https://lawreview.richmond.edu/files/2014/03/Korsmo-482-AC.pdf}{High-Frequency Trading: A Regulatory Strategy}}, + author={Korsmo, Charles R}, + journal={U. Rich. L. Rev.}, + volume={48}, + pages={523}, + year={2013}, + publisher={HeinOnline} +} + +@article{ koprowski03, + author = {Gene J. Koprowski}, + title = {Spam Filtering and the Plague of False Positives}, + journal = {TechNewsWorld}, + month = sep, + day = 30, + year = 2003, + url = {http://www.technewsworld.com/story/31703.html}, +} + +@article{ kotzee12expertise, + author = {Ben Kotzee}, + title = {\href{https://www.tandfonline.com/doi/abs/10.1080/13639080.2012.738291}{Expertise, fluency and social realism about professional knowledge}}, + journal = {Journal of Education and Work}, + volume = 27, + number = 2, + month = nov, + year = 2012, + pages = {161-178}, +} + +@article{ kraut12aristotle, + author = {Kraut, Richard}, + title = {Aristotle's Ethics}, + journal = {The Stanford Encyclopedia of Philosophy}, + month = dec, + year = 2012, + url = {http://plato.stanford.edu/archives/win2012/entries/aristotle-ethics/}, +} + +@article{ kreimer01technologies, + author = {Seth F. Kreimer}, + title = {Technologies of Protest: Insurgent Social Movements and + the {First Amendment} in the Era of the {Internet}}, + journal = {University of Pennsylvania Law Review}, + month = {October}, + year = {2001} +} + +%L + +@article{ lalley18quadratic, + author = {Steven Lalley and E. Glen Weyl}, + title = {\href{https://dx.doi.org/10.2139/ssrn.2003531}{Quadratic Voting: How Mechanism Design Can Radicalize Democracy}}, + journal = {American Economic Association Papers and Proceedings}, + year = 2018, + volume = 1, + number = 1, +} + +@misc{ landemore18democracy, + author = {H\'{e}l\`{e}ne Landemore and Rob Reich and Karine Serfaty}, + title = {Democracy and the Online Public Sphere in an Era of Digital Platforms: The Case of Facebook}, + month = jun, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ landemore18open, + author = {H\'{e}l\`{e}ne Landemore}, + title = {Open Democracy and Digital Technologies}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ lanphier95model, + author = {Rob Lanphier}, + title = {\href{https://robla.net/1996/steward/}{A Model for Electronic Democracy?}}, + year = 1995, +} + +@misc{ larkina17nimses, + author = {Anna Larkina}, + title = {\href{https://www.kaspersky.com/blog/nimses-insecurity/17114/}{Why {Nimses} isn’t safe (so far)}}, + month = jun, + day = 16, + year = 2017, + url = {https://www.kaspersky.com/blog/nimses-insecurity/17114/}, +} + +@article{ lee96, + author = {Gia B. Lee}, + title = {Addressing Anonymous Messages in Cyberspace}, + journal = {Journal of Computer-Mediated Communication: + Emerging Law on the Electronic Frontier}, + volume = 2, + number = 1, + month = jun, + year = 1996, + url = {http://jcmc.indiana.edu/vol2/issue1/anon.html}, +} + +@misc{lee18facebook, + title = {\href{https://arstechnica.com/tech-policy/2018/03/facebooks-cambridge-analytica-scandal-explained/}{Facebook’s Cambridge Analytica Scandal, Explained [Updated]}}, + author = {Timothy B. Lee}, + month = mar, + year = {2018 (accessed on Jul 27, 2018)}, +} + +% obsoleted by lee18democratic +@misc{ lee18societal, + author = {David Lee and Margaret Levi and John Seely Brown}, + title = {Societal Collaboration in a Whitewater Sociotechnical World}, + month = jun, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ lee18democratic, + author = {David Lee and Margaret Levi and John Seely Brown}, + title = {Democratic Societal Collaboration in a Whitewater World}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@article{ leibovich15politics, + author = {Mark Leibovich}, + title = {\href{https://www.nytimes.com/2015/09/06/magazine/the-politics-of-distraction.html}{The Politics of Distraction}}, + journal = {The New York Times Magazine}, + month = sep, + year = 2015, +} + +@article{ lenneberg10respect, + title = {To Respect or Not to Respect}, + author = {Lenneberg, Conny}, + journal = {Ethical Questions and International NGOs}, + pages = {193--205}, + year = {2010}, + publisher = {Springer}, +} + +@article{ liberatore03democratising, + authhor = {Angela Liberatore and Silvio Funtowicz}, + title = {\href{https://academic.oup.com/spp/article/30/3/146/1628309}{`Democratising' expertise, `expertising' democracy: what does this mean, and why bother?}}, + journal = {Science and Public Policy}, + volume = 30, + number = 3, + month = jun, + year = 2003, + pages = {146-150}, +} + +@misc{ libertyalliance, + author = {{Liberty Alliance Project}}, + note = {\url{http://www.projectliberty.org/}}, + url = {http://www.projectliberty.org/}, +} + +@article{ lim12clicks, + author = {Merlyna Lim}, + title = {Clicks, Cabs, and Coffee Houses: Social Media and + Oppositional Movements in Egypt, 2004 -- 2011}, + journal = {Journal of Communication}, + volume = 62, + pages = {231-248}, +} + +@article{ lipton18blockchains, + author = {Alexander Lipton}, + title = {Blockchains and distributed ledgers in retrospective and perspective}, + journal = {The Journal of Risk Finance}, + volume = 19, + number = 1, + year = 2018, + pages = {4-25}, + doi = {10.1108/JRF-02-2017-0035}, +} + +@article{ lipton18banking, + author = {Alexander Lipton}, + title = {Banking on blockchain -- opportunities and challenges}, + month = mar, + day = 21, + year = 2018, +} + +@inproceedings{ litvinenko12social, + author = {Anna Litvinenko}, + title = {Social Media and Perspectives of Liquid Democracy: The Example + of Political Communication in the {P}irate party in {G}ermany}, + booktitle = {12th European Conference on e-Government}, + location = {Barcelona, Spain}, + month = jun, + year = 2012, + pages = {403-408}, +} + +@article{ liu16sockpuppet, + author = {Dong Liu and Quanyuan Wu and Weihong Han and Bin Zhou}, + title = {\href{https://link.springer.com/article/10.1007/s11704-015-4287-7}{Sockpuppet gang detection on social media sites}}, + journal = {Frontiers of Computer Science}, + volume = 10, + number = 1, + month = feb, + year = 2016, + pages = {124–135}, +} + +@book{ locke1689second, + author = {John Locke}, + title = {Second Treatise of Government}, + month = dec, + year = 1689, +} + +@article{ louwerse14design, + author = {Tom Louwerse and Martin Rosema}, + title = {\href{https://link.springer.com/article/10.1057/ap.2013.30}{The design effects of voting advice applications: Comparing methods of calculating matches}}, + journal = {Acta Politica}, + volume = 49, + number = 3, + month = jul, + year = 2014, + pages = {286–312}, +} + +@misc{ lynch05, + author = {M. Lynch}, + title = {Lives on Hold: the Human Cost of Statelessness}, + publisher = {Refugees International}, + month = feb, + year = 2005, +} + +@article{ nakashima13new, + author = {Ellen Nakashima and Barton Gellman and Greg Miller}, + title = {New documents reveal parameters of {NSA}'s secret surveillance programs}, + year = 2013, + month = jun, + day = 21, + note = {Washington Post}, +} + +%O + +@misc{ osullivan18worry, + author = {Domhnall O'Sullivan}, + title = {\href{https://www.swissinfo.ch/eng/business/democratic-duty_should-we-worry-about-low-voter-turnouts-in-switzerland-/44248880}{Should we worry about low voter turnouts in Switzerland?