diff --git a/pdf/cc-by.pdf b/pdf/cc-by.pdf new file mode 100644 index 0000000..1edf9f0 --- /dev/null +++ b/pdf/cc-by.pdf @@ -0,0 +1,258 @@ +%PDF-1.3 % +1 0 obj <> endobj 2 0 obj <>stream + + + + + Adobe Illustrator CS5 + 2012-09-19T10:17:41+02:00 + 2012-09-19T10:17:41+02:00 + 2012-09-19T10:17:41+02:00 + + + + 256 + 92 + JPEG + /9j/4AAQSkZJRgABAgEASABIAAD/7QAsUGhvdG9zaG9wIDMuMAA4QklNA+0AAAAAABAASAAAAAEA AQBIAAAAAQAB/+4ADkFkb2JlAGTAAAAAAf/bAIQABgQEBAUEBgUFBgkGBQYJCwgGBggLDAoKCwoK DBAMDAwMDAwQDA4PEA8ODBMTFBQTExwbGxscHx8fHx8fHx8fHwEHBwcNDA0YEBAYGhURFRofHx8f Hx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8fHx8f/8AAEQgAXAEAAwER AAIRAQMRAf/EAaIAAAAHAQEBAQEAAAAAAAAAAAQFAwIGAQAHCAkKCwEAAgIDAQEBAQEAAAAAAAAA AQACAwQFBgcICQoLEAACAQMDAgQCBgcDBAIGAnMBAgMRBAAFIRIxQVEGE2EicYEUMpGhBxWxQiPB UtHhMxZi8CRygvElQzRTkqKyY3PCNUQnk6OzNhdUZHTD0uIIJoMJChgZhJRFRqS0VtNVKBry4/PE 1OT0ZXWFlaW1xdXl9WZ2hpamtsbW5vY3R1dnd4eXp7fH1+f3OEhYaHiImKi4yNjo+Ck5SVlpeYmZ qbnJ2en5KjpKWmp6ipqqusra6voRAAICAQIDBQUEBQYECAMDbQEAAhEDBCESMUEFURNhIgZxgZEy obHwFMHR4SNCFVJicvEzJDRDghaSUyWiY7LCB3PSNeJEgxdUkwgJChgZJjZFGidkdFU38qOzwygp 0+PzhJSktMTU5PRldYWVpbXF1eX1RlZmdoaWprbG1ub2R1dnd4eXp7fH1+f3OEhYaHiImKi4yNjo +DlJWWl5iZmpucnZ6fkqOkpaanqKmqq6ytrq+v/aAAwDAQACEQMRAD8AjfkryVpn5jaZN5z85zXG qaxqlxMxLTOiRIjlFjjVCKKKbDoBQAYCWJLIf+VDflp/1b5f+kib/mrBaLd/yob8tP8Aq3y/9JE3 /NWNrbv+VDflp/1b5f8ApIm/5qxtbd/yob8tP+rfL/0kTf8ANWNrbv8AlQ35af8AVvl/6SJv+asb W3f8qG/LT/q3y/8ASRN/zVja27/lQ35af9W+X/pIm/5qxtbd/wAqG/LT/q3y/wDSRN/zVja27/lQ 35af9W+X/pIm/wCasbW3f8qG/LT/AKt8v/SRN/zVja27/lQ35af9W+X/AKSJv+asbW3f8qG/LT/q 3y/9JE3/ADVja27/AJUN+Wn/AFb5f+kib/mrG1t3/Khvy0/6t8v/AEkTf81Y2tu/5UN+Wn/Vvl/6 SJv+asbW3f8AKhvy0/6t8v8A0kTf81Y2tu/5UN+Wn/Vvl/6SJv8AmrG1t3/Khvy0/wCrfL/0kTf8 1Y2tqF3+Sn5T2cfq3dv9Xi/nlu5UXb3Zxja2UCn5Y/kY7BUuLZmPRRqJJP8AyUxtNlNF/Ij8smUM thIysKgi5mIIP+yxtFt/8qG/LT/q3y/9JE3/ADVja27/AJUN+Wn/AFb5f+kib/mrG1t3/Khvy0/6 t8v/AEkTf81Y2tu/5UN+Wn/Vvl/6SJv+asbW3f8AKhvy0/6t8v8A0kTf81Y2tu/5UN+Wn/Vvl/6S Jv8AmrG1t3/Khvy0/wCrfL/0kTf81Y2tu/5UN+Wn/Vvl/wCkib/mrG1t3/Khvy0/6t8v/SRN/wA1 Y2tse86+StM/LnTIfOfkya40vWNLuIWBWZ3SVHcI0ciuTVTXcdCKgjCCkFkP5Df+S00//jLcf8nm wFBeg4oWzTRQxPNM6xxRqWkkchVVQKkknYAYq8Z88f8AOQ9paSyWXlWBLyVaq2ozg+iD0/dICrP/ AKxIHsRhpkIvMz5v/NjzfdtBZ3Wp6hMetnpqSUoeg9K2Ar7VGGk0jf8AlW357+n6n6A8wcacqejd cqUr9nrX2xSg/wDF/wCbPlG7WG9u9U0+ZelpqSSEbHceldKafQMaRT0ryT/zkTaXUsdl5qt1s5Go q6jbgmGv/FkZ5Mn+spI9gMFIMXs0E8M8KTwSLLDKoeOVCGVlYVDKw2IIwMV+KuxV2KuxV2KuxV2K uxV3TFXiH5ifnjeyX58v+SQZrhn9B9QjT1XeQnj6dslDy32D71/ZHQ4QGQCt5Z/5xP8AzW828dV8 1aimj+uOR+vM93e0O4LRg0X5NICPDCyZPcf84NTrCxt/OayTAfAkmnFFJ92Fy5H/AAJxV595k/Lb 87fycP6RhlM+hq3x3lkzXFnuek8LqDHX+ZkpU7NXFaej/ll+aum+crZreZVs9cgXlNaA/DIo6yQ1 3K+I6j8ciQwIZ5ih2KuxV2KuxV2KuxV2KvPvz5/8lpqH/GW3/wCTy4hId+Q3/ktNP/4y3H/J5sSp eg9MUPmr84/zXn8wXkuhaPLx0G3fjLKh/wB6pFPUkf7rU/ZHf7XhQgMwHpv5H/8AOKC31tb+Y/zB jdLeUCWz0AExuykVV7plIZa/77Wh/mI+zhS+ptI0TR9GsY7DSLKDT7KIUjt7aNYox/sUAGKo3FUJ quj6TrFjJYatZQX9lL/eW1zGk0bfNHBGKvl787f+cTIoLafzB+XcTn0+Ul35eJLkr1LWjN8RI/30 a1/ZPRcVeTfk9+alx5bv49G1aYtoFw/EM+/1WRj9ta9Iyftj6R3qCEEPpoEMAymoO4I6EYGDsVdi rsVdirsVdirsVeU/n/53m0bQotCsZDHe6sG+sOuxS1XZh/z0J4/LliGQD0T/AJxh/I2y8s6Fbeb9 dtlk8y6nGJbNJVBNlbSCqBQeksimrHqB8O3xVkye2eZIdWm8u6pDo0gh1eSznTTZW2VLlomELH2D 0OKvkT/nHLyV+b+m/nFHeahp+p6fZR+ufMNxfLLHFMrRMFDPJ8MztKystCf5umKvsmeCC4gkgnjW WCVSksTgMjowoysp2II2IOKvij/nIf8AKqf8r/N9j5v8p1tdFvpy1uqfZtLwAu0HvHIoYovhyXoN 1XrHlHzHb+Y/LdhrUA4rdxBnj68JFJWRP9i6kZFrKb4q7FXYq7FXYq7FXYq8+/Pn/wAlpqH/ABlt /wDk8uISHfkN/wCS00//AIy3H/J5sSpUvz083SaD5Oa0tn4X2sMbaNgaMsQFZnH+xIX/AGWIUBj3 /OJf5R2/mbX5vN+swCbRtDkCWULiqTX9A4LDusCkNT+Yr2BGSZvtLFUHbazo91cNb2t9bz3CV5Qx So7inWqqScVRmKoW91bSrAqL69gtS/2BPKkZb5ciK4qiUdJEDxsHRhVWU1BHiCMVfG3/ADl3+U1r oGtW/nXSIRFp2tSmLUoUFFjveJcSCn+/1Vif8pSf2sVTb8h/NsmueTvqNy/O90ZhbMxNWaBhWBj9 AKf7HIlgQ9JxQ7FXYq7FXYq7FXYq+ffNNgnmv/nIzTNBuR6tl9csLOVDuDbgJNOtD/rvhDMPu0AA UGwHQYUvmL/nNzWdWs7LyjZWl5Nb2l09/LcwxOUWR4BbiItSleAlenzxV8p/pbVf+Wyf/kY/9cVf ol+SWpX+p/lP5XvtQuHuryaxQzXEpLO5UlQWY7k0HU4qlv8AzkboNvrP5NeZI5lBeygF/A56q9qw kqPmgZfpxV4F/wA4238k3lHULNyStrelo69AssaniP8AZKT9OAsZPW8DF2KuxV2KuxV2KuxV59+f P/ktNQ/4y2//ACeXEJDvyG/8lpp//GW4/wCTzYlS8y/5yR1F5vN9hY1/dWlkHp/lzSNy/wCFRcIT F9a/84+eXodC/J3yzBGoD3louozMOrPe/wCkAn5I6r8hhZPnH/nJv83/ADJ5h87XfkbRbiSHRNNm FlLb27FWvLvYSCXj9pUk+BU6VFfkqp63/wA4g/mJovlf9O2V/Df6zbIJ5tHs1k9YU3IglH95Iv8A KFFf2amlVWd6t+ZP5v8A5Z/kZEPNxj/xbqFz9S0K4lkE91FbGMu8t1TkjSRgUT4iasvMbGqryr8r vyH85/m7b3/ma81kWtuJzCb+99S5nuJwAz0BYHivIVYt12HfFXpH5E/lz+fPkX8xp9L4f86hbzel qkk8rCxniYBhNZqw5mSjVBVevwuRir2b/nIDQIdb/J3zRbyKC1rZPfxN3V7L/SKj5iMj5HFXyR/z jdqDw+b7+xqfSurJnIHTnDInEn/Yu2AsZPo7AxdirsVdirsVdirsVfP/AJgvo/K3/OSWma1dfu7L 69YXMjntA6pDM+/hxc4QzD7rwpeGf85W/ljP5s8qQeYY9QW0Tyla393JbtGXM4lWFuKsGXhT6v4H rir438m+XH8zea9J8vRzi1fVbqK0W4ZeYQysF5FQVrSvjir9Gfy88qSeUvJWkeW5LkXb6XbiBrlV MYcgk1CktTr44qxv/nIfWbfSfya8zzTEVubX6lEp6s906wgD5By30Yq+ff8AnGyyli8qaldsCEub 3jHXuIo1qR9L0+jAWMnruBi7FXYq7FXYq7FXYq8+/Pn/AMlpqH/GW3/5PLiEh35Df+S00/8A4y3H /J5sSpeSf85CwvH+YRduk1nA6/IFk/WpwhlF9wflbeRXv5aeVLqL7MukWJp1oRboGX6CKYUvhv8A MAyeWf8AnILV73Uo2RLTzG2pOgHxGCS7+toR/rROCMVfcutfmR5K0jyk/mu51W3k0YQmaCaGRGM/ w8ljhHIc5GqAF998VfNn/OUXnHy35/8AIPlvzL5XvBeWFhey21/GVKTW8t1CHjWaM7rX0GFfsnsT irO/+cPvN2hXP5bNoH1mGLVtMurh5rVmCyvDKRKs1CfiXcqT2479sVegWX56/lleedpvJsWrxjV4 5I4YXNDbXE0gH7mGdSyM6khSpp8Wwqa4qm/5oXcdp+Wvmu5k+zFpF81OlT9Weg+k7Yq+H/8AnHmF pPzCDjpDZzu3yJRP1tgKJPpzAwdirsVdirsVdirsVeSf85BeSJtW0aDzBYxGS70pWW6VRVmtWPIt /wA8m3+RJ7YhkC9T/wCcZvzusvNvl638r6xcLH5p0qJYovUahvLeNaLIhP2pEUUkHX9rxpJkz786 /wDyUfm//tlXX/Jo4q+FfyU/8m55Q/7atr/ydGKv0dkkjijaSRgkaAs7sQFVQKkknoBir4u/5yR/ NpvzG8zWXkrymTeaRY3FFliNVvL1hw5p/wAVxBmVW6GrN9mhxV6d5L8tQeWvLFho0RDG1j/fSD9u Vzzkb6XY09siwKdYodirsVdirsVdirsVeffnz/5LTUP+Mtv/AMnlxCQ78hv/ACWmn/8AGW4/5PNi VLDP+cl9BcnSNfjWqAPY3L+G5lh/5mYQmL2n/nELz1Brf5cny5NIP0l5claPgT8TWs7NJC/+xYun tQeOFkyD85v+ce/LX5lNHqH1htJ8wwoIk1GNBIskY3CTxVTnSvwsGBHuNsVeNWP/ADhB5ha943/m e0jsQR+8gglklI7/AAOY1H/BHFX0Dov5K+QNK/L6byIlh9Y0W7BN88xBnnmNP37yKF/eAqpUqBxo KYq8F1z/AJwh1QXrHQfMsD2LN8CX0LpKiE9C0XNXI8eK19sVej/k3/zjB5f8hammvape/pvXogfq j+n6VvbFhQsiFnZnpUB2O3YV3xVT/wCcuvO8Gh/lk2hRygaj5jlW3jjB+IW0LLLO/wAtlj/2WKvE P+caNCfnrGuyJRKJZW7+Jr6sw+ikeAsZPdcDF2KuxV2KuxV2KuxVxAYFWFQdiD0IxV4Z+YX5J6pZ akfMXkYtFIj+udPhYxSwyKeXO1YEd9+HUfs16AgsgUw8r/8AOXX5g+X4v0R5x0eLXBCPTkaflZXl OlJTwdG28YgT3JwsmSTf85oeXIohJZeR/wDSxuvO5iRVauxDLAzdN+g/jirz7zX+b35y/nAz6Np9 ubXRnPGaw08NHCy7EfWrhz8XyLBT/Lits/8Ayv8Ayk0/yfF9evGW816VSr3Ar6cKt1SIHx7uRU+w yJLAl6Dih2KuxV2KuxV2KuxV2KvPvz5/8lpqH/GW3/5PLiEhL/yS8w6BZfl3YW95qdpbTrJcFoZp 443AMzEVVmB3xKlmOv6boPnTy1faWl1DdW86lBcQOsoimWjI1UPVWoaV3HzxV83+U/M3mv8AKT8w xeRx8L2wcwX9mxIjubZyCyE/yuoDI1NjRu2SZvvfyD+YHlrz15eg1vQbgSwyAC4t2IE1vL+1FMgJ 4sPuPUVGKskxV2KuxVj/AJ58+eWvJGgTa35guhb2sdRFEKGWeShKxQptydqfIdTQb4q+BvPPnHzT +bf5g/W2iJnu3FtpWnqSUt7dSSqV9hV5H8anYbBV9GeXNK0PyT5XsdLlu4baGEcZLmd1iEs71aRq uRuxrQdh8siwRn+LvKn/AFerD/pJh/5qxRTv8XeVP+r1Yf8ASTD/AM1YrTv8XeVP+r1Yf9JMP/NW K07/ABd5U/6vVh/0kw/81YrTv8XeVP8Aq9WH/STD/wA1YrTv8XeVP+r1Yf8ASTD/AM1YrTv8XeVP +r1Yf9JMP/NWK07/ABd5U/6vVh/0kw/81YrTv8XeVP8Aq9WH/STD/wA1YrSE1HVfy91JAmo3mkXq DotxJbSgfQ5bFKVw6Z+TUMhkjh0AOTWp+qGh67VrT6MV3TyHzP5OgiWGDVtOiiQUSNLiBVA9gGpi q/8Axd5U/wCr1Yf9JMP/ADViinf4u8qf9Xqw/wCkmH/mrFad/i7yp/1erD/pJh/5qxWnf4u8qf8A V6sP+kmH/mrFad/i7yp/1erD/pJh/wCasVp3+LvKn/V6sP8ApJh/5qxWnf4u8qf9Xqw/6SYf+asV p3+LvKn/AFerD/pJh/5qxWnf4u8qf9Xqw/6SYf8AmrFaYJ+dvmHQL38u7+3s9TtLmdpLcrDDPHI5 AmUmiqxO2ISHzPkmbO/yk/MRvJ+vEXTM2i3/ABjvkFTwI+xMoHdK706j3pgKCHun5g/l3ofn7SIb y2nSPUEj5adqUZDI6N8QR+P2oz2p06juCGINPBLK/wDzH/KnzN69pLPo+oLtyX47e5jB7g1jmT59 PY5Jm978pf8AObdt6KRebvL8izCnO80p1ZW/6N52Xj/yNOKs1/6HD/J/0PUrqXP/AHx9VHPrTr6n D3+1irC/Nv8Azm3ZiB4vKXl+Rp2BEd3qjqiqfEwQM/L/AJGjFXgeo6p+ZH5r+ZhNeTT6xqB2WtEt 7aNj0UCkcKbfT7nFXvH5eflxovkLSZr69mjk1Noy9/qT/CkcY+IpGW+ygpuf2u/YCNsCbeGfmz+Y b+cNf/0YsujWPKOwjO3Op+OZh4vTbwFO9cIZAMGwpdirsVdirsVdirsVdiqM0jSNR1jVLXStNhNz qF7KsFrApALyOaKoLEDc+JxVnx/5xv8AztAJPlaeg32ltifuEuKpFpf5UfmJqkGrTWOhzy/oJmTV 4SUSe3ZFLkPA7LL9kGlF37YqgvJ/kHzh5yu57TyzpkupT2sYluFjKKEQtxBLSMi7noK1+44qkdxB Lb3EtvKAJYXaOQAhgGU0NGUlTuOoOKqeKuxV2KuxV2KuxV2KuxV2KuxV2KvQfy0/N7VfKDCxuVa+ 0JmJa1r+8iLdWhJ29yp2Psd8BCCH0HputeR/PeklIWttVtSA0tnMqmSM9KtE/wASHfZvuOBixLWP +cdvI945ksZbrTWP+643EsQ+iUM//D42vEkv/QslhX/jvy0/5hl/6qYbTxJ1o/8Azjt5Hs3El9Ld akw/3XI4iiP0RBX/AOHwWjiZZqWteRvIWkhJWttLtlFYrOBVEsh6VWNficnux+k4rzfPv5l/m7q3 m92sbZWsdCVqra1/eSlT8LTMPDqFGw9zvhAZAPPsKXYq7FXYq7FXYq7FXYq7FWa/kp/5Nzyh/wBt W1/5OjFX1Xqo0GD/AJyEa6n/ADRuNOu2ntFPkjjPHAzNaxJHCZWl+rsJqh+Pp1q382+KvM9Z/MzX /wAu/wDnKLV9V1y2FlpWrvbwanbRP6sbWPpJFDdKQBVk9P1D8NftL3rirL/znvvK/wCTPkTVdN8n J9W1rz5dTTCZD/c25A9Uxsv2URZOMQHQuSOmKvjzFXYq7FXYq7FXYq7FXYq7FXYq7FXYq7FVW2ur m1nS4tZngnjNY5YmKOp8Qy0IxVm+kfnd+Y2mosf6SF7EvRbuNZT9MlFkP0tgpFJz/wBDIee/T4fV NN5Up6nozcvn/fU/DGl4Ul1b87fzG1JGj/SQs4mrVbSNIj9ElDIPobGlphNzdXN1O9xdTPPPIayS ysXdj4lmqThSpYq7FXYq7FXYq7FXYq7FXYq7FWQfl/5itfLXnfQ9fu4nmttLvYbqaKKnNlicMQvI gV27nFXuWs/nr/zj3qfmw+crryNqV35nEsM63ctwUQyWypHExjW4aL4FjX/dfb6cVeO/mt+Y+ofm H5xufMd5brZh0SC1s0YuIoYgeKlyByNSSTQbnpirKfz6/N/RPzG/w5+i7K5s/wBDW8sE/wBa9P42 k9OhTgz7fuz1xV5NirsVdirsVdirsVdirsVdirsVfTNx/wBCS/WJf97Ptt/d/pPh1/Z9vDFVP/rC X/l+/wC5nirv+sJf+X7/ALmeKu/6wl/5fv8AuZ4q7/rCX/l+/wC5nirv+sJf+X7/ALmeKu/6wl/5 fv8AuZ4q7/rCX/l+/wC5nirv+sJf+X7/ALmeKu/6wl/5fv8AuZ4q7/rCX/l+/wC5nirv+sJf+X7/ ALmeKu/6wl/5fv8AuZ4q7/rCX/l+/wC5nirv+sJf+X7/ALmeKu/6wl/5fv8AuZ4q7/rCX/l+/wC5 nirv+sJf+X7/ALmeKu/6wl/5fv8AuZ4q7/rCX/l+/wC5nirv+sJf+X7/ALmeKu/6wl/5fv8AuZ4q 7/rCX/l+/wC5nirv+sJf+X7/ALmeKu/6wl/5fv8AuZ4q7/rCX/l+/wC5nirv+sJf+X7/ALmeKu/6 wl/5fv8AuZ4q7/rCX/l+/wC5nirv+sJf+X7/ALmeKu/6wl/5fv8AuZ4qqW//AEJL9Yi/3s+2v95+ k+HX9r28cVf/2Q== + + + + + + 1 + False + False + + 31.044444 + 10.936111 + Millimeters + + + + Cyan + Magenta + Yellow + Black + + + + + + Standard-Farbfeldgruppe + 0 + + + + + + application/pdf + + + CC-BY_icon + + + + + proof:pdf + uuid:ebb30592-243e-eb4a-9564-284441576148 + uuid:9ac8f4ed-f591-f049-aee8-305fac061b6c + + + Adobe PDF library 9.90 + + + + + + + + + + + + + + + + + + + + + + + + + endstream endobj 3 0 obj <> endobj 5 0 obj <>/Resources<>/Properties<>>>>>/Thumb 9 0 R/TrimBox[0.0 0.0 88.0 31.0]/Type/Page>> endobj 6 0 obj <>stream +H|W6#w'HAcT̒nl#ܝ]߼{~|o?ZێËۛ {nG +)V#Zሹ/[χp/G}vl` ^xF Gl38 G͘=ěh!c";aA oh +[`B>w3py=b/Tmys[u'v[-^9Iל(l5w'`6 AOOCl _ +-`-gUq>v.s-3ǚqnY2%s\],xR!tgԁwao +˜/ IPiײD2<ٝ\vXS !Y=pZ;Rq!I C,xVcY68KVC88lr3 ci.$DO]/ A#$ 8b"\A]PJzg(7\HfH2X4+915A:J6R+OED39'3~7A:G7a_^QK]UM10я=lC:~lj/Xt"Ur{K~gml Z9s"p ^Mlɠ\N)LpR +gw3A%ӡ_sj+Rw)S#z7M +I@DեJ=d }E}PqKp8 +3xnG{^kH+vWV2r~m֩uf)*0Bօ +.zuoσ-<ˏi[ʨmU0OT+iݽFOp:18g0{hRJmCN=E^(nO~8 BQUs%;qLɞ1i.( ,v|?,6vwow+ endstream endobj 9 0 obj <>stream +8;Ue`5QQie@L]UK5_&k8&ao`Q~> endstream endobj 10 0 obj [/Indexed/DeviceRGB 255 11 0 R] endobj 11 0 obj <>stream +8;X]O>EqN@%''O_@%e@?J;%+8(9e>X=MR6S?i^YgA3=].HDXF.R$lIL@"pJ+EP(%0 +b]6ajmNZn*!='OQZeQ^Y*,=]?C.B+\Ulg9dhD*"iC[;*=3`oP1[!S^)?1)IZ4dup` +E1r!/,*0[*9.aFIR2&b-C#soRZ7Dl%MLY\.?d>Mn +6%Q2oYfNRF$$+ON<+]RUJmC0InDZ4OTs0S!saG>GGKUlQ*Q?45:CI&4J'_2j$XKrcYp0n+Xl_nU*O( +l[$6Nn+Z_Nq0]s7hs]`XX1nZ8&94a\~> endstream endobj 8 0 obj <> endobj 7 0 obj <> endobj 12 0 obj <> endobj 13 0 obj <>stream +%!PS-Adobe-3.0 %%Creator: Adobe Illustrator(R) 15.0 %%AI8_CreatorVersion: 15.0.0 %%For: (Marc Herbstritt) () %%Title: (CC-BY_icon.svg) %%CreationDate: 19.09.12 10:17 %%Canvassize: 16383 %%BoundingBox: 376 282 465 313 %%HiResBoundingBox: 376.5 282 464.5 313 %%DocumentProcessColors: Cyan Magenta Yellow Black %AI5_FileFormat 11.0 %AI12_BuildNumber: 399 %AI3_ColorUsage: Color %AI7_ImageSettings: 0 %%RGBProcessColor: 0 0 0 ([Passermarken]) %AI3_Cropmarks: 376.5 282 464.5 313 %AI3_TemplateBox: 420.5 297.5 420.5 297.5 %AI3_TileBox: 17.5 18 800.5 577 %AI3_DocumentPreview: None %AI5_ArtSize: 14400 14400 %AI5_RulerUnits: 1 %AI9_ColorModel: 1 %AI5_ArtFlags: 0 0 0 1 0 0 1 0 0 %AI5_TargetResolution: 800 %AI5_NumLayers: 1 %AI9_OpenToView: -461 834 1 1765 1056 26 0 0 113 134 0 0 0 1 1 0 1 1 0 1 %AI5_OpenViewLayers: 7 %%PageOrigin:0 0 %AI7_GridSettings: 72 8 72 8 1 0 0.8 0.8 0.8 0.9 0.9 0.9 %AI9_Flatten: 1 %AI12_CMSettings: 00.MS %%EndComments endstream endobj 14 0 obj <>stream +%%BoundingBox: 376 282 465 313 %%HiResBoundingBox: 376.5 282 464.5 313 %AI7_Thumbnail: 128 48 8 %%BeginData: 10682 Hex Bytes %0000330000660000990000CC0033000033330033660033990033CC0033FF %0066000066330066660066990066CC0066FF009900009933009966009999 %0099CC0099FF00CC0000CC3300CC6600CC9900CCCC00CCFF00FF3300FF66 %00FF9900FFCC3300003300333300663300993300CC3300FF333300333333 %3333663333993333CC3333FF3366003366333366663366993366CC3366FF %3399003399333399663399993399CC3399FF33CC0033CC3333CC6633CC99 %33CCCC33CCFF33FF0033FF3333FF6633FF9933FFCC33FFFF660000660033 %6600666600996600CC6600FF6633006633336633666633996633CC6633FF %6666006666336666666666996666CC6666FF669900669933669966669999 %6699CC6699FF66CC0066CC3366CC6666CC9966CCCC66CCFF66FF0066FF33 %66FF6666FF9966FFCC66FFFF9900009900339900669900999900CC9900FF %9933009933339933669933999933CC9933FF996600996633996666996699 %9966CC9966FF9999009999339999669999999999CC9999FF99CC0099CC33 %99CC6699CC9999CCCC99CCFF99FF0099FF3399FF6699FF9999FFCC99FFFF %CC0000CC0033CC0066CC0099CC00CCCC00FFCC3300CC3333CC3366CC3399 %CC33CCCC33FFCC6600CC6633CC6666CC6699CC66CCCC66FFCC9900CC9933 %CC9966CC9999CC99CCCC99FFCCCC00CCCC33CCCC66CCCC99CCCCCCCCCCFF %CCFF00CCFF33CCFF66CCFF99CCFFCCCCFFFFFF0033FF0066FF0099FF00CC %FF3300FF3333FF3366FF3399FF33CCFF33FFFF6600FF6633FF6666FF6699 %FF66CCFF66FFFF9900FF9933FF9966FF9999FF99CCFF99FFFFCC00FFCC33 %FFCC66FFCC99FFCCCCFFCCFFFFFF33FFFF66FFFF99FFFFCC110000001100 %000011111111220000002200000022222222440000004400000044444444 %550000005500000055555555770000007700000077777777880000008800 %000088888888AA000000AA000000AAAAAAAABB000000BB000000BBBBBBBB %DD000000DD000000DDDDDDDDEE000000EE000000EEEEEEEE0000000000FF %00FF0000FFFFFF0000FF00FFFFFF00FFFFFF %524C45A8F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8 %F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827 %F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8 %F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827 %F8F8F827F8F8F827F827A8F827587D527D527D527D527D527D527D527D52 %7D527D527D527D527D527D527D527D527D527D527D527D527D527D527D52 %7D527D527D527D527D527D527D527D527D527D527D527D527D527D527D52 %7D527D527D527D527D527D527D527D527D527D527D527D527D527D527D52 %7D527D527D527D527D527D527D527D527D27F8F87DA883A87DA883A87DA8 %83A87DA883A87DA883A87DA883A87DA883A87DA883A87DA883A87DA883A8 %7DA883A87DA883A87DA883A87DA883A87DA883A87DA883A87DA883A87DA8 %83A87DA883A87DFD07A87DA883A87DA883A87DA883A87DA883A87DA883A8 %7DA883A87DA883A87DA883A87DA883A87DA883A8847DF8F87D7D837D837D %837D837D837D837D837DA87DA87DA87DA87DA87D847D837D837D837D837D %837D837D837D837D837D837D837D837D837D837D837D837D837D837D837D %837D837D837D837DA87D837D7D5258527D7DA87D847D837D837D837D837D %837D837D837D837D837D837D837D837D837D837D837D837D837D837D8452 %F8F87DA87DA87DA87DA87DA87DA87DA8A8A87D7D525227522752527D83A8 %7DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA8 %7DA87DA87DA87DA87DA87DA87DA87DA87D7D2727FD05F827277D84A87DA8 %7DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA8 %7DA87DA87D7DF8F87D7DA87D837DA87D837DA87DA87D5227FD0AF827527D %7DA87D837DA87D837DA87D837DA87D837DA87D837DA87D837DA87D837DA8 %7D837DA87D837DA87D837DA87DA85227FD0BF8277DA87DA87D837DA87D83 %7DA87D837DA87D837DA87D837DA87D837DA87D837DA87D837DA87DA858F8 %F87DA87DA87DA87DA87DA87DA85227FD0FF8587DA87DA87DA87DA87DA87D %A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87D %A852FD04F8527DA8A8A87D52F8F8F8277DA87DA87DA87DA87DA87DA87DA8 %7DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA8837DF8F87D7D837D %837D837D837D8327FD06F82727522727FD07F8277DA87D837D837D837D83 %7D837D837D837D837D837D837D837D837D837D837D837D837D837D837DA8 %27F8F8F852FD08FFA827F8F8F852A87D837D837D837D837D837D837D837D %837D837D837D837D837D837D837D837D837DA858F8277DA87DA87DA87DA8 %83A827FD04F8277DA8FD06FFA87D27FD04F8277DA87DA87DA87DA87DA87D %A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA852F8F8 %27A8FD04FF7D27A8FD04FF7DF8F8277DA87DA87DA87DA87DA87DA87DA87D %A87DA87DA87DA87DA87DA87DA87DA87DA87DA8837DF8F87D7D837DA87D83 %7DA827FD04F87DFD0CFF7D27F8F8F8277DA87DA87D837DA87D837DA87D83 %7DA87D837DA87D837DA87D837DA87D837DA87D837DA87DF8F8F8A8FD04FF %7DF8F8F8FD05FF7DF8F8277DA87D837DA87D837DA87D837DA87D837DA87D %837DA87D837DA87D837DA87D837DA87DF8F87DA87DA87DA87DA827F8F8F8 %27FD0FFFA852F8F8F8277DA87DA87DA87DA87DA87DA87DA87DA87DA87DA8 %7DA87DA87DA87DA87DA87DA87DA88352F8F87DFD05FF7DF8F8F8A8FD05FF %52F8F85883A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA8 %7DA87DA87DA87D7DF8F87D7D837D837DA827F8F8F827FD12FF52F8F8F852 %7D837D837D837D837D837D837D837D837D837D837D837D837D837D837D83 %7D837D7DF8F827FD07FF27F852FD07FFF8F8F8837D837D837D837D837D83 %7D837D837D837D837D837D837D837D837D837D837DA852F8F87DA87DA87D %A87DF8F8F827FD14FF52F8F8F87D83A87DA87DA87DA87DA87DA87DA87DA8 %7DA87DA87DA87DA87DA87DA87DA87DA852F8F8FD07FF7D7D52A87DFD06FF %7DF8F87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87D %A87DA87DA87D7DF8F87D7DA87D837D27F8F8F8A8FD14FFA8F8F8F805A87D %A87D837DA87D837DA87D837DA87D837DA87D837DA87D837DA87D837DA87D %27F827FD06FFFD06F852FD05FFA8F8F8527DA87D837DA87D837DA87D837D %A87D837DA87D837DA87D837DA87D837DA87DA858F8F87DA87DA8837DF8F8 %F87DFD16FF7DF8F8F852A87DA87DA87DA87DA87DA87DA87DA87DA87DA87D %A87DA87DA87DA87DA87DA8F8F852FD06FFFD06F852FD06FF27F827A87DA8 %7DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA8837D %F8F87D7D837DA827F8F827FD18FF27F8F8277D837D837D837D837D837D83 %7D837D837D837D837D837D837D837D837D837DF8F87DFD06FFFD06F827FD %06FF52F8277D837D837D837D837D837D837D837D837D837D837D837D837D %837D837D837DA858F8277DA87DA87D27F8F87DFD05FFA87D527DA8FD05FF %7D7D527DA8FD04FF7DF8F8F8837DA87DA87DA87DA87DA87DA87DA87DA87D %A87DA87DA87DA87DA87DA87D7DF8F87DFD06FF27FD05F852FD06FF52F827 %A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87D %A8837DF8F87D7D837D7DF8F8F8FD05FF52FD05F827FFFFA8FD06F87DFFFF %FFA8F8F8F852A87DA87D837DA87D837DA87D837DA87D837DA87D837DA87D %837DA87DA858F8F8A8FD06FFFD06F827FD06FF52F8277D837DA87D837DA8 %7D837DA87D837DA87D837DA87D837DA87D837DA87D837DA87DF8F87DA87D %A852F8F827FD04FF52F8F8F82727F8F852FFF8F8F82727F8F8F8A8FFFFFF %27F8F852A8A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA8 %7DA87D83F8F87DFD06FF27FD05F852FD06FF27F827A87DA87DA87DA87DA8 %7DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87D7DF8F87D7D847D %27F8F852FFFFFFA8F8F8F87DFFA827F8A852F8F827A8FF52F827A8FFFFFF %52F8F827A87D837D837D837D837D837D837D837D837D837D837D837D837D %837DA87D27F852FD07FF52F8F8F87DFD06FFA827F8527D837D837D837D83 %7D837D837D837D837D837D837D837D837D837D837D837DA852F8F87DA87D %A827F8F87DFFFFFF7DF8F827FFFFFFA8FFFF52F8F87DFFFFFFA8FD05FF7D %F8F85283A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87D %A87DA827F827FD07FF52F8F8F87DFD06FFA8F8F852A87DA87DA87DA87DA8 %7DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87D7DF8F87D7DA87D %27F8F87DFFFFFF52F8F852FD06FFF8F8F8A8FD09FF7DF8F827A87D837DA8 %7D837DA87D837DA87D837DA87D837DA87D837DA87D837DA87D58F8F87DFD %06FF52F8F8F87DFD06FF52F8F87D7DA87D837DA87D837DA87D837DA87D83 %7DA87D837DA87D837DA87D837DA87DA858F8F87DA87DA827F8F87DFFFFFF %7DF8F852FD06FF27F8F8A8FD09FF7DF8F8277DA87DA87DA87DA87DA87DA8 %7DA87DA87DA87DA87DA87DA87DA87DA87DA87D27F827FD06FF52F8F8F87D %FD05FFA8F8F85284A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87D %A87DA87DA87DA87DA8837DF8F87D7D837D27F8F852FFFFFF52F8F827FFFF %FFA87DFF27F8F87DFFFFFF7DA8FD04FF7DF8F827A87D837D837D837D837D %837D837D837D837D837D837D837D837D837D837DA852F8F852FD05FF52F8 %F8F87DFD04FFA827F8F858A87D837D837D837D837D837D837D837D837D83 %7D837D837D837D837D837D837DA858F8277DA87DA827F8F852FD04FFF8F8 %F87DFFA8F8F87D7DF8F8F8A8FF7DF8277DFFFFFF52F8F85283A87DA87DA8 %7DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA827F8F852 %FD04FF52F8F8F87DFD04FF52F8F852A87DA87DA87DA87DA87DA87DA87DA8 %7DA87DA87DA87DA87DA87DA87DA87DA87DA8837DF8F87D7D837D52F8F827 %FD04FF52F8F8F827F8F8F87DFF27FD07F8A8FFFFFF27F8F852A87DA87D83 %7DA87D837DA87D837DA87D837DA87D837DA87D837DA87D837DA87D7DF8F8 %F852A8FFFFFFA8A8A8FFFFFFA827F8F827A87DA87D837DA87D837DA87D83 %7DA87D837DA87D837DA87D837DA87D837DA87D837DA87DF8F87DA87DA852 %F8F8F8A8FD04FF7DFD05F87DFFFFA827FD05F8A8FD04FFF8F8F87D83A87D %A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA883 %83F8F8F82752FD06FFA852F8F8F827A883A87DA87DA87DA87DA87DA87DA8 %7DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87D7DF8F87D7D837D7DF8 %F8F87DFD05FFA87D7D7DFFFFFFA8FFFFA8527D7DFD05FF52F8F8F87DA87D %837D837D837D837D837D837D837D837D837D837D837D837D837D837D837D %837D7D27FD04F82727522727FD04F827A87D837D837D837D837D837D837D %837D837D837D837D837D837D837D837D837D837D837DA852F8F87DA87DA8 %8352F8F8F8FD18FF27F8F827A87DA87DA87DA87DA87DA87DA87DA87DA87D %A87DA87DA87DA87DA87DA87DA87DA87DA87DA85227FD09F8527DA87DA87D %A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87D %A87DA87D7DF8F87D7DA87DA852F8F8F852FD16FF7DF8F8F87D7DA87D837D %A87D837DA87D837DA87D837DA87D837DA87D837DA87D837DA87D837DA87D %837DA87D7D2727F827F827527D7DA87D837DA87D837DA87D837DA87D837D %A87D837DA87D837DA87D837DA87D837DA87D837DA87DA858F8F87DA87DA8 %7DA827F8F8F87DFD15FFF8F8F82783A87DA87DA87DA87DA87DA87DA87DA8 %7DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA883A87DA87DA8 %7DA883A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA8 %7DA87DA87DA87DA87DA87DA8837DF8F87D7DA87DA87D7DFD04F8A8FD13FF %FD04F852A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87D %A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87D %A87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87DA87D %A87DA87DF82758837D837DA8837DF8F8F827A8FD11FF27F8F8F852A883A8 %7D837D7D7D837D7D7D837D7D7D837D7D7D837D7D7D837D7D7D837D7D7D83 %7D7D7D837D7D7D837D7D7D837D7D7D837D7D7D837D7D7D837D7D7D837D7D %7D837D7D7D837D7D7D837D7D7D837D7D7D837D7D7D837D7D7D837D7DFD06 %F8277D847D52F8F8F8277DFD0EFFA8FD04F827A87DA827F8F827F8F8F827 %F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8 %F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827 %F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827FD08F87DA8A87D27FD04 %F852FD0CFF7DFD04F827A883A852FD61F87D7D837D2DFD05F8527DFD05FF %A8A85227FD04F827837DA87DFD62F827A87DA88452FD07F82727522727FD %06F852A87DA87D27FD26F82752527D52F8277D27F8F8275227FD2FF82783 %7DA8837D27FD0EF82752A87DA87D27FD27F87DFD04FF7D27FFFFF8F8A8FF %FD31F827A883A883A85252FD09F827277D83A87DA87D27FD28F87DFFF8F8 %A8FFF852FF5252FF52FD33F87D7DA87DA87D7D525227522752527D7DA87D %A87DA85227FD29F87DFF5252FF7DF8F8A8FFFFA8FD35F8527DA87DA883A8 %83A8A8A883A884A87DA8A8A85227FD2AF87DFFA8FFFFA8F8F827FFFF52FD %36F827527D7DA87D837DA87D837DA87DA87D52FD2DF87DFFF8F852FF52F8 %F8A8FFFD3AF852527D7DA87DA87D837D7D2727FD2EF87DFF27277DFF27F8 %F8FFA8FD3DF8FD0527FD33F87DFD04FF7DF8F8F8A8FFFD75F82752275227 %FD04F82727FDAAF827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8 %F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F8 %27F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8 %F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F827F8F8F8 %27F8F8F827F8F8F827F8F8F827F8F8F8FD7FA8FF %%EndData endstream endobj 15 0 obj <>stream +HWr:mcIٛ4#lGIl#mݦ!X9~n!9 %{- VB69EƢPI}!Z(S"C*xÐ TK/G" M:B#]SP֗/Qj` VP2J dg8 &l׆O%vjQVEiv)RԹ띵nB;¿%jI!2sM+;pB@dEnIsT'/Df7Х$ES~\JT?cJ/bD~T>ɸ>aɑ?eXϘ1QPN"e xNU@1>Wjr +(@ULj~FR3Vi5~.J1;gp&,SFna(z{ +A+Ex9}CpSPci㘶n( yEJʵܥ.t&EtHU6t5x^boH7cBGTVm$(&yL>!#[K˶ǿG!VSG 0>c6ecy?u"):CSL 1dshD S[2= a5D.t7E|+D̾[w%p` k AZVZ0"6ژ1:8P93%%Z_t( KeNX*1ҟC۴鼌(9.itGMQ&F[@3϶}SUsF\7.y@\k_A;vxJл\Oa )O ]`g6̪_[ =[sN\/5ڎlN$KG9<_89.o%m/g}a_'$fTu[iXf}̭^]/m-HͽV4TO +TX#Y[r V7(OM=Xq>n"<תU04:3?%lF,OFGa80垧0zb>KV RקL>>??jNN_ k|ȼ\#oy <կrEx'0l9㓽O<gaI"a>Q +{˵w@Md$O +bIVr\=?/20ػ_[PgEtҒP~l^xfXR<ݍ'^݇_V Bw_\Zfp W:aИ02!Vn0D, N]/zb7;D& +}1&hx6 +9 +5۵2@WnPoB?Yre-;aע8s"ڂZ tk\,{KP쭤6 +,2SK?,0`x~]*)S[-xŭԌISm)$i +SU0߲s6Ђ-p%qݭ|[޶~̼U5Y-h[2}  c‰DAzČWwBS$n(<ޢnP#M>f;M+QlzH.ob)%A硢A_iCD)hUk1 OLF$cLfpr zDNrnf-v.6= $aac`(\5: +p 4b)>LW +"z8TdQEKD悄^[mZ ʙ) @(NBdZ(%Ye(&%Px uΖ_ز``}[Ҙ +Y2"c׆҂g.f5`$ 'Du}2߹N\2Y$J056[|zBn#ՔچCx*GE +57bn4wBozo,$h՘fdI4SnCC.m皝Vk%#gyؗe6W.X: uY.7.cP%+5Zamjk75a+7Iu4T~qB^yxs gewK±kg3!ȳDoPlFSs)-,}y5dNTLu$qedmiԀ9ےOB  j0sxe\<1-6dٳ(Mɿd*M1LBlccYY^ns͸L_Sp/i%ЂzrQ%.Oh]i]uvP+i0]rK\9B*':Y2KXic L5cI-z`17t)W DD0k&zU +1}I[&`# yk&5 ,WX)[+nu/Mldb?fqOrOz=l2l,) + ,՚ДDͷn:1AQ&fp&][cژ[IcUZ.%M_%(=MqAO.Zg&&fq Ĵ%q:lB 24ڻzpb*mwh$yi5Iߵ2i0@& p,g?-a#\+ӉZFH fLB>܁pm[.Zw.卨QXbY 0JTkp  MV|'NqHP*:G\NP9VMl_ֺ| qW>\"N+UFYwmjby /\b=ٌ)#pJHHkq:Iz*3494CClM +paxM/1#zjT\a2ہ_zf%tV2{/'w9}rCq5c&Qngx8(;lGg@q=ƆE<tEu4r.'2k$ȉd Y2E^d^'uY~oQ ɓT8tCz:)".s:$x\ +21zV8_ ss!z +0 +;.215QMׇFp:m̟CkkC'Dp/CVkyA0c>G TE*}EAk4ݚZM~jqC-A!􀭙g+[„U!-F<,b&,WܷP˨Kv{%}P<|" +ksp訝>uKk[Н *L"2@l=JL[ORz#SL[/@%\ZvT6 ~x(MЁr (#?u"ԟAEGkph V/Ac׆!V`݆}f` +^_kTNOoZqv*Wft1oG~:0贱qp37*[WW/^V6go*7{)je=lWz˚z]9Z ~g6{fgfg~f Ԭix.~?윽T=7cv{Sߜ|ttw+_gx,0VeAeթlXա#W6ve̜ʺizҴEnʌý_ zR+7^Uksx_S3ϯ٭yWSc?zy.ʃ +G@nةVm|_J/ͼ3|gf:2p2I,h[ -.ԽܟAԲaݞj@jjX}ԙk ܿhܛnf]CzlM oS r`nJUVnDo+7 nk&hxJyM0p܎hK0 [bϷ`|S~q'f$:Sn'[K[Pn.)3s GڲW{]qOU'62i'Sbɸ<4S&.a9Kٌrk|I %V< +h#_*`+Zfힷ}ծTLzV3ySi9CUp96ڻxG@JB>|s~V?{adi +@v]h|+Ng5fqw@,o)mgu>3@D+[;J7e美}{F޽lYBG +vE>A_,@sӡCoA4VzZkw㍍ձ BQQp3*hK2b1T(PysP ]СFGռ6VH&4]['^u$*M +2yыsyjfZT?I ]üӇrY1T޲Y|zO08sdw/獅k ixC(DJlj}**PmWdDI]SV 79+ŇUkfcMa֪)Ǣtf֞ԚlbڑSъc ,vO +و2 arNӬn1註ofBPžRcGde!>6Q>exq듼 t&e6Cy`-|99Wk5M irU.tʇ*"S6 d>d-Ro0ݻp|ƶ=κԪ5&̈OwoLw^7ӓ>]'Xq朱3HBABJh#.âWλy@{~X33уgF+'ױ;r%=rcxC9/Z<~bgk|Kf1SEbh}fcZ\\oL-BXjK7zܠK%Ku8`gЧRܸuPh ,|;+&qi;Ue`"u&s ++Q+7,~w^-&$f 6:cY8X/c]☱] K +%Mn77 :z9bŞ-v#S&x:м:M KR-,vuj&o%Z-A'i>Pr)VS$&XyQT9f10 c(SH(mfK"Y/>(-&{(;,c2>0}uN0xP $LkU^ik'uo/b'?q"y]5?Vqh1x3(rBcՓ~d2ݙ>$SWZ"I|~9bew-P(p➲O$*셓TFSP>,]o,}RϚ3D˦0J0vWmTť| gJ} h8Fm4]^I{o4`+=9xFPB!֛{hlfv?!6cR"FBGe}ȳ!SXz:O\S\sȆ%Hch\6ӮGBYgSRre{KkXJ)mVsWJ -OZL2hU&8XA/kU0_Wy&7)"'ɅBkIWGqF=MJݴ7oJ,ڹjUNtPUtʿ*)mZ*)z=,K/2U HW߮ߡH3Yy,a*sT9Wvo5Zi%i&6/xic' + +7%<>l;/,>w4y|Q.hRlns }KjkBfUvsxUMvaz2Hn-.WD!Zsn^!1a4)3o=fͭrf2uW9o +$n*ԮI+v-9&ݖ0_ + `Gzį9e!"w+F^MIF4wMk[ {ɹybY/g%؂@aC^5:]_5Xn[Mlv/X'okuy 9Hy#$Zb+n +x@J?/%J OxJwm:i+a}\jڸ; +AXa,_҇PCV8dŲXn0$htsή{ ȭ+zk`5⒝p_ /5 3mH׬c, q{,@CCW+rWӼd&a֛+aLG-GLܗ=$cOǹQq^ |d!Z^R>2{UrL2NQzQ.?i!I߸|ۏpR]Sb<2]\iN5]8nDI @ry"%-)l٭,,-r8mP' Pgg)LAd3m;c%ͬctou_'c6O6q*Il]|`#-5XJ!% +1|9b38"-ᱠ 3SZfvqKΦb~MDq bts*a-v07dA&W3ժNeyKH=A;Jwa'L8l#j bZupg&nMtgƗgnyRsDVG4< h!5hH yqf|hrqX3IEC׫㑆L=x& +̈́Bw%; "J7ʨ<ͪX|j>6wFGhslbtQoxB?f;Wu;n* ICqx1lPi=/2F巘Gp( ,SqO)5ķmnݽw `3}6 wiH0%GC*F(7^|Dq3m*/#{SF~ 9e.x^o8^ɡJ}J ֛14X D(l?HRD)Zxt2/嚣*C}~, +P` ޠKoR_N^k }SM]Εd<*qġJ/F)p't_./װnY2!w>O?_jh!_[r ^n?Ou|ΏW KGǙtv֫)m&~ $Q* +AЊ+0r݄n[Ldf}.繝s\22 ؖ8LS+-.}L->NNCOJ.x'&"!ٸZ?TE4C"Ws~8?.@P$!Rؠj^׫rO '$*fdH)Ҧ_77++5؞,yzk\R +* &[զ"dW! RJ9&TVH(RTBسǤb]H))y*i| ȋ¶E4?.W:]]\E,59T`j8UkRd ꏖ_A C@WenmI2J!mta|hEԈ*;֕NtJ6bTǟJ糔Rl\5CԊf9o>7tmnVA.g+W<~B7Ws~/[h[rXӇa0X%`(XmLFgy9&U +>ᜈrM ` +:cc8gTvfhFI0a4HInNoH7rúBA%EN'Z*ԡmf7ЕNN915;kFoR׵)|U/BON3MV?#bSNJ {Sshy.bފM_~[&xSKtd|+aeT_NSΧ&p +Լ0֝ mتp[TGVIc G|.D!mq~hlWi .6bEL+joRcM>stream +HWB}<$\"` K"|b=RB23$"}kN>/}e] +m؟&SM&m):QӍ_I> 6ie^xa +gbu>ިibZ 0&T1b4%Ig2@ lqSTA`D&ܱowp)ovv2o l=/ĺp V&RE]j_qPXJ+qP$ cdhm('ڙ% +υ7> p"~gə[K uQA}_pk_*fP=L&`1-#, c;VP#j],Ԅ_RVp0myYy *pD*@ 6W}8A@ܺMž\2f 00 SN|`M0ޛrB1S]I9@-? +*Kr+I#7 hoK4Z[]"ʅ)TƬWAH'ו+(PFxO$l09M|`Z *O^&0 +nXm'xoF|-`FBſ{רBMU_~p*zc3n4{vJwYQBQ3:s`Joa~##F  >Osoop=2*0n fo=FY+2jq%Jі52{˨$#[=2M/c0 +<=)'1̩LPZU5ز"w2}9FJ |$v:x,d?`ݗVz0"!YW]MU]1皻rs/ XDddTFےT.BjjWJkԅ-&e 4ިt)o۾'ɼ +levp3h?Lު,(Iwɘ> ceܵ6&/eյ7>!,0_瞞TzBs>Ŭ/`$?do])t9x eBCL岫4{ՁV!/L}1v* SI,RLK>Gfv]ʊ'}(ZpmcGEbӃwMU }Z1~"bWۥ'D+1_Z}eHKIxQ{S8L컪B*k\p!*T.Nr X'ຄ Ԍ_G;o_{vmzc~R] Rf+֚ ̈́06ģfpX@ZKI(7Lق[вd(庒M=Ϩ +ݕL-32f ''h)nZ%7;r;NH&)3vv`lB)kzpkwv-w[MPfK 4Iv|'w6k;C5;$w5kp%J>=FbH$"9y^r6"ܑ*g%:J n8wx@S٦d/},>[9mU.C|wX|Xf1EN`W‰%*BVs"$'uFBaRsǢ7E_j[_ei=YI'E>(}|گ +fN߽4]}g8FTY8Wnj%QH5tE,E2w +|(#b{1о,@!ub5;~ Mxck )IWs1`1o:(gn65YPYo{Wv -ܟ.F[h^e$5cw2G2N7[.eؿmSٶ҃'eGުMbo-#gVlo1>y qt2F-%`p@^ʉ{|>5_utkBd|z1Qݯ{ 8܍2IB`DAua([)5>XW&|lyO%GvԲ/~rv,%~G@0LJM.K4ܕvjC|d!|#. +T<ݿP~ݭcɥB[g8_t1F]5휚P{nKQ(Yoi䞌a!_[xvKq2Pˆ.\&"0coA3j=IӰ˦BtZAՋre MǪX 5ֹۗ z>w};&^;S>G'y(_<ӡ1Q)9XjL#bNJ )MF̊zvYn:7֫/%˔Ikb%F^^20hRzp;CNp;ț2KZ oOִi #HoV}ŭgf| )g[Cw.mo QE׋loԄFF/OH9|1@e,O=l4| `Z Dޯ>*{4P4-t \[/Lor+Eζ rb[0I=_ nqW{q21FU }X#3iqJЫ+YP,ee0|T|x^Z^`z[a?"aT._F¡G=1/k Ch&WX]4ɍB0GS?˙cV.ơ}õ8-Jp%BfQ,c6h徾_=(? WX01< +}eCB^0 +h,n~׀.Ȯ}U' +?/d2T(rj'Ľ+A'>5 O`|-p)SW7k <=zH팧o\{.cZ Lx-F:I69Rk-KY+24$9z!Ix +N!7XnRki`$Ce6RP\ S Kdmc'kg \;CoKh/gy'34_ujaВ,W Kʸ/Eq> ֯pT Quxg9~WH#mg"uEkS Z}#p_c}]PAQahujlϦҿ h'ug_oa3姰sc', B`w-"CtP0_Kv{'_̫cs W61 FYRdD"qwU I~nTu5FJ2N0н힠H&OZd9^xsVU]$q*$/N ͎d_8AMd2N fgrsk&'qsS+,k!S"B璡 ۖvC%a3=:0R(w8&Ln< +޼r/]ίERNW_ LX{;V7Tc^7vT77uP  8D;)d_yZ}כw##}?y咷}@r Wô d~7hg96:č|5xJ WP7^V}SKrϖY,R6+?rK|YIؚĈ eӮe]C}S %>N}F:HXq BºYBPۅ; xN +B/^!ds(i 1JM/f?EnAȵ=  UJ#q-` 7Ǿx(ߩtbƓLZB77iI.q@ϖe4NsHcgo7x4Ns{qIg_L424rv;4'oMyy8 l3 '_>t6lM<xx4Lq0rR7KD:/ q$7:+\OuJ%mk6ű9Fо҇9f1KjD̬tȱ(w9v cUg1LCi"tA5!._vM\Ɗ|w0|"0eȧ GאSGXݧ7puݚA< +K8exﱣ}x#?ukor7ͻ9F} ;QOsj^Tu4?'%?| +a@1ޕ6d!8Ai[yN^EޓFIn1xrVf ۓQ\y Š@y(ƫ$<'tʽ¢/)1s~uA Y8`~/f劏#4T%e LW; n\/jOU%}Ҏ')=1`nMv[!(ݎli}|J1^4VD&RkřEzܹTTN0 @J~< )dEBy~ϫ>l@ ⨌0nTԯGM^[ꋎxARo3x /t-ε}_͛ +z |\+8xDj+1?p4C43Uͳ=UB Wȗ@ Tû/}IqR$n +mc؋H `r3ȇ͑hJ~H+iQmԃkAo2+O_!U免ֻxخF%[(;]c_ d%bs dQ!dG-Ҥ/tr.Xau:_7QwW@szT)Omh)sg2m2VO7zE%ccJW/?L d\7 2so0x=өꩧ8 2&K/nglz'ٽb/IE!QrC8dlEbcnH+f$ऋɗ#=Zf~ou5m0BU~Ϥ]H@2Ư0lLnc;(L_@*ߠ, [Q'M/Ⱦ~ =&6O]_`Ul:kLQcY2^]sdr.v\alDh[C7c%5/,36.6|C9gY/_)3L$h /'[>X@.r%z#u>ڦc\z +wAt^̍LJOB9^ɛD!35%3+9Y{ ނXu"E!EpCYP}Wؕ3O7'^)b}mWtE DЉRHo2j7|jܦ KFʔtbJ7)캔DzmZ%kK-OvG5Q"˜3&K%f]v#l h"gE1s4WLK+*H~s W0k͈Aޒ +,3"Sɸ~Vޠu#B`U +OMc0t5۵fHSnw=d +EwF)NT M_CP_|P )Qvp' oP6> q=CUzڨq`%4,>(rQw QswoسH[|ςe-=bk'1-Jb;:Ь'c ! -9~O *ᣴq={RFr жU\wqAkDT'$_F `5S.p;DK Q>&N'А; Mer8.ж*xq ;`7K9M\N4[;g`ڂ3~1(})N+?]<6!ƝkHX׮!ȗT(Rظ/>cdO*(>È6@ yO*l8tt,=*QA'1wB@NJ>d>#*O_Cb0&߽ {;6IQ|Y N٠m c+/j_WgOU։Qڽ8;fy2t'WQ_1jHTOw0iqh!a8.*LƖ zF;,c^l|p +7žZh}W /;o˂??v҄hj^ݒ&R/w*~jX зYMoV٘BKߴq)ݗ*P/hK;+(6NnTwOhXh{{zOKˀKٞD]nʉ4vKT^Yy%?r'4PУ;mtжLܥV+ +зTa}tg}?3c/W_/oٌ7C8/)f`zUXCܖht E:$y(` o t[^9ΉgaQ$}G'P  wԁ PL(, { )׊a*)GFd%0G URI݇ +l);$(u]E" +ʔdoׁGl To"O[T^?r닍KElWhCǓE[_3z^ݜ"65֮7Yj}W7p3Y.gAPx\t+l613/ɕzg EE g"W3no~Yݞd6Z Wz6`_-.nn7ۍn wڛȑE|Dqޏ6ÌVfLhB `v#8~ϽU h{#m;FP{}ԭE5~Wuju0Uw%ìWvY_];WW󫲞^ + *C,!ӐzD!>{xxh2:!p4YuWmCrQGK(2)&˳?~<x9*kT/#Cτ:S+.owﺪ{KA@٠hԚh>.OFmuH&fX۳oxt6IL򬫼ǣ `؝˧bc,l1@|{xC/nt 3RɈ|C#4}6'R xUI'uI4Ɋ7ݭǝE@ <g18!^ǃsV +e0#9>!Ǒn0ow}ɣIӛ?~Ud `C^ څX).~)`z>O.b uf#pئV=J5AÆ><z2^F͎䯹ֹxy,3.|Vd>nyk߅, N(Whlߨu1Kx6<×Y FtHf2ލ_ n SXݥhs7v);ܵFGcoK+7X`"[E]?Mj fuUuۚ-uW@?:hT\)CG#}\yz7].Zc/CiqҾmY;zxAtN!wrmߤv\zپ RhPS;.B.0pM8gxC"uoMccv >_Oo&t&\g&ڟOY5_6/>o7|.&q>I1x7_bD +^,N%DRZy|jq"N㋣? t/^!B}񈇿o +)(ƀ/E ;hJ-n{20,΁R֘q4DD))=PA6ʀw% Ob4U61YLAHPae +喿 :H?{sF}^8;,>KQ* c{NOM^ސw`ҰVRhZf,X^H=Nq$W,u;QkO}vH&l"Ew³LR5ae5 [y`D +LňPEgX"nk -OX3BI1Q0I3#1Bؒr 2nbJ (ٽV~m`,!pJ;i=e4_ҋR@#=I +f-KNEEwޑǁ+U”K4isB1̄:g\ZxBH:-Q؀(I24yacLh~ x2}q95m`)#%&u!(QAjh/Lh1֢(+e^$@;aQF䴎ue$dzv6mIII 981Bi;Έ!Zz(.è`Dy3;(Y!!‡hmtrɞetQf#.ZF0M!4۔&|7. j w8%4W% 1$ !jRMM;vZyG5"i_* E.oF&9ejH48`%Ѱ>tvgt^ؔ#d'MAN2n!K8턯c\+}N9Q8R40G`Z]e6fZ?lO&E1bVk 6>93.RHyD\)ho9J<C.Z5[&P =~-[`ˤ:+ @|{nu Jg4#TG +}ǯ [U۸ԱQRGClZ:P~vޒ41|nf{rΘ+B8Q5>#G<2(@ܰJ A g[ ձF^|meFIV(,`zttuZpY;tN5750t:J(]+/yQQ ]t>Q{™5B@oN4PS4E^96\Y?)UX%6oJKB^8p((X> "[lBˡo~hSA!/eȧd$M$ݺF0#Y#L{Y +,!-QEVMR<.!B/暁Y#堗+A#Lڏ{>_F8ʹBEVjN$"|@%<WMo7:ځGz +}j֒ Y.7C.ɕduU@- -w8yy KR,qv+i={$Whu>;,ՅȚ}(6F?>coh|{3Y~ +yc 7>G5YRПᇥVm%)i=)nkyDw!79Uw,ØjPp:]hy֛3"WN$ɐQ}A`pvw*0pV)[KW`u~߰,wwlnr[bGg9]ڰӻ@Ҿ^VǷuMu~w-?++nN+7ot=|oe)R5O8,4ꔓ?lʲb)wy@&A}aL0 Pˑ! AC"%hM!.9'B_ j?$v!{G.1ּOY +.Dʆb8 7# +Bc,Ba)4ezu~ +`٫bxy1q7'[ێюONz8>uv=cvڠیݶsWC~ٜ>f'C.[N n \eKSz)tWh xapE>]m:\|&5 I1CFkx;?l+XDh`0 +ҧnej: ^4VJS%$*DƙR`::^%p)JBiY8. 89uMfڨELzN;+ 6dq \Potdu-R9`Hf; K?B;DϫD =ժUE!q@CƤi;8`d1r4tV!k#4sS8'吝rQ!m:6Fpx$i'8T^}61/Vu="ipZ|}D*(cO[>ж:\|)  endstream endobj 17 0 obj <>stream +HUn0}7HD`讨MuR۵"8ld,y@dMF +Q"9_0>#&JƧ?r]^ +AR-d +aɂ3">)E1YHtU 鬦uy"fEI.x|re,X1 W| <[T>q +}0`Rd!װ t)9kd,?pԒB;)?.cתּBs$8=ћ؍\?D~L2bM +š6}؎ݠ_\+#oTD:B8Rޠ^uS>w?4m=*5T)<5"` ]#~8_+LGM[8aHNQn0ƥbV H.(hMi^}7g endstream endobj 18 0 obj <> endobj xref 0 19 0000000000 65535 f +0000000016 00000 n +0000000076 00000 n +0000014971 00000 n +0000000000 00000 f +0000015022 00000 n +0000015438 00000 n +0000018351 00000 n +0000018239 00000 n +0000017513 00000 n +0000017678 00000 n +0000017726 00000 n +0000018424 00000 n +0000018631 00000 n +0000019624 00000 n +0000030493 00000 n +0000043468 00000 n +0000058508 00000 n +0000059176 00000 n +trailer <]>> startxref 59350 %%EOF \ No newline at end of file diff --git a/pdf/disc.tex b/pdf/disc.tex new file mode 100644 index 0000000..8e8a094 --- /dev/null +++ b/pdf/disc.tex @@ -0,0 +1,950 @@ + +\documentclass[a4paper,UKenglish,cleveref, autoref, thm-restate, anonymous]{lipics-v2019} +%This is a template for producing LIPIcs articles. +%See lipics-manual.pdf for further information. +%for A4 paper format use option "a4paper", for US-letter use option "letterpaper" +%for british hyphenation rules use option "UKenglish", for american hyphenation rules use option "USenglish" +%for section-numbered lemmas etc., use "numberwithinsect" +%for enabling cleveref support, use "cleveref" +%for enabling autoref support, use "autoref" +%for anonymousing the authors (e.g. for double-blind review), add "anonymous" +%for enabling thm-restate support, use "thm-restate" + +%\graphicspath{{./graphics/}}%helpful if your graphic files are in another directory +\bibliographystyle{plainurl}% the mandatory bibstyle + +\title{Byzantine Finality Gadgets} + +\titlerunning{Byzantine Finality Gadgets} %TODO optional, please use if title is longer than one line + +\author{John Q. Public}{Dummy University Computing Laboratory, [optional: Address], Country \and My second affiliation, Country \and \url{http://www.myhomepage.edu} }{johnqpublic@dummyuni.org}{https://orcid.org/0000-0002-1825-0097}{(Optional) author-specific funding acknowledgements}%TODO mandatory, please use full name; only 1 author per \author macro; first two parameters are mandatory, other parameters can be empty. Please provide at least the name of the affiliation and the country. The full address is optional + +\author{Joan R. Public\footnote{Optional footnote, e.g. to mark corresponding author}}{Department of Informatics, Dummy College, [optional: Address], Country}{joanrpublic@dummycollege.org}{[orcid]}{[funding]} + +\authorrunning{J.\,Q. Public and J.\,R. Public} %TODO mandatory. First: Use abbreviated first/middle names. Second (only in severe cases): Use first author plus 'et al.' + +\Copyright{John Q. Public and Joan R. Public} %TODO mandatory, please use full first names. LIPIcs license is "CC-BY"; http://creativecommons.org/licenses/by/3.0/ + +\begin{CCSXML} + + +10003752.10003809.10010172 +Theory of computation~Distributed algorithms +500 + + +10002978 +Security and privacy +500 + + +\end{CCSXML} + +\ccsdesc[500]{Theory of computation~Distributed algorithms} +\ccsdesc[500]{Security and privacy} +\keywords{Blockchain, distributed consensus, finality gadget, network asynchrony} %TODO mandatory; please add comma-separated list of keywords + +\category{} %optional, e.g. invited paper + +\relatedversion{} %optional, e.g. full version hosted on arXiv, HAL, or other respository/website +%\relatedversion{A full version of the paper is available at \url{...}.} + +\supplement{}%optional, e.g. related research data, source code, ... hosted on a repository like zenodo, figshare, GitHub, ... + +%\funding{(Optional) general funding statement \dots}%optional, to capture a funding statement, which applies to all authors. Please enter author specific funding statements as fifth argument of the \author macro. + + +\def\GST{\mathrm{GST}} + +\long\def\com#1{} + +\long\def\xxx#1{{\color{red} {\bf XXX }{\small [#1]}}} + +%\nolinenumbers %uncomment to disable line numbering + +%\hideLIPIcs %uncomment to remove references to LIPIcs series (logo, DOI, ...), e.g. when preparing a pre-final version to be uploaded to arXiv or another public repository + +%Editor-only macros:: begin (do not touch as author)%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% +\EventEditors{John Q. Open and Joan R. Access} +\EventNoEds{2} +\EventLongTitle{3 International Symposium on Distributed Computing} +\EventShortTitle{DISC 2020} +\EventAcronym{DISC} +\EventYear{2020} +\EventDate{October 12--16, 2020} +\EventLocation{Freiburg, Germany} +\EventLogo{} +\SeriesVolume{42} +\ArticleNo{23} +%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%%% + +\begin{document} + +\maketitle + +%TODO mandatory: add short abstract of the document +\begin{abstract} +Classic Byzantine fault-tolerant consensus protocols forfeit liveness in the face of asynchrony in order to preserve safety, whereas most deployed blockchain protocols forfeit safety in order to remain live. +In this work, we achieve the best of both worlds by proposing a novel abstractions called the \emph{finality gadget}. +A finality gadget allows for transactions to always optimistically commit but informs the clients that these transactions might be unsafe. As a result, a blockchain can execute transactions optimistically and only commit them after they have been sufficiently and provably audited. +In this work, we formally model the finality gadget abstraction, prove that it is impossible to solve it deterministically in full asynchrony (even though it is stronger than consensus) and provide a partially synchronous protocol which is currently securing a major blockchain. This way we show that the protocol designer can decouple safety and liveness in order to speed up recovery from failures. We believe that there can be other types of finality gadgets that provide weaker safety (e.g., probabilistic) in order to gain more efficiency and this can depend on the probability that the network is not in synchrony. +\end{abstract} +\section{Introduction} + + +Bitcoin~\cite{nakamoto08bitcoin} and its descendants~\cite{wood14ethereum,sasson2014zerocash} are cryptocurrencies that provide +secure automated value exchange without the need for a central managing authority. +In order to achieve this, they build on peer-to-peer networks where special nodes (usually called miners) +collect transactions from users and run a consensus protocol in order to maintain a distributed public ledger +known as the \textit{blockchain}. +One of the challenges of the consensus protocols run by these systems is that they only have the property of eventual consensus - that an ever-growing prefix of the chain will be agreed upon by all participants forever onward. But this eventual consensus process generally takes tens of minutes and only gives probabilistic guarantees - if we see a few blocks building on a given chain, we can estimate the probability that it is final. +Unfortunately, these guarantees only hold if the underlying network is well-connected and the client able to find an uncensored source of information, two assumptions that +do not hold in adversarial environments~\cite{apostolaki16hijacking, gervais15tampering, heilman15eclipse,pass16analysis}. +A second challenge is that of consistently verifying transactions that might be optimistically appended on-chain (e.g., optimistic rollups~\cite{al19lazyledger}). Currently, only valid transactions are appended on-chain, making the expectation of rolling back the chain almost equivalent to an attack. + +The underlying problem of these challenges is that first-generation blockchain protocols~\cite{nakamoto08bitcoin,garay15bitcoin} do not consider finality (i.e., when will a block never be reverted) as a first-class property, prioritizing liveness instead. +On the opposite side of the spectrum, new generation protocols~\cite{kokoris16enhancing,decker16bitcoin,pass16hybrid} (which actually build on the old quorum-based ideas) propose the complete opposite, to forfeit liveness when finality is not readily achievable. +To deploy these novel protocols we need to change the existing infrastructure and have multiple additional shortcomings. +First, these ``safety-first'' consensus protocols are exclusive. The protocol needs to put a limit on the number of participating miners in order to achieve good performance, which might lead to centralization. +Second, tying consensus with liveness of the chain means that there is no optimism, and blocks are committed only when all verification information are available. As a result, they lose the ability to make some (unsafe) progress when the network is unstable, which can (a) help speed up the recovery process when the network heals and (b) provide a broadcast channel to the parties in order to post optimistic proposals that can later be verified by all parties (since the blockchain provides a single-view) and ultimately committed. + +In this work, we show that the middle ground also merits exploration. We introduce the idea of lazy finality which is encapsulated in the abstraction of a \emph{finality gadget.} +Separating the liveness of the consensus protocol from the finality of the blocks can have four concrete benefits for the overlying blockchain protocol. First, not every node that is competing to mine a block needs to be part of the finality gadget, hence we can get the \textit{best of both worlds} (i.e., full inclusive decentralization and scalable fast finality). Second, we can reorganize the chain for blocks that have not yet been finalized, which allows for probabilistic protocols such as optimistic rollups~\cite{al19lazyledger}. Third, a finality gadget can be deployed gradually and light clients can choose to consult it or follow the longest chain rule and ignore it, enabling light client heterogeneity. +The light clients that trust the gadget do not need to have the full chain or actively listen to the network. +This can, in turn, enable scalability~\cite{avarikioti19divide} in an ecosystem of multiple chains (weather sharding~\cite{kokoris17omniledger,al18chainspace,androulaki18channels} or heterogeneous~\cite{zamyatin19sok}), where no single party receives or stores all the data in the system. +Finally, the finality gadget protocol is simpler than consensus protocols since they do not require a complex and costly view change phase, thanks to the use of an underlying blockchain that provides unsafe liveness and a consistent view when a leader blocks. + + +More specifically, this work introduces the abstraction of a \emph{finality gadget} that runs along with any block production mechanism (e.g., Nakamoto consensus) and +provides provable finality guarantees instead of probabilistic. +To this end, we formalize the finality gadget problem and show that it is impossible to satisfy its properties with a deterministic asynchronous protocol. +To circumvent this impossibility result, we introduce the GRANDPA finality gadget that works in a partially synchronous network model, in the presence of up to $1/3$ Byzantine actors. +The combination of GRANDPA with a classic block production mechanism like GHOST~\cite{lewenberg15inclusive} results in the existing deployment of the Polkadot network\footnote{https://polkadot.network/} which provides fast finality under good network conditions and protects the clients without compromising the liveness when under attack. The implementation of GRANDPA will be made available on github. +\com{ + +In summary, we make the following contributions: +\begin{itemize} + +\item Introduce the idea of lazy finality and instantiate it through a finality gadget abstraction + +\item Prove that BFG is impossible in asynchrony and present GRANDPA + +\end{itemize} +} + +%The approach that we will take is similar to the approach that Ethereum plans to take with Casper the Friendly Finality Gadget (Casper FFG)\cite{CasperFFG}, which combines these approaches. +%We will use a block production mechanism and chain selection rule that give eventual consensus and then add a finality gadget, a protocol that finalizes blocks that the participants already agree on, to get provable finality. + +%We present a finality gadget that works in a partially synchronous network model, GRANDPA, that works in the presence f up to $1/3$ Byzantine actors as well as an asynchronous finality gadget, that can cope with $1/5$ Byzantine actors. + + + +\section{Model, Definitions, and Impossibilities} + + +We want to formalize the notion of finality gadget to be a sub-protocol that can be deployed along with any protocol with +eventual consensus and probabilistic finality and enhancing such protocol with provable finality. +To achieve this, we need to incorporate into the classic definition of Byzantine agreement +the fact that we additionally have access to a protocol that would achieve eventual consensus if we did not affect it. + +\subsection{Byzantine Agreement with a Consistency Oracle} +Consider a typical definition of a multi-values Byzantine agreement: +We have a set of participants $V$, the majority of whom obey the protocol, but a constant fraction may be Byzantine, meaning they behave arbitrarily, e.g. provide false or inconsistent information or randomly go offline when they ought to be online. + +\begin{definition} A protocol for {\em multi-valued Byzantine agreement} has a set of values $S$ and a set of voters $V$, a constant fraction of which may be Byzantine, for which each voter $v \in V$ starts with an initial value $s_v \in S$ and, in the end, decides a final value $f_v \in S$ such that the following holds: + +\begin{itemize} +\item {\bf Agreement}: All honest voters decide the same value for $f_v$ +\item {\bf Termination}: All honest voters eventually decide a value +\item {\bf Validity}: If all honest voters have the same initial value, then they all decide that value +\end{itemize} + +\end{definition} + +We can change this definition to assume that instead of having an initial value, all voters have access to an external protocol, an oracle for values, that achieves eventual consensus in that it returns the same value to all voters when called after some unknown time. + +\begin{definition} +We say an oracle $A$ in a protocol is {\em eventually consistent} if it returns the same value to all participants after some unspecified time. +\end{definition} + + +\begin{definition} A protocol for the {\em multi-valued Byzantine finality gadget problem} has a set of values $S$, a set of voters $V$, a constant fraction of which may be Byzantine, for which each voter $v \in V$ has access to an eventually consistent oracle $A$ and, in the end, each voter decides a final value $f_v \in S$ such that the following holds: + +\begin{itemize} +\item {\bf Agreement:} All honest voters decide the same value for $f_v$ +\item {\bf Termination:} All honest voters eventually decide a value +\item {\bf Validity:} All honest voters decide a value that $A$ returned to some honest voter sometimes. +\end{itemize} + +\end{definition} + +\subsubsection{Impossibility of Deterministic Agreement with an Oracle.}\label{ssec:impossibility} + +For the binary case, i.e. when $|S|=2$, the Byzantine finality gadget problem is reducible to Byzantine agreement. This does not hold for $|S| > 2$, because the definition of validity is stronger in our protocol. The multi-valued Byzantine agreement cannot provide the validity condition of deciding on the initial value of some honest voter and tolerating more than a $1/|S|$ fraction of faults, since we may have a $1/|S|$ fraction of voters reporting each initial value and Byzantine voters can act honestly enough not to be detectable. For finality gadgets, this stronger validity condition is possible. A natural question is then whether the celebrated FLP~\cite{fischer85impossibility} impossibility holds for our stronger requirements. +Next, we show that an asynchronous, deterministic binary finality gadget is impossible, even with one fault. +This means that the extra information voters have here, that $A$ will eventually agree for all voters, is not enough to make this possible. + + +\subsubsection{Proof Sketch:} + +The asynchronous binary fault-tolerant agreement problem is as follows: + +We have a number of voters which each has an initial $v_i$ in $\{0,1\}$ +We may have one or more faulty nodes, which here means going offline at some point. Nodes have asynchronous communication - so any message arrives but we have no guarantee when it will. +The goal is to have all non-faulty nodes output the same $v$, which must be $0$ if all inputs $v_i$ are $0$ and $1$ if all are $1$. + +Fischer, Lynch, and Paterson\cite{fischer85impossibility} showed that this is impossible if there is one faulty node. +The binary fault-safe finality gadget problem is similar, except now there is an oracle $A$ that any node can call at any time with the following properties. +First, either $A$ always outputs $x$ in $\{0,1\}$ to all nodes at all times +or else there is an $x$ in $\{0,1\}$ and, second, +for each node $i$, there is a $T_i$ such that when $i$ calls $A$ before $T_i$. it gives $x$but if it calls $A$ after $T_i$, it returns not $x$ . + +We want that if A never switches, then all non-faulty nodes output x. If A does switch then all non-faulty nodes should output the same thing, but it can be 0 or 1. But, now we basically instantiated a binary agreement problem without an oracle. +As a result, deciding after the oracle switches value is as hard as not having an oracle at all.\com{ is also impossible, even for one faulty node, which just goes offline. Note that this generalizes Byzantine agreement, since if we could show that each node $i$ could call $A$ once at the start and use the output as $v_i$.(For the multi-valued case, we will define the problem so that this reduction does not hold.)} + + +\begin{proof}[Proof sketch] We follow the notation of \cite{fischer85impossibility} and assume for a contradiction that we use a correct protocol. +Let $r$ be a run of the protocol where $A$ gives $0$ all the time. +Then by correctness, $r$ decides $0$. Now we consider what can happen when $A$ switches to $1$ after each configuration in $r$. If it switches to $1$ at the start, then the protocol decides $1$. +If it switches to $1$ when all nodes have already decided $0$, then it decides $0$. + +We claim that some configuration in the run $r$, where there are two runs from it where $A$ is always $1$ that decide $0$ and $1$. We call such states $1$-bivalent. +To see this, assume for a contradiction that $r$ contains no such configurations. Then there are successive configurations $C$,$C'$ such that if $A$ return $1$ in the future from $C$ then we always decide $0$ but from $C'$, we always decide $1$. +Let events be $(p,m,x)$ where node (processor/voter) $p$ receives message $m$ (which may be null) and executes some code where any calls to A return $x$ in $\{0,1\}$, then sends some messages. +Then there is some event $(p,m,0)$ that when applied to $C$ gives $C'$. Now suppose that $p$ goes offline at $C$, then if $A$ always returns $1$ afterwards, then we still decide $1$. Thus there is a run $r'$ that starts at $C$ where $p$ takes no steps, $A$ always returns $1$, and all other nodes still output $1$. +But since $p$ takes no steps in $r'$, we can apply $r'$ after $(p, m, 0)$ and so we have that $C'$ has a run where $A$ always returns $1$ but decides $1$, which is a contradiction. + +Now let $C$ be a $1$-bivalent configuration. We can follow the FLP proof to show that there is a run from $C$ for which $A$ always returns $1$, all messages are delivered but all configurations are 1-bivalent and so the protocol never decides. This completes the proof by contradiction that there is no correct protocol. +\end{proof} + + + +\subsection{Definition of a Finality Gadget} + +In this section, we show how to extend the one-shot agreement to agree on a chain of blocks. One difficulty in formalizing the problem is that the block production mechanism cannot be entirely separate from the finality gadget. In order to finalize new blocks, we must first build on the chain we have already finalized. So at a minimum, the block production mechanism needs to recognize which blocks the finality gadget has finalized. We will also allow the block production mechanism to interact with the state of the finality gadget in other ways. + +We want the finality gadget to work with the most general block production mechanisms as possible. Thus we need a condition that combines the property of eventual consensus and this requirement to build on the last finalized block, but is otherwise not too restrictive. +We assume a kind of conditional eventual consensus. +If we keep building on our last finalized block $B$ and do not finalize any new blocks, then eventually we have consensus on a longer chain than just $B$, which the finality gadget can use to finalize another block. +We also want a protocol that does not terminate, but instead keeps on finalizing more blocks. + +We assume that there is a block production protocol $P$ that runs at the same time as the finality gadget protocol $G$. Actors who are participants in both protocols may behave differently in $P$ depending on what happened in $G$. +However in the reverse direction, the only way that an honest voter $v$'s behavior in $G$ is affected by $P$ is through a voting rule, a function $A(v,s_v, B)$ that depends on $v$ and its state $s_v$ and takes a block $B$ and returns a block $B'$ at the head of a chain including $B$. + +We say that the system $G$, $P$, and $A$ achieves {\em conditional eventual consensus}, if $G$ has finalized a block $B$, then eventually, either $G$ will finalize some descendant of $B$ or else all the chains with head $A_{v,s_v}(B)$ for all voters $v$ at all future states $s_v$ will contain the same descendant $B'$ of $B$. + +\begin{definition} \label{def:finality-gadget} +Let $F$ be a protocol with a set of voters $V$, a constant fraction of which may be Byzantine. +We say that $F$ solves {\em blockchain Byzantine finality gadget problem} if for every block production protocol $P$ and voting rule $A$ we have the following + +%A protocol for the blockchain Byzantine finality gadget problem has, each of whom has access to an oracle $A$ for the best chain given the last finalized block with the property that, as long as no new block is finalized, it achieves eventual consensus on some child of the last finalized block such that the following holds: + +\begin{itemize} +\item{\bf Safety:} All honest voters finalize the same block at each block number. +\item{\bf Liveness:} If the system $F, G, A$ achieves conditional eventual consensus, then all honest voters keep finalizing blocks. +\item{\bf Validity:} If an honest voter finalizes a block $B$ then that block was seen in the best chain observed by some honest voter containing some previously finalized ancestor of $B$, +\end{itemize} + +\end{definition} + +As an example, we could assume $F$ uses proof of work to build on the longest chain and includes the last block $G$ finalized. Then we take $A(v,s_v,B)$ as being the longest chain which includes $B$ and which $v$ sees in state $s_v$. It is well-known \cite{nakamoto08bitcoin} that the longest chain with proof of work achieves eventual consensus under the right assumptions and similar arguments show that in this case, we have conditional eventual consensus. +As long as we do not change the chain we are building on by finalizing another block, we will eventually agree on some prefix longer than the last finalized block. +Thus, any finality gadget that satisfies Definition \ref{def:finality-gadget} will work in this system so that all honest voters finalize an increasingly long common chain. +Thanks to the abstraction above, we can switch $F$ for one of many possible alternative consensus algorithms and $G$ will still work. + + +\com{ + +\subsection{Our results} + + + +\subsection{Related Work} + +\subsubsection{Comparison with Casper} + +The concept of finality gadget was introduced in Casper the friendly finality gadget and this remains the finality gadget that is most similar to ours. So it makes sense to compare these. However, first, we should mention the other protocols that are also called Casper. + +The first Casper was Casper TFG. Casper CBC\cite{CasperCBC} gives a recent and clearly specified version of this protocol. Its fork choice rule uses the GHOST selection rule on votes. +In Casper TFG, votes are blocks, but they are counted by participants (proposers and validators) like votes, which differs from how GHOST would be used with proof of work. It also has a flexible way of subjectively finalizing blocks based on graphs of votes. + +In Casper FFG\cite{CasperFFG}, validators vote on links between checkpoints, which occur at block numbers that are multiples of, say, 50. If there are 2/3 votes for one block at consecutive checkpoints, then we can finalize a chain of blocks up to the first checkpoint. + +Epochless Casper, + +Casper... + +There are two main differences between Casper FFG and GRANDPA. One is that in GRANDPA, different voters can cast votes simultaneously for blocks at different heights. This is achieved by borrowing the concept of GHOST on votes from Casper TFG and applying it in a more traditional Byzantine agreement protocol. + +The other main difference is how the finality gadget affects the fork-choice rule of the underlying block production mechanism. In GRANDPA, by default, we will assume that this is only affected by having to include any finalized blocks. +Casper FFG \cite{CasperFFG} does not specify a fork-choice rule, but it requires that we build on justified blocks for liveness. Later specifications of Casper use the GHOST rule on votes for fork-choice. + +Only depending on finalized blocks gives a clearer separation between the block production mechanism and finality gadget. It may, therefore, be easier to adapt to other types of protocol that achieve eventual consensus—and there have been many diverse protocols that do this developed in the last few years. +It also makes it far easier to prove liveness properties. +If the finality gadget has not finalized anything and so does not interfere, then the underlying mechanism should reach eventual consensus, which should be enough for the finality gadget to finalize whatever we have consensus on. + +On the other hand, while building on the longest chain in the absence of a finality gadget to maximize block rewards may be rational if everyone else does, this is not always the case for building on the longest chain including the last finalized block. +This is because it may be likely that a different chain is going to be finalized, in which case the rational thing to do might be to build on that. The GHOST on votes fork choice rule of ? and ? may be more rational. +It is not clear that it is, nor is it clear how to prove liveness for such a rule. Further research may be needed to show that there is a fork choice rule which is rational and leads to liveness for the finality gadget. + + + +} +\subsection{Preliminaries} \label{sec:prelims} + +\subsubsection{Network model}: We will be using a partially synchronous network model. +We assume that any message sent or received by an honest participant reaches all honest participants within time $T$, but possibly only after some Global Synchronization Time $\GST$. +Concretely, any message sent or received by some honest participant at time $t$ is received by all honest participants by time $\GST+T$ at the latest. + + +\subsubsection{Voters:} \com{We will want to change the set of participants who actively agree sometimes. +To model this, we have a large set of participants who follow messages.} +For each voting step, there is a set of $n$ voters. +We will frequently need to assume that for each such step, at most $f < n/3$ voters are Byzantine. +We need $n-f$ of voters to agree on finality. Whether or not block producers ever vote, they will need to be participants who track the state of the protocol. + +\subsubsection{Votes:}A vote is a block hash, together with some metadata such as round number and the type of vote, such as {\em prevote} or {\em precommit}, all signed with a voter's private key. + +\subsubsection{Rounds:}Each participant has their own idea of what is the current round number. Every prevote and precommit has an associated round number. Honest voters only vote once (for each type of vote) in each round and do not vote in earlier rounds after later ones. +Participants need to keep track of which block they see as currently being the latest finalized block and an estimate of which block could have been finalized in the last round. + + +For block $B$, we write $\mathrm{chain}(B)$ for the chain whose head is $B$. The block number, $n(B)$ of a block $B$ is the length of $\mathrm{chain}(B)$. +For blocks $B'$ and $B$, we say $B$ is later than $B'$ if it has a higher block number. +We write $B > B'$ or that $B$ is descendant of $B'$ for $B$, $B'$ appearing in the same blockchain with $B'$ later i.e. $B' \in \mathrm{chain}(B)$ with $n(B) > n(B')$. +$B \geq B'$ and $B \leq B'$ are similar except allowing $B = B'$. +We write $B \sim B'$ or $B$ and $B'$ are on the same chain if $B B'$; and $B \nsim B'$ or $B$ and $B'$ are not on the same chain if there is no such chain. + +Blocks are ordered as a tree with the genesis block as root. So any two blocks have a common ancestor but two blocks not on the same chain do not have a common descendant. +A vote $v$ for a block $B$ by a voter $V$ is a message signed by $V$ containing the blockhash of $B$ and meta-information like the round numbers and the type of vote. + +A voter equivocates in a set of votes $S$ if they have cast multiple different votes in $S$. We call a set $S$ of votes safe if the number of voters who equivocate in $S$ is at most $f$. We say that $S$ has a supermajority for a block $B$ if the set of voters who either have a vote for blocks $\geq B$ or equivocate in $S$ has size at least $(n+f+1)/2$. We count equivocations as votes for everything so that observing a vote is monotonic, meaning that if $S \subset T$ then if $S$ has a supermajority for $B$ so does $T$, while being able to ignore yet more equivocating votes from an equivocating voter. + +For our finality gadget (GRANDPA) we use the ghost~\cite{lewenberg15inclusive} eventual consensus algorithm as $F$. +The $2/3$-GHOST function $g(S)$ takes a set $S$ of votes and returns the block $B$ with highest block number such that $S$ has a supermajority for $B$. +If there is no such block, then it returns `nil`. \com{(if $f \neq \lfloor (n-1)/3 \rfloor$, then this is a misnomer and we may change the name of the function accordingly.)} +Note that, if $S$ is safe, then we can compute $g(S)$ by starting at the genesis block and iteratively looking for a child of our current block with a supermajority, which must be unique if it exists. Thus we have: +\begin{lemma} \label{lem:ghost-monotonicity} +Let $T$ be a safe set of votes. Then +\begin{enumerate} +\item The above definition uniquely defines $g(T)$ +\item If $S \subseteq T$ has $g(S) \neq$ nil, then $g(S) \leq g(T)$. +\item If $S_i \subseteq T$ for $1 \leq i \leq n$ then all non-nil $g(S_i)$ are on a single chain with head $g(T)$. +\end{enumerate} + +\end{lemma} + +Note that we can easily update $g(S)$ to $g(S \cup \{v\})$, by checking if any child of $g(S)$ now has a supermajority. +The third rule tells us that even if participants see different subsets of the votes cast in a given voting round, this rule may give them different blocks but all such blocks are in the same chain under this assumption. + +Next, we define a notion of possibility to have a supermajority which says that if the set of all votes in a vote $T$ is safe and some participant observes a subset $S \subseteq T$ that has a supermajority for a block $B$ then all participants who see some other subset $S' \subseteq T$ still see that it is possible for $S$ to have a supermajority for $B$. We need a definition that extends to unsafe sets. +We say that it is {\em impossible} for a set $S$ to have a supermajority for $B$ if at least $(n+f+1)/2$ voters either vote for a block $\not \geq B$ or equivocate in $S$. Otherwise it is {\em possible} for $S$ to have a supermajority for $B$. + +Note that if $S$ is safe, it is possible for $S$ to have a supermajority for $B$ if and only if there is a safe $T \supseteq S$ that has a supermajority for $B$, which can be constructed by adding a vote from $B$ for all voters without votes in $S$ and enough voters who already have voted in $S$ to bring the number of equivocations up to $f$. + +We say that it is {\em impossible} for any child of $B$ to have a supermajority in $S$ if $S$ has votes from at least $2f+1$ voters and it is impossible for $S$ to have a supermajority for each child of $B$ appearing on the chain of any vote in $S$. +Again, provided $S$ is safe, this holds if and only if for any possible child of $B$, there is no safe $T \subseteq S$ that has a supermajority for that child. +\com{ +Note that it is possible for an unsafe $S$ to both have a supermajority for $S$ and for it to be impossible to have such a supermajority under these definitions, as we regard such sets as impossible anyway. +} +\begin{lemma} \label{lem:impossible} +\begin{itemize} +\item[(i)] If $B' \geq B$ and it is impossible for $S$ to have a supermajority for $B$, then it is impossible for $S$ to have a supermajority for $B'$. +\item[(ii)] If $S \subseteq T$ and it is impossible for $S$ to have a supermajority for $B$, then it is impossible for $T$ to have a supermajority for $B$. +\item[(iii)] If $g(S)$ exists and $B \nsim g(S)$ then it is impossible for $S$ to have a supermajority for $B$. +\end{itemize} +\end{lemma} + + +\section{Finality Gadget Protocols} \label{sec:finality} + +\com{ +To discover up with a solution to the blockchain Byzantine finality gadget problem, we will typically look at various Byzantine agreement protocols and use those to find protocols for the multi-valued Byzantine finality gadget problem. +Agreement protocols with appropriate properties can be used to find protocols for the blockchain Byzantine finality gadget problem by considering running them in parallel at every block number. +If the one block protocol has the right properties then they will agree on blocks consistently, so if we finalize a block then we also finalize its ancestors and we can come up with a succinct protocol. + +For example, suppose we have a one-block protocol that calls for a vote on blocks which requires a participant to observe a supermajority, said votes from $2/3$ of voters, for some block, or else the participant observes that the vote is undecided. Now imagine running this vote in parallel for every block number and have any honest voter vote for blocks from a particular chain. +Byzantine voters may vote more than once, but if we count a vote for a block as a vote for each ancestor of the block in the vote for the instance of the one block protocol with its number, then Byzantine voters must also vote for chains, though they can vote for multiple chains. +If we do this, then we see that if a block has a supermajority in a vote, then so does all its ancestors in their votes. Thus the blocks with a supermajority form a chain. +Furthermore, if only $1/3$ of voters equivocate then if a participant sees a subset of the votes for chains, then they must see a prefix of the chain of blocks for which all the votes have supermajorities. Intuitively, the protocol can agree on the prefix that $2/3$ of voters agree on using this. + +To ensure safety, each participant maintains an estimated $E_r$ of the last block that could have been finalized in a round $r$. This has the property that in future rounds it overestimates the block that could have been finalized so that in round $r$, the chain with head $E_{r-1}$ contains all blocks that could have been finalized. +Any honest voter only votes in round $r$ for chains containing their estimate $E_{r-1}$ and this guarantees that any block that could have been finalized in round $r-1$ will be finalized in round $r$. +} + +In order to find a solution to the finality gadget protocol, we look in +consensus protocols that solve the stronger problem as described in the previous section. The key idea for our solution is to inherit the safety properties of a consensus protocol, but use the underlying blockchain as the driving force of liveness. This results in a protocol that does not stop when for example the network is split. +Instead, only the finalization stops, but the blocks keep getting created and propagated to everyone. +This means that when the conditions are safe again, the finality gadget only needs to finalize the head of the chain\footnote{Which the oracle will return quickly to a supermajority of miners.}, +instead of having to transmit and run consensus on every block. \com{ +In Figure~\ref{fig:finality}, we analyze the differences between classic blockchain protocols~\cite{nakamoto08bitcoin,wood14ethereum}, finality gadget, and hybrid consensus solutions~\cite{kokoris16enhancing,gilad17algorand}} + + + + + +\subsection{The GRANDPA Protocol}\label{sec:grandpa} +In this section, we give our solution to the Byzantine finality gadget problem, GRANDPA. Our finality gadget works a partially synchronous setting. + +GRANDPA works in rounds, each round has a set of $3f+1$ eligible voters, $2f+1$ of which are assumed honest. Furthermore, we assume that each round has a participant designated as primary and all participants agree on the voter sets and primary. We will either choose the primary pseudo-randomly from or rotate through the voter set. +On a high-level, each round consists of a double-echo protocol after which every party waits in order to detect whether we can finalize a block in this round (this block does not need to be the immediate ancestor of the last finalized block, it might be far ahead from the last finalized block). If the round is unsuccessful, the parties simply move on to the next round with a new primary. When a good primary is selected, the oracle is consistent (returns the same value to all honest parties), +and the network is in synchrony (after $\GST$), then a new block will be finalized and it will transitively finalize all its ancestors. + +More specifically, we let $V_{r,v}$ and $C_{r,v}$ be the sets of prevotes and precommits respectively received by $v$ from round $r$ at the current time. + +We define $E_{r,v}$ to be $v$'s estimate of what might have been finalized in round $r$, given by the last block in the chain with head $g(V_{r,v})$ for which it is possible for $C_{r,r}$ to have a supermajority. Next, we define a condition which will allow us to safely conclude that $E_{r,v} \geq B$ for all $B$ that might be finalized in round $r$: +If either $E_{r,v} < g(V_{r,v})$ or it is impossible for $C_{r,v}$ to have a supermajority for any children of $g(V_{r,v})$, then we say that {\em $v$ sees that round $r$ is completable}. $E_{0,v}$ is the genesis block, assuming we start at $r=1$. + +In other words, a round $r$ is completable when our estimate chain $E_{r,v}$ contains everything that could have been finalized in round $r$, which makes it possible to begin the next round $r+1$. + +We have a time-bound $T$ that after $\GST$ suffices for all honest participants to communicate with each other. +Inside a round, the properties both of $E_{r,v}$ having a supermajority, meaning $E_{r,v} < g(V_{r,v})$, as well as of it being impossible to have a supermajority for some given block are monotone, so the property of being completable is monotone as well. +We, therefore, expect that, if anyone sees a round is completable, then everyone will see this within time $T$. Leaving a gap of $2T$ between steps is then enough to ensure that every party receives all honest votes before continuing. + + +\subsubsection{Protocol Description.} +In round $r$ an honest participant $v$ does the following: + +\noindent \fbox{\parbox{5.5in}{ + +\begin{enumerate} +\item A voter $v$ can start round $r > 1$ when round $r-1$ is completable and $v$ has cast votes in all previous rounds where they are a voter. Let $t_{r,v}$ be the time $v$ starts round $r$. + +\item At time $t_{r,v}$, if $v$ is the primary of this round and has not finalized $E_{r-1,v}$ then they broadcast $E_{r-1,v}$. If they have finalized it, they can broadcast $E_{r-1,v}$ anyway (but do not need to). + +\item If $v$ is a voter for the prevote of round $r$, $v$ waits until either it is at least time $t_{r,v}+2T$ or round $r$ is completable, then broadcasts a prevote. +They prevote for the head of the best chain containing $E_{r-1,v}$ unless we received a block $B$ from the primary and $g(V_{r-1,v}) \geq B > E_{r-1,v}$, in which case they use the best chain containing $B$ instead. + +\item If $v$ is a voter for the precommit step in round $r$, then they wait until $g(V_{r,v}) \geq E_{r-1,v}$ and one of the following conditions holds +\begin{itemize} +\item[(i)] it is at least time $t_{r,v}+4T$, +\item[(ii)] round $r$ is completable or +\item[(iii)] it is impossible for $V_{r,v}$ to have a supermajority for any child of $g(V_{r,v})$, +\end{itemize} +and then broadcasts a precommit for $g(V_{r,v})$ {\em( (iii) is optional, we can get away with just (i) and (ii))}. + +\end{enumerate} + +}} + +Note that $C_{r,v}$ and $V_{r,v}$ may change with time and also that $E_{r-1,v}$, which is a function of $V_{r-1,v}$ and $C_{r-1,v}$, can also change with time if $v$ sees more votes from the previous round. + +\subsubsection{Finalization.} + +If, for some round $r$, at any point after the precommit step of round $r$, we have that $B=g(C_{r,v})$ is later than our last finalized block and $V_{r,v}$ has a supermajority, then we finalize $B$. +We may also send a commit message for $B$ that consists of $B$ and a set of precommits for blocks $\geq B$. + +To avoid spam, we only send commit messages for $B$ if we have not received any valid commit messages for $B$ and its descendants and we wait some time chosen uniformly at random from $[0,1]$ seconds or so before broadcasting. +If we receive a valid commit message for $B$ for round $r$, then it contains enough precommits to finalize $B$ itself if we have not already done so, so we'll finalize $B$ as long as we are past the precommit step of round $r$. + + +\com{ +\subsection{Discussion} + +\subsubsection{Wait at the end of a round before precommitting.} + +If the network performs badly, then these steps may involve waiting for an arbitrarily long time. When the network is well behaved (after the $\GST$ in our model), we should not be waiting. Indeed there is little point not waiting to receive $2f+1$ of voters' votes as we cannot finalize anything without them. +But if the network is not perfect and some messages never arrive, then we may need to make voters asking other voters for votes from previous rounds.\com{ in a similar way to the challenge procedure, to avoid deadlock.} + +In exchange for our design choice of waiting, we get the property that we do not need to pay attention to votes from before the previous round in order to vote correctly in this one. Without waiting, we could be in a situation where we might have finalized a block in some round r, but the network becomes unreliable for many rounds and gets few votes on time, in which case we need to remember the votes from round r to finalize the block later. + +\subsubsection{Using a Primary} + +We only need the primary for liveness. +We need some form of coordination to defeat the repeated vote-splitting attack. The idea behind that attack is that if we are in a situation where almost 2/3 of voters vote for something and the rest vote for another, then the Byzantine voters can control when we see a supermajority for something. If they can carefully time this, they may be able to split the next vote. +Without the primary, they could do this for prevotes, getting a supermajority for a block $B$ late, then split precommiher from being finalized like this even if the (unknown) fraction of Byzantine players is small. + +When the network is well-behaved, an honest primary can defeat this attack by deciding how much we should agree on. We could also use a common coin for the same thing, where people would prevote for either the best chain containing $E_{r-1,v}$ or $g(V_{r-1,v})$ depending on the common coin. +With on-chain voting, it is possible that we could use probabilistic finality of the block production mechanism - that if we do not finalize a block and always build on the best chain containing the last finalized block then not only will the best chain eventually converge, but if a block is behind the head of the best chain, then with positive probability, it will eventually be in the best chain everyone sees. + +In our setup, having a primary is the simplest option for this. +ts so we do not see that it is impossible for there to be a supermajority for $B$ until late. +If $B$ is not the best block given the last finalized block but $B'$ with the same block number, they could stop it + +} + + + +\section{ Analysis } + + +To analyze the performance of our finality gadget, we will need versions of our properties that appropriately depend on time: + +\begin{itemize} +\item{\bf Fast termination:} {\em If the last finalized block has number $n$ and, until another block is finalized, the best chain observed by all participants will include the same block with block number $n+1$, then a block with number $n+1$ will be finalized within time $T$.} +\item{\bf Recent validity:} {\em If an honest voter finalizes a block $B$ then that block was seen in the best chain observed by some honest voter containing some previously finalized ancestor of $B$ more recently than time $T$ ago.} +\end{itemize} + +Intuitively, fast termination implies that we finalize blocks fast as long as the block production mechanism achieves consensus fast whereas recent validity bounds the cost of starting to agree on something the block production mechanism's consensus later decides is not the best. In this case, we may waste time building on a chain that is never finalized so it is important to bound how long we do that. + +These properties will typically only hold with high probability. In the asynchronous case, we would need to measure time in rounds of the protocol rather than seconds to make sense of these properties. We are also interested in being able to remove and punish Byzantine voters, for which we will need: + +\begin{itemize} + \item{\bf Accountable Safety:} {\em If blocks on different chains are finalized, then we can identify at least $f+1$ Byzantine voters.} +\end{itemize} + + + +\subsection{ Accountable Safety} + +The first thing we want to show is asynchronous safety, assuming we have at most $f$ Byzantine voters. This follows from the property that if $v$ sees round $r$ as completable then any block $B$ with $E_{r,v} \not\leq B$ has that it is impossible for one of $C_{r,v}$ or $V_{r,v}$ to have a supermajority for $B$ and so $B$ was not finalized in round $r$. This ensures that all honest prevotes and precommits in round $r+1$ are for chains that include any blocks that could have been finalized in round $r$. With an induction, this is what ensures that we cannot finalize blocks on different chains. To show accountable safety, we need to turn this proof around to show the contrapositive, when we finalize different blocks, then there are $f+1$ Byzantine voters. If we make this proof constructive, then it gives us a challenge procedure, that can assign blame to such voters. + +\begin{theorem} \label{thm:accountable} If the protocol finalizes any two blocks $B,B'$ for which valid commit messages were sent, but which do not lie on the same chain, then there are at least $f+1$ Byzantine voters who all voted in a particular vote. Furthermore, there is a synchronous procedure to find some such set $X$ of $f+1$ Byzantine voters. +\end{theorem} + +The challenge procedure works as follows: If $B$ and $B'$ are committed in the same round, then the union of their precommits must contain at least $f$ equivocations, so we are done. Otherwise, we may assume by symmetry that $B$ was committed in round $r$ and $B'$ in round $r' > r$. There are at least $n-f$ voters who precommitted $\geq B'$ or equivocated in round $r$ in their commit messages, so we ask those who precommitted $\geq B'$ why they did so. + +Starting with $r''=r' $, we ask queries of the following form: +\begin{itemize} +\item Why was $E_{r''-1} \not\geq B$ when you prevoted for or precommitted to $B'' \not\geq B$ in round $r'' > r$? +\end{itemize} +\noindent Any honest voter should be able to respond to this, as is shown in Lemma \ref{lem:honest-answer} below. + +The response is of the following form: +\begin{itemize} +\item A either a set $S$ of prevotes for round $r''-1$, or else a set $S$ of precommits for round $r''-1$, in either case, such that it is impossible for $S$ to have a supermajority for $B$. +\end{itemize} + +Any honest voter should respond. In particular, if no voter responds, then we consider all voters how should have responded but did not as Byzantine and we return this set of voters, along with any equivocators, which will be at least $n-f$ voters total. If any do respond, then if $r'' > r+1$, we can ask the same query for at least $n-f$ voters in round $r''-1$. We note however that if any voters do respond then we will not punish non-responders. + +If we ask such queries for a vote in all rounds between $r''=r'$ and $r''=r+1$ and get valid responses, since some voter responds when $r''=r+1$, then we have either a set $S$ of prevotes or precommits in round $r$ that show it is impossible for $S$ to have a supermajority for $B$ in round $r$. + +If $S$ is a set of precommits, then if we take the union of $S$ and the set of precommits in the commit message for $B$, then the resulting set of precommits for round $r$ has a supermajority for $B$ and it is impossible for it to have a supermajority for $B$. This is possible if the set is not safe and so there must be at least $f+1$ voters who equivocate an so are Byzantine. + +If we get a set $S$ of prevotes for round $r$ that does not have a supermajority for $B$, then we need to ask a query of the form + +\begin{itemize} +\item Which prevotes for round $r$ have you seen? +\end{itemize} +\noindent to all the voters of precommit in the commit message for $B$ who voted for blocks $B'' \geq B$. There must be $n-f$ such voters and a valid response to this query is a set $T$ of prevotes for round $r$ with a supermajority for $B''$ and so a supermajority for $B$. + + +If any give a valid response, by a similar argument to the above, $S \cup T$ will have $f+1$ equivocations. + +So we either discover $f+1$ equivocations in a vote or else $n-f > f+1$ voters either equivocate or fail to validly respond as an honest voter could do to a query. + + +\begin{lemma} \label{lem:honest-answer} +An honest voter can answer the first type of query. +\end{lemma} +We first show that, if a prevote or precommit in round $r$ is cast by an honest voter $v$ for a block $B''$, then at the time of the vote we had $B'' \geq E_{r-1,v}$. +Prevotes should be for the head of a chain containing either $E_{r-1,v}$ or some $B''' > E_{r-1,v}$ by step 2 or 3. In either case we have $B'' \geq E_{r-1,v}$. Precommits should be for $g(V_{r,v})$ but $v$ waits until $g(V_{r,v}) \geq E_{r-1,v}$, by step 4, before precommitting, so again this holds. +It follows that, if $B'' \not\geq B$, then we had $E_{r-1,v} \not\geq B$. + +We next show that if we had $E_{r-1,v} \not\geq B$ at the time of the vote then we can respond to the query validly, by demonstrating the impossibility of a supermajority for $B$. +If $B$ was not on the same chain with $g(V_{r-1,v})$, then by Lemma \ref{lem:impossible} (iii), it was impossible for $V_{r-1,v}$ to have a supermajority for $B$, as desired. +If $B$ was on the same chain as $g(V_{r-1,v})$, then it was on the same chain as $E_{r-1,v}$ as well. In this case, we must have $B > E_{r-1,v}$ since $E_{r-1,v} \not\geq B$. +% ?????? +% ... Need $E_{r-1,v} \geq g(V_{r-1,v})$ somehow?? ... +% ?????? +% As $v$ started the round, we know $v$ sees $r-1$ as completable, so +% either $E_{r-1,v} < g(V_{r-1,v})$ or it is impossible for $C_{r-1,v}$ to have a supermajority for any children of $g(V_{r-1,v})$, +% ?????? + However, possibly using that round $r-1$ is completable, it was impossible for $C_{r-1,v}$ to have a supermajority for any child of $E_{r-1,v}$ on the same chain with $g(V_{v,r})$ and in particular for the child of $E_{r-1,v}$ on $\textrm{chain}(B)$. +% ?????? +By Lemma \ref{lem:impossible} (i), this means $C_{r-1,v}$ did not have a supermajority for $B$, again as desired. + +Thus we have that, at the time of the vote, for one of $V_{r-1,v}$, $C_{r-1,v}$, it was impossible to have a supermajority for $B$. The current sets $V_{r-1,v}$ and $C_{r-1,v}$ are supersets of those at the time of the vote, and so by Lemma \ref{lem:impossible} (ii), it is still impossible. Thus $v$ can respond validly. + + +This is enough to show Theorem \ref{thm:accountable}. Note that if $v$ sees a commit message for a block $B$ in round $r$ and has that $E_{r',v} \not\geq B$, for some completable round $r' \geq r$, then they should also be able to start a challenge procedure that successfully identifies at least $f+1$ Byzantine voters in some round. Thus we have that: + +\begin{corollary} \label{cor:overestimate-final} +If there at most $f$ Byzantine voters in any vote, $B$ was finalized in round $r$, and an honest participant $v$ sees that round $r' \geq r$ is completable, then $E_{r',v} \geq B$. +\end{corollary} + +\subsection{Liveness } + +We show the protocol is deadlock-free and also that it finalizes new blocks quickly in a weakly synchronous model. +For this section, we will assume that there are at most $f < n/3$ Byzantine voters for each vote, and so that the sets of prevotes and precommits for each round are safe. + +We define $V_{r,v,t}$ be the set $V_{r,v}$ at time $t$ and similarly for $C_{r,v,t}$ and the block $E_{r,v,t}$ . + +We first show that the completability of a round and the estimate for a completable round are monotone in the votes we see, in the latter case monotonically decreasing: + +\begin{lemma} \label{lem:message-monotonicity-completed-estimate} +Let $v,v'$ be (possibly identical) honest participants, $t,t'$ be times, and $r$ be a round. +Then if $V_{r,v,t} \subseteq V_{r,v',t'}$ and $C_{r,v,t} \subseteq C_{r,v',t'}$and $v$ sees that $r$ is completable at time $t$, then $E_{r,v',t'} \leq E_{r,v,t}$ and $v'$ sees that $r$ is completable at time $t'$. +\end{lemma} + +\begin{proof} +Since $v$ sees that $r$ is completable at time $t$, +either $E_{r,v} < g(V_{r,v})$ requiring $(n+f+1)/2 > 2f + 1$ votes, or else it is impossible for $C_{r,v}$ to have a supermajority for any children of $g(V_{r,v})$, requiring $2f + 1$ votes. +In either case, both $V_{r,v,t}$ and $C_{r,v,t}$ contain votes from $2f + 1$ voters and so the same holds for $V_{r,v',t'}$ and $C_{r,v',t'}$. +By Lemma \ref{lem:ghost-monotonicity} (ii), $g(V_{r,v',t'}) \geq g(V_{r,v,t})$. +As it is impossible for $C_{r,v,t}$ to have a supermajority for any children of $g(V_{r,v,t})$, it follows from Lemma \ref{lem:impossible} (i \& ii) that it is impossible for $C_{r,v',t'}$ as well, and so both $E_{r,v',t'} \leq g(V_{r,v,t})$ and $v'$ sees $r$ is completable at time $t'$. +But now $E_{r,v,t}$ and $E_{r,v',t'}$ are the last blocks on $\textrm{chain}(g(V_{r,v,t}))$ for which it is possible for $C_{r,v,t}$ and $C_{r,v',t'}$ respectively to have a supermajority, +As it is possible for $C_{r,v',t'}$ to have a supermajority for $E_{r,v',t'}$, then it is possible for $C_{r,v,t}$ to have a supermajority for $E_{r,v',t'}$ as well, by Lemma \ref{lem:impossible} (ii) and tolerance assumptions, so $E_{r,v',t'} \leq E_{r,v,t}$. +\end{proof} + +\subsubsection{Deadlock Freeness} + +Now we can show deadlock freeness for the asynchronous network model when a message that is sent or received by any honest participant is eventually received by all honest participants. This holds because the oracle encapsulates this eventual delivery guarantee. + +\begin{proposition} Suppose that we are in the asynchronous network model and that at most $f$ voters for any vote are Byzantine. Then the protocol is deadlock-free.\end{proposition} + +\begin{proof} We need to show that if all honest participants reach some vote, then all of them eventually reach the next. + +If all honest voters reach a vote, then they will vote and all honest participants see their votes. We need to deal with the two conditions that might block the algorithm even then. +To reach the prevote of round $r$, a participant may be held up at the condition that round $r-1$ must be completable. To reach the precommit, a voter may be held up by the condition that $g(V_{r,v}) \geq E_{r-1,v}$. + +For the first case, the prevote, let $S$ be the set of all prevotes from round $r-1$ that any honest voter saw before they precommitted in round $r-1$. +By Lemma \ref{lem:ghost-monotonicity}, when voter $v'$ precommitted, they do it for block $g(V_{r-1,v'}) \leq g(S)$. +Let $T$ be the set of precommits in round $r$ cast by honest voters. +Then for any block $B \not\leq g(S)$, $T$ does not contain any votes that are $\geq B$ and so it is impossible for $T$ to have a supermajority for $B$. +In particular, it is impossible for $T$ to have a supermajority for any child of $g(S)$. + +Now consider a voter $v$. By our network assumption, there is a time $t$ by which they have seen the votes in $S$ and $T$. Consider any $t' \geq t$. +At this point we have $g(V_{r,v,t;}) \geq g(S)$. It is impossible for $C_{r,v,t'}$ to have a supermajority for any child of $g(S)$ and so $E_{r-1,v,t'} \leq g(S)$, whether or not this inequality is strict, we satisfy one of the two conditions for $v$ to see that round $r-1$ is completable at time $t'$. +Thus if all honest voters reach the precommit vote of round $r-1$, all honest voters reach the prevote of round $r$. + +Now we consider the second case, reaching the precommit. +Note that any honest prevoter in round $r$ votes for a block $B_v \geq E_{r-1,v,t_v}$ where $t_v$ is the time they vote. Now consider any honest voter for the precommit $v'$. By some time $t'$, they have received all the messages received by each honest voter $v$ at time $t_v$ and $v'$'s prevote. +Then by Corollary \ref{cor:overestimate-final}, $B_v \geq E_{r-1,v,t_v} \geq E_{r-1,v',t'}$. Since $V_{r,v',t'}$ contains these $B_v$, $g(V_{r,v',t'}) \geq E_{r-1,v',t'}$. Thus if all honest voters prevote in round $r$, eventually all honest voters precommit in round $r$. + +An easy induction completes the proof of the proposition. +\end{proof} + +\subsubsection{Weakly synchronous liveness} + +Now we consider the weakly synchronous network model. The idea that there is some global stabilization time($\GST$) such that any message received or sent by an honest participant at time $t$ is received by all honest participants at time $\max\{t,\GST\}+T$. + +Let $t_r$ be the first time any honest participant enters round $r$ i.e. the minimum over honest participants $v$ of $t_{r,v}$. + +\begin{lemma} \label{lem:timings} +Assume the weakly synchronous network model and that each vote has at most $f$ Byzantine voters. Then if $t_r \geq \GST$, we have that +\begin{itemize} +\item[(i)] $t_r \leq t_{r,v} \leq t_r+T$ for any honest participant $v$, +\item[(ii)] no honest voter prevotes before time $t_r+2T$, +\item[(iii)] any honest voter $v$ precommits at the latest at time $t_{r,v}+4T$, +\item[(iv)] for any honest $v$, $t_{r+1,v} \leq t_r + 6T$. +\end{itemize} +\end{lemma} + + +\begin{proof} Let $v'$ be one of the first honest participants to enter round $r$ i.e. with $t_{r,v'}=t_r$. +By our network assumption, all messages received by $v'$ before they ended are received by all honest participants before time $t_r+T$. +In particular at time $t_r$, $v'$ sees that all previous rounds are completable and so by Corollary \ref{cor:overestimate-final}, so does every other honest participant by time $t_r+T$. +Also since for $r' < r$, at some time $s_{r'} \leq t_r$ $g(V_{r',v',s_r'}) \geq E_{r',v',s_r'}$, again by Lemma 4, for all honest $v$, $g(V_{r',v,t_r+T}) \geq E_{r',v,t_r+T}$. Looking at the conditions for voting, this means that any honest voter does not need to wait before voting in any round $r' \leq r$. +Thus they cast any remaining votes and enter round $r$ by time $t_r + T$. This shows (i). + +For (ii), note that the only reason why an honest voter would not wait until time $t_{r,v}+2T \geq t_r+ 2T$ is when $n-f$ voters have already prevoted. But since some of those $n-f$ votes are honest, this is impossible before $t_r+2T$ + +Now an honest voter $v''$ prevotes at time $t_{r,v''}+2T \leq t_r +3T$ and by our network assumptions all honest participants receive this vote by time $t_r+4T$. An honest voter for the precommit $v$ has also received all messages that $v''$ received before they prevoted by then. +Thus the block they prevoted has $B_{v''} \geq E_{r-1,v''} \geq E_{r-1,v,t_r+4T}$, since this holds for every honest voter $v''$, $g(V_{r,v,t_r+4T}) \geq E_{r-1,v,t_r+4T}$. Thus they will precommit by time $t_{r,v}+4T$ which shows (iii). + +By the network assumption an honest voter $v'$'s precommit will be received by all honest participants $v$ by time $t_{r,v'}+ 5T \leq t_r+6T$. +Since $v$ will also have received all prevotes $v$ say when they precommitted by this time, their vote $B_{v'}$ will have $B_{v'}=g(V_{r,v'}) \leq g(V_{r,v,t_r+6T})$. +Thus $C_{r, v, t_r+6T}$ contains precommits from $n-f$ voters $v'$ with $B_{v'} \leq g(V_{r,v,t_r+6T})$ and thus it is impossible for $C_{r,v,t_r+6T}$ to have a supermajority for any children of $g(V_{r,v, t_r+6T})$. +Thus $v$ sees that round $r$ is completable at time $t_r+6T$. Since they have already prevoted and precommitted if they were a voter, they will move to round $r+1$ by at the latest $t_t+6T$. This is (iv). +\end{proof} + +\begin{lemma} \label{lem:honest-prevote-timings} +Suppose $t_r \geq \GST$ and every vote has at most $f$ Byzantine voters. Let $H_r$ be the set of prevotes ever cast by honest voters in round $r$. Then +\begin{itemize} +\item[(a)] any honest voter precommits to a block $\geq g(H_r)$, + +\item[(b)] every honest participant finalizes $g(H_r)$ by time $t_r+6T$. +\end{itemize} +\end{lemma} + +\begin{proof} For (a), we separate into cases based on which of the conditions (i)-(iii) that we wait for to precommit hold. + +For (i), all honest voters prevote in round $r$ by time $t_r+3T$. So any honest voter $v$ who precommits at or after time $t_{r,v}+4T \geq t_r+4T$ has received all votes in $H_r$ and by Lemma \ref{lem:ghost-monotonicity}, precommits to a block $\geq g(H_r)$. + +For (ii), we argue that no honest voter commits a block $\not\geq g(H_r)$ first. The result will then follow by an easy induction once the other cases are dealt with. Suppose that no honest voter has precommitted a block $\not \geq g(H_r)$ so far and that a voter $v$ votes early because of (ii). + +Note that, since we assume that all precommits by honest voters so far were $\geq g(H_r)$, it is possible for $C_{r,v}$ to have a supermajority for $g(H_r)$. +For (ii) to hold for a voter $v$ i.e for round $r$ to be completable, it must be the case that either it is impossible for $C_{r,v}$ to have a supermajority for $g(V_{r,v})$ or else be impossible for $C_{r,v}$ to have a supermajority for any children of $g(V_{r,v})$. By Lemma \ref{lem:impossible} cannot have $g(V_{r,v}) < g(H_r)$. +But by Lemma \ref{lem:ghost-monotonicity}, these are on the same chain and so $g(V_{r,v}) \geq g(H_r)$. Since this is the block $v$ precommits to, we are done in case (ii) + +For (iii), let $v$ be the voter in question. Note that since $n-f$ honest voters prevoted $\geq g(H_r)$, it is possible for $V_{r,v}$ to have a supermajority for $g(H_r)$. By Lemma \ref{lem:ghost-monotonicity}, $g(V_{r,v})$ is on the same chain as $g(H_r)$. +For (iii), it is impossible for $V_{r,v}$ to have a supermajority for any children of $g(V_{r,v})$. If we had $g(V_{r,v}) < g(H_r)$, by Lemma \ref{lem:impossible}, this would mean that it would be impossible for $V_{r,v}$ to have a supermajority for $g(H_r)$ as well. So it must be that $g(V_{r,v} )\geq g(H_r)$ as required. + +For (b), combining (a) and Lemma \ref{lem:timings} (iii), we have that any honest voter $v$ precommits $\geq g(H_r)$ by time $t_{r,v}+4T$. By our network assumption, all honest participants receive these precommits by time $t_r+6T$ and so finalize $g(H_r)$ if they have not done so already. +\end{proof} + +\begin{lemma} \label{lem:primary-finalizes} + Suppose that $t_r \geq \GST$, the primary $v$ of round $r$ is honest and no vote has more than $f$ Byzantine voters. Let $B=E_{r-1,v,t_{v,r}}$ be the block $v$ broadcasts if it is not final. Then every honest prevoter prevotes for the best chain including $B$ and all honest voter finalize $B$ by time $t_r+6T$. + \end{lemma} + +\begin{proof} By Lemma \ref{lem:timings} and our network assumptions, no honest voter prevotes before time $t_r+2T \geq t_{r,v}+2T$ and so at this time, they will have seen all prevotes and precommits seen by $v$ at $t_{r,v}$ and the block $B$ if $v$ broadcast it then. By Lemma \ref{lem:message-monotonicity-completed-estimate}, any honest voter $v'$ has $E_{r-1,v'} \leq B \leq g(V_{r-1,v})$ then. + +So if the primary broadcast $B$, then $v'$ prevotes for the best chain including $B$. If the primary did not broadcast $B$, then they finalize it. By Corollary \ref{cor:overestimate-final}, it must be that $E_{r-1,v'} \geq B$ and so $E_{r-1,v'}=B$ and so in this case $v'$ also prevotes for the best chain including $B$. + +Since all honest voters prevote $\geq B$, $g(H_r) \geq B$ and so by Lemma \ref{lem:honest-prevote-timings}, all honest participants finalize $B$ by time $t_r+6T$ +\end{proof} + + + +\begin{lemma} + Suppose that $t_r \geq \GST+T$ and the primary of round $r$ is honest. +Let $B$ be the latest block that is ever finalized in rounds $ B$, then by Lemma \ref{lem:primary-finalizes}, all honest participants finalize $B''$ by time $t_r+6T$ which means they finalized a child of $B$. If $B''=B$, then by Lemma \ref{lem:honest-prevote-timings}, all honest voters prevote for the best chain including $B$. +By assumption these chains include $B'$ and so $g(H_r) \geq B$. By Lemma \ref{lem:honest-prevote-timings}, this means that $B'$ is finalized by time $t_r+6T$. +\end{proof} + + + + + + + +\subsubsection{Recent Validity} + +\begin{lemma} \label{lem:honest-recent-validity} +Suppose that $t_r \geq \GST$, the primary of round $r$ is honest and all votes have at most $f$ Byzantine voters. +Let $B$ be a block that less than $f+1$ honest prevoters in round $r$ saw as being in the best chain of an ancestor of $B$ at the time they prevoted. +Then either all honest participants finalize $B$ before time $t_r+6T$ or no honest participant ever has $g(V_{r,v}) \geq B$ or $E_{r,v} \geq B$. +\end{lemma} + +\begin{proof} Let $v'$ be the primary of round $r$ and let $B'=E_{r-1,v',t_{r,v'}}$. If $B' \geq B$, then by Lemma \ref{lem:primary-finalizes}, all honest participants finalize $B$ by time $t_r+6T$. If $B' \not\geq B$, then by Lemma \ref{lem:primary-finalizes}, at most $f$ honest voters prevotes $\geq B$. In this case, less than $2f+1 \leq (n+f+1)/2$ prevoters vote $\geq B$ or equivocate and so no honest participant ever has $g(V_{r,v}) \geq B$. +\end{proof} + + +\begin{corollary} For $t - 6T > t' \geq \GST$, suppose that an honest participant finalizes $B$ at time $t$ but that no honest voter has seen $B$ as in the best chain containing some ancestor of $B$ in between times $t'$ and $t$, then at least $(t-t')/6T - 1$ rounds in a row had Byzantine primaries. \end{corollary} + + + +\section{Optimized version of GRANDPA} + + There are a few ways we can optimize the GRANDPA protocol. + Firstly, a participant that is offline for many rounds should be able to catch up to the latest round by only seeing recent messages. + Secondly, we should not need to actively use many rounds worth of votes for challenges for accountable safety instead of finalizing blocks. + Thirdly, We should wait for $2T$ as rarely as possible. Conversely, if communication is faster than block production, we should not be running many rounds before a new block arrives. + + To achieve this, we need to have more complicated conditions for when to perform each step of the protocol. Here is the resulting protocol: + + To enter a round $r$, $v$ needs that round $r-1$ is completable and that $E_{r-2,v}$ is finalized. + If $v$ sees messages that give this for a future round $r$, even if $v$ are not in round $r-1$, $v$ jumps straight to round $r$. + (when checking this condition, for the finalization, we need to relax not finalizing using precommits from future rounds to all rounds $< r$). + + \noindent \fbox{\parbox{5.5in}{ + \begin{enumerate} + \item If $v$ is the primary, it broadcast $E_{r-1,v}$ at the start time $t_{r,v}$ + + \item We prevote when one of the following conditions tells us to. + \begin{itemize} + %\item[(i)] If it is impossible for $V_{r-1,v}$ to have a supermajority for any children of $E_{r-1,v}$, then $v$ prevotes for the best chain containing $E_{r-1,v}$ + \item[(i)] If $v$ has received $B$ from the primary, $v$ prevotes for the head of the best chain containing $B$ as soon as one of the following holds: + + \begin{itemize} + \item[(a)] $g(V_{r-1,v}) \geq B \geq E_{r-1,v}$ + \item[(b)] The best chain containing $B$ is also the best chain containing $E_{r-1,v}$ + (equivalently if we evaluate the best chain containing the earlier of the two blocks, then it contains the other) + \end{itemize} + \item[(ii)] If round $r$ is completable and $E_{r,v} \geq E_{r-1,v}$, then we prevote for $E_{r,v}$. + \item[(iii)] if we have reached time $t_{r,v}+2T$ then if we have not received a message from the primary or (i) (a) does not hold, then $v$ prevotes for the head of best chain containing $E_{r-1,v}$ anyway. + \end{itemize} + + \item After prevoting, we wait until $g(V_{r,v}) \geq E_{r-1,v}$, then when one of the following holds, we precommit $g(V_{r,v})$ + \begin{itemize} + \item[(i)] if round $r$ is completable + \item[(ii)] if $v$ has seen a child of the last finalized block and it is impossible for $V_{r,v}$ to have a supermajority for any child of $g(V_{r,v})$ . + \item[(iii)] If $v$ has seen a child of the last finalized block and we have reached time $t_{r,v}+4T$. + \end{itemize} + \end{enumerate} + }} + + We claim that all results we proved about the protocol described in Section \ref{sec:grandpa} apply to this protocol. the stronger properties this satisfies are that $v$ does not need to store votes from before round $r-1$ (except to answer challenges for accountable safety, which should be rare) and that if we have seen no descendants of the last finalized block, we pause until we do. + + + +\section{Conclusion} + +In this paper, we formalized the abstraction of a finality gadget, showed that it is impossible in asynchrony and proposed GRANDPA, a partially synchronous protocol. +Finality gadgets strike a balance between the classic BFT consensus protocols that aggressively commit transactions and the Bitcoin-style consensus protocols that probabilistically commit transactions with a direct dependency on the underlying network's synchrony. + +Using a finality gadget on top of a blockchain (which is used as an oracle) has multiple benefits. +First, it remains live during network instability and is able to commit a lot of transactions quickly when the network stabilizes. Second, it allows for optimistic commitment and efficient roll-back of transactions, using the blockchain as an unsafe-but-probably-correct broadcast channel. Finally, it provides flexibility to the light-clients on verifying only small parts of the blockchain. + +In the future, we envision using finality gadgets in order to federate multiple insecure blockchains (i.e., sharding state) to a global secure one and enabling them to communicate. The main chain will provide optimistic commitment of the state of the sub-chains and after verification, the finality gadget will either commit or roll-back the transactions efficiently. + + + + + + + + + +\com{ + +\section{Practicalities} + +\subsection{Changing the voter set on-chain in an asynchronously safe way} + +\subsubsection{Changing the voter set in an asynchronously safe way} + +Suppose we have an on-chain protocol that decides we need a different voter set. Once everyone finalizes the block, they know that we need to change the set. The protocol can cope with changing the voter set from some round $r$. +The main difficulty is that the chain has no idea what the current round number is and even if we have a block that instructs us to change the voter set at round $r$, we might only finalize the block after round $r$. +So instead we will not take advantage of the ability to change set from one round to the next. + +A block $B$ can contain an instruction that we should change to the voter set to some other set after some integer $m \geq 0$ blocks. If our best chain for a prevote contains such a block $B$, then we do not prevote for more than $m$ blocks after $B$, even if our best chain is longer. +Thus if the current voter set has $n-f$ honest voters, they will only finalize $m$ blocks after such a $B$. We only accept votes and commit messages up top $m$ blocks after $B$ from the current set of voters. + +When some block $B'$ that is $m$ blocks after $B$ has been finalized, then the new voter set starts again at round $1$ with $E_{0}=B'$. Votes will need to contain additional metadata that indicates the voter set somehow. + +\subsubsection{Unsafe fallback for changing the voter set after stalling} + +In extreme circumstances, we may need to deal with $1/3$ of voters being offline. +There is no asynchronously safe way of doing this. It also breaks the chain of signed statements by the existing set of voters saying who the future set of voters should be. And it means we may be vulnerable to being cut of by Byzantine participants. +However if we are in a state when many voters go offline but the network is not partitioned, then we want a way to agree on a set of new voters to restart the finality gadget. + +Every 100 blocks or so, we should put a valid commit message on chain. Honest block producers should put the most recent message on the chain, provided that there is one for a more recent block than 100 blocks ago. +Then if a participant sees that their best chain has not had such a message for 1000 blocks and are not aware of any more recent blocks being finalized, then they set a new voter set to be one determined by the 900th block since the last commit message on chain. + +The protocol for selecting voters should require recent messages on chain signed by those voters so that this is likely to give a set of voters very few of whom are offline. + +We should consider having to manually approve finality agreed upon by this new set to alleviate the security concerns above. But this still gives a way to canonically agree on a new set, in the event of WW3 or bad initialization of a new chain. + +If we do not want to put commit messages on chain, then we can alternatively do the following. Every block producer puts the highest block number that they see as finalized in their block. + +Then any participant sees that if there is an $n$ such that +\begin{itemize} +\item[(i)] their best chain is at least length $n+100$ +\item[(ii)] the indicators the last finalized block height of blocks $n-100$ to $n$ in their best chain have median at most $n-1050$ and +\item[(iii]) $n$ is the minimum that satisifies (i) and (ii) +\end{itemize} +then they switch to the best voter set given by block $n$. If the same block at height $n$ is on everyone's best chain, which can be shown to occur with high probability given (i) for many block production mechanisms, then everyone will eventually agree that we should switch to the voter set given by that block. If any $100$ consectutive blocks of the best chain are produced by honest and synchronised block producers then this will only happen if GRANDPA fails to finalize any block in the time it took to produce $1000$ blocks. + +\subsection{Alternatives to the last block hash} + +The danger with voting for the last blockhash in the best chain is that maybe no one else will have seen and processed the next block. It would also be nice to make the most of BLS multisig/aggregation, which allows a single signature for many messages/signers than can be checked in time proportional to the number of different messages signed. + +To get round the first alone, it might be better to vote for a block 3/4 along (rounding further) the unfinalized chain , rather than for th head. + +But the second suggests that maybe we should be including signatures for several of the latest blocks in a chain. We could include that last 2 or 3. We could also do e.g. the the blocks with block numbers with the last 2 multiples of each power of two since the last finalized block, which gives log unfinalized chain length messages but should have many blocks in common. + +When presented with a vote that includes many blocks, we should interpret them as being for the last block we've seen if any. Then we need to be able to update that vote to a later block when that is seen. This retains monotonicity of a supermajority for/ it is impossible to have a supermajority for over time. + +It does not matter if some of the votes are for a block that does not exist as everyone will ignore that part of the vote. But including votes for block that are seen but are not on a chain is an equivocation and is slashable. We need to count such votes as votes for the had of every chain in the vote (as someone might interpret them as for any one of them). + +Then if we need to BLS aggregate votes that are $\geq B$ for a commit message or query response, it is OK to use any vote that is $\geq B$, not necessarily the vote for the head. This should reduce the number of blockhashs sign, in the optimistic case down to 1. + +\subsection{ Block production rule} + +If we adopt that rule that block producers should build on the best chain including the last finalized block, then if we do not finalize another block this will eventually include some prefix beyond the last finalized block, and therefore the protocol is live by Lemma \ref{lem:honest-recent-validity}. + +But the issue is that if agreement is much slower than block production, then we might have a prevote for a short chain on the last finalized block, then the best chain does not include that block and we build a long chain that is eventually never finalized. This could be fixed by building on $E_{r-1}$ or $E_r$. But if we do that, and these change very quickly, then we may never come to agreement on the best chain. + +So we have two possible chain selection rules for block producers: + +\begin{enumerate} +\item Build on the best chain including the last finalize block B. +\item Build on best chain including whichever of $\{E_r,E_{r-1},B\}$ is latest and $\geq B$. +\end{enumerate} + +1 is better if finalization is happening quickly compared to block production and 2 is best if block production is much faster. We could also consider hybrid rules like adopt 1 unless we see that the protocol is stuck or slow, then we switch to 2.} +\com{ +\section{The asynchronous finality gadget problem} + +Here we give an extension of the \cite{flp} result that shows the impossibility of having an asynchronous and deterministic finality gadget protocol and give an asynchronous protocol that uses a common coin primitive. + +\subsection{1/5 BFT finality gadget using a common coin} + +In this section, we will assume the asynchronous network model. By the previous impossibility result, we will need to use randomness to get a finality gadget in this model. We assume that we have access to a common coin protocol. + +For every vote, We have $n$ voters , at most $f$ of which are Byzantine and $n = 5f+1$. For a voter $v$, Let $V_{r,v}$, $C_{r,v}$ be the set of prevotes and precommits from round $r$ that $v$ has seen. + +\begin{enumerate} +\item Everyone prevotes for the best chain including the block they were locked to last round. +\item Wait until $V_{v,r}$ contains prevotes from $n-f$ voters. +\item Precommit $g_{3/5}(V_{r,v})$ +\item Call a precommit for $B$ justified if $B \leq g_{3/5}(V_{r,v})$ and if $B < g_{3/5}(V_{r,v})$ then the child $B'$ of $B$ on the chain of $g_{3/5}(V_{r,v})$ has that there are votes from $f+1$ voters in $V_{r,v}$ that are not $\geq B'$. +Wait until $C_{r,v}$ has justified precommits from $n-f$ voters. +\item Call the common coin, $s_r$ +\item If $s_r=1$, finalize $g_{4/5}(C_r)$ +\item lock to $g_{(4-3s_r)/5}(C_r)$ for next round. +\end{enumerate} + +The common coin is a (secure cryptographic implementation of) the following protocol. It does not return a coin until more than $4f+1$ voters (for the prevote vote in the next round in case of ambiguity) call it. It returns at the latest shortly after all honest voters call it. + When it does, it returns an $s_r$ sampled uniformly from $\{0,1\}$, identical for all who called it, and before $4f+1$ called it, no-one has any information about the result. + +Here $g_{t}(S)$ is the $t$-GHOST function defined as follows. We construct a chain starting with the genesis block and adding the child of the current block such that most voters have votes $\geq$ it until there are $nt$ or less votes for any child of the current block, when we return the current block. + +The idea behind the proof of asynchronous liveness is that for a particular block $B'$, some value of the common coin, either all the honest voters who received $4/5$ of precommits before the common coin was decided lock to $B'$ or none do. +If we had a fixed threshold for locking, an adversarial choice of the number of precommits for $B'$ or its descendants could lead to some voters locking to it and some not (and indeed there would be runs that do this indefinitely as this is how the impossibility result works for this type of algorithm.) + +Firstly we note that much of the machinery of section $\ref{sec:prelims}$ carries over to the $1/5$ byzantine case. + +\begin{lemma} \label{lem:ghost-monotonicity-general} +Let $T$ be a set of votes such that at most $f$ voters have multiple votes in $T$. Let $t \geq (n+f)/2n$ Then +\begin{enumerate} +\item The above definition uniquely defines $g_t(T)$. +\item If $S \subseteq T$ has $g_t(S) \neq$ nil, then $g_t(S) \leq g_t(T)$ for $t \geq (n+f)/2n$. +\item If $S_i \subseteq T$ for $1 \leq i \leq n$ then all non-nil $g_t(S_i)$ are on a single chain with head $g(T)$. +\item If $r \leq s$, then $g_r(T) \geq g_s(T)$. +\end{enumerate} +\end{lemma} +So with $n=5f+1$, $g_{3/5}$ is sufficient for uniqueness. + +First we need to show that the protocol is deadlock free. +As long as all honest voters prevote and precommit, any participant eventually sees prevotes and precomits from $n-f$ voters. We just need to show that honest prevotes are eventually seen as justified. +\begin{lemma} Suppose that an honest voter $v$ precommits $B$ in round $r$. If $V'_{r,v}$ is the set of prevotes they saw at the time they precommited and another participant $v'$ sees all these prevotes i.e. $V_{r,v'} \supseteq V'_{r,v}$, then $v'$ sees $v$'s precommit for $B$ as justified. \end{lemma} +\begin{proof} $v$ precommits $B = g_{3/5}(V'_{r,v})$. Since $V_{r,v'} \supseteq V'_{r,v}$, $B \leq g_{3/5}(V_{r,v'})$ by Lemma \ref{lem:ghost-monotonicity-general} 2. +So we just need to show that if $B < g_{3/5}(V_{r,v'})$, $V_{r,v'}$ contains votes from $f+1$ voters that are not $\geq B'$ where $B'$ is the child of $B$ in the chain of $g_{3/5}(V_{r,v'})$. +Since $B = g_{3/5}(V'_{r,v})$, from the definition of $g$, $B'$, like any child of $B$, does not have votes from $3f+1$ voters $\geq B'$ in $V'_{r,v}$. +Since $V'_{r,v}$ contains votes from $4f+1$ voters, there are votes from at least $f+1$ voters that are $\not \geq B'$ in $V'_{r,v}$ and so also in $V_{r,v'}$. +\end{proof} + +Our network assumption and a simple induction shows that we do not deadlock. +\begin{corollary} All honest voters eventually prevote and precommit in every round and all honest participants reach every round.\end{corollary} + +\begin{lemma} \label{lem:possibly-final-implies-permanent-lock} +If there are enough precommits to finalize a block $B$ in round $r$, then all honest voters who prevote in future rounds will be locked to $B$ or its descendants when they do. At the end of the next round $r' > r$ with $s_{r'}=1$, all participants will have finalized $B$. +\end{lemma} +\begin{proof} +For $B$ to be finalized in round $r$, there need to be votes from more than $n-f$ voters that are $\geq B$ and $s_r=1$. Any honest participant $v$ also sees that $s_r=1$ and so they lock $g_{1/5}(C_{r,v})$. $C_{r,v}$ contains votes from at least $4f+1$ voters. At most $f$ voters can have votes $\not\geq B$ in $C_{r,v}$ if they also voted $\geq B$ and at most $f$ voters do not have votes in $C_{r,v}$. + Thus at least $2f+1$ voters have votes $\geq B$ in $C_{r,v}$. Because $g_{1/5}$ is not unique in general, to show that $g_{1/5}(C_{r,v}) \geq B$, we also need to show that no block $B' \nsim B$ has $f+1$ voters have votes $\geq B'$ in $C_{r,v}$. If this holds then the procedure to calculate $g_{1/5}$ will not follow chain that does not include $B$ and so it will return a block $\geq B$. + Letting $V_r$ be the set of prevotes ever cast, note that any honest voter $v'$ prevotes for a block $g_{3/5}(V_{r,v'}) \leq g_{3/5}{V_r}$ and so as before honest voters precommit to blocks in one chain. + Since many honest voters precommit $\geq B$, all precommit $\sim B$, and so if $f+1$ voters have votes $\geq B'$ in $B$ then since at least one of those are honest $B' \sim B$. Thus we have $g_{1/5}(C_{r,v}) \geq B$. + +Since all honest voters prevote $\geq B$ in round $r+1$, any participant who waits for votes from $4f+1$ voters will see $g_{3/5}(V_{r+1}) \geq B$ and so all honest voters precommit $\geq B$ in round $r+1$. Since only at most $f$ voters vote $\not \geq B$, only precommits $\geq B$ are ever seen as justified by honest participants. Therefore all honest participants will see $g_{345}(C_{r+1}) \geq +B$. +If $s_r=1$, this is enough to finalize $B$.Since $g_{1/5}(C_{r+1}) \geq g_{4/5}(C_{r+1}) \geq +B$, whatever the common coin, all honest participants lock $\geq B$. By induction, this holds for all future rounds. + +\end{proof} + +We want to show that this is asynchronously live: + +\begin{proposition} Suppose that block $B$ is finalized before round $r$. With probability at least $1/2$ over the common coin in round $r$, if all voters agree that the best chain including the last finalized block $B$ includes a decedent $B''$, at the prevote step of rounds $r+1$ and $r+2$, then a descendant of $B$ is finalized the next time $s_r=1$ after round $r+2$ or earlier. +\end{proposition} + +\begin{proof} By the Lemma \ref{lem:possibly-final-implies-permanent-lock}, all honest voters prevote in round $r$ for $B$ or its descendants and so all honest voters precommit to $B$ or its descendants. + +Let $V_r$ be the set of prevotes of all voters. Using Lemma \ref{lem:ghost-monotonicity-general}, all honest voters precommit $g_{3/5}(V_r)$ or its ancestors. Since some must precommit $\geq B$ for it to be finalized, $g_{3/5}(V_r) \geq B$. + +For the case $g_{3/5}(V_r)=B$, all honest voters precommit $B$ and so any honest participant sees that +$B = g_{1/5}(C_r) = g_{4/5}(C_r)$. Thus all honest participants +lock $B$ and so are free to prevote for $B''$ or its descendants in round $r+1$. Thus we finalize $B''$ in round $r+1$ or the next round when $s_r=1$ after that. + +Otherwise, let $B'$ be the child of $B$ in the chain of $g_{3/5}(V_r)$. We seek to show that we finalize either $B'$ or $B''$. + +Let $S$ be the set of honest voters who precommit in round $r$ before $4f+1$ voters call the common coin. Let $S'$ be the set of honest voters who call the common coin before it is decided. % Note that $S' \subset S$. +Since $4f+1$ voters call the coin before it decided and honest voters who do so saw precommits from $4f+1$ voters, $S'$ and $S$ each contain at least $3f+1$ voters. + +Let $h$ be the number of voters in $S$ that precommit $B'$ or its descendants. Note that the other $|S|-h$ voters just precommit $B$. + +Now consider a particular voter $v$ and the set $C_{r,v}$ of precommits they received in step 4. the number of voters with precommits in $C_{r,v}$ is at least $4f+1$. +If $v \in S'$, +All the honest voters +with precommits in $C_{r,v}$ are in $S$. In this case we have that the number of votes for $B'$ or its descendants in $C_{r,v}$, $m_v$ has $h-f \leq m_v < h+f$. For $v \notin S'$, since $f$ honest validators can be outside $S$, we have $h-2f \leq m_v \leq h+2f$ + +Since any descendant of $B$ that is not $B'$ or its descendants receives less than $f$ precommits for it or its descendants, we have that either $g_{1/5}(C_{r,v})=B$ or $g_{1/5}(C_{r,v})\geq B'$ and similarly for $g_{4/5}(C_{r,v})$. Now note that if $h \geq 3f+1$, $m_v \geq f+1$ and so $g_{1/5}(C_{r,v}) \geq B'$. On the other hand if $h < 3f+1$, for $v \in S'$, $m_v < 4f+1$ and so $g_{4/5}(C_{r,v})=B$. + +If $h \geq 3f+1$ and $s_r=1$, then every honest voter locks a block $\geq B'$. Thus is round $r+1$, they all prevote $\geq B'$. + By similar reasoning to Lemma \ref{lem:possibly-final-implies-permanent-lock}, we finalize $B'$, the next round $r' > r$ that we have $s_{r'}=1$. + +If $h < 3f+1$ and $s_r=0$, then every $v \in S'$ locks only $B$. But then all such $v$ will prevote their best chain containing $B$ and so a block $\geq B''$. There are only at most $2f$ voters who might not do this, the Byzantine voters and the honest voters outside of $|S|$ who prevote $\geq B$. Thus any honest voter who has seen prevotes from $n-f$ voters either sees $g_{3/5}(V_{r+1,v})=B$ or $g_{3/5}(V_{r+1,v}) \geq B'$. Since all honest precommits are either $B$ or $\geq B''$, every honest voter locks either $B$ or $\geq B''$. Since in round $r+2$, all honest voters see that the best chain including $B$ also includes $B''$, this time they all prevote $\geq B''$. By similar reasoning to Lemma \ref{lem:possibly-final-implies-permanent-lock}, we finalize $B''$, by the next round $r' > r+1$ that we have $s_{r'}=1$. + +Crucially note that $h$ depends only on $S$, which is determined when $4f+1$ voters call the common coin and before it is flipped. Thus $s_r$ is independent of $h$. If $h < 3f+1$ then $s_r=0$ with probability $1/2$ and if $h \geq 3f+1$ then $s_r=1$ with probability $1/2$. So with probability $1/2$, we have either both $h < 3f+1$ and $s_r=0$ or both $h \geq 3f+1$ and $s_r=1$. Thus with probability at least $1/2$, we finalize $B'$ or $B''$ before the next round after $r+1$ when $s_r=1$. +\end{proof} +} + +\bibliography{net,os,sec,soc,theory} + +\end{document} diff --git a/pdf/grandpa.bib b/pdf/grandpa.bib deleted file mode 100644 index 5c157cd..0000000 --- a/pdf/grandpa.bib +++ /dev/null @@ -1,63 +0,0 @@ -@article{flp, - title={Impossibility of distributed consensus with one faulty process}, - author={Fischer, Michael J and Lynch, Nancy A and Paterson, Michael S}, - journal={Journal of the ACM (JACM)}, - volume={32}, - number={2}, - pages={374--382}, - year={1985}, - publisher={ACM}, - url={https://groups.csail.mit.edu/tds/papers/Lynch/jacm85.pdf} -} - -@article{CasperFFG, - title={Casper the friendly finality gadget}, - author={Buterin, Vitalik and Griffith, Virgil}, - journal={arXiv preprint arXiv:1710.09437}, - year={2017}, - url={https://arxiv.org/abs/1710.09437} -} - -@article{Tendermint, - title={The latest gossip on BFT consensus}, - author={Buchman, Ethan and Kwon, Jae and Milosevic, Zarko}, - journal={arXiv preprint arXiv:1807.04938}, - year={2018}, - url={https://arxiv.org/abs/1807.04938} -} - -@article{CasperCBC, - title={Casper the Friendly Ghost: A “Correct-by-Construction” Blockchain Consensus Protocol}, - author={Zamfir,Vlad}, - year={2017}, - url={https://github.com/ethereum/research/blob/master/papers/CasperTFG/CasperTFG.pdf} -} - - -@article{BitcoinBA, - title={Anonymous byzantine consensus from moderately-hard puzzles: A model for bitcoin}, - author={Miller, Andrew and LaViola Jr, Joseph J}, - url={https://nakamotoinstitute.org/research/anonymous-byzantine-consensus/}, - year={2014} -} - -@inproceedings{Discoin, - title={Bitcoin meets strong consistency}, - author={Decker, Christian and Seidel, Jochen and Wattenhofer, Roger}, - booktitle={Proceedings of the 17th International Conference on Distributed Computing and Networking}, - pages={13}, - year={2016}, - organization={ACM}, - url={https://arxiv.org/abs/1412.7935} -} - -@article{SCP, - title={SCP: A Computationally-Scalable Byzantine Consensus Protocol For Blockchains.}, - author={Luu, Loi and Narayanan, Viswesh and Baweja, Kunal and Zheng, Chaodong and Gilbert, Seth and Saxena, Prateek}, - journal={IACR Cryptology ePrint Archive}, - volume={2015}, - pages={1168}, - year={2015}, - url={https://www.weusecoins.com/assets/pdf/library/SCP%20-%20%20A%20Computationally-Scalable%20Byzantine.pdf} -} - diff --git a/pdf/grandpa.pdf b/pdf/grandpa.pdf deleted file mode 100644 index 30a3caa..0000000 Binary files a/pdf/grandpa.pdf and /dev/null differ diff --git a/pdf/grandpa.tex b/pdf/grandpa.tex index 0de1d69..9e02cb5 100644 --- a/pdf/grandpa.tex +++ b/pdf/grandpa.tex @@ -3,6 +3,7 @@ \usepackage{amsmath} \usepackage{amssymb} \usepackage{amsthm} +\usepackage{color} \usepackage{fullpage} \usepackage[bookmarks=true, unicode=true, pdftitle={GRANDPA: a blockchain finality gadget}, pdfauthor={Alistair Stewart},pdfkeywords={blockchain finality gadget, consensus, Polkadot, Substrate},pdfborder={0 0 0.5 [1 3]}]{hyperref} @@ -28,36 +29,100 @@ \def\GST{\mathrm{GST}} +\long\def\com#1{} + +\long\def\xxx#1{{\color{red} {\bf XXX }{\small [#1]}}} + \begin{document} -\title{Byzantine Finality Gadgets} +\title{GRANDPA: a Byzantine Finality Gadget} \date{\today} \maketitle +\begin{abstract} +Classic Byzantine fault-tolerant consensus protocols forfeit liveness in the face of asynchrony in order to preserve safety, whereas most deployed blockchain protocols forfeit safety in order to remain live. +In this work, we achieve the best of both worlds by proposing a novel abstractions called the \emph{finality gadget}. +A finality gadget allows for transactions to always optimistically commit but informs the clients that these transactions might be unsafe. As a result, a blockchain can execute transactions optimistically and only commit them after they have been sufficiently and provably audited. +In this work, we formally model the finality gadget abstraction, prove that it is impossible to solve it deterministically in full asynchrony (even though it is stronger than consensus) and provide a partially synchronous protocol which is currently securing a major blockchain. This way we show that the protocol designer can decouple safety and liveness in order to speed up recovery from failures. We believe that there can be other types of finality gadgets that provide weaker safety (e.g., probabilistic) in order to gain more efficiency and this can depend on the probability that the network is not in synchrony. +\end{abstract} \section{Introduction} -We consider the question of finality for blockchain protocols: when will a block never be reverted. Many such protocols, such as the original blockchain, Bitcoin, have the property of eventual consensus - that an ever growing prefix of the chain will be agreed upon by all participants forever onward. But they generally only give probabilistic finality on a specific block - that under some assumptions about the network and participants, if we see a few blocks building on a given block, we can estimate the probability that it is final. -But what we'd prefer is to have provable finality - for example a signed statement by a set of authorities, the set of whom can be tracked, that the block is final. -This is useful to prove what happened to light clients, who do not have the full chain or are not actively listening to the network, and to communicate with other chains, possibly as part of a scalability solution, where not anyone receives or stores all the data in the system. +Bitcoin~\cite{nakamoto08bitcoin} and its descendants~\cite{wood14ethereum,sasson2014zerocash} are cryptocurrencies that provide +secure automated value exchange where instead of central managing authority a consensus protocol maintains a distributed public ledger +known as the \textit{blockchain}. To be able to rely on public ledger one needs to know that it has reached consensus on a certain block, i.e., when a block will not be reverted anymore, which we refer to as reaching finality. +One of the challenges of Nakomoto-like consensus protocols is that they only satiesfy eventual consensus, where it only guarantees that an ever growing prefix of the chain will be agreed upon by all participants forever onward. The eventual consensus process generally takes tens of minutes and at a certain point of time for a certain block the consunsus only gives probabilistic guarantees. -Another popular family of consensus mechanisms for blockchains involves getting Byzantine agreement on each block \cite{Tendermint.AlgorandAgreement}. -This gives provable finality immediately. However this is slow if we have a large set of participants in the Byzantine agreement. +Unfortunately these guarantees only hold if the underlying network is well-connected and the client is able to find an uncensored source of information, two assumptions that +do not hold in adversarial environments~\cite{apostolaki16hijacking, gervais15tampering, heilman15eclipse}. -The approach that we will take is similar to the approach that Ethereum plans to take with Casper the Friendly Finality Gadget (Casper FFG)\cite{CasperFFG}, which combines these approaches. -We will use a block production mechanism and chain selection rule that give eventual consensus and then add a finality gadget, a protocol that finalises blocks that the participants already agree on, to get provable finality. +The underlying problem which enables these attacks is that first generation blockchain protocols do not consider finality (i.e., when will a block never be reverted) as a first class property, prioritizing liveness instead. -We present a finality gadget that works in a partially synchronous network model, GRANDPA, that works in the presence f up to $1/3$ Byzantine actors as well as an asynchronous finality gadget, that can cope with $1/5$ Byzantine actors. +An alternative to probablistic finality is having \emph{provable finality} that anyone can be convinced of the fianlty of a block, regardless whether they are consensus partipants or are acticvly follwoing the network.