}}, + howpublished = {\url{swissinfo.ch}}, + month = aug, + day = 10, + year = 2018, +} + +@article{ oakes12hacking, + author = {Dan Oakes}, + title = {Hacking case's body of evidence}, + journal = {The Age}, + month = apr, + day = 12, + year = 2012, +} + +@misc{ obrien12google, + author = {Danny O'Brien}, + title = {{Google+}, real names and real problems}, + publisher = {Committee to Protect Journalists}, + month = jan, + year = 2012, + note = {\url{http://www.cpj.org/internet/2012/01/google-real-names-and-real-problems.php}}, +} + +@misc{ocean18ocean, + title = {\href{https://oceanprotocol.com/tech-whitepaper.pdf}{Ocean Protocol: +A Decentralized Substrate for AI Data \& Services}}, + author = {Ocean Protocol Foundation and BigchainDB and DEX Pte Ltd}, + year = {2018 (accessed October 27, 2018)}, +} + +@misc{ oecd13exploring, + author = {OECD}, + title = {Exploring the Economics of Personal Data}, + month = apr, + year = 2013, + note = {OECD Digital Economy Papers No. 220}, +} + +@article{ okleshen98usenet, + author = {Cara Okleshen and Sanford Grossbart}, + title = {\href{http://acrwebsite.org/volumes/8170/volumes/v25/NA-25}{Usenet Groups, Virtual Community and Consumer Behaviors}}, + journal = {Advances in Consumer Research}, + volume = 25, + pages = {Pages 276-282}, +} + +@misc{ openid, + author = {OpenID}, + note = {\url{http://openid.net/}}, + url = {http://openid.net/}, +} + +@book{ ostrom90governing, + author = {Elinor Ostrom}, + title = {Governing the Commons: The Evolution of Institutions for Collective Action}, + publisher = {Cambridge University Press}, + month = nov, + year = 1990, +} + +%P + +@article{ packer18report, + author = {George Packer}, + title = {\href{https://www.newyorker.com/news/daily-comment/a-new-report-offers-insights-into-tribalism-in-the-age-of-trump}{A New Report Offers Insights Into Tribalism in the Age of Trump}}, + journal = {The New Yorker}, + month = oct, + day = 12, + year = 2018, +} + +@book{ parijs17basic, + author = {Philippe Van Parijs}, + title = {Basic Income: A Radical Proposal for a Free Society and a Sane Economy}, + publisher = {Harvard University Press}, + month = mar, + year = 2017, +} + +@article{pell14stingray, + title={Your Secret StingRay’s No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and its Impact on National Security and Consumer Privacy}, + author={Pell, Stephanie K and Soghoian, Christopher}, + journal = {Harvard Journal of Law and Technology}, + month = dec, + year = 2014, +} + +@article{ pennycook18who, + author = {Gordon Pennycook and David G. Rand}, + title = {\href{https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3023545}{Who falls for fake news? The roles of bullshit receptivity, overclaiming, familiarity, and analytic thinking}}, + month = jun, + year = 2018, +} + +@book{ piketty17capital, + author = {Thomas Piketty}, + title = {Capital in the Twenty-First Century}, + publisher = {Belknap Press}, + month = aug, + year = 2017, + isbn = {978-0674979857}, +} + +@article{ polonski17artificial, + author = {Vyacheslav Polonski}, + title = {\href{http://theconversation.com/how-artificial-intelligence-conquered-democracy-77675}{How Artificial Intelligence Conquered Democracy}}, + journal = {The Conversation}, + month = aug, + day = 8, + year = 2017, +} + +@article{ posner15voting, + author = {Eric A. Posner and E. Glen Weyl}, + title = {Voting Squared: Quadratic Voting in Democratic Politics}, + year = 2015, + volume = 68, + number = 2, + journal = {Vanderbilt Law Review}, +} + +@book{ powell12influence, + author = {Lynda W. Powell}, + title = {The Influence of Campaign Contributions in State Legislatures: The Effects of Institutions and Politics}, + publisher = {University of Michigan Press}, + month = mar, + year = 2012, +} + +@book{ standing16precariat, + author = {Guy Standing}, + title = {The Precariat: The New Dangerous Class}, + publisher = {Bloomsbury Academic}, + month = feb, + year = 2011, + isbn = {9781849664561}, +} + +@book{ standing17basic, + author = {Guy Standing}, + title = {\href{https://yalebooks.yale.edu/book/9780300230840/basic-income}{Basic Income: A Guide for the Open-Minded}}, + publisher = {Yale University Press}, + month = aug, + year = 2017, + isbn = {978-0300230840}, +} + +@article{ prior13media, + author = {Markus Prior}, + title = {Media and Political Polarization}, + journal = {\href{https://doi.org/10.1146/annurev-polisci-100711-135242}{Annual Review of Political Science}}, + volume = 16, + pages = {101-127}, + month = may, + year = 2013, +} + +@misc{ prism2013, + title = {\href{https://www.zdnet.com/article/fbi-nsa-said-to-be-secretly-mining-data-from-nine-u-s-tech-giants/}{FBI, NSA said to be secretly mining data from nine U.S. tech giants}}, + author = {Rachel King}, + month = jun, + year = 2013, +} + +@book{ prunier95rwanda, + title = {The Rwanda crisis: History of a genocide}, + author = {Prunier, G\'{e}rard}, + year = {1995}, + publisher = {Columbia University Press}, +} + + +%Q + +@article{ quinlan15facilitating, + author = {Stephen Quinlan}, + title = {\href{https://www.tandfonline.com/doi/full/10.1080/07907184.2015.1099041}{Facilitating the Electorate: A Multilevel Analysis of Election Timing, Registration Procedures, and Turnout}}, + journal = {Irish Political Studies}, + month = nov, + year = 2015, + volume = 30, + number = 4, + pages = {482-509}, +} + + +%R + +@misc{radsch2019netflix, + title = {\href{https://www.aljazeera.com/indepth/opinion/netflix-enabling-saudi-crackdown-press-freedom-190107051448233.html}{Why is Netflix enabling the Saudi crackdown on press freedom?}}, + author = {Courtney Radsch}, + month = jan, + year = {2019 (accessed on Jan 10, 2019)}, +} + +@inproceedings{ ramachandran06, + author = {Anirudh Ramachandran and David Dagon and Nick Feamster}, + title = {Can {DNS}-Based Blacklists Keep Up with Bots?}, + booktitle = {3rd Conference on Email and Anti-Spam}, + month = jul, + day = 27, + year = 2006, +} + +@book{ rapoport05threes, + author = {Ronald B. Rapoport and Walter J. Stone}, + title = {Three's a Crowd: + The Dynamic of Third Parties, Ross Perot, + and Republican Resurgence}, + month = nov, + publisher = {University of Michigan Press}, + year = 2005, + isbn = {978-0472114535}, +} + +@article{ rasor14conversation, + author = {Dina Rasor}, + title = {Conversation With {James Risen}: Can Journalists Protect + Their National Security Sources?}, + journal = {Truthout}, + month = apr, + day = 23, + year = 2014, + note = {\url{http://www.truth-out.org/opinion/item/23207-conversation-with-james-risen-can-journalists-protect-their-national-security-sources}}, +} + +@article{ ratcliffe19glitch, + author = {Rebecca Ratcliffe}, + title = {\href{https://www.theguardian.com/technology/2019/oct/16/glitch-india-biometric-welfare-system-starvation?CMP=Share_iOSApp_Other}{How a glitch in India's biometric welfare system can be lethal}}, + journal = {The Guardian}, + month = oct, + year = 2019, + day = 16, +} + +@article{ read18how, + author = {Max Read}, + title = {\href{http://nymag.com/intelligencer/2018/12/how-much-of-the-internet-is-fake.html}{How Much of the Internet Is Fake? Turns Out, a Lot of It, Actually.}}, + journal = {New York Magazine}, + month = dec, + year = 2018, +} + +@book{ reinhart11this, + author = {Carmen M. Reinhart and Kenneth S. Rogoff}, + title = {This Time Is Different: Eight Centuries of Financial Folly}, + publisher = {Princeton University Press}, + month = aug, + year = 2011, + isbn = {978-0691152646}, +} + +@book{ reich18just, + author = {Rob Reich}, + title = {\href{https://press.princeton.edu/titles/14186.html}{Just Giving: Why Philanthropy Is Failing Democracy and How It Can Do Better}}, + publisher = {Princeton University Press}, + month = nov, + year = 2018, + isbn = {978-0691183497}, +} + +@inproceedings{ reinisch07swiss, + author = {Charlotte Reinisch}, + title = {\href{https://ecpr.eu/Events/PaperDetails.aspx?PaperID=12373&EventID=52}{Swiss {\em Landsgemeinden}: a deliberative democratic evaluation of two outdoor parliaments}}, + booktitle = {ECPR Joint Sessions}, + month = may, + year = 2007, + location = {Helsinki, Finland}, +} + +@inproceedings{ ribeiro18media, + author = {Filipe N. Ribeiro and Lucas Henriqueo and Fabricio Benevenutoo and Abhijnan Chakraborty and Juhi Kulshrestha and Mahmoudreza Babaei and Krishna P. Gummadi}, + title = {Media Bias Monitor: Quantifying Biases of Social Media News Outlets at Large-Scale}, + booktitle = {\bibconf[12th]{ICWSM}{International AAAI Conference on Web and Social Media}}, + location = {Stanford, California, USA}, + month = jun, + year = 2018, +} + +@misc{ ribeiro19auditing, + author = {Manoel Horta Ribeiro and Raphael Ottoni and Robert West and + Virgílio A. F. Almeida and Wagner Meira}, + title = {\href{https://arxiv.org/abs/1908.08313}{Auditing Radicalization Pathways on YouTube}}, + month = aug, + year = 2019, +} + +@book{ riddick86rules, + author = {Floyd Millard Riddick and Mariam H. Butcher}, + title = {Riddick's Rules of Procedure: A Modern Guide to Faster and More Efficient Meetings}, + publisher = {Scribner}, + month = jan, + year = 1986, + isbn = {978-0684184272}, +} + +@article{ robinson50bias, + author = {W. S. Robinson}, + title = {\href{https://www.jstor.org/stable/2086402}{Bias, Probability, and Trial by Jury}}, + journal = {American Sociological Review}, + volume = 15, + number = 1, + month = feb, + year = 1950, + pages = {73-78}, +} + +@inproceedings{ rodriguez07smartocracy, + author = {Marko A. Rodriguez and Daniel J. Steinbock and + Jennifer H. Watkins and Carlos Gershenson and Johan Bollen and + Victor Grey and Brad deGraf}, + title = {Smartocracy: Social Networks for Collective Decision Making}, + booktitle = {40th Hawaii International Conference on System Sciences}, + month = jan, + year = 2007, +} + +@article{ rogers18what, + author = {Kaleigh Rogers}, + title = {\href{https://motherboard.vice.com/en_us/article/d35kbj/americans-who-dont-have-internet}{What It's Like to Live in {America} Without Broadband {Internet}}}, + journal = {\href{https://motherboard.vice.com/en_us}{Motherboard}}, + month = apr, + day = 16, + year = 2018, + url = {https://motherboard.vice.com/en_us/article/d35kbj/americans-who-dont-have-internet}, +} + +@book{ rothenberg99avoiding, + author = {Jeff Rothenberg}, + title = {Avoiding Technological Quicksand: + Finding a Viable Technical Foundation for + Digital Preservation}, + publisher = {Council on Library and Information Resources}, + year = 1999, + month = jan, + location = {Washington, DC}, + isbn = {1-887334-63-7}, +} + +@book{ rousseau1762social, + author = {Jean-Jacques Rousseau}, + title = {The Social Contract}, + year = 1762, +} + +@book{ runciman13confidence, + author = {David Runciman}, + title = {The Confidence Trap: A History of Democracy in Crisis from World War I to the Present}, + publisher = {Princeton University Press}, + year = 2013, + isbn = {9780691148687}, +} + +%S + +@inproceedings{ saez-trumper13social, + author = {Diego Saez-Trumper and Carlos Castillo and Mounia Lalmas}, + title = {\href{https://dl.acm.org/citation.cfm?doid=2505515.2505623}{Social Media News Communities: Gatekeeping, Coverage, and Statement Bias}}, + booktitle = {\bibconf[22nd]{CIKM}{ACM International Conference on Information \& Knowledge Management}}, + month = oct, + year = 2013, + pages = {1679-1684}, +} + +@article{ samuel18rigging, + author = {Ian Samuel}, + title = {\href{https://www.theguardian.com/commentisfree/2018/nov/04/america-minority-rule-voter-suppression-gerrymandering-supreme-court}{Rigging the vote: how the American right is on the way to permanent minority rule}}, + journal = {The Guardian}, + month = nov, + day = 4, + year = 2018, +} + +@article{ savage13court, + author = {Charlie Savage}, + title = {Court Rejects Appeal Bid by Writer in Leak Case}, + journal = {New York Times}, + month = oct, + day = 15, + year = 2013, +} + +@misc{ sayke03liquid, + author = {Sayke}, + title = {Liquid Democracy}, + year = 2003, + note = {\url{https://web.archive.org/web/20040726071737/twistedmatrix.com/wiki/python/LiquidDemocracy}}, +} + +@misc{ sayke03voting, + author = {Sayke}, + title = {Liquid Democracy Voting System}, + year = 2003, + note = {\url{https://web.archive.org/web/20040518131300/twistedmatrix.com/wiki/python/LiquidDemocracyVotingSystem}}, +} + +@article{ schaub12maximizing, + author = {Hans-Peter Schaub}, + title = {\href{https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1662-6370.2012.02075.x}{Maximising Direct Democracy -- by Popular Assemblies or by Ballot Votes?}}, + journal = {Swiss Political Science Review}, + volume = 18, + number = 3, + pages = {305–331}, + month = aug, + year = 2012, +} + +@book{ schrag98paradise, + author = {Peter Schrag}, + title = {Paradise Lost: California's Experience, America's Future}, + publisher = {The New Press}, + month = apr, + year = 1998, + isbn = {978-1565843578}, +} + +@book{ schreiber75sybil, + author = {Flora Rheta Schreiber}, + title = {Sybil: the true story of a woman possessed by + sixteen separate personalities}, + publisher = {Warner Books}, + year = 1973, + url = {http://www.amazon.com/exec/obidos/tg/detail/-/0446359408/}, +} + +@article{ schwab17these, + author = {Kristin Schwab}, + title = {\href{https://www.theguardian.com/world/2017/apr/19/americans-move-canada-trump-bush-immigration}{These Americans moved to Canada for political reasons. They don't regret it}}, + journal = {The Guardian}, + month = apr, + year = 2017, +} + +@misc{ schwartz18fiduciaries, + title = {\href{https://www.eff.org/deeplinks/2018/10/information-fiduciaries-must-protect-your-data-privacy?fbclid=IwAR2Hd6n4o0hhG0GspGeTRtKx5ghHu0nz6EPBBsjJVLHFmvHS844pKn1C0_o}{“Information Fiduciaries” Must Protect Your Data Privacy}}, + author = {Adam Schwartz and Cindy Cohn}, + year = {2018 (accessed October 27, 2018)}, +} + +@misc{ schultze11diginotar, + title = {DigiNotar Hack Highlights the Critical Failures of our SSL Web Security Model}, + author = {Steve Schultze}, + year = 2011, + month = sep, + day = 6, + howpublished = {Published on \url{https://freedom-to-tinker.com/}} +} + +@misc{ scott17five, + author = {Grace Lisa Scott}, + title = {\href{https://www.inverse.com/article/36745-5-lifelike-robots-that-take-you-straight-into-the-uncanny-valley}{5 Lifelike Robots That Take You Straight Into the Uncanny Valley}}, + howpublished = {Inverse}, + month = sep, + year = 2017, +} + +@article{ selbst17meaningful, + author = {Andrew D. Selbst and Julia Powles}, + title = {\href{https://doi.org/10.1093/idpl/ipx022}{Meaningful information and the right to explanation}}, + journal = {International Data Privacy Law}, + volume = 7, + number = 4, + month = nov, + year = 2017, + pages = {233-242}, +} + +@article{ sengupta11rushdie, + author = {Somini Sengupta}, + title = {Rushdie Runs Afoul of Web's Real-Name Police}, + journal = {New York Times}, + month = nov, + day = 14, + year = 2011, +} + +@inproceedings{ serdult15fifteen, + author = {Uwe Serd\"{u}lt and Micha Germann and Fernando Mendez and + Alicia Portenier and Christoph Wellig}, + title = {\href{https://ieeexplore.ieee.org/document/7114482}{Fifteen Years of Internet Voting in Switzerland: History, Governance and Use}}, + booktitle = {\bibconf[2nd]{ICEDEG}{International Conference on + eDemocracy \& eGovernment}}, + month = apr, + year = 2015, + location = {Quito, Ecuador}, +} + +@article{ shao18spread, + author = {Chengcheng Shao and Giovanni Luca Ciampaglia and Onur Varol + and Kai-Cheng Yang and Alessandro Flammini + and Filippo Menczer}, + title = {\href{https://www.nature.com/articles/s41467-018-06930-7}{The spread of low-credibility content by social bots}}, + journal = {Nature Communications}, + volume = 9, + month = nov, + year = 2018, +} + +@article{ shaw04, + author = {Russell Shaw}, + title = {\href{http://www.imediaconnection.com/content/3649.asp}{Avoid the Spam Filter}}, + journal = {iMedia Connection}, + month = jun, + day = 16, + year = 2004, + url = {http://www.imediaconnection.com/content/3649.asp}, +} + +@book{ shlapentokh11feudal, + author = {Vladimir Shlapentokh and Joshua Woods}, + title = {Feudal America: Elements of the Middle Ages + in Contemporary Society}, + publisher = {Penn State University Press}, + month = jan, + year = 2011, + isbn = {0271037814}, +} + +@article{ shubik70homo, + author = {Martin Shubik}, + title = {\href{https://link.springer.com/content/pdf/10.1007/BF01718192.pdf}{On Homo Politicus and the Instant Referendum}}, + journal = {Public Choice}, + year = 1970, + volume = 9, + pages = {79-84}, +} + +@article{ simon06impact, + author = {Simon Luechinger and Myra Rosinger and Alois Stutzer}, + title = {The Impact of Postal Voting on Participation: + Evidence for {S}witzerland}, + journal = {Swiss Political Science Review}, + volume = 13, + number = 2, + year = 2007, + pages = {167-202}, +} + +@book{ skocpol13tea, + author = {Theda Skocpol and Vanessa Williamson}, + title = {The Tea Party and the Remaking of Republican Conservatism}, + year = 2013, + publisher = {Oxford University Press}, + isbn = {978-0190633660}, +} + +@book{ skyrms14evolution, + author = {Brian Skyrms}, + title = {Evolution of the Social Contract}, + edition = {2nd}, + month = oct, + year = 2014, + isbn = {978-1107434288}, +} + +@article{ smith14political, + author = {Warwick Smith}, + title = {\href{https://www.theguardian.com/commentisfree/2014/sep/11/political-donations-corrupt-democracy-in-ways-you-might-not-realise}{Political donations corrupt democracy in ways you might not realise}}, + month = sep, + year = 2014, +} + +@inproceedings{ solorio14sockpuppet, + author = {Thamar Solorio and Ragib Hasan and Mainul Mizan}, + title = {\href{http://www.lrec-conf.org/proceedings/lrec2014/pdf/1007_Paper.pdf}{Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities}}, + booktitle = {\bibconf[9th]{LREC}{International Conference on Language Resources and Evaluation}}, + month = may, + year = 2014, + location = {Reykjavik, Iceland}, +} + +@book{ solove11nothing, + author = {Daniel J. Solove}, + title = {Nothing to Hide: The False Tradeoff Between + Privacy and Security}, + year = 2011, + publisher = {Yale University Press}, + isbn = {978-0-300-17231-7}, +} + +@misc{ soltani09flash, + author = {Ashkan Soltani and Shannon Canty and Quentin Mayo + and Lauren Thomas and Chris Jay Hoofnagle}, + title = {Flash Cookies and Privacy}, + booktitle = {SSRN preprint}, + month = aug, + year = 2009, +} + +@misc{ spamnation, + author = {Spamnation}, + title = {Spam Statistics}, + note = {\url{http://spamnation.info/stats/}}, + url = {http://spamnation.info/stats/}, +} + +@misc{ speck13money, + author = {Bruno Wilhelm Speck and Paloma Baena Olabe}, + title = {Money in Politics: Sound Political Competition + and Trust in Government}, + month = nov, + year = 2013, + note = {OECD Background Paper}, +} + +@article{ srinivasan18poverty, + author = {Janaki Srinivasan and Savita Bailur and Emrys Schoemaker and + Sarita Seshagiri}, + title = {\href{https://ijoc.org/index.php/ijoc/article/view/7046}{The Poverty of Privacy: Understanding Privacy Trade-Offs From Identity Infrastructure Users in India}}, + journal = {International Journal of Communication}, + volume = 12, + month = mar, + year = 2018, + pages = {1228–1247}, +} + +@article{ stallings95pgp, + author = {William Stallings}, + title = {The {PGP Web of Trust}}, + journal = {BYTE Magazine}, + volume = 20, + number = 2, + month = feb, + year = 1995, + pages = {161--164}, +} + +@article{ stein03queers, + author = {Edward Stein}, + title = {Queers Anonymous: Lesbians, Gay Men, Free Speech, + and Cyberspace}, + journal = {Harvard Civil Rights-Civil Liberties Law Review}, + year = 2003, + url = {http://www.law.harvard.edu/students/orgs/crcl/vol38_1/stein.php}, +} + +@article{ stewart18republicans, + author = {Emily Stewart}, + title = {\href{https://www.vox.com/policy-and-politics/2018/10/17/17990064/republican-tax-cuts-bill-2018-midterm-elections}{Republicans were supposed to run on their tax cuts. Instead, they’re running away from them.}}, + journal = {Vox}, + month = oct, + day = 17, + year = 2018, +} + +@article{ stone07hand, + author = {Brad Stone and Matt Richtel}, + title = {\href{http://www.nytimes.com/2007/07/16/technology/16blog.html}{The Hand That Controls the Sock Puppet Could Get Slapped}}, + journal = {New York Times}, + month = jul, + day = 16, + year = 2007, + url = {http://www.nytimes.com/2007/07/16/technology/16blog.html}, +} + +@article{ stone08, + author = {Brad Stone}, + title = {Breaking {Google} {Captchas} for Some Extra Cash}, + journal = {New York Times}, + month = mar, + day = 13, + year = 2008, + url = {http://bits.blogs.nytimes.com/2008/03/13/breaking-google-captchas-for-3-a-day/}, +} + +@misc{ studer98wir, + author = {Tobias Studer}, + title = {\href{http://base.socioeco.org/docs/wir_and_the_swiss_national_economy.pdf}{{WIR} and the {Swiss} National Economy}}, + year = 1998, + translator = {Philip H. Beard}, + url = {http://base.socioeco.org/docs/wir_and_the_swiss_national_economy.pdf}, +} + +@article{ swierczek11fiveyears, + title = {5 years of {Liquid Democracy} in {Germany}}, + author = {Bj\"orn Swierczek}, + journal = {The Liquid Democracy Journal}, + month = mar, + year = 2014, + volume = 1, +} + +%T + +@article{ taub17why, + author = {Amanda Taub}, + title = {\href{https://www.nytimes.com/2017/04/12/upshot/why-americans-vote-against-their-interest-partisanship.html}{Why Americans Vote `Against Their Interest': Partisanship}}, + journal = {New York Times}, + month = apr, + day = 12, + year = 2017, +} + +@article{ teich99anonymous, + author = {Al Teich and Mark S. Frankel and Rob Kling + and {Ya-ching} Lee}, + title = {Anonymous Communication Policies for the {Internet}: + Results and Recommendations of the {AAAS} Conference}, + journal = {Information Society}, + month = may, + year = 1999, + url = {http://www.indiana.edu/~tisj/readers/full-text/15-2%20teich.pdf#search=%22Anonymous%20Communication%20Policies%22}, +} + +@misc{ templeton01remember, + author = {Brad Templeton}, + title = {\href{https://web.archive.org/web/20050824032345/http://www.oreillynet.com/pub/a/network/2001/12/21/usenet.html?page=1}{I Remember {USENET}}}, + howpublished = {O'Reilly Network}, + month = dec, + day = 21, + year = 2001, +} + +@misc{ templeton01origin, + author = {Brad Templeton}, + title = {\href{https://web.archive.org/web/20050825120621/http://www.templetons.com/brad/spamterm.html}{Origin of the term ``spam'' to mean net abuse}}, + howpublished = {O'Reilly Network}, + month = dec, + year = 2001, +} + +@misc{ templeton03reflections, + author = {Brad Templeton}, + title = {\href{https://web.archive.org/web/20050826005609/http://www.templetons.com/brad/spam/spam25.html}{Reflections on the 25th Anniversary of Spam}}, + howpublished = {O'Reilly Network}, + month = may, + year = 2003, +} + +@article{ thompson06, + author = {Bill Thompson}, + title = {Not as wiki as it used to be}, + journal = {BBC News}, + month = aug, + day = 25, + year = 2006, + url = {http://news.bbc.co.uk/2/hi/technology/5286458.stm}, +} + +@article{ tisdall18american, + author = {Simon Tisdall}, + title = {\href{https://www.theguardian.com/commentisfree/2018/aug/07/american-democracy-crisis-trump-supreme-court}{American democracy is in crisis, and not just because of Trump}}, + month = aug, + day = 7, + year = 2018, +} + +@article{ tracy13tally, + author = {Ryan Tracy}, + title = {\href{http://www.wsj.com/articles/SB10001424052702304579404579232343313671258}{Tally of U.S. Banks Sinks to Record Low}}, + journal = {The Wall Street Journal}, + month = dec, + year = 2013, +} + +@book{ tullock67toward, + author = {Gordon Tullock}, + title = {Toward a Mathematics of Politics}, + publisher = {The University of Michigan Press}, + month = dec, + year = 1967, + isbn = {978-0472061877}, +} + +@article{ turner05picturing, + author = {Tammara Combs Turner and Marc A. Smith and Danyel Fisher + and Howard T. Welser}, + title = {\href{https://doi.org/10.1111/j.1083-6101.2005.tb00270.x}{Picturing Usenet: Mapping Computer-Mediated Collective Action}}, + journal = {Journal of Computer-Mediated Communication}, + volume = 10, + number = 4, + month = jul, + year = 2005, +} + +%M + +@inproceedings{ macdorman06subjective, + author = {Karl F. MacDorman}, + title = {Subjective Ratings of Robot Video Clips for Human Likeness, Familiarity, and Eeriness: An Exploration of the Uncanny Valley}, + booktitle = {ICCS/CogSci-2006 Symposium: Toward Social Mechanisms of Android Science}, + month = jul, + year = 2006, + pages = {26–29}, + location = {Vancouver, Canada}, +} + +@article{ madestam13political, + author = {Andreas Madestam and Daniel Shoag and Stan Veuger + and David Yanagizawa-Drott}, + title = {\href{https://academic.oup.com/qje/article/128/4/1633/1849540}{Do Political Protests Matter? Evidence from the Tea Party Movement}}, + journal = {The Quarterly Journal of Economics}, + volume = 128, + number = 4, + month = nov, + year = 2013, + pages = {1633–1685}, +} + +@article{ mala18who, + author = {Elisa Mala}, + title = {\href{https://www.nytimes.com/2018/05/18/style/cryptokitty-auction.html}{Who Spends \$140,000 on a CryptoKitty?