% Provable fnality can be reached for example, a signed statement by a set of authorities, the set of whom can be tracked, that the block is final. -Recent research on consensus has come up with many different block production mechanisms that give eventual consensus. We want formal guarantees to hold for finality gadgets that can easily be applied to many possible block production mechanisms. Thus we want to make the least assumptions about the block production mechanism as possible. +%This is useful to prove what happened to light clients, who do not have the full chain or are not actively listening to the network, and to communicate with other chains, possibly as part of a scalability solution, where not anyone receives or stores all the data in the system. -An important goal of this work is to formalise the finality gadget problem. We want formal guarantees for safety and liveness for finality gadget. +New generation protocols~\cite{Tendermint,AlgorandAgreement,kokoris16enhancing,decker16bitcoin,pass16hybrid} propose the complete opposite, where every blocks are finalized one by one that forfeits liveness when finality is not readily achievable. This gives provable finality immediately.% However this is slow if we have a large set of participants in the Byzantine agreement. -\subsection{Formalising the problem} +Protocols that finalize blocks one by one has the shortcomings that many consensus particpants leads to slow performance. Hence, they need to put a limit on the number of consensus participats which might lead to centralization. -We want to formalise the notion of finality gadget, that can be used to modify a protocol that has eventual consensus with probabilistic finality to one with provavle finality. -To achieve this, we need to incorporate into the definition of Byzantine agreement that we have access to a protocol that would achieve eventual consensus if we did not affect it. +%Secondly, tying consensus with liveness of the chain means that there is no optimism and blocks are committed only when all verification information are available. As a result, they lose the ability to make some (unsafe) progress when the network is unstable, which can help speedup the recovery process when the network heals. + +In this work we show the that the middle ground also merits exploration. The approach that we will take is similar to the approach that Ethereum plans to take with Casper the Friendly Finality Gadget (Casper FFG)[2]. + +%We will use a block production mechanism and chain selection rule that give eventual consensus and then add a finality gadget, a protocol that finalises blocks that the participants already agree on, to get provable finality. + +We use and formalize the idea of lazy finality which is encapsulated in the abstraction of a \emph{finality gadget.} Separating the liveness of the consensus protocol from the finality of the blocks can have three concrete benefits for the overlying blockchain protocol. + +First, since consensus is not tied to liveness of the chain we can have optimistic execution. That is the chain can grow before we have certainty that blocks are valid. We can finalize blocks only when we are sure they are correct i.e., all verification information is available. + + +Second, we can make some (unsafe) progress when the network is unstable, which can help speedup the recovery process when the network heals. Similarly, we can make progress in chain growth even when finlzation is slow, e.g., when we have many particiapnts thus promoting decentenralization. + +%First, not every node that is competing to mine a block needs to be part of the finality gadget, hence we can get the \textit{best of both worlds} (i.e., full inclusive decentralization and scalable fast finality). + +%Second, we can reorganize the chain for blocks that have not yet been finalized \xxx{Al put a sentence on why this is a cool property.}. + +Third, a finality gadget can be deployed gradually and light clients can choose to consult it or follow the longest chain rule and ignore it, enabling light client heterogeneity. +The light client that trust the gadget do not need to have the full chain or actively listen to the network. +This can in turn enable scalability~\cite{avarikioti19divide} in an ecosystem of multiple chains (weather sharding~\cite{kokoris17omniledger,al18chainspace,androulaki18channels} or heterogeneous~\cite{zamyatin19sok}), where no single party receives or stores all the data in the system. + +%Finally, the finality gadget protocol is simpler than consensus protocols since they do not require a complex and costly view change phase. + +We formalize the abstraction of a \emph{finality gadget} that runs along any block production mechanism (e.g., Nakamoto consensus) providing provable finality guarantees. We show that it is impossible to satisfy its properties with a deterministic asynchronous protocol. To circumvent this impossibility result, we introduce the GRANDPA finality gadget that works in a partially synchronous network model, in the presence of up to $1/3$ Byzantine actors. +%To this end we formalise the finality gadget problem and + + +The combination of GRANDPA with a classic block production mechanism like GHOST~\cite{lewenberg15inclusive} results in the existing deployment of the polkadot network \footnote{https://polkadot.network} which provides fast finality under good network conditions and protects the clients without compromising the liveness when under attack. The implementation of GRANDPA is available on github \cite{LINK}. + + +In summary we make the following contributions: +\begin{itemize} + +\item Introduce the idea of lazy finality and instiate it through a finality gadget abstraction + +\item Prove that BFG is impossible in asychrony and present GRANDPA + +\end{itemize} + + +%The approach that we will take is similar to the approach that Ethereum plans to take with Casper the Friendly Finality Gadget (Casper FFG)\cite{CasperFFG}, which combines these approaches. +%We will use a block production mechanism and chain selection rule that give eventual consensus and then add a finality gadget, a protocol that finalises blocks that the participants already agree on, to get provable finality. + +%We present a finality gadget that works in a partially synchronous network model, GRANDPA, that works in the presence f up to $1/3$ Byzantine actors as well as an asynchronous finality gadget, that can cope with $1/5$ Byzantine actors. + + + +\section{Model, Definitions, and Impossibilities} + + +We want to formalise the notion of finality gadget to be a sub-protocol that can be deployed along any protocol with +eventual consensus and probabilistic finality and enhancing such protocol with provable finality. +To achieve this, we need to incorporate into the classic definition of Byzantine agreement +the fact that we additionally have access to a protocol that would achieve eventual consensus if we did not affect it. + +\subsection{Byzantine Agreement with a Consistency Oracle} Consider a typical definition of a multi-values Byzantine agreement: We have a set of participants $V$, the majority of whom obey the protocol, but a constant fraction may be Byzantine, meaning they behave arbitrarily, e.g. provide false or inconsistent information or randomly go offline when they ought to be online. @@ -71,7 +136,7 @@ We have a set of participants $V$, the majority of whom obey the protocol, but a \end{definition} -We can change this definition to assume that instead of having an initial value, all voters have access to an external protocol, an oracle for values, that achieves eventual consensus in that it returns the same value to all voters when called after some time. +We can change this definition to assume that instead of having an initial value, all voters have access to an external protocol, an oracle for values, that achieves eventual consensus in that it returns the same value to all voters when called after some unknown time. \begin{definition} We say an oracle $A$ in a protocol is {\em eventually consistent} if it returns the same value to all participants after some unspecified time. @@ -88,12 +153,54 @@ We say an oracle $A$ in a protocol is {\em eventually consistent} if it returns \end{definition} -For the binary case, i.e. when $|S|=2$, the Byzantine finality gadget problem is reducible to Byzantine agreement. This does not hold for $|S| > 2$, because the definition of validity is stronger. Note that it is impossible for multi-valued Byzantine agreement to make the validity condition require that we decide an initial value of some honest voter and tolerate more than a $1/|S|$ fraction of faults, since we may have a $1/|S|$ fraction of voters reporting each inital value and Byzantine voters can act honestly enough not to be detectable. For finality gadgets, this stronger validity condition is possible and we will want even stronger versions that quantify when an honest voter had the value. - -We show in \ref{ssec:impossibility} that an asynchronous, deterministic binary finality gadget is impossible, even with one fault. This does not immediately follow from the celebrated impossibility result of \cite{flp}, which shows that an asynchronous, deterministic binary Byzantine agreeement protocol is impossible, because we do not know a reduction in the necessary direction, from agreement to the finality gadget problem. The extra information voters have here, that $A$ will evntually agree for all voters, is not enough to make this possible. +\paragraph{Impossibility of Deterministic Agreement with an Oracle.}\label{ssec:impossibility} +%\xxx{Al can you extend this?} +For the binary case, i.e. when $|S|=2$, the Byzantine finality gadget problem is reducible to Byzantine agreement. This does not hold for $|S| > 2$, because the definition of validity is stronger in our protocol. Note that it is impossible for multi-valued Byzantine agreement to make the validity condition require that we decide an initial value of some honest voter and tolerate more than a $1/|S|$ fraction of faults, since we may have a $1/|S|$ fraction of voters reporting each initial value and Byzantine voters can act honestly enough not to be detectable. For finality gadgets, this stronger validity condition is possible. A natural question is then weather the celebrated FLP~\cite{fischer85impossibility} impossibility holds for our stronger requirements. +Next, we show that an asynchronous, deterministic binary finality gadget is impossible, even with one fault. +This means that the extra information voters have here, that $A$ will eventually agree for all voters, is not enough to make this possible. -Now how do we extend this to agreeing on a chain of blocks? One difficulty in formalising the problem is that the block production mechanism cannot be entirely separate from the finality gadget. In order to finalise new blocks, we must first build on the chain we have already finalised. So at a minimum, the block production mechanism needs to recognise which blocks the finality gadget has finalised. We will also allow the block production mechanism to interact with the state of the finality gadget in other ways. +\paragraph{Proof:} +%\xxx{TODO:Al} +The asynchronous binary fault tolerant agreement problem is as follows: + +We have number of voters which each have an initial $v_i$ in $\{0,1\}$ + +We may have one or more faulty nodes, which here means going offline at some point. Nodes have asynchronous communication - so any message arrives but we have no guarantee when it will. +The goal is to have all non-faulty nodes output the same $v$, which must be $0$ if all inputs $v_i$ are $0$ and $1$ if all are $1$. + +Fischer, Lynch and Paterson\cite{fischer85impossibility} showed that this is impossible if there is one faulty node. + +The binary fault-safe finality gadget problem is similar, except now there is an oracle $A$ that any node can call at any time with the following properties: + +either $A$ always outputs $x$ in $\{0,1\}$ to all nodes at all times +or else there is an $x$ in $\{0,1\}$ and +for each node $i$, there is a $T_i$ such that when $i$ calls $A$ before $T_i$. it gives $x$ but if it calls $A$ after $T_i$, it returns not $x$ . + +and we want that if A never switches, then all non-faulty nodes output x. If A does switch then all non-faulty nodes should output the same thing, but it can be 0 or 1. + +Then this is also impossible, even for one faulty node, which just goes offline. Note that this generalises Byzantine agreement, since if we could each node $i$ could call $A$ once at the start and use the output as $v_i$. (For the multi-valued case, we will define the problem so that this reduction does not hold.) + + +\begin{proof}[Proof sketch] We follow the notation of \cite{fischer85impossibility} and assume for a contradiction that we use a correct protocol. +Let $r$ be a run of the protocol where $A$ gives $0$ all the time. +Then by correctness $r$ decides $0$. Now we consider what can happen when $A$ switches to $1$ after each configuration in $r$. If it switches to $1$ at the start, then the protocol decides $1$. +If we switch to $1$ when all node have already decided $0$, then we decide $0$. + +We claim that some configuration in the run $r$, where there are two runs from it where $A$ is always $1$ that decide $0$ and $1$. We call such states $1$-bivalent. +To see this, assume for a contradiction that $r$ contains no such configurations. Then there are successive configurations $C$,$C'$ such that if $A$ return $1$ in the future from $C$ then we always decide $0$ but from $C'$, we always decide $1$. +Let events be $(p,m,x)$ where node (processor/voter) $p$ receives message $m$ (which may be null) and executes some code where any calls to A return $x$ in $\{0,1\}$, then sends some messages. +Then there is some event $(p,m,0)$ that when applied to $C$ gives $C'$. Now suppose that $p$ goes offline at $C$, then if $A$ always returns $1$ afterwards, then we still decide $1$. Thus there is a run $r'$ that starts at $C$ where $p$ takes no steps, $A$ always returns $1$ and all other nodes still output $1$. +But since $p$ takes no steps in $r'$, we can apply $r'$ after $(p, m, 0)$ and so we have that $C'$ has a run where $A$ always returns $1$ but decides $1$, which is a contradiction. + +Now let $C$ be a $1$-bivalent configuration. We can follow the FLP proof to show that there is a run from $C$ for which $A$ always returns $1$, all messages are delivered but all configurations are 1-bivalent and so the protocol never decides. This completes the proof by contradiction that there is no correct protocol. +\end{proof} + + + +\subsection{Definition of a Finality Gadget} + +In this section we show how to extend the one-shot agreement to agreeing on a chain of blocks. One difficulty in formalising the problem is that the block production mechanism cannot be entirely separate from the finality gadget. In order to finalise new blocks, we must first build on the chain we have already finalised. So at a minimum, the block production mechanism needs to recognise which blocks the finality gadget has finalised. We will also allow the block production mechanism to interact with the state of the finality gadget in other ways. We want the finality gadget to work with the most general block production mechanisms as possible. Thus we need a condition that combines the property of eventual consensus and this requirement to build on the last finalised block, but is otherwise not too restrictive. We assume a kind of conditional eventual consensus. @@ -103,58 +210,35 @@ We also want a protocol that does not terminate, but instead keeps on finalising We assume that there is a block production protocol $P$ that runs at the same time as the finality gadget protocol $G$. Actors who are participants in both protocols may behave differently in $P$ depending on what happened in $G$. However in the reverse direction, the only way that an honest voter $v$'s behaviour in $G$ is affected by $P$ is through a voting rule, a function $A(v,s_v,B)$ that depends on $v$ and its state $s_v$ and takes a block $B$ and returns a block $B'$ at the head of a chain including $B$. -We say that the system $G$,$P$ and $A$ achieves {\em conditional eventual consensus}, if $G$ has finalised a block $B$, then eventually, either $G$ will finalise some descendant of $B$ or else all the chains with head $A_{v,s_v}(B)$ for all voters $v$ at all future states $s_v$ will contain the same descendant $B'$ of $B$. +We say that the system $G$, $P$, and $A$ achieves {\em conditional eventual consensus}, if $G$ has finalised a block $B$, then eventually, either $G$ will finalise some descendant of $B$ or else all the chains with head $A_{v,s_v}(B)$ for all voters $v$ at all future states $s_v$ will contain the same descendant $B'$ of $B$. \begin{definition} \label{def:finality-gadget} Let $F$ be a protocol with a set of voters $V$, a constant fraction of which may be Byzantine. -We say that $F$ solves {\em blockchain Byzantine finality gadget problem} if for every block production protocol $P$ a voting rule $A$ , then we have the following +We say that $F$ solves {\em blockchain Byzantine finality gadget problem} if for every block production protocol $P$ and voting rule $A$ we have the following %A protocol for the blockchain Byzantine finality gadget problem has , each of whom has access to an oracle $A$ for the best chain given the last finalised block with the property that, as long as no new block is finalised, it achieves eventual consensus on some child of the last finalised block such that the following holds: \begin{itemize} \item{\bf Safety:} All honest voters finalise the same block at each block number. -\item{\bf Liveness:} If the system $F,G,A$ achieves conditional eventual consensus, then all honest voters keep finalising blocks. +\item{\bf Liveness:} If the system $F, G, A$ achieves conditional eventual consensus, then all honest voters keep finalising blocks. \item{\bf Validity:} If an honest voter finalises a block $B$ then that block was seen in the best chain observed by some honest voter containing some previously finalised ancestor of $B$, \end{itemize} \end{definition} -As a motivating example, we could take $F$ as being using proof of work to build on the longest chain including the last block $G$ finalised and take $A(v,s_v,B)$ as being the longest chain including $B$ that $v$ sees in state $s_v$. It is well-known \cite{bitcoinpapers} that longest chain with proof of work achieves eventual consensus under the right assumptions and similar arguments show that in this case we have conditional eventual consensus. -As long as we do not change the chain we are building on by finalising another block, then we will eventually agree on some prefix longer than the last finalised block. -Thus any finality gadget that satisfies Definition \ref{def:finality-gadget}, will work in this system so that all honest voters finalise an increasingly long common chain. +\xxx{Lef I do not understand the paragraph below, clarify.} + +As an example, we could assume $F$ uses proof of work to build on the longest chain and includes the last block $G$ finalised. Then we take $A(v,s_v,B)$ as being the longest chain which includes $B$ and which $v$ sees in state $s_v$. It is well-known \cite{nakamoto08bitcoin} that longest chain with proof of work achieves eventual consensus under the right assumptions and similar arguments show that in this case we have conditional eventual consensus. +As long as we do not change the chain we are building on by finalising another block, we will eventually agree on some prefix longer than the last finalised block. +Thus, any finality gadget that satisfies Definition \ref{def:finality-gadget} will work in this system so that all honest voters finalise an increasingly long common chain. Thanks to the abstraction above, we can switch $F$ for one of many possible alternative consensus algorithms and $G$ will still work. -To analyse the performance of our finality gadget, we will need versions of the last two properties that appropriately depend on time: - -\begin{itemize} -\item{\bf Fast termination:} {\em If the last finalised block has number $n$ and, until another block is finalised, the best chain observed by all participants will include the same block with block number $n+1$, then a block with number $n+1$ will be finalised within time $T$.} -\item{\bf Recent validity:} {\em If an honest voter finalises a block $B$ then that block was seen in the best chain observed by some honest voter containing some previously finalised ancestor of $B$ more recently than time $T$ ago.} -\end{itemize} - -Intuitively, fast termination implies that we finalise blocks fast as long as the block production mechanism achieves consensus fast whereas recent validity bounds the cost of starting to agree on something the block production mechanism's consensus later decides is not the best. In this case, we may waste time building on a chain that is never finalised so it is important to bound how long we do that. - -These properties will typically only hold with high probability. In the asynchronous case, we would need to measure time in rounds of the protocol rather than seconds to make sense of these properties. We are also interested in being able to remove and punish Byzantine voters, for which we will need: - -\begin{itemize} - \item{\bf Accountable Safety:} {\em If blocks on different chains are finalised, then we can identify at least $f+1$ Byzantine voters.} -\end{itemize} +\com{ \subsection{Our results} -\subsection{Our approach} -To discover up with a solution to the blockchain Byzantine finality gadget problem, we will typically look at various Byzantine agreement protocols and use those to find protocols for the multi-valued Byzantine finality gadget problem. -Agreement protocols with appropriate properties can used to find protocols for the blockchain Byzantine finality gadget problem by considering running them in parallel at every block number. -If the one block protocol has the right properties then they will agree on blocks consistently, so if we finalise a block then we also finalise its ancestors and we can come up with a succinct protocol. - -For example, suppose we have a one block protocol that calls for a vote on blocks which requires a participant to observe a supermajority, say votes from $2/3$ of voters, for some block, or else the participant observes that the vote is undecided. Now imagine running this vote in parallel for every block number and have any honest voter vote for blocks from a particular chain. -Byzantine voters may vote more than once, but if we count a vote for a block as a vote for each ancestor of the block in the vote for the instance of the one block protocol with its number, then Byzantine voters must also vote for chains, though they can vote for multiple chains. -If we do this, then we see that if a block has a supermajority in a vote, then so does all its ancestors in their votes. Thus the blocks with a supermajority form a chain. -Furthermore, if only $1/3$ of voters equivocate then if a participant sees a subset of the votes for chains, then they must see a prefix of the chain of blocks for which all the votes have supermajorities. Intuitively, the protocol can agree on the prefix that $2/3$ of voters agree on using this. - -To ensure safety, each participant maintains an estimate $E_r$ of the last block that could have been finalised in a round $r$. This has the property that in future rounds it overestimates the block that could have been finalised so that in round $r$, the chain with head $E_{r-1}$ contains all blocks that could have been finalised. -Any honest voter only votes in round $r$ for chains containing their estimate $E_{r-1}$ and this guarantees that any block that could have been finalised in round $r-1$ will be finalised in round $r$. \subsection{Related Work} @@ -186,51 +270,43 @@ It is not clear that it is, nor is it clear how to prove liveness for such a rul +} +\subsection{Preliminaries} \label{sec:prelims} -\section{Preliminaries} \label{sec:prelims} - -{\bf Network model}: We will mostly be using a partially synchronous gossip network model, such as that described in \cite{Tendermint} section II A. -Participants communicate via a gossip network, where they are connected to a subset of other participants, and forward all messages they receive to all their connected peers. -We assume that the network graph is such that any Byzantine participants are not able to cut off an honest participant and so any message sent or received by an honest participant reaches all honest participants. -The partial synchrony we will use is the model where messages are received within time $T$, but possibly only after some Global Synchronisation Time $\GST$. +\paragraph{Network model}: We will be using the partially synchronous network model introduced by \cite{DLS} and in particular the gossip network variant used in \cite{Tendermint}. +We assume that any message sent or received by an honest participant reaches all honest participants within time $T$, but possibly only after some Global Synchronisation Time $\GST$. Concretely, any message sent or received by some honest participant at time $t$ is received by all honest participants by time $\GST+T$ at the latest. -{\bf voters}: We will want to change the set of participants who actively agree sometimes. To model this, we have a large set of participants who follow messages. +\paragraph{Voters:} \com{We will want to change the set of participants who actively agree sometimes. +To model this, we have a large set of participants who follow messages.} For each voting step, there is a set of $n$ voters. We will frequently need to assume that for each such step, at most $f < n/3$ voters are Byzantine. We need $n-f$ of voters to agree on finality. Whether or not block producers ever vote, they will need to be participants who track the state of the protocol. -{\bf votes}: A vote is a block hash, together with some metadata such as round number and the type of vote, such as {\em prevote} or {\em precommit}, all signed with a voter's private key. - -{\bf Rounds}: each participant has their own idea of what the current round number is. Every prevote and precommit has an associated round number. Honest voters only vote once (for each type of vote) in each round and don't vote in earlier rounds after later ones. +\paragraph{Votes:}A vote is a block hash, together with some metadata such as round number and the type of vote, such as {\em prevote} or {\em precommit}, all signed with a voter's private key. +\paragraph{Rounds:}Each participant has their own idea of what is the current round number. Every prevote and precommit has an associated round number. Honest voters only vote once (for each type of vote) in each round and do not vote in earlier rounds after later ones. Participants need to keep track of which block they see as currently being the latest finalised block and an estimate of which block could have been finalised in the last round. - - For block $B$, we write $\mathrm{chain}(B)$ for the chain whose head is $B$. The block number, $n(B)$ of a block $B$ is the length of $\mathrm{chain}(B)$. - For blocks $B'$ and $B$, we say $B$ is later than $B'$ if it has a higher block number. -We write $B > B'$ or that $B$ is descendant of $B'$ for $B$, $B'$ appearing in the same blockchain with $B'$ later i.e. $B' \in \mathrm{chain}(B)$ with $n(B) > n(B')$ and $B < B'$ or $B$ is an ancestor of $B'$ for $B \in \mathrm{chain}(B')$ with $n(B') > n(B)$. -$B \geq B'$ and $B \leq B'$ are similar except allowing $B = B$. +We write $B > B'$ or that $B$ is descendant of $B'$ for $B$, $B'$ appearing in the same blockchain with $B'$ later i.e. $B' \in \mathrm{chain}(B)$ with $n(B) > n(B')$. +$B \geq B'$ and $B \leq B'$ are similar except allowing $B = B'$. We write $B \sim B'$ or $B$ and $B'$ are on the same chain if $B B'$; and $B \nsim B'$ or $B$ and $B'$ are not on the same chain if there is no such chain. Blocks are ordered as a tree with the genesis block as root. So any two blocks have a common ancestor but two blocks not on the same chain do not have a common descendant. +A vote $v$ for a block $B$ by a voter $V$ is a message signed by $V$ containing the blockhash of $B$ and meta-information like the round numbers and the type of vote. -A vote $v$ for a block $B$ by a voter $V$ is a message signed by $V$ containing the blockhash of $B$ and meta information like the round numbers and the type of vote. - - - -A voter equivocates in a set of votes $S$ if they have more than one vote in $S$. We call a set $S$ of votes tolerant if the number of voters who equivocate in $S$ is at most $f$. We say that $S$ has a supermajority for a block $B$ if the set of voters who either have a vote for blocks $\geq B$ or equivocate in $S$ has size at least $(n+f+1)/2$. We count equivocations as votes for everything like this so that observing a vote is monotonic, meaning that if $S \subset T$ then if $S$ has a supermajority for $B$ so does $T$, while being able to ignore yet more equivocating votes from an equivocating voter. +A voter equivocates in a set of votes $S$ if they have cast multiple different votes in $S$. We call a set $S$ of votes safe if the number of voters who equivocate in $S$ is at most $f$. We say that $S$ has a supermajority for a block $B$ if the set of voters who either have a vote for blocks $\geq B$ or equivocate in $S$ has size at least $(n+f+1)/2$. We count equivocations as votes for everything so that observing a vote is monotonic, meaning that if $S \subset T$ then if $S$ has a supermajority for $B$ so does $T$, while being able to ignore yet more equivocating votes from an equivocating voter. +For our finality gadget (GRANDPA) we use the ghost~\cite{lewenberg15inclusive} eventual consensus algorithm as $F$. The $2/3$-GHOST function $g(S)$ takes a set $S$ of votes and returns the block $B$ with highest block number such that $S$ has a supermajority for $B$. -If there is no such block, then it returns `nil`. (if $f \neq \lfloor (n-1)/3 \rfloor$, then this is a misnomer and we may change the name of the function accordingly.) - -Note that, if $S$ is tolerant, then we can compute $g(S)$ by starting at the genesis block and iteratively looking for a child of our current block with a supermajority, which must be unique if it exists. Thus we have: +If there is no such block, then it returns `nil`. \com{(if $f \neq \lfloor (n-1)/3 \rfloor$, then this is a misnomer and we may change the name of the function accordingly.)} +Note that, if $S$ is safe, then we can compute $g(S)$ by starting at the genesis block and iteratively looking for a child of our current block with a supermajority, which must be unique if it exists. Thus we have: \begin{lemma} \label{lem:ghost-monotonicity} -Let $T$ be a tolerant set of votes. Then +Let $T$ be a safe set of votes. Then \begin{enumerate} \item The above definition uniquely defines $g(T)$ \item If $S \subseteq T$ has $g(S) \neq$ nil, then $g(S) \leq g(T)$. @@ -240,20 +316,18 @@ Let $T$ be a tolerant set of votes. Then \end{lemma} Note that we can easily update $g(S)$ to $g(S \cup \{v\})$, by checking if any child of $g(S)$ now has a supermajority. +The third rule tells us that even if participants see different subsets of the votes cast in a given voting round, this rule may give them different blocks but all such blocks are in the same chain under this assumption. -3 tells us that even if participants see different subsets of the votes cast in a given voting round, this rule may give them different blocks but all such blocks are in the same chain under this assumption. - -Next, we define a notion of possibility to have a supermajority which needs t have that if the set of all votes in a vote $T$ is tolerant and some participant observes a subset $S \subseteq T$ that has a supermajority for a block $B$ then all participants who see some other subset $S' \subseteq T$ still see that it is possible for $S$ to have a supermajority for $B$. We need a definition that extends to intolerant sets. - +Next, we define a notion of possibility to have a supermajority which says that if the set of all votes in a vote $T$ is safe and some participant observes a subset $S \subseteq T$ that has a supermajority for a block $B$ then all participants who see some other subset $S' \subseteq T$ still see that it is possible for $S$ to have a supermajority for $B$. We need a definition that extends to unsafe sets. We say that it is {\em impossible} for a set $S$ to have a supermajority for $B$ if at least $(n+f+1)/2$ voters either vote for a block $\not \geq B$ or equivocate in $S$. Otherwise it is {\em possible} for $S$ to have a supermajority for $B$. -Note that if $S$ is tolerant, it is possible for $S$ to have a supermajority for $B$ if and only if there is a tolerant $T \supseteq S$ that has a supermajority for $B$, which can be constructed by adding a vote from $B$ for all voters without votes in $S$ and enough voters who already have votes in $S$ to bring the number of equivocations up to $f$. +Note that if $S$ is safe, it is possible for $S$ to have a supermajority for $B$ if and only if there is a safe $T \supseteq S$ that has a supermajority for $B$, which can be constructed by adding a vote from $B$ for all voters without votes in $S$ and enough voters who already have votes in $S$ to bring the number of equivocations up to $f$. We say that it is {\em impossible} for any child of $B$ to have a supermajority in $S$ if $S$ has votes from at least $2f+1$ voters and it is impossible for $S$ to have a supermajority for each child of $B$ appearing on the chain of any vote in $S$. -Again, provided $S$ is tolerant, this holds if and only if for any possible child of $B$, there is no tolerant $T \subseteq S$ that has a supermajority for that child. - -Note that it is possible for an intolerant $S$ to both have a supermajority for $S$ and for it to be impossible to have such a supermajority under these definitions, as we regard such sets as impossible anyway. - +Again, provided $S$ is safe, this holds if and only if for any possible child of $B$, there is no safe $T \subseteq S$ that has a supermajority for that child. +\com{ +Note that it is possible for an unsafe $S$ to both have a supermajority for $S$ and for it to be impossible to have such a supermajority under these definitions, as we regard such sets as impossible anyway. +} \begin{lemma} \label{lem:impossible} \begin{itemize} \item[(i)] If $B' \geq B$ and it is impossible for $S$ to have a supermajority for $B$, then it is impossible for $S$ to have a supermajority for $B'$. @@ -262,24 +336,55 @@ Note that it is possible for an intolerant $S$ to both have a supermajority for \end{itemize} \end{lemma} -\section{The GRANDPA protocol} \label{sec:grandpa} -In this section, we give the protocol for GRANDPA, our finality gadget in the partially synchronous setting. +\section{Finality Gadget Protocols} \label{sec:finality} + +\com{ +To discover up with a solution to the blockchain Byzantine finality gadget problem, we will typically look at various Byzantine agreement protocols and use those to find protocols for the multi-valued Byzantine finality gadget problem. +Agreement protocols with appropriate properties can be used to find protocols for the blockchain Byzantine finality gadget problem by considering running them in parallel at every block number. +If the one block protocol has the right properties then they will agree on blocks consistently, so if we finalise a block then we also finalise its ancestors and we can come up with a succinct protocol. + +For example, suppose we have a one block protocol that calls for a vote on blocks which requires a participant to observe a supermajority, say votes from $2/3$ of voters, for some block, or else the participant observes that the vote is undecided. Now imagine running this vote in parallel for every block number and have any honest voter vote for blocks from a particular chain. +Byzantine voters may vote more than once, but if we count a vote for a block as a vote for each ancestor of the block in the vote for the instance of the one block protocol with its number, then Byzantine voters must also vote for chains, though they can vote for multiple chains. +If we do this, then we see that if a block has a supermajority in a vote, then so does all its ancestors in their votes. Thus the blocks with a supermajority form a chain. +Furthermore, if only $1/3$ of voters equivocate then if a participant sees a subset of the votes for chains, then they must see a prefix of the chain of blocks for which all the votes have supermajorities. Intuitively, the protocol can agree on the prefix that $2/3$ of voters agree on using this. + +To ensure safety, each participant maintains an estimate $E_r$ of the last block that could have been finalised in a round $r$. This has the property that in future rounds it overestimates the block that could have been finalised so that in round $r$, the chain with head $E_{r-1}$ contains all blocks that could have been finalised. +Any honest voter only votes in round $r$ for chains containing their estimate $E_{r-1}$ and this guarantees that any block that could have been finalised in round $r-1$ will be finalised in round $r$. +} + +In order to find a solution to the finality gadget protocol we look in +consensus protocols that solve the stronger problem as described in the previous section. The key idea for our solution is to inherit the safety properties of a consensus protocol, but use the underlying blockchain as the driving force of liveness. This results in a protocol which does not stop when for example the network is split. +Instead, only the finalization stops, but the blocks keep getting created and propagated to everyone. +This means that when the conditions are safe again, the finality gadget only needs to finalize the head of the chain\footnote{Which the oracle will return quickly to a supermajority of miners.}, +instead of having to transmit and run consensus on every block. +In Figure~\ref{fig:finality}, we analyze the differences between classic blockchain protocols~\cite{nakamoto08bitcoin,wood14ethereum}, finality gadget, and hybrid consensus solutions~\cite{kokoris16enhancing,gilad17algorand} +\xxx{Experiment: Catchup 100s of blocks Hotstuff vs GRANDPA}. -In addition to a set of voters for each of the two votes in a round, we assume that each round has a participant designated as primary and all participants agree on the voter sets and primary. We will typically either choose the primary pseudorandomly from or rotate through the voter set. -We let $V_{r,v}$ and $C_{r,v}$ be the sets of prevotes and precommits respectively received by $v$ from round $r$ at the current time. + + +\subsection{The GRANDPA Protocol}\label{sec:grandpa} +In this section, we give our solution to the Byzantine finality gadget problem, GRANDPA. Our finality gadget works the partially synchronous setting, we also provide a fully asynchronous solution in Appendix~\ref{app:async}. + +GRANDPA works in rounds, each round has a set of $3f+1$ eligible voters, $2f+1$ of which are assumed honest. Furthermore, we assume that each round has a participant designated as primary and all participants agree on the voter sets and primary. We will can either choose the primary pseudorandomly from or rotate through the voter set. +On a high-level, each round consists of a double-echo protocol after which every party waits in order to detect whether we can finalize a block in this round (this block does not need to be the immediate ancestor of the last finalized block, it might be far ahead from the last finalized block). If the round is unsuccessful, the parties simply move on to the next round with a new primary. When a good primary is selected, the oracle is consistent (returns the same value to all honest parties), +and the network is in synchrony (after $\GST$), then a new block will be finalized and it will transitively finalized all its ancestors. + +More specifically, we let $V_{r,v}$ and $C_{r,v}$ be the sets of prevotes and precommits respectively received by $v$ from round $r$ at the current time. We define $E_{r,v}$ to be $v$'s estimate of what might have been finalised in round $r$, given by the last block in the chain with head $g(V_{r,v})$ for which it is possible for $C_{r,r}$ to have a supermajority. Next we define a condition which will allow us to safely conclude that $E_{r,v} \geq B$ for all $B$ that might be finalised in round $r$: If either $E_{r,v} < g(V_{r,v})$ or it is impossible for $C_{r,v}$ to have a supermajority for any children of $g(V_{r,v})$, then we say that {\em $v$ sees that round $r$ is completable}. $E_{0,v}$ is the genesis block, assuming we start at $r=1$. In other words, a round $r$ is completable when our estimate chain $E_{r,v}$ contains everything that could have been finalised in round $r$, which makes it possible to begin the next round $r+1$. -We have a time bound $T$ that we hope suffices to send messages and gossip them to everyone. -Inside a round, the properties both of $E_{r,v}$ having a supermajority, meaning $E_{r,v} < g(V_{r,v})$, as well as of it being imposible to have a supermajority for some given block are monotone, so the property of being completable is monotone as well. -We therefore expect that, if anyone anyone sees a round is completable, then everyone will see this within time $T$. Leaving a gap of $2T$ between steps should then be enough to ensure that we recieve all honest votes before continuing. +We have a time bound $T$ that after $\GST$ suffices for all honest participants to communicate with each other. +Inside a round, the properties both of $E_{r,v}$ having a supermajority, meaning $E_{r,v} < g(V_{r,v})$, as well as of it being impossible to have a supermajority for some given block are monotone, so the property of being completable is monotone as well. +We therefore expect that, if anyone sees a round is completable, then everyone will see this within time $T$. Leaving a gap of $2T$ between steps is then enough to ensure that every party receives all honest votes before continuing. + +\paragraph{Protocol Description.} In round $r$ an honest participant $v$ does the following: \noindent \fbox{\parbox{6.3in}{ @@ -304,19 +409,64 @@ and then broadcasts a precommit for $g(V_{r,v})$ {\em( (iii) is optional, we can }} -Nite that $C_{r,v}$ and $V_{r,v}$ may change with time and also that $E_{r-1,v}$, which is a function of $V_{r-1,v}$ and $C_{r-1,v}$, can also change with time if $v$ sees more votes from the previous round. +Note that $C_{r,v}$ and $V_{r,v}$ may change with time and also that $E_{r-1,v}$, which is a function of $V_{r-1,v}$ and $C_{r-1,v}$, can also change with time if $v$ sees more votes from the previous round. -\subsection{Finalisation} +\paragraph{Finalisation.} If, for some round $r$, at any point after the precommit step of round $r$, we have that $B=g(C_{r,v})$ is later than our last finalised block and $V_{r,v}$ has a supermajority, then we finalise $B$. We may also send a commit message for $B$ that consists of $B$ and a set of precommits for blocks $\geq B$ (ideally for $B$ itself if possible see "Alternatives to the last blockhash" below). To avoid spam, we only send commit messages for $B$ if we have not receive any valid commit messages for $B$ and its descendants and we wait some time chosen uniformly at random from $[0,1]$ seconds or so before broadcasting. - If we receive a valid commit message for $B$ for round $r$, then it contains enough precommits to finalise $B$ itself if we haven't already done so, so we'll finalise $B$ as long as we are past the precommit step of round $r$. + +\com{ +\subsection{Discussion} + +\paragraph{Wait at the end of a round before precommitting.} + +If the network is badly behaved, then these steps may involve waiting an arbitrarily long time. When the network is well behaved (after the $\GST$ in our model), we should not be waiting. Indeed there is little point not waiting to receive $2f+1$ of voters' votes as we cannot finalise anything without them. +But if the gossip network is not perfect and some messages never arrive, then we may need to make voters asking other voters for votes from previous rounds.\com{ in a similar way to the challenge procedure, to avoid deadlock.} + +In exchange for our design choice of waiting, we get the property that we do not need to pay attention to votes from before the previous round in order to vote correctly in this one. Without waiting, we could be in a situation where we might have finalised a block in some round r, but the network becomes unreliable for many rounds and gets few votes on time, in which case we need to remember the votes from round r to finalise the block later. + +\subsubsection{Using a Primary} + +We only need the primary for liveness. +We need some form of coordination to defeat the repeated vote splitting attack. The idea behind that attack is that if we are in a situation where almost 2/3 of voters vote for something an the rest vote for another, then the Byzantine voters can control when we see a supermajority for something. If they can carefully time this, they may be able to split the next vote. +Without the primary, they could do this for prevotes, getting a supermajority for a block $B$ late, then split precommiher from being finalised like this even if the (unknown) fraction of Byzantine players is small. + +When the network is well-behaved, an honest primary can defeat this attack by deciding how much we should agree on. We could also use a common coin for the same thing, where people would prevote for either the best chain containing $E_{r-1,v}$ or $g(V_{r-1,v})$ depending on the common coin. +With on-chain voting, it is possible that we could use probabilistic finality of the block production mechanism - that if we don't finalise a block and always build on the best chain containing the last finalised block then not only will the best chain eventually converge, but if a block is behind the head of the best chain, then with positive probability, it will eventually be in the best chain everyone sees. + +In our setup, having a primary is the simplest option for this. +ts so we don't see that it is impossible for there to be a supermajority for $B$ until late. +If $B$ is not the best block given the last finalised block but $B'$ with the same block number, they could stop eit + +} + + + \section{ Analysis } + +To analyse the performance of our finality gadget, we will need versions of our properties that appropriately depend on time: + +\begin{itemize} +\item{\bf Fast termination:} {\em If the last finalised block has number $n$ and, until another block is finalised, the best chain observed by all participants will include the same block with block number $n+1$, then a block with number $n+1$ will be finalised within time $T$.} +\item{\bf Recent validity:} {\em If an honest voter finalises a block $B$ then that block was seen in the best chain observed by some honest voter containing some previously finalised ancestor of $B$ more recently than time $T$ ago.} +\end{itemize} + +Intuitively, fast termination implies that we finalise blocks fast as long as the block production mechanism achieves consensus fast whereas recent validity bounds the cost of starting to agree on something the block production mechanism's consensus later decides is not the best. In this case, we may waste time building on a chain that is never finalised so it is important to bound how long we do that. + +These properties will typically only hold with high probability. In the asynchronous case, we would need to measure time in rounds of the protocol rather than seconds to make sense of these properties. We are also interested in being able to remove and punish Byzantine voters, for which we will need: + +\begin{itemize} + \item{\bf Accountable Safety:} {\em If blocks on different chains are finalised, then we can identify at least $f+1$ Byzantine voters.} +\end{itemize} + + + \subsection{ Accountable Safety} The first thing we want to show is asynchronous safety, assuming we have at most $f$ Byzantine voters. This follows from the property that if $v$ sees round $r$ as completable then any block $B$ with $E_{r,v} \not\leq B$ has that it is impossible for one of $C_{r,v}$ or $V_{r,v}$ to have a supermajority for $B$ and so $B$ was not finalised in round $r$. This ensures that all honest prevotes and precommits in round $r+1$ are for chains that include any blocks that could have been finalised in round $r$. With an induction, this is what ensures that we cannot finalise blocks on different chains. To show accountable safety, we need to turn this proof around to show the contrapositive, when we finalise different blocks , then there are $f+1$ Byzantine voters. If we make this proof constructive, then it gives us a challenge procedure, that can assign blame to such voters. @@ -326,7 +476,7 @@ The first thing we want to show is asynchronous safety, assuming we have at most The challenge procedure works as follows: If $B$ and $B'$ are committed in the same round, then the union of their precommits must contain at least $f$ equivocations, so we are done. Otherwise, we may assume by symmetry that $B$ was committed in round $r$ and $B'$ in round $r' > r$. There are at least $n-f$ voters who precommitted $\geq B'$ or equivocated in round $r$ in their commit messages, so we ask those who precommitted $\geq B'$ why they did so. -Starting with $r''='$, we ask queries of the following form: +Starting with $r''=r' $, we ask queries of the following form: \begin{itemize} \item Why was $E_{r''-1} \not\geq B$ when you prevoted for or precommitted to $B'' \not\geq B$ in round $r'' > r$? \end{itemize} @@ -341,7 +491,7 @@ Any honest voter should respond. In particular, if no voter responds, then we c If we ask such queries for a vote in all rounds between $r''=r'$ and $r''=r+1$ and get valid responses, since some voter responds when $r''=r+1$, then we have either a set $S$ of prevotes or precommits in round $r$ that show it is impossible for $S$ to have a supermajority for $B$ in round $r$. -If $S$ is a set of precommits, then if we take the union of $S$ and the set of precommits in the commit message for $B$, then the resulting set of precommits for round $r$ has a supermajority for $B$ and it is impossible for it to have a supermajority for $B$. This is possible if the set is not tolerant and so there must be at least $f+1$ voters who equivocate an so are Byzantine. +If $S$ is a set of precommits, then if we take the union of $S$ and the set of precommits in the commit message for $B$, then the resulting set of precommits for round $r$ has a supermajority for $B$ and it is impossible for it to have a supermajority for $B$. This is possible if the set is not safe and so there must be at least $f+1$ voters who equivocate an so are Byzantine. If we get a set $S$ of prevotes for round $r$ that does not have a supermajority for $B$, then we need to ask a query of the form @@ -388,7 +538,7 @@ If there at most $f$ Byzantine voters in any vote, $B$ was finalised in round $r \subsection{Liveness } We show the protocol is deadlock free and also that it finalises new blocks quickly in a weakly synchronous model. -For this section, we will assume that there are at most $f < n/3$ Byzantine voters for each vote, and so that the sets of prevotes and precommits for each round are tolerant. +For this section, we will assume that there are at most $f < n/3$ Byzantine voters for each vote, and so that the sets of prevotes and precommits for each round are safe. We define $V_{r,v,t}$ be the set $V_{r,v}$ at time $t$ and similarly for $C_{r,v,t}$ and the block $E_{r,v,t}$ . @@ -540,6 +690,50 @@ Then either all honest participants finalise $B$ before time $t_r+6T$ or no hone +\section{Optimized version of GRANDPA} + + There are a few ways we can optimise the GRANDPA protocol. + Firstly, a participant that is offline for many rounds should be able to catch up to the latest round by only seeing recent messages. + Secondly, we shouldn't need to actively use many rounds worth of votes, only needing old rounds for challenges for accountable safety and not finalising blocks. + Thirdly, We should wait $2T$ as little as possible. Conversely if communication is faster than block production, we shouldn't be running many rounds before a new block arrives. + + To achieve this, we need to have more complicated conditions for when to perform each step of the protocol. Here is the resulting protocol: + + To enter a round $r$, $v$ needs that round $r-1$ is completable and that $E_{r-2,v}$ is finalised. + If $v$ sees messages that give this for a future round $r$, even if $v$ are not in round $r-1$, $v$ jumps straight to round $r$. + (when checking this condition, for the finalisation, we need to relax not finalising using precommits from future rounds to all rounds $< r$). + + \noindent \fbox{\parbox{6.3in}{ + \begin{enumerate} + \item If $v$ is the primary, it broadcast $E_{r-1,v}$ at the start time $t_{r,v}$ + + \item We prevote when one of the folowing conditions tells us to. + \begin{itemize} + %\item[(i)] If it is impossible for $V_{r-1,v}$ to have a supermajority for any children of $E_{r-1,v}$, then $v$ prevotes for the best chain containing $E_{r-1,v}$ + \item[(i)] If $v$ has received $B$ from the primary, $v$ prevotes for the head of the best chain containing $B$ as soon as one of the following holds: + + \begin{itemize} + \item[(a)] $g(V_{r-1,v}) \geq B \geq E_{r-1,v}$ + \item[(b)] The best chain containing $B$ is also the best chain containing $E_{r-1,v}$ + (equivalently if we evaluate the best chain containing the eariler of the two blocks, then it contains the other) + \end{itemize} + \item[(ii)] If round $r$ is completable and $E_{r,v} \geq E_{r-1,v}$, then we prevote for $E_{r,v}$. + \item[(iii)] if we have reached time $t_{r,v}+2T$ then if we have not recieved a message from the primary or (i) (a) does not hold, then $v$ prevotes for the head of best chain containing $E_{r-1,v}$ anyway. + \end{itemize} + + \item After prevoting, we wait until $g(V_{r,v}) \geq E_{r-1,v}$, then when one of the following holds, we precommit $g(V_{r,v})$ + \begin{itemize} + \item[(i)] if round $r$ is completable + \item[(ii)] if $v$ has seen a child of the last finalised block and it is impossible for $V_{r,v}$ to have a supermajority for any child of $g(V_{r,v})$ . + \item[(iii)] If $v$ has seen a child of the last finalised block and we have reached time $t_{r,v}+4T$. + \end{itemize} + \end{enumerate} + }} + + We claim that all results we proved about the protocol described in Section \ref{sec:grandpa} apply to this protocol. the stronger properties this satisifies are that $v$ does not need to store votes from before round $r-1$ (except to answer challenges for accountable safety, which should be rare) and that if we have seen no descendants of the last finalised block, we pause until we do. + + + \section{Practicalities} @@ -607,68 +801,11 @@ So we have two possible chain selection rules for block producers: \end{enumerate} 1 is better if finalisation is happening quickly compared to block production and 2 is best if block production is much faster. We could also consider hybrid rules like adopt 1 unless we see that the protocol is stuck or slow, then we switch to 2. - -\section{Why?} - -\subsection{Why do we wait at the end of a round and sometimes before precommitting?} - -If the network is badly behaved, then these steps may involve waiting an arbitrarily long time. When the network is well behaved (after the $\GST$ in our model), we should not be waiting. Indeed there is little point not waiting to receive 2/3 of voters' votes as we cannot finalise anything without them. -But if the gossip network is not perfect, an some messages never arrive, then we may need to implement voters asking other voters for votes from previous rounds in a similar way to the challenge procedure, to avoid deadlock. - -In exchange for this, we get the property that we do not need to pay attention to votes from before the previous round in order to vote correctly in this one. Without waiting, we could be in a situation where we might have finalised a block in some round r, but the network becomes unreliable for many rounds and gets few votes on time, in which case we' need to remember the votes from round r to finalise the block later. - -\subsection{Why have a primary?} - -We only need the primary for liveness. -We need some form of coordination to defeat the repeated vote splitting attack. The idea behind that attack is that if we are in a situation where almost 2/3 of voters vote for something an the rest vote for another, then the Byzantine voters can control when we see a supermajority for something. If they can carefully time this, they may be able to split the next vote. -Without the primary, they could do this for prevotes, getting a supermajority for a block $B$ late, then split precommits so we don't see that it is impossible for there to be a supermajority for $B$ until late. -If $B$ is not the best block given the last finalised block but $B'$ with the same block number, they could stop either from being finalised like this even if the (unknown) fraction of Byzantine players is small. - -When the network is well-behaved, an honest primary can defeat this attack by deciding how much we should agree on. We could also use a common coin for the same thing, where people would prevote for either the best chain containing $E_{r-1,v}$ or $g(V_{r-1,v})$ depending on the common coin. -With on-chain voting, it is possible that we could use probabilistic finality of the block production mechanism - that if we don't finalise a block and always build on the best chain containing the last finalised block then not only will the best chain eventually converge, but if a block is behind the head of the best chain, then with positive probability, it will eventually be in the best chain everyone sees. - -In our setup, having a primary is the simplest option for this. - +\com{ \section{The asynchronous finality gadget problem} Here we give an extension of the \cite{flp} result that shows the impossibility of having an asynchronous and deterministic finality gadget protocol and give an asynchronous protocol that uses a common coin primitive. -\subsection{Impossibility of a deterministic protocol} \label{ssec:impossibility} - -The asynchronous binary fault tolerant agreement problem is as follows: - -We have number of voters which each have an initial $v_i$ in $\{0,1\}$ - -We may have one or more faulty nodes, which here means going offline at some point. Nodes have asynchronous communication - so any message arrives but we have no guarantee when it will. -The goal is to have all non-faulty nodes output the same $v$, which must be $0$ if all inputs $v_i$ are $0$ and $1$ if all are $1$. - -Fischer, Lynch and Paterson\cite{flp} showed that this is impossible if there is one faulty node. - -The binary fault-tolerant finality gadget problem is similar, except now there is an oracle $A$ that any node can call at any time with the following properties: - -either $A$ always outputs $x$ in $\{0,1\}$ to all nodes at all times -or else there is an $x$ in $\{0,1\}$ and -for each node $i$, there is a $T_i$ such that when $i$ calls $A$ before $T_i$. it gives $x$ but if it calls $A$ after $T_i$, it returns not $x$ . - -and we want that if A never switches, then all non-faulty nodes output x. If A does switch then all non-faulty nodes should output the same thing, but it can be 0 or 1. - -Then this is also impossible, even for one faulty node, which just goes offline. Note that this generalises Byzantine agreement, since if we could each node $i$ could call $A$ once at the start and use the output as $v_i$. (For the multi-valued case, we will define the problem so that this reduction does not hold.) - - -\begin{proof}[Proof sketch] We follow the notation of \cite{flp} and assume for a contradiction that we use a correct protocol. -Let $r$ be a run of the protocol where $A$ gives $0$ all the time. -Then by correctness $r$ decides $0$. Now we consider what can happen when $A$ switches to $1$ after each configuration in $r$. If it switches to $1$ at the start, then the protocol decides $1$. -If we switch to $1$ when all node have already decided $0$, then we decide $0$. - -We claim that some configuration in the run $r$, where there are two runs from it where $A$ is always $1$ that decide $0$ and $1$. We call such states $1$-bivalent. -To see this, assume for a contradiction that $r$ contains no such configurations. Then there are successive configurations $C$,$C'$ such that if $A$ return $1$ in the future from $C$ then we always decide $0$ but from $C'$, we always decide $1$. -Let events be $(p,m,x)$ where node (processor/voter) $p$ receives message $m$ (which may be null) and executes some code where any calls to A return $x$ in $\{0,1\}$, then sends some messages. -Then there is some event $(p,m,0)$ that when applied to $C$ gives $C'$. Now suppose that $p$ goes offline at $C$, then if $A$ always returns $1$ afterwards, then we still decide $1$. Thus there is a run $r'$ that starts at $C$ where $p$ takes no steps, $A$ always returns $1$ and all other nodes still output $1$. -But since $p$ takes no steps in $r'$, we can apply $r'$ after $(p, m, 0)$ and so we have that $C'$ has a run where $A$ always returns $1$ but decides $1$, which is a contradiction. - -Now let $C$ be a $1$-bivalent configuration. We can follow the FLP proof to show that there is a run from $C$ for which $A$ always returns $1$, all messages are delivered but all configurations are 1-bivalent and so the protocol never decides. This completes the proof by contradiction that there is no correct protocol. -\end{proof} - \subsection{1/5 BFT finality gadget using a common coin} In this section, we will assume the asynchronous gossip network model. By the previous impossibility result, we will need to use randomness to get a finality gadget in this model. We assume that we have access to a common coin protocol. @@ -769,50 +906,8 @@ If $h < 3f+1$ and $s_r=0$, then every $v \in S'$ locks only $B$. But then all su Crucially note that $h$ depends only on $S$, which is determined when $4f+1$ voters call the common coin and before it is flipped. Thus $s_r$ is independent of $h$. If $h < 3f+1$ then $s_r=0$ with probability $1/2$ and if $h \geq 3f+1$ then $s_r=1$ with probability $1/2$. So with probability $1/2$, we have either both $h < 3f+1$ and $s_r=0$ or both $h \geq 3f+1$ and $s_r=1$. Thus with probability at least $1/2$, we finalise $B'$ or $B''$ before the next round after $r+1$ when $s_r=1$. \end{proof} +} -\section{Optimized version of GRANDPA} - - There are a few ways we can optimise the GRANDPA protocol. - Firstly, a participant that is offline for many rounds should be able to catch up to the latest round by only seeing recent messages. - Secondly, we shouldn't need to actively use many rounds worth of votes, only needing old rounds for challenges for accountable safety and not finalising blocks. - Thirdly, We should wait $2T$ as little as possible. Conversely if communication is faster than block production, we shouldn't be running many rounds before a new block arrives. - - To achieve this, we need to have more complicated conditions for when to perform each step of the protocol. Here is the resulting protocol: - - To enter a round $r$, $v$ needs that round $r-1$ is completable and that $E_{r-2,v}$ is finalised. - If $v$ sees messages that give this for a future round $r$, even if $v$ are not in round $r-1$, $v$ jumps straight to round $r$. - (when checking this condition, for the finalisation, we need to relax not finalising using precommits from future rounds to all rounds $< r$). - - \noindent \fbox{\parbox{6.3in}{ - \begin{enumerate} - \item If $v$ is the primary, it broadcast $E_{r-1,v}$ at the start time $t_{r,v}$ - - \item We prevote when one of the folowing conditions tells us to. - \begin{itemize} - %\item[(i)] If it is impossible for $V_{r-1,v}$ to have a supermajority for any children of $E_{r-1,v}$, then $v$ prevotes for the best chain containing $E_{r-1,v}$ - \item[(i)] If $v$ has received $B$ from the primary, $v$ prevotes for the head of the best chain containing $B$ as soon as one of the following holds: - - \begin{itemize} - \item[(a)] $g(V_{r-1,v}) \geq B \geq E_{r-1,v}$ - \item[(b)] The best chain containing $B$ is also the best chain containing $E_{r-1,v}$ - (equivalently if we evaluate the best chain containing the eariler of the two blocks, then it contains the other) - \end{itemize} - \item[(ii)] If round $r$ is completable and $E_{r,v} \geq E_{r-1,v}$, then we prevote for $E_{r,v}$. - \item[(iii)] if we have reached time $t_{r,v}+2T$ then if we have not recieved a message from the primary or (i) (a) does not hold, then $v$ prevotes for the head of best chain containing $E_{r-1,v}$ anyway. - \end{itemize} - - \item After prevoting, we wait until $g(V_{r,v}) \geq E_{r-1,v}$, then when one of the following holds, we precommit $g(V_{r,v})$ - \begin{itemize} - \item[(i)] if round $r$ is completable - \item[(ii)] if $v$ has seen a child of the last finalised block and it is impossible for $V_{r,v}$ to have a supermajority for any child of $g(V_{r,v})$ . - \item[(iii)] If $v$ has seen a child of the last finalised block and we have reached time $t_{r,v}+4T$. - \end{itemize} - \end{enumerate} - }} - - We claim that all results we proved about the protocol described in Section \ref{sec:grandpa} apply to this protocol. the stronger properties this satisifies are that $v$ does not need to store votes from before round $r-1$ (except to answer challenges for accountable safety, which should be rare) and that if we have seen no descendants of the last finalised block, we pause until we do. - - -\bibliography{grandpa} +\bibliography{net,os,sec,soc,theory} \end{document} diff --git a/pdf/lipics-logo-bw.pdf b/pdf/lipics-logo-bw.pdf new file mode 100755 index 0000000..95d0644 Binary files /dev/null and b/pdf/lipics-logo-bw.pdf differ diff --git a/pdf/net.bib b/pdf/net.bib new file mode 100644 index 0000000..82ff732 --- /dev/null +++ b/pdf/net.bib @@ -0,0 +1,5040 @@ + +%A + +@inproceedings{ abbott07browser, + author = {Timothy G. Abbott and Katherine J. Lai and + Michael R. Lieberman and Eric C. Price}, + title = {Browser-Based Attacks on {Tor}}, + booktitle = {\bibconf{PETS}{Privacy Enhancing Technologies}}, + year = 2007, +} + + + +@inproceedings{abu-libdeh10symbiotic, + author = {Hussam Abu-Libdeh and + Paolo Costa and + Antony I. T. Rowstron and + Greg O'Shea and + Austin Donnelly}, + title = {Symbiotic Routing in Future Data Centers}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {New Delhi, India}, + month = aug, + year = 2010 +} + +@misc{hearn15rapidly, + title={\href{https://en.bitcoin.it/wiki/Contract}{Rapidly-adjusted (micro)payments to a pre-determined party}}, + author={Hearn, Mike and Spilman, J}, + year={2015}, + url={https://en.bitcoin.it/wiki/Contract}, +} + +@article{back14enabling, + title={\href{https://blockstream.com/sidechains.pdf}{Enabling Blockchain Innovations with Pegged Sidechains}}, + author={Adam Back and Matt Corallo and Luke Dashjr and + Mark Friedenbach and Gregory Maxwell and + Andrew Miller and Andrew Poelstra and + Jorge Tim\'on and Pieter Wuille}, + month=oct, + year=2014, + url={https://blockstream.com/sidechains.pdf}, +} + +@misc{poon15bitcoin, + title={\href{https://lightning.network/lightning-network-paper.pdf}{The {Bitcoin} Lightning Network: Scalable Off-Chain Instant Payments}}, + author={Poon, Joseph and Dryja, Thaddeus}, + month=jan, + year={2016}, + url={https://lightning.network/lightning-network-paper.pdf}, +} + +@incollection{decker15fast, + title={\href{http://www.tik.ee.ethz.ch/file/716b955c130e6c703fac336ea17b1670/duplex-micropayment-channels.pdf}{A Fast and Scalable Payment Network with {Bitcoin} Duplex + Micropayment Channels}}, + author={Decker, Christian and Wattenhofer, Roger}, + booktitle={Stabilization, Safety, and Security of Distributed Systems}, + pages={3--18}, + month=aug, + year={2015}, + publisher={Springer}, + url={http://www.tik.ee.ethz.ch/file/716b955c130e6c703fac336ea17b1670/duplex-micropayment-channels.pdf}, +} + +.. note = {Adviser-Rivest, Ronald L.}, .. +@phdthesis{adida06advances, + author = {Adida, Ben}, + title = {Advances in cryptographic voting systems}, + year = {2006}, + order_no = {AAI0810143}, + publisher = {Massachusetts Institute of Technology}, + school = {Massachusetts Institute of Technology}, + address = {Cambridge, MA, USA}, +} + +@inproceedings{ ahn03kanonymous, + author = {Ahn, Luis von and Bortz, Andrew and Hopper, Nicholas J.}, + title = {$k$-Anonymous Message Transmission}, + booktitle = {\bibconf[10th]{CCS}{ACM conference on + Computer and Communications Security}}, + year = {2003}, +} + +@article{ aiello04jfk, + author = {William Aiello and others}, + title = {Just Fast Keying: Key Agreement In A Hostile {Internet}}, + journal = {\bibconf{TISSEC}{ACM Transactions on Information and + System Security}}, + month = may, + Year = "2004", +} + +@inproceedings{aggrawal10private, + author = {Gaurav Aggrawal and Elie Bursztein and Collin Jackson and Dan Boneh}, + title = {An analysis of private browsing modes in modern browsers}, + year = 2010, + booktitle = {Usenix Security Symposium} +} + +@misc{akamai, + title = {Akamai Technologies}, + note = {\url{http://www.akamai.com}}, +} + +@misc{fullnodes, + author = {Bitnodes}, + title = {\href{https://bitnodes.21.co/nodes/}{Bitcoin Network Snapshot}}, + year = {2017}, + month = {April} +} + + + +@misc{ alexa, + key = {Alexa}, + title = {Alexa Top 500 Global Sites}, + note = {\url{http://www.alexa.com/topsites}}, + month = {April}, + year = {2012} +} + +@InProceedings{alimi08shadow, + author = {Richard Alimi and Ye Wang and Y. Richard Yang}, + title = {Shadow Configuration as a Network Management Primitive}, + booktitle = {ACM SIGCOMM}, + month = Aug, + year = 2008, + address = {Seattle, WA}, +} + +@incollection{ alsabah11defenstrator, + author = {AlSabah, Mashael and Bauer, Kevin and Goldberg, Ian and Grunwald, Dirk and McCoy, Damon and Savage, Stefan and Voelker, Geoffrey}, + booktitle = {\bibconf[11th]{PETS}{Privacy Enhancing Technologies}}, + title = {{DefenestraTor}: Throwing out Windows in {Tor}}, + month = jul, + year = 2011, + location = {Waterloo, Canada}, +} + +@misc{ android, + title = {{Android SDK}}, + note = {\url{http://developer.android.com/guide/basics/what-is-android.html}}, +} + +@inproceedings{ au06short, + author = {Man Ho Au and Sherman S.M. Chow and Willy Susilo and + Patrick P. Tsang}, + title = {Short Linkable Ring Signatures Revisited}, + booktitle = {\bibconf{EuroPKI}{European Public Key Infrastructure + Workshop}}, + month = jun, + year = 2006, + location = {Torino, Italy}, +} + +%B + +@inproceedings{bahl07highly, + author = {Paramvir Bahl and + Ranveer Chandra and + Albert G. Greenberg and + Srikanth Kandula and + David A. Maltz and + Ming Zhang}, + title = {Towards Highly Reliable Enterprise Network Services Via + Inference of Multi-level Dependencies}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Kyoto, Japan}, + month = aug, + year = 2007 +} + +@book{ basagni13mobile, + editor = {Stefano Basagni and Marco Conti and Silvia Giordano and + Ivan Stojmenovic}, + title = {Mobile Ad Hoc Networking: Cutting Edge Directions}, + edition = {2nd}, + month = mar, + year = 2013, + publisher = {Wiley-IEEE Press}, + isbn = {978-1118087282}, +} + +@misc{ basescu14crux, + author = {Cristina Basescu and Michael F. Nowlan and Kirill Nikitin + and Jose M. Faleiro and Bryan Ford}, + title = {\href{https://arxiv.org/abs/1405.0637}{Crux: Locality-Preserving Distributed Services}}, + month = may, + year = 2014, +} + +@inproceedings{ baset06analysis, + author = {Salman A. Baset and Henning Schulzrinne}, + title = {An Analysis of the {Skype} Peer-to-Peer + {Internet} Telephony Protocol}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = apr, + year = 2006, +} + +@inproceedings{ bauer07low, + author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and + Tadayoshi Kohno and Douglas Sicker}, + title = {Low-Resource Routing Attacks Against {Tor}}, + booktitle = {\bibconf[6th]{WPES}{Workshop on Privacy in the + Electronic Society}}, + month = oct, + year = 2007, +} + +@incollection{ bellare98relations, + author = {Bellare, Mihir and Desai, Anand and Pointcheval, David and Rogaway, Phillip}, + title = {Relations among notions of security for public-key encryption schemes}, + booktitle = {Advances in Cryptology — CRYPTO '98}, + series = {Lecture Notes in Computer Science}, + publisher = {Springer Berlin / Heidelberg}, +} + +@inproceedings { bennett03gap, + author = {Krista Bennett and Christian Grothoff}, + title = {{GAP} -- Practical Anonymous Networking}, + booktitle = {\bibconf{PET}{Workshop on Privacy Enhancing Technologies}}, + month = mar, + year = {2003}, + location = {Dresden, Germany} +} + + + +@article{ benslimane08Services, + author = {Djamal Benslimane and Schahram Dustdar and Amit Sheth}, + title = {Services Mashups: The New Generation of Web Applications}, + journal = {IEEE Internet Computing}, + month = may, + year = 2008, + volume = 12, + number = 5, +} + +@inproceedings{benson10network, + author = {Theophilus Benson and + Aditya Akella and + David A. Maltz}, + title = {Network traffic characteristics of data centers in the + wild}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + location = {Melbourne, Australia}, + month = nov, + year = 2010 +} + +@article{ beresford03location, + author={Beresford, A.R. and Stajano, F.}, + journal={{IEEE} Pervasive Computing}, + title={Location privacy in pervasive computing}, + year={2003}, +} + + +@inproceedings{ berthold01disadvantages, + author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke}, + title = {The Disadvantages of Free {MIX} Routes + and How to Overcome Them}, + booktitle = {Workshop on Design Issues in + Anonymity and Unobservability}, + month = jul, + year = 2000, + location = {Berkeley, CA, USA}, +} + +@inproceedings{ bilge09contacts, + author = {Leyla Bilge and Thorsten Strufe and Davide Balzarotti and Engin Kirda}, + title = {All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks}, + booktitle = {18th International World Wide Web Conference}, + month = {April}, + year = {2009}, + url = {http://www2009.eprints.org/56/} +} + + + +@inproceedings{ bohli06deniable, + author = {Jens-Matthias Bohli and Rainer Steinwandt}, + title = {Deniable Group Key Agreement}, + booktitle = {\bibconf{Vietcrypt}{First International Conference on + Cryptology in Vietnam}}, + month = sep, + year = 2006, + location = {Hanoi, Vietnam}, +} + +@inproceedings{borisov04offtherecord, + author = {Borisov, Nikita and Goldberg, Ian and Brewer, Eric}, + title = {Off-the-record communication, or, why not to use {PGP}}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the + Electronic Society}}, + month = oct, + year = {2004}, + location = {Washington DC, USA}, + isbn = {1-58113-968-3}, + doi = {http://doi.acm.org/10.1145/1029179.1029200}, +} +% publisher = {ACM}, +% address = {New York, NY, USA}, + +@inproceedings{ borisov07denial, + author = {Borisov, Nikita and Danezis, George and Mittal, Prateek + and Tabriz, Parisa}, + title = {Denial of Service or Denial of Security? + {How} Attacks on Reliability can Compromise Anonymity}, + booktitle = {\bibconf[14th]{CCS}{Conference on Computer and Communications Security}}, + month = oct, + year = 2007, +} + +@article{ bray05dispute, + author = {Hiawatha Bray}, + title = {Dispute threatens to snarl {Internet}}, + journal = {Boston Globe}, + month = oct, + day = 7, + year = 2005, +} + +@inproceedings{ brickell06efficient, + author = {Justin Brickell and Vitaly Shmatikov}, + title = {Efficient Anonymity-Preserving Data Collection}, + booktitle = {\bibconf[12th]{KDD}{ACM SIGKDD International Conference + on Knowledge Discovery and Data Mining}}, + month = aug, + year = 2006, + location = {Philadelphia, PA}, +} + +@article{brosh10delay, + author = {Eli Brosh and + Salman Abdul Baset and + Vishal Misra and + Dan Rubenstein and + Henning Schulzrinne}, + title = {The Delay-Friendliness of {TCP} for Real-Time Traffic}, + journal = {IEEE Transactions on Networking}, + year = {2010}, + ee = {http://dx.doi.org/10.1109/TNET.2010.2050780}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + + +%C + +@article{ carbone10dummynet, + author = {M. Carbone and L. Rizzo}, + title = "{Dummynet Revisited}", + journal = "{ACM CCR}", + volume = 40, + number = 2, + month = apr, + year = 2010, +} + +@techreport{cooper08X509, + author = {Cooper, D. and Santesson, S. and Farrell, S. and Boeyen, S. and Housley, R. and Polk, W.}, + month = may, + title = {{RFC 5280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile}}, + url = {http://tools.ietf.org/html/rfc5280}, + year = {2008} +} + + + +@inproceedings{ cardoso07bandwidth, + author = {Jaime S. Cardoso}, + title = {Bandwidth-efficient byte stuffing}, + booktitle = {IEEE ICC 2007}, + year = 2007, +} + +@inproceedings{castro03splitstream, + title={\href{http://research.microsoft.com/en-us/um/people/antr/PAST/SplitStream-sosp.pdf}{{SplitStream}: high-bandwidth multicast in cooperative environments}}, + author={Castro, Miguel and Druschel, Peter and Kermarrec, Anne-Marie and Nandi, Animesh and Rowstron, Antony and Singh, Atul}, + booktitle={\bibconf{SOSP}{ACM Symposium on Operating Systems Principles}}, + year={2003}, + url={http://research.microsoft.com/en-us/um/people/antr/PAST/SplitStream-sosp.pdf}, +} + +@article{castro02practical, + title={Practical Byzantine fault tolerance and proactive recovery}, + author={Castro, Miguel and Liskov, Barbara}, + journal={ACM Transactions on Computer Systems (TOCS)}, + year={2002}, +} + + +@article{ chase07simulable, + author = {Melissa Chase and Anna Lysyanskaya}, + title = {Simulatable {VRFs} with applications to multi-theorem {NIZK}}, + booktitle = {CRYPTO}, + location = {Santa Barbara, CA}, + month = aug, + year = 2007, +} + +@article{ chaum81untraceable, + author = {Chaum, David}, + title = {\href{https://dl.acm.org/doi/10.1145/358549.358563}{Untraceable + Electronic Mail, Return Addresses, and Digital Pseudonyms}}, + journal = {Communications of the {ACM}}, + volume = {24}, + issue = {2}, + year = {1981}, + month = {February}, +} + +@article{ chaum88dining, + author = {Chaum, David}, + title = {The {Dining Cryptographers} problem: + Unconditional sender and recipient untraceability}, + journal = {Journal of Cryptology}, + month = jan, + year = 1988, +} + +@inproceedings{ chakravarty08identifying, + author = {Sambuddho Chakravarty and Angelos Stavrou and + Angelos D. Keromytis}, + title = {Identifying Proxy Nodes in a {Tor} Anonymization Circuit}, + booktitle = {\bibconf{SITIS}{Signal Image Technology + and Internet Based Systems}}, + month = nov, + year = 2008, + location = {Bali, Indonesia}, +} + +@inproceedings{chen04path, + author = {Mike Y. Chen and + Anthony Accardi and + Emre Kiciman and + David A. Patterson and + Armando Fox and + Eric A. Brewer}, + title = {Path-Based Failure and Evolution Management}, + booktitle = {\bibconf[1st]{NSDI}{USENIX Symposium on Networked System + Design and Implementation}}, + location = {San Francisco, CA}, + month = mar, + year = 2004 +} + +@inproceedings{ cheng12making, + author = {Cheng Li and Daniel Porto and Allen Clement and + Johannes Gehrke and Nuno Preguica and Rodrigo Rodrigues}, + title = {Making Geo-Replicated Systems Fast as Possible, + Consistent when Necessary}, + booktitle = {\bibconf[10th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}}, + month = oct, + year = 2012, +} + +@inproceedings{ cheshire97consistent, + author = {Stuart Cheshire and Mary Baker}, + title = "{Consistent Overhead Byte Stuffing}", + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = sep, + year = 1997 +} + +@article{ chlamtac03mobile, + author = {Imrich Chlamtac and Marco Conti and {Jennifer J.-N.} Liu}, + title = {\href{https://www.sciencedirect.com/science/article/abs/pii/S1570870503000131}{Mobile ad hoc networking: imperatives and challenges}}, + journal = {Ad Hoc Networks}, + volume = 1, + number = 1, + month = jul, + year = 2003, + pages = {13-64}, +} + +@inproceedings{choudhury11firehose, + author = {Munmun de Choudhury and Scott Counts and Czerwinski}, + month = {July}, + publisher = {\bibconf{ICWSM}{International AAAI Conference on Weblogs and Social Media}}, + title = {Find Me the Right Content! Diversity-based Sampling of Social Media Content for + Topic-centric Search.}, + year = {2011}, +} + +@inproceedings{chuanxiong08dcell, + author = {Chuanxiong Guo and + Haitao Wu and + Kun Tan and + Lei Shi and + Yongguang Zhang and + Songwu Lu}, + title = {{DCell}: {A} Scalable and Fault-tolerant Network + Structure for Data Centers}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Seattle, WA}, + month = aug, + year = 2008 +} + +@inproceedings{ chun03planetlab, + author = {Brent Chun and others}, + title = {{PlanetLab}: An Overlay Testbed for Broad-Coverage Services}, + booktitle = {ACM \bibbrev{CCR}{Computer Communications Review}}, + month = jul, + year = 2003, +} + +@inproceedings{ clarke00freenet, + author = {Ian Clarke and Oskar Sandberg and Brandon Wiley + and Theodore W. Hong}, + title = {{Freenet}: A Distributed Anonymous Information + Storage and Retrieval System}, + booktitle = {Workshop on Design Issues in + Anonymity and Unobservability}, + month = jul, + year = 2000, + location = {Berkeley, CA, USA}, +} + +@inproceedings{ clark07usability, + author = {Clark, Jeremy and van Oorschot, P. C. and Adams, Carlisle}, + title = {Usability of anonymous web browsing: an examination of Tor interfaces and deployability}, + booktitle = {\bibconf{SOUPS}{Symposium on Usable privacy and security}}, + year = {2007}, +} + +@inproceedings{ cox06bos, + author = {Cox, Richard S. and Gribble, Steven D. and Levy, Henry M. and Hansen, Jacob Gorm}, + title = {A Safety-Oriented Platform for Web Applications}, + booktitle = {IEEE \bibconf{SP}{Security and Privacy}}, + year = {2006}, +} + +@inproceedings{ corrigangibbs10dissent, + author = {Corrigan-Gibbs, Henry and Ford, Bryan}, + title = {{Dissent}: accountable anonymous group messaging}, + booktitle = {\bibconf[17th]{CCS}{ACM Conference on Computer and Communications Security}}, + month = oct, + year = {2010}, +} + +@unpublished{ corrigangibbs10dissenterr1, + author = {Corrigan-Gibbs, Henry and Ford, Bryan}, + title = {Dissent: Accountable Anonymous Group Messaging, Eratum}, + year = {2010}, + note = {\url{http://dedis.cs.yale.edu/2010/anon/papers/ccs10/erratum.pdf}}, +} + +@inproceedings{ corrigangibbs12scavenging, + author = {Corrigan-Gibbs, Henry and Ford, Bryan}, + title = {Scavenging for Anonymity with {BlogDrop} (Abstract)}, + booktitle = {Provable Privacy Workshop}, + month = jul, + year = 2012, + location = {Vigo, Spain}, +} + +@inproceedings{corrigangibbs2014riposte, + title={Riposte: An Anonymous Messaging System Handling Millions of Users}, + author={Corrigan-Gibbs, Henry and Boneh, Dan and Mazieres, David}, + booktitle = {IEEE \bibconf{SP}{Security and Privacy}}, + year={2014} +} + +@article{cutillo09safebook, + title={Safebook: A privacy-preserving online social network leveraging on real-life trust}, + author={Cutillo, Leucio Antonio and Molva, Refik and Strufe, Thorsten}, + journal={Communications Magazine, {IEEE}}, + year={2009}, +} + +%D + +@inproceedings{ danezis03mixminion, + author = {George Danezis and Roger Dingledine and Nick Mathewson}, + title = {{Mixminion}: Design of a {Type III} + Anonymous Remailer Protocol}, + booktitle = {IEEE \bibconf{SP}{Security and Privacy}}, + month = may, + year = 2003, +} + +@article{ dana97global, + author = {Peter H. Dana}, + title = {\href{https://link.springer.com/article/10.1023%2FA%3A1007906014916}{Global Positioning System (GPS) Time Dissemination for Real-Time Applications}}, + journal = {Real Time Systems}, + month = jan, + year = 1997, + volume = 12, + number = 1, + pages = {9-40}, +} + +@article{dean13tail, + title={The tail at scale}, + author={Dean, Jeffrey and Barroso, Luiz Andr{\'e}}, + journal={Communications of the ACM}, + volume={56}, + number={2}, + pages={74--80}, + year={2013}, + publisher={ACM} +} + +@article{ deering90multicast, + author = {Stephen E. Deering and David R. Cheriton}, + title = {\href{http://dl.acm.org/citation.cfm?id=78953}{Multicast Routing in Datagram Internetworks + and Extended {LANs}}}, + journal = {ACM Transactions on Computer Systems}, + month = may, + year = 1990, + volume = 8, + number = 2, + url = {http://dl.acm.org/citation.cfm?id=78953}, +} + +@misc{ deterlab, + key = {DeterLab}, + title = {\href{http://isi.deterlab.net/}{{DeterLab} Network Security Testbed}}, + url = {http://isi.deterlab.net/}, + month = {September}, + year = {2012}, +} + +@book{ dicke92franchising, + author = {Thomas S. Dicke}, + title = {Franchising in America}, + publisher = {University of North Carolina Press}, + year = 1992, +}, + +@inproceedings{ dingledine02reliable, + author = {Roger Dingledine and Paul Syverson}, + title = {Reliable {MIX} Cascade Networks through Reputation}, + booktitle = {Financial Cryptography}, + month = mar, + year = 2002, + location = {Southampton, Bermuda}, +} + +@inproceedings{ dingledine04tor, + author = {Dingledine, Roger and Mathewson, Nick and Syverson, Paul}, + title = {\href{https://dl.acm.org/citation.cfm?id=1251375.1251396}{Tor: + the second-generation onion router}}, + booktitle = {12th USENIX Security Symposium}, + month = aug, + year = {2004}, +} + +@inproceedings{ dingledine04synchronous, + author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson}, + title = {Synchronous Batching: From Cascades to Free Routes}, + booktitle = {\bibbrev{WPET}{Workshop on + Privacy Enhancing Technologies}}, + month = may, + year = 2004, + location = {Toronto, Canada}, +} + +@misc{ dingledine06design, + author = {Roger Dingledine and Nick Mathewson}, + title = {Design of a blocking-resistant anonymity system}, + month = nov, + year = 2006, + note = {Tor Project technical report, + \url{https://svn.torproject.org/svn/projects/design-paper/blocking.html}}, +} + +@misc{ dingledine13guards, + author = {Roger Dingledine}, + note = {\url{https://blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters}}, + year = {2013}, + title = {Improving Tor's anonymity by changing guard parameters}, +} + +@misc{ torproject, + key = {Tor}, + title = {Tor: {A}nonymity {O}nline}, + author = {}, + note = {\url{https://www.torproject.org}} +} + +@misc{ torslow, + title = {Why is {Tor} so slow?}, + author = {}, + note = {\\ \url{https://www.torproject.org/docs/faq.html.en\#WhySlow}} +} + +@misc{ tormetrics, + key = {Tor Metrics Portal}, + title = {Tor Metrics Portal}, + author = {}, + note = {\\ \url{http://metrics.torproject.org/}}, +} + +@inproceedings{ dingledine06blending, + author = {Roger Dingledine and Andrei Serjantov and Paul Syverson}, + title = {Blending different latency traffic with alpha-mixing}, + booktitle = {\bibconf[6th]{WPET}{Workshop on + Privacy Enhancing Technologies}}, + month = jun, + year = 2006, + location = {Cambridge, UK}, +} + +@misc{ dingledine12how, + author = {Roger Dingledine and Jacob Appelbaum}, + title = {How governments have tried to block {Tor}}, + year = 2012, + note = {Tor project presentation, + \url{https://svn.torproject.org/svn/projects/presentations/slides-28c3.pdf}}, +} + +@article{ dolev00xor, + author = {Shlomi Dolev and Rafail Ostrovsky}, + title = {Xor-Trees for Efficient Anonymous Multicast and Reception}, + journal = {\bibbrev{TISSEC}{ACM Transactions on + Information and System Security}}, + month = may, + year = 2000, +} + +@inproceedings{ douceur02sybil, + author = {John R. Douceur}, + title = {\href{http://research.microsoft.com/pubs/74220/IPTPS2002.pdf}{The {Sybil} Attack}}, + booktitle = {\bibconf[1st]{IPTPS}{International Workshop on Peer-to-Peer + Systems}}, + location = {Cambridge, MA}, + month = mar, + year = 2002, + url = {http://research.microsoft.com/pubs/74220/IPTPS2002.pdf}, +} + +@misc{ ducklin09facebook, + author = {Paul Ducklin}, + title = {{Sophos Australia Facebook ID probe 2009}}, + month = dec, + day = 6, + year = 2009, + note = {\url{http://www.sophos.com/blogs/duck/g/2009/12/06/facebook-id-probe-2009/}}, +} + +@inproceedings{ dukkipati05processor, + author = {Nandita Dukkipati and Masayoshi Kobayashi and Rui Zhang-Shen + and Nick McKeown}, + title = {Processor Sharing Flows in the {Internet}}, + booktitle = {\bibbrev{IWQoS}{13th International Workshop on + Quality of Service (IWQoS)}}, + location = {Passau, Germany}, + month = jun, + year = 2005, +} + +@inproceedings{ dukkipati06rcpac, + author = {Nandita Dukkipati and Nick McKeown and Alexander G. Fraser}, + title = {{RCP-AC}: Congestion Control to make flows complete quickly + in any environment}, + booktitle = {High-Speed Networking Workshop: The Terabits Challenge}, + location = {Barcelona, Spain}, + month = apr, + year = 2006, +} + +@inproceedings{dukkipati11proportional, + author = {Nandita Dukkipati and Matt Mathis and + Yuchung Cheng and Monia Ghobadi}, + title = {Proportional Rate Reduction for {TCP}}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = nov, + year = {2011}, + location = {Berlin, Germany}, +} + +%E + +@article{eastlake99domain, + title={Domain name system security extensions}, + author={Eastlake, Donald E and others}, + year={1999} +} + +@inproceedings{ eckersley10browser, + author = {Peter Eckersley}, + title = {How Unique Is Your Web Browser?}, + booktitle = {\bibbrev{PETS}{Privacy-Enhancing + Technologies Symposium}}, + month = jul, + year = 2010, +} + +@inproceedings{ edman09awareness, + author = {Edman, Matthew and Syverson, Paul}, + title = {As-awareness in Tor path selection}, + booktitle = {\bibconf{CCS}{ACM conference on Computer and communications security}}, + year = {2009}, +} + +@inproceedings{ ekwall02robust, + author = {Richard Ekwall and Peter Urban and Andre Schiper}, + title = "{Robust TCP Connections for Fault Tolerant Computing}", + booktitle = "{International Conference on Parallel and Distributed Systems (ICPADS)}", + location = {Taiwan}, + month = dec, + year = 2002, +} + +@incollection{ elgamal85public, + author = {Taher ElGamal}, + title = {A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms}, + booktitle = {Advances in Cryptology}, + series = {Lecture Notes in Computer Science}, + editor = {Blakley, George and Chaum, David}, + publisher = {Springer Berlin / Heidelberg}, + url = {http://dx.doi.org/10.1007/3-540-39568-7_2}, + year = {1985} +} + +@inproceedings{elahi12guards, + author = {Elahi, Tariq and Bauer, Kevin and AlSabah, Mashael and Dingledine, Roger and Goldberg, Ian}, + title = {Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the Electronic Society}}, + year = {2012}, +} + +@misc{ emulab, + key = {Emulab}, + title = {Emulab Network Emulation Testbed}, + note = {\url{http://emulab.net/}}, + year = {2012}, + month = {September} +} + +@misc{ erratasec12lulzsec, + author = {Errata Security}, + title = {Notes on {Sabu} arrest}, + year = {2012}, + month = march, + note = {\url{http://blog.erratasec.com/2012/03/notes-on-sabu-arrest.html}}, +} + +@article{ethereum18shardingspec, + author = {}, + title = {\href{https://github.com/ethereum/sharding/blob/develop/docs/doc.md#validator-manager-contract-vmc}{Ethereum's Sharding Specification}}, + year={2018} +} + +@misc{evdokimov_redsocks, + author = {Leonid Evdokimov}, + title = {{redsocks - transparent socks redirector}}, + note = {\url{http://darkk.net.ru/redsocks/}}, +} + +@misc{ ewasm, + key = {ewasm}, + title = {\href{https://github.com/ewasm/design}{Ethereum flavored WebAssembly (ewasm)}}, + note = {\url{https://github.com/ewasm/design}}, +} + +%F + +@inproceedings{ fall03delay, + author = {Kevin Fall}, + title = {A Delay-Tolerant Network Architecture + for Challenged {Internets}}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2003, + location = {Karlsruhe, Germany}, +} + +@misc{ feigenbaum06portia, + author = {J. Feigenbaum and D. J. {Weitzner, eds.}}, + title = {Report on the 2006 {PORTIA/TAMI} Workshop + on Privacy and Accountability}, + month = jun, + year = 2006, +} + +@misc{ feigenbaum06report, + author = {Joan Feigenbaum and Daniel J. Weitzner}, + title = {Report on the 2006 {PORTIA/TAMI} Workshop + on Privacy and Accountability}, + month = jun, + year = 2006, + note = {\url{http://dig.csail.mit.edu/2006/tami-portia-accountability-ws/summary}}, +} + +@inproceedings{ feigenbaum07probabilistic, + author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson}, + title = {Probabilistic Analysis of Onion Routing in a Black-box Model}, + booktitle = {\bibconf[6th]{WPES}{Workshop on Privacy + in the Electronic Society}}, + location = {Alexandria, VA}, + month = oct, + year = 2007, +} + +@inproceedings{ feigenbaum07model, + author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson}, + title = {A Model of Onion Routing with Provable Anonymity}, + booktitle = {Financial Cryptography}, + month = feb, + year = 2007, +} + +@inproceedings{ feigenbaum10preventing, + author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson}, + title = {Preventing Active Timing Attacks in + Low-Latency Anonymous Communication (Extended Abstract)}, + booktitle = {10th \bibbrev{PETS}{Privacy-Enhancing + Technologies Symposium}}, + month = jul, + year = 2010, + note = {See also UT Austin CS Department TR 1965}, +} + +@article{ feigenbaum12probabilistic, + author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson}, + title = {Probabilistic Analysis of Onion Routing in a Black-Box Model}, + journal = {\bibconf{TISSEC}{ACM Transactions on Information and System Security}}, + month = nov, + year = 2012, +} + +@inproceedings{ felt17measuring, + author = {Adrienne Porter Felt and Richard Barnes and April King and Chris + Palmer and Chris Bentzel and Parisa Tabriz}, + title = + {\href{https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/felt}{Measuring + {HTTPS} Adoption on the Web}}, + booktitle = {{USENIX} Security Symposium}, + month = aug, + year = {2017}, + pages = {1323--1338} +} + +@inproceedings{ fidge88timestamps, + title={\href{https://zoo.cs.yale.edu/classes/cs426/2012/lab/bib/fidge88timestamps.pdf}{Timestamps in Message-Passing Systems That Preserve the Partial Ordering}}, + author={Colin J. Fidge}, + booktitle = {11th \bibbrev{ACSC}{Australian Computer Science Conference}}, + year={1988} +} + +@inproceedings{ fifield12evading, + title = {Evading censorship with browser-based proxies}, + author = {Fifield, David and Hardison, Nate and + Ellithorpe, Jonathan and Stark, Emily and + Boneh, Dan and Dingledine, Roger and Porras, Phil}, + booktitle = {12th \bibbrev{PETS}{Privacy Enhancing Technologies Symposium}}, + year = {2012}, +} + +@article{fitzpatrick04memcached, + title = {Distributed Caching with Memcached}, + author = {Brad Fitzpatrick}, + journal = {Linux Journal}, + year = {2004}, + month = aug, + note = {http://www.linuxjournal.com/article/7451}, +} + +@inproceedings{flach13reducing, + author = {Tobias Flach and Nandita Dukkipati and + Andreas Terzis and Barath Raghavan and + Neal Cardwell and Yuchung Cheng and + Ankur Jain and Shuai Hao and + Ethan Katz-Bassett and Ramesh Govindan}, + title = {Reducing Web Latency: the Virtue of Gentle Aggression}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + year = {2013}, + month = aug, + location = {Hong Kong, China}, +} + +@inproceedings{ ford07structured, + title = {Structured Streams: a New Transport Abstraction}, + author = {Bryan Ford}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + year = {2007}, + month = aug, + location = {Kyoto, Japan}, +} + +@inproceedings{ ford08breaking, + author = {Bryan Ford and Janardhan Iyengar}, + title = {Breaking Up the Transport Logjam}, + booktitle = {\bibbrev{HotNets-VII}{7th Workshop + on Hot Topics in Networks (HotNets-VII)}}, + location = {Calgary, Alberta, Canada}, + month = oct, + day = 6, + year = 2008, +} + +@inproceedings{ ford09efficient, + author = {Bryan Ford and Janardhan Iyengar}, + title = {Efficient Cross-Layer Negotiation}, + booktitle = {\bibbrev{HotNets-VIII}{8th Workshop + on Hot Topics in Networks (HotNets-VIII)}}, + location = {New York City, NY}, + month = oct, + day = 22, + year = 2009, +} + +@misc{ ford09flow, + author = {Janardhan Iyengar and Bryan Ford}, + title = {Flow Splitting with Fate Sharing in a + Next Generation Transport Services Architecture}, + month = dec, + year = 2009, + note = {\url{http://arxiv.org/abs/0912.0921}}, +} + +@inproceedings{freedman02tarzan, + title = {Tarzan: A peer-to-peer anonymizing network layer}, + author = {Freedman, Michael J. and Morris, Robert}, + booktitle = {\bibconf[9th]{CCS}{ACM Conference on Computer and Communications Security}}, + year = {2002} +} + +@inproceedings{freedman04coral, + author = {Michael J. Freedman and Eric Freudenthal and David Mazi\`{e}res}, + title = {Democratizing Content Publication with {C}oral}, + booktitle = {\bibconf[1st]{NSDI}{USENIX Symposium on Networked System + Design and Implementation}}, + location = {San Francisco, CA}, + month = mar, + year = 2004 +} + +@inproceedings{ fujisaki07traceable, + author = {Eiichiro Fujisaki and Koutarou Suzuki}, + title = {Traceable Ring Signature}, + booktitle = {\bibconf[10th]{PKC}{International Conference on + Theory and Practice of Public Key Cryptography}}, + month = apr, + year = 2007, + location = {Beijing, China}, +} + +@inproceedings{ furukawa01efficient, + author = {Jun Furukawa and + Kazue Sako}, + title = {An Efficient Scheme for Proving a Shuffle}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + location = {Santa Barbara, CA}, + month = aug, + year = 2001 +} + +%G + +@inproceedings{gedik05location, + author={Gedik, B. and Ling Liu}, + booktitle={IEEE \bibconf{ICDCS}{International Conference on Distributed Computing Systems}}, + title={Location Privacy in Mobile Systems: A Personalized Anonymization Model}, + year={2005}, + month={june}, +} + +@article{gettys11bufferbloat, + title = {{Bufferbloat}: Dark Buffers in the Internet}, + author = {Jim Gettys and Kathleen Nichols}, + journal = {{ACM} queue}, + year = {2011}, + month = nov, + note = {http://queue.acm.org/detail.cfm?id=2071893}, +} + +@inproceedings{ ghinita07prive, + author = {Ghinita, Gabriel and Kalnis, Panos and Skiadopoulos, Spiros}, + title = {{PRIVE}: anonymous location-based queries in distributed mobile systems}, + booktitle = {\bibconf[16th]{WWW}{International + World Wide Web Conference}}, + month = may, + year = {2007}, + location = {Banff, Alberta, Canada}, +} + +@inproceedings{ ghobadi12trickle, + author = {Monia Ghobadi and Yuchung Cheng and + Ankur Jain and Matt Mathis}, + title = {{Trickle}: Rate Limiting {YouTube} Video Streaming}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = {2012}, + location ={Boston, MA}, +} + +@inproceedings{gill11understanding, + author = {Phillipa Gill and + Navendu Jain and + Nachiappan Nagappan}, + title = {Understanding Network Failures in Data Centers: + {M}easurement, Analysis, and Implications}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Toronto, Canada}, + month = aug, + year = 2011 +} + + +@inproceedings{ goel02supporting, + author = {Ashvin Goel and Charles Krasic and Kang Li + and Jonathan Walpole}, + title = {Supporting low latency {TCP}-based media streams}, + booktitle = {\bibconf[10th]{IWQoS}{International Workshop + on Quality of Service}}, + month = may, + year = 2002, + location = {Miami Beach, FL}, +} + +@techreport{ goel03herbivore, + title = {{Herbivore}: A Scalable and Efficient Protocol for Anonymous Communication}, + author = {Sharad Goel and Mark Robson and Milo Polte and Emin Gun Sirer}, + institution = {Cornell University}, + number = {2003-1890}, + year = {2003}, + month = {February}, + www_pdf_url = {http://www.cs.cornell.edu/People/egs/papers/herbivore-tr.pdf}, +} + +@article{ goldschlag99onion, + author = {David Goldschlag and Michael Reed and Paul Syverson}, + title = {Onion Routing for Anonymous and Private Internet Connections}, + journal = {Communications of the ACM}, + month = feb, + year = 1999, + volume = 42, + number = 2, +} + +@article{ golijan12privacy, + author = {Rosa Golijan}, + title = {Consumer {Reports}: {Facebook} privacy problems are on the rise}, + year = {2012}, + month = may, + howpublished = {\url{http://www.nbcnews.com/technology/consumer-reports-facebook-privacy-problems-are-rise-749990}}, +} + +@inproceedings{ gollakota08zigzag, + author = {Shyamnath Gollakota and Dina Katabi}, + title = {ZigZag Decoding: Combating Hidden Terminals + in Wireless Networks}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2008, + location = {Seattle, WA}, +} + +@inproceedings{ golle04dining, + author = {Philippe Golle and + Ari Juels}, + title = {Dining Cryptographers Revisited}, + booktitle = {\bibconf{EUROCRYPT}{International Conference on Theory and + Applications of Cryptographic Techniques}}, + location = {Interlaken, Switzerland}, + month = may, + year = 2004 +} + +@inproceedings{ gopal11torchestra, + author = {Gopal, Deepika and Heninger, Nadia}, + title = {Torchestra: reducing interactive traffic delays over {Tor}}, + booktitle = {\bibconf{WPES}{Workshop on + Privacy in the Electronic Society}}, + month = oct, + year = {2012}, + location = {Raleigh, NC}, +} + +@article{ griffin02stable, + author = {Timothy G. Griffin and F. Bruce Shepherd and Gordon Wilfong}, + title = {The Stable Paths Problem and Interdomain Routing}, + journal = {Transactions on Networking}, + volume = 10, + number = 2, + month = apr, + year = 2002, +} + +@inproceedings{ guha08noyb, + title={NOYB: Privacy in online social networks}, + author={Guha, Saikat and Tang, Kevin and Francis, Paul}, + booktitle={\bibconf{WOSN}{Workshop on Online social networks}}, + year={2008}, +} + +@inproceedings{gunawi04deploying, + author = {Gunawi, Haryadi S. and Arpaci-Dusseau, Andrea C. and Arpaci-Dusseau, Remzi H.}, + title = "{Deploying Safe User-Level Network Services With icTCP}", + booktitle = {OSDI 04}, + year = {2004}, + publisher = {USENIX Association}, + address = {Berkeley, CA, USA}, + } + +@inproceedings{guo06delving, + author = {Lei Guo and Enhua Tan and Songqing Chen and Zhen Xiao and Oliver Spatscheck and Xiaodong Zhang}, + title = {Delving into {Internet} Streaming Media Delivery: a Quality and Resource Utilization Perspective}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = {2006}, + location = {Rio de Janeiro, Brazil}, +} + +%H + +@article{ha08cubic, + author = {Sangtae Ha and Injong Rhee and Lisong Xu}, + title = {{CUBIC}: a new {TCP}-friendly high-speed {TCP} variant}, + journal = {\bibbrev{ACM SIGOPS} Operating Systems Review}, + volume = {42}, + number = {5}, + year = {2008}, + month = jul, +} + +@inproceedings{ haeberlen09netreview, + author = {Andreas Haeberlen and Ioannis Avramopoulos and + Jennifer Rexford and Peter Druschel}, + title = {{NetReview}: Detecting when interdomain routing goes wrong}, + booktitle = {6th Symposium on Networked Systems Design + and Implementation (NSDI '09)}, + month = apr, + year = 2009, + location = {Boston, MA}, +} + +@inproceedings{ han13expressive, + author = {Seungyeop Han and Vincent Liu and Qifan Pu + and Simon Peter and Thomas Anderson and Arvind Krishnamurthy + and David Wetherall}, + title = {Expressive Privacy Control with Pseudonyms}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2013, + location = {Hong Kong}, +} + +@inproceedings{handley01network, + author = {Handley, Mark and Paxson, Vern and Kreibich, Christian}, + title = "{Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-end Protocol Semantics}", + booktitle = {SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium}, + year = {2001}, + } + +@article{handley06why, + author = {Handley, M.}, + title = "{Why the Internet only just works}", + journal = {BT Technology Journal}, + year = {2006}, + doi = {http://dx.doi.org/10.1007/s10550-006-0084-z}, + publisher = {Kluwer Academic Publishers}, + address = {Hingham, MA, USA}, + } + +@ARTICLE{Hei07IPTV, + author = {X. Hei and others}, + title = {A Measurement Study of a Large-Scale P2P IPTV System}, + journal = {IEEE Transactions on Multimedia}, + year = {2007}, +} + +@article{ honda05understanding, + author = {Osamu Honda and Hiroyuki Ohsaki and Makoto Imase + and Mika Ishizuka and Junichi Murayama}, + journal = {Proceedings of SPIE}, + volume = 6011, + pages = {138-146}, + year = 2005, +} + +@inproceedings{ honda11possible, + author = {Michio Honda and Yoshifumi Nishida and Costin Raiciu + and Adam Greenhalgh and Mark Handley and Hideyuki Tokuda}, + title = {Is it Still Possible to Extend {TCP}?}, + booktitle = {\bibbrev{IMC}{Internet Measurement Conference}}, + month = nov, + year = 2011, + location = {Berlin, Germany}, +} + +@inproceedings{ hopper07how, + author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin}, + title = {How Much Anonymity does Network Latency Leak?}, + booktitle = {\bibconf{CCS}{ACM Conference on + Computer and Communications Security}}, + month = oct, + year = 2007, +} + +@inproceedings{ hsiao12lap, + title={{LAP}: Lightweight anonymity and privacy}, + author = {Hsiao, Hsu-Chun and Kim, Tiffany Hyun-Jin and Perrig, Adrian + and Yamada, Akira and Nelson, Samuel C. and Gruteser, Marco and Meng, Wei}, + booktitle = {IEEE \bibconf{SP}{Security and Privacy}}, + pages = {506--520}, + year = {2012}, +} + +@INPROCEEDINGS{Huang08challenges, + author = {Yan Huang and others}, + title = {Challenges, Design and Analysis of a Large-scale P2P VoD + System}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + year = {2008} +} + +%I +@misc{ i2p, + title = {Invisible Internet Project (I2P)}, + note = {\url{http://geti2p.net/en}}, + year = 2015, + month = jan +} + +@inproceedings{ iyengar10minion, + author = {Janardhan Iyengar and Bryan Ford and Dishant Ailawadi and Syed Obaid Amin and Michael Nowlan and Nabin Tiwari and Jeff Wise}, + title = {Minion---an All-Terrain Packet Packhorse to Jump-Start Stalled Internet Transports}, + booktitle = {PFLDNeT 2010}, + month = nov, + year = 2010 +} + +% author = {Janardhan Iyengar and others}, +@inproceedings{ iyengar12minion, + author = {Michael F. Nowlan and Nabin Tiwari and + Janardhan Iyengar and Syed Obaid Amin and Bryan Ford}, + title = {Fitting Square Pegs Through Round Pipes: + Unordered Delivery Wire-Compatible with {TCP} and {TLS}}, + month = apr, + year = {2012} +} + +% XXX full version (currently arxiv/TR, maybe journal in future?) +% author = {Janardhan Iyengar and others}, +@misc{ iyengar12minion-full, + author = {Janardhan Iyengar and Syed Obaid Amin and + Michael F. Nowlan and Nabin Tiwari and Bryan Ford}, + title = {Minion: Unordered Delivery Wire-Compatible with {TCP} and {TLS} + (Full Version)}, + month = apr, + year = 2012, + note = {Technical Report. \texttt{arXiv:1103.0463}} +} + +@misc{ itu01pesq, + author = {\abbr{ITU}{International Telecommunication Union}}, + title = {P.862: Perceptual evaluation of speech quality {(PESQ)}}, + month = feb, + year = 2001, +} + +@misc{ itu03transtime, + author = {\abbr{ITU}{International Telecommunication Union}}, + title = {Recommendation {G.114}: One-way Transmission Time}, + month = may, + year = 2003, +} + +@misc{ itu05impl, + author = {ITU-T Telecommunication Standardization Sector of ITU}, + title = {Recommendation P.862 (2001) Amendment 2 (11/05) reference + implementation and conformance testing}, + month = nov, + year = 2005, + note = {\url{http://www.itu.int/rec/T-REC-P.862-200511-I!Amd2/en}} +} + +@misc{ itu07wideband, + author = {ITU-T Telecommunication Standardization Sector of ITU}, + title = {Wideband extension to Recommendation P.862 for the + assessment of wideband telephone networks and + speech codecs}, + month = nov, + year = 2007, + url = {http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-P.862.2-200711-I!!PDF-E&type=items} +} + +@inproceedings{ iwanik04duo, + author = {Jan Iwanik and Marek Klonowski and Miroslaw Kutylowski}, + title = {{DUO-Onions} and {Hydra-Onions} -- + failure and adversary resistant onion protocols}, + booktitle = {\bibbrev{IFIP CMS}{IFIP TC-6 TC-11 Conference on + Communications and Multimedia Security}}, + month = sep, + year = 2004, +}, + +%J + +@inproceedings{jahid11easier, + title={{EASiER}: Encryption-based access control in social networks with efficient revocation}, + author={Jahid, Sonia and Mittal, Prateek and Borisov, Nikita}, + booktitle={\bibconf{ASIACCS}{ACM Symposium on Information, Computer and Communications Security}}, + year={2011}, +} + +@inproceedings{ jones11hiding, + author = {Nicholas Jones and Matvey Arye and Jacopo Cesareo + and Michael J. Freedman}, + title = {Hiding Amongst the Clouds: + A Proposal for Cloud-based Onion Routing}, + booktitle = {\bibconf{FOCI}{Workshop on Free and Open Communications + on the Internet}}, + month = aug, + year = 2011, + location = {San Francisco, CA}, +} + +%K + + +@book{kaminow97optical, + title={Optical Fiber Telecommunications IIIA}, + author={Kaminow, Ivan P and Koch, Thomas L}, + year={1997}, + publisher={Academic Press, New York} +} + + +@misc{kamkar10evercookie, + author = {Samy Kamkar}, + year = {2010}, + howpublished = {\url{http://http://samy.pl/evercookie/}}, + month = {oct}, + title = {evercookie}, +} + +@inproceedings{kandula05shrink, + author = {Srikanth Kandula and + Dina Katabi and + Jean-Philippe Vasseur}, + title = {Shrink: {A} Tool for Failure Diagnosis in {IP} Networks}, + booktitle = {MineNet}, + location = {Philadephia, PA}, + month = aug, + year = 2005 +} + +@inproceedings{kandula09detailed, + author = {Srikanth Kandula and + Ratul Mahajan and + Patrick Verkaik and + Sharad Agarwal and + Jitendra Padhye and + Paramvir Bahl}, + title = {Detailed Diagnosis in Enterprise Networks}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Barcelona, Spain}, + month = aug, + year = 2009 +} + +@inproceedings{ karlin11decoy, + author = {Josh Karlin and others}, + title = {Decoy Routing: Toward Unblockable Internet Communication}, + booktitle = {\bibconf{FOCI}{Workshop on Free and Open Communications + on the Internet}}, + month = aug, + year = 2011, + location = {San Francisco, CA}, +} + +@inproceedings{katz06towards, + author = {Ethan Katz-Bassett and John P. John and Arvind Krishnamurthy + and David Wetherall and Thomas Anderson and Yatin Chawathe}, + title = {Towards {IP} Geolocation using delay and topology measurements}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = {2006}, + location = {Rio de Janeiro, Brazil}, +} + +@article{kobeissi13cryptocat, + author = {Nadim Kobeissi and Arlo Breault}, + title = {Cryptocat: Adopting Accessibility and Ease of Use as Security Properties}, + journal = {CoRR}, + url = {\url{http://arxiv.org/abs/1306.5156}}, +} + +@inproceedings{kompella05ip, + author = {Ramana Rao Kompella and + Jennifer Yates and + Albert G. Greenberg and + Alex C. Snoeren}, + title = {{IP} Fault Localization Via Risk Modeling}, + booktitle = {\bibconf[2nd]{NSDI}{USENIX Symposium on Networked System + Design and Implementation}}, + location = {Boston, MA}, + month = may, + year = 2005 +} + + +@incollection{ kontaxis11sudoweb, + title={{SudoWeb}: Minimizing information disclosure to third parties in single sign-on platforms}, + author={Kontaxis, Georgios and Polychronakis, Michalis and Markatos, Evangelos P}, + booktitle={\bibconf{ISC}{Information Security Conference}}, + year={2011}, +} + +@inproceedings{ kumar10characterization, + author = {Kumar, Ravi and Tomkins, Andrew}, + title = {A characterization of online browsing behavior}, + booktitle = {\bibconf[19th]{WWW}{International Conference on {World} {Wide} {Web}}}, + year = {2010}, + pages = {561--570}, +} + +@article{ kung95credit , + author = {Kung, N.T. and Morris, R.}, + journal = {Network, IEEE}, + title = {Credit-based flow control for ATM networks}, + year = {1995}, + month = {mar/apr}, + volume = {9}, + number = {2}, + pages = {40 -48}, + doi = {10.1109/65.372658}, + issn={0890-8044}, +} + +%L + +@article{ lamport98parttime, + author = {Leslie Lamport}, + title = {\href{https://dl.acm.org/citation.cfm?id=279229}{The Part-Time Parliament}}, + journal = {ACM Transactions on Computer Systems}, + volume = 16, + number = 2, + month = may, + year = 1989, + pages = {133-169}, +} + +@misc{ leblond10deanonymizing, + author = {Stevens Le Blond and Pere Manils and Abdelberi Chaabane + and Mohamed Ali Kaafar and Arnaud Legout + and Claude Castellucia and Walid Dabbous}, + title = {De-anonymizing {BitTorrent} Users on {Tor}}, + month = apr, + day = 8, + year = 2010, + note = {\url{http://arxiv.org/abs/1004.1267}}, +} + +@inproceedings{ leblond13anon, + author = {Le Blond, Stevens and Choffnes, David and Zhou, Wenxuan + and Druschel, Peter and Ballani, Hitesh and Francis, Paul}, + title = {Towards Efficient Traffic-analysis Resistant + Anonymity Networks}, + booktitle = {{ACM} {SIGCOMM}}, + year = {2013}, + month = {August}, +} + +@misc{ leger13silkroad, + author = {Donna Leinwand Leger}, + title = {How FBI brought down cyer-underworld site Silk Road}, + year = {2013}, + note = {\url{http://www.usatoday.com/story/news/nation/2013/10/21/fbi-cracks-silk-road/2984921/}}, +} + +@article{lelewer87data, + author = {Lelewer, Debra A. and Hirschberg, Daniel S.}, + title = {Data compression}, + journal = {ACM Computing Surveys}, + volume = {19}, + issue = {3}, + month = {September}, + year = {1987}, + pages = {261-296}, + url = {http://doi.acm.org/10.1145/45072.45074}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@incollection{levine04timing, + author = {Levine, Brian and Reiter, Michael and Wang, Chenxi and Wright, Matthew}, + title = {Timing Attacks in Low-Latency Mix Systems}, + booktitle = {Financial Cryptography}, + pages = {251-265}, + year = {2004} +} + +@inproceedings{levin09trinc, + title={{TrInc}: Small Trusted Hardware for Large Distributed Systems.}, + author={Levin, Dave and Douceur, John R and Lorch, Jacob R and Moscibroda, Thomas}, + booktitle={NSDI}, + year={2009} +} + +@article{ lewandowski91gps, + author = {Wlodzimierz Lewandowski and Claudine Thomas}, + title = {\href{https://ieeexplore.ieee.org/document/84976/authors#authors}{GPS Time Transfer}}, + journal = {Proceedings of the IEEE}, + volume = 79, + number = 7, + month = jul, + year = 1991, + pages = {991-1000}, +} + +@inproceedings{li13efficient, + author = {Zhenhua Li and Christo Wilson and Zhefu Jiang and Yao Liu and + Ben Y. Zhao and Cheng Jin and Zhi-Li Zhang and Yafei Dai}, + title = {Efficient Batched Synchronization in {D}ropbox-like + Cloud Storage Services}, + booktitle = {\bibconf[14th]{Middleware}{ACM/IFIP/USENIX International + Middleware Conference}}, + location = {Beijing, China}, + month = dec, + year = 2013 +} + +@inproceedings{li14network, + author = {Zhenhua Li and + Cheng Jin and + Tianyin Xu and + Christo Wilson and + Yao Liu and + Linsong Cheng and + Yunhao Liu and + Yafei Dai and + Zhi-Li Zhang}, + title = {Towards Network-level Efficiency for Cloud Storage + Services}, + booktitle = {\bibconf[14th]{IMC}{ACM Internet Measurement Conference}}, + location = {Vancouver, Canada}, + month = nov, + year = 2014 +} + + +@inproceedings{ liu04linkable, + author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong}, + title = {Linkable Spontaneous Anonymous Group Signature + for Ad Hoc Groups}, + booktitle = {Australian Conference on + Information Security and Privacy}, + month = jul, + year = 2004, + location = {Sydney, Australia}, + pages = {614--623}, +} + +@inproceedings{liu13f10, + author = {Vincent Liu and + Daniel Halperin and + Arvind Krishnamurthy and + Thomas Anderson}, + title = {{F10}: {A} Fault-Tolerant Engineered Network}, + booktitle = {\bibconf[10th]{NSDI}{USENIX Symposium on Networked Systems + Design and Implementation}}, + location = {Lombard, IL}, + month = apr, + year = 2013 +} + +@misc{ lombardi02nist, + author = {Michael A. Lombardi}, + title = {\href{http://tf.nist.gov/general/pdf/1383.pdf}{NIST Time and Frequency Services}}, + note = {NIST Special Publication 432}, + month = jan, + year = 2002, +} + +@inproceedings{ lumezanu09triangle, + author = {Cristian Lumezanu and Randy Baden and Neil Spring + and Bobby Bhattacharjee}, + title = {Triangle Inequality and Routing Policy Violations + in the {Internet}}, + booktitle = {\bibconf{PAM}{Passive and Active Measurement Conference}}, + month = apr, + year = 2009, + location = {Seoul, South Korea}, +} + +@inproceedings{ lv02search, + author = {Qin Lv and Pei Cao and Edith Cohen and + Kai Li and Scott Shenker}, + booktitle = {\bibconf[16th]{ICS}{International Conference on Supercompiting}}, + month = jun, + year = 2002, + location = {New York City, NY}, +} + + +%M + +@inproceedings{madhyastha06iplane, + author = {Harsha V. Madhyastha and Tomas Isdal and Michael Poatek and Colin Dixon and Tomas E. Anderson and Vrvind Krishnamurthy and Arun Venkataramani}, + title = {{iPlane}:An information plane for distributed services}, + booktitle = {OSDI}, + year = 2006 +} + +@inproceedings{ maganis12opaak, + title={Opaak: using mobile phones to limit anonymous identities online}, + author={Maganis, Gabriel and Shi, Elaine and Chen, Hao and Song, Dawn}, + booktitle={\bibconf{MobiSys}{Conference on Mobile systems, applications, and services}}, + year={2012}, +} + +@article{marko10using, + author = {Kurt Marko}, + title = "{Using SSL Proxies To Block Unauthorized SSL VPNs}", + journal = {Processor Magazine, www.processor.com}, + volume = 32, + number = 16, + month = jul, + year = 2010, + pages = {23} +} + +@article{mckeown08openflow, + author = {Nick McKeown and Tom Anderson and Hari Balakrishnan and + Guru Parulkar and Larry Peterson and Jennifer Rexford + and Scott Shenker and Jonathan Turner}, + title = {{OpenFlow}: Enabling Innovation in Campus Networks}, + journal = {ACM SIGCOMM Computer Communication Review}, + volume = 38, + number = 2, + pages = {69-74}, + year = 2008, +} + +@article{ meushaw00nettop, + author = {Robert Meushaw and Donald Simard}, + title = {{NetTop}: Commercial Technology in High Assurance Applications}, + journal = {Tech Trend Notes}, + year = 2000, +} + +@inproceedings{michalakis07ensuring, + title={Ensuring content integrity for untrusted peer-to-peer content distribution networks}, + author={Michalakis, Nikolaos and Soul{\'e}, Robert and Grimm, Robert}, + booktitle={Proceedings of the 4th USENIX conference on Networked systems design \& implementation}, + pages={11--11}, + year={2007}, + organization={USENIX Association} +} + + +@article{ mills91internet, + author = {David L. Mills}, + title = {\href{https://ieeexplore.ieee.org/document/103043}{Internet Time Synchronization: The Network Time Protocol}}, + journal = {IEEE Transactions on Communications}, + volume = 39, + number = 10, + month = oct, + year = 1991, + pages = {1482-1493}, +} + +@inproceedings{ mislove04ap3, + author = {Alan Mislove and Gaurav Oberoi and Ansley Post + and Charles Reis and Peter Druschel and Dan S. Wallach}, + title = {{AP3}: Cooperative, decentralized anonymous communication}, + booktitle = {\bibconf{SIGOPS EW}{ACM SIGOPS European Workshop}}, + month = sep, + year = 2004, + location = {Leuven, Belgium}, +} + +@inproceedings{ mislove07measurement, + author = {Alan Mislove and Massimiliano Marcon and Krishna P. Gummadi + and Peter Druschel and Bobby Bhattacharjee}, + title = {Measurement and Analysis of Online Social Networks}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = 2007, + location = {San Diego, USA}, +} + +@inproceedings{ mittal11stealthy, + author = {Prateek Mittal and Ahmed Khurshid and Joshua Juen + and Matthew Caesar and Nikita Borisov}, + title = {Stealthy Traffic Analysis of Low-Latency + Anonymous Communication Using Throughput Fingerprinting}, + booktitle = {\bibconf[18th]{CCS}{ACM Conference on + Computer and Communications Security}}, + month = oct, + year = 2011, + location = {Chicago, IL}, +} + +@inproceedings{ mockapetris88development, + author = {Paul V. Mockapetris and Kevin J. Dunlap}, + title = {\href{http://www.dtic.mil/dtic/tr/fulltext/u2/a203901.pdf}{Development of the Domain Name System}}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1988, + location = {Stanford, CA}, +} + +@inproceedings{moghaddam12skypemorph, + title = {{SkypeMorph}: Protocol obfuscation for {Tor} bridges}, + author = {Mohajeri Moghaddam, Hooman and Li, Baiyu and + Derakhshani, Mohammad and Goldberg, Ian}, + booktitle = {\bibconf[19th]{CCS}{ACM Conference on + Computer and Communications Security}}, + location = {Raleigh, NC}, + month = oct, + year = 2012 +} + +@inproceedings{ mogul03tcp, + author = {Jeff Mogul}, + title = "{TCP} Offload is a Dumb Idea Whose Time Has Come", + booktitle = {HotOS IX}, + month = may, + year = 2003 +} + +@inproceedings{ molteni02using, + author = {M. Molteni and M. Villari}, + title = "{Using SCTP with Partial Reliability for MPEG-4 Multimedia Streaming}", + booktitle = {BSDCon Europe}, + month = oct, + year = 2002 +} + +@inproceedings{moreno09elastic, + author = {Moreno-Vozmediano, Rafael and Montero, Ruben S. and Llorente, Ignacio M.}, + title = {Elastic Management of Cluster-based Services in the Cloud}, + booktitle = {Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds}, + series = {ACDC '09}, + year = {2009}, + isbn = {978-1-60558-585-7}, + location = {Barcelona, Spain}, + pages = {19--24}, + numpages = {6}, + url = {http://doi.acm.org/10.1145/1555271.1555277}, + doi = {10.1145/1555271.1555277}, + acmid = {1555277}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {cloud computing, cluster-based services, virtualization}, +} + +@article{muller, + author = {N.J. Muller}, + title = {Managing Service Level Agreements}, + journal = {International Journal of Network Management}, + volume = {9}, + number = {3}, + year = {1999}, + pages = {155-166}, + publisher = {John Wiley & Sons}, + address = {New York, NY, USA}, +} + +@inproceedings{ murdoch05low, + author = {Steven J. Murdoch and George Danezis}, + title = {Low-Cost Traffic Analysis of {Tor}}, + booktitle = {IEEE \bibconf{SP}{Security and Privacy}}, + month = may, + year = 2005, +} + +@techreport{ murdoch11comparison, + author = {Steven J. Murdoch}, + title = {Comparison of {Tor} Datagram Designs}, + institution = {The Tor Project}, + number = {2011-11-001}, + year = {2011}, + month = {November}, + url = {https://research.torproject.org/techreports/datagram-comparison-2011-11-07.pdf} +} + +@inproceedings{mysore09portland, + author = {Radhika Niranjan Mysore and + Andreas Pamboris and + Nathan Farrington and + Nelson Huang and + Pardis Miri and + Sivasankar Radhakrishnan and + Vikram Subramanya and + Amin Vahdat}, + title = {{PortLand}: {A} Scalable Fault-tolerant Layer 2 Data Center + Network Fabric}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {arcelona, Spain}, + month = aug, + year = 2009 +} + + +%N + +% author = {Preethi Natarajan and Janardhan R. Iyengar and +% Paul. D. Amer and Randall Stewart}, +@inproceedings{ natarajan06sctp, + author = {Preethi Natarajan and others}, + title = {{SCTP}: An innovative transport layer protocol + for the {Web}}, + booktitle = {\bibconf[15th]{WWW}{World Wide Web Conference}}, + location = {Edinburgh, Scotland}, + month = may, + year = 2006, +} + +@inproceedings{natarajan12nsdminer, + author = {Arun Natarajan and Peng Ning and Yao Liu and + Sushil Jajodia and Steve E. Hutchinson}, + title = {{NSDMiner}: {A}utomated discovery of network + service dependencies}, + booktitle = {\bibconf[31st]{INFOCOM}{IEEE INFOCOM}}, + location = {Orlando, FL}, + month = mar, + year = 2012 +} + +@inproceedings{neff01verifiable, + author = {Neff, C. Andrew}, + title = {A verifiable secret shuffle and its application to e-voting}, + booktitle = {\bibconf[8th]{CCS}{ACM Conference on + Computer and Communications Security}}, + pages={116--125}, + month = nov, + year = {2001}, +} + +@article{nichols12controlling, + title = {Controlling queue delay}, + author = {Kathleen Nichols and Van Jacobson}, + journal = {{ACM} queue}, + year = {2012}, + month = may, + note = {http://queue.acm.org/detail.cfm?id=2209336}, +} + +@inproceedings{nobori14vpn, + title={{VPN} {Gate}: A Volunteer-Organized Public {VPN} Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls}, + author={Nobori, Daiyuu and Shinjo, Yasushi}, + booktitle={\bibconf{NSDI}{Symposium on Networked Systems Design and Implementation}}, +} + +@book{ northcutt05inside, + author = {Stephen Northcutt and Lenny Zeltser and Scott Winters and Karen Kent and Ronald Ritchey}, + title = {Inside Network Perimeter Security}, + publisher = {SAMS Publishing}, + year = 2005, +}, + + +%O + +@inproceedings{ ongaro14search, + author = {Diego Ongaro and John Ousterhout}, + title = {In Search of an Understandable Consensus Algorithm}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + year = 2014, +} + % month = jun, + % location = {Philadelphia, PA}, + +@article{oreilly2.0, + author = {Tim O'Reilly}, + title = {What is Web 2.0}, + day = 30, + month = sep, + year = 2005, + publisher = {O'Reilly Media Inc.