}}, + journal = {The New York Times}, + month = may, + day = 18, + year = 2018, +} + +@book{ manza08locked, + author = {Jeff Manza and Christopher Uggen}, + title = {Locked Out: Felon Disenfranchisement and American Democracy}, + publisher = {Oxford University Press}, + month = apr, + year = 2008, + isbn = {978-0195341942}, +} + +@incollection{ mastini18ideas, + title = {Ideas for Sufficiency}, + booktitle = {\href{http://www.foeeurope.org/sites/default/files/resource_use/2018/foee_sufficiency_booklet.pdf}{Sufficiency: Moving Beyond the Gospel of Eco-Efficiency}}, + chapter = {8}, + month = mar, + year = 2018, +} + +@misc{ may19inaccessibility, + author = {Matt May}, + title = {\href{https://www.w3.org/TR/turingtest/}{Inaccessibility of {CAPTCHA:} Alternatives to Visual Turing Tests on the Web}}, + note = {W3C Working Draft 14}, + month = feb, + year = 2019, +} + +@incollection{ mbiti16mobile, + author = {Isaac Mbiti and David N. Weil}, + title = {\href{https://www.nber.org/chapters/c13367}{Mobile Banking: The Impact of M-Pesa in Kenya}}, + booktitle = {African Successes, Volume III: Modernization and Development}, + editor = {Sebastian Edwards and Simon Johnson and David N. Weil}, + publisher = {University of Chicago Press}, + month = sep, + year = 2016, + pages = {247-293}, + isbn = {978-0-226-31572-0}, +} + +@article{ meek69nouvelle, + author = {B. L. Meek}, + title = {Une nouvelle approche du scrutin transf\'{e}rable}, + journal = {Math\'{e}matiques et Sciences humaines}, + volume = 25, + year = 1969, + pages = {13-23}, +} + +@article{ mendel20weve, + author = {Gideon Mendel}, + title = {\href{https://www.theguardian.com/australia-news/2020/feb/01/pissed-mother-nature-off-big-time-coming-home-after-australia-fires}{`We've pissed mother nature off, big time': the people coming home after Australia's fires}}, + journal = {The Guardian}, + month = feb, + year = 2020, +} + +@article{ mendez17what, + author = {Fernando Mendez and Uwe Serd\"{u}lt}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S0740624X17301624}{What drives fidelity to internet voting? Evidence from the roll–out of internet voting in {Switzerland}}}, + journal = {Government Information Quarterly}, + volume = 34, + number = 3, + month = sep, + year = 2017, + pages = {511-523}, +} + +@article{ messias13you, + author = {Johnnatan Messias and Lucas Schmidt and + Ricardo Oliveira and Fabr\'{i}cio Benevenuto}, + title = {\href{https://firstmonday.org/article/view/4217/3700}{You followed my bot! Transforming robots into influential users in Twitter}}, + volume = 18, + number = 7, + month = jul, + year = 2013, +} + +@article{ miller08teruko, + author = {Jill Miller}, + title = {\href{http://intersections.anu.edu.au/issue17/miller.htm}{Teruko Mizushima: Pioneer Trader in Time as a Currency}}, + journal = {Intersections: Gender and Sexuality in Asia and the Pacific}, + issue = 17, + month = jul, + year = 2008, + url = {http://intersections.anu.edu.au/issue17/miller.htm}, +} + +@inproceedings{miller17zero, + title={\href{https://ieeexplore.ieee.org/document/7966964}{Zero-collateral lotteries in Bitcoin and Ethereum}}, + author={Miller, Andrew and Bentov, Iddo}, + booktitle={Security and Privacy Workshops (EuroS\&PW), 2017 IEEE European Symposium on}, + pages={4--13}, + year={2017}, + organization={IEEE} +} + +@article{ miller69program, + author = {James C. {Miller III}}, + title = {A Program for Direct and Proxy Voting + in the Legislative Process}, + journal = {Public Choice}, + volume = 7, + year = 1969, + pages = {107-113}, +} + +@article{ mori12uncanny, + author = {Masahiro Mori}, + title = {\href{https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6213238}{The Uncanny Valley}}, + journal = {IEEE Robotics \& Automation Magazine}, + month = jun, + year = 2012, + note = {Translated by Karl F. MacDorman and Norri Kageki}, +} + +@article{ moynihan04building, + author = {Donald P. Moynihan}, + title = {Building Secure Elections: + E-Voting, Security, and Systems Theory}, + journal = {Public Administration Review}, + volume = 64, + number = 5, + month = sep, + year = 2004, + pages = {515-528}, +} + +@article{ muhle18survey, + author = {Alexander M\"uhle and Andreas Gr\"uner and + Tatiana Gayvoronskaya and Christoph Meinel}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S1574013718301217}{A survey on essential components of a self-sovereign identity}}, + journal = {Computer Science Review}, + month = nov, + year = 2018, + volume = 30, + pages = {80-86}, +} + + +%N + +@misc{ nanalyze17six, + author = {nanalyze}, + title = {\href{https://www.nanalyze.com/2017/09/6-digital-identity-verification-startups/}{6 Digital Identity Verification Startups to Check Out}}, + month = sep, + year = 2017, +} + +@misc{ nimses17, + author = {Nimses}, + title = {\href{https://nimses.com/}{One Nim is One Minute of Human Life}}, + year = 2017, +} + +@misc{ noyer16thoughts, + author = {Christian Noyer}, + title = {\href{https://www.bis.org/review/r160115c.htm}{Thoughts on the zero lower bound in relation with monetary and financial stability}}, + month = jan, + day = 12, + year = 2016, + url = {https://www.bis.org/review/r160115c.htm}, + notes = {Speech by Mr Christian Noyer, Honorary Governor of the Bank of France and Former Chairman of the Board of Directors of the Bank for International Settlements, at the Farewell Symposium in his honour, held by the Bank of France and the Bank for International Settlements, Paris, 12 January 2016.}, +} + +@misc{ nygren15proof, + author = {Johan Nygren}, + title = {\href{http://proofofindividuality.online/}{Proof-of-individuality anti-sybil token}}, + year = 2015, + url = {http://proofofindividuality.online/}, +} + +%U + +@article{ ulery11accuracy, + author = {Bradford T. Ulery and R. Austin Hicklin and JoAnn Buscaglia + and Maria Antonia Roberts}, + title = {\href{https://www.jstor.org/stable/pdf/41242255.pdf}{Accuracy and reliability of forensic latent fingerprint decisions}}, + journal = {Proceedings of the National Academy of Sciences of the United States of America}, + volume = 108, + number = 19, + month = may, + day = 10, + year = 2011, + publisher = {National Academy of Sciences}, +} + +@book{ un12millennium, + title = "The Millennium Development Goals Report", + publisher = "United Nations", + address = "New York", + month = jun, + year = 2012, +} + +@misc{ un48universal, + author = "United Nations General Assembly", + title = "The Universal Declaration of Human Rights", + howpublished = {Resolution 217 {A (III)}}, + month = dec, + year = 1948, +} + +@misc{ un50statute, + author = "United Nations General Assembly", + title = "Statute of the Office of the United + Nations High Commissioner for Refugees", + howpublished = {Resolution 428{(V)}}, + month = dec, + year = 1950, +} + +%V + +@book{ vinge93fire, + author = {Vernor Vinge}, + title = {A Fire Upon The Deep}, + publisher = {Tor Science Fiction}, + month = feb, + year = 1993, + isbn = {978-0812515282}, +} + +@article{ volokh00freedom, + author = {Eugene Volokh}, + title = {Freedom of Speech and Information Privacy: + The Troubling Implications of a Right to Stop People + from Speaking about You}, + journal = {Stanford Law Review}, + month = may, + year = 2000, +} + +@article{ vries18bitcoin, + author = {Alex {de Vries}}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S2542435118301776}{Bitcoin's Growing Energy Problem}}, + journal = {Joule}, + volume = 2, + number = 5, + month = may, + year = 2018, + pages = {801-805}, +} + +%W + +@misc{ wagner16swiss, + author = {Che Wagner}, + title = {\href{https://medium.com/economicsecproj/the-swiss-universal-basic-income-vote-2016-d74ae9beafea}{The Swiss Universal Basic Income Vote 2016: What’s Next?}}, + month = feb, + year = 2017, +} + +@misc{ wallace99nameless, + author = {Jonathan D. Wallace}, + title = {Nameless in Cyberspace: Anonymity on the Internet}, + note = {Cato Briefing Paper No. 54}, + month = dec, + day = 8, + year = 1999, + url = {http://www.cato.org/pubs/briefs/bp54.pdf}, +} + +@article{ warren94counting, + author = {C. H. E. Warren}, + title = {\href{http://www.votingmatters.org.uk/ISSUE1/P4.HTM}{Counting in STV elections}}, + journal = {Voting matters}, + volume = 1, + month = mar, + year = 1994, +} + +@article{ weiskel05sidekick, + author = {Timothy C. Weiskel}, + title = {\href{https://doi.org/10.1177%2F0002764205280203}{From Sidekick to Sideshow--- Celebrity, Entertainment, and the Politics of Distraction}}, + journal = {American Behavioral Scientist}, + volume = 49, + number = 3, + month = nov, + year = 2005, + pages = {393-409}, +} + +@article{ weiss06principles, + author = {Weiss, Thomas G.