}, + note = {\url{http://oreilly.com/web2/archive/what-is-web-20.html}}, +} + +%P + +@inproceedings{ panchenko11website, + author = {Andriy Panchenko and Lukas Niessen and Andreas Zinnen + and Thomas Engel}, + title = {\href{https://anonymous-proxy-servers.net/paper/wpes11-panchenko.pdf}{Website Fingerprinting in Onion Routing Based Anonymization Networks}}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the + Electronic Society}}, + month = oct, + year = 2011, +} + +@article{papazoglou03service, + author = {M. P. Papazoglou, D. Georgakopoulos}, + title = {Service-Oriented Computing: Introduction}, + journal = {Communications of the ACM}, + volume = {46}, + number = {10}, + year = {2003}, + pages = {24-28}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@article{ papazoglou08service, + author = {Michael P. Papazoglou and others}, + title = {Service-Oriented Computing: a Research Roadmap}, + journal = {Cooperative Information Systems}, + volume = 17, + number = 2, + year = 2008, + pages = {223-255}, +} + +@inproceedings{ patelSTP, + author = {P. Patel and others}, + title = {Upgrading Transport Protocols Using Mobile Code}, + booktitle = {19th \bibbrev{SOSP}{{ACM} Symposium on + Operating Systems Principles (SOSP)}}, + month = oct, + year = 2003, + location = {Lake George, NY}, +} + +@inproceedings{ paterson11tag, + title={\href{https://www.iacr.org/archive/asiacrypt2011/70730368/70730368.pdf}{Tag + size does matter: Attacks and proofs for the {TLS} record protocol}}, + author={Paterson, Kenneth G and Ristenpart, Thomas and Shrimpton, Thomas}, + booktitle={International Conference on the Theory and Application of + Cryptology and Information Security}, + pages={372--389}, + month=dec, + year={2011} +} + +@inproceedings{peddycord12accurate, + author = {Barry Peddycord III and + Peng Ning and + Sushil Jajodia}, + title = {On the Accurate Identification of + Network Service Dependencies in Distributed Systems}, + booktitle = {\bibconf[26th]{LISA}{Large Installation System + Administration Conference}}, + location = {San Diego, CA}, + month = dec, + year = 2012 +} + +@inproceedings{ perng2006multicasting, + author={ Perng, G. and Reiter, M.K. and Chenxi Wang}, + booktitle={\bibconf[26th]{ICDCS}{International Conference on + Distributed Computing Systems}}, + title={{M2}: Multicasting Mixes for + Efficient and Anonymous Communication}, + year={2006}, + month={}, + volume={}, + number={}, + pages={59-59}, + keywords={}, + doi={10.1109/ICDCS.2006.53}, + ISSN={1063-6927}, +} + +@inproceedings{popa09macroscope, + author = {Lucian Popa and + Byung-Gon Chun and + Ion Stoica and + Jaideep Chandrashekar and + Nina Taft}, + title = {{M}acroscope: {E}nd-point approach to networked application + dependency discovery}, + booktitle = {CoNEXT}, + year = 2009 +} + + +@misc{phobos13freedom, + author = {phobos}, + year = {2013}, + month = {aug}, + title = {Hidden Services, Current Events, and Freedom Hosting}, + howpublished = {\url{https://blog.torproject.org/blog/hidden-services-current-events-and-freedom-hosting}}, +} + + +@inproceedings{ popa10http, + author = {Lucian Popa and Ali Ghodsi and Ion Stoica}, + title = {{HTTP} as the Narrow Waist of the Future {Internet}}, + booktitle = {\bibbrev{HotNets-IX}{9th ACM Workshop on + Hot Topics in Networks (HotNets-IX)}}, + location = {Monterey, CA}, + month = oct, + year = 2010, +} + +@inproceedings{ power10piccolo, + author = {Russell Power and Jinyang Li}, + title = {Piccolo: Building Fast, Distributed Programs + with Partitioned Tables}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}}, + month = oct, + year = 2010, +} + +@misc{ powertutor, + title = {{PowerTutor}}, + key = {PowerTutor}, + howpublished = {\url{http://powertutor.org/}}, +} + +@misc{ preston11facebook, + title = {{Facebook} officials keep quiet in its role in revolts}, + author = {Jennifer Preston}, + howpublished = {New York Times}, + day = 14, + month = feb, + year = 2011, + note = {\url{http://www.nytimes.com/2011/02/15/business/media/15facebook.html}}, +} + +@misc{ pwn2own, + title = {Pwn2Own}, + note = {\url{http://www.pwn2own.com/}}, +} + +%Q + +@misc{quic, + key = {{QUIC}}, + title = {{QUIC}: Multiplexed Stream Transport over {UDP}}, + note = {{http://blog.chromium.org/2013/06/experimenting-with-quic.html}}, +} + +%R + +% author = {Costin Raiciu and Sebastien Barre and Christopher Pluntke +% and Adam Greenhalgh and Damon Wischik and Mark Handley}, +@inproceedings{ raiciu11improving, + author = {Costin Raiciu and others}, + title = {Improving Datacenter Performance and Robustness + with {Multipath TCP}}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2011, + location = {Toronto, Ontario, Canada}, +} + +@inproceedings{ raimondo05secure, + author = {Mario Di Raimondo and Rosario Gennaro and Hugo Krawczyk}, + title = {Secure Off-the-Record Messaging}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the + Electronic Society}}, + month = nov, + year = 2005, + location = {Alexandria, VA, USA}, +} + +@article{rappa, + author = {Michael Rappa}, + title = {Business Models on the Web}, + note = {\\Accessed on July 7 2010. \\ + \url{http://digitalenterprise.org/models/models.html#Advertising}} +} + +@inproceedings{reardon09improving, + author = {Reardon, Joel and Goldberg, Ian}, + title = {Improving tor using a {TCP}-over-{DTLS} tunnel}, + booktitle = {18th USENIX Security Symposium}, + month = aug, + year = {2009}, + location = {Montreal, Canada}, +} + +% author = {Charles Reis and Steven D. Gribble and Tadayoshi Kohno +% and Nicholas C. Weaver}, +@inproceedings{ reis08detecting, + author = {Charles Reis and others}, + title = {Detecting In-Flight Page Changes with Web Tripwires}, + booktitle = {\bibconf[5th]{NSDI}{Symposium on Networked System + Design and Implementation}}, + month = apr, + year = 2008, + location = {San Francisco, CA}, +} + +@article{reiter99crowds, + author = {Reiter, Michael K. and Rubin, Aviel D.}, + title = {Anonymous {Web} transactions with {Crowds}}, + journal = {Communications of the ACM}, + volume = {42}, + number = {2}, + year = {1999}, + issn = {0001-0782}, + pages = {32--48}, + doi = {http://doi.acm.org/10.1145/293411.293778}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{rivest01leak, + author = {Ronald L. Rivest and + Adi Shamir and + Yael Tauman}, + title = {How to Leak a Secret}, + booktitle = {\bibconf[7th]{ASIACRYPT}{International Conference on the + Theory and Application of Cryptology and Information Security}}, + location = {Gold Coast, Australia}, + month = dec, + year = 2001 +} + +@misc{ yegge11platforms, + author = {Steve Yegge}, + title = {Stevey's Google Platforms Rant}, + month = oct, + year = 2011, + note = {\url{https://plus.google.com/+RipRowan/posts/eVeouesvaVX}}, +} + +%S + +@inproceedings{ sahai02automatedsla, + author = {Akhil Sahai and others}, + title = {Automated SLA Monitoring for Web Services}, + booktitle = {IEEE/IFIP DSOM}, + year = {2002}, + pages = {28-41}, + publisher = {Springer-Verlag} +} + +@inproceedings{ schollmeier01definition, + author = {Schollmeier, Rudiger}, + title = {A Definition of Peer-to-Peer Networking for the + Classification of Peer-to-Peer Architectures and Applications}, + booktitle = {1st International Conference on Peer-to-Peer Computing}, + month = aug, + year = 2001, + location = {Linkoping, Sweden}, +} + +@inproceedings{ semke98automatic, + author = {Jeffrey Semke and Matthew Mathis and Jamshid Mahdavi}, + title = {Automatic TCP Buffer Tuning}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = sep, + year = 1998, + location = {Vancouver, BC, Canada}, +} + +@article{schneider1990implementing, + title={Implementing fault-tolerant services using the state machine approach: A tutorial}, + author={Schneider, Fred B}, + journal={ACM Computing Surveys (CSUR)}, + volume={22}, + number={4}, + pages={299--319}, + year={1990}, + publisher={ACM} +} + +@article{ serjantov03trickle, + Author = {Serjantov, Andrei and Dingledine, Roger and Syverson, Paul}, + Title = {From a Trickle to a Flood: + Active Attacks on Several Mix Types}, + booktitle = {5th International Workshop on Information Hiding}, + Year = {2002}, +} + +@inproceedings{ sherr09scalable, + author = {Micah Sherr and Matt Blaze and Boon Thau Loo}, + title = {Scalable Link-Based Relay Selection for Anonymous Routing}, + booktitle = {9th \bibbrev{PETS}{Privacy-Enhancing + Technologies Symposium}}, + month = aug, + year = 2009, + location = {Seattle, WA}, +} + +@inproceedings{silverston07measuring, + author = {Thomas Silverston and Olivier Fourmaux}, + title = {Measuring P2P IPTV Systems}, + booktitle = {17th \bibbrev{NOSSDA}{International Workshop on Network and + Operating Systems Support for Digital Audio \& Video}}, +} + +% author = {Emin G\"un Sirer and Sharad Goel and Mark Robson +% and Do\v{g}an Engin}, +@inproceedings{ sirer04eluding, + author = {Sirer, Emin G\"un and Goel, Sharad and Robson, Mark + and Engin, D\v{o}gan}, + title = {Eluding Carnivores: File Sharing with Strong Anonymity}, + booktitle = {11th ACM SIGOPS European Workshop}, + month = sep, + year = 2004, +} + +@INPROCEEDINGS{Skene04preciseservice, + author = {James Skene and D. Davide Lamanna and Wolfgang Emmerich}, + title = {Precise Service Level Agreements}, + booktitle = {In: Proc. of 26th Intl. Conference on Software Engineering + (ICSE)}, + year = {2004}, + pages = {179-188}, + publisher = {IEEE Press} +} + +@inproceedings{ smits11bridgespa, + author = {Rob Smits and others}, + title = {{BridgeSPA}: Improving {Tor} Bridges with + Single Packet Authorization}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the + Electronic Society}}, + month = oct, + year = 2011, + location = {Chicago, IL}, +} + +@misc{ smux, + author = {Jim Gettys and Henrik Frystyk Nielsen}, + title = "{SMUX Protocol Specification}", + booktitle = {W3C working draft (expired)}, + note = {\url{http://www.w3.org/TR/WD-mux}}, + month = jul, + year = 1998 +} + +@inproceedings{song12faceless, + author = {Xiaoxiao Song and + David Isaac Wolinsky and + Bryan Ford}, + title = {Faceless: decentralized anonymous group messaging for online + social networks}, + booktitle = {\bibconf{SNS}{EuroSys Workshop on Social Network Systems}}, + year = {2012}, + month = {April}, +} + +@misc{ spdy, + title = {{SPDY}: An Experimental Protocol For a Faster {Web}}, + note = {\url{http://www.chromium.org/spdy/spdy-whitepaper}}, +} + +@INPROCEEDINGS{srivastava03Web, + author = {Biplav Srivastava and Jana Koehler}, + title = {Web Service Composition - Current Solutions and Open Problems}, + booktitle = {ICAPS 2003 Workshop on Planning for Web Services}, + year = {2003}, + pages = {28--35} +} + +@inproceedings{ stajano99cocaine, + author = {Frank Stajano and Ross Anderson}, + title = {The Cocaine Auction Protocol: + On The Power Of Anonymous Broadcast}, + booktitle = {3rd International Workshop on Information Hiding}, + month = sep, + year = 1999, +} + +@inproceedings{suchara11network, + author = {Martin Suchara and + Dahai Xu and + Robert D. Doverspike and + David Johnson and + Jennifer Rexford}, + title = {Network Architecture for Joint Failure Recovery and + Traffic Engineering}, + booktitle = {\bibconf{SIGMETRICS}{ACM SIGMETRICS}}, + location = {San Jose, CA}, + month = jun, + year = 2011 +} + +@article{ sundararaman05clock, + author = {Bharath Sundararaman and Ugo Buy and Ajay D. Kshemkalyani}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S1570870505000144?via%3Dihub}{Clock synchronization for wireless sensor networks: a survey}}, + journal = {Ad Hoc Networks}, + volume = 3, + number = 3, + month = may, + year = 2005, +} + +@inproceedings{stutzbach06understanding, + title={Understanding churn in peer-to-peer networks}, + author={Stutzbach, Daniel and Rejaie, Reza}, + booktitle={\bibconf{IMC}{ACM SIGCOMM conference on Internet measurement}}, + year={2006}, +} + +@inproceedings{ syverson11sleeping, + author = {Paul Syverson}, + title = {Sleeping dogs lie on a bed of onions but wake when mixed}, + booktitle = {\bibconf{HotPETs}{Hot Topics in + Privacy Enhancing Technologies}}, + month = jul, + year = 2011, + location = {Waterloo, Canada}, +} + +%T + +@misc{ tahrir, + key = {Tahrir}, + title = {The Tahrir Project}, + note = {\url{https://github.com/sanity/tahrir/wiki/Overview}}, +} + +@misc{ tails, + key = {Tails}, + title = {Tails: The Amnesic Incognito Live System}, + note = {\url{https://tails.boum.org/}}, + month = {September}, + year = {2012} +} + +@inproceedings{ tang10improved, + author = {Tang, Can and Goldberg, Ian}, + title = {An improved algorithm for {Tor} circuit scheduling}, + booktitle = {\bibconf[17th]{CCS}{ACM conference on + Computer and Communications Security}}, + month = oct, + year = {2010}, + location = {Chicago, IL}, +} + +@inproceedings{ terpstra10channel, + author = {Wesley W. Terpstra and Christof Leng and Max Lehn + and Alejandro P. Buchmann}, + title = {Channel-based Unidirectional Stream Protocol {(CUSP)}}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM} Mini Conference}, + month = mar, + year = 2010, +} + +@article{ thrasyvoulos10routing, + author = {Thrasyvoulos Spyropoulos and Rao Naveed Bin Rais and + Thierry Turletti and Katia Obraczka and Athanasios Vasilakos}, + title = {\href{https://link.springer.com/article/10.1007/s11276-010-0276-9}{Routing for disruption tolerant networks: taxonomy and design}}, + journal = {Wireless Networks}, + month = nov, + year = 2010, + volume = 16, + number = 8, + pages = {2349–2370}, +} + +@article{ tiloca17axiom, + title={\href{http://www.diva-portal.org/smash/get/diva2:1128111/FULLTEXT01.pdf}{Axiom: DTLS-based secure IoT group communication}}, + author={Tiloca, Marco and Nikitin, Kirill and Raza, Shahid}, + journal={ACM Transactions on Embedded Computing Systems}, + volume={16}, + number={3}, + month=apr, + year={2017} +} + +@misc{ titz01why, + author = {Olaf Titz}, + title = {Why {TCP} Over {TCP} Is A Bad Idea}, + month = apr, + year = 2001, + note = {\url{http://sites.inka.de/bigred/devel/tcp-tcp.html}}, +} + +@misc{ torbrowser, + title = {Tor Browser Bundle}, + note = {\url{https://www.torproject.org/projects/torbrowser.html.en}}, +} + +@inproceedings{ tran09sybil, + author = {Nguyen Tran and Bonan Min and Jinyang Li + and Lakshminarayanan Submaranian}, + title = {Sybil-resilient online content voting}, + booktitle = {\bibconf[6th]{NSDI}{Symposium on Networked System + Design and Implementation}}, + month = apr, + year = 2009, + pages = {15--28}, +} + +@inproceedings{ tsang05short, + author = {Patrick P. Tsang and Victor K. Wei}, + title = {Short Linkable Ring Signatures for E-voting, E-cash + and Attestation}, + booktitle = {\bibconf{ISPEC}{Information Security Practice + and Experience}}, + month = apr, + year = 2005, + location = {Singapore}, +} + +@inproceedings{tuulos04irc, + author={Tuulos, V.H. and Tirri, H.}, + booktitle={\bibconf{WI}{IEEE/WIC/ACM Conference on Web Intelligence}}, + title={Combining Topic Models and Social Networks for Chat Data Mining}, + year={2004}, + month={Sept}, +} + +@article{ varadhan00persistent, + author = {Kannan Varadhan and Ramesh Govindan and Deborah Estrin}, + title = {Persistent route oscillations in inter-domain routing}, + journal = {Computer Networks}, + volume = 32, + number = 1, + month = jan, + year = 2000, + pages = {1-16}, +} + +@inproceedings{ vasserman09membership, + author = {Eugene Vasserman and Rob Jansen and James Tyra + and Nicholas Hopper and Yongdae Kim}, + title = {Membership-Concealing Overlay Networks}, + booktitle = {\bibconf[16th]{CCS}{ACM conference on + Computer and Communications Security}}, + location = {Chicago, IL}, + month = nov, + year = 2009 +} + +@inproceedings{ venkataraman06chunkyspread, + author = {Vidhyashankar Venkataraman and Kaouru Yoshida + and Paul Francis}, + title = {\href{http://www.ieee-icnp.org/2006/papers/s1a1.pdf}{Chunkyspread: Heterogeneous Unstructured Tree-Based + Peer-to-Peer Multicast}}, + booktitle = {\bibconf[14th]{ICNP}{International Conference on + Network Protocols}}, + month = nov, + year = 2006, + location = {Santa Barbara, CA}, + url = {http://www.ieee-icnp.org/2006/papers/s1a1.pdf}, +} + +@inproceedings{ viswanath12canal, + author = {Bimal Viswanath and Mainack Mondal and Krishna P. Gummadi and + Alan Mislove and Ansley Post}, + title = {Canal: Scaling Social Network-Based Sybil Tolerance Schemes}, + booktitle = {\bibconf{SNS}{EuroSys Workshop on Social Network Systems}}, + year = {2012}, + month = {April}, +} + +@inproceedings{ vratonjic10integrity, + author = {Nevena Vratonjic and Julien Freudiger and Jean-Pierre Hubaux}, + title = {Integrity of the Web Content: The Case of Online Advertising}, + booktitle = {\bibbrev{CollSec}{Workshop on Collaborative Methods + for Security and Privacy}}, + month = aug, + year = 2010, + location = {Washington, DC}, +} + +%W + +@inproceedings{ wolinsky13buddies, + author = {David Isaac Wolinsky and Ewa Syta and Bryan Ford}, + title = {Hang With Your Buddies to Resist Intersection Attacks}, + booktitle = {\bibconf[20th]{CCS}{Conference on Computer and Communications Security}}, + month = {November}, + year = {2013}, +} + +@inproceedings{wang13artsense, + author = {Xinlei Oscar Wang and + Wei Cheng and + Prasant Mohapatra and + Tarek F. Abdelzaher}, + title = {{ARTS}ense: {A}nonymous reputation and trust in participatory + sensing}, + booktitle = {\bibconf[32nd]{INFOCOM}{IEEE International Conference on + Computer Communications}}, + location = {Turin, Italy}, + month = apr, + year = 2013 +} + + +@inproceedings{ waidner89dining, + author = {Michael Waidner and Birgit Pfitzmann}, + title = {The {Dining Cryptographers} in the Disco: + Unconditional Sender and Recipient Untraceability + with Computationally Secure Serviceability}, + booktitle = {Eurocrypt}, + location = {Houthalen, Belgium}, + month = apr, + year = 1989, + pages = {302--319}, +} + +@inproceedings{ weinberg12stegotorus, + author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and + Linda Briesemeister and Steven Cheung and Frank Wang and + Dan Boneh}, + title = {{StegoTorus}: a camouflage proxy for the + {Tor} anonymity system}, + booktitle = {\bibconf[19th]{CCS}{ACM conference on + Computer and Communications Security}}, + month = oct, + year = {2012}, + location = {Raleigh, NC}, +} + +@misc{ whonix, + key = {Whonix}, + title = {Whonix}, + note = {\url{http://sourceforge.net/p/whonix}}, +} + +@inproceedings{winstein13tcp, + author = {Keith Winstein and Hari Balakrishnan}, + title = {{TCP ex Machina}: Computer-Generated Congestion Control}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + year = {2013}, + month = aug, + location = {Hong Kong, China}, +} + +@misc{ wortham2010cellphones, + title = {{Cellphones Now Used More for Data Than for Calls}}, + author = {Jenna Wortham}, + publisher = {New York Times}, + day = 13, + month = may, + year = 2010, + note = {\url{http://www.nytimes.com/2010/05/14/technology/personaltech/14talk.html}}, +} + +% author = {Ye Wang and Hao Wang and Ajay Mahimkar and Richard Alimi +% and Yin Zhang and Lili Qiu and Y. Richard Yang}, +@inproceedings{ wang10r3, + author = {Ye Wang and others}, + title = {R3: Resilient Routing Reconfiguration}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2010, + location = {New Delhi, India}, +} + +@inproceedings{ wang15seeing, + title={\href{https://censorbib.nymity.ch/pdf/Wang2015a.pdf}{Seeing through + network-protocol obfuscation}}, + author={Wang, Liang and Dyer, Kevin P and Akella, Aditya and Ristenpart, + Thomas and Shrimpton, Thomas}, + booktitle={22nd ACM Conference on Computer and Communications Security + (CCS)}, + pages={57--69}, + month=oct, + year={2015} +} + +@misc{ web100, + title = "{The Web100 Project}", + note = {\url{http://www.web100.org}} +} + +@unpublished{ wiedemann11dissenterr2, + author = {Andrew Wiedemann and Doug von Kohorn and Henry Corrigan-Gibbs and Bryan Ford}, + title = {Dissent: Accountable Anonymous Group Messaging, Erratum 2}, + year = {2011}, + note = {\url{http://dedis.cs.yale.edu/2010/anon/papers/ccs10/erratum2.pdf}} +} + +@inproceedings{wolinsky09vpn, + author = {David Isaac Wolinsky and Yonggang Liu and Pierre St. Juste + and Girish Venkatasubramanian and Renato Figueiredo}, + title = {On the Design of Scalable, Self-Configuring Virtual Networks}, + booktitle = {IEEE/ACM Supercomputing}, + month = {November}, + year = {2009} +} + +@inproceedings{wolinsky11grid, + author = {David Isaac Wolinsky and Renato Figueiredo}, + title = {Experiences with Self-Organizing Decentralized Grids Using the Grid Appliance}, + booktitle = {\bibconf{ACM HPDC}{International Symposium on High Performance Distributed Computing}}, + year = 2011, +} + + +@inproceedings{ wolinsky12scalable, + author = {Wolinsky, David Isaac and Corrigan-Gibbs, Henry and + Ford, Bryan and Johnson, Aaron}, + title = {Scalable Anonymous Group Communication in the Anytrust Model}, + booktitle = {\bibconf{EuroSec}{European Workshop + on System Security}}, + month = apr, + day = 10, + year = 2012, + location = {Bern, Switzerland}, +} + +@inproceedings{ wolinsky12dissent, + author = {Wolinsky, David Isaac and Corrigan-Gibbs, Henry + and Johnson, Aaron and Ford, Bryan}, + title = {Dissent in Numbers: Making Strong Anonymity Scale}, + booktitle = {\bibconf[10th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}}, + month = oct, + year = 2012, +} + +@inproceedings{wolinsky13grid, + year={2013}, + booktitle={Cluster Computing}, + title={Experiences with self-organizing, decentralized grids using the grid appliance}, + author={Wolinsky, David Isaac and Chuchaisri, Panoat and Lee, Kyungyong and Figueiredo, Renato}, +} + +@inproceedings{ wolinsky14bootstrap, + title = {Dissent Design Document}, + note = {\url{https://github.com/DeDiS/Dissent/blob/master/DESIGN}}, + year = {2014} +} + +@inproceedings{wu12netpilot, + author = {Xin Wu and + Daniel Turner and + Chao-Chih Chen and + David A. Maltz and + Xiaowei Yang and + Lihua Yuan and + Ming Zhang}, + title = {Net{P}ilot: {A}utomating datacenter network + failure mitigation}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Helsinki, Finland}, + month = aug, + year = 2012 +} + + +%X + +@inproceedings{xie05static, + author = {Geoffrey G. Xie and + Jibin Zhan and + David A. Maltz and + Hui Zhang and + Albert G. Greenberg and + G\'{\i}sli Hj{\'a}lmt{\'y}sson and + Jennifer Rexford}, + title = {On Static Reachability Analysis of {IP} Networks}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + location = {Miami, FL}, + month = mar, + year = 2005 +} + +%Y + +%%%% +% It looks like this paper was (at least) partially plagarized from: +% "k-Anonymous Message Transmission" +% von Ahn, Bortz, and Hopper (CCS'03) +% +% inproceedings{ yao04new, +% author = {Gang Yao and Dengguo Feng}, +% title = {A New $k$-Anonymous Message Transmission Protocol}, +% booktitle = {\bibbrev{WISA}{Workshop on +% Information Security Applications (WISA)}}, +% month = aug, +% year = 2004, +% location = {Jeju Island, Korea}, +% } + +%Z + +@INPROCEEDINGS{zec02estimating, + author = {Marko Zec and Miljenko Mikuc and Mario Zagar}, + title = "Estimating the Impact of Interrupt Coalescing Delays on Steady State {TCP} Throughput", + booktitle = {SoftCOM}, + year = {2002} +} + +@ARTICLE{Zeng04qos-awaremiddleware, + author = {Liangzhao Zeng and others}, + title = {QoS-aware middleware for Web services composition}, + journal = {IEEE Transactions on Software Engineering}, + year = {2004}, + volume = {30}, + pages = {311--327} +} + +@inproceedings{zhang04planetseer, + author = {Ming Zhang and Chi Zhang and Vivek Pai and Larry Peterson and Randy Wang}, + title = {{PlanetSeer}: Internet path failure monitoring +and characterization in wide-area services}, + booktitle = {OSDI}, + year = 2004 +} + +@inproceedings{ zhao02brocade, + author = {Zhao, Ben Y. and Duan, Yitao and Huang, Ling and + Joseph, Anthony D. and Kubiatowicz, John}, + title = {Brocade: Landmark Routing on Overlay Networks}, + booktitle = {1st International Workshop on Peer-to-Peer Systems}, + month = mar, + year = 2002, +} + +@book{ zhao04wireless, + author = {Feng Zhao and Leonidas Guibas}, + title = {Wireless Sensor Networks: An Information Processing Approach}, + publisher = {Morgan Kaufmann}, + month = jul, + year = 2004, + isbn = {978-1493303779}, + pages = {376}, +} + +@article{ day83osi, + author = {John D. Day and Hubert Zimmermann}, + title = {\href{https://ieeexplore.ieee.org/abstract/document/1457043}{The {OSI} Reference Model}}, + journal = {Proceedings of the IEEE}, + volume = 71, + number = 12, + month = dec, + year = 1983, +} + + +%%%%% RFCs + +@misc{ rfc768, + author = {J. Postel}, + title = {User Datagram Protocol}, + month = aug, + year = 1980, + note = {RFC 768}, +} + +@misc{ rfc791, + key = "IP", + title = "Internet Protocol", + month = sep, + year = "1981", + note = "RFC 791", +} + +@misc{ rfc792, + author = {J. Postel}, + title = {Internet Control Message Protocol}, + month = sep, + year = 1981, + note = {RFC 792}, +} + +@misc{ rfc793, + key = "TCP", + title = "Transmission Control Protocol", + month = sep, + year = "1981", + note = "RFC 793", +} + +@misc{ rfc813, + author = {David D. Clark}, + title = {Window and Acknowledgement Strategy in {TCP}}, + month = jul, + year = 1982, + note = {RFC 813}, +} + +@misc{ rfc821, + author = {Jonathan B. Postel}, + title = {Simple Mail Transfer Protocol}, + month = aug, + year = 1982, + note = {RFC 821}, +} + +@misc{ rfc826, + author = "David C. Plummer", + title = "An Ethernet Address Resolution Protocol", + month = nov, + year = "1982", + note = "RFC 826", +} + +@misc{ rfc854, + author = "J. Postel and J. Reynolds", + title = "Telnet Protocol Specification", + month = may, + year = 1983, + note = "RFC 854", +} + +@misc{ rfc896, + author = "J. Nagle", + title = "{Congestion Control in IP/TCP Internetworks}", + month = jan, + year = 1984, + note = "RFC 896", +} + +% Note: updated by rfc1151 +@misc{ rfc908, + author = {David Velten and Robert Hinden and Jack Sax}, + title = {Reliable Data Protocol}, + month = jul, + year = 1984, + note = {RFC 908}, +} + +@misc{ rfc955, + author = {R. Braden}, + title = {Towards a Transport Service for + Transaction Processing Applications}, + month = sep, + year = 1985, + note = {RFC 955}, +} + +@misc{ rfc959, + author = {J. Postel and J. Reynolds}, + title = {File Transfer Protocol {(FTP)}}, + month = oct, + year = 1985, + note = {RFC 959}, +} + +@misc{ rfc1009, + author = {R. Braden and J. Postel}, + title = {Requirements for {Internet} Gateways}, + month = jun, + year = 1987, + note = {RFC 1009}, +} + +@misc{ rfc1016, + author = {W. Prue and J. Postel}, + title = {Something a Host Could Do with Source Quench: + The Source Quench Introduced Delay {(SQuID)}}, + month = jul, + year = 1987, + note = {RFC 1016}, +} + +@misc{ rfc1034, + author = "P. Mockapetris", + title = "Domain names: concepts and facilities", + month = nov, + year = 1987, + note = "RFC 1034", +} + +@misc{ rfc1035, + author = "P. Mockapetris", + title = "Domain names: implementation and specification", + month = nov, + year = "1987", + note = "RFC 1035", +} + +@misc{ rfc1036, + author = {M. Horton and R. Adams}, + title = {\href{https://tools.ietf.org/html/rfc1036}{Standard for Interchange of {USENET} Messages}}, + month = dec, + year = 1987, + note = {RFC 1036}, +} + +@misc{ rfc1058, + author = "C. Hedrick", + title = "Routing Information Protocol", + month = jun, + year = "1988", + note = "RFC 1058", +} + +@misc{ rfc1078, + author = {M. Lottor}, + title = {{TCP} port service Multiplexer {(TCPMUX)}}, + month = nov, + year = 1988, + note = {RFC 1078}, +} + +@misc{ rfc1122, + author = {R. {Braden, ed.}}, + title = {Requirements for {Internet} Hosts -- Communication Layers}, + month = oct, + year = 1989, + note = {RFC 1122}, +} + +@misc{ rfc1151, + author = {C. Partridge and R. Hinden}, + title = {Version 2 of the Reliable Data Protocol {(RDP)}}, + month = apr, + year = 1990, + note = {RFC 1151}, +} + +@misc{ rfc1247, + author = "J. Moy", + title = "{OSPF} Version 2", + month = jul, + year = "1991", + note = "RFC 1247", +} + +@misc{ rfc1258, + author = "B. Kantor", + title = "{BSD} {Rlogin}", + month = sep, + year = 1991, + note = "RFC 1258", +} + +@misc{ rfc1263, + author = {S. O'Malley and L. Peterson}, + title = {{TCP} Extensions Considered Harmful}, + month = oct, + year = 1991, + note = {RFC 1263}, +} + +@misc{ rfc1323, + author = "V. Jacobson and R. Braden and D. Borman", + title = "{TCP} Extensions for High Performance", + month = may, + year = 1992, + note = "RFC 1323", +} + +% same as saltzer82naming? +@misc{ rfc1498, + author = {J. Saltzer}, + title = {On the Naming and Binding of Network Destinations}, + month = aug, + year = 1993, + note = "RFC 1498", +} + +@misc{ rfc1518, + author = "Y. Rekhter and T. {Li (editors)}", + title = "An Architecture for {IP} Address Allocation with {CIDR}", + month = sep, + year = "1993", + note = "RFC 1518", +} + +@misc{ rfc1519, + author = "V. Fuller and T. Li and J. Yu and K. Varadhan", + title = "Classless Inter-Domain Routing {(CIDR)}: + an Address Assignment and Aggregation Strategy", + month = sep, + year = "1993", + note = "RFC 1519", +} + +@misc{ rfc1631, + author = {K. Egevang and P. Francis}, + title = {The {IP} Network Address Translator {(NAT)}}, + month = may, + year = 1994, + note = {RFC 1631}, +} + +@misc{ rfc1644, + author = "R. Braden", + title = "{T/TCP} -- {TCP} Extensions for Transactions", + month = jul, + year = 1994, + note = "RFC 1644", +} + +@misc{ rfc1705, + author = {R. Carlson and D. Ficarella}, + title = "Six Virtual Inches to the Left: The Problem with {IPng}", + month = oct, + year = 1995, + note = "RFC 1705", +} + +@misc{ rfc1771, + author = "Y. Rekhter and T. {Li (editors)}", + title = "A Border Gateway Protocol 4 {(BGP-4)}", + month = mar, + year = "1995", + note = "RFC 1771", +} + +@misc{ rfc1812, + author = {F. {Baker, ed.}}, + title = {Requirements for {IP} Version 4 Routers}, + month = jun, + year = 1995, + note = {RFC 1812}, +} + +@misc{ rfc1831, + author = {R. Srinivasan}, + title = {{RPC:} Remote Procedure Call Protocol Specification Version 2}, + month = aug, + year = 1995, + note = {RFC 1831}, +} + +@misc{ rfc1832, + author = {R. Srinivasan}, + title = {{XDR:} External Data Representation Standard}, + month = aug, + year = 1995, + note = {RFC 1832}, +} + +@misc{ rfc1833, + author = {R. Srinivasan}, + title = {Binding Protocols for {ONC RPC} Version 2}, + month = aug, + year = 1995, + note = {RFC 1833}, +} + +@misc{ rfc1858, + author = {G. Ziemba and D. Reed and P. Traina}, + title = {Security Considerations for IP Fragment Filtering}, + month = oct, + year = 1995, + note = {RFC 1858}, +} + +@misc{ rfc1881, + author = "IAB and IESG", + title = "{IPv6} Address Allocation Management", + month = dec, + year = "1995", + note = "RFC 1881", +} + +@misc{ rfc1887, + author = "Y. Rekhter and T. Li", + title = "An Architecture for {IPv6} Unicast Address Allocation", + month = dec, + year = "1995", + note = "RFC 1887", +} + +@misc{ rfc1918, + author = "Y. Rekhter and others", + title = "Address Allocation for Private Internets", + month = feb, + year = 1996, + note = "RFC 1918", +} + + +@misc{ rfc1928, + author = "M. Leech and others", + title = "{SOCKS} Protocol", + month = mar, + year = "1996", + note = "RFC 1928", +} + +@misc{ rfc1939, + author = {J. Myers and M. Rose}, + title = {Post Office Protocol -- Version 3}, + month = may, + year = 1996, + note = {RFC 1939}, +} + +@misc{ rfc1945, + author = "T. Berners-Lee and R. Fielding and H. Frystyk", + title = "Hypertext Transfer Protocol -- {HTTP/1.0}", + month = may, + year = 1996, + note = "RFC 1945", +} + +@misc{ rfc1948, + author = "S. Bellovin", + title = "Defending Against Sequence Number Attacks", + month = may, + year = 1996, + note = "RFC 1948", +} + +@misc{ rfc1950, + author = {P. Deutsch and J-L. Gailly}, + title = {{ZLIB} Compressed Data Format Specification version 3.3}, + month = may, + year = 1996, + note = "RFC 1950", +} + +@misc{ rfc1955, + author = {R. Hinden}, + title = {New Scheme for {Internet} Routing and Addressing {(ENCAPS)} + for {IPNG}}, + month = jun, + year = 1996, + note = "RFC 1955", +}, + +@misc{ rfc1992, + author = "I. Castineyra and N. Chiappa and M. Steenstrup", + title = "The {Nimrod} Routing Architecture", + month = aug, + year = "1996", + note = "RFC 1992", +} + +@misc{ rfc2008, + author = {Y. Rekhter and T. Li}, + title = {Implications of Various Address Allocation Policies + for {Internet} Routing}, + month = oct, + year = 1996, + note = {RFC 2008}, +} + +@misc{ rfc2018, + author = "M. Mathis and J. Mahdav and S. Floyd and A. Romanow", + title = "{TCP} Selective Acknowledgment Options", + month = oct, + year = 1996, + note = "RFC 2018", +} + +@misc{ rfc2050, + author = "K. Hubbard and M. Kosters and D. Conrad and D. Karrenberg and J. Postel", + title = "Internet Registry {IP} Allocation Guidelines", + month = nov, + year = "1996", + note = "RFC 2050", +} + +@misc{ rfc2076, + author = {J. Palme}, + title = {Common Internet Message Headers}, + month = feb, + year = 1997, + note = {RFC 2076}, +} + +@misc{ rfc2101, + author = "B. Carpenter and J. Crowcroft and Y. Rekhter", + title = "{IPv4} Address Behaviour Today", + month = feb, + year = "1997", + note = "RFC 2101", +} + +@misc{ rfc2103, + author = "R. Ramanathan", + title = "Mobility Support for {Nimrod}: + Challenges and Solution Approaches", + month = feb, + year = "1997", + note = "RFC 2103", +} + +@misc{ rfc2131, + author = "R. Droms", + title = "Dynamic Host Configuration Protocol", + month = mar, + year = "1997", + note = "RFC 2131", +} + +@misc{ rfc2132, + author = {S. Alexander and R. Droms}, + title = {{DHCP} Options and {BOOTP} Vendor Extensions}, + month = mar, + year = 1997, + note = {RFC 2132}, +} + +@misc{ rfc2136, + author = "P. {Vixie, Editor} and S. Thomson and Y. Rekhter and J. Bound", + title = "Dynamic Updates in the Domain Name System", + month = apr, + year = "1997", + note = "RFC 2136", +} + +@misc{ rfc2140, + author = {J. Touch}, + title = {{TCP} Control Block Interdependence}, + month = apr, + year = 1997, + note = "RFC 2140", +} + +@misc{ rfc2205, + author = {R. {Braden, Ed.}}, + title = {Resource ReSerVation Protocol {(RSVP)} -- + Version 1 Functional Specification}, + month = sep, + year = 1997, + note = {RFC 2205}, +} + +@misc{ rfc2228, + author = {M. Horowitz and S. Lunt}, + title = {{FTP} Security Extensions}, + month = oct, + year = 1997, + note = {RFC 2228}, +} + +% obsoleted by rfc4346, rfc5246, rfc8446 +@misc{ rfc2246, + author = "T. Dierks and C. Allen", + title = "The {TLS} Protocol Version 1.0", + month = jan, + year = "1999", + note = "RFC 2246", +} + +@misc{ rfc2260, + author = "T. Bates and Y. Rekhter", + title = "Scalable Support for Multi-homed Multi-provider Connectivity", + month = jan, + year = 1998, + note = "RFC 2260", +} + +@misc{ rfc2309, + author = {B. Braden and others}, + title = {Recommendations on Queue Management and Congestion Avoidance + in the {Internet}}, + month = apr, + year = 1998, + note = "RFC 2309", +} + +@misc{ rfc2326, + author = {H. Schulzrinne and A. Rao and R. Lanphier}, + title = {Real Time Streaming Protocol {(RTSP)}}, + month = apr, + year = 1998, + note = {RFC 2326}, +} + +% Note: obsoleted by RFC 4301 +@misc{ rfc2401, + author = "S. Kent and R. Atkinson", + title = "Security Architecture for the {Internet Protocol}", + month = nov, + year = "1998", + note = "RFC 2401", +} + +% Note: obsoleted by RFC 4303 +@misc{ rfc2406, + author = "S. Kent and R. Atkinson", + title = "{IP} Encapsulating Security Payload", + month = nov, + year = "1998", + note = "RFC 2406", +} +% title = "{IP} Encapsulating Security Payload {(ESP)}", + +@misc{ rfc2460, + author = "S. Deering and R. Hinden", + title = "Internet Protocol, Version 6 {(IPv6)} Specification", + month = dec, + year = "1998", + note = "RFC 2460", +} + +@misc{ rfc2462, + author = "S. Thomson and T. Narten", + title = "{IPv6} Stateless Address Autoconfiguration", + month = dec, + year = "1998", + note = "RFC 2462", +} + +@misc{ rfc2527, + author = {S. Chokhani and W. Ford}, + title = {Internet {X.509} Public Key Infrastructure + Certificate Policy and Certification Practices Framework}, + month = mar, + year = 1999, + note = {RFC 2527}, +} + + +@misc{ rfc2535, + author = "D. Eastlake", + title = "Domain Name System Security Extensions", + month = mar, + year = "1999", + note = "RFC 2535", +} + +@misc {rfc2536, + author = "D. EastLake", + title = "{DSA} {KEYs} and {SIGs} in the {Domain Name System (DNS)}", + month = mar, + year = "1999", + note = "RFC 2536", +} + +@misc{ rfc2581, + author = "M. Allman and V. Paxson and W. Stevens", + title = "{TCP} Congestion Control", + month = apr, + year = "1999", + note = "RFC 2581", +} + +@misc{ rfc2616, + author = {R. Fielding and others}, + title = {Hypertext Transfer Protocol -- {HTTP/1.1}}, + month = jun, + year = 1999, + note = {RFC 2616}, +} + +@misc{ rfc2647, + author = {D. Newman}, + title = {Benchmarking Terminology for Firewall Performance}, + month = aug, + year = 1999, + note = {RFC 2647}, +} + +@misc{ rfc2663, + author = "P. Srisuresh and M. Holdrege", + title = "{IP} Network Address Translator {(NAT)} + Terminology and Considerations", + month = aug, + year = "1999", + note = "RFC 2663", +} + +@misc{rfc2692, + author={C. Ellison}, + title="{SPKI Requirements}", + year=1999, + month=sep, + note={RFC 2692} +} + +@misc{rfc2693, + author={C. Ellison and others}, + title="{SPKI Certificate Theory}", + year=1999, + month=sep, + note={RFC 2693} +} + +@misc{ rfc2757, + author = {G. Montenegro and others}, + title = {Long Thin Networks}, + month = jan, + year = 2000, + note = {RFC 2757}, +} + +@misc{ rfc2764, + title = "{A Framework for IP Based Virtual Private Networks}", + author = "B. Gleeson and others", + year = "2000", + month = feb, + note = "RFC 2764", +} + +@misc{ rfc2766, + author = "G. Tsirtsis and P. Srisuresh", + title = "Network Address Translation - Protocol Translation {(NAT-PT)}", + month = feb, + year = "2000", + note = "RFC 2766", +} + +@misc{ rfc2782, + author = "A. Gulbrandsen and P. Vixie and L. Esibov", + title = "A {DNS} {RR} for specifying the location of services + {(DNS SRV)}", + month = feb, + year = "2000", + note = "RFC 2782", +} + +@misc{ rfc2818, + author = {E. Rescorla}, + title = {{HTTP} Over {TLS}}, + month = may, + year = 2000, + note = {RFC 2818}, +} + +@misc{ rfc2821, + author = {J. {Klensin, ed.}}, + title = {Simple Mail Transfer Protocol}, + month = apr, + year = 2001, + note = {RFC 2821}, +} + +@misc{ rfc2822, + author = {P. {Resnick, ed.}}, + title = {Internet Message Format}, + month = apr, + year = 2001, + note = {RFC 2822}, +} + +@misc{ rfc2883, + author = "S. Floyd and J. Mahdavi and M. Mathis and M. Podolsky", + title = "An Extension to the Selective Acknowledgement + {(SACK)} Option for {TCP}", + month = jul, + year = 2000, + note = "RFC 2883", +} + +@misc{ rfc2914, + author = "S. Floyd", + title = "Congestion Control Principles", + month = sep, + year = "2000", + note = "RFC 2914", +} + +% obsoleted by rfc4960 +@misc{ rfc2960, + author = "R. Stewart and others", + title = "Stream Control Transmission Protocol", + month = oct, + year = 2000, + note = "RFC 2960", +} + +@misc{ rfc2979, + author = {N. Freed}, + title = {Behavior of and Requirements for {Internet} Firewalls}, + month = oct, + year = 2000, + note = {RFC 2979}, +} + +@misc{ rfc3007, + author = "B. Wellington", + title = "Secure Domain Name System {(DNS)} Dynamic Update", + month = nov, + year = "2000", + note = "RFC 3007", +} + +@misc{ rfc3022, + author = "P. Srisuresh and K. Egevang", + title = "Traditional {IP} Network Address Translator + {(Traditional NAT)}", + month = jan, + year = "2001", + note = "RFC 3022", +} + +@misc{ rfc3027, + author = "M. Holdrege and P. Srisuresh", + title = "Protocol Complications + with the {IP} Network Address Translator", + month = jan, + year = "2001", + note = "RFC 3027", +} + +@misc{ rfc3080, + author = {M. Rose}, + title = {The Blocks Extensible Exchange Protocol Core}, + month = mar, + year = 2001, + note = "RFC 3080", +} + +@misc{ rfc3102, + author = "M. Borella and J. Lo and D. Grabelsky and G. Montenegro", + title = "Realm Specific {IP}: Framework", + month = oct, + year = "2001", + note = "RFC 3102", +} + +% author = {J. Border and M. Kojo and J. Griner and G. Montenegro +% and Z. Shelby}, +@misc{ rfc3135, + author = {J. Border and others}, + title = {Performance Enhancing Proxies Intended to Mitigate + Link-Related Degradations}, + month = jun, + year = 2001, + note = {RFC 3135}, +} + +@misc{ rfc3142, + author = {J. Hagino and K. Yamamoto}, + title = {An {IPv6}-to-{IPv4} Transport Relay Translator}, + month = jun, + year = 2001, + note = {RFC 3142}, +} + +@misc{ rfc3161, + author = {C. Adams and P. Cain and D. Pinkas and R. Zuccherato}, + title = {Internet X.509 Public Key Infrastructure + Time-Stamp Protocol (TSP)}, + month = aug, + year = 2001, + note = {RFC 3161}, +} + +@misc{ rfc3168, + author = {K. Ramakrishnan and S. Floyd and D. Black}, + title = {The Addition of Explicit Congestion Notification {(ECN)} + to {IP}}, + month = sep, + year = 2001, + note = {RFC 3168}, +} + +@misc{ rfc3178, + author = "J. Hagino and H. Snyder", + title = "{IPv6} Multihoming Support at Site Exit Routers", + month = oct, + year = "2001", + note = "RFC 3178", +} + +@misc{ rfc3234, + author = "Brian Carpenter and Scott Brim", + title = "{Middleboxes: Taxonomy and Issues}", + month = feb, + year = "2002", + note = "RFC 3234", +} + +@misc{ rfc3235, + author = "D. Senie", + title = "Network Address Translator {(NAT)}-Friendly + Application Design Guidelines", + month = jan, + year = "2002", + note = "RFC 3235", +} + +@misc{ rfc3261, + author = "J. Rosenberg and others", + title = "{SIP:} Session Initiation Protocol", + month = jun, + year = 2002, + note = "RFC 3261", +} + +@misc{ rfc3280, + author = "R. Housley and W. Polk and W. Ford and D. Solo", + title = "Internet {X.509} Public Key Infrastructure + Certificate and Certificate Revocation List {(CRL)} Profile", + month = apr, + year = 2002, + note = "RFC 3280", +} + +@misc{ rfc3303, + author = "P. Srisuresh and J. Kuthan and J. Rosenberg and A. Molitor + and A. Rayhan", + title = "Middlebox communication architecture and framework", + month = aug, + year = "2002", + note = "RFC 3303", +} + +@misc{ rfc3315, + author = {R. {Droms, editor} and J. Bound and B. Volz and T. Lemon + and C. Perkins and M. Carney}, + title = {Dynamic Host Configuration Protocol for {IPv6} {(DHCPv6)}}, + month = jul, + year = 2003, + note = {RFC 3315}, +} + +@misc{ rfc3344, + author = "C. {Perkins, Editor}", + title = "{IP} Mobility Support for {IPv4}", + month = aug, + year = "2002", + note = "RFC 3344", +} + +@misc{ rfc3428, + author = "B. {Campbell, Editor}", + title = "{Session Initiation Protocol Extension for Instant Messaging}", + month = dec, + year = "2002", + note = "RFC 3428", +} + +@misc{ rfc3448, + author = "M. Handley and S. Floyd and J. Padhye and J. Widmer", + title = "{TCP} Friendly Rate Control {(TFRC)}: Protocol Specification", + month = jan, + year = 2003, + note = "RFC 3448", +} + +@misc{ rfc3489, + author = "J. Rosenberg and others", + title = "{STUN} - Simple Traversal of User Datagram Protocol {(UDP)} + Through Network Address Translators {(NATs)}", + month = mar, + year = "2003", + note = "RFC 3489", +} + +@misc{ rfc3501, + author = {M. Crispin}, + title = {Internet Message Access Protocol - Version 4rev1}, + month = mar, + year = 2003, + note = {RFC 3501}, +} + +@misc{ rfc3514, + author = {S. Bellovin}, + title = {The Security Flag in the {IPv4} Header}, + month = apr, + year = 2003, + note = {RFC 3514}, +} + +@misc{ rfc3519, + author = {H. Levkowetz and S. Vaarala}, + title = {Mobile {IP} Traversal of Network Address Translation + {(NAT)} Devices}, + month = apr, + year = 2003, + note = {RFC 3519}, +} + + +@misc{ rfc3530, + author = {S. Shepler and B. Callaghan and D. Robinson and R. Thurlow + and C. Beame and M. Eisler and D. Noveck}, + title = {Network File System {(NFS)} version 4 Protocol}, + month = apr, + year = 2003, + note = {RFC 3530}, +} + +@misc{ rfc3550, + author = {H. Schulzrinne and S. Casner and R. Frederick + and V. Jacobson}, + title = {{RTP}: A Transport Protocol for Real-Time Applications}, + month = jul, + year = 2003, + note = "RFC 3550", +} + +@misc{ rfc3582, + author = "J. Abley and B. Black and V. Gill", + title = "Goals for {IPv6} Site-Multihoming Architectures", + month = aug, + year = "2003", + note = "RFC 3582", +} + +@misc{ rfc3633, + author = "O. Troan and R. Droms", + title = "{IPv6} Prefix Options for + Dynamic Host Configuration Protocol {(DHCP)} version 6", + month = dec, + year = 2003, + note = "RFC 3633", +} + +@misc{ rfc3649, + author = {S. Floyd}, + title = {{HighSpeed TCP} for Large Congestion Windows}, + month = dec, + year = 2003, + note = {RFC 3649}, +} + +@misc{ rfc3686, + author = {R. Housley}, + title = {Using Advanced Encryption Standard {(AES)} Counter Mode + With {IPsec} Encapsulating Security Payload {(ESP)}}, + month = jan, + year = 2004, + note = {RFC 3686}, +} + +@misc{ rfc3708, + author = {E. Blanton and M. Allman}, + title = {Using {TCP} Duplicate Selective Acknowledgement {(DSACKs)} and + Stream Control Transmission Protocol {(SCTP)} + Duplicate Transmission Sequence Numbers {(TSNs)} + to Detect Spurious Retransmissions}, + month = feb, + year = 2004, + note = {RFC 3708}, +} + +@misc{ rfc3715, + author = {B. Aboba and W. Dixon}, + title = {{IPsec-Network Address Translation (NAT) Compatibility Requirements}}, + month = mar, + year = 2005, + note = {RFC 3715}, +} + +@misc{ rfc3720, + author = {J. Satran and K. Meth and C. Sapuntzakis and M. Chadalapaka + and E. Zeidner}, + title = {Internet Small Computer Systems Interface {(iSCSI)}}, + month = apr, + year = 2004, + note = {RFC 3720}, +} + +@misc{ rfc3758, + author = {R. Stewart and M. Ramalho and Q. Xie and M. Tuexen and P. Conrad}, + title = {SCTP Partial Reliability Extension}, + month = may, + year = 2004, + note = {RFC 3758}, +} + +@misc{ rfc3828, + author = "L-A. Larzon and M. Degermark and S. Pink and + L-E. {Jonsson, Ed.} and G. {Fairhurst, Ed.}", + title = "The Lightweight User Datagram Protocol {(UDP-Lite)}", + month = jul, + year = 2004, + note = "RFC 3828", +} + +@misc{ rfc3833, + author = {D. Atkins and R. Austein}, + title = {\href{http://tools.ietf.org/html/rfc3833}{Threat Analysis of the Domain Name System (DNS)}}, + month = aug, + year = 2004, + note = {RFC 3833}, +} + +@misc{ rfc3920, + author = "P. {Saint-Andre, Editor}", + title = {Extensible Messaging and Presence Protocol (XMPP): Core}, + month = oct, + year = 2004, + note = {RFC 3920}, +} + +@misc{ rfc3947, + author = {T. Kivinen}, + title = {Negotiation of {NAT}-Traversal in the {IKE}}, + month = jan, + year = 2005, + note = {RFC 3947}, +} + +@misc{ rfc3948, + author = {A. Huttunen and B. Swander and V. Volpe and L. DiBurro + and M. Stenberg}, + title = {{UDP} Encapsulation of {IPsec ESP} Packets}, + month = jan, + year = 2005, + note = {RFC 3948}, +} + +@misc{ rfc3972, + author = {T. Aura}, + title = {Cryptographically Generated Addresses (CGA)}, + month = mar, + year = 2005, + note = {RFC 3972}, +} + +@misc{ rfc3977, + author = {C. Feather}, + title = {Network News Transfer Protocol {(NNTP)}}, + month = oct, + year = 2006, + note = {RFC 3977}, +} + +@misc{ rfc4033, + author = "R. Arends and R. Austein and M. Larson + and D. Massey and S. Rose", + title = "{DNS Security Introduction and Requirements}", + month = mar, + year = 2005, + note = "RFC 4033", +} + +@misc{ rfc4116, + author = {J. Abley and K. Lindqvist and E. Davies and + B. Black and V. Gill}, + title = {{IPv4} Multihoming Practices and Limitations}, + month = jul, + year = 2005, + note = {RFC 4116}, +} + +@misc{ rfc4193, + author = {R. Hinden and B. Haberman}, + title = {Unique Local {IPv6} Unicast Addresses}, + month = oct, + year = 2005, + note = {RFC 4193}, +} + +@misc{ rfc4301, + author = "S. Kent and K. Seo", + title = "Security Architecture for the {Internet} Protocol", + month = dec, + year = "2005", + note = "RFC 4301", +} + +@misc{ rfc4302, + author = {S. Kent}, + title = {{IP} Authentication Header}, + month = dec, + year = 2005, + note = {RFC 4302}, +} + +@misc{ rfc4303, + author = "S. Kent", + title = "{IP} Encapsulating Security Payload {(ESP)}", + month = dec, + year = "2005", + note = "RFC 4303", +} + +@misc{ rfc4306, + author = {C. {Kaufman, Ed.}}, + title = {Internet Key Exchange {(IKEv2)} Protocol}, + month = dec, + year = 2005, + note = "RFC 4306", +} + +@misc{ rfc4251, + author = "T. Ylonen and C. {Lonvick, Ed.}", + title = "The Secure Shell Protocol Architecture", + month = jan, + year = 2006, + note = "RFC 4251", +} +% title = "The Secure Shell {(SSH)} Protocol Architecture", + +@misc{ rfc4252, + author = {T. Ylonen and C. {Lonvick, Ed.}}, + title = {The Secure Shell {(SSH)} Authentication Protocol}, + month = jan, + year = 2006, + note = {RFC 4252}, +} + +@misc{ rfc4253, + author = {T. Ylonen and C. {Lonvick, Ed.}}, + title = {\href{https://tools.ietf.org/html/rfc4253}{The Secure Shell {(SSH)} Transport Layer Protocol}}, + month = jan, + year = 2006, + note = {RFC 4253}, +} + +@misc{ rfc4254, + author = "T. Ylonen and C. {Lonvick, Ed.}", + title = "The Secure Shell {(SSH)} Connection Protocol", + month = jan, + year = 2006, + note = "RFC 4254", +} + +@misc{ rfc4271, + author = "Y. Rekhter and T. Li and S. {Hares (editors)}", + title = "A Border Gateway Protocol 4 {(BGP-4)}", + month = jan, + year = 2006, + note = "RFC 4271", +} + +@misc{ rfc4340, + author = "E. Kohler and M. Handley and S. Floyd", + title = "Datagram Congestion Control Protocol {(DCCP)}", + month = mar, + year = 2006, + note = "RFC 4340", +} + +@misc{ rfc4341, + author = "E. Kohler and S. Floyd", + title = "Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 2: TCP-like Congestion Control", + month = mar, + year = 2006, + note = "RFC 4341", +} + +@misc{ rfc4346, + author = {T. Dierks and E. Rescorla}, + title = {The Transport Layer Security {(TLS)} Protocol Version 1.1}, + month = apr, + year = 2006, + note = {RFC 4346}, +} + +@misc{ rfc4347, + author = "E. Rescorla and N. Modadugu", + title = "Datagram Transport Layer Security", + month = apr, + year = 2006, + note = "RFC 4347", +} + +@misc{ rfc4380, + author = {C. Huitema}, + title = {{Teredo}: Tunneling {IPv6} over {UDP} through + Network Address Translations {(NATs)}}, + month = feb, + year = 2006, + note = {RFC 4380}, +} + + +@misc{ rfc4423, + author = {R. Moskowitz and P. Nikander}, + title = {Host Identity Protocol {(HIP)} Architecture}, + month = may, + year = 2006, + note = {RFC 4423}, +} + +@misc{ rfc4510, + author = {K. {Zeilenga, Ed.}}, + title = {\href{https://tools.ietf.org/html/rfc4510}{Lightweight Directory Access Protocol {(LDAP)}: Technical Specification Road Map}}, + month = jun, + year = 2006, + note = {RFC 4510}, +} + +@misc{ rfc4634, + author = {D. {Eastlake 3rd} and T. Hansen}, + title = {{US} Secure Hash Algorithms ({SHA} and {HMAC-SHA})}, + month = jul, + year = 2006, + note = {RFC 4634}, +} + +@misc{ rfc4786, + author = {J. Abley and K. Lindqvist}, + title = {Operation of Anycast Services}, + month = dec, + year = 2006, + note = {RFC 4786}, +} + +@misc{ rfc4787, + author = {F. {Audet, ed.} and C. Jennings}, + title = {Network Address Translation {(NAT)} Behavioral Requirements + for Unicast {UDP}}, + month = jan, + year = 2007, + note = {RFC 4787}, +} + +@misc{ rfc4843, + author = {P. Nikander and J. Laganier and F. Dupont}, + title = {An {IPv6} Prefix for Overlay Routable Cryptographic + Hash Identifiers {(ORCHID)}}, + month = apr, + year = 2007, + note = {RFC 4843}, +} + +@misc{ rfc4864, + author = {G. {Van de Velde} and T. Hain and R. Droms and B. Carpenter + and E. Klein}, + title = {Local Network Protection for {IPv6}}, + month = may, + year = 2007, + note = {RFC 4864}, +} + +@misc{ rfc4868, + author = {S. Kelly and S. Frankel}, + title = {Using {HMAC-SHA-256}, {HMAC-SHA-384}, and {HMAC-SHA-512} + with {IPsec}}, + month = may, + year = 2007, + note = {RFC 4868}, +} + +@misc{ rfc4960, + author = "R. {Stewart, ed.}", + title = "Stream Control Transmission Protocol", + month = sep, + year = 2007, + note = "RFC 4960", +} + +@misc{ rfc4984, + author = {D. {Meyer, Ed.} and L. {Zhang, Ed.} and K. {Fall, Ed.}}, + title = {Report from the {IAB} Workshop on Routing and Addressing}, + month = sep, + year = 2007, + note = "RFC 4984", +} + +@misc{ rfc4987, + author = {W. Eddy}, + title = {{TCP} {SYN} Flooding Attacks and Common Mitigations}, + month = aug, + year = 2007, + note = "RFC 4987", +} + +@misc{ rfc5050, + author = {K. Scott and S. Burleigh}, + title = {Bundle Protocol Specification}, + month = nov, + year = 2007, + note = {RFC 5050}, +} + +@misc{ rfc5062, + author = {R. Stewart and M. Tuexen and G. Camarillo}, + title = {Security Attacks Found Against the + {Stream Control Transmission Protocol (SCTP)} + and Current Countermeasures}, + month = sep, + year = 2007, + note = {RFC 5062}, +} + +@misc{ rfc5128, + author = {P. Srisuresh and B. Ford and D. Kegel}, + title = {State of Peer-to-Peer {(P2P)} Communication across + Network Address Translators {(NATs)}}, + month = mar, + year = 2008, + note = "RFC 5128", +} + +@misc{ rfc5135, + author = {D. Wing and T. Eckert}, + title = {{IP} Multicast Requirements + for a Network Address Translator {(NAT)} + and a Network Address Port Translator {(NAPT)}}, + month = feb, + year = 2008, + note = "RFC 5135", +} + +@misc{ rfc5190, + author = {J. Quittek and M. Stiemerling and P. Srisuresh}, + title = {Definitions of Managed Objects for Middlebox Communication}, + month = mar, + year = 2008, + note = {RFC 5190}, +} + +@misc{ rfc5201, + author = {R. Moskowitz and others}, + title = {Host Identity Protocol}, + month = apr, + year = 2008, + note = {RFC 5201}, +} + +@misc{ rfc5207, + author = {M. Stiemerling and J. Quittek and L. Eggert}, + title = {{NAT} and Firewall Traversal Issues + of Host Identity Protocol {(HIP)} Communication}, + month = apr, + year = 2008, + note = {RFC 5207}, +} + +@misc{ rfc5238, + author = {T. Phelan}, + title = "{Datagram Transport Layer Security {(DTLS)} over the + Datagram Congestion Control Protocol {(DCCP)}}", + month = may, + year = 2008, + note = {RFC 5238}, +} + +% obsoleted by rfc8446 +@techreport{ rfc5246, + author = {Dierks, T. and Rescorla, E.}, + title = {\href{https://tools.ietf.org/html/rfc5246}{The Transport Layer + Security ({TLS}) Protocol Version 1.2}}, + type = {RFC}, + number = {5246}, + institution = {RFC Editor}, + year = 2008, + month = aug +} + +@misc{ rfc5382, + author = {S. {Guha, Ed.} and K. Biswas and B. Ford and + S. Sivakumar and P. Srisuresh}, + title = {{NAT} Behavioral Requirements for {TCP}}, + month = oct, + year = 2008, + note = {RFC 5382}, +} + +@misc{ rfc5389, + author = {J. Rosenberg and R. Mahy and P. Matthews and D. Wing}, + title = {Session Traversal Utilities for {NAT} {(STUN)}}, + month = oct, + year = 2008, + note = {RFC 5389}, +} + +@misc{ rfc5456, + author = {M. Spencer and B. Capouch and E. {Guy, Ed.} and + F. Miller and K. Shumard}, + title = {{IAX}: {Inter-Asterisk eXchange} Version 2}, + month = feb, + year = 2010, + note = {RFC 5456}, +} + +@misc{ rfc5533, + author = {E. Nordmark and M. Bagnulo}, + title = {Shim6: Level 3 Multihoming Shim Protocol for IPv6}, + month = jun, + year = 2009, + note = {RFC 5533}, +} + +@misc{ rfc5762, + author = {C. Perkins}, + title = {{RTP} and the Datagram Congestion Control Protocol ({DCCP})}, + month = apr, + year = 2010, + note = {RFC 5762}, +} + +@misc { rfc5849, + author = {E. Hammer-Lahav}, + title = {\href{https://tools.ietf.org/html/rfc5849}{The {OAuth} 1.0 Protocol}}, + month = apr, + year = 2010, + note = {RFC 5849}, +} + +@misc{ rfc5905, + author = {D. Mills and J. {Martin, Ed.} and J. Burbank and W. Kasch}, + title = {Network Time Protocol Version 4: + Protocol and Algorithms Specification}, + month = jun, + year = 2010, + note = {RFC 5905}, +} + +@misc{ rfc5906, + author = {B. {Haberman, Ed.} and D. Mills}, + title = {Network Time Protocol Version 4: Autokey Specification}, + month = jun, + year = 2010, + note = {RFC 5906}, +} + +@misc{ rfc6101, + title={The Secure Sockets Layer {(SSL)} Protocol Version 3.0}, + author={Freier, Alan and Karlton, Philip and Kocher, Paul}, + month = aug, + year={2011}, + note = {RFC 6101}, +} + +@misc{ rfc6347, + author = {E. Rescorla and N. Modadugu}, + title = {\href{https://tools.ietf.org/html/rfc6347}{Datagram Transport Layer Security Version 1.2}}, + month = jan, + year = 2012, + note = "RFC 6347", +} + +@techreport{ rfc6698, + author = {Hoffman, P. and Schlyter, J.}, + title = {\href{https://tools.ietf.org/html/rfc6698}{The {DNS}-Based + Authentication of Named Entities ({DANE}) Transport Layer Security ({TLS}) + Protocol: {TLSA}}}, + type = {RFC}, + number = {6698}, + institution = {RFC Editor}, + year = {2012}, + month = aug +} + +@misc { rfc6749, + author = {Ed Hardt}, + title = {\href{https://tools.ietf.org/html/rfc7009}{The {OAuth} 2.0 Authorization Framework}}, + month = oct, + year = 2012, + note = {RFC 6749}, +} + +@misc{ rfc6781, + author = {O. Kolkman and W. Mekking and R. Gieben}, + title = {\href{https://tools.ietf.org/html/rfc6781}{DNSSEC Operational Practices, Version 2}}, + month = dec, + year = 2012, + note = {RFC 6781}, +} + +@misc{ rfc6961, + author = {Y. Pettersen}, + title = {\href{https://tools.ietf.org/html/rfc6961}{The Transport Layer Security (TLS) Multiple Certificate Status Request Extension}}, + month = jun, + year = 2013, + note = {RFC 6961}, +} + +@misc{ rfc6962, + author = {B. Laurie and A. Langley and E. Kasper}, + title = {Certificate Transparency}, + month = jun, + year = 2013, + note = {RFC 6962}, +} + +@misc { rfc7009, + author = {T. Loddersted and S. Dronia and M. Scurtescu}, + title = {\href{https://tools.ietf.org/html/rfc7009}{{OAuth} 2.0 Token Revocation}}, + month = aug, + year = 2013, + note = {RFC 7009}, +} + +@misc{ rfc7530, + author = {T. Haynes and D. Noveck}, + title = {\href{https://tools.ietf.org/html/rfc7530}{Network File System {(NFS)} version 4 Protocol}}, + month = mar, + year = 2015, + note = {RFC 7530}, +} + +@misc{ rfc7540, + author = {M. Belshe and R. Peon and M. {Thomson, Ed.}}, + title = {Hypertext Transfer Protocol Version 2 {(HTTP/2)}}, + month = may, + year = 2015, + note = {RFC 7540}, +} + +@techreport{rfc8446, + author = {Rescorla, E.}, + title = {\href{https://tools.ietf.org/html/rfc8446}{The Transport Layer + Security ({TLS}) Protocol Version 1.3}}, + type = {RFC}, + number = {8446}, + institution = {RFC Editor}, + year = 2018, + month = aug +} + +%%%%% Internet-Drafts + +@misc{ rescorla20encrypted, + author = {E. Rescorla and K. Oku and N. Sullivan and C.A. Wood}, + title = "{\href{https://tlswg.org/draft-ietf-tls-esni/draft-ietf-tls-esni.html}{Encrypted Server Name Indication for TLS 1.3}}", + month = feb, + year = 2020, + note = "Internet-Draft draft-ietf-tls-esni-latest (Work in Progress)", +} + +@misc{ wing10happy, + author = {Dan Wing and Andrew Yourtchenko}, + title = "{Happy Eyeballs: Trending Towards Success with Dual-Stack Hosts}", + month = oct, + year = 2010, + note = "Internet-Draft draft-wing-v6ops-happy-eyeballs-ipv6-01 (Work in Progress)", +} + +@misc{ ford10tcp, + author = {Alan Ford and Costin Raiciu and Mark Handley}, + title = "{TCP Extensions for Multipath Operation with Multiple Addresses}", + month = oct, + year = 2010, + note = "Internet-Draft draft-ietf-mptcp-multiaddressed-02 (Work in Progress)", +} + +@misc{ manner10generic, + author = {J. Manner and N. Varis and B. Briscoe}, + title = "{Generic UDP Tunnelling (GUT)}", + month = jul, + year = 2010, + note = "Internet-Draft draft-manner-tsvwg-gut-02 (Work in Progress)", +} + +@misc{ tuexen10udp, + author = {Michael Tuexen and Randall Stewart}, + title = "{UDP Encapsulation of SCTP Packets}", + month = jan, + year = 2010, + note = "Internet-Draft draft-tuexen-sctp-udp-encaps-05 (Work in Progress)", +} + +@misc{ phelan10dccp, + author = {T. Phelan}, + title = "{DCCP Encapsulation in UDP for NAT Traversal (DCCP-UDP)}", + month = aug, + year = 2010, + note = "Internet-Draft draft-ietf-dccp-udpencap-02 (Work in Progress)", +} + +@misc{ falk07specification, + author = {Aaron Falk and Yuri Pryadkin and Dina Katabi}, + title = {Specification for the Explicit Control Protocol (XCP)}, + month = jul, + year = 2007, + note = "Internet-Draft draft-falk-xcp-spec-03 (Expired)", +} + +@misc{ odell97gse, + author = {Mike O'Dell}, + title = {{GSE} - An Alternate Addressing Architecture for IPv6}, + month = feb, + day = 24, + year = 1997, + note = "Internet-Draft (Work in Progress)", +} + +@misc{ cheshire04dynamic, + author = "Stuart Cheshire and Bernard Aboba and Erik Guttman", + title = "Dynamic Configuration of {IPv4} Link-Local Addresses", + month = jul, + year = "2004", + note = "Internet-Draft (Work in Progress)", +} + +@misc{ jennings04nat, + author = {C. Jennings}, + title = {{NAT} Classification Results using {STUN}}, + month = oct, + year = {2004}, + note = "Internet-Draft (Work in Progress)", +} + +@misc{ huitema04teredo, + author = "C. Huitema", + title = "Teredo: Tunneling {IPv6} over {UDP} through {NATs}", + month = mar, + year = "2004", + note = "Internet-Draft (Work in Progress)", +} + +% obsoleted by rfc4423 +@misc{ moskowitz03hip-arch, + author = "R. Moskowitz and P. Nikander", + title = "Host Identity Protocol Architecture", + month = apr, + year = "2003", + note = "Internet-Draft (Work in Progress)", +} + +@misc{ perkins02adhoc, + author = "Charles E. Perkins and Elizabeth M. Belding-Royer + and Samir Das", + title = "Ad Hoc On-Demand Distance Vector {(AODV)} Routing", + + note = "Internet-Draft (Work in Progress)", + month = jan, + year = "2002", +} + +@misc{ ylonen02ssh, + author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and S. Lehtinen", + title = "{SSH} Protocol Architecture", + month = sep, + year = "2002", + note = "Internet-Draft (Work in Progress)", +} + +@misc{ rosenberg07ice, + author = "J. Rosenberg", + title = "Interactive Connectivity Establishment {(ICE)}", + month = oct, + day = 29, + year = "2007", + note = "Internet-Draft (Work in Progress)", +} + +@misc{ rosenberg03traversal, + author = "J. Rosenberg and C. Huitema and R. Mahy", + title = "Traversal Using Relay {NAT} {(TURN)}", + month = oct, + year = "2003", + note = "Internet-Draft (Work in Progress)", +} + +@misc{ touch06tcp, + author = "J. Touch", + title = "A {TCP} Option for Port Names", + month = apr, + year = 2006, + note = "Internet-Draft (Work in Progress)", +} + +@misc{ spencer06iax2, + author = {M. Spencer and others}, + title = {{IAX2}: {Inter-Asterisk eXchange} Version 2}, + month = oct, + date = 23, + year = 2006, + note = "Internet-Draft (Work in Progress)", +} + +% Note: obsoleted by RFC 4787 +@misc{ audet06nat, + author = "F. {Audet, ed.} and C. Jennings", + title = "NAT Behavioral Requirements for Unicast UDP", + month = oct, + year = 2006, + note = "Internet-Draft (Work in Progress)", +} + +@misc{ ong00tunneling, + author = {L. Ong and R. Stewart and Q. Xie}, + title = {Tunneling of {SCTP} over Single {UDP} Port}, + month = mar, + year = 2000, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ guha07nat, + author = {S. {Guha, Ed.} and K. Biswas and B. Ford + and S. Sivakumar and P. Srisuresh}, + title = {{NAT} Behavioral Requirements for {TCP}}, + month = apr, + day = 28, + year = 2007, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ tuexen07udp, + author = {M. Tuexen and R. Stewart}, + title = {{UDP} Encapsulation of {SCTP} Packets}, + month = mar, + day = 19, + year = 2013, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ woodyatt08application, + author = {J H. Woodyatt}, + title = {Application Listener Discovery {(ALD)} for {IPv6}}, + month = dec, + day = 21, + year = 2007, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ phelan08datagram, + author = {T. Phelan}, + title = {Datagram Congestion Control Protocol {(DCCP)} + Encapsulation for {NAT} Traversal {(DCCP-NAT)}}, + month = feb, + year = 2008, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ cotton08iana, + author = {M. Cotton and others}, + title = {{IANA} Allocation Guidelines for {TCP} and {UDP} Port Numbers}, + month = feb, + year = 2008, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ rosenberg08udp, + author = {J. Rosenberg}, + title = {{UDP} and {TCP} as the New Waist of the {Internet} Hourglass}, + month = feb, + year = 2008, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ stiemerling08nat, + author = {M. Stiemerling and H. Tschofenig and C. Aoun and E. Davies}, + title = {{NAT}/Firewall {NSIS} Signaling Layer Protocol {(NSLP)}}, + month = nov, + year = 2008, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ denis08udp, + author = {R. Denis-Courmont}, + title = {{UDP}-Encapsulated Transport Protocols}, + month = jul, + year = 2008, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ larsen09port, + author = {M. Larsen and F. Gont}, + title = {Port Randomization}, + month = nov, + year = 2009, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ ford09architectural, + author = {A. {Ford, Ed.} and others}, + title = {Architectural Guidelines for Multipath {TCP} Development}, + month = oct, + year = 2009, + note = {Internet-Draft (Work in Progress)}, +} + +@misc{ ford11architectural, + author = {A. {Ford, Ed.} and C. Raiciu and M. Handley and S. Barre and J. Iyengar}, + title = {Architectural Guidelines for Multipath {TCP} Development}, + month = jan, + year = 2011, + note = {Internet-Draft (Work in Progress)}, +} + + +%%%%% Misc + +@misc{ tng, + author = {Bryan Ford and Janardhan Iyengar}, + title = {{Tng}: Transport Next-Generation -- + Refactoring the {Internet}'s Transport Architecture}, + year = 2009, + note = {\url{http://dedis.cs.yale.edu/2009/tng/}}, +} + +@misc{ nsf0916413, + author = {Bryan Ford and Janardhan Iyengar}, + title = {{Tng}, a Next Generation Transport Services Architecture}, + note = {NSF collaborative grants CNS-0916413 and CNS-0916678, + awarded for August 1, 2009--July 31, 2011. + \url{http://dedis.cs.yale.edu/2009/tng/}}, +} + +@misc{ flash10security, + author = {{Adobe Systems, Inc.}}, + title = {{Adobe Flash Player 10} Security}, + month = nov, + year = 2008, + note = {\url{http://www.adobe.com/devnet/flashplayer/articles/flash_player10_security_wp.html}}, +} + +@misc{ flashplayer, + author = {{Adobe Systems, Inc.}}, + title = {Adobe Flash Player}, + month = jul, + year = 2010, + note = {\url{http://www.adobe.com/products/flashplayer/}}, +} + +@misc{ acrobat, + author = {{Adobe Systems, Inc.}}, + title = {Adobe Acrobat Reader}, + month = jul, + year = 2010, + note = {\url{http://get.adobe.com/reader/}}, +} + +@misc{ IIS-0534198, + author = {Vitaly Shmatikov and Joan Feigenbaum}, + title = {New Privacy Frameworks for Collaborative Information Sharing}, + note = {NSF grants IIS-0534198 and IIS-0534052, + awarded Jan 1, 2006--Dec 31, 2009. + \url{http://userweb.cs.utexas.edu/~shmat/privacyframeworks/}} +} + +@misc{ CNS-0716158, + author = {Vitaly Shmatikov and Joan Feigenbaum and Sampath Kannan}, + title = {Massive-Dataset Algorithmics for Network Security}, + note = {NSF grants CNS-0716158, CNS-0716172, and CNS-0716223, + awarded Oct 1, 2007 - Sep 30, 2010. + \url{http://userweb.cs.utexas.edu/~shmat/mds-security/}} +} + +@misc{ wsdef, + author = {W3C}, + title = {Web Services}, + year = 2002, + note = {\url{http://www.w3.org/2002/ws/desc/}}, +} + +@misc{ websocket, + author = {W3C}, + title = {The {WebSocket} {API} (draft)}, + year = 2011, + note = {\url{http://dev.w3.org/html5/websockets/}}, +} + +@misc{ cisco-rbscp, + author = {Cisco}, + title = "{Rate-Based Satellite Control Protocol}", + year = 2006, +} + +@misc{ cloc, + author = "Al Danial", + title = "{Counting Lines of Code}", + note = {\url{http://cloc.sourceforge.net/}} +} + +@misc{ NoQ, + author = {Marc Herbert}, + title = {NoQ: back-pressured/blocking IP networks}, + month = jan, + year = 2005, + note = {\url{http://marc.herbert.free.fr/noq/}}, +} + +@misc{ speex, + author = {Jean-Marc Valin}, + title = {The Speex Codec Manual Version 1.2 Beta 3}, + month = dec, + year = 2007, + note = {\url{http://www.speex.org/}}, +} + +@misc{ internet-speed, + author = {www.speedmatters.org}, + title = {2010 Report on Internet Speeds in All 50 States}, + month = Nov, + year = 2010, + note = {\url{http://www.speedmatters.org/content/internet-speed-report}}, +} + + +@misc{UTXO, + author = {Satoshi.info}, + title = {\href{https://statoshi.info/dashboard/db/unspent-transaction-output-set}{Unspent Transaction Output Set}}, + month = Feb, + year = 2017, +} + + + +@misc{blockchain_size, + author = {Blockchain.info}, + title = {\href{https://blockchain.info/charts/blocks-size}{Blockchain Size}}, + month = Feb, + year = 2017, +} + + +@misc{ zeromq, + title = {{\O{}MQ}: The Intelligent Transport Layer}, + note = {\url{http://www.zeromq.org}}, +} + +@inproceedings{ yang03superpeer, + author = {Beverly Yang, B. and Garcia-Molina, H.}, + booktitle = {\bibbrev{ICDE} International Conference on Data Engineering}, + title= {Designing a super-peer network}, + year= {2003}, + month= {march}, + pages= {49 - 60}, +} + +@inproceedings{ stjuste11litter, + author={Pierre St Juste and David Isaac Wolinsky and P. Oscar Boykin, Renato J. Figueiredo}, + booktitle={Social Computing (SocialCom), 2011 IEEE Third International Conference on}, + title={Litter: A Lightweight Peer-to-Peer Microblogging Service}, + year={2011}, + month={oct.}, +} + +@conference { bennet03gap, + title = {gap - Practical Anonymous Networking}, + booktitle = {Designing Privacy Enhancing Technologies}, + year = {2003}, + pages = {141{\textendash}160}, + author = {Krista Bennett and Christian Grothoff} +} + +@misc{ oikarinen93irc, + author = {J. Oikarinen and D. Reed}, + title = {{RFC} 1459 Internet Relay Chat Protocol}, + year = {1993}, + month = {May} +} + +@inproceedings{raymond00, + title = {{Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems}}, + author = {Jean-Fran\c{c}ois Raymond}, + booktitle = {Design Issues in Anonymity and Unobservability}, + year = {2000}, + month = {July}, +} + +@inproceedings{wright02, + title = {An Analysis of the Degradation of Anonymous Protocols}, + author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields}, + booktitle = {Proceedings of NDSS '02}, + year = {2002}, + month = {February}, +} + +@inproceedings{onion-routing:ih96, + title = {{Hiding Routing Information}}, + author = {Goldschlag, David M. and Reed, Michael G. and Syverson, Paul F.}, + booktitle = {1st International Workshop on Information Hiding}, + year = {1996}, + month = {May}, +} + +@inproceedings{onion-routing:pet2000, + title = {{Towards an Analysis of Onion Routing Security}}, + author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr}, + booktitle = {Design Issues in Anonymity and Unobservability}, + year = {2000}, + month = {July} +} + +@misc{anonymizer, + key = {Anonymizer}, + title = {Anonymizer}, + note = {\url{http://anonymizer.com/}}, + year = {2012}, + month = {September} +} + +@inproceedings{rhea05planetlab, + author = {Rhea, Sean and Chun, Byung-Gon and Kubiatowicz, John and Shenker, Scott}, + title = {Fixing the embarrassing slowness of {OpenDHT} on {PlanetLab}}, + booktitle = {\bibconf{WORLDS}{Conference on Real, Large Distributed Systems}}, + year = {2005}, +} + +@inproceedings{ franklin06fingerprinting, + author = {Franklin, Jason and McCoy, Damon and Tabriz, Parisa and Neagoe, Vicentiu and Van Randwyk, Jamie and Sicker, Douglas}, + title = {Passive data link layer 802.11 wireless device driver fingerprinting}, + booktitle = {USENIX Security Symposium}, + year = {2006}, +} + +@inproceedings{ brik08fingerprinting, + author = {Brik, Vladimir and Banerjee, Suman and Gruteser, Marco and Oh, Sangho}, + title = {Wireless device identification with radiometric signatures}, + booktitle = {ACM International Conference on Mobile Computing and Networking (MobiCom)}, + year = {2008}, +} + +@misc{ panopticlick, + author = {Electronic Frontier Foundation}, + year = {2013}, + month = {Oct}, + howpublished = {\url{https://panopticlick.eff.org/}}, +} + +@misc{ mullenize, + author = {Washington Post}, + howpublished = {\url{http://apps.washingtonpost.com/g/page/world/gchq-report-on-mullenize-program-to-stain-anonymous-electronic-traffic/502/}}, + year = {2013}, + month = {oct}, + title = {{GCHQ} report on {`MULLENIZE'} program to `stain' anonymous electronic traffic}, +} + +@misc{ torpluggable, + author = {{Tor}}, + year = {2013}, + month = {oct}, + title = {PluggableTransports}, + howpublished = {\url{https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports}}, +} + +@misc{iPlane, + title = {{iPlane Datasets}}, + note = {\url{http://iplane.cs.washington.edu/data/data.html}} +} + +@misc{IXP, + title = {{IXPs Datasets}}, + note = {\url{http://www-rp.lip6.fr/~augustin/ixp/}} +} + +@misc{nsdminer, + title = {{NSDMiner}}, + note = {\url{http://sourceforge.net/projects/nsdminer}} +} + +@book{gano03apollo, + author = {Dean L Gano}, + title = {Apollo root cause analysis: {A} new way of thinking}, + publisher = {Apollonian Publications}, + year = 2003 +} + +@misc{hidemyass, + note = {\url{http://blog.hidemyass.com/2011/09/23/lulzsec-fiasco/}}, + title = {Lulzsec fiasco}, + author = {Hide My Ass!}, +} + +@misc{ geodns, + title = "Geo{DNS}", + key = "GeoDNS", + note = {\url{http://www.caraytech.com/geodns/}}, +} + +@misc{ ghedini18you, + title = {You get {TLS} 1.3! You get {TLS} 1.3! Everyone gets {TLS} 1.3!}, + author = {Alessandro Ghedini}, + month = may, + year = 2018, + howpublished = + {\url{https://blog.cloudflare.com/you-get-tls-1-3-you-get-tls-1-3-everyone-gets-tls-1-3/}} +} + +@inproceedings{recordon06openid, + title={{OpenID 2.0: A platform for user-centric identity management}}, + author={Recordon, David and Reed, Drummond}, + booktitle={Proceedings of the second ACM workshop on Digital identity management}, + year={2006}, + organization={ACM} +} + + +@misc{paypalapi, + title = {{Paypal Developer API}}, + key = {Paypal Developer API}, + note = {\url{https://developers.paypal.com/}}, +} + + +@misc{facebookgraph, + title = {{Facebook Graph API}}, + key = {Facebook Graph API}, + note = {\url{https://developers.facebook.com/}}, +} + +@misc{yalecas, + title = {Using {CAS} at Yale: A Quick Introduction}, + key = {Using CAS at Yale: A Quick Introduction}, + note = {\url{http://www.yale.edu/tp/auth/usingcasatyale.html}}, + year = 2015, + month = jan, +} + +@misc{github, + title = {{GitHub}}, + key = {GitHub}, + note = {\url{https://www.github.com}}, + year = {2015}, + month = jan, +} + +@misc{cothority, + title = {{DeDiS cothority}}, + key = {DeDiS Cothority}, + note = {\url{https://www.github.com/dedis/cothority}}, + year = {2016}, + month = sep, +} + +@misc{crypto, + title = {{Yale crypto library}}, + key = {Crypto Library}, + note = {\url{https://www.github.com/dedis/crypto}}, + year = {2016}, + month = sep, +} + +@misc{golang, + title = {\href{http://golang.org/}{The {Go} Programming Language}}, + key = {golang}, + year = {2018}, + month = feb, +} +% note = {\url{http://golang.org/}}, + +@misc{golang-tls, + title={Package tls}, + key = {golang-tls}, + note = {\url{https://golang.org/pkg/crypto/tls/}} +} + +@article{evans11certificate, + title={Certificate pinning extension for {HSTS}}, + author={Evans, Chris and Palmer, Chris}, + year={2011} +} + +@misc{privacyIdea, + title = {\href{https://www.privacyidea.org}{Authentication System privacyIDEA}}, + year={2016}, + month=may +} + +@misc{mininet, + key = {mininet}, + title = {\href{http://mininet.org/}{Mininet -- An Instant Virtual Network on your Laptop (or other PC)}}, + year={2018}, + month=feb +} + + +@misc{wikipedia16sharding, + title = {\href{https://en.wikipedia.org/wiki/Shard_(database_architecture) +}{Shard (database architecture)}}, + author = {Wikipedia}, + year={2017}, + month=feb +} + +@misc{wiki-atomicity, + title = {\href{https://en.wikipedia.org/wiki/Atomicity_(database_systems) +}{Atomicity (database systems)}}, + author = {Wikipedia}, + year={2017}, + month=feb +} + +@misc{wiki-AC, + title = {\href{https://en.wikipedia.org/wiki/Atomic_commit +}{Atomic commit}}, + author = {Wikipedia}, + year={2017}, + month=feb +} + +@misc{bitcoin-waste, + title = {\href{https://motherboard.vice.com/en_us/article/bitcoin-could-consume-as-much-electricity-as-denmark-by-2020 +}{Bitcoin Could Consume as Much Electricity as Denmark by 2020}}, + author = {Sebastiaan Deetman}, + year={2016}, + month=may +} + +@misc{bitcoin-centralized, + title = {\href{http://hackingdistributed.com/2014/06/13/time-for-a-hard-bitcoin-fork/ +}{It's Time For a Hard Bitcoin Fork}}, + author = {Ittay Eyal,Emin Gün Sirer}, + year={2014}, + month=jun +} + + diff --git a/pdf/os.bib b/pdf/os.bib new file mode 100644 index 0000000..9a76bc6 --- /dev/null +++ b/pdf/os.bib @@ -0,0 +1,10623 @@ +% PLEASE KEEP THE BIBLIOGRAPHY ENTRIES IN ALPHABETICAL ORDER! Thank you. -Bryan + +% A few stylistic standards used in these bib entries, +% designed for brevity without sacrificing essential completeness +% (most entries fit on two lines in footnotesize): +% - Short and long conference titles including conference numbers: +% e.g., \bibconf[17th]{SOSP}{ACM Symposium on Operating System Principles} +% - Use "and others" for papers with more than three or four authors +% - No publisher for conference proceedings; conference name is enough. + +%A + +@inproceedings{ abadi10case, + author = {Alexander Thomson and Daniel J. Abadi}, + title = {\href{https://dl.acm.org/doi/10.14778/1920841.1920855}{The case for determinism in database systems}}, + booktitle = {VLDB}, + month = sep, + year = 2010, + }, + +@article{abdelmalek05QU, + author = {Abd-El-Malek, Michael and Ganger, Gregory R. and Goodson, Garth R. and Reiter, Michael K. and Wylie, Jay J.}, + title = {\href{http://doi.acm.org/10.1145/1095809.1095817}{Fault-scalable Byzantine Fault-tolerant Services}}, + journal = {SIGOPS Operating Systems Review}, + issue_date = {December 2005}, + volume = {39}, + number = {5}, + month = oct, + year = {2005}, + issn = {0163-5980}, + pages = {59--74}, + numpages = {16}, + url = {http://doi.acm.org/10.1145/1095809.1095817}, + doi = {10.1145/1095809.1095817}, + acmid = {1095817}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {byzantine fault-tolerance, fault-scalability, quorums, replicated state machines, services}, +} + +@inproceedings{ abraham04compact, + author = {Ittai Abraham and others}, + title = {Compact Name-Independent Routing with Minimum Stretch}, + booktitle = {\bibconf[16th]{SPAA}{ACM Symposium on Parallelism + in Algorithms and Architectures}}, + month = jun, + year = 2004, + location = {Barcelona, Spain}, +} + +@misc{ abi08wifi, + author = {{ABI Research}}, + title = {{Wi-Fi} Hotspots Stay Hot in 2008}, + month = jul, + day = 17, + year = 2008, + url = {http://www.abiresearch.com/press/1187-Wi-Fi+Hotspots+Stay+Hot+in+2008}, +} + +@inproceedings{ acharya00mapbox, + author = {Anurag Acharya and Mandar Raje}, + title = {{MAPbox}: {U}sing Parameterized Behavior Classes + to Confine Applications}, + booktitle = {9th USENIX Security Symposium}}, + month = aug, + year = 2000, +} + +% author = {Onur Ac\i{}i\c{c}mez and \c{C}etin Kaya Ko\c{c} and +% Jean-Pierre Seifert}, + +@incollection{aciiccmez06cache, + title={Cache based remote timing attack on the {AES}}, + author={Ac{\i}i{\c{c}}mez, Onur and Schindler, Werner and Ko{\c{c}}, {\c{C}}etin K}, + booktitle={Topics in Cryptology--CT-RSA 2007}, + pages={271--286}, + year={2006}, + publisher={Springer} +} + +@inproceedings{ aciicmez07predicting, + author = {Onur Ac\i{}i\c{c}mez and others}, + title = {Predicting Secret Keys Via Branch Prediction}, + booktitle = {\bibconf{CT-RSA}{Cryptographers' Track - {RSA} Conference}}, + month = feb, + year = 2007, + location = {San Francisco, CA}, +} + +@inproceedings{ aciicmez07yet, + author = {Onur Ac\i{}i\c{c}mez}, + title = {Yet Another MicroArchitectural Attack: Exploiting {I-cache}}, + booktitle = {\bibconf[1st]{CCAW}{ACM Workshop on Computer Security Architecture}}, + month = nov, + year = 2007, + location = {San Jose, CA}, +} + +@inproceedings{ adams06vmware, + author = "Keith Adams and Ole Agesen", + title = "A Comparison of Software and Hardware Techniques + for x86 Virtualization", + booktitle = {\bibconf[12th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages and + Operating Systems}}, + month = dec, + year = 2006, +} + +@article{ adar00freeriding, + author = {Eytan Adar and Bernardo A. Huberman}, + title = {Free Riding on Gnutella}, + journal = {First Monday}, + volume = 5, + number = 10, + month = oct, + year = 2000, +} + +@inproceedings{ adibi06multipath, + author = {Sasan Adibi and Shervin Erfani}, + title = {A Multipath Routing Survey for Mobile Ad-Hoc Networks}, + booktitle = {\bibconf{CCNC}{IEEE Consumer Communications + and Networking Conference}}, + month = jan, + year = 2006, + location = {Las Vegas, NV}, +} + +@inproceedings{ adiseshu96reliable, + author = {H. Adiseshu and Guru Parulkar and George Varghese}, + title = {A Reliable and Scalable Striping Protocol}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + year = 1996, + month = aug +} + +@inproceedings{aditya95ph, + author = {Shail Aditya and Arvind and Lennart Augustsson and + Jan-Willem Maessen and Rishiyur S. Nikhil}, + title = {Semantics of p{H}: A parallel dialect of {H}askell}, + booktitle = {Proceedings of the {H}askell {W}orkshop}, + editor = {Paul Hudak}, + year = {1995}, + location = {La Jolla, CA}, + month = jun, + pages = {35--49}, +} + +@inproceedings{ adjie-winoto99ins, + author = "William Adjie-Winoto and others", + title = "The design and implementation of an intentional naming system", + booktitle = "\bibconf[17th]{SOSP}{ACM Symposium + on Operating System Principles}", + location = "Kiawah Island, SC", + month = dec, + year = "1999", + url = "http://nms.lcs.mit.edu/papers/ins-sosp99.html", +} + +@book{ adobe99postscript, + author = {{Adobe Systems Inc.}}, + title = {{PostScript} Language Reference}, + publisher = {Addison Wesley}, + year = 1999, + month = mar, + pages = {912}, + edition = {3rd}, + isbn = {0201379228}, +} + +@inproceedings{ afek89upper, + author = {Yehuda Afek and Eli Gafni and Moty Ricklin}, + title = {Upper and Lower Bounds for Routing Schemes + in Dynamic Networks}, + booktitle = {\bibconf[30th]{FOCS}{Annual Symposium on + Foundations of Computer Science (FOCS)}}, + month = oct, + year = 1989, + pages = "370-375", +} + +@article{agrawal91backtracking, + author={Agrawal, H. and De Millo, R.A. and Spafford, E.H.}, + journal={IEEE Software}, + title={An execution-backtracking approach to debugging}, + year={1991}, + month = may, + volume={8}, + number={3}, + pages={21--26}, +} + +@inproceedings{agrawal03information, + author = {Rakesh Agrawal and + Alexandre V. Evfimievski and + Ramakrishnan Srikant}, + title = {Information sharing across private databases}, + booktitle = {\bibconf{SIGMOD}{ACM International Conference on + Management of Data}}, + location = {San Diego, CA}, + month = jun, + year = 2003 +} + +@inproceedings{aguilera03performance, + author = {Marcos Kawazoe Aguilera and + Jeffrey C. Mogul and + Janet L. Wiener and + Patrick Reynolds and + Athicha Muthitacharoen}, + title = {Performance Debugging for Distributed Systems of + Black Boxes}, + booktitle = {\bibconf[19th]{SOSP}{ACM Symposium on Operating + Systems Principles}}, + location = {Bolton Landing, NY}, + month = oct, + year = 2003 +} + + +@inproceedings{ajmani02conchord, + author = {Sameer Ajmani and Dwaine E. Clarke and Chuang-Hue Moh and + Steven Richman}, + title = {{ConChord}: Cooperative {SDSI} Certificate Storage and Name + Resolution}, + booktitle = {\bibconf[1st]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + number = {2429}, + pages = {141--154}, + month = mar, + year = {2002} +} + +@article{ akyildiz01tcp, + author = {Ian F. Akyildiz and Giacomo Morabito and Sergio Palazzo}, + title = {{TCP-Peach}: A New Congestion Control Scheme for + Satellite {IP} Networks}, + journal = {Transactions on Networking}, + volume = 9, + number = 3, + month = jun, + year = 2001, +} + +@article{ akyildiz05wireless, + author = {Ian F. Akyildiz and Xudong Wang and Weilin Wang}, + title = {Wireless mesh networks: a survey}, + journal = {Computer Networks}, + volume = 47, + number = 4, + month = mar, + year = 2005, +} + +@article{ al04ls-sctp, + author = {Ahmed Abd El Al and Tarek Saadawi and Myung Lee}, + title = {{LS-SCTP}: a bandwidth aggregation technique for + stream control transmission protocol}, + journal = {Computer Communications}, + volume = 27, + number = 10, + pages = {1012-1024}, + month = jun, + year = 2004, +} + +@inproceedings{ albuquerque00network, + author = {C\'elio Albuquerque and Brett J. Vickers and Tatsuya Suda}, + title = {Network Border Patrol}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 2000, + location = {Tel-Aviv, Israel}, +} + +@article{ albuquerque04network, + author = {C\'elio Albuquerque and Brett J. Vickers and Tatsuya Suda}, + title = {Network Border Patrol: Preventing Congestion Collapse and + Promoting Fairness {in the Internet}}, + journal = {Transactions on Networking}, + volume = 12, + number = 1, + month = feb, + year = 2004, +} + +@misc{ alexandrov98consh, + author = "A. Alexandrov and P. Kmiec and K. Schauser", + title = "Consh: A confined execution environment + for Internet computations", + year = "1998", + url = "citeseer.ist.psu.edu/alexandrov99consh.html", +} + +@inproceedings{ allman96application, + author = {Mark Allman and Hans Kruse and Shawn Ostermann}, + title = {An Application-Level Solution to + {TCP}'s Satellite Inefficiencies}, + booktitle = {\bibconf[1st]{WOSBIS}{Workshop on Satellite-based + Information Services}}, + location = {Rye, New York}, + month = nov, + year = 1996, +} + +@inproceedings{ allman97tcp, + author = {Mark Allman and Chris Hayes and Hans Kruse + and Shawn Ostermann}, + title = {{TCP} Performance over Satellite Links}, + booktitle = {5th International Conference on Telecommunication Systems}, + location = {Nashville, TN}, + month = mar, + year = 1997, +} + +% Protean paper in HotOS '19 workshop +@inproceedings{ alp19rethinking, + author = {Enis Ceyhun Alp and Eleftherios Kokoris-Kogias and + Georgia Fragkouli and Bryan Ford}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/3317550.3321448}{Rethinking General-Purpose Decentralized Computing}}, + booktitle = {\bibconf{HotOS}{Workshop on Hot Topics in Operating Systems}}, + month = may, + year = 2019, + location = {Bertinoro Italy}, +} + +@inproceedings{ altman00fairness, + author = {Eitan Altman and Chadi Barakat and Emmanuel Laborde}, + title = {Fairness Analysis of {TCP/IP}}, + booktitle = {39th IEEE Conference on Decision and Control}, + month = dec, + year = 2000, +} + +@article{ almes85eden, + author = {Guy T. Almes and Andrew P. Black and + Edward D. Lazowska and Jerre D. Noe}, + title = {The {Eden} System: A Technical Review}, + journal = {IEEE Transactions on Software Engineering}, + volume = {SE-11}, + number = 1, + month = jan, + year = 1985, + pages = {43-59}, +} + +@misc{ amd02x86-64, + author = {{Advanced Micro Devices, Inc.}}, + title = {{AMD} x86-64 Architecture Programmer's Manual}, + year = 2002, + month = sep, +} + +@misc{ amd07, + author = {{Advanced Micro Devices, Inc.}}, + title = {{AMD64} Architecture Programmer's Manual}, + month = sep, + year = 2007, +} + +@article{ amir11byzantine, + author = {Yair Amir and Brian Coan and Jonathan Kirsch + and John Lane}, + title = {{Prime}: {Byzantine} Replication under Attack}, + journal = {IEEE Transactions on Dependable and Secure Computing}, + volume = 8, + number = 4, + month = jul, + year = 2011, + pages = {564-577}, +} + +@article{ amza96treadmarks, + author = {Cristiana Amza and Alan L. Cox and Sandhya Dwarkadas and + Pete Keleher and Honghui Lu and Ramakrishnan Rajamony and Weimin Yu + and Willy Zwaenepoel}, + title = {{TreadMarks}: Shared Memory Computing + on Networks of Workstations}, + journal = {IEEE Computer}, + month = feb, + year = 1996, + volume = 29, + number = 2, + pages = {18-28}, +} + +@misc{ anderson01analysis, + author = {Jason Anderson}, + title = {An Analysis of Fragmentation Attacks}, + month = mar, + day = 15, + year = 2001, + note = {\url{http://www.ouah.org/fragma.html}}, +} + +@inproceedings{ andersen01resilient, + author = "David G. Andersen and others", + title = "Resilient Overlay Networks", + booktitle = "\bibconf[18th]{SOSP}{ACM Symposium + on Operating Systems Principles}", + location = "Banff, Canada", + month = oct, + year = "2001", + url = "http://nms.lcs.mit.edu/projects/ron/", +} + +@inproceedings{ anglano04file, + author = {Cosimo Anglano and Massimo Canonico}, + title = {The File Mover: An Efficient Data Transfer System + for Grid Applications}, + booktitle = {\bibconf[2nd]{GAN}{International Workshop on + Grids and Advanced Networks}}, + location = {Chicago, IL}, + month = apr, + year = 2004, +} + +@misc{ ansi05ecdsa, + author = {{American National Standards Institute}}, + title = {Elliptic Curve Digital Signature Algorithm {(ECDSA)}}, + year = 2005, + note = {ANSI X9.62:2005}, +} + +@inproceedings{ apostolopoulos99transport, + author = {George Apostolopoulos and Vinod Peris and Debanjan Saha}, + title = {Transport Layer Security: How much does it really cost?}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 1999, + location = {New York, NY}, +} + +@inproceedings{ apostolopoulos02multiple, + author = {John Apostolopoulos and Tina Wong and Wai-tian Tan + and Susie Wee}, + title = {On Multiple Description Streaming with + Content Delivery Networks}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + month = jun, + year = 2002, + location = {New York, NY}, +} + +@inproceedings{appel99pca, + title = "Proof-Carrying Authentication", + author = "Andrew W. Appel and Edward W. Felten", + booktitle = "\bibconf[6th]{ACM CCS}{ACM Conference on + Computer and Communications Security}", + month = nov, + year = 1999, +} + +@inproceedings{ argyriou03bandwidth, + author = {Antonios Argyriou and Vijay Madisetti}, + title = {Bandwidth Aggregation with SCTP}, + booktitle = {\bibconf{GLOBECOM}{IEEE Global Telecommunications + Conference}}, + location = {San Francisco, CA}, + month = dec, + year = 2003, +} + +@inproceedings{ arias03compact, + author = "Marta Arias and others", + title = "Compact Routing with Name Independence", + booktitle = {\bibconf[15th]{SPAA}{ACM Symposium on Parallelism + in Algorithms and Architectures}}, + location = "San Diego, CA", + month = jun, + year = "2003", +} + +@inproceedings{ artho03high, + author = {Cyrille Artho and Klaus Havelund and Armin Biere}, + title = {High-Level Data Races}, + booktitle = {\bibconf{VVEIS}{Workshop on Verification and Validation + of Enterprise Information Systems}}, + pages = {82-93}, + location = {Angers, France}, + month = apr, + year = 2003, +} + +@misc{ armstrong08virtualization, + author = {Ben Armstrong}, + title = {Virtualization Clustering and Processor Compatibility}, + month = feb, + year = 2008, + note = {\url{http://blogs.msdn.com/virtual_pc_guy/archive/2008/02/19/virtualization-clustering-and-processor-compatibility.aspx}} +} + +@incollection{ arvind1988two, + author = {Arvind and Iannucci, Robert}, + title = {Two fundamental issues in multiprocessing}, + booktitle = {Parallel Computing in Science and Engineering}, + series = {Lecture Notes in Computer Science}, + editor = {Dierstein, R/"{u}diger and M/"{u}ller-Wichards, Dieter and + Wacker, Hans-Martin}, + pages = {61--88}, + volume = {295}, + note = {\url{http://dx.doi.org/10.1007/3-540-18923-8_15}}, + year = {1988}, +} + +@article{arvind1989Istructures, + author = {Arvind and Rishiyur S. Nikhil and Keshav K. Pingali}, + title = {{I}-structures: data structures for parallel computing}, + journal = {ACM Transactions on Programming Languages and Systems (TOPLAS)}, + issue_date = {Oct. 1989}, + volume = 11, + number = 4, + month = oct, + year = 1989, + issn = {0164--0925}, + pages = {598--632}, + numpages = {35}, + url = {\url{http://doi.acm.org/10.1145/69558.69562}}, + doi = {10.1145/69558.69562}, + acmid = {69562}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@article{arvind1990executing, + author={Arvind and Rishiyur S. Nikhil}, + title={Executing a program on the {MIT} tagged-token dataflow architecture }, + journal={IEEE Transactions on Computers}, + year={1990}, + month = mar, + volume={39}, + number={3}, + pages={300--318}, + doi={10.1109/12.48862}, + ISSN={0018-9340}, +} + +@article{ asanovic09landscape, + author = {Krste Asanovic and Rastislav Bodik and James Demmel and + Tony Keaveny and Kurt Keutzer and John Kubiatowicz and Nelson Morgan and + David Patterson and Koushik Sen and John Wawrzynek and David Wessel and + Katherine Yelick}, + title = {A view of the parallel computing landscape}, + journal = {Communications of the ACM}, + volume = {52}, + number = {10}, + month = oct, + year = {2009}, + pages = {56--67}, +} + +@article{aublin15bft, + author = {Aublin, Pierre-Louis and Guerraoui, Rachid and Kne\v{z}evi\'{c}, Nikola and Qu{\'e}ma, Vivien and Vukoli\'{c}, Marko}, + title = {The Next 700 {BFT} Protocols}, + journal = {ACM Trans. Comput. Syst.}, + issue_date = {January 2015}, + volume = {32}, + number = {4}, + month = jan, + year = {2015}, + issn = {0734-2071}, + pages = {12:1--12:45}, + articleno = {12}, + numpages = {45}, + url = {http://doi.acm.org/10.1145/2658994}, + doi = {10.1145/2658994}, + acmid = {2658994}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {Abstract, Byzantine, composability, fault tolerance, optimization, robustness}, +} + +@inproceedings{ aviram11workspace, + author = {Amittai Aviram and Bryan Ford and Yu Zhang}, + title = {{Workspace Consistency}: A Programming Model + for Shared Memory Parallelism}, + booktitle = {\bibconf[2nd]{WoDet}{Workshop on Determinism + and Correctness in Parallel Programming}}, + month = mar, + day = 6, + year = 2011, + location = {Newport Beach, CA}, +} + +@inproceedings{ aviram11deterministic, + author = {Amittai Aviram and Bryan Ford}, + title = {Deterministic {OpenMP} for Race-Free Parallelism}, + booktitle = {\bibconf[3rd]{HotPar}{USENIX Workshop on + Hot Topics in Parallelism}}, + month = may, + day = 26, + year = 2011, + location = {Berkeley, CA}, +} + +@inproceedings{ aviram12generalized, + author = {Amittai Aviram and Bryan Ford}, + title = {A Generalized Reduction Construct for Deterministic {OpenMP}}, + booktitle = {\bibconf[3rd]{WoDet}{Workshop on Determinism + and Correctness in Parallel Programming}}, + month = mar, + day = 4, + year = 2012, + location = {London, England}, +} + +@misc{aws17microservices, + author = {Matthias Jung and Peter Dalbhanjan and Peter Chapman and + Christoph Kassen}, + title = {\href{https://docs.aws.amazon.com/aws-technical-content/latest/microservices-on-aws/microservices-on-aws.pdf}{Microservices + on AWS}}, + month = sep, + year = 2017, +} + +%B + +@inproceedings{ backes09practical, + author = {Michael Backes and Peter Druschel and Andreas Haeberlen + and Dominique Unruh}, + title = {{CSAR}: A Practical and Provable Technique to Make + Randomized Systems Accountable}, + booktitle = {16th Annual Network \& Distributed System + Security Symposium (NDSS '09)}, + location = {San Diego, CA}, + month = feb, + year = 2009, +} + +@inproceedings{bacon00guava, + author = {Bacon, David F. and Strom, Robert E. and Tarafdar, Ashis}, + title = {Guava: a dialect of {J}ava without data races}, + booktitle = {\bibconf[15th]{OOPSLA}{ACM SIGPLAN Conference on + Object-Oriented Programming, Systems, Languages, and Applications}}, + year = {2000}, + pages = {382--400}, + location = {Minneapolis, MN} +} + +@inproceedings{ badrinath93handling, + author = {B. R. Badrinath and A. Bakre + and T. Imielinski and R. Marantz}, + title = {Handling Mobile Clients: A Case for Indirect Interaction}, + booktitle = {\bibconf[4th]{WWOS}{Workshop on Workstation + Operating Systems}}, + month = oct, + year = 1993, + location = {Napa, CA}, +} + +@inproceedings{ bahk92dynamic, + author = {Saewoong Bahk and Magda El Zarki}, + title = {Dynamic Multi-path Routing and How it Compares with other + Dynamic Routing Algorithms for High Speed Wide Area Networks}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1992, + location = {Baltimore, MD}, + pages = {53-64}, +} + +@inproceedings{ baiocchi07yeah, + author = {Andrea Baiocchi and Angelo P. Castellani + and Francesco Vacirca}, + title = {{YeAH-TCP}: Yet Another Highspeed {TCP}}, + booktitle = {\bibconf[5th]{PFLDnet}{Workshop on Protocols + for Fast Long-Distance Networks}}, + month = feb, + year = 2007, + location = {Los Angeles, CA}, +} + +@techreport{ baker77incremental, + author = {Henry G. {Baker, Jr.} and Carl Hewitt}, + title = {The Incremental Garbage Collection of Processes}, + institution = {\bibbrev{MIT AI Lab}{Massachusetts Institute + of Technology Artificial Intelligence Laboratory}}, + number = {AI Memo 454}, + year = 1977, + month = dec, +} + +% final journal version: bakre97implementation +@techreport{ bakre94itcp, + author = {Ajay Bakre and B.R. Badrinath}, + title = {{I-TCP}: Indirect {TCP} for Mobile Hosts}, + institution = {Rutgers University}, + location = {Piscataway, NJ}, + number = {DCS-TR-314}, + month = oct, + year = 1994, +} + +@article{ bakre97implementation, + author = {Ajay V. Bakre and B.R. Badrinath}, + title = {Implementation and Performance Evaluation of Indirect {TCP}}, + journal = {IEEE Transactions on Computers}, + volume = 46, + number = 3, + month = mar, + year = 1997, + pages = {260-278}, +} + +@inproceedings{ bakshi97improving, + author = {Brikam S. Bakshi and P. Krishna and N. H. Vaidya + and D. K. Pradhan}, + title = {Improving the Performance of {TCP} over Wireless Networks}, + booktitle = {\bibconf[17th]{ICDCS}{International Conference on + Distributed Computer Systems}}, + month = may, + year = 1997, + location = {Baltimore, Maryland}, +} + +@techreport{ bala99transparent, + author = "V. Bala and E. Duesterwald and S. Banerjia", + title = "Transparent Dynamic Optimization", + institution = "HP Laboratories", + location = "Cambridge", + number = "HPL-1999-77", + year = "1999", + month = jun, + url = "citeseer.ist.psu.edu/bala99transparent.html" +} + +@article{ bala00dynamo, + author = "Vasanth Bala and Evelyn Duesterwald and Sanjeev Banerjia", + title = "{Dynamo}: a transparent dynamic optimization system", + journal = "ACM SIG{\-}PLAN Notices", + volume = "35", + number = "5", + pages = "1--12", + year = "2000", + url = "citeseer.ist.psu.edu/bala00dynamo.html" +} + +@inproceedings{ balakrishnan95improving, + author = {Hari Balakrishnan and Srinivasan Seshan and Elan Amir + and Randy H. Katz}, + title = {Improving {TCP/IP} Performance over Wireless Networks}, + booktitle = {\bibconf[1st]{MOBICOM}{International Conference on Mobile + Computing and Networking}}, + month = nov, + year = 1995, + location = {Berkeley, CA}, +} + +@article{ balakrishnan97comparison, + author = {Hari Balakrishnan and Venkata N. Padmanabhan + and Srinivasan Seshan and Randy H. Katz}, + title = {A Comparison of Mechanisms for Improving + {TCP} Performance over Wireless Links}, + journal = {IEEE Transactions on Networking}, + volume = 5, + number = 6, + month = dec, + year = 1997, +} + +@inproceedings{ balakrishnan98tcp, + author = {Hari Balakrishnan and others}, + title = {{TCP} Behavior of a Busy {Internet} Server: + Analysis and Improvements}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 1998, +} + +@inproceedings{ balakrishnan98explicit, + author = {Hari Balakrishnan and Randy H. Katz}, + title = {Explicit Loss Notification and Wireless Web Performance}, + booktitle = {IEEE Globecom Internet Mini-Conference}, + month = nov, + year = 1998, + location = {Sydney, Australia}, +} + +@inproceedings{ balakrishnan99integrated, + author = {Hari Balakrishnan and Hariharan S. Rahul + and Srinivasan Seshan}, + title = {An Integrated Congestion Management Architecture + for {Internet} Hosts}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = sep, + year = 1999, +} + +@inproceedings{balakrishnan03semantic-free, + author = "Hari Balakrishnan and Scott Shenker and Michael Walfish", + title = {Semantic-Free Referencing in Linked Distributed Systems}, + booktitle = {\bibconf[2nd]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + year = 2003, + month = feb, +} + +@article{balakrishnan03looking, + title = {Looking Up Data in {P2P} Systems}, + author = {Hari Balakrishnan and others}, + journal = {Communications of the ACM}, + year = {2003}, + month = feb, +} + +@inproceedings{ balakrishnan04layered, + author = {Hari Balakrishnan and Karthik Lakshminarayanan and + Sylvia Ratnasamy and Scott Shenker and Ion Stoica and + Michael Walfish}, + title = {A Layered Naming Architecture for the Internet}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Portland, OR}, + month = sep, + year = {2004}, +} + +@inproceedings{ ballani09making, + author = {Hitesh Ballani and Paul Francis and Tuan Cao and Jia Wang}, + title = {Making Routers Last Longer with {ViAggre}}, + booktitle = {\bibconf[6th]{NSDI}{USENIX/ACM Symposium + on Networked Systems Design and Implementation}}, + month = apr, + year = 2009, + location = {Boston, MA}, +} + +@article{ banerjea96simulation, + author = {Anindo Banerjea}, + title = {Simulation study of the capacity effects of dispersity + routing for fault tolerant realtime channels}, + journal = {Computer Communications Review}, + volume = 26, + number = 4, + month = oct, + year = 1996, +} + +@techreport{ barakat99tcp, + author = {Chadi Barakat and Eitan Altman and Walid Dabbous}, + title = {On {TCP} Performance in an Heterogeneous Network: + A Survey}, + number = {3737}, + institution = {INRIA}, + location = {Sophia Antipolis, France}, + month = jul, + year = 1999, +} + +@article{ barakat00tcp, + author = {Chadi Barakat and Eitan Altman and Walid Dabbous}, + title = {On {TCP} Performance in a Heterogeneous Network: A Survey}, + journal = {IEEE Communications Magazine}, + volume = 38, + number = 1, + pages = {40-46}, + month = jan, + year = 2000, +} + + + +@article{ barakat02bandwidth, + author = {Chadi Barakat and Eitan Altman}, + title = {Bandwidth tradeoff between {TCP} and link-level {FEC}}, + journal = {Computer Networks}, + volume = 39, + pages = {133-150}, + year = 2002, +} + +@inproceedings{ baraz03ia, + author = {Leonid Baraz and Tevi Devor and Orna Etzion and Shalom Goldenberg + and Alex Skaletsky and Yun Wang and Yigal Zemach}, + title = {{IA-32 Execution Layer}: a two-phase dynamic translator designed + to support {IA-32} applications on {Itanium}-based systems}, + booktitle = {36th International Conference on Microarchitecture (MICRO36)}, + location = {San Diego, CA}, + year = 2003, + month = dec, + url = "citeseer.ist.psu.edu/baraz03ia.html" +} + +@inproceedings{barham04using, + author = {Paul Barham and + Austin Donnelly and + Rebecca Isaacs and + Richard Mortier}, + title = {Using {M}agpie for Request Extraction and + Workload Modelling}, + booktitle = {\bibconf[6th]{OSDI}{USENIX Symposium on Operating Systems + Design and Implementation}}, + location = {San Francisco, CA}, + month = dec, + year = 2004 +} + +@inproceedings{basescu12robust, + author = {Cristina Basescu and + Christian Cachin and + Ittay Eyal and + Robert Haas and + Alessandro Sorniotti and + Marko Vukolic and + Ido Zachevsky}, + title = {Robust Data Sharing with Key-Value Stores}, + booktitle = {\bibconf[42nd]{DSN}{Annual IEEE/IFIP International + Conference on Dependable Systems and Networks}}, + location = {Boston, MA}, + month = jun, + year = 2012 +} + +@inproceedings{basu11karma, + author = {Basu, Arkaprava and Bobba, Jayaram and Hill, Mark D.}, + title = {Karma: scalable deterministic record-replay}, + booktitle = {\bibconf{ICS}{International conference on Supercomputing}}, + year = {2011}, + location = {Tucson, Arizona, USA}, + pages = {359--368}, +} + +@misc{ battilana04gif, + author = "Michael C. Battilana", + title = "The {GIF} Controversy: A Software Developer's Perspective", + note = "{\tt http://lzw.info/}", + month = jun, + year = 2004, +} + +@article{ bearman99reality, + author = {David Bearman}, + title = {Reality and Chimeras + in the Preservation of Electronic Records}, + journal = {D-Lib Magazine}, + volume = 5, + number = 4, + year = 1999, + month = apr, +} + +@book{ bedford01probabilistic, + author = {Tim Bedford and Roger Cooke}, + title = {Probabilistic Risk Analysis: {F}oundations and Methods}, + publisher = {Cambridge University Press}, + year = 2001 +} + +@inproceedings{ bedichek90some, + author = "R. Bedichek", + title = "Some Efficient Architecture Simulation Techniques", + booktitle = "{USENIX} Winter 1990 Technical Conference", + location = "Washington, D.C.", + pages = "53--64", + year = "1990", +} + +@misc{ bellard05qemu, + title = {{QEMU}, a Fast and Portable Dynamic Translator}, + author = {Fabrice Bellard}, + booktitle = {USENIX Annual Technical Conference, FREENIX Track}, + location = {Anaheim, CA}, + month = apr, + year = 2005, + pages = {41--46}, +} + +@article{ bellare00authenticated, + author = {Mihir Bellare and Chanathip Namprempre}, + title = {Authenticated Encryption: Relations among notions + and analysis of the generic composition paradigm}, + journal = {\bibbrev{LNCS}{Lecture Notes in Computer Science}}, + volume = 1976, + month = sep, + year = 2000, + pages = {531-545}, +} + +@article{ beltrametti88control, + author = {Monica Beltrametti and Kenneth Bobey and John R. Zorbas}, + title = {The Control Mechanism for the + {Myrias} Parallel Computer System}, + journal = {Computer Architecture News}, + volume = 16, + number = 4, + month = sep, + year = 1988, + pages = {21-30}, +} + +@article{benet14ipfs, + title={Ipfs-content addressed, versioned, p2p file system}, + author={Benet, Juan}, + journal={arXiv preprint arXiv:1407.3561}, + year={2014} +} + +@inproceedings{ bennett96hierarchical, + author = {Jon C. R. Bennett and Hui Zhang}, + title = {Hierarchical packet fair queueing algorithms}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = {1996}, + isbn = {0-89791-790-1}, + pages = {143--156}, + location = {Palo Alto, California, United States}, + doi = {http://doi.acm.org/10.1145/248156.248170}, +} + +@article{ bennett99packet, + author = {Jon C. R. Bennett and Craig Partridge and Nicholas Shectman}, + title = {Packet Reordering is Not Pathological Network Behavior}, + journal = {Transactions on Networking}, + volume = 7, + issue = 6, + month = dec, + year = 1999, + pages = {789-798}, +} + +@inproceedings{ berenson95critique, + author = {Hal Berenson and Phil Bernstein and Jim Gray and + Jim Melton and Elizabeth O’Neil and Patrick O'Neil}, + title = {A Critique of {ANSI SQL} Isolation Levels}, + booktitle = {SIGMOD}, + month = jun, + year = 1995, + location = {San Jose, CA}, +} + +@inproceedings{ bergan10coredet, + author = {Tom Bergan and Owen Anderson and Joseph Devietti + and Luis Ceze and Dan Grossman}, + title = {{CoreDet}: A Compiler and Runtime System for + Deterministic Multithreaded Execution}, + booktitle = {\bibconf[15th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + month = mar, + year = 2010, + location = {Pittsburgh, PA}, +} + +@inproceedings{ bergan10deterministic, + author = {Tom Bergan and Nicholas Hunt and Luis Ceze + and Steven D. Gribble}, + title = {Deterministic Process Groups in {dOS}}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = oct, + year = 2010, + location = {Vancouver, BC, Canada}, +} + +@inproceedings{ berger09grace, + author = {Emery D. Berger and Ting Yang and Tongping Liu + and Gene Novark}, + title = {{Grace}: Safe Multithreaded Programming for {C/C++}}, + booktitle = {\bibconf[24th]{OOPSLA}{ACM SIGPLAN Conference on + Object-Oriented + Programming Languages, Systems, and Applications}}, + month = oct, + year = 2009, + location = {Orlando, FL}, +} + +@misc{ bernstein-ipv6, + author = {D. J. Bernstein}, + title = {The {IPv6} mess}, + note = {\url{http://cr.yp.to/djbdns/ipv6mess.html}}, +} + +@inproceedings{ bershad93midway, + author = {Brian N. Bershad and Matthew J. Zekauskas + and Wayne A. Sawdon}, + title = {The {Midway} Distributed Shared Memory System}, + booktitle = {CompCon}, + month = feb, + year = 1993, + pages = {528-537}, + location = {San Francisco, CA}, +} + +@inproceedings{ bershad95extensibility, + author = {Brian N. Bershad and + Stefan Savage and + Przemyslaw Pardyak and + Emin G{\"u}n Sirer and + Marc E. Fiuczynski and + David Becker and + Craig Chambers and + Susan J. Eggers}, + title = {Extensibility, Safety and Performance + in the {SPIN} Operating System}, + booktitle = {\bibconf[15th]{SOSP}{ACM Symposium on Operating System Principles}}, + location = {Copper Mountain, CO}, + year = 1995, +} + +@inproceedings{bessani11depsky, + author = {Alysson Neves Bessani and + Miguel P. Correia and + Bruno Quaresma and + Fernando Andr{\'e} and + Paulo Sousa}, + title = {{DepSky}: {D}ependable and Secure Storage in a + Cloud-of-clouds}, + booktitle = {\bibconf[6th]{EuroSys}{ACM SIGOPS/EuroSys + European Conference on Computer Systems}}, + location = {Salzburg, Austria}, + month = apr, + year = 2011 +} + +@inproceedings{ bessani14state, + author = {Alysson Bessani and Joao Sousa and Eduardo E.P. Alchieri}, + title = {State Machine Replication for the Masses with {BFT-SMART}}, + booktitle = {International Conference on Dependable Systems and Networks (DSN)}, + month = jun, + year = 2014, + pages = {355-362}, +} + +@inproceedings{bezerra14scalable, + title={\href{http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6903591}{Scalable state-machine replication}}, + author={Bezerra, Carlos Eduardo and Pedone, Fernando and Van Renesse, Robbert}, + booktitle={Dependable Systems and Networks (DSN), 2014 44th Annual IEEE/IFIP International Conference on}, + pages={331--342}, + year={2014}, + organization={IEEE} +} + +@inproceedings{ bhagwan04total, + author = {Ranjita Bhagwan and + Kiran Tati and + Yuchung Cheng and + Stefan Savage and + Geoffrey M. Voelker}, + title = {{T}otal {R}ecall: System Support for Automated Availability + Management}, + booktitle = {NSDI}, + month = mar, + year = {2004} +} + + +% Note: journal version is bhandarkar06ltcp +@inproceedings{ bhandarkar05improving, + title = {Improving {TCP} Performance in High Bandwidth High {RTT} Links + Using Layered Congestion Control}, + author = {Sumitha Bhandarkar and Saurabh Jain and A.L. Narasimha Reddy}, + booktitle = {\bibconf[3rd]{PFLDnet}{Workshop on Protocols + for Fast Long-Distance Networks}}, + month = feb, + year = 2005, + location = {Lyon, France} +} + +@article{ bhandarkar06ltcp, + title = {{LTCP}: Improving the Performance of {TCP} in Highspeed + Networks Using Layered Congestion Control}, + author = {Sumitha Bhandarkar and Saurabh Jain and A.L. Narasimha Reddy}, + journal = {Computer Communications Review}, + volume = 36, + number = 1, + month = jan, + year = 2006, +} + +@inproceedings{bhat14mined, + author = {Vasudev Bhat and + Adheesh Gokhale and + Ravi Jadhav and + Jagat Sastry Pudipeddi and + Leman Akoglu}, + title = {Min(e)d your tags: {A}nalysis of question response time in + {StackOverflow}}, + booktitle = {\bibconf{ASONAM}{IEEE/ACM International Conference on + Advances in Social Networks Analysis and Mining}}, + location = {Beijing, China}, + month = aug, + year = 2014 +} + +@inproceedings{ biggadike05natblaster, + author = {Andrew Biggadike and Daniel Ferullo and + Geoffrey Wilson and Adrian Perrig}, + title = {{NATBLASTER}: Establishing {TCP} Connections Between + Hosts Behind {NATs}}, + booktitle = {ACM SIGCOMM Asia Workshop}, + location = {Beijing, China}, + month = apr, + date = {12--14}, + year = {2005}, +} + +@inproceedings{ bienia08characterization, + author = {Christian Bienia and Sanjeev Kumar and Jaswinder Pal Singh + and Kai Li}, + title = {The {PARSEC} Benchmark Suite: + Characterization and Architectural Implications}, + booktitle = {\bibconf[17th]{PACT}{International Conference on + Parallel Architectures and Compilation Techniques}}, + year = {2008}, + month = {October}, + pages = {72--81}, + location = {Toronto, ON} +} + +@article{ billah91resonance, + author = {K. Yusuf Billah and Robert H. Scanlan}, + title = {Resonance, {Tacoma Narrows} bridge failure, + and undergraduate physics textbooks}, + journal = {American Journal of Physics}, + volume = 59, + number = 2, + month = feb, + year = 1991, +} + +@article{ birrell84implementing, + author = {Andrew D. Birrell and Bruce Jay Nelson}, + title = {Implementing Remote Procedure Calls}, + journal = {\bibconf{TOCS}{Transactions on Computer Systems}}, + volume = {2}, + number = {1}, + pages = {39--59}, + month = feb, + year = {1984}, +} + +@misc{ blackshear19move, + author = {Sam Blackshear and Evan Cheng and David L. Dill and + Victor Gao and Ben Maurer and Todd Nowacki and Alistair Pott and + Shaz Qadeer and Rain and Dario Russi and Stephane Sezer and + Tim Zakian and Runtian Zhou}, + title = {\href{https://developers.libra.org/docs/assets/papers/libra-move-a-language-with-programmable-resources.pdf}{Move: A Language With Programmable +Resources}}, + month = jun, + year = 2019, +} + +@article{ blanton02making, + author = "E. Blanton and M. Allman", + title = "On making {TCP} more robust to packet reordering", + journal = "Computer Communications Review", + volume = 32, + number = 1, + month = jan, + year = 2002, +} + +@article{ bloom70space, + author = {Burton H. Bloom}, + title = {Space/time trade-offs in hash coding with allowable errors}, + journal = {Communications of the ACM}, + volume = 13, + number = 7, + pages = {422-426}, + year = 1970, +} + +@inproceedings{blumofe95cilk, + author = {Robert D. Blumofe and Christopher F. Joerg and Bradley C. Kuszmaul and + Charles E. Leiserson and Keith H. Randall and Yuli Zhou}, + title = {{C}ilk: an efficient multithreaded runtime system}, + booktitle = {\bibconf[5th]{PPoPP}{ACM SIGPLAN Symposium on + Principles and Practice of Parallel Programming}}, + year = {1995}, + pages = {207--216}, + location = {Santa Barbara, CA} +} + +@inproceedings{ bocchino09parallel, + author = {Bocchino Jr., Robert L. and Adve, Vikram S. and + Adve, Sarita V. and Snir, Marc}, + title = {Parallel Programming Must Be Deterministic by Default}, + booktitle = {\bibconf[1st]{HotPar}{Workshop on + Hot Topics in Parallelism (HotPar '09)}}, + month = mar, + year = {2009}, + location = {Berkeley, California, USA}, + url = {http://www.usenix.org/event/hotpar09/tech/full_papers/bocchino/bocchino.pdf}, +} + +@inproceedings{ bocchino09dpj, + author = {Robert L. {Bocchino Jr.} and Vikram S. Adve and Danny Dig and + Sarita V. Adve and Stephen Heumann and Rakesh Komuravelli and + Jeffrey Overbey and Patrick Simmons and Hyojin Sung and + Mohsen Vakilian}, + title = {A Type and Effect System for Deterministic Parallel {Java}}, + booktitle = {OOPSLA}, + month = oct, + year = 2009, + location = {Orlando, FL}, + url = {http://dpj.cs.uiuc.edu/DPJ/Publications_files/paper_1.pdf}, +} + +@article{ boggs80pup, + author = {David R. Boggs and John F. Shoch and Edward A. Taft + and Robert M. Metcalfe}, + title = {Pup: An Internetwork Architecture}, + journal = {IEEE Transactions on Communications}, + volume = 28, + number = 4, + month = apr, + year = 1980, + pages = {612-624}, +} + +@inproceedings{ bohacek03tcppr, + author = {Stephan Bohacek and others}, + title = {{TCP-PR}: {TCP} for Persistent Packet Reordering}, + booktitle = {\bibconf[23rd]{ICDCS}{International Conference + on Distributed Computing Systems}}, + year = 2003, + month = may, + location = {Providence, RI}, +} + +@article{ boichat03deconstructing, + author = {Romain Boichat and Partha Dutta and Svend Frølund + and Rachid Guerraoui}, + title = {Deconstructing {Paxos}}, + journal = {ACM SIGACT News}, + volume = 34, + number = 1, + month = mar, + year = 2003, +} + +@book{ boleuf01wiki, + author = {Bo Leuf and Ward Cunningham}, + title = {The Wiki Way}, + publisher = {Addison-Wesley Longman}, + isbn = {0-201-71499-X}, + month = mar, + year = 2001, +} + +@inproceedings{bonvin10aself-organized, + author = {Nicolas Bonvin and + Thanasis G. Papaioannou and + Karl Aberer}, + title = {A Self-organized, Fault-tolerant and Scalable Replication + Scheme for Cloud Storage}, + booktitle = {\bibconf[1st]{SoCC}{ACM Symposium on Cloud Computing}}, + location = {Indianapolis, IN}, + month = jun, + year = 2010 +} + +@inproceedings{ boyd-wickizer08corey, + author = {Silas Boyd-Wickizer and others}, + title = {{Corey}: An Operating System for Many Cores}, + booktitle = {\bibconf[8th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + location = {San Diego, CA}, + month = dec, + year = 2008, +} + +@article{ brakmo95tcp, + author = "L. Brakmo and L. Peterson", + title = "{TCP Vegas}: End to End Congestion Avoidance + on a Global {Internet}", + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 13, + number = 8, + month = oct, + year = 1995, + pages = {1465-1480}, +} + +@techreport{ braun95experimental, + author = "T. Braun and C. Diot and A. Hoglander and V. Roca", + title = "An Experimental User Level Implementation of {TCP}", + institution = "INRIA", + location = "Sophia Antipolis, France", + number = "2650", + year = "1995", + month = sep, + url = "citeseer.ist.psu.edu/braun95experimental.html" +} + +@article{ bressoud96hypervisor, + author = {Thomas C. Bressoud and Fred B. Schneider}, + title = {Hypervisor-Based Fault-Tolerance}, + journal = {\bibconf{TOCS}{ACM Transactions on Computer Systems}}, + volume = 14, + number = 1, + month = feb, + year = 1996, + pages = {80-107}, +} + +@inproceedings{ brewer92proteus, + author = "Eric A. Brewer and Chrysanthos Dellarocas and Adrian Colbrook + and William E. Weihl", + title = "{PROTEUS}: A High-Performance Parallel-Architecture Simulator", + booktitle = "Measurement and Modeling of Computer Systems", + pages = "247-248", + year = "1992", + url = "citeseer.ist.psu.edu/article/brewer91proteus.html" +} + +@article{ bricklin00cornucopia, + author = "Dan Bricklin", + title = "The Cornucopia of the Commons: How to get volunteer labor", + month = aug, + year = "2000", +} + +@article{ briscoe07flow, + author = {Bob Briscoe}, + title = {Flow Rate Fairness: Dismantling a Religion}, + journal = {Computer Communications Review}, + volume = 37, + number = 2, + pages = {63-74}, + month = apr, + year = 2007, +} + +@inproceedings{ brumley03remote, + author = {David Brumley and Dan Boneh}, + title = {Remote Timing Attacks are Practical}, + booktitle = {12th USENIX Security Symposium}, + month = aug, + year = 2003, + location = {Washington, DC}, +} + +@inproceedings{ broder97resemblance, + author = {Andrei Z. Broder}, + title = {On the Resemblance and Containment of Documents}, + booktitle = {\bibconf{SEQUENCES}{Compression and Complexity of Sequences}}, + month = jun, + year = {1997}, + url = "citeseer.nj.nec.com/broder97resemblance.html" +} + +@inproceedings{ broder98resemblance, + author = "Andrei Z. Broder", + title = "On the Resemblance and Containment of Documents", + booktitle = "{SEQS}: Sequences '91", + year = "1998", + url = "citeseer.nj.nec.com/broder97resemblance.html" +} + +@article{ brown97mtcp, + author = {Kevin Brown and Suresh Singh}, + title = {{M-TCP}: {TCP} for Mobile Cellular Networks}, + journal = {Computer Communications Review}, + volume = 27, + number = 5, + month = oct, + year = 1997, + pages = {19--43}, +} + +@article{ budimlic10cnc, + author = {Zoran Budimli\'c and Michael Burke and Vincent Cav\'e and + Kathleen Knobe and Geoff Lowney and Ryan Newton and + Jens Palsberg and David Peixotto and Vivek Sarkar and + Frank Schlimbach and Sa\u{g}nak Ta\c{s}irlar}, + title = {Concurrent Collections}, + journal = {Scientific Programming}, + volume = 18, + number = 3, + year = 2010, + month = jan, + pages = {203--217}, +} + +@inproceedings{ budimlic11deterministic, + author = {Zoran Budimli\'c and Michael Burke and Kathleen Knobe and + Ryan Newton and David Peixotto and Vivek Sarkar and Edwin Westbrook}, + title = {Deterministic Reductions in an Asynchronous Parallel Language}, + booktitle = {\bibconf[2nd]{WoDet}{Workshop on Determinism + and Correctness in Parallel Programming}}, + month = mar, + day = 6, + year = 2011, + location = {Newport Beach, CA}, +} + +@inproceedings{ bull00jomp, + author = {J. M. Bull and M. E. Kambites}, + title = {{JOMP}---an {OpenMP}-like Interface for {Java}}, + booktitle = {\bibconf{Java Grande}{ACM Java Grande Conference}}, + month = jun, + year = 2000, + location = {San Francisco, CA}, +} + +@article{ bullot03evaluation, + author = {Hadrien Bullot and R. Les Cottrell and Richard Hughes-Jones}, + title = {Evaluation of Advanced TCP Stacks on + Fast Long-Distance Production Networks}, + journal = {Journal of Grid Computing}, + volume = 1, + number = 4, + month = dec, + year = 2003, +} + +@inproceedings{ burnim09asserting, + author = {Jacob Burnim and Koushik Sen}, + title = {Asserting and Checking Determinism for Multithreaded Programs}, + booktitle = {\bibconf{FSE}{ACM SIGSOFT Symposium on the + Foundations of Software Engineering}}, + month = aug, + year = 2009, + location = {Amsterdam, Netherlands}, +} + +@inproceedings{burckhardt10revisions, + title = {Concurrent programming with revisions and isolation types}, + author = {Sebastian Burckhardt and Alexandro Baldassin and + Daan Leijen}, + month = oct, + year = {2010}, + pages = {691-707}, + booktitle = {\bibconf{OOPSLA}{Proceedings of the 25th + {Annual ACM SIGPLAN} Conference on {O}bject-Oriented + Programming, Systems, Languages, and Applications}}, +} + +@misc{ bush08ipv6, + author = {Randy Bush}, + title = {{IPv6} Transition \& Operational Reality}, + booktitle = {AfNOG Conference}, + month = jun, + day = 3, + year = 2008, + location = {Rabat, Morocco}, + url = {http://www.afnog.org/afnog2008/conference/talks/IPv6_Transition.pdf}, +} + +%C + +@article{ caceres95improving, + author = {Ram\'on C\'aceres and Liviu Iftode}, + title = {Improving the Performance of Reliable Transport Protocols + in Mobile Computing Environments}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 13, + number = 5, + month = jun, + year = 1995, + pages = {850-857}, +} + + + +@article{cachin09trusting, + author = {Christian Cachin and + Idit Keidar and + Alexander Shraer}, + title = {{Trusting the Cloud}}, + journal = {SIGACT News}, + volume = {40}, + number = {2}, + year = {2009}, + pages = {81-86} +} + +@techreport{cachin10dependable, + author = {Christian Cachin and + Robert Haas and + Marko Vukolic}, + title = {{Dependable Storage in the Intercloud}}, + number = {{RZ3783}}, + institution = {{IBM Research, Zurich}}, + year = {2010}, + note = {Available at \url{http://domino.research.ibm.com/library/cyberdig.nsf/papers/630549C46339936C852577C200291E78/$File/rz3783.pdf}} +} + +@inproceedings{ caesar06virtual, + author = {Matthew Caesar and others}, + title = {Virtual Ring Routing: Network Routing Inspired by {DHTs}}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + year = 2006, + month = sep, +} + +@inproceedings{ caesar06rofl, + author = {Matthew Caesar and others}, + title = {{ROFL}: Routing on Flat Labels}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + year = 2006, + month = sep, +} + +@article{ caini04tcp, + author = {Carlo Cainini and Rosario Firrincieli}, + title = {{TCP Hybla}: a {TCP} enhancement for heterogeneous networks}, + journal = {International Journal of Satellite Communications + and Networking}, + volume = 22, + pages = {547-566}, + year = 2004, +} + +@article{ caini06transport, + author = {Carlo Caini and Rosario Firrincieli and Mario Marchese + and Tomaso de Cola and Michele Luglio + and Cesare Roseti and Nedo Celandroni + and Francesco Potort\'i}, + title = {Transport layer protocols and architectures + for satellite networks}, + journal = {International Journal of Satellite Communications + and Networking}, + volume = 25, + number = 1, + year = 2006, + pages = {1-26}, +} + +@inproceedings{calder11windows, + author = {Calder, Brad and Wang, Ju and Ogus, Aaron and + Nilakantan, Niranjan and Skjolsvold, Arild and McKelvie, Sam + and Xu, Yikang and Srivastav, Shashwat and Wu, Jiesheng and + Simitci, Huseyin and Haridas, Jaidev and + Uddaraju, Chakravarthy and Khatri, Hemal and Edwards, Andrew + and Bedekar, Vaman and Mainali, Shane and Abbasi, Rafay and + Agarwal, Arpit and Haq, Mian Fahim ul and + Haq, Muhammad Ikram ul and Bhardwaj, Deepali and + Dayanand, Sowmya and Adusumilli, Anitha and McNett, Marvin + and Sankaran, Sriram and Manivannan, Kavitha and + Rigas, Leonidas}, + title = {Windows Azure Storage: A Highly Available Cloud + Storage Service with Strong Consistency}, + series = {SOSP '11}, + booktitle = {\bibconf[23rd]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + year = {2011}, + location = {Cascais, Portugal}, +} + +@inproceedings{ carter91implementation, + author = {John B. Carter and John K. Bennett and Willy Zwaenepoel}, + title = {Implementation and Performance of {Munin}}, + booktitle = {\bibconf[2nd]{PPoPP}{ACM SIGPLAN Symposium on Principles and + Practice of Parallel Programming}}, + month = oct, + year = 1991, + location = {Pacific Grove, CA}, +} + +@inproceedings{ casado07peering, + author = {Martin Casado and Michael J. Freedman}, + title = {Peering Through the Shroud: + The Effect of Edge Opacity on IP-Based Client Identification}, + booktitle = {4th NSDI}, + location = {Cambridge, MA}, + month = apr, + year = 2007, +} + +@article{ case96implementing, + author = {Brian Case}, + title = {Implementing the {Java} Virtual Machine}, + journal = {Microprocessor Report}, + volume = {10}, + number = {4}, + pages = {12--17}, + month = mar, + date = {25}, + year = {1996}, +} + +@article{ casetti02tcp, + author = {Claudio Casetti and Mario Gerla and Saverio Mascolo and + M.Y. Sanadidi and Ren Wang}, + title = {{TCP Westwood}: End-to-End Congestion Control for + Wired/Wireless Networks}, + journal = {Wireless Networks}, + volume = 8, + number = 5, + pages = {467-479}, + month = sep, + year = 2002, +} + +% conference paper: castelluccia96generating +@techreport{ castelluccia95hippco, + author = {Claude Castelluccia and Walid Dabbous}, + title = {{HIPPCO}: A High Performance Protocol Code Optimizer}, + number = {2748}, + institution = {INRIA}, + location = {Sophia Antipolis, France}, + month = dec, + year = 1995, +} + +@inproceedings{ castelluccia96generating, + author = {Claude Castelluccia and Walid Dabbous}, + title = {Generating Efficient Protocol Code + from an Abstract Specification}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1996, + location = {Stanford University, CA}, +} + +@inproceedings{ castro99practical, + author = {Miguel Castro and Barbara Liskov}, + title = {\href{http://css.csail.mit.edu/6.824/2014/papers/castro-practicalbft.pdf}{Practical {Byzantine} Fault Tolerance}}, + booktitle = {\bibconf[3rd]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + location = {New Orleands, LA}, + month = feb, + year = 1999, +} + % url = {http://css.csail.mit.edu/6.824/2014/papers/castro-practicalbft.pdf}, + +@inproceedings{ castro02secure, + author = {Miguel Castro and others}, + title = {Secure routing for structured peer-to-peer overlay networks}, + booktitle = {\bibconf[5th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = dec, + year = 2002, + location = {Boston, MA}, +} + +@article{ cellan-jones08broadband, + author = {Rory Cellan-Jones}, + title = {Broadband --- are you mobile or fixed?