}, + title = {Principles, Politics, and Humanitarian Action}, + month = apr, + year = 2006, + journal = {Ethics \& International Affairs}, + volume = 13, + number = 1, +} + +@article{ weitzer15human, + author = {Ronald Weitzer}, + title = {\href{https://doi.org/10.1146/annurev-soc-073014-112506}{Human Trafficking and Contemporary Slavery}}, + journal = {Annual Review of Sociology}, + volume = 41, + month = aug, + year = 2015, + pages = {223-242}, +} + +@article{ white11differences, + title = {Differences in Medicine, Differences in Ethics}, + author={White, Luise}, + journal={Evidence, Ethos and Experiment: + The Anthropology and History of Medical Research in Africa}, + editor = {Geissler, P. Wenzel and Molyneux, Catherine}, + pages = {445--461}, + year = {2011}, + publisher = {Berghahn Books} +} + +@misc{ wikileaks, + key = {WikiLeaks}, + title = {WikiLeaks}, + note = {\url{http://wikileaks.org/}}, +} + +@misc{ windowsliveid, + author = {{Windows Live ID}}, + note = {\url{http://www.passport.net/}}, + url = {http://www.passport.net/}, +} + +@article{ woolley16automating, + author = {Samuel C. Woolley}, + title = {\href{https://uncommonculture.org/ojs/index.php/fm/article/view/6161/5300}{Automating power: Social bot interference in global politics}}, + journal = {First Monday}, + volume = 21, + number = 4, + month = apr, + year = 2016, +} + +@misc{ woolley17computational, + author = {Samuel C. Woolley and Douglas R. Guilbeault}, + title = {\href{https://comprop.oii.ox.ac.uk/research/working-papers/computational-propaganda-in-the-united-states-of-america-manufacturing-consensus-online/}{Computational Propaganda in the United States of America: Manufacturing Consensus Online}}, + note = {Working Paper No. 2017.5}, + year = 2017, +} + +@misc{ wouters05, + author = {Paul Wouters}, + title = {Personal spam statistics 1997-2004}, + note = {\url{http://www.xtdnet.nl/paul/spam/}}, + month = jan, + year = 2005, +} + +@inproceedings{ wright11finegrained, + author = {Joss Wright and Tulio {de Souza} and Ian Brown}, + title = {Fine-Grained Censorship Mapping + Information Sources, Legality and Ethics}, + booktitle = {\bibconf{FOCI}{Workshop on Free and Open Communications + on the Internet}}, + month = aug, + year = 2011, + location = {San Francisco, CA}, +} + +@article{ wu18settled, + author = {Tim Wu}, + title = {\href{https://www.theguardian.com/commentisfree/2018/nov/19/shallow-conception-democracy-tim-wu}{We've settled on a shallow conception of democracy. And that's dangerous}}, + journal = {The Guardian}, + month = nov, + day = 19, + year = 2018, +} + +%Y + +@article{ yale61, + author = {{Yale Law Journal}}, + title = {The Constitutional Right to Anonymity: + Free Speech, Disclosure and the Devil}, + journal = {Yale Law Journal}, + volume = 70, + number = 7, + month = jun, + year = 1961, + pages = {1084-1128}, + type = {Note} +} + +@inproceedings{ yamak16detection, + author = {Zaher Yamak and Julien Saunier and Laurent Vercouter}, + title = {\href{https://dl.acm.org/citation.cfm?doid=2872518.2890586}{Detection of Multiple Identity Manipulation in Collaborative Projects}}, + booktitle = {\bibconf[25th]{WWW Companion}{International Conference Companion on World Wide Web}}, + month = apr, + year = 2016, + pages = {955-960}, +} + +@article{ yamakawa07toward, + author = {Hiroshi Yamakawa and Michiko Yoshida and Motohiro Tsuchiya}, + title = {Toward Delegated Democracy: + Vote by Yourself, or Trust Your Network}, + journal = {International Journal of Social, Human Science and Engineering}, + volume = 1, + number = 6, + year = 2007, +} + +@misc{ ycr17basic, + author = {{Y Combinator Research}}, + title = {\href{https://static1.squarespace.com/static/599c23b2e6f2e1aeb8d35ec6/t/59c3188c4c326da3497c355f/1505958039366/YCR-Basic-Income-Proposal.pdf}{Basic Income Project Proposal}}, + month = sep, + year = 2017, +} + +@article{ yokoo04, + author = {Makoto Yokoo and Yuko Sakurai and Shigeo Matsubara}, + title = {The Effect of False-name Bids in Combinatorial Auctions: + New Fraud in {Internet} Auctions}, + journal = {Games and Economic Behavior}, + volume = 46, + number = 1, + pages = {174-188}, + month = jan, + year = 2004, +} + +@misc{ yahoo08captcha, + title = {{Yahoo CAPTCHA is Broken}}, + note = {\url{http://network-security-research.blogspot.com/}}, + month = jan, + year = 2008 +} + +%Z + +@book{ zinn05peoples, + author = { Howard Zinn }, + title = {A People's History of the {United States}}, + publisher = {Harper Perennial Modern Classics}, + month = aug, + year = 2005, + isbn = {978-0060838652}, +} + +@book{ zupan17inside, + author = {Mark A. Zupan}, + title = {Inside Job: How Government Insiders Subvert the Public Interest}, + publisher = {Cambridge University Press}, + month = mar, + year = 2017, + isbn = {978-1316607770}, +} + + diff --git a/pdf/theory.bib b/pdf/theory.bib new file mode 100644 index 0000000..02fcaef --- /dev/null +++ b/pdf/theory.bib @@ -0,0 +1,704 @@ + +%A +@article{archetti12game, + title={Game theory of public goods in one-shot social dilemmas without assortment}, + author={Archetti, Marco and Scheuring, Istvan}, + journal={Journal of theoretical biology}, + volume={299}, + pages={9--20}, + year={2012}, + publisher={Elsevier} +} + +@article{ alistarh18communication, + author = {Dan Alistarh and James Aspnes and Valerie King and + Jared Saia}, + title = {\href{https://link.springer.com/article/10.1007/s00446-017-0315-1}{Communication-efficient randomized consensus}}, + volume = 31, + pages = {pages489–501}, + month = nov, + year = 2018, +} + +@article{ aspnes03randomized, + author = {James Aspnes}, + title = {\href{https://link.springer.com/article/10.1007%2Fs00446-002-0081-5}{Randomized protocols for asynchronous consensus}}, + journal = {Distributed Computing}, + volume = 16, + number = {2--3}, + pages = {165--175}, + month = sep, + year = 2003, +} + +@article{ aspnes15faster, + author = {James Aspnes}, + title = {\href{https://link.springer.com/article/10.1007%2Fs00446-013-0195-y}{Faster randomized consensus with an oblivious adversary}}, + journal = {Distributed Computing}, + volume = 28, + number = 1, + month = feb, + year = 2015, + pages = {21-29}, +} + +@inproceedings{ aumann96efficient, + author = {Yonatan Aumann and Michael A. Bender}, + title = {\href{https://doi.org/10.1007/3-540-61440-0_164}{Efficient Asynchronous Consensus with the Value-Oblivious Adversary Scheduler}}, + booktitle = {\bibconf[23rd]{ICALP}{International Colloquium on + Automata, Languages and Programming}}, + month = jul, + year = 1996, + location = {Paderborn, Germany}, +} + +@article{ aumann05efficient, + author = {Yonatan Aumann and Michael A. Bender}, + title = {\href{https://link.springer.com/article/10.1007%2Fs00446-004-0113-4}{Efficient low-contention asynchronous consensus with the value-oblivious adversary scheduler}}, + journal = {Distributed Computing}, + volume = 17, + number = 3, + month = mar, + year = 2005, + pages = {191-207}, +} + +@article{avarikioti19divide, + title={Divide and Scale: Formalization of Distributed Ledger Sharding Protocols}, + author={Avarikioti, Georgia and Kokoris-Kogias, Eleftherios and Wattenhofer, Roger}, + journal={arXiv preprint arXiv:1910.10434}, + year={2019} +} + +@article{ awerbuch85complexity, + author = {Baruch Awerbuch}, + title = {\href{https://dl.acm.org/citation.cfm?id=4227}{Complexity of Network Synchronization}}, + journal = {Journal of the Association for Computing Machinery}, + volume = 32, + number = 4, + month = oct, + year = 1985, + pages = {804-823}, +} + + +%B + +@article{babai2006probability, + title={The probability of generating the symmetric group when one of the generators is random}, + author={Babai, Laszlo and Hayes, Thomas P.}, + journal={Publ. Math. Debrecen}, + volume={69}, + number={3}, + pages={271--280}, + year={2006}, + publisher={Citeseer} +} + +@inproceedings{ bangalore18almost, + author = {Laasya Bangalore and Ashish Choudhury and Arpita Patra}, + title = {\href{https://dl.acm.org/citation.cfm?id=3212735}{Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited}}, + booktitle = {\bibconf{PODC}{Principles of Distributed Computing}}, + month = jul, + year = 2018, + pages = {295-304}, +} + +@incollection{bellare03forward, + title={Forward-security in private-key cryptography}, + author={Bellare, Mihir and Yee, Bennet}, + booktitle = {\bibconf['03]{CT-RSA}{Topics in Cryptology - CT RSA }}, + year={2003}, +} + +@inproceedings{bellare93defining, + title={On defining proofs of knowledge}, + author={Bellare, Mihir and Goldreich, Oded}, + booktitle = {\bibconf['92]{CRYPTO}{Advances in Cryptology }}, + year={1993}, +} + +@inproceedings{ ben-or83another, + author = {Michael Ben-Or}, + title = {Another advantage of free choice: + Completely asynchronous agreement protocols}, + booktitle = {Principles of Distributed Computing (PODC)}, + year = 1983, +} + +@inproceedings{ ben-or85fast, + author = {Michael Ben-Or}, + title = {\href{https://dl.acm.org/citation.cfm?id=323609}{Fast Asynchronous Byzantine Agreement (Extended Abstract)}}, + booktitle = {\bibconf[4th]{PODC}{Principles of Distributed Computing}}, + year = 1985, + pages = {149-151}, + location = {Minaki, Ontario, Canada}, +} + +@inproceedings{ bracha84asynchronous, + author = {Gabriel Bracha}, + title = {\href{https://dl.acm.org/citation.cfm?id=806743}{An asynchronous [(n-1)/3]-Resilient Consensus Protocol}}, + booktitle = {\bibconf[3rd]{PODC}{ACM Symposium on Principles of Distributed Computing}}, + year = 1984, + location = {Vancouver, British Columbia, Canada}, +} +% pages = {154-162}, + +@article{ bracha85asynchronous, + author = {Gabriel Bracha and Sam Toueg}, + title = {\href{https://dl.acm.org/citation.cfm?id=214134}{Asynchronous Consensus and Broadcast Protocols}}, + journal = {Journal of the Association for Computing Machinery (JACM)}, + volume = 32, + number = 4, + year = 1985, +} +% pages = {824-840}, + + +%C + +@book{ cachin11introduction, + author = {Christian Cachin and Rachid Guerraoui Lu\'is Rodrigues}, + title = {Introduction to Reliable and Secure Distributed Programming}, + publisher = {Springer}, + month = feb, + year = 2011, + isbn = {978-3642152597}, +} + +@misc{ cachin19asymmetric, + author = {Christian Cachin and Bj\"orn Tackmann}, + title = {\href{https://arxiv.org/pdf/1906.09314.pdf}{Asymmetric Distributed Trust}}, + month = jun, + year = 2019, +} + +@techreport{ camenisch97proof, + author = {Jan Camenisch and Markus Stadler}, + title = {Proof Systems for General Statements about Discrete + Logarithms}, + institution = {Dept. of Computer Science, ETH Zurich}, + year = 1997, + month = {March}, + number = 260, +} + +@inproceedings{ canetti93fast, + author = {Ran Canetti and Tal Rabin}, + title = {\href{https://dl.acm.org/citation.cfm?id=167105}{Fast Asynchronous Byzantine Agreement with Optimal Resilience}}, + booktitle = {\bibconf[25th]{STOC}{ACM Symposium on Theory of computing}}, + month = may, + year = 1993, + location = {San Diego, California, USA}, + pages = {42-51}, +} + +% long version: unpublished? +@misc{ canetti98fast, + author = {Ran Canetti and Tal Rabin}, + title = {\href{http://people.csail.mit.edu/canetti/materials/cr93.ps}{Fast Asynchronous Byzantine Agreement with Optimal Resilience}}, + month = sep, + year = 1998, + institution = {IBM T.J. Watson Research Center}, +} + +@inproceedings{ clarkson08civitas , + author = {Clarkson, M.R. and Chong, S. and Myers, A.C.}, + booktitle = {IEEE \bibconf{SP}{Symposium on Security and Privacy}}, + title = {Civitas: Toward a Secure Voting System}, + year = {2008}, + month = {may}, +} + +@article{ cristian95atomic, + author = {Flaviu Cristian and Houtan Aghili and Ray Strong and + Danny Dolev}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S0890540185710607}{Atomic Broadcast: From Simple Message Diffusion to Byzantine Agreement}}, + journal = {Information and Computation}, + volume = 118, + number = 1, + month = apr, + year = 1995, + pages = {158-179}, +} + +%D + +@article{ defago04total, + author = {Xavier D\'efago and Andr\'e Schiper and P\'eter Urb\'an}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/1041680.1041682}{Total Order Broadcast and Multicast Algorithms:Taxonomy and Survey}}, + journal = {ACM Computing Surveys}, + month = dec, + year = 2004, +} + +%F + +@article{ feigenbaum08graph, + author = {Joan Feigenbaum and Sampath Kannan and Andrew McGregor + and Siddharth Suri and Jian Zhang}, + title = {Graph Distances in the Data-Stream Model}, + journal = {SIAM Journal on Computing}, + volume = 38, + year = 2008, + pages = {1709-1727}, +} + +@article{ feigenbaum05graph, + author = {Joan Feigenbaum and Sampath Kannan and Andrew McGregor + and Siddharth Suri and Jian Zhang}, + title = {On Graph Problems in a Semi-Streaming Model}, + journal = {Theoretical Computer Science}, + volume = 348, + year = 2005, + pages = {207-216}, +} + +@article{ feigenbaum05computing, + author = {Joan Feigenbaum and Sampath Kannan and Jian Zhang}, + title = {Computing Diameter in the Streaming and Sliding-Window Models}, + journal = {Algorithmica}, + volume = 41, + year = 2005, + pages = {25-41}, +} + +@inproceedings{ feldman88optimal, + author = {Paul Feldman and Silvio Micali}, + title = {\href{https://dl.acm.org/citation.cfm?id=62225}{Optimal Algorithms for Byzantine Agreement}}, + booktitle = {\bibconf[20th]{STOC}{Symposium on Theory of Computing}}, + month = may, + year = 1988, + pages = {148-161}, + location = {Chicago, Illinois, USA}, +} + +@phdthesis{ feldman88thesis, + author = {Paul Feldman}, + title = {\href{https://dspace.mit.edu/bitstream/handle/1721.1/14368/20051076-MIT.pdf}{Optimal Algorithms for Byzantine Agreement}}, + school = {Massachusetts Institute of Technology}, + month = may, + year = 1988, +} + +@article{ fischer85impossibility, + title={\href{https://groups.csail.mit.edu/tds/papers/Lynch/jacm85.pdf}{Impossibility of distributed consensus with one faulty process}}, + author={Fischer, Michael J and Lynch, Nancy A and Paterson, Michael S}, + journal={Journal of the ACM (JACM)}, + volume={32}, + number={2}, + pages={374--382}, + year={1985}, + publisher={ACM} +} + +@article{ friedman05simple, + author = {Roy Friedman and Achour Mostefaoui and Michel Raynal}, + title = {Simple and Efficient Oracle-Based Consensus Protocols + for Asynchronous {Byzantine} Systems}, + journal = {IEEE Transactions on Dependable and Secure Computing}, + volume = 2, + number = 1, + month = jan, + year = 2005, +} + + +%J + +@book{ johnson77urn, + author = {Norman Lloyd Johnson}, + title = {Urn models and their application: An approach to modern discrete probability theory}, + publisher = {Wiley}, + year = 1977, + isbn = {978-0471446309}, +} + +%K + +%L + +@book{ lynch96distributed, + author = {Nancy A. Lynch}, + title = {Distributed Algorithms}, + publisher = {Morgan Kaufmann}, + month = mar, + year = 1996, + isbn = {978-1558603486}, +} + + +%M + +@book{ mahmoud08polya, + author = {Hosam Mahmoud}, + title = {P\'olya Urn Models}, + publisher = {Chapman and Hall/CRC}, + month = jun, + year = 2008, + isbn = {978-1420059830}, +} + +@inproceedings{merkle88digital, + title={\href{https://people.eecs.berkeley.edu/~raluca/cs261-f15/readings/merkle.pdf}{A Digital Signature Based on a Conventional Encryption Function}}, + author={Merkle, Ralph C}, + booktitle={\bibconf{CRYPTO}{Advances in Cryptology}}, + year={1988}, +} + +@article{ moran58random, + author = {{P. A. P.} Moran}, + title = {Random Processes in Genetics}, + journal = {\href{https://doi.org/10.1017/S0305004100033193}{Mathematical Proceedings of the Cambridge Philosophical Society}}, + volume = 54, + number = 1, + month = jan, + year = 1958, + pages = {60-71}, +} + +@inproceedings{ mostefaoui14signature, + author = {Achour Most\'efaoui and Hamouma Moumen and Michel Raynal}, + title = {\href{https://dl.acm.org/citation.cfm?id=2611468}{Signature-Free Asynchronous Byzantine Consensus with $t < n/3$ and $O(n^2)$ Messages}}, + booktitle = {\bibconf{PODC}{Principles of Distributed Computing}}, + month = jul, + year = 2014, + location = {Paris, France}, +} + +@inproceedings{munro92detskiplists, + author = {Munro, J. Ian and Papadakis, Thomas and Sedgewick, Robert}, + title = {\href{http://www.ic.unicamp.br/~celio/peer2peer/skip-net-graph/deterministic-skip-lists-munro.pdf}{Deterministic Skip Lists}}, + booktitle = {Proceedings of the Third Annual ACM-SIAM Symposium on Discrete Algorithms}, + series = {SODA '92}, + year = {1992}, + isbn = {0-89791-466-X}, + location = {Orlando, Florida, USA}, + pages = {367--375}, + numpages = {9}, + url = {http://dl.acm.org/citation.cfm?id=139404.139478}, + acmid = {139478}, + publisher = {Society for Industrial and Applied Mathematics}, + address = {Philadelphia, PA, USA}, +} + + +%N + +@book{ nowak06evolutionary, + author = {Martin A. Nowak}, + title = {Evolutionary Dynamics: Exploring the Equations of Life}, + publisher = {Belknap Press}, + month = sep, + year = 2006, + isbn = {978-0674023383}, +} + + +%P + +@article{pease80reaching, + author={Pease, Marshall and Shostak, Robert and Lamport, Leslie}, + title={\href{http://dl.acm.org/citation.cfm?id=322188}{Reaching Agreement in the Presence of Faults}}, + journal={Journal of the ACM (JACM)}, + volume={27}, + number={2}, + pages={228--234}, + month=apr, + year={1980}, + publisher={ACM} +} + +@misc{ propp15polyas, + author = {James Propp}, + title = {\href{https://mathenchant.wordpress.com/2015/10/16/polyas-urn/}{P\'olya's Urn}}, + month = oct, + year = 2015, +} + +@article{pugh90skiplists, + author = {Pugh, William}, + title = + {\href{http://courses.cs.vt.edu/cs2604/fall05/wmcquain/Notes/Supplemental/PughSkiplistPaper.pdf}{Skip + Lists: A Probabilistic Alternative to Balanced Trees}}, + journal = {Communications of the ACM}, + issue_date = {June 1990}, + volume = {33}, + number = {6}, + month = jun, + year = {1990}, + issn = {0001-0782}, + pages = {668--676}, + numpages = {9}, + url = {http://doi.acm.org/10.1145/78973.78977}, + doi = {10.1145/78973.78977}, + acmid = {78977}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {data structures, searching, trees}, +} + + +%R + +@inproceedings{ rabin83randomized, + author = {Michael O. Rabin}, + title = {Randomized {Byzantine} Generals}, + booktitle = {Symposium on Foundations of Computer Science (SFCS)}, + month = nov, + year = 1983, +} + +@book{rapoport65prisoner, + title={Prisoner's dilemma: A study in conflict and cooperation}, + author={Rapoport, Anatol and Chammah, Albert M and Orwant, Carol J}, + volume={165}, + year={1965}, + publisher={University of Michigan press} +} + +%S + +@article{skala13hypergeometric, + author = {Matthew Skala}, + title = {{Hypergeometric Tail Inequalities: Ending the Insanity}}, + journal = {CoRR}, + volume = {abs/1311.5939}, + year = {2013}, + url = {https://arxiv.org/abs/1311.5939}, +} + +@inproceedings{ stadler96publicly, + title={\href{https://link.springer.com/content/pdf/10.1007/3-540-68339-9_17.pdf}{Publicly Verifiable Secret Sharing}}, + author={Stadler, Markus}, + booktitle = {Eurocrypt}, + month=may, + year={1996}, +} + +@inproceedings{ +CJI09, author = "R.~Chang and G.~Jiang and F.~Ivan{\v{c}}i{\'{c}} and + S.~Sankaranarayanan and V.~Shmatikov", +title = "Inputs of Coma: + Static Detection of Denial-of-Serice Vulnerabilities", +year = {2009}, +booktitle ={CSF}} + +@article( +CMS05, author="R.~Chadha and J.C.~Mitchell and A.~Scedrov and V.~Shmatikov", +title="Contract signing, optimism, and advantage", +journal="J. Logic and Algebraic Programming", +pages="189--218", +volume="64", number="2", +Year="2003") + +@inproceedings( +DS, Author="A.~Serjantov and G.~Danezis", +Title="Towards an information theoretic metric for anonymity", +Booktitle="Proc.\ 2nd International Workshop on + Privacy-Enhancing Technologies", +Series={LNCS}, +Volume={2482}, +Pages="41--53", +Year="2002") + +@inproceedings( +MS05, author="A.~Mahimkar and V.~Shmatikov", +title="Game-based analysis of denial-of-service prevention protocols", +booktitle="Proc.\ 18th {IEEE} Computer Security Foundations + Workshop ({CSFW})", +publisher="{IEEE}", +year="2005", +pages="287--301") + +@article( +NS06, Author="G.~Norman and V.~Shmatikov", +Title="Analysis of probabilistic contract signing", +Journal="J. Computer Security", +Year="2006", +Pages="561--589", +Volume="14", +Number="6") + +@inproceedings( +nymble, author="P.~Johnson and A.~Kapadia and P.~Tsang and S.~Smith", +title="Nymble: anonymous {IP}-address blocking", +booktitle="Proc.\ {PET}", +year="2007") + +@article( +S04, Author="V.~Shmatikov", +Title="Probabilistic model checking of an anonymity system", +Journal="J. Computer Security", +Year="2004", +Pages="355--377", +Volume="12", +Number="3-4") + +@article( +SM02, author="V.~Shmatikov and J.C.~Mitchell", +title="Finite-state analysis of two contract signing protocols", +journal="Theoretical Computer Science", +volume=283, number="2", +pages="419-450", +year=2002) + +@inproceedings( +SW-esorics06, author="V.~Shmatikov and M-H.~Wang", +Title="Timing analysis in low-latency mix networks: + attacks and defenses", +Booktitle="Proc.\ {ESORICS}", +Year="2006") + +@inproceedings( +SW-fmse06, author="V.~Shmatikov and M-H.~Wang", +Title="Measuring relationship anonymity in mix networks", +Booktitle="Proc.\ {WPES}", +Year="2006") + +@inproceedings( +torsk-attack, author="Q.~Wang and P.~Mittal and N.~Borisov", +title="In Search of an Anonymous and Secure Lookup: + Attacks on Peer-to-peer Anonymous Communication Systems", +booktitle="Proc.\ {CCS}", +year="2010") + +@inproceedings( tsang-ccs07, + author="P.~Tsang and M.H.~Au and A.~Kapadia and S.~Smith", + title="Blacklistable anonymous credentials: + blocking misbehaving users without {TTPs}", + booktitle="Proc.\ {CCS}", + year="2007" +) + +@inproceedings( +tsang-ccs08, author="P.~Tsang and M.H.~Au and A.~Kapadia and S.~Smith", +title="{PEREA}: Towards Practical {TTP}-Free Revocation in + Anonymous Authentication", +booktitle="Proc.\ {CCS}", +year="2008") + + +@article{ afk, + author = {Mart\'in Abadi and Joan Feigenbaum and Joe Kilian}, + title = {On Hiding Information from an Oracle}, + journal = {Journal of Computer and System Sciences}, + volume = 39, + year = 1989, + pages = {21-50}, + note = {Special issue of selected papers from the 1987 + IEEE Conference on Structure in Complexity Theory} +}, + +@inproceedings{ bfl, + author = {Matt Blaze and Joan Feigenbaum and Jack Lacy}, + title = {Decentralized Trust Management}, + booktitle = {Proceedings of the 17th Symposium on Security and Privacy}, + year = 1996, + pages = {164-173}, +} + +@inproceedings{ bfs, + author = {Matt Blaze and Joan Feigenbaum and Martin Strauss}, + title = {Compliance Checking in the {PolicyMaker} + Trust Management System}, + booktitle = {Proceedings of the 2nd Financial Crypto Conference}, + year = 1998, +} + +@article{ ff, + author = {Joan Feigenbaum and Lance Fortnow}, + title = {Random-Self-Reducibility of Complete Sets}, + journal = {SIAM Journal on Computing}, + volume = 22, + year = 1993, + pages = {994-1005}, + note = {Extended abstract appears in Proceedings of the + 1991 IEEE Conference on Structure in Complexity Theory}, +} + +@article{ fksv, + author = {Joan Feigenbaum and Sampath Kannan and Martin Strauss + and Mahesh Viswanathan}, + title = {An Approximate {L1}-Difference Algorithm for + Massive Data Streams}, + journal = {SIAM Journal on Computing}, + volume = 32, + year = 2002, + pages = {131--151}, + note = {Extended abstract appears in Proceedings of the + 1999 IEEE Symposium on Foundations of Computer Science}, +} + +@article{ fkmsz, + author = {Joan Feigenbaum and Sampath Kannan and Andrew McGregor + and Siddharth Suri and Jian Zhang}, + title = {On Graph Problems in a Semi-Streaming Model}, + journal = {Theoretical Computer Science}, + volume = 348, + year = 2005, + pages = {207--216}, + note = {Special issue of selected papers from the 2004 International + Colloquium on Automata, Languages, and Programming}, +} + +@article{ fps, + author = {Joan Feigenbaum and Christos Papadimitriou and Scott Shenker}, + title = {Sharing the Cost of Multicast Transmissions}, + journal = {Journal of Computer and System Sciences}, + volume = 63, + year = 2001, + pages = {21--41}, + note = {Preliminary version appears in Proceedings of the 2000 + ACM Symposium on Theory of Computing}, +} + +@article{ fpss, + author = { Joan Feigenbaum and Christos Papadimitriou and Rahul Sami + and Scott Shenker}, + title = {A {BGP}-based Mechanism for Lowest-Cost Routing}, + journal = {Distributed Computing}, + volume = 18, + year = 2005, + pages = {61--72}, + note = {Special issue of selected papers from the 2002 ACM Symposium + on Principles of Distributed Computing}, +} + +@inproceedings{shoup00practical, + title={\href{https://link.springer.com/content/pdf/10.1007/3-540-45539-6_15.pdf}{Practical Threshold Signatures}}, + author={Shoup, Victor}, + booktitle={Eurocrypt}, + month = may, + year={2000}, +} + + +@book{stinson05crypto, + author = {Douglas R. Stinson}, + title = {Cryptography: Theory and Practice}, + year = {2005}, +} + +@inproceedings{guerraoui10next, + title={\href{http://www.vukolic.com/700-Eurosys.pdf}{The next 700 {BFT} protocols}}, + author={Guerraoui, Rachid and Kne{\v{z}}evi{\'c}, Nikola and Qu{\'e}ma, Vivien and Vukoli{\'c}, Marko}, + booktitle={5th European conference on Computer systems}, + pages={363--376}, + year={2010}, + organization={ACM}, + url={http://www.vukolic.com/700-Eurosys.pdf}, +} + + +%V + +@book{ vanderbei13linear, + author = {Robert J. Vanderbei}, + title = {Linear Programming: Foundations and Extensions}, + publisher = {Springer}, + month = jul, + year = 2013, + isbn = {978-1461476290}, +} +