}, + journal = {BBC News dot.life}, + month = aug, + day = 15, + year = 2008, + url = {http://www.bbc.co.uk/blogs/technology/2008/08/broadband_are_you_mobile_or_fi.html}, +} + +@article{ cen03endtoend, + author = {Song Cen and Pamela C. Cosman and Geoffrey M. Voelker}, + title = {End-to-end differentiation of congestion and wireless losses}, + journal = {Transactions on Networking}, + volume = 11, + number = 5, + pages = {703-717}, + month = oct, + year = 2003, +} + +% updated in chand19formal preprint with incomplete proof bug-fix +@inproceedings{chand16formal, + author = {Saksham Chand and Yanhong A. Liu and Scott D. Stoller}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-319-48989-6_8}{Formal Verification of Multi-Paxos for Distributed Consensus}}, + booktitle = {\bibconf[21st]{FM}{International Symposium on Formal Methods}}, + month = nov, + year = {2016}, +} + +@misc{chand19formal, + author = {Saksham Chand and Yanhong A. Liu and Scott D. Stoller}, + title = {\href{https://arxiv.org/abs/1606.01387}{Formal Verification of Multi-Paxos for Distributed Consensus}}, + month = nov, + year = {2019}, + eprint = {1606.01387}, + archivePrefix = {arXiv}, + primaryClass = {cs.DC} +} + +@techreport{ chandy93deterministic, + author = {K.M. Chandy and I. Foster}, + title = {A Deterministic Notation for Cooperating Processes}, + number = {MCS-P346-0193}, + institution = {Argonne National Lab}, + year = {1993}, +} + +@inproceedings{ chang02trustless, + author = "B. Chang and K. Crary and M. DeLap and R. Harper and + J. Liszka and T. Murphy~VII and F. Pfenning", + title = "Trustless grid computing in {ConCert}", + pages = "112--125", + booktitle = "Workshop on Grid Computing", + location = "Baltimore, MD", + year = "2002", + month = nov, + keywords = "certified code, proof carrying code, grid computing", + url = "citeseer.ist.psu.edu/chang02trustless.html" +} + +@inproceedings{ chang06bigtable, + author = {Fay Chang and others}, + title = {Bigtable: A Distributed Storage System for Structured Data}, + booktitle = {\bibconf[7th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = nov, + year = {2006}, +} + +@inproceedings{ chari02bluebox, + author = {Suresh N. Chari and Pau-Chen Cheng}, + title = {{BlueBox}: A Policy-Driven, Host-Based + Intrusion Detection System}, + booktitle = {Network and Distributed System Security}, + month = feb, + year = 2002, +} + +@inproceedings{ chawathe03gnutella, + author = {Yatin Chawathe and others}, + title = {Making {Gnutella}-like {P2P} Systems Scalable}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + year = 2003, + month = aug, + pages = {407-418}, +} + +@phdthesis{ chen99new, + author = {Johnny Chen}, + title = {New Approaches to Routing for Large-Scale Data Networks}, + school = {Rice University}, + month = jun, + year = 1999, +} + +@techreport{ chen02l+, + author = "Benjie Chen and Robert Morris", + title = "{L+}: Scalable Landmark Routing and Address Lookup + for Multi-hop Wireless Networks", + institution = "\bibbrev{MIT LCS}{Massachusetts Institute of Technology + Laboratory for Computer Science}", + number = "837", + month = mar, + year = "2002", +} + +@phdthesis{ chen04serverless, + author = "Benjie Chen", + title = "A Serverless, Wide-Area Version Control System", + school = "Massachusetts Institute of Technology", + year = "2004", +} + +@inproceedings{chen08automating, + author = {Xu Chen and + Ming Zhang and + Zhuoqing Morley Mao and + Paramvir Bahl}, + title = {Automating Network Application + Dependency Discovery: {E}xperiences, + Limitations, and New Solutions}, + booktitle = {\bibconf[8th]{OSDI}{USENIX Symposium on Operating Systems + Design and Implementation}}, + location = {San Diego, CA}, + month = dec, + year = 2008 +} + + +@inproceedings{ chen10side, + author = {Shuo Chen and Rui Wang and XiaoFeng Wang and Kehuan Zhang}, + title = {Side-Channel Leaks in Web Applications: + a Reality Today, a Challenge Tomorrow}, + booktitle = {{IEEE} Symposium on Security and Privacy}, + month = may, + year = 2010, + location = {Oakland, CA}, +} + +@article{Chen10lreplay, + author = {Chen, Yunji and Hu, Weiwu and Chen, Tianshi and Wu, Ruiyang}, + title = {LReplay: a pending period based deterministic replay scheme}, + journal = {SIGARCH Computer Architecture News}, + volume = {38}, + number = {3}, + month = jun, + year = {2010}, + pages = {187--197}, +} + +@misc{ chen17under, + author = {Ting Chen and Xiaoqi Li and Xiapu Luo and Xiaosong Zhang}, + title = {\href{https://arxiv.org/abs/1703.03994}{Under-Optimized Smart Contracts Devour Your Money}}, + month = mar, + year = 2017, +} + +@inproceedings{ cheng89loopfree, + author = "C. Cheng and R. Riley and S. P. R. Kumar and + J. J. Garcia-Luna-Aceves", + title = "A Loop-free {Bellman-Ford} Routing Protocol + Without Bouncing Effect", + booktitle = "\bibbrev{SIGCOMM}{ACM SIGCOMM}", + pages = "224-237", + month = sep, + year = "1989", +} + +@article{ cheng08confusion, + author = {Jacqui Cheng}, + title = {{.confusion}: {ICANN} opens up {Pandora's Box} of new {TLDs}}, + journal = {Ars Technica}, + month = jun, + day = 26, + year = 2008, + url = {http://arstechnica.com/news.ars/post/20080626-confusion-icann-opens-up-pandoras-box-of-new-tlds.html}, +} + +@article{ cheriton86vmtp, + author = {David R. Cheriton}, + title = {{VMTP}: A Transport Protocol for the Next Generation + of Communication Systems}, + journal = {Computer Communications Review}, + volume = {16}, + number = {3}, + month = aug, + year = {1986}, + pages = {406--415}, +} + +@inproceedings{ cheriton89sirpent, + author = {David R. Cheriton}, + title = {Sirpent: A High-Performance Internetworking Approach}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = sep, + year = 1989, + location = {Austin, TX}, +} + +@inproceedings{cheriton89-leases, + author = {C. Gray and D. Cheriton}, + title = {Leases: an efficient fault-tolerant mechanism for distributed file cache consistency}, + booktitle = {\bibconf[12th]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + year = {1989} +} + +@misc{ cheriton00triad, + author = "David R. Cheriton and Mark Gritter", + title = "{TRIAD}: A New Next-Generation {Internet} Architecture", + month = jul, + year = "2000", + url = "{\tt http://www.dsg.stanford.edu/triad}", +} + +@techreport{ cheriton00triad-nat, + author = {David R. Cheriton and Mark Gritter}, + title = {{TRIAD}: a Scalable Deployable {NAT}-based + {Internet} Architecture}, + institution = {Stanford University}, + month = jan, + year = "2000", + url = "{\tt http://www.dsg.stanford.edu/triad}", +} + +@article{ chernoff98fx32, + author = {A. Chernoff and M. Herdeg and R. Hookway and C. Reeve and + N. Rubin and T. Tye and S. Bharadwaj Yadavalli and J. Yates}, + title = {{FX!32}: a profile-directed binary translator}, + journal = {IEEE Micro}, + volume = {18}, + number = {2}, + issn = {0272-1732}, + pages = {56--64}, + month = mar, + year = {1998}, +} + +@misc{ cheshire05nat, + author = {Stuart Cheshire and Marc Krochmal and Kiren Sekar}, + title = {{NAT} Port Mapping Protocol}, + month = jun, + year = 2005, + day = 7, + note = "Internet-Draft (Work in Progress)", +} + +@book{ cheswick94firewalls, + author = {William R. Cheswick and Steven M. Bellovin + and Aviel D. Rubin}, + title = {Firewalls and Internet Security}, + publisher = {Addison-Wesley}, + month = feb, + day = 24, + year = 2003, +} + +@misc{ chiappa99endpoints, + author = {J. Noel Chiappa}, + title = {Endpoints and Endpoint Names: + A Proposed Enhancement to the Internet Architecture}, + year = 1999, + note = "Internet-Draft (Work in Progress)", +} + +@article{ chiu89analysis, + author = {Dah-Ming Chiu and Raj Jain}, + title = {Analysis of the Increase and Decrease Algorithms + for Congestion Avoidance in Computer Networks}, + journal = {Computer Networks and ISDN Systems}, + volume = 17, + number = 1, + month = jun, + year = 1989, + pages = {1-14}, +} + +@inproceedings{ chockalingam99wireless, + author = {A. Chockalingam and Michele Zorzi and Velio Tralli}, + title = {Wireless {TCP} performance with link layer {FEC/ARQ}}, + booktitle = {\bibconf{ICC}{IEEE International Conference + on Communications}}, + month = jun, + year = 1999, + location = {Vancouver, BC, Canada}, +} + +@techreport{ chung02fairplayer, + author = {Jae Chung and Yali Zhu and Mark Claypool}, + title = {{FairPlayer} or {FoulPlayer}? --- Head to Head + Performance of {RealPlayer} Streaming Video Over + {UDP} versus {TCP}}, + institution = {Worcester Polytechnic Institute}, + number = {WPI-CS-TR-02-17}, + month = may, + year = 2002, +} + +@inbook{ cisco08topology, + author = {Cisco Systems, Inc.}, + title = {Topology Hiding}, + booktitle = {{Cisco IOS XE} Integrated Session Border Controller + Configuration Guide for the {Cisco ASR 1000} Series + Aggregation Services Routers}, + month = oct, + year = 2008, +} + +@inproceedings{ clark88design, + author = {David D. Clark}, + title = {The Design Philosophy of the {DARPA} {Internet} protocols}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1988, + loation = {Stanford, CA}, +} + +@inproceedings{ clark90architectural, + author = {D. D. Clark and D. L. Tennenhouse}, + title = {Architectural considerations for a + new generation of protocols}, + booktitle = {ACM SIGCOMM}, + year = {1990}, + isbn = {0-89791-405-8}, + pages = {200--208}, + location = {Philadelphia, Pennsylvania, United States}, +} + +@inproceedings{ clark03fara, + author = {David Clark and Robert Braden and Aaron Falk and + Venkata Pingali}, + title = {{FARA}: Reorganizing the Addressing Architecture}, + booktitle = {\bibconf{FDNA}{ACM SIGCOMM Workshop on + Future Directions in Network Architecture}}, + location = {Karlsruhe, Germany}, + month = aug, + year = {2003}, +} + +@inproceedings{ clarke01freenet, + author = {Ian Clarke and Oskar Sandberg and Brandon Wiley and + Theodore W. Hong}, + title = {\href{https://link.springer.com/chapter/10.1007/3-540-44702-4_4}{Freenet: A Distributed Anonymous Information Storage and Retrieval System}}, + booktitle = {International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability}, + month = jan, + year = 2001, +} + +@inproceedings{ clement09upright, + author = {Allen Clement and Manos Kapritsos and Sangmin Lee and + Yang Wang and Lorenzo Alvisi and Mike Dahlin and + Taylor Rich\'{e}}, + title = {{UpRight} Cluster Services}, + booktitle = {ACM Symposium on Operating Systems Principles (SOSP)}, + month = oct, + year = 2009, +} + +@article{ cmelik94shade, + author = "Bob Cmelik and David Keppel", + title = "{Shade}: A Fast Instruction-Set Simulator for Execution Profiling", + journal = "\bibconf{SIGMETRICS PER}{ACM SIGMETRICS + Performance Evaluation Review}", + volume = "22", + number = "1", + month = may, + pages = "128--137", + year = "1994", + url = "citeseer.ist.psu.edu/cmelik93shade.html" +} + +@misc{ coalson05flac, + author = {Josh Coalson}, + title = {Free lossless audio codec format}, + note = {\\ {\small\tt http://flac.sourceforge.net/format.html}}, +} + +@article{ coarfa06performance, + author = {Cristian Coarfa and Peter Druschel and Dan S. Wallach}, + title = {Performance Analysis of {TLS} Web Servers}, + journal = {\bibconf{TOCS}{Transactions on Computer Systems}}, + volume = 24, + number = 1, + month = feb, + year = 2006, + pages = {36-69}, +} + +@inproceedings{ cohen03incentives, + author = {Bram Cohen}, + title = {Incentives Build Robustness in {BitTorrent}}, + booktitle = {\bibconf[1st]{p2pecon}{Workshop on Economics + of Peer-to-Peer Systems}}, + month = jun, + year = 2003, + location = {Berkeley, CA}, +} + +@misc{ compaq98alpha, + author = {Compaq}, + title = {Alpha Architecture Handbook}, + month = oct, + year = 1998, +} + +@article{ cooper02peertopeer, + author = "Brian Cooper and Hector Garcia-Molina", + title = "Peer-to-peer data trading to preserve information", + journal = "Information Systems", + volume = "20", + number = "2", + pages = "133-170", + year = "2002", + url = "citeseer.ist.psu.edu/464407.html" +} + +@article{corbett13spanner, + author = {Corbett, James C. and Dean, Jeffrey and Epstein, Michael and Fikes, Andrew and Frost, Christopher and Furman, J. J. and Ghemawat, Sanjay and Gubarev, Andrey and Heiser, Christopher and Hochschild, Peter and Hsieh, Wilson and Kanthak, Sebastian and Kogan, Eugene and Li, Hongyi and Lloyd, Alexander and Melnik, Sergey and Mwaura, David and Nagle, David and Quinlan, Sean and Rao, Rajesh and Rolig, Lindsay and Saito, Yasushi and Szymaniak, Michal and Taylor, Christopher and Wang, Ruth and Woodford, Dale}, + title = {\href{http://doi.acm.org/10.1145/2491245}{Spanner: Google's Globally Distributed Database}}, + journal = {ACM Trans. Comput. Syst.}, + issue_date = {August 2013}, + volume = {31}, + number = {3}, + month = aug, + year = {2013}, + issn = {0734-2071}, + pages = {8:1--8:22}, + articleno = {8}, + numpages = {22}, + url = {http://doi.acm.org/10.1145/2491245}, + doi = {10.1145/2491245}, + acmid = {2491245}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {Distributed databases, concurrency control, replication, time management, transactions}, +} + +@article{corradi12vm, + title = {{VM} Consolidation: + {A} Real Case Based on OpenStack Cloud}, + author = {Corradi, Antonio and Fanelli, Mario and Foschini, Luca}, + journal = {Future Generation Computer Systems}, + year = 2012, + publisher = {Elsevier} +} + +@article{ correia06consensus, + author = {Miguel Correia and Nuno Ferreira Neves and Paulo Veríssimo}, + title = {From Consensus to Atomic Broadcast: + Time-Free {Byzantine}-Resistant Protocols without Signatures}, + journal = {The Computer Journal}, + volume = 49, + number = 1, + month = jan, + year = 2006, +} + +@article{ correia11byzantine, + author = {Miguel Correia and Giuliana Santos Veronese and + Nuno Ferreira Neves and Paulo Verissimo}, + title = {{Byzantine} consensus in asynchronous message-passing systems: + a survey}, + journal = {International Journal of Critical Computer-Based Systems}, + volume = 2, + number = 2, + month = jul, + year = 2011, + pages = {141-161}, +} + +@inproceedings{ costa05vigilante, + author = {Manuel Costa and others}, + title = {Vigilante: End-to-End Containment of Internet Worms}, + booktitle = {SOSP}, + month = oct, + year = 2005, +} + +@inproceedings{ cowan00subdomain, + author = {Crispin Cowan and others}, + title = {{SubDomain}: Parsimonious Server Security}, + booktitle = {LISA}, + location = {New Orleans, Louisiana}, + year = {2000}, +} + +@inproceedings{ cowen99compact, + author = {Lenore J. Cowen}, + title = {Compact Routing with Minimum Stretch}, + booktitle = {\bibconf[10th]{SODA}{Symposium on Discrete Algorithms}}, + year = {1999}, + isbn = {0-89871-434-6}, + pages = {255--260}, + location = {Baltimore, Maryland}, + address = {Philadelphia, PA}, +} + +@inproceedings{cowling06HQ, + author = {Cowling, James and Myers, Daniel and Liskov, Barbara and Rodrigues, Rodrigo and Shrira, Liuba}, + title = {\href{http://static.usenix.org/legacy/events/osdi06/tech/full_papers/cowling/cowling.pdf}{{HQ} Replication: A Hybrid Quorum Protocol for {Byzantine} Fault Tolerance}}, + booktitle = {7th Symposium on Operating Systems Design and Implementation}, + series = {OSDI '06}, + year = {2006}, + isbn = {1-931971-47-1}, + location = {Seattle, Washington}, + pages = {177--190}, + numpages = {14}, + url = {http://static.usenix.org/legacy/events/osdi06/tech/full_papers/cowling/cowling.pdf}, + acmid = {1298473}, + publisher = {USENIX Association}, + address = {Berkeley, CA, USA}, +} + +@inproceedings{ cox02serving, + title = {Serving {DNS} using {Chord}}, + author = {R. Cox and A. Muthitacharoen and R. Morris}, + booktitle = {\bibconf[1st]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + year = {2002}, + month = mar, +} + +@article{ creasy81origin, + author = {R. J. Creasy}, + title = {The Origin of the {VM/370} Time-Sharing System}, + journal = {IBM Journal of Research and Development}, + volume = 25, + number = 5, + year = 1981, + pages = {483-490}, +} + +@inproceedings{ crespo98archival, + author = "Arturo Crespo and Hector Garcia-Molina", + title = "Archival Storage for Digital Libraries", + booktitle = "International Conference on Digital Libraries", + year = "1998", + url = "citeseer.ist.psu.edu/crespo98archival.html" +} + +@article{ crowcroft98differentiated, + author = {Jon Crowcroft and Philippe Oechslin}, + title = {Differentiated End-to-End Internet Services using + a Weighted Proportional Fair Sharing {TCP}}, + journal = {ACM \bibbrev{CCR}{Computer Communications Review}}, + volume = 28, + number = 3, + month = jul, + year = 1998, + pages = {53-69}, +} + +@inproceedings{ crowcroft03plutarch, + author = {Jon Crowcroft and Steven Hand and Richard Mortier + and Timothy Roscoe and Andrew Warfield}, + title = {Plutarch: An Argument for Network Pluralism}, + booktitle = {\bibconf{FDNA}{ACM SIGCOMM Workshop on + Future Directions in Network Architecture}}, + location = {Karlsruhe, Germany}, + month = aug, + year = {2003}, +} + +@inproceedings{ crowcroft08sourceless, + author = {Jon Crowcroft}, + title = {Sourceless Network Architecture}, + booktitle = {Perspectives Workshop: + End-to-End Protocols for the Future {Internet}}, + location = {Schloss Dagstuhl, Germany}, + year = 2008, + month = jun, + day = 9, +} + +@inproceedings{ crowcroft03plutarch, + author = {Jon Crowcroft and Steven Hand and Richard Mortier and + Timothy Roscoe and Andrew Warfield}, + title = {Plutarch: An Argument for Network Pluralism}, + booktitle = {ACM SIGCOMM FDNA Workshop}, + location = {Karlsruhe}, + month = aug, + year = {2003}, +} + +@misc{ csharp-spec, + author = "{Microsoft Corporation}", + title = "C\# Language Specification, Version 3.0", + year = 2007, +} + +@inproceedings{ cui10stable, + author = {Heming Cui and Jingyue Wu and Junfeng Yang}, + title = {Stable Deterministic Multithreading + Through Schedule Memoization}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = oct, + year = 2010, + location = {Vancouver, BC, Canada}, +} + +@inproceedings{ cui11peregrine, + author = {Heming Cui and Jingyue Wu and John Gallagher and + huayang Guo and Junfeng Yang}, + title = {Efficient deterministic multithreading through + schedule relaxation}, + booktitle = {\bibconf[23rd]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + year = {2011}, + isbn = {978-1-4503-0977-6}, + location = {Cascais, Portugal}, + pages = {337-351}, + url = {http://doi.acm.org/10.1145/2043556.2043588}, + doi = {10.1145/2043556.2043588}, + acmid = {2043588}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +# author = {Heming Cui and Jiri Simsa and Yi-Hong Lin and Hao Li and +# Ben Blum and Xinan Xu and Junfeng Yang and +# Garth A. Gibson and Randal E. Bryant}, +# doi = {http://doi.acm.org/10.1145/2517349.2522735}, +# url = {http://dblp.uni-trier.de/db/conf/sosp/sosp2013.html#CuiSLLBXYGB13}, +@inproceedings{ cui13parrot, + author = {Heming Cui and Jiri Simsa and Yi-Hong Lin and others}, + title = {{Parrot}: a practical runtime for deterministic, stable, + and reliable threads}, + booktitle = {\bibconf[24th]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + year = {2013}, + isbn = {978-1-4503-2388-8}, + location = {Pennsylvania, USA}, + pages = {388-405}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + + +% XXX better reference: wittie86bugnet +@inproceedings{ curtis82bugnet, + author = {Ronald S. Curtis and Larry D. Wittie}, + title = {{BugNet}: A Debugging system for + parallel programming environments}, + booktitle = {\bibconf[3rd]{ICDCS}{International Conference + on Distributed Computing Systems}}, + month = oct, + year = 1982, + location = {Miami/Ft. Lauderdale, FL}, + pages = {394-400}, +} + +@inproceedings{ curtis94muds, + author = "Pavel Curtis and David A. Nichols", + title = "{MUDs} Grow Up: Social Virtual Reality in the Real World", + booktitle = "{COMPCON}", + pages = "193-200", + year = "1994", + url = "citeseer.ist.psu.edu/curtis93muds.html" +} + +%D + +@inproceedings{ dabek02chord, + author = "Frank Dabek and Emma Brunskill and M. Frans Kaashoek and + David Karger and Robert Morris and Ion Stoica and + Hari Balakrishnan", + title = "Building Peer-to-Peer Systems With {Chord}, + a Distributed Lookup Service", + booktitle = "\bibconf[8th]{HotOS}{Workshop on + Hot Topics in Operating Systems}", + month = may, + year = "2001", +} + +@article{ dalal75more, + author = {Yogen K. Dalal}, + title = {More on Selecting Sequence Numbers}, + journal = {SIGOPS Operating Systems Review}, + volume = {9}, + number = {3}, + month = jul, + year = {1975}, + pages = {25--36}, +} + +@inproceedings{ danezis05sybil, + author="G. Danezis and C. Lesniewski-Laas and F. Kaashoek + and R. Anderson", + title="Sybil-resistant {DHT} routing", + booktitle="ESORICS", + year=2005 +} + +@inproceedings{ datta03updates, + author = {A. Datta and M. Hauswirth and K. Aberer}, + title = {Updates in Highly Unreliable, Replicated Peer-to-Peer Systems}, + booktitle = {\bibconf[23rd]{ICDCS}{International Conference + on Distributed Computing Systems}}, + year = 2003, +} + +@article{ davies72control, + author = {Donald W. Davies}, + title = {The Control of Congestion in Packet Switching Networks}, + journal = {IEEE Transactions on Communications}, + month = jun, + year = 1972, + volume = 20, + number = 3, + pages = {546-550} +} + +@techreport{ davies94mable, + author = {Peter Davies and Philippe Lacroute and John Heinlein and + Mark Horowitz}, + title = {Mable: A Technique for Efficient Machine Simulation}, + year = {1994}, + source = {http://www.ncstrl.org:8900/ncstrl/servlet/search?formname=detail\&id=oai%3Ancstrlh%3Astan%3ASTAN%2F%2FCSL-TR-94-636}, + publisher = {Stanford University}, + location = {Stanford, CA}, + number = {CSL-TR-94-636}, +} + +@article{ davies09directaccess, + author = {Joseph Davies}, + title = {{DirectAccess} and the Thin Edge Network}, + journal = {Microsoft TechNet Magazine}, + month = may, + year = 2009, +} + +@article{dean08mapreduce, + author = {Dean, Jeffrey and Ghemawat, Sanjay}, + title = {{M}ap{R}educe: simplified data processing on large clusters}, + journal = {Communications of the ACM}, + volume = {51}, + number = {1}, + month = jan, + year = {2008}, + pages = {107--113}, +} + + +@inproceedings{decandia07dynamo, + author = {Giuseppe DeCandia and + Deniz Hastorun and + Madan Jampani and + Gunavardhan Kakulapati and + Avinash Lakshman and + Alex Pilchin and + Swaminathan Sivasubramanian and + Peter Vosshall and + Werner Vogels}, + title = {{Dynamo}: {A}mazon's Highly Available Key-value Store}, + booktitle = {\bibconf[21st]{SOSP}{ACM Symposium on Operating Systems + Principles}}, + location = {Stevenson, WA}, + month = oct, + year = 2007 +} + +@inproceedings{ dehnert03transmeta, + author = "J. Dehnert and B. Grant and J. Banning and R. Johnson and + T. Kistler and A. Klaiber and J. Mattson", + title = "The {Transmeta} Code Morphing Software: + Using Speculation, Recovery, and + Adaptive Retranslation to Address Real-life Challenges", + booktitle = "International Symposium on Code Generation + and Optimization", + pages = "15--24", + year = "2003", + url = "citeseer.ist.psu.edu/dehnert03transmeta.html" +} + +@inproceedings{ demers87epidemic, + author = {Alan Demers and others}, + title = {Epidemic algorithms for replicated database maintenance}, + booktitle = {\bibconf[6th]{PODC}{ACM Symposium on + Principles of Distributed Computing}}, + year = {1987}, + isbn = {0-89791-239-4}, + pages = {1--12}, + location = {Vancouver, British Columbia, Canada}, +} + +@article{ dennis66multiprogrammed, + author = {Jack B. Dennis and Earl C. Van Horn}, + title = {Programming semantics for multiprogrammed computations}, + journal = {Commun. ACM}, + volume = {9}, + number = {3}, + year = {1966}, + pages = {143--155}, +} + +@inproceedings{ desimone93throughput, + author = {Antonio DeSimone and Mooi Choo Chuah On-Ching Yue}, + title = {Throughput Performance of Transport-Layer Protocols + over Wireless {LANs}}, + booktitle = {\bibbrev{GLOBECOM}{IEEE GLOBECOM}}, + month = nov, + year = 1993, + location = {Houston, TX}, +} + +@article{ desnoyers12urcu, + author = {Mathieu Desnoyers and Paul E. McKenney and + Alan Stern and Michel R. Dagenais and Jonathan Walpole}, title = {User-Level Implementations of {Read-Copy Update}}, + journal = {IEEE Transactions on Parallel and Distributed Systems}, + volume = 23, + year = 2012, + issn = {1045-9219}, + pages = {375-382}, + doi = {http://doi.ieeecomputersociety.org/10.1109/TPDS.2011.159}, + publisher = {IEEE Computer Society}, + location = {Los Alamitos, CA, USA}, +} + +@inproceedings{ deutsch84efficient, + author = {L. Peter Deutsch and Allan M. Schiffman}, + title = {Efficient Implementation of the {Smalltalk-80} System}, + booktitle = {Principles of Programming Languages}, + location = {Salt Lake City, UT}, + month = jan, + year = 1984, + pages = {297-302}, +} + +@inproceedings{ devietti09dmp, + author = {Joseph Devietti and Brandon Lucia and Luis Ceze + and Mark Oskin}, + title = {{DMP}: Deterministic Shared Memory Multiprocessing}, + booktitle = {\bibconf[14th]{ASPLOS}{international Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + month = mar, + year = 2009, + location = {Washington, DC}, +} + +@unpublished{dijkstra88cruelty, + author = "Edsger W. Dijkstra", + title = "On the cruelty of really teaching computing science", + month = dec, + year = "1988", + note = {\url{http://www.cs.utexas.edu/users/EWD/ewd10xx/EWD1036.PDF}}, +} + +@article{ dipetrillo08migrating, + author = {Mike DiPetrillo}, + title = {Migrating from {Intel} to {AMD}}, + month = feb, + year = 2008, + note = {\url{http://www.mikedipetrillo.com/mikedvirtualization/2008/02/migrating-from-intel-to-amd.html}} +} + +@inproceedings{ dischinger07characterizing, + author = {Marcel Dischinger and Andreas Haeberlen and Krishna P. Gummadi and Stefan Saroiu}, + title = "Characterizing Residential Broadband Networks", + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = 2007, + location = {San Diego, CA} +} + +@inproceedings{ dischinger08detecting, + author = {Marcel Dischinger and Alan Mislove and Andreas Haeberlen + and Krishna P. Gummadi}, + title = {Detecting BitTorrent Blocking}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = 2008, + location = {Vouliagmeni, Greece}, +} + +@inproceedings{ dohrmann02publickey, + author = {Steve Dohrmann and Carl Ellison}, + title = {Public-key Support for Collaborative Groups}, + booktitle = {1st Annual PKI Research Workshop}, + month = apr, + year = 2002, +} + +@inproceedings{ donnelley81managing, + author = {James E. (Jed) Donnelley}, + title = {Managing Domains in a Network Operating System}, + booktitle = {Local Networks and Distributed Office Systems Conference}, + location = {London, UK}, + month = may, + year = 1981, + pages = {345-361}, +} + +@inproceedings{ douceur08leveraging, + author = {John R. Douceur and Jeremy Elson and Jon Howell + and Jacob R. Lorch}, + title = {Leveraging Legacy Code to Deploy Desktop Applications + on the {Web}}, + booktitle = {\bibconf[8th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = dec, + year = 2008, + location = {San Diego, CA}, +} + +@article{ drummond03reducing, + author = {L\'{u}cia M. A. Drummond and Valmir C. Barbosa}, + title = {\href{https://arxiv.org/pdf/cs/0309042.pdf}{On reducing the complexity of matrix clocks}}, + journal = {Parallel Computing}, + volume = 29, + number = 7, + month = jul, + year = 2003, + pages = {895-905}, +} + +@inproceedings{dunagan04fuse, + author = {John Dunagan and + Nicholas J. A. Harvey and + Michael B. Jones and + Dejan Kostic and + Marvin Theimer and + Alec Wolman}, + title = {{FUSE}: {L}ightweight Guaranteed Distributed + Failure Notification}, + booktitle = {\bibconf[6th]{OSDI}{USENIX Symposium on Operating Systems + Design and Implementation}}, + location = {San Francisco, CA}, + month = dec, + year = 2004 +} + + +@inproceedings{ dunlap02revirt, + author = {George W. Dunlap and Samuel T. King and Sukru Cinar and + Murtaza A. Basrai and Peter M. Chen}, + title = {{ReVirt}: Enabling Intrusion Analysis through + Virtual-Machine Logging and Replay}, + booktitle = {\bibconf[5th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = dec, + year = {2002}, + location = {Boston, MA}, +}, + +@inproceedings{ dunlap08execution, + author = {George W. Dunlap and Dominic G. Lucchetti and + Michael A. Fetterman and Peter M. Chen}, + title = {Execution Replay for Multiprocessor Virtual Machines}, + booktitle = {\bibconf{VEE}{Virtual Execution Environments}}, + month = mar, + year = 2008, + location = {Seattle, WA}, +} + + + +@inproceedings{ dunn12eternal, + Author = {Alan M. Dunn and Michael Z. Lee and Suman Jana and Sangman Kim and Mark Silberstein and Yuanzhong Xu and Vitaly Shmatikov and Emmett Witchel}, + Title = {Eternal Sunshine of the Spotless Machine: Protecting Privacy with Ephemeral Channels }, + booktitle = {\bibconf{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + Year = {2012} +} + +@inproceedings{ dutta01active, + author = {Debojyoti Dutta andYongguang Zhang}, + title = {An Active Proxy Based Architecture for {TCP} + in Heterogeneous Variable Bandwidth Networks}, + booktitle = {\bibconf{GLOBECOM}{IEEE GLOBECOM}}, + month = nov, + year = 2001, + location = {San Antonio, TX}, +} + +@misc{ dworkin01cipher, + author = {Morris Dworkin}, + title = {Recommendation for Block Cipher Modes of Operation}, + note = {NIST Special Publication 800-38A}, + month = dec, + year = 2001, +} + +%E + +@techreport{ebcioglu96daisy, + author = {Kemal Ebcioglu and Erik Altman}, + title = {{DAISY}: Dynamic Compilation for + 100\% Architectural Compatibility}, + institution = {IBM}, + number = {RC20538}, + year = {1996}, +} + +@article{ edwards95experiences, + author = {Aled Edwards and Steve Muir}, + title = {Experiences implementing a high performance {TCP} + in user-space}, + journal = {Computer Communications Review}, + volume = {25}, + number = {4}, + year = {1995}, + month = oct, + issn = {0146-4833}, + pages = {196--205}, + doi = {http://doi.acm.org/10.1145/217391.318122}, + publisher = {ACM Press}, + address = {New York, NY}, +} + +@article{ edwards06shim, + author = {Stephen A. Edwards and Olivier Tardieu}, + title = {{SHIM}: A Deterministic Model for + Heterogeneous Embedded Systems}, + journal = {\bibconf{VLSI}{IEEE Transactions on + Very Large Scale Integration Systems}}, + volume = 14, + number = 8, + month = aug, + year = 2006, + pages = {854-867}, +} + +@inproceedings{ edwards08programming, + author = {Stephen A. Edwards and Nalini Vasudevan and Olivier Tardieu}, + title = {Programming Shared Memory Multiprocessors with + Deterministic Message-Passing Concurrency: + Compiling {SHIM} to {Pthreads}}, + booktitle = {\bibconf{DATE}{Design, Automation, and Test in Europe}}, + month = mar, + year = 2008, + location = {Munich, Germany}, +} + +@inproceedings{ efstathopoulos05labels, + author = {Petros Efstathopoulos and others}, + title = {Labels and Event Processes in the {Asbestos} Operating System}, + booktitle = {\bibconf[20th]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + month = oct, + year = 2005, + location = {Brighton, UK}, +} + +@article{ eggert00effects, + author = "Lars Eggert and John Heidemann and Joe Touch", + title = "Effects of Ensemble-TCP", + journal = "{ACM} Computer Communication Review", + year = "2000", + volume = "30", + number = "1", + month = jan, + pages = "15--29", + keywords = "ensemble-tcp, tcp batching", + url = "http://www.isi.edu/~johnh/PAPERS/Eggert00a.html", + psurl = "http://www.isi.edu/~johnh/PAPERS/Eggert00a.ps.gz", + pdfurl = "http://www.isi.edu/~johnh/PAPERS/Eggert00a.pdf", + organization = "USC/Information Sciences Institute", + copyrightholder = "author", +} + +@inproceedings{elnozahy92checkpoints, + author={ Elmootazbellah Nabil Elnozahy and David B. Johnson and Willy Zwaenepoel}, + title={\href{https://infoscience.epfl.ch/record/55787/files/srds92.ps.pdf}{The Performance of Consistent Checkpointing}}, + booktitle={11th Symposium on Reliable Distributed Systems}, + year={1992}, + pages={39-47}, + doi={10.1109/RELDIS.1992.235144}, + publisher={IEEE}, +} + +@inproceedings{enck10taintdroid, + author = {Enck, William and Gilbert, Peter and Chun, Byung-Gon and Cox, Landon P. and Jung, Jaeyeon and McDaniel, Patrick and Sheth, Anmol N.}, + title = {TaintDroid: An Information-flow Tracking System for Realtime Privacy Monitoring on Smartphones}, + booktitle = {\bibconf{OSDI}{USENIX Conference on Operating Systems Design and Implementation}}, + year = {2010}, +} + +@incollection{engelbart68research, + author = {D. Engelbart and W.K. English}, + title = {A research center for augmenting human intellect}, + editor = {I. Greif}, + booktitle = {Computer-Supported Cooperative Work: + A Book of Readings}, + publisher = {Morgan Kaufmann Publishers}, + address = {San Mateo, CA}, + pages = {81--105}, + year = {1968}, +} + +@inproceedings{ engler95exokernel, + author = {Dawson R. Engler and M. Frans Kaashoek and James O'Toole}, + title = {\href{https://dl.acm.org/citation.cfm?id=224076}{Exokernel: An Operating System Architecture + for Application-Level Resource Management}}, + booktitle = {\bibconf[15th]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + month = dec, + year = 1995, + location = {Copper Mountain, CO}, +} + +@inproceedings{ engler03racerx, + author = {Engler, Dawson and Ashcraft, Ken}, + title = {{RacerX}: effective, static detection of race conditions + and deadlocks}, + booktitle = {\bibconf[19th]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + month = oct, + year = 2003, + location = {Bolton Landing, NY}, +} + +@techreport{ eppinger05tcp, + author = "Jeffrey L. Eppinger", + title = "{TCP} Connections for {P2P} Apps: + A Software Approach to Solving the {NAT} Problem", + institution = "Carnegie Mellon University", + number = "CMU-ISRI-05-104", + month = jan, + year = 2005, +} + +@inproceedings{ eriksson03peernet, + author = "Jakob Eriksson and Michalis Faloutsos + and Srikanth Krishnamurthy", + title = "{PeerNet}: Pushing Peer-to-Peer Down the Stack", + booktitle = {\bibconf[2nd]{IPTPS}{International + Workshop on Peer-to-Peer Systems}}, + month = feb, + year = "2003", + location = "Berkeley, CA", +} + +@misc{ etsi01user, + author = {{European Telecommunications Standards Institute}}, + title = {User identification solutions in converging networks}, + number = {ETSI EG 201 940}, + year = 2001, + month = apr, +} + +@inproceedings{ evard93collaborative, + author = "R\'emy Evard", + title = "Collaborative Networked Communication: {MUD}s as Systems Tools", + booktitle = "Proceedings of the Seventh Systems Administration Conference (LISA VII)", + pages = "1--8", + year = "1993", + month = nov, + location = "Monterey, CA", + url = "citeseer.ist.psu.edu/evard93collaborative.html" +} + +%F + +@inproceedings{ faber99timewait, + author = {Theodore Faber and Joe Touch and Wei Yue}, + title = {The {{\tt TIME-WAIT}} state in {TCP} + and Its Effects on Busy Servers}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + year = 1999, + month = mar, + pages = {1573--1583}, + volume = 3, +} + +@inproceedings{ faustini82dataflow, + author = {Faustini, A. A.}, + title = {An operational semantics for pure dataflow}, + booktitle = {\bibconf[9th]{ICALP} + {International Colloquium on Automata, Languages and Programming}}, + month = jul, + year = 1982, + location = {Aarhus, Denmark}, + pages = {212--224}, +} + +@inproceedings{ feamster04case, + author = {Nick Feamster and Hari Balakrishnan and + Jennifer Rexford and Aman Shaikh and Jacobus {van der Merwe}}, + title = {The Case for Separating Routing from Routers}, + booktitle = {\bibconf{FDNA}{ACM SIGCOMM Workshop on + Future Directions in Network Architecture}}, + location = {Portland, OR}, + month = aug, + year = {2004}, +} + +@inproceedings{ feldman88igor, + author = {Stuart I. Feldman and Channing B. Brown}, + title = {{IGOR}: A System for Program Debugging + via Reversible Execution}, + booktitle = {\bibconf{WPDD}{Workshop on Parallel \& + Distributed Debugging}}, + location = {Madison, WI}, + pages = {112--123}, + month = may, + year = 1988, +} + +@inproceedings{ feldman10sporc, + author = {Ariel J. Feldman and William P. Zeller and + Michael J. Freedman and Edward W. Felten}, + title = + {\href{https://www.usenix.org/legacy/events/osdi10/tech/full_papers/Feldman.pdf} + {{SPORC}: Group Collaboration using Untrusted Cloud Resources}}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = oct, + year = 2010, + location = {Vancouver, BC, Canada}, +} + +@article{feldmann07internet, + author = {Anja Feldmann}, + title = {Internet Clean-Slate Design: What and Why?}, + journal = {\bibconf{CCR}{ACM Computer Communications Review}}, + volume = {37}, + number = {3}, + month = jul, + year = {2007}, + pages = {59--64}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{ feldmeier90multiplexing, + author = {David C. Feldmeier}, + title = {Multiplexing Issues in Communication System Design}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Philadelphia, PA}, + month = sep, + year = 1990, +} + +@article{ ferrill06network, + author = {Paul Ferrill}, + title = {Network Traffic Shaping Tools}, + journal = {Processor}, + month = apr, + day = 21, + year = 2006, + volume = 28, + number = 16, + pages = {4} +} + +@article{ floyd91traffic, + author = {Sally Floyd and Van Jacobson}, + title = {Traffic Phase Effects in Packet-Switched Gateways}, + journal = {\bibconf{CCR}{ACM Computer Communications Review}}, + volume = 21, + number = 2, + month = apr, + year = 1991, + pages = {26-42}, +} + +@article{ fidge91logical, + author = {Colin Fidge}, + title = {Logical Time in Distributed Computing Systems}, + journal = {IEEE Computer}, + month = aug, + year = 1991, + volume = 24, + number = 8, + pages = {28-33}, +} + +@article{ finn89connectionless, + author = {Gregory G. Finn}, + title = {A Connectionless Congestion Control Algorithm}, + journal = {\bibconf{CCR}{ACM Computer Communications Review}}, + volume = 19, + number = 5, + month = oct, + year = 1989, + pages = {12-31}, +} + +@inproceedings{ fischer82sacrificing, + author = {Michael J. Fischer and Alan Michael}, + title = {Sacrificing Serializability to Attain High Availability + of Data in an Unreliable Network}, + booktitle = {Symposium on Principles of Database Systems (PODS)}, + month = mar, + year = 1982, + pages = {70-75}, +} + +@inproceedings{flanagan96phluid, + author = {Flanagan, Cormac and Nikhil, Rishiyur S.}, + title = {pHluid: the design of a parallel functional language implementation on + workstations}, + booktitle = {\bibconf{ICFP}[1st]{{ACM} {SIGPLAN} + international conference on Functional programming}}, + year = {1996}, + month = may, + location = {Philadelphia, Pennsylvania, United States}, + pages = {169--179}, +} + +@article{ floyd91connections, + author = {Sally Floyd}, + title = {Connections with Multiple Congested Gateways in + Packet-Switched Networks, Part 1: One-way Traffic}, + journal = {\bibconf{CCR}{ACM Computer Communications Review}}, + volume = 21, + number = 5, + month = oct, + year = 1991, + pages = {30-47}, +} + +@article{ floyd93random, + author = {Sally Floyd and Van Jacobson}, + title = {Random Early Detection Gateways for Congestion Avoidance}, + journal = {Transactions on Networking}, + volume = 1, + number = 4, + month = aug, + year = 1993, + pages = {1063-6692}, +} + +@article{ floyd99promoting, + author = {Sally Floyd and Kevin Fall}, + title = {Promoting the Use of End-to-End Congestion Control + in {the Internet}}, + journal = {Transactions on Networking}, + volume = 7, + number = 4, + month = aug, + year = 1999, + pages = {458-472}, +} + +@inproceedings{ floyd00equation, + author = {Sally Floyd and Mark Handley and Jitendra Padhye + and Joerg Widmer}, + title = {Equation-Based Congestion Control for Unicast Applications}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2000, + location = {Stockholm, Sweden}, +} + +@article{fluet10manticore, + author = {Matthew Fluet and Mike Rainey and John Reppy and Adam Shaw}, + title = {Implicitly threaded parallelism in {M}anticore}, + journal = {Journal of Functional Programming}, + volume = 20, + issue = {5--6}, + month = nov, + year = 2010, + pages = {537--576}, +} + +@book{ ford62flows, + author = "L. R. Ford Jr. and D. R. Fulkerson", + title = "Flows in Networks", + publisher = "Princeton University Press", + address = "Princeton N.J.", + year = "1962", +} + +@inproceedings{ ford94evolving, + author = {Bryan Ford and Jay Lepreau}, + title = {Evolving Mach 3.0 to a Migrating Thread Model}, + booktitle = {Winter 1994 USENIX Conference}, + pages = {97-114}, + month = jan, + year = 1994, +} + +@inproceedings{ ford96microkernels, + author = {Bryan Ford and Mike Hibler and Jay Lepreau + and Patrick Tullmann and Godmar Back and Stephen Clawson}, + title = {Microkernels Meet Recursive Virtual Machines}, + booktitle = {\bibconf[2nd]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + pages = {137-151}, + year = {1996} +} + +@inproceedings{ ford96cpu, + author = {Bryan Ford and Sai R. Susarla}, + title = {{CPU} Inheritance Scheduling}, + booktitle = {\bibconf[2nd]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + pages = {91-105}, + month = oct, + year = 1996, +} + +@inproceedings{ ford97flux, + author = {Bryan Ford and Godmar Back and Greg Benson and Jay Lepreau + and Albert Lin and Olin Shivers}, + title = {The {Flux} {OSKit}: + A Substrate for Kernel and Language Research}, + booktitle = {16th \bibconf{SOSP}{{ACM} Symposium on + Operating Systems Principles (SOSP)}}, + month = oct, + year = 1997, +} + +@inproceedings{ ford99interface, + author = {Bryan Ford and Mike Hibler and Jay Lepreau + and Roland McGrath and and Patrick Tullmann}, + title = {Interface and Execution Models in the {Fluke} Kernel}, + booktitle = {3rd \bibconf{OSDI}{Symposium on + Operating Systems Design and Implementation}}, + month = feb, + day = 24, + year = 1999, + location = {New Orleands}, +} + +@inproceedings{ ford02icfp, + author = "Bryan Ford", + title = "Packrat Parsing: + Simple, Powerful, Lazy, Linear Time", + booktitle = "\bibconf{ICFP}{International Conference + on Functional Programming}", + year = "2002", + month = "Oct" +} + +@misc{ ford03vitalizing, + author = "Bryan Ford", + title = "Service Duality: Vitalizing the Commons", + month = jan, + year = "2003", + note = "Unpublished technical report." +} + +@techreport{ ford03scalable, + author = "Bryan Ford", + title = "Scalable {Internet} Routing on + Topology-Independent Node Identities", + institution = "\bibconf{MIT LCS}{MIT + Laboratory for Computer Science}", + number = "MIT-LCS-TR-926", + year = "2003", + month = oct, +} + +@inproceedings{ ford03uip, + author = "Bryan Ford", + title = "Unmanaged {Internet} Protocol: + Taming the Edge Network Management Crisis", + booktitle = {\bibconf{HotNets}{2nd Workshop + on Hot Topics in Networks}}, + month = nov, + year = "2003" +} + +@inproceedings{ ford04popl, + author = "Bryan Ford", + title = "Parsing Expression Grammars: + A Recognition-Based Syntactic Foundation", + booktitle = {\bibconf[31st]{POPL}{ACM Symposium on + Principles of Programming Languages}}, + year = "2004", + month = jan, + location = "Venice, Italy", +} + +% obsoleted by ford05p2p +@misc{ ford04p2p, + author = "Bryan Ford", + title = "Peer-to-Peer {(P2P)} communication across + Network Address Translators {(NATs)}", + month = jun, + year = "2004", + note = "Internet-Draft (Work in Progress)", +} + +@inproceedings{ ford05p2p, + author = "Bryan Ford", + title = "Peer-to-Peer Communication Across + Network Address Translators", + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = apr, + year = 2005, + location = "Anaheim, CA", +} + +@inproceedings{ ford05vxa, + author = "Bryan Ford", + title = "{VXA}: A Virtual Architecture for Durable Compressed Archives", + booktitle = "\bibconf[4th]{USENIX FAST}{USENIX Conference on + File and Storage Technologies}", + month = dec, + year = 2005, + location = "San Francisco, CA", +} + +@inproceedings{ ford06uia-iptps-old, + author = {Bryan Ford and others}, + title = {{User-Relative Names for Globally Connected Personal Devices}}, + booktitle = {\bibconf[5th]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + year = {2006}, + month = feb, +} + +@inproceedings{ ford06uia-iptps, + author={Bryan Ford and Jacob Strauss and Chris Lesniewski{-}Laas and Sean C. Rhea and M. Frans Kaashoek and Robert Tappan Morris}, + title={User-Relative Names for Globally Connected Personal Devices}, + booktitle={5th International workshop on Peer-To-Peer Systems, {IPTPS} 2006, Santa Barbara, CA, USA, February 27-28, 2006}, + year={2006}, +} + +@inproceedings{ ford06persistent, + author = {Bryan Ford and Jacob Strauss and Chris Lesniewski-Laas and Sean Rhea and Frans Kaashoek and Robert Morris}, + title = {\href{https://pdos.csail.mit.edu/papers/uia:osdi06.pdf}{Persistent Personal Names for + Globally Connected Mobile Devices}}, + booktitle = {\bibconf[7th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = nov, + year = {2006}, +} + +@inproceedings{ ford08vx32, + author = {Bryan Ford and Russ Cox}, + title = {{Vx32}: Lightweight User-level Sandboxing on the {x86}}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2008, + location = {Boston, MA}, +} + +@inproceedings{ford10availability, + author = {Daniel Ford and + Fran\c{c}ois Labelle and + Florentina I. Popovici and + Murray Stokely and + Van-Anh Truong and + Luiz Barroso and + Carrie Grimes and + Sean Quinlan}, + title = {Availability in Globally Distributed Storage Systems}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on Operating Systems + Design and Implementation}}, + location = {Vancouver, Canada}, + month = oct, + year = 2010 +} + +@inproceedings{ ford10determinating, + author = {Amittai Aviram and Sen Hu and Bryan Ford + and Ramakrishna Gummadi}, + title = {Determinating Timing Channels in Compute Clouds}, + booktitle = {\bibconf{CCSW}{ACM Cloud Computing Security Workshop}}, + month = oct, + year = 2010, + location = {Chicago, IL}, +} + +@inproceedings{ ford10efficient, + author = {Amittai Aviram and Shu-Chun Weng and Sen Hu and Bryan Ford}, + title = {Efficient System-Enforced Deterministic Parallelism}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + location = {Vancouver, BC, Canada}, + month = oct, + year = 2010, +} + +@inproceedings{ ford12plugging, + author = {Bryan Ford}, + title = {Plugging Side-Channel Leaks with + Timing Information Flow Control}, + booktitle = {\bibconf[4th]{HotCloud}{USENIX Workshop on + Hot Topics in Cloud Computing}}, + month = jun, + year = 2012, + location = {Boston, MA}, +} + +@inproceedings{ ford12icebergs, + author = {Bryan Ford}, + title = {Icebergs in the Clouds: + the {\em Other} Risks of Cloud Computing}, + booktitle = {\bibconf[4th]{HotCloud}{USENIX Workshop on + Hot Topics in Cloud Computing}}, + location = {Boston, MA}, + month = jun, + year = 2012 +} + +@misc{ ford19threshold, + author = {Bryan Ford}, + title = {\href{https://arxiv.org/abs/1907.07010}{Threshold Logical Clocks for Asynchronous Distributed Coordination and Consensus}}, + month = jul, + year = 2019, +} + +@misc{ ford19threshold-anon, + author = {Anonymous}, + title = {\href{https://drive.google.com/file/d/1Zcas7JXQ61fcNitUSbcZk9Y0tf8jTeIl/view?usp=sharing}{Threshold Logical Clocks for Asynchronous Distributed Coordination and Consensus}}, + note = {\url{https://drive.google.com/file/d/1Zcas7JXQ61fcNitUSbcZk9Y0tf8jTeIl/view?usp=sharing}}, + month = jul, + year = 2019, +} + +@inproceedings{frigo98cilk, + author = {Frigo, Matteo and Leiserson, Charles E. and + Randall, Keith H.}, + title = {The implementation of the {C}ilk-5 multithreaded language}, + booktitle = {\bibconf{PLDI}{Proceedings of the + {ACM SIGPLAN} conference on Programming language + design and implementation}}, + year = {1998}, + pages = {212--223}, +} + +@article{ foster95fortran, + author = {Ian T. Foster and K. Mani Chandy}, + title = {Fortran M: A Language for Modular Parallel Programming}, + journal = {Journal of Parallel and Distributed Computing}, + volume = {26}, + number = {1}, + year = {1995}, + pages = {24-35}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@inproceedings{ francis02ipnl, + author = {Paul Francis and Ramakrishna Gummadi}, + title = {{IPNL}: A {NAT}-extended {Internet} architecture}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Pittsburgh, PA}, + month = aug, + year = {2002}, +} + +@inproceedings{ fraser99hardening, + author = "Timothy Fraser and Lee Badger and Mark Feldman", + title = "Hardening {COTS} Software with Generic Software Wrappers", + booktitle = "{IEEE} Symposium on Security and Privacy", + pages = "2-16", + year = "1999", +} + +@inproceedings{ freedman05nontransitive, + author = {Michael J. Freedman and others}, + title = {Non-Transitive Connectivity and {DHTs}}, + booktitle = {USENIX WORLDS 2005}, + month = dec, + year = 2005, +} + +@inproceedings{ freire08tcp, + author = {S\'ergio Freire and Andr\'e Z\'uquete}, + title = {A {TCP}-layer name service for {TCP} ports}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2008, + location = {Boston, MA}, +} + +@article{ fu02sfsro, + author = "Kevin Fu and M. Frans Kaashoek and David Mazi\`eres", + title = "Fast and secure distributed read-only file system", + journal = {ACM \bibconf{TOCS}{Transactions on Computer Systems}}, + month = feb, + year = "2002", +} + +@article{ fu03tcp, + author = {Cheng Peng Fu and Soung C. Liew}, + title = {{TCP Veno}: {TCP} Enhancement for Transmission Over + Wireless Access Networks}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 21, + number = 2, + month = feb, + year = 2003, + pages = {216-228}, +} + +@inproceedings{ fu05delay, + author = {Qiang Fu and Jadwiga Indulska}, + title = {A Delay-Based Approach for {TCP} Parallelization}, + booktitle = {\bibconf][1st]{NGI}{Conference on + Next Generation Internet Networks}}, + month = apr, + year = 2005, + location = {Rome}, +} + +@article{fujimoto88efficient, + author = {Richard M. Fujimoto and William B. Campbell}, + title = {Efficient instruction level simulation of computers}, + journal = {Transactions of the Society for Computer Simulation International}, + volume = {5}, + number = {2}, + year = {1988}, + month = apr, + issn = {0740-6797}, + pages = {109--124}, + publisher = {Society for Computer Simulation International}, +} + +%G + +@inproceedings{garcia11efficient, + title={\href{http://dl.acm.org/citation.cfm?doid=1966445.1966456}{Efficient middleware for byzantine fault tolerant database replication}}, + author={Garcia, Rui and Rodrigues, Rodrigo and Pregui{\c{c}}a, Nuno}, + booktitle={Proceedings of the sixth conference on Computer systems}, + pages={107--122}, + year={2011}, + organization={ACM} +} + +@inproceedings{ garfinkel03traps, + author = "Tal Garfinkel", + title = "Traps and Pitfalls: Practical Problems in + System Call Interposition based Security Tools", + booktitle = "Network and Distributed System Security", + month = feb, + year = 2003, +} + +@inproceedings{ garfinkel03virtual, + author = {Tal Garfinkel and Mendel Rosenblum}, + title = {A Virtual Machine Introspection Based Architecture + for Intrusion Detection}, + booktitle = {\bibconf[10th]{NDSS}{Network and Distributed System + Security Symposium}}, + month = feb, + year = 2003, + location = {San Diego, CA}, +} + +@inproceedings{garfinkel04ostia, + author = {Tal Garfinkel and Ben Pfaff and Mendel Rosenblum}, + title = {Ostia: A Delegating Architecture for + Secure System Call Interposition}, + booktitle = {Network and Distributed System Security}, + month = feb, + year = 2004, +} + +@inproceedings{ garfinkel07compatibility, + author = {Tal Garfinkel and Keith Adams and Andrew Warfield + and Jason Franklin}, + title = {Compatibility is Not Transparency: + {VMM} Detection Myths and Realities}, + booktitle = {\bibconf[11th]{HotOS}{Workshop on + Hot Topics in Operating Systems}}, + month = may, + year = 2007, + location = {San Diego, CA}, +} + +@inproceedings { gassend03merkle, + author={Gassend, B. and Suh, G.E. and Clarke, D. and van Dijk, M. and Devadas, S}, + booktitle={\bibconf{HPCA}{High-Performance Computer Architecture}}, + title={Caches and hash trees for efficient memory integrity verification}, + year={2003}, +} + +@misc{ gettys96mux, + author = {Jim Gettys}, + title = {Simple {MUX} Protocol Specification}, + month = oct, + year = 1996, + note = "W3C Working Draft", +} + +@misc{ garrett96preserving, + author = "John Garrett and Donald Waters", + title = "Preserving Digital Information: + Report of the Task Force on Archiving of Digital Information", + month = may, + date = "1", + year = "1996", + url = {{\tt http://www.rlg.org/ArchTF}} +} + +@article{ gavoille01spaceefficiency, + author = "Cyril Gavoille and Marc Gengler", + title = "Space-Efficiency for Routing Schemes of Stretch Factor Three", + journal = "\bibconf{JPDC}{Journal of Parallel and Distributed Computing}", + volume = "61", + number = "5", + pages = "679--687", + year = "2001", + url = "citeseer.ist.psu.edu/article/gavoille97spaceefficiency.html" +} + +@article{ gerla80flow, + author = {Mario Gerla and Len Kleinrock}, + title = {Flow Control : A Comparative Survey}, + journal = {IEEE Transactions on Communications}, + month = apr, + year = 1980, + volume = 28, + number = 4, + pages = {553-574} +} + +@inproceedings{ gerla00landmark, + author = "Mario Gerla and Xiaoyan Hong and Guangyu Pei", + title = "Landmark Routing for Large Ad Hoc Wireless Networks", + booktitle = {\bibconf{GLOBECOM}{IEEE GLOBECOM}}, + location = "San Francisco, CA", + month = nov, + year = "2000", + url = "citeseer.nj.nec.com/gerla00landmark.html", +} + +@inproceedings{ gharachorloo90memory, + author={Kourosh Gharachorloo and Daniel Lenoski and James Laudon + and Phillip Gibbons and Anoop Gupta and John Hennessy}, + title={Memory Consistency and Event Ordering in + Scalable Shared-Memory Multiprocessors}, + booktitle = {\bibconf[17th]{ISCA}{International Symposium on + Computer Architecture}}, + year={1990}, + month={May}, + pages={15-26}, + location = {Seattle, WA}, +} + +@inproceedings{ ghormley98slic, + author = {Douglas P. Ghormley and David Petrou and + Steven H. Rodrigues and Thomas E. Anderson}, + title = {{SLIC}: An Extensibility System + for Commodity Operating Systems}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 1998, +} + +@misc{ gnu12libgomp, + author = {Gnu}, + title = {Gnu libgomp}, + url = {\url{http://gcc.gnu.org/onlinedocs/libgomp}} +} + +@misc{ ghuloum10arbb, + author = {Anwar Ghuloum and Amanda Sharp and Noah Clemons and + Stefanus Du Toit and Rama Malladi and Mukesh Gangadhar and + Michael McCool and Hans Pabst}, + title = {{A}rray {B}uilding {B}locks: A Flexible Parallel + Programming Model for Multicore and Many-Core + Architectures}, + month = sep, + year = 2010, + url = {\url{http://drdobbs.com/go-parallel/article/showArticle.jhtml?articleID=227300084}} +} + +@inproceedings{gill08flattening, + author = {Phillipa Gill and Martin F. Arlitt and Zongpeng Li + and Anirban Mahanti}, + booktitle = {PAM}, + pages = {1-10}, + publisher = {Springer}, + series = {Lecture Notes in Computer Science}, + title = {The Flattening Internet Topology: Natural Evolution, + Unsightly Barnacles or Contrived Collapse?}, + volume = {4979}, + year = {2008}, +} + +@inproceedings{ godfrey08pathlet, + author = {Philip Brighten Godfrey and Scott Shenker and Ion Stoica}, + title = {Pathlet Routing}, + booktitle = {\bibconf[7th]{HotNets}{7th Workshop + on Hot Topics in Networks}}, + location = {Calgary, Alberta, Canada}, + month = oct, + day = 6, + year = 2008, +} + +@inproceedings{ goldberg96secure, + author = "Ian Goldberg and David Wagner and Randi Thomas and + Eric A. Brewer", + title = "A Secure Environment for Untrusted Helper Applications", + booktitle = "6th USENIX Security Symposium", + location = "San Jose, CA", + year = "1996", + url = "citeseer.ist.psu.edu/goldberg96secure.html" +} + +@inproceedings{ goldberg98towards, + author = "Andrew V. Goldberg and Peter N. Yianilos", + title = "Towards an Archival Intermemory", + booktitle = "{IEEE} Advances in Digital Libraries", + publisher = "IEEE Computer Society", + location = "Santa Barbara, CA", + pages = "147--156", + year = "1998", + url = "citeseer.ist.psu.edu/goldberg98towards.html" +} + +@article{ gong01jxta, + author = {Li Gong}, + title = {{JXTA}: A Network Programming Environment}, + journal = {IEEE Internet Computing}, + volume = {5}, + number = {3}, + pages = {88-95}, + year = {2001}, + month = may, +} + +@misc{ gosling96java, + author = {James Gosling and Henry McGilton}, + title = {The {Java} Language Environment}, + month = may, + year = 1996, + note = {\\ {\footnotesize\tt http://java.sun.com/docs/white/langenv/}}, +} + +@book{ gosling00java, + author = {James Gosling and Bill Joy and Guy Steele and Gilad Bracha}, + title = {The {Java} Language Specification}, + edition = {second}, + publisher = {Addison-Wesley}, + year = {2000}, + month = jun, +} + +@book{ greenberg95groupware, + author = {Saul Greenberg and Stephen Hayne and Roy {Rada (editors)}}, + title = {Groupware for Real-Time Drawing: A Designer's Guide}, + isbn = {0-07-707899-3}, + publisher = {McGraw-Hill Book Company}, + location = {Berkshire, England}, + year = {1995}, + pages = {248}, +} + +@inproceedings{ gritter01content, + author = "M. Gritter and D. R. Cheriton", + title = "An Architecture for Content Routing Support in the {Internet}", + booktitle = "\bibconf{USITS}{USENIX Symposium on + Internet Technologies and Systems}", + month = mar, + year = "2001", +} + +@techreport{grune86concurrent, + author = {Dick Grune}, + title = {Concurrent Versions System, + A Method for Independent Cooperation}, + institution = {Vrije Universiteit}, + location = {Amsterdam}, + year = 1986, + number = {IR 113}, +} + +@inproceedings{ gu11certikos, + author = {Liang Gu and Alexander Vaynberg and Bryan Ford + and Zhong Shao and David Costanzo}, + title = {{CertiKOS}: A Certified Kernel for Secure Cloud Computing}, + booktitle = {\bibconf[2nd]{APSys}{ACM SIGOPS Asia-Pacific + Workshop on Systems}}, + month = jul, + year = 2011, + location = {Shanghai, China}, +} + +@inproceedings{ guha04nutss, + author = "Saikat Guha and Yutaka Takeday and Paul Francis", + title = "{NUTSS}: A {SIP}-based Approach + to {UDP} and {TCP} Network Connectivity", + booktitle = "SIGCOMM 2004 Workshops", + year = "2004", + month = aug, + date = "30", + location = "Portland, OR", +} + +@inproceedings{ guha05characterization, + author = {Saikat Guha and Paul Francis}, + title = {Characterization and Measurement of {TCP} Traversal + through {NATs} and Firewalls}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = 2005, + location = {Berkeley, CA}, +} + +@inproceedings{ guha07end, + author = "Saikat Guha and Paul Francis", + title = "{An End-Middle-End Approach to Connection Establishment}", + booktitle = "SIGCOMM 2007", + year = "2007", + month = aug, + location = "Kyoto, Japan", +} + +@inproceedings{guo13failure, + author = {Zhenyu Guo and + Sean McDirmid and + Mao Yang and + Li Zhuang and + Pu Zhang and + Yingwei Luo and + Tom Bergan and + Peter Bodik and + Madan Musuvathi and + Zheng Zhang and + Lidong Zhou}, + title = {Failure Recovery: {W}hen the Cure Is + Worse Than the Disease}, + booktitle = {\bibconf[14th]{HotOS}{Workshop on Hot Topics in Operating + Systems}}, + location = {Santa Ana Pueblo, NM}, + month = may, + year = 2013 +} + +@article{ gustafsson97literature, + author = {Eva Gustafsson and Gunnar Karlsson}, + title = {A literature survey on traffic dispersion}, + journal = {IEEE Network}, + volume = 11, + number = 2, + month = mar, + year = 1997, + pages = {28-36}, +} + +@inproceedings{ guy90implementation, + author = {Richard G. Guy and others}, + booktitle = {USENIX Summer Conference}, + title = {Implementation of the {Ficus} Replicated File System}, + month = jun, + pages = "63--71", + year = "1990", + url = "citeseer.ist.psu.edu/guy90implementation.html" +} + +@inproceedings{ guy93consistency, + author = {R. G. Guy and G. J. Popek and T. W. {Page, Jr.}}, + title = {Consistency Algorithms for Optimisic Replication}, + booktitle = {First International Conference on Network Protocols}, + year = "1993", + url = "citeseer.ist.psu.edu/guy93consistency.html" +} + +@inproceedings{ guy98rumor, + author = {Richard Guy and others}, + title = {Rumor: Mobile Data Access Through + Optimistic Peer-to-Peer Replication}, + booktitle = {{ER} Workshops}, + year = 1998, + pages = {254-265}, +} + + +%H + +@inproceedings{ habib01unresponsive, + author = {Ahsan Habib and Bharat Bhargava}, + title = {Unresponsive Flow Detection and Control Using the + Differentiated Services Framework}, + booktitle = {\bibconf{PDCS}{IASTED International Conference on + Parallel and Distributed Computing Systems}}, + month = aug, + year = 2001, + location = {Anaheim, CA}, +} + + +@inproceedings{ hacker02endtoend, + author = {Thomas J. Hacker and Brian D. Athey}, + title = {The End-to-End Performance Effects of Parallel {TCP} Sockets + on a Lossy Wide-Area Network}, + booktitle = {\bibconf{IPDPS}{International Parallel and + Distributed Processing Symposium}}, + location = {Fort Lauderdale, FL}, + month = apr, + year = 2002, +} + +@inproceedings{ hacker04improving, + author = {Thomas J. Hacker and Brian D. Noble and Brian D. Athey}, + title = {Improving Throughput and Maintaining Fairness + using {Parallel TCP}}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + month = nov, + year = 2004, + location = {Dallas, TX}, +} + + +@inproceedings{ haeberlen05glacier, + author = {Andreas Haeberlen and + Alan Mislove and + Peter Druschel}, + title = {{Glacier}: + {H}ighly Durable, Decentralized Storage Despite Massive + Correlated Failures}, + booktitle = {\bibconf[2nd]{NSDI}{Symposium on Networked Systems + Design and Implementation}}, + location = {Boston, MA}, + month = may, + year = 2005 +} + + +@inproceedings{ haeberlen07peerreview, + author = {Andreas Haeberlen and Petr Kouznetsov and Peter Druschel}, + title = {\href{http://www.sosp2007.org/papers/sosp118-haeberlen.pdf}{{PeerReview}: Practical Accountability for Distributed Systems}}, + booktitle = {\bibconf[21st]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + location = {Stevenson, WA}, + month = oct, + year = 2007, +} + +@inproceedings{haeberlen09case, + author = {Andreas Haeberlen}, + title = {A Case for the Accountable Cloud}, + booktitle = {\bibconf[3rd]{LADIS}{ACM SIGOPS International Workshop on + Large-Scale Distributed Systems and Middleware}}, + location = {Big Sky, MT}, + month = oct, + year = 2009 +} + +@inproceedings{ haeberlen09fault, + author = {Andreas Haeberlen and Petr Kuznetsov}, + title = {The Fault Detection Problem}, + booktitle = {13th International Conference on + Principles of Distributed Systems (OPODIS '09)}, + location = {N\^imes, France}, + month = dec, + year = 2009, +} + +@inproceedings{ haeberlen10accountable, + author = {Andreas Haeberlen and Paarijaat Aditya and Rodrigo Rodrigues + and Peter Druschel}, + title = {\href{https://www.usenix.org/conference/osdi10/accountable-virtual-machines}{Accountable Virtual Machines}}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + location = {Vancouver, BC, Canada}, + month = oct, + year = 2010, +} + +@inproceedings{hajjat10cloudward, + author = {Mohammad Y. Hajjat and + Xin Sun and + Yu-Wei Eric Sung and + David A. Maltz and + Sanjay G. Rao and + Kunwadee Sripanidkulchai and + Mohit Tawarmalani}, + title = {Cloud{W}ard Bound: {P}lanning for Beneficial Migration of + Enterprise Applications to the Cloud}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {New Delhi, India}, + month = aug, + year = 2010 +} + + +@article{halbwachs91lustre, + author={Halbwachs, N. and Caspi, P. and Raymond, P. and Pilaud, D.}, + journal={Proceedings of the IEEE}, title={The synchronous data + flow programming language {LUSTRE}}, + year={1991}, + month = sep, + volume={79}, + number={9}, + pages={1305--1320}, +} + +@misc{ hall11mandelbrot, + author = {Brian ``Beej Jorgenson'' Hall}, + title = {Command-line Mandelbrot Set generator with OpenMP support}, + year = 2011, + url = {https://github.com/beej71/goatbrot} +} + +@article{ hall06wan, + author = {Michael Hall}, + title = {{WAN} Optimization Dominated by Startups, Growing Fast}, + journal = {Enterprise Networking Planet}, + month = apr, + day = 17, + year = 2006, + url = {http://www.enterprisenetworkingplanet.com/nethub/article.php/3599576}, +} + +@article{ halstead85multilisp, + author = {Robert H. {Halstead, Jr.}}, + title = {{Multilisp}: A Language for Concurrent Symbolic Computation}, + journal = {\bibconf{TOPLAS}{ACM Transactions on Programming Languages + and Systems}}, + volume = 7, + number = 4, + month = oct, + year = 1985, + pages = {501-538}, +} + +@misc{ hammond-functional, + author = {Kevin Hammond}, + title = {Parallel Functional Programming: An Introduction}, + url = {http://pdf.aminer.org/000/213/977/bwm_a_concrete_machine_for_graph_reduction.pdf}, +} + +@book{ hammond99research, + author = {Kevin Hammond and Greg Michaelson}, + title = {Research Directions in Parallel Functional Programming}, + publisher = {Springer}, + location = {UK}, + month = nov, + year = 1999, +} + +@inproceedings{ han04overlay, + author = {H. Han and others}, + title = {Overlay TCP for multi-path routing and congestion control}, + booktitle = {IMA Workshop on Measurements and Modeling of the Internet}, + year = 2004, + month = jan +} + +@article{ hanbali05survey, + author = {Ahmad Al Hanbali and Eitan Altman and Philippe Nain}, + title = {A Survey of TCP over Ad Hoc Networks}, + journal = {IEEE Surveys \& Tutorials}, + volume = 7, + number = 3, + year = 2005, +} + +@article{hankin81cajole, + author = {Hankin, C. L. and Glaser, H. W.}, + title = {The data flow programming language {CAJOLE} -- an informal introduction}, + journal = {ACM SIGPLAN Notices}, + volume = {16}, + number = {7}, + month = jul, + year = {1981}, + pages = {35--44}, +} + +@inproceedings{ hanrot07worst, + author = {Guillaume Hanrot and Vincent Lef\`evre and Damien Stehl\'e + and Paul Zimmermann}, + title = {Worst Cases of a Periodic Function for Large Arguments}, + booktitle = {18th IEEE Symposium on Computer Arithmetic}, + location = {Montpellier, France}, + month = jun, + year = 2007, +} + +@techreport{ hanushevsky01peer, + author = {Andrew Hanushevsky and Artem Trunov and Les Cottrell}, + title = {Peer-to-Peer Computing for + Secure High Performance Data Copying}, + institution = {Stanford National Accelerator Laboratory}, + number = {SLAC-PUB-9173}, + month = sep, + year = 2001, +} + +@book{ hare96internet, + author = {Chris Hare and Karanjit Siyan}, + title = {{Internet} Firewalls and Network Security}, + publisher = {New Riders}, + location = {Indianapolis, Indiana}, + year = 1996, + isbn = {1-56205-632-8}, +} + +@book{ harris10tm, + author = {Tim Harris and James Larus and Ravi Rajwar}, + title = {Transactional Memory}, + edition = {2nd}, + publisher = {Morgan \& Claypool}, + year = 2010, + isbn = 9781608452361, +} + + +@article{ hasegawa07receiver, + author = {Go Hasegawa and Masashi Nakata and Hirotaka Nakano}, + title = {Receiver-Based {ACK} Splitting Mechanism for {TCP} + over Wired/Wireless Heterogeneous Networks}, + journal = {IEICE Transactions on Communications}, + volume = {E90-B}, + number = 5, + month = may, + year = 2007, +} + +@inproceedings{he13next, + author = {Keqiang He and + Alexis Fisher and + Liang Wang and + Aaron Gember and + Aditya Akella and + Thomas Ristenpart}, + title = {Next step, the cloud: {U}nderstanding modern web service + deployment in {EC2} and {A}zure}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + location = {Barcelona, Spain}, + month = oct, + year = 2013 +} + + +@inproceedings{ helmy00multicastbased, + author = "Ahmed Helmy", + title = "A multicast-based protocol for {IP} mobility support", + booktitle = "Networked Group Communication", + pages = "49-58", + year = "2000", + url = "citeseer.nj.nec.com/464678.html" +} + +@article{ henderson99transport, + author = {Thomas R. Henderson and Randy H. Katz}, + title = {Transport Protocols for + Internet-Compatible Satellite Networks}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 17, + number = 2, + month = feb, + year = 1999, + pages = {326-344}, +} + +@incollection {hendren92mccat, + author = {Hendren, L. and Donawa, C. and Emami, M. + and Gao, G. and Justiani, and Sridharan, B.}, + title = {Designing the {McCAT} compiler based on a family of + structured intermediate representations}, + booktitle = {Languages and Compilers for Parallel Computing}, + series = {Lecture Notes in Computer Science}, + publisher = {Springer Berlin / Heidelberg}, + pages = {406--420}, + volume = {757}, + year = {1993} +} + +@inproceedings{ herlihy93transactional, + author = {Maurice Herlihy and J. Eliot B. Moss}, + title = {Transactional Memory: Architectural Support for + Lock-Free Data Structures}, + booktitle = {\bibconf[20th]{ISCA}{International Symposium on + Computer Architecture}}, + location = {San Diego, CA}, + pages = {289-300}, + month = may, + year = 1993, +} + +@techreport{ hogan96hierarchical, + author = {David Hogan}, + title = {Hierarchical Fair Queuing}, + institution = {University of Sydney}, + number = {506}, + month = may, + year = 1996, + isbn = {1-86451-024-2}, +} + +@article{ holland02analysis, + author = {Gavin Holland and Nitin Vaidya}, + title = {Analysis of {TCP} Performance over Mobile Ad Hoc Networks}, + journal = {Wireless Networks}, + volume = 8, + number = 2, + month = mar, + year = 2002, +} + +@mastersthesis{ honda09bidimensional, + author = {Michio Honda}, + title = {Bidimensional-Probe Multipath Congestion Control + for Shared Bottleneck Fairness}, + school = {Keio University}, + year = 2009, +} + +@inproceedings{ honda09multipath, + author = {Michio Honda and Yoshifumi Nishida and Lars Eggert + and Pasi Sarolahti and Hideyuki Tokuda}, + title = {Multipath Congestion Control for Shared Bottleneck}, + booktitle = {\bibconf{PFLDnet}{International Workshop on Protocols + for Future Large-Scale and Diverse Network Transports}}, + month = may, + days = {21-22}, + year = 2009, + location = {Akihabara, Tokyo, Japan}, +} + +@book{ honeywell83gcos, + author = {Honeywell Inc.}, + title = {{GCOS} Environment Simulator}, + month = dec, + year = 1983, + note = {Order Number AN05-02A}, +} + +@inproceedings{ hooff15scalable, + author = {Jelle van den Hooff and + David Lazar and + Matei Zaharia and + Nickolai Zeldovich}, + title = {Scalable Private Messaging Resistant to Traffic Analysis}, + booktitle = {\bibconf[25th]{SOSP}{{ACM} Symposium on + Operating Systems Principles}}, + location = {Monterey, CA}, + month = oct, + year = 2015 +} + +@article{houmansadr12sweet, + author = {Amir Houmansadr and + Wenxuan Zhou and + Matthew Caesar and + Nikita Borisov}, + title = {SWEET: Serving the Web by Exploiting Email Tunnels}, + journal = {CoRR}, + volume = {abs/1211.3191}, + year = {2012}, + ee = {http://arxiv.org/abs/1211.3191}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@article{ howard15raft, + author = {Heidi Howard and Malte Schwarzkopf and Anil Madhavapeddy + and Jon Crowcroft}, + title = {{Raft} Refloated: Do We Have Consensus?}, + journal = {ACM SIGOPS Operating Systems Review}, + volume = 49, + number = 1, + month = jan, + year = 2015, + pages = {12-21}, +} + +% edition = "Third", +@book{ hp94parisc, + title = "PA-RISC 1.1 Architecture and Instruction Set Reference Manual", + publisher = "Hewlett-Packard", + year = "1994", + month = feb, +} + +@inproceedings{ hsieh02ptcp, + title = {{pTCP}: An End-to-End Transport Layer Protocol + for Striped Connections}, + author = {Hung-Yun Hsieh and Raghupathy Sivakumar}, + booktitle = {\bibconf[10th]{ICNP}{International Conference on + Network Protocols}}, + location = {Paris, France}, + month = nov, + year = 2002, +} + +@inproceedings{ hsieh02transport, + title = {A transport layer approach for achieving aggregate bandwidths + on multi-homed mobile hosts}, + author = {Hung-Yun Hsieh and Raghupathy Sivakumar}, + booktitle = "\bibconf[8th]{MOBICOM}{International Conference on Mobile + Computing and Networking}", + location = {Atlanta, GA}, + month = sep, + year = 2002, +} + +@misc{ hughes17radix, + author = {Dan Hughes}, + title = {\href{https://papers.radixdlt.com/tempo/}{Radix -- Tempo}}, + month = sep, + year = 2017, +} + +# author = {Nicholas Hunt and Tom Bergan and Luis Ceze and +# Steven D. Gribble}, +@inproceedings{ hunt13ddos, + author = {Nicholas Hunt and others}, + title = {{DDOS}: Taming Nondeterminism in Distributed Systems}, + booktitle = "\bibconf[18th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages and + Operating Systems}", + year = {2013}, + isbn = {978-1-4503-1870-9}, + location = {Houston, Texas, USA}, + pages = {499-508}, + url = {http://doi.acm.org/10.1145/2451116.2451170}, + doi = {10.1145/2451116.2451170}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {determinism, distributed systems, record/replay}, +} + +@article{ hutchinson91xkernel, + author = {Norman C. Hutchinson and Larry L. Peterson}, + title = {The {x-Kernel}: An Architecture for + Implementing Network Protocols}, + journal = {IEEE Transactions on Software Engineering}, + volume = 17, + number = 1, + month = jan, + year = 1991, +} + +%I + +@misc{ icann08biggest, + author = {ICANN}, + title = {Biggest Expansion in {gTLDs} Approved for Implementation}, + month = jun, + day = 26, + year = 2008, + note = {\url{http://www.icann.org/en/announcements/announcement-4-26jun08-en.htm}}, +} + +@misc{ id05q3engine, + author = {{Id Software}}, + title = {{Id Tech} 3 engine (ioquake3)}, + month = aug, + day = 19, + year = 2005, + note = {\url{ftp://ftp.idsoftware.com/idstuff/source/quake3-1.32b-source.zip}}, +} + +@misc{ idhistory, + author = {{Id Software}}, + title = {{Id Software} History}, + note = {\url{http://www.idsoftware.com/business/history/}}, +} + +@misc{ ieee94boot, + author = {IEEE}, + title = {Std 1275-1994: Boot Firmware}, + year = 1994, + isbn = {1-55937-426-8}, +} + +@misc{ ieee802-3, + author = {IEEE}, + title = {Std 802.3-2005}, + month = dec, + year = 2005, + isbn = {0-7381-4740-0}, +} + +@misc{ ieee802-11i, + author = {IEEE}, + title = {Std 802.11i-2004}, + month = jul, + year = 2004, + isbn = {0-7381-4074-0}, +} + +@inproceedings{ inamura04impact, + author = {Hiroshi Inamura and Osamu Takahashi and Hirotaka Nakano and + and Taro Ishikawa and Hiroshi Shigeno}, + title = {Impact of Layer Two {ARQ} on {TCP} Performance + in {W-CDMA} Networks}, + booktitle = {\bibconf{ICDCS}{International Conference on + Distributed Computing Systems}}, + location = {Tokyo, Japan}, + month = mar, + year = 2004, +} + +@inproceedings{ ingram12treehouse, + author = {Lon Ingram and Michael Walfish}, + title = {{TreeHouse}: {JavaScript} sandboxes to help {Web} developers + help themselves}, + booktitle = {\bibconf{ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2012, + location = {Boston, MA}, +} + +@misc{ intel05ia32, + author = {{Intel Corporation}}, + title = {{IA-32} {Intel} Architecture Software Developer's Manual}, + year = 2005, + month = jun, +} + +@misc{ intel09, + author = {{Intel Corporation}}, + title = {{Intel\textregistered\ 64} and {IA-32} Architectures + Software Developer's Manual}, + month = mar, + year = 2009, +} + +@misc{ intel12tbb, + author = {{Intel Corporation}}, + title = {{Intel\textregistered Threading Building Blocks} Reference Manual}, + month = jan, + year = 2012, +} + +@inproceedings{ iverson62apl, + author = {Kenneth Iverson}, + title = {A Programming Language}, + booktitle = {Proceedings of the May 1--3, 1962, spring joint + computer conference}, + year = 1962, + location = {San Francisco, CA}, + pages = {345--351}, +} + +@inproceedings{ iyengar04concurrent, + author = {Janardhan R. Iyengar and Keyur C. Shah and Paul D. Amer + and Randall Stewart}, + title = {Concurrent Multipath Transfer Using {SCTP} Multihoming}, + booktitle = {\bibconf{SPECTS}{Symposium on Performance Evaluation + of Computer and Telecommunication Systems}}, + location = {San Jose, CA}, + month = jul, + year = 2004, +} + + +@article{ iyengar06concurrent, + author = {Janardhan R. Iyengar and Paul D. Amer and Randall Stewart}, + title = {Concurrent Multipath Transfer Using {SCTP} Multihoming + Over Independent End-to-End Paths}, + journal = {Transactions on Networking}, + volume = {14}, + number = {5}, + month = oct, + year = {2006}, + pages = {951--964}, +} + +%J + +@article{ jacobson88congestion, + author = {Van Jacobson}, + title = {Congestion Avoidance and Control}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1988, + location = {Stanford, CA}, + pages = {314-329}, +} + +@inproceedings{ jain99userlevel, + author = "K. Jain and R. Sekar", + title = "User-Level Infrastructure for System Call Interposition: + A Platform for Intrusion Detection and Confinement", + booktitle = {Network and Distributed System Security}, + month = feb, + year = 2000, +} + +@article{ jefferson85virtual, + author = {David R. Jefferson}, + title = {Virtual Time}, + journal = {ACM Transactions on Programming Languages and Systems}, + volume = 7, + number = 3, + month = jul, + year = 1985, +} + +@inproceedings{jensen09technical, + title={On technical security issues in cloud computing}, + author={Jensen, Meiko and Schwenk, J{\"o}rg and Gruschka, Nils and Iacono, Luigi Lo}, + booktitle={Cloud Computing, 2009. CLOUD'09. IEEE International Conference on}, + pages={109--116}, + year={2009}, + organization={IEEE} +} + +@article{jhawar13fault, + author = {Ravi Jhawar and + Vincenzo Piuri and + Marco D. Santambrogio}, + title = {Fault Tolerance Management in Cloud Computing: + {A} System-Level Perspective}, + journal = {IEEE Systems Journal}, + volume = {7}, + number = {2}, + year = {2013}, + pages = {288-297} +} + + +@article{ jin03spectrum, + author = {Shudong Jin and Liang Guo and Ibrahim Matta + and Azer Bestavros}, + title = {A Spectrum of {TCP}-Friendly Window-Based + Congestion Control Algorithms}, + journal = {Transactions on Networking}, + volume = 11, + number = 3, + pages = {341-355}, + month = jun, + year = 2003, +} + +@techreport{ jin99openmp, + author = {H. Jin and M. Frumkin and J. Yan}, + title = {The {OpenMP} Implementation of {NAS} Parallel Benchmarks + and Its Performance}, + institution = {NASA Ames Research Center}, + number = {NAS-99-011}, + month = oct, + year = 1999, +} + + +@techreport{ wijingaar02mpi, + author = {Rob F. Van der Wijingaart}, + title = {{NAS} Parallel Benchmarks Version 2.4}, + institution = {NASA Ames Research Center}, + number = {NAS-02-007}, + month = oct, + year = 2002, +} + +@inproceedings{ sodan05mpvssm, + author = {Angela C. Sodan}, + title = {Message-Passing and Shared-Data Programming Models -- Wish vs. Reality}, + booktitle = {\bibconf{19th HPCA}{19th International Symposium on High Performance Computing Systems and Applications}}, + month = may, + year = 2005, +} + +@inproceedings{ jin99spack, + author = {Kyohong Jin and Kilyeon Kim and Jungtae Lee}, + title = {{SPACK}: rapid recovery of the {TCP} performance + using split-ack in mobile communication environments}, + booktitle = {IEEE Region 10 Conference}, + month = sep, + year = 1999, +} + +@article{ johnson89xerox, + author = {Jeff Johnson and Teresa L. Roberts}, + title = {The {Xerox} {``Star''}: A Retrospective}, + journal = {IEEE Computer}, + year = {1989}, + month = sep, +} + +% first DSR paper +@inproceedings{ johnson94routing, + author = "David B. Johnson", + title = "Routing in Ad Hoc Networks of Mobile Hosts", + booktitle = "{IEEE} Workshop on + Mobile Computing Systems and Applications", + pages = "158-163", + month = dec, + year = "1994", +} + +@article{ johnston00us, + author = {Margret Johnston}, + title = {{U.S.} Relaxes Encryption Export Policy}, + journal = {PC World}, + month = jan, + day = 13, + year = 2000, + url = {http://www.pcworld.com/article/14768/us_relaxes_encryption_export_policy.html}, +} + +@article{johnston04dataflow, + author = {Johnston, Wesley M. and Hanna, J. R. Paul and Millar, Richard J.}, + title = {Advances in dataflow programming languages}, + journal = {ACM Computing Surveys}, + volume = {36}, + number = {1}, + month = mar, + year = 2004, + pages = {1--34}, +} + +@inproceedings{joukov11static, + author = {Nikolai Joukov and + Vasily Tarasov and + Joel Ossher and + Birgit Pfitzmann and + Sergej Chicherin and + Marco Pistoiz and + Takaaki Tateishi}, + title = {Static discovery and remediation of code-embedded resource + dependencies}, + booktitle = {Integrated Network Management}, + pages = {233-240}, + year = 2011 +} + +@article{jujjuri10virtfs, + title = {VirtFS--A virtualization aware File System pass-through}, + author = {Venkateswararao Jujjuri and Eric Van Hensbergen and Anthony Liguori and Badari Pulavarty}, + booktitle = {Ottawa Linux Symposium}, + year = {2010}, + month = {June}, +} + +@inproceedings{junqueira05surviving, + author = {Flavio Paiva Junqueira and + Ranjita Bhagwan and + Alejandro Hevia and + Keith Marzullo and + Geoffrey M. Voelker}, + title = {Surviving {I}nternet catastrophes}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + booktitle = {USENIX Annual Technical Conference}, + location = {Anaheim, CA}, + month = apr, + year = 2005 +} + +%K + +@inproceedings{keidar95increasing, + title={Increasing the resilience of atomic commit, at no additional cost}, + author={Keidar, Idit and Dolev, Danny}, + booktitle={Proceedings of the fourteenth ACM SIGACT-SIGMOD-SIGART symposium on Principles of database systems}, + pages={245--254}, + year={1995}, + organization={ACM} +} + +@article{kemme00new, + title={\href{http://dl.acm.org/citation.cfm?doid=363951.363955}{A new approach to developing and implementing eager database replication protocols}}, + author={Kemme, Bettina and Alonso, Gustavo}, + journal={ACM Transactions on Database Systems (TODS)}, + volume={25}, + number={3}, + pages={333--379}, + year={2000}, + publisher={ACM} +} + +@inproceedings{ kahn74semantics, + author = {Kahn, Gilles}, + title = {The Semantics of a Simple Language for Parallel Programming}, + booktitle = {Information Processing}, + year = {1974}, + pages = {471-475}, + publisher = {North-Holland}, + address = {Amsterdam, Netherlands}, +} + +@techreport{ kaiser94cooperative, + author = "Gail E. Kaiser", + title = "Cooperative Transactions for Multi-User Environments", + institution = "Columbia University Department of Computer Science", + number = "CUCS-006-93", + year = "1994", + url = "citeseer.ist.psu.edu/kaiser94cooperative.html" +} + +@article{ kaiser98wwwbased, + author = "Gail E. Kaiser and Stephen E. Dossick and Wenyu Jiang and + Jack Jingshuang Yang and Sonny Xi Ye", + title = "{WWW}-Based Collaboration Environments with + Distributed Tool Services", + journal = "World Wide Web", + volume = "1", + number = "1", + pages = "3-25", + year = "1998", + month = jan, + url = "citeseer.ist.psu.edu/kaiser97wwwbased.html" +} + +@inproceedings{ kalofonos08mynet, + author = {D. N. Kalofonos and Z. Antoniou and F. D. Reynolds + and M. Van-Kleek and J. Strauss and P. Wisner}, + title = {{MyNet}: a Platform for Secure {P2P} Personal + and Social Networking Services}, + booktitle = {\bibconf[6th]{PerCom}{Annual IEEE Conference on + Pervasive Computing and Communications}}, + month = mar, + year = 2008, + location = {Hong Kong}, +} + +@inproceedings{kamvar03eigentrust, + author = {Sepandar D. Kamvar and + Mario T. Schlosser and + Hector Garcia{-}Molina}, + title = {\href{https://dl.acm.org/citation.cfm?id=775242}{The EigenTrust Algorithm for Reputation Management in P2P Networks}}, + booktitle = {\bibconf{WWW}{International World Wide Web Conference}}, + month = may, + year = 2003, + pages = {640-651}, + location = {Budapest, Hungary} +} + +@inproceedings{ kapoor05achieving, + author = {Aman Kapoor and Aaron Falk and Ted Faber and Yuri Pryadkin}, + title = {Achieving Faster Access to Satellite Link Bandwidth}, + booktitle = {8th IEEE Global Internet Symposium}, + month = mar, + year = 2005, + location = {Miami, FL}, +} + +@inproceedings{ katabi02internet, + author = {Dina Katabi and Mark Handley and Charles Rohrs}, + title = {Internet Congestion Control for + High Bandwidth-Delay Product Networks}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2002, + location = {Pittsburgh, PA}, +} + +@inproceedings{ keleher92lazy, + author = {Pete Keleher and Alan L. Cox and Willy Zwaenepoel}, + title = {Lazy Release Consistency for + Software Distributed Shared Memory}, + booktitle = {\bibconf{ISCA}{13th International Symposium + on Computer Architecture}}, + month = may, + year = 1992, + pages = {13-21}, + location = {Gold Coast, Queensland, Australia}, +} + +@inproceedings{ keller10nohype, + author = {Eric Keller and Jakub Szefer and Jennifer Rexford + and Ruby B. Lee}, + title = {{NoHype}: Virtualized Cloud Infrastructure + without the Virtualization}, + booktitle = {\bibconf[37th]{ISCA}{International Symposium on + Computer Architecture}}, + location = {Saint-Malo, France}, + month = jun, + year = 2010, +} + +@article{ kelly03scalable, + author = {Tom Kelly}, + title = {Scalable {TCP}: Improving Performance in + Highspeed Wide Area Networks}, + journal = {Computer Communications Review}, + volume = 33, + number = 2, + month = apr, + year = 2003, + pages = {83-91}, +} + +@article{ kelly05stability, + author = {Frank Kelly and Thomas Voice}, + title = {Stability of end-to-end algorithms for joint routing + and rate control}, + journal = {Computer Communications Review}, + volume = 35, + number = 2, + month = apr, + year = 2005, + pages = {5-12}, +} + +@inproceedings{ kempf03evolving, + author = "James Kempf", + title = "Evolving the Internet Addressing Architecture", + booktitle = "International Symposium on Applications and the Internet + (SAINT '04)", + month = jan, + year = "2004", + location = "Tokyo, Japan", +} + +@article{ kemmerer83shared, + author = {Richard A. Kemmerer}, + title = {Shared Resource Matrix Methodology: + An Approach to Identifying Storage and Timing Channels}, + journal = {\bibconf{TOCS}{Transactions on Computer Systems}}, + volume = 1, + number = 3, + month = aug, + year = 1983, + pages = {256-277}, +} + +@inproceedings{ kim03dynamic, + author = "Ho-Seop Kim and James E. Smith", + title = "Dynamic Binary Translation for Accumulator-Oriented Architectures", + booktitle = "International Symposium on Code Generation and Optimization", + year = "2003", + month = mar, + location = "San Francisco, CA", + url = "citeseer.ist.psu.edu/kim03dynamic.html" +} + +% Note: conference version is king05tcp +@inproceedings{ king05evaluating, + title = {Evaluating and Improving {TCP-Africa}: an Adaptive and Fair + Rapid Increase Rule for Scalable {TCP} + Using Layered Congestion Control}, + author = {Ryan King and Rudolf Riedi and Richard Baraniuk}, + booktitle = {\bibconf[3rd]{PFLDnet}{Workshop on Protocols + for Fast Long-Distance Networks}}, + month = feb, + year = 2005, + location = {Lyon, France}, +} + +@inproceedings{ king05tcp, + title = {{TCP-Africa}: an Adaptive and Fair + Rapid Increase Rule for Scalable {TCP}}, + author = {Ryan King and Richard Baraniuk and Rudolf Riedi}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 2005, + location = {Miami, FL} +} + +@inproceedings{king05debugging, + author = {Samuel T. King and George W. Dunlap and Peter M. Chen}, + title = {Debugging operating systems with + time-traveling virtual machines}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = apr, + year = 2005, + pages = {1-15}, +} + +@misc{ kiriansky02secure, + author = "Vladimir Kiriansky and Derek Bruening and Saman Amarasinghe", + title = "Secure execution via program shepherding", + booktitle = "11th USENIX Security Symposium", + month = aug, + year = 2002, +} + +@inproceedings{ kissel09improving, + author = {Ezra Kissel and Martin Swany and Aaron Brown}, + title = {Improving {GridFTP} Performance + Using The {Phoebus} Session Layer}, + booktitle = {\bibconf{SC}{International Conference for + High Performance Computing, Networking, + Storage and Analysis}}, + month = nov, + year = 2009, + location = {Portland, OR}, +} + +@inproceedings{ kistler91disconnected, + author = "James J. Kistler and M. Satyanarayanan", + title = "Disconnected Operation in the {Coda} File System", + booktitle = "\bibconf[13th]{SOSP}{{ACM} Symposium on + Operating Systems Principles}", + pages = "213--225", + year = "1991", + url = "citeseer.ist.psu.edu/kistler92disconnected.html" +} + +@inproceedings{ klein09sel4, + author = {Gerwin Klein and others}, + title = {{seL4}: formal verification of an {OS} kernel}, + booktitle = {\bibconf[22nd]{SOSP}{ACM Symposium + on Operating System Principles}}, + month = oct, + year = 2009, + location = {Big Sky, MT}, +} + +@article{ kleinrock77hierarchical, + author = {Leonard Kleinrock and Farouk Kamoun}, + title = {Hierarchical routing for large networks: + Performance evaluation and optimization}, + journal = {Computer Networks}, + volume = 1, + number = 3, + pages = {155-174}, + year = 1977, +} + +@inproceedings{ ko98locationaided, + author = "Young-Bae Ko and Nitin H. Vaidya", + title = "Location-Aided Routing ({LAR}) in Mobile Ad Hoc Networks", + booktitle = "Mobile Computing and Networking", + pages = "66-75", + year = "1998", + url = "citeseer.nj.nec.com/ko98locationaided.html" +} + +@inproceedings{ kodialam06versatile, + author = {M. Kodialam and others}, + title = {A Versatile Scheme for Routing Highly Variable Traffic in + Service Overlays and IP Backbones}, + booktitle = {INFOCOMM}, + year = 2006, + month = apr +} + +@inproceedings{ kohler06dccp, + author = {Eddie Kohler and Mark Handley and Sally Floyd}, + title = {Designing {DCCP}: Congestion Control Without Reliability}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + year = 2006, +} + +@inproceedings{ kong08deconstructing, + author = {Jingfei Kong and Onur Ac\i{}i\c{c}mez and Jean-Pierre Seifert + and Huiyang Zhou}, + title = {Deconstructing New Cache Designs for + Thwarting Software Cache-based Side Channel Attacks}, + booktitle = {\bibconf[1st]{CSAW}{ACM Computer Security + Architecture Workshop}}, + month = oct, + year = 2008, + location = {Fairfax, VA}, +} + +@book{ kopetz11real-time, + author = {Hermann Kopetz}, + title = {Real-Time Systems: + Design Principles for Distributed Embedded Applications}, + publisher = {Springer}, + month = apr, + year = 2011, + isbn = {978-1441982360}, + pages = {378}, +} + +@inproceedings{ kopparty02split, + author = {Swastik Kopparty and Srikanth V. Krishnamurthy and + Michalis Faloutsos and Satish K. Tripathi}, + title = {Split {TCP} for Mobile Ad Hoc Networks}, + booktitle = {IEEE GLOBECOM}, + month = nov, + year = 2002, +} + +@inproceedings{ korman06dynamic, + author = {Amos Korman and David Peleg}, + title = {Dynamic Routing Schemes for General Graphs}, + booktitle = {\bibconf[33rd]{ICALP}{International Colloquium on + Automata, Languages and Programming}}, + month = jul, + year = 2006, + location = {Venice, Italy}, +} + +@inproceedings{ kortebi04crossprotect, + author = {A. Kortebi and S. Oueslati and J. Roberts}, + title = {Cross-protect: implicit service differentiation and + admission control}, + booktitle = {\bibconf{HPSR}{Workshop on High Performance + Switching and Routing}}, + month = apr, + year = 2004, +} + +% subsumed by full paper: kortebi05evaluating +@inproceedings{ kortebi04scalability, + author = {A. Kortebi and L. Muscariello and S. Oueslati and J. Roberts}, + title = {On the Scalability of Fair Queueing}, + booktitle = {\bibconf[3rd]{HotNets}{Workshop + on Hot Topics in Networks}}, + location = {San Diego, CA}, + month = nov, + year = 2004, +} + +@inproceedings{ kortebi05evaluating, + author = {A. Kortebi and L. Muscariello and S. Oueslati and J. Roberts}, + title = {Evaluating the Number of Active Flows in a Scheduler + Realizing Fair Statistical Bandwidth Sharing}, + booktitle = {\bibconf{SIGMETRICS}{ACM SIGMETRICS Conference on + Measurement and Modeling of Computer Systems}}, + location = {Banff, Alberta, Canada}, + month = jun, + year = 2005, +} + +@inproceedings{kotla07safestore, + author = {Ramakrishna Kotla and + Lorenzo Alvisi and + Michael Dahlin}, + title = {{SafeStore}: {A} Durable and Practical Storage System}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + location = {Santa Clara, CA}, + month = jun, + year = 2007 +} + +@inproceedings{ kotla07zyzzyva, + title={\href{http://www.sosp2007.org/papers/sosp052-kotla.pdf}{Zyzzyva: Speculative {Byzantine} Fault Tolerance}}, + author={Kotla, Ramakrishna and Alvisi, Lorenzo and Dahlin, Mike and Clement, Allen and Wong, Edmund}, + booktitle={21st ACM SIGOPS Symposium on Operating Systems Principles (SOSP)}, + month=oct, + year={2007}, + organization={ACM}, + url={http://www.sosp2007.org/papers/sosp052-kotla.pdf}, +} + +@article{ kotla09zyzzyva, + author = {Ramakrishna Kotla and Lorenzo Alvisi and Mike Dahlin and + Allen Clement and Edmund Wong}, + title = {{Zyzzyva}: Speculative {Byzantine} fault tolerance}, + journal = {ACM Transactions on Computer Systems (TOCS)}, + volume = 27, + number = 4, + month = dec, + year = 2009, +} + +@inproceedings{ krall98efficient, + author = "Andreas Krall", + title = "Efficient {JavaVM} Just-in-Time Compilation", + booktitle = "Parallel Architectures and Compilation Techniques", + location = "Paris, France", + month = oct, + year = 1998, + pages = "54--61", + url = "sherry.ifi.unizh.ch/krall98efficient.html" +} + +@inproceedings{ krioukov04compact, + author = {Dmitri Krioukov and Kevin Fall and Xiaowei Yang}, + title = {Compact Routing on {Internet}-Like Graphs}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + year = 2004, +} + +@article{ krioukov07compact, + author = {Dmitri Krioukov and kc claffy and Kevin Fall + and Arthur Brady}, + title = {On Compact Routing for the {Internet}}, + journal = {Computer Communications Review}, + volume = {37}, + number = {3}, + year = {2007}, + issn = {0146-4833}, + pages = {41--52}, + doi = {http://doi.acm.org/10.1145/1273445.1273450}, + publisher = {ACM Press}, + address = {New York, NY, USA}, +} + +@inproceedings{ krohn07information, + author = {Maxwell Krohn and Alexander Yip and Micah Brodsky + and Natan Cliffer and M. Frans Kaashoek + and Eddie Kohler and Robert Morris}, + title = {Information Flow Control for Standard OS Abstractions}, + booktitle = {\bibconf[21st]{SOSP}{ACM Symposium + on Operating System Principles}}, + month = oct, + year = 2007, + location = {Stevenson, WA}, +} + +@inproceedings{ kubiatowicz00oceanstore, + author = "John Kubiatowicz and others", + title = "OceanStore: An Architecture for Global-Scale Persistent Storage ", + booktitle = "Ninth international Conference on + Architectural Support for Programming Languages + and Operating Systems (ASPLOS 2000)", + month = nov, + year = "2000", +} + +@inproceedings{ kuenzer19unleashing, + author = {S. Kuenzer and S. Santhanam and Yuri Volchkov and + Florian Schmidt and Felipe Huici and Joel Nider and + Mike Rapoport and Costin Lupu}, + title = {\href{https://dl.acm.org/doi/10.1145/3319647.3325856}{Unleashing the Power of Unikernels with Unikraft}}, + booktitle = {\bibconf[12th]{SYSTOR}{ACM International Conference on Systems and Storage}}, + month = may, + year = 2019, +} + +@inproceedings{ kung93fcvc, + author = {H. T. Kung and Alan Chapman}, + title = {The {FCVC} (Flow-Controlled Virtual Channels) Proposal + for {ATM} Networks: A Summary}, + booktitle = {\bibconf[1st]{ICNP}{International Conference on + Network Protocols}}, + month = oct, + year = 1993, + location = {San Francisco, CA}, +} + +@article{khanna07automated, + author = {Gunjan Khanna and + Mike Yu Cheng and + Padma Varadharajan and + Saurabh Bagchi and + Miguel P. Correia and + Paulo Ver\'{\i}ssimo}, + title = {Automated Rule-Based Diagnosis through a + Distributed Monitor System}, + journal = {IEEE Trans. Dependable Sec. Comput.}, + volume = {4}, + number = {4}, + year = {2007}, + pages = {266-279} +} + + +%L + +@misc{ labview12, + author = {National Instruments}, + title = {Lab{VIEW}}, + url = {http://www.ni.com/labview} +} + + + +@article{ lakshman97performance, + author = {T. V. Lakshman and Upamanyu Madhow}, + title = {The Performance of {TCP/IP} for Networks with + High Bandwidth-Delay Products and Random Loss}, + journal = {Transactions on Networking}, + volume = 5, + number = 3, + month = jun, + year = 1997, +} + +@article{lakshman10cassandra, + title={Cassandra: a decentralized structured storage system}, + author={Lakshman, Avinash and Malik, Prashant}, + journal={ACM SIGOPS Operating Systems Review}, + volume={44}, + number={2}, + pages={35--40}, + year={2010}, + publisher={ACM} +} + +@article{ lamport78time, + author = {Leslie Lamport}, + title = {Time, Clocks, and the Ordering of Events + in a Distributed System}, + journal = {Communications of the ACM}, + month = jul, + year = 1978, + volume = 21, + number = 7, + pages = {558-565}, +} + +@article{ lamport79multi, + author = "Leslie Lamport", + title = "How to Make a Multiprocessor Computer that + Correctly Executes Multiprocess Programs", + journal = "{IEEE} Transactions on Computers", + month = sep, + year = 1979, + volume = "28", + number = "9", + pages = "690-691", +} + +@article{lamport82byzantine, + author = {Lamport, Leslie and Shostak, Robert and Pease, Marshall}, + title = {\href{http://research.microsoft.com/en-us/um/people/lamport/pubs/byz.pdf}{The {Byzantine} Generals Problem}}, + journal = {\bibconf{TOPLAS}{ACM Transactions on Programming Languages and Systems}}, + volume={4}, + number={3}, + pages={382--401}, + year={1982}, + publisher={ACM}, + url={http://research.microsoft.com/en-us/um/people/lamport/pubs/byz.pdf}, +} + +@article{lamport84using, + author = {Leslie Lamport}, + title = {Using Time Instead of Timeout + for Fault-Tolerant Distributed Systems}, + journal = {\bibconf{TOPLAS}{ACM Transactions on Programming Languages + and Systems}}, + volume = 6, + number = 4, + month = apr, + year = 1984, + pages = {254-280}, +} + +@inproceedings{ lampson96how, + author = {Lampson, Butler W.}, + title = {\href{https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.72.5429&rep=rep1&type=pdf}{How to Build a Highly Available System Using Consensus}}, + year = {1996}, + publisher = {Springer-Verlag}, + address = {Berlin, Heidelberg}, + booktitle = {Proceedings of the 10th International Workshop on Distributed Algorithms}, + pages = {1--17}, + numpages = {17}, + series = {WDAG ’96} +} + +@inproceedings{ lampson01abcd, + author = {Lampson, Butler W.}, + title = {\href{https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.595.4829&rep=rep1&type=pdf}{The ABCD’s of Paxos}}, + year = {2001}, + booktitle = {Proceedings of the 20th Annual ACM Symposium on Principles of Distributed Computing}, + series = {PODC ’01} +} + % pages = {13}, + % numpages = {1}, + % publisher = {Association for Computing Machinery}, + % address = {New York, NY, USA}, + % location = {Newport, Rhode Island, USA}, + + +@inproceedings{ lang01bounds, + author = {Tomas Lang and Jean-Michel Muller}, + title = {Bounds on Runs of Zeros and Ones for Algebraic Functions}, + booktitle = {\bibconf[15th]{ARITH}{15th IEEE Symposium + on Computer Arithmetic}}, + location = {Vail, Colorado}, + pages = {13-20}, + year = 2001, +} + +@article{ lamport01paxos, + author = {Leslie Lamport}, + title = {Paxos Made Simple}, + journal = {ACM SIGACT News}, + volume = 32, + number = 4, + month = dec, + year = 2001, + pages = {51-58}, +} + +@inproceedings{ laoutaris09delay, + author = {Nikolaos Laoutaris and Georgios Smaragdakis and + Pablo Rodriguez and Ravi Sundaram}, + title = {Delay Tolerant Bulk Data Transfers on the {Internet}}, + booktitle = {\bibconf{SIGMETRICS}{ACM SIGMETRICS Conference on + Measurement and Modeling of Computer Systems}}, + month = jun, + year = 2009, + location = {Seattla, WA}, +} + +@misc{ lea00dlmalloc, + author = {Doug Lea}, + title = {A Memory Allocator}, + year = 2000, + url = {http://g.oswego.edu/dl/html/malloc.html}, + lastchecked = {24 Sep 2012}, +} + +@article{ leblanc87debugging, + author = {Thomas J. Leblanc and John M. Mellor-Crummey}, + title = {Debugging Parallel Programs with Instant Replay}, + journal = {IEEE Transactions on Computers}, + volume = {C-36}, + number = 4, + month = apr, + year = 1987, + pages = {471-482}, +} + +@inproceedings{ lee01applied, + author = {Jason Lee and Dan Gunter and Brian Tierney and Bill Allcock + and Joe Bester and John Bresnahan and Steve Tueckek}, + title = {Applied Techniques for High Bandwidth Data Transfers + across Wide Area Networks}, + booktitle = {\bibconf{CHEP}{Computing in High Energy + and Nuclear Physics}}, + month = sep, + year = 2001, +} + +@inproceedings{ lee01split, + author = {Sung-Ju Lee and Mario Gerla}, + title = {Split Multipath Routing with Maximally Disjoint Paths + in Ad hoc Networks}, + booktitle = {\bibconf{ICC}{IEEE International Conference + on Communications}}, + month = jun, + year = 2001, + location = {St. Petersburg, Russia}, +} + +@article{ lee02improving, + author = {Youngseok Lee and Ilkyu Park and Yanghee Choi}, + title = {Improving {TCP} Performance in + Multipath Packet Forwarding Networks}, + journal = {Journal of Communications and Networks}, + volume = 4, + number = 2, + month = jun, + year = 2002, + pages = {148-157}, +} + +@inproceedings{ leesatapornwongsa16taxdc, + author = {Tanakorn Leesatapornwongsa and Jeffrey F. Lukman and + Shan Lu and Haryadi S. Gunawi}, + title = {\href{https://ucare.cs.uchicago.edu/pdf/asplos16-TaxDC.pdf}{TaxDC: A Taxonomy of Non-Deterministic Concurrency Bugs in Datacenter Distributed Systems}}, + booktitle = {\bibconf[21th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + month = apr, + year = 2016, +} + +@inproceedings{ lefevre01worst, + author = {Vincent Lef\`evre and Jean-Michel Muller}, + title = {Worst Cases for Correct Rounding of the Elementary Functions + in Double Precision}, + booktitle = {\bibconf[15th]{ARITH}{IEEE Symposium + on Computer Arithmetic}}, + location = {Vail, Colorado}, + pages = {111-118}, + year = 2001, +} + +@inproceedings{ leith04htcp, + title = {{H-TCP}: {TCP} for high-speed and long-distance networks}, + author = {D. Leith and R. Shorten}, + booktitle = {\bibconf[2nd]{PFLDnet}{Workshop on Protocols + for Fast Long-Distance Networks}}, + month = feb, + year = 2004, + location = {Argonne, Illinois} +}, + +@inproceedings{ lepreau93inkernel, + author = {Jay Lepreau and Mike Hibler and Bryan Ford and Jeffrey Law}, + title = {In-Kernel Servers on {Mach 3.0}: + Implementation and Performance}, + booktitle = {3rd USENIX Mach Symposium}, + pages = {39-55}, + month = apr, + year = 1993, +} + +@inproceedings{ lesniewski-laas07alpaca, + author = {Christopher Lesniewski-Laas and Bryan Ford and Jacob Strauss + and M. Frans Kaashoek and Robert Morris}, + title = {{Alpaca}: extensible authorization for distributed services}, + booktitle = {ACM Computer and Communications Security}, + location = {Alexandria, VA}, + month = oct, + year = 2007, +} + +@book{ levy84capability, + author = {Henry M Levy}, + title = {Capability-based Computer Systems}, + publisher = {Digital Press}, + isbn = {0932376223}, + pages = 220, + year = 1984, +} + +@inproceedings{ li00scalable, + author = "J. Li and J. Jannotti and D. {De Couto} and D. Karger and R. Morris", + title = "A scalable location service for geographic ad-hoc routing", + booktitle = "\bibconf[6th]{MOBICOM}{{ACM} International Conference on Mobile + Computing and Networking}", + year = "2000", + month = aug, + pages = {120--130}, + url = "citeseer.nj.nec.com/li00scalable.html" +} + +@inproceedings{ li04first, + author = {Lun Li and David Alderson and Walter Willinger + and John Doyle}, + title = {A First-Principles Approach to Understanding the + {Internet}'s Router-level Topology}, + booktitle = {\bibbrev{}{ACM }SIGCOMM}, + location = {Portland, OR}, + month = aug, + year = {2004}, +} + +@inproceedings{ li04sundr, + author = {Jinyuan Li and Maxwell Krohn and David Mazi\`eres + and Dennis Shasha}, + title = {\href{https://www.usenix.org/legacy/event/osdi04/tech/full_papers/li_j/li_j.pdf}{Secure Untrusted Data Repository {(SUNDR)}}}, + booktitle = {\bibconf[6th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = dec, + year = 2004, + location = {San Francisco, CA}, +} + +@inproceedings{ li05bandwidth, + author = {Jinyang Li and Jeremy Stribling and Robert Morris + and M. Frans Kaashoek}, + title = {Bandwidth-efficient management of {DHT} routing tables}, + booktitle = {\bibconf[2nd]{NSDI}{Symposium on + Networked Systems Design and Implementation}}, + month = may, + year = 2005, + location = {Boston, MA}, +} + +@inproceedings{li05qos, + author = {Wen-Syan Li and + Vishal S. Batra and + Vijayshankar Raman and + Wei Han and + Inderpal Narang}, + title = {{QoS}-based Data Access + and Placement for Federated Information Systems}, + booktitle = {\bibconf[31st]{VLDB}{Very Large Data Bases}}, + location = {Trondheim, Norway}, + month = aug, + year = 2005 +} + +@inproceedings{ li06f2f, + author = {Jinyang Li and Frank Dabek}, + title = {{F2F}: Reliable Storage in Open Networks}, + booktitle = {5th IPTPS}, + year = {2006}, + month = feb, + location = {Santa Barbara, CA}, +} + +@inproceedings{li10cloudcmp, + author = {Ang Li and + Xiaowei Yang and + Srikanth Kandula and + Ming Zhang}, + title = {{CloudCmp}: {C}omparing Public Cloud Providers}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + location = {Melbourne, Australia}, + month = nov, + year = 2010 +} + + +@article{ liao01grid, + author = "Wen-Hwa Liao and Jang-Ping Sheu and Yu-Chee Tseng", + title = "{GRID}: A Fully Location-Aware Routing Protocol for Mobile Ad Hoc Networks", + journal = "Telecommunication Systems", + volume = "18", + number = "1-3", + pages = "37-60", + year = "2001", + url = "citeseer.nj.nec.com/liao01grid.html" +} + +@article{ licklider68computer, + author = "J.C.R. Licklider", + title = "The Computer as a Communication Device", + journal = "Science and Technology", + month = apr, + year = "1968", +} + +@inproceedings{ liedtke93persistent, + author = "Jochen Liedtke", + title = "A persistent system in real use: + experiences of the first 13 years", + booktitle = {\bibconf{IWOOOS}{International Workshop on + Object-Orientation in Operating Systems}}, + year = 1993, +} + +@inproceedings{ liedtke93microkernel, + author = {Jochen Liedtke}, + title = {On Micro-kernel Construction}, + booktitle = {\bibconf[15th]{SOSP}{ACM Symposium + on Operating System Principles}}, + location = {Copper Mountain, CO}, + year = 1995, +} + +@techreport{ liedtke95improved, + author = {Jochen Liedtke}, + title = {Improved Address-Space Switching on {Pentium} Processors + by Transparently Multiplexing User Address Spaces}, + institution = {GMD --- German National Research Center + for Information Technology}, + location = {Sankt Augustin, Germany}, + number = {No. 933}, + month = nov, + year = 1995, +} + +@misc{ liedtke00ubiquitous, + author = "Jochen Liedtke and others", + title = "An Unconventional Proposal: Using the x86 Architecture As + The Ubiquitous Virtual Standard Architecture", + publisher = "IBM T. J. Watson Research Center", + year = "2000", + note = "Unpublished Report.", +} + +@techreport{ liefke99xmill, + author = "Hartmut Liefke and Dan Suciu", + title = "{XMill:} an Efficient Compressor for {XML} Data", + institution = "University of Pennsylvania", + location = "Philadelphia, PA", + number = "MS-CIS-99-26", + year = "1999", +} + +@inproceedings{ lim03tcp, + author = {Haejung Lim and Kaixin Xu and Mario Gerla}, + title = {{TCP} Performance over Multipath Routing in + Mobile Ad Hoc Networks}, + booktitle = {\bibconf{ICC}{IEEE International Conference + on Communications}}, + month = may, + year = 2003, + location = {Anchorage, Alaska}, +} + +@inproceedings{ liskov86highly, + author = {Barbara Liskov and Rivka Ladin}, + title = {Highly-Available Distributed Services and + Fault-Tolerant Distributed Garbage Collection}, + booktitle = {Principles of Distributed Computing}, + month = aug, + year = 1986, + pages = {29-39}, +} + +@article{ liu01atcp, + author = {Jian Liu and Suresh Singh}, + title = {{ATCP}: {TCP} for Mobile Ad Hoc Networks}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 19, + number = 7, + month = jul, + year = 2001, + pages = {1300-1315}, +} + +@inproceedings{liu02analyzingsecurity, + author = {Lin Liu and Eric Yu and John Mylopoulos}, + title = {Analyzing security requirements as relationships among strategic actors}, + booktitle = {\bibconf[2nd]{SREIS}{Symposium on Requirements Engineering for + Information Security}}, + month = {oct}, + year = {2002}, +} + +@inproceedings{liu09hide, + author = {Yali Liu and + Dipak Ghosal and + Frederik Armknecht and + Ahmad{-}Reza Sadeghi and + Steffen Schulz and + Stefan Katzenbeisser}, + title = {Hide and Seek in Time -- {R}obust Covert Timing Channels}, + booktitle = {\bibconf[14th]{ESORICS}{European Symposium on Research + in Computer Security}}, + location = {Saint-Malo, France}, + month = sep, + year = 2009 +} + +@inproceedings{liu11dthreads, + author = {Tongping Liu and Charlie Curtsinger and Emery Berger}, + title = {Dthreads: efficient deterministic multithreading}, + booktitle = {\bibconf{SOSP '11}{Proceedings of the Twenty-Third ACM Symposium on Operating Systems Principles}}, + month = {oct}, + year = {2011}, + pages = {327--336}, +} + +@inproceedings{liu10balanced, + author = {Wei Liu and others}, + title = {A balanced programming model for emerging heterogeneous + multicore systems}, + booktitle = {\bibconf{HotPar '10}{2nd USENIX Workshop on Hot Topics + in Parallelism (HotPar '10)}}, + month = jun, + year = 2010, +} + +@inproceedings{ liu01impact, + author = {Yong Liu and Weibo Gong and Prashant Shenoy}, + title = {On the Impact of Concurrent Downloads}, + booktitle = {\bibconf{WSC}{Winter Simulation Conference}}, + year = 2001, +} + +@article{ lochert07survey, + author = {Christian Lochert and Bj\"orn Scheuermann and Martin Mauve}, + title = {A Survey on Congestion Control for Mobile Ad-Hoc Networks}, + journal = {\bibconf{WCMC}{Wireless Communications \& Mobile Computing}}, + volume = 7, + number = 5, + month = jun, + year = 2007, + pages = {655-676}, +} + +@article{ loidl03comparing, + author = {H-W. Loidl and others}, + title = {Comparing parallel functional languages: + Programming and performance}, + journal = {Higher-order and Symbolic Computation}, + volume = {16}, + number = {3}, + year = {2003}, +} + +@inproceedings{ lokhava19fast, + author = {Marta Lokhava and Giuliano Losa and David Mazi\`eres and + Graydon Hoare and Nicolas Barry and Eli Gafni and + Jonathan Jove and Rafa\l{} Malinowsky and Jed McCaleb}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/3341301.3359636}{Fast and secure global payments with Stellar}}, + booktitle = {\bibconf[27th]{SOSP}{ACM Symposium on Operating System Principles}}, + month = oct, + year = 2019, + pages = {80-96}, +} + +@inproceedings{ lokhmotov07delayed, + author = {Anton Lokhmotov and Alan Mycroft and Andrew Richards}, + title = {Delayed Side-effects Ease Multi-core Programming}, + booktitle = {EuroPar}, + month = aug, + year = 2007, + location = {Rennes, France}, +} + +@inproceedings{ lopez-pacheco06xcp-i, + author={D. M. Lopez-Pacheco and C. Pham and L. Lef\`evre}, + title = {{XCP-i} : e{X}plicit Control Protocol for heterogeneous + inter-networking of high-speed networks}, + booktitle = {IEEE GLOBECOM}, + month = nov, + year = 2006, + location = {San Francisco, CA}, +} + +@techreport{ lorie00archiving, + author = {Raymond A. Lorie}, + title = {Long-Term Archiving of Digital Information}, + institution = {IBM Almaden Research Center}, + location = {San Jose, CA}, + number = {RJ 10185}, + year = 2000, + month = may, + day = 18, +} + +@misc{ lorie02uvc, + author = {Raymond A. Lorie}, + title = {The {UVC}: a Method for Preserving Digital Documents, + proof of concept}, + institution = {IBM Netherlands}, + note = {IBM/KB Long-Term Preservation Study Report Series Number 4}, + location = {Amsterdam}, + year = 2002, +} + +@inproceedings{ lou01multipath, + author = {Wenjing Lou and Yuguang Fang}, + title = {A multipath routing approach for secure data delivery}, + booktitle = {MILCOM}, + month = oct, + year = 2001, + location = {Vienna, VA}, +} + +@inproceedings{ lu08learning, + author = {Shan Lu and Soyeon Park and Eunsoo Seo and Yuanyuan Zhou}, + title = {Learning from Mistakes --- A Comprehensive Study + on Real World Concurrency Bug Characteristics}, + booktitle = {\bibconf[13th]{ASPLOS}{international Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + location = {Seattle, WA}, + month = mar, + year = 2008, + pages = {329-339}, +} + +@article{ lua05survey, + author = {Eng Keong Lua and Jon Crowcroft and Marcelo Pias + and Ravi Sharma and Steven Lim}, + title = {A Survey and Comparison of + Peer-to-Peer Overlay Network Schemes}, + journal = {IEEE Communications Surveys \& Tutorials}, + volume = 7, + number = 2, + year = 2005, + pages = {72-93}, +} + +@article{ lucco95omniware, + author = "S. Lucco and O. Sharp and R. Wahbe", + title = "{Omniware: A Universal Substrate for Web Programming}", + journal = "World Wide Web Journal", + volume = "1", + number = "1", + address = "Boston, MA, USA", + pages = "359--368", + year = "1995", + url = "citeseer.ist.psu.edu/lucco95omniware.html" +} + +@inproceedings{ luk05pin, + author = {Chi-Keung Luk and others}, + title = {Pin: building customized program analysis tools with dynamic instrumentation}, + booktitle = {PLDI}, + month = jun, + year = 2005 +} + + +@article{lundstrom86mimd, + author = {Lundstrom, S F and Barnes, G H}, + title = {A controllable {MIMD} architecture}, + book = {Advanced computer architecture}, + year = {1986}, + pages = {30--38}, + publisher = {IEEE Computer Society Press}, + address = {Los Alamitos, CA, USA}, +} + +%M + +@inproceedings{ mackall06revlog, + author = {Matt Mackall}, + title = {Towards a Better {SCM}: {Revlog} and {Mercurial}}, + booktitle = {Linux Symposium}, + month = jul, + year = 2006, + location = {Ottawa, Ontario, Canada}, +} + +@inproceedings{ madhavapeddy13unikernels, + author = {Anil Madhavapeddy and Richard Mortier and + Charalampos Rotsos and David Scott and Balraj Singh and + Thomas Gazagnaire and Steven Smith and Steven Hand and + Jon Crowcroft}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/2490301.2451167}{Unikernels: library operating systems for the cloud}}, + booktitle = {\bibconf[18th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + month = mar, + year = 2013, + location = {Houston, Texas}, + } + +@inproceedings{ magalhaes01transport, + author = {Luiz Magalhaes and Robin Kravets}, + title = {Transport Level Mechanisms for Bandwidth Aggregation + on Mobile Hosts}, + booktitle = {\bibconf[9th]{ICNP}{International Conference on + Network Protocols}}, + location = {Riverside, CA}, + month = nov, + year = 2001, +} + +@inproceedings{ mahadevan07orbis, + author = {Priya Mahadevan and Calvin Hubble and Dmitri Krioukov + and Bradley Huffaker and Amin Vahdat}, + title = {Orbis: Rescaling Degree Correlations to Generate + Annotated Internet Topologies}, + booktitle = {\bibbrev{}{ACM } SIGCOMM}, + month = aug, + year = 2007, + location = {Kyoto, Japan}, +} + +@article{ mahajan02controlling, + author = {Ratul Mahajan and others}, + title = {Controlling High Bandwidth Aggregates in the Network}, + journal = {Computer Communications Review}, + volume = 32, + number = 3, + month = jul, + year = 2002, + pages = {62-73}, +} + +@article{ maniatis99mobile, + author = {Petros Maniatis and others}, + title = {The Mobile People Architecture}, + journal = {Mobile Computing and Communications Review}, + volume = 3, + number = 3, + month = jul, + year = 1999, + pages = {36-42}, +} + +@inproceedings{ maniatis03historic, + author = {Petros Maniatis and Mary Baker}, + title = {A Historic Name-Trail Service}, + booktitle = {\bibconf[5th]{WMCSA}{Workshop on Mobile Computing Systems + and Applications}}, + year = 2003, + month = oct, + location = {Monterey, CA}, +} + +@article{ maniatis05lockss, + author = {Petros Maniatis and Mema Roussopoulos and T. J. Giuli and + David S. H. Rosenthal and Mary Baker}, + title = {The {LOCKSS} peer-to-peer digital preservation system}, + journal = {\bibbrev{TOCS}{Transactions on Computer Systems}}, + volume = {23}, + number = {1}, + year = {2005}, + pages = {2--50}, + publisher = {ACM Press}, + address = {New York, NY, USA}, +} + +@inproceedings{ mantei91experiences, + author = {Marilyn M. Mantei and Ronald M. Baecker and Abigail J. Sellen and + William A. S. Buxton and Thomas Milligan and Barry Wellman}, + title = {Experiences in the use of a media space}, + booktitle = {SIGCHI Conference on Human Factors in Computing Systems}, + year = {1991}, + pages = {203--208}, + location = {New Orleans, LA}, + publisher = {ACM Press}, +} + +@inproceedings{ marandi10ring, + author = {Parisa Jalili Marandi and Marco Primi and Nicolas Schiper and Fernando Pedone}, + title = {\href{https://www.inf.usi.ch/faculty/pedone/Paper/2010/2010DSN.pdf}{Ring Paxos: A High-Throughput Atomic Broadcast Protocol}}, + booktitle = {\bibconf{DSN}{Dependable Systems and Networks}}, + month = jun, + year = 2010, +} + +@inproceedings{marandi11high, + title={\href{http://ieeexplore.ieee.org/document/5958258/}{High performance state-machine replication}}, + author={Marandi, Parisa Jalili and Primi, Marco and Pedone, Fernando}, + booktitle={Dependable Systems \& Networks (DSN), 2011 IEEE/IFIP 41st International Conference on}, + pages={454--465}, + year={2011}, + organization={IEEE} +} + +@inproceedings{ marina01ondemand, + author = {Mahesh K. Marina and Samir R. Das}, + title = {On-demand Multipath Distance Vector Routing + in Ad Hoc Networks}, + booktitle = {\bibconf[9th]{ICNP}{International Conference + on Network Protocols}}, + month = nov, + year = 2001, + location = {Riverside, CA}, +} + +@inproceedings{ markopoulou04characterization, + author={Athina Markopoulou and Gianluca Iannaccone + and Supratik Bhattacharyya and Chen-Nee Chuah + and Christophe Diot}, + title={Characterization of failures in an {IP} backbone}, + booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}}, + year = 2004, + month = mar, +} + +@article{ martell08atom, + author = {Duncan Martell}, + title = {Atom Sales Help {Intel} Expand Beyond {PC} Market}, + journal = {NewsFactor Network}, + month = aug, + day = 15, + year = 2008, +} + +@inproceedings{ marti04dht, + author = {Sergio Marti and Prasanna Ganesan and Hector Garcia-Molina}, + title = {{DHT} Routing Using Social Links}, + booktitle = {\bibconf[3rd]{IPTPS}{International Workshop + on Peer-to-Peer Systems (IPTPS)}}, + month = feb, + year = 2004, + location = {San Diego, CA}, +} + +@inproceedings{ marti04sprout, + author="Sergio Marti and Prasanna Ganesan and Hector Garcia-Molina", + title="{SPROUT}: {P2P} routing with social networks", + booktitle="\bibconf[1st]{P2P\&DB}{International Workshop on + Peer-to-Peer Computing and Databases}", + month=mar, + year=2004, +} + +@inproceedings{ martignoni12cloud, + author = {Lorenzo Martignoni and Pongsin Poosankam and Matei Zaharia + and Jun Han and Stephen McCamant and Dawn Song + and Vern Paxson and Adrian Perrig and Scott Shenker + and Ion Stoica}, + booktitle = {\bibconf{ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2012, + location = {Boston, MA}, +} + +@inproceedings{ mathis96forward, + author = {M. Mathis and J. Mahdavi}, + title = {Forward Acknowledgement: Refining {TCP} Congestion Control}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1996, +} + +@journal{ mathis97macroscopic, + author = {Matthew Mathis and others}, + title = {The Macroscopic Behavior of the + {TCP} Congestion Avoidance Algorithm}, + journal = {Computer Communications Review}, + volume = 25, + number = 3, + month = jul, + year = 1997, + pages = {67-82}, +} + +@inproceedings{ mattern89virtual, + author = {Friedemann Mattern}, + title = {\href{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.63.4399&rep=rep1&type=pdf}{Virtual Time and Global States of Distributed Systems}}, + booktitle = {International Workshop on Parallel and Distributed Algorithms}, + year = 1989, +} + % location = {Chateau De Bonas, Gers, France}, + % pages = {215--226}, + +@inproceedings{ maxemchuk75dispersity, + author = {N. F. Maxemchuk}, + title = {Dispersity Routing}, + booktitle = {ICC}, + month = jun, + year = 1975, + location = {San Francisco, CA}, +} + +@inproceedings{may87mimic, + author = {C. May}, + title = {Mimic: A Fast {System/370} Simulator}, + booktitle = {SIGPLAN '87: Papers of the Symposium on Interpreters + and Interpretive Techniques}, + year = {1987}, + isbn = {0-89791-235-7}, + pages = {1--13}, + location = {St. Paul, Minnesota, United States}, + doi = {http://doi.acm.org/10.1145/29650.29651}, +} + + +@article{ maymounkov02kademlia-lncs, + author = "Petar Maymounkov and David Mazi\`eres", + title = "Kademlia: A peer-to-peer information system + based on the {XOR} metric.", + journal = "\bibbrev{LNCS}{Lecture Notes in Computer Science}", + month = jan, + year = "2002", + volume = "2429", + pages = "53-65", +} + +@inproceedings{ maymounkov02kademlia, + author = "Petar Maymounkov and David Mazi\`eres", + title = "Kademlia: A peer-to-peer information system + based on the {XOR} metric.", + booktitle = {\bibconf[1st]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + month = "March", + year = "2002", +} + +@inproceedings{ mazieres99separating, + title = {{S}eparating key management from file system security}, + author = {D. Mazi{\`e}res and M. Kaminsky and M. F. Kaashoek and +E. Witchel}, + booktitle = {\bibconf[17th]{SOSP}{ACM Symposium on Operating System Principles}}, + month = dec, + year = {1999} +} + +@inproceedings{mazieres02building, + title={\href{https://dl.acm.org/citation.cfm?id=571840}{Building secure file systems out of Byzantine storage}}, + author={Mazieres, David and Shasha, Dennis}, + booktitle={Proceedings of the twenty-first annual symposium on Principles of distributed computing}, + pages={108--117}, + year={2002}, + organization={ACM} +} + +@inproceedings{ mccamant06evaluating, + title = {Evaluating {SFI} for a {CISC} Architecture}, + author = {Stephen McCamant and Greg Morrisett}, + booktitle = {15th USENIX Security Symposium}, + location = {Vancouver, BC, Canada}, + month = aug, + year = 2006, +} + +@inproceedings{ mccool10structured, + author = {Michael McCool}, + title = {Structured Parallel Programming with Deterministic Patterns}, + booktitle = {\bibconf{HotPar '10}{2nd USENIX Workshop on Hot Topics + in Parallelism (HotPar '10)}}, + month = jun, + year = 2010, +} + + +@article{ mcgillicuddy09wan, + author = {Shamus McGillicuddy}, + title = {{WAN} optimization market passes \$1 billion; + {Cisco} takes the lead}, + journal = {SearchEnterpriseWAN.com}, + month = mar, + day = 11, + year = 2009, + url = {http://searchenterprisewan.techtarget.com/news/article/0,289142,sid200_gci1350518,00.html}, +} + +@article{ mckenna99large, + author = {P.J. McKenna}, + title = {Large Torsional Oscillations in Suspension Bridges Revisited: + Fixing an Old Approximation}, + journal = {The American Mathematical Monthly}, + volume = 106, + number = 1, + month = jan, + year = 1999, +} + +@inproceedings{ mckenney98rcu, + author = {Paul E. McKenney and John D. Slingwine}, + title = {{Read-Copy Update}: Using Execution History to + Solve Concurrency Problems}, + booktitle = {\bibconf[10th]{PDCS'98}{International Conference on + Parallel and Distributed Computing and Systems}}, + month = oct, + year = 1998, + pages = {509-518}, + location = {Las Vegas, NV}, +} +@phdthesis{ mckenney04rcu, + author ={Paul E. Mc{K}enney}, + title = {Exploiting Deferred Destruction: An Analysis of + {Read-Copy-Update} Techniques in Operating System Kernels}, + school = {OGI School of Science and Engineering at + Oregon Health and Sciences University}, + year = 2004, + note = {\url{http://www.rdrop.com/users/paulmck/RCU/RCUdissertation.2004.07.14e1.pdf}} +} + +@article{ merlin79failsafe, + author = "P. M. Merlin and A. Segall", + title = "A Failsafe Distributed Routing Protocol", + journal = "IEEE Transactions on Communications", + volume = "COM-27", + number = "9", + pages = "1280-1287", + month = sep, + year = "1979", +} + +@inproceedings{ mickens11atlantis, + author = {James Mickens and Mohan Dhawan}, + title = {Atlantis: Robust, Extensible Execution Environments + for Web Applications}, + booktitle = {\bibconf[23rd]{SOSP}{ACM Symposium + on Operating System Principles}}, + month = oct, + year = 2011, + location = {Cascais, Portugal}, +} + +@misc{ microsoft98apipa, + author = {{Microsoft Corporation}}, + title = "Plug and Play Networking with {Microsoft} Automatic Private {IP} Addressing", + month = mar, + year = "1998", +} + +@inproceedings{ miller03paradigm, + author = {Mark S. Miller and Jonathan S. Shapiro}, + title = {Paradigm Regained: Abstraction Mechanisms for Access Control}, + booktitle = {Eighth Asian Computing Science Conference}, + location = {Mumbai, India}, + year = {2003}, + month = dec, + date = {10--12}, +} + +@inproceedings{ mishra92hopbyhop, + author = {Partho P. Mishra and Hemant Kanakia}, + title = {A Hop by Hop Rate-based Congestion Control Scheme}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1992, + location = {Baltimore, MD}, +} + +@article{ mishra96hopbyhop, + author = {Partho Pratim Mishra and Hemant Kanakia + and Satish K. Tripathi}, + title = {On Hop-by-Hop Rate-Based Congestion Control}, + journal = {Transactions on Networking}, + volume = 4, + number = 2, + month = apr, + year = 1996, + pages = {224-239}, +} + +@inproceedings{ mo99analysis, + author = {Jeonghoon Mo and Richard J. La and Venkat Anantharam + and Jean Walrand}, + title = {Analysis and Comparison of {TCP Reno} and {Vegas}}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 1999, + location = {New York, NY}, +} + +@inproceedings{ mogul87packet, + author = {Jeffrey C. Mogul and + Richard F. Rashid and + Michael J. Accetta}, + title = {The Packet Filter: An Efficient Mechanism for User-level + Network Code}, + booktitle = {Symposium on Operating System Principles}, + location = {Austin, TX}, + year = {1987}, + month = nov, + pages = {39-51}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@inproceedings{ mogul06emergent, + author = {Jeffrey C. Mogul}, + title = {Emergent (mis)behavior vs. complex software systems}, + booktitle = {\bibconf[1st]{EuroSys}{ACM SIGOPS/EuroSys European + Conference on Computer Systems}}, + location = {Leuven, Belgium}, + month = apr, + year = 2006 +} + +@inproceedings{ morris99click, + author = {Robert Morris and Eddie Kohler and John Jannotti + and M. Frans Kaashoek}, + title = {The {Click} modular router}, + booktitle = {\bibconf[17th]{SOSP}{ACM Symposium + on Operating System Principles}}, + location = {Kiawah Island, SC}, + month = dec, + year = 1999, +} + +@article{ mosberger93mcm, + author = {Mosberger, David}, + title = {Memory consistency models}, + journal = {SIGOPS Operating Systems Review}, + volume = {27}, + number = {1}, + month = jan, + year = 1993, + pages = {18--26}, +} + +@inproceedings{ motiwala07path, + author = "Murtaza Motiwala and Nick Feamster and Santosh Vempala", + title = "{Path Splicing: Reliable Connectivity with Rapid Recovery}", + booktitle = "{HOTNETS-VI}", + year = 2007, + month = nov +} + +@inproceedings{ motiwala08path, + author = {Murtaza Motiwala and Megan Elmore and Nick Feamster + and Santosh Vempala}, + title = {Path Splicing}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + year = 2008, + month = aug +} + +% see also tanenbaum86using +@article{ mullender86design, + author = {S. J. Mullender and A. S. Tanenbaum}, + title = {The Design of a Capability-Based Distributed Operating System}, + journal = {Computer Journal}, + volume = 29, + number = 4, + pages = {289-299}, + year = 1986, +} + +@inproceedings{ murthy96congestion, + author = {Shree Murthy and J.J. Garcia-Luna-Aceves}, + title = {Congestion-Oriented Shortest Multipath Routing}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 1996, + location = {San Francisco, CA}, +} + +@article{ murthy96efficient, + author = "Shree Murthy and J. J. Garcia-Luna-Aceves", + title = "An Efficient Routing Protocol for Wireless Networks", + journal = "Mobile Networks and Applications", + volume = "1", + number = "2", + pages = "183-197", + year = "1996", + url = "citeseer.nj.nec.com/murthy96efficient.html" +} + +@inproceedings{muthitacharoen02ivy, + title = {Ivy: A Read/Write Peer-to-peer File System}, + author = {A. Muthitacharoen and R. Morris and T. Gil and B. Chen}, + booktitle = {\bibconf[5th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + year = {2002} +} + +@inproceedings{ myers97decentralized, + author = {Andrew C. Myers and Barbara Liskov}, + title = {A Decentralized Model for Information Flow Control}, + booktitle = {\bibconf[16th]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + location = {Saint-Malo, France}, + month = oct, + year = 1997, +} + +@inproceedings{mysore97multicasting, + author = {Jayanth Mysore and Vaduvur Bharghavan}, + title = {A new multicasting-based architecture for {Internet} host mobility}, + booktitle = {\bibconf[3rd]{MOBICOM}{{ACM/IEEE} International Conference + on Mobile Computing and Networking}}, + year = {1997}, + isbn = {0-89791-988-2}, + pages = {161--172}, + location = {Budapest, Hungary}, + doi = {http://doi.acm.org/10.1145/262116.262144}, + publ = {ACM Press}, +} + +%N + +@inproceedings{nath06subtleties, + author = {Suman Nath and + Haifeng Yu and + Phillip B. Gibbons and + Srinivasan Seshan}, + title = {Subtleties in Tolerating Correlated Failures in Wide-area + Storage Systems}, + booktitle = {\bibconf[3rd]{NSDI}{USENIX/ACM Symposium + on Networked Systems Design and Implementation}}, + location = {San Jose, CA}, + month = may, + year = 2006 +} + +@inproceedings{narayan12djoin, + author = {Arjun Narayan and + Andreas Haeberlen}, + title = {D{J}oin: {D}ifferentially Private Join Queries over + Distributed Databases}, + booktitle = {\bibconf[10th]{OSDI}{USENIX Symposium on Operating Systems + Design and Implementation}}, + location = {Hollywood, CA}, + month = oct, + year = 2012 +} + +@inproceedings{ necula96safe, + author = {George C. Necula and Peter Lee}, + title = {Safe Kernel Extensions Without Run-Time Checking}, + booktitle = {\bibconf[2nd]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation (OSDI)}}, + year = {1996}, + pages = {229-243}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@article{ nelson89lzw, + author = {Mark Nelson}, + title = {{LZW} Data Compression}, + journal = {Dr. Dobb's Journal}, + month = oct, + year = 1989, + url = {http://www.dogma.net/markn/articles/lzw/lzw.htm}, +} + +% NOTE: obsoleted by nethercote07valgrind below +@inproceedings{ nethercote03valgrind, + author = {Nicholas Nethercote and Julian Seward}, + title = {Valgrind: A Program Supervision Framework}, + booktitle = {Third Workshop on Runtime Verification (RV'03)}, + location = {Boulder, CO}, + month = jul, + year = 2003, +} + + +@article{nethercote07valgrind, + author = {Nethercote, Nicholas and Seward, Julian}, + title = {Valgrind: a framework for heavyweight dynamic binary instrumentation}, + journal = {ACM SIGPLAN Notices}, + volume = {42}, + number = {6}, + year = {2007}, + pages = {89--100}, + } + + +@inproceedings{ nguyen03path, + author = {Thinh Nguyen and Avideh Zakhor}, + title = {Path Diversity with Forward Error Correction {(PDF)} + System for Packet Switched Networks}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 2003, + location = {San Francisco, CA}, +} + +@misc{ nielsen97network, + author = {H. F. Nielsen and others}, + title = {Network Performance Effects of {HTTP/1.1}, {CSS1}, and {PNG}}, + month = jun, + year = 1997, + note = {W3C NOTE-pipelining-970624} +} + +@misc{ nider19unicore, + author = {Joel Nider and Felipe Huici and Bryan Ford and + Costin Raiciu and Caterina Parals and Laurent Mathy and + Trevor Moore and Herbert Bos and Nicola Ciulli and + Thierry Masson and Cristian Patachia-Sultanoiu and + Radu Stoenescu}, + title = {\href{https://cordis.europa.eu/project/id/825377}{UNICORE: A Common Code Base and Toolkit for Deployment of Applications to Secure and Reliable Virtual Execution Environments}}, + note = {EU H2020 grant 825377}, + month = dec, + year = 2019, +} + +@techreport{nikhil93id, + author = {Rishiyur S. Nikhil}, + title = {An Overview of the Parallel Language {I}d (a foundation for pH, a parallel dialect of {H}askell)}, + institution = {Digital Equipment Corporation, Cambridge Research Laboratory}, + year = {1993} +} + +@misc{ nist00dss, + author = {{National Institute of Standards and Technology}}, + title = {Digital Signature Standard {(DSS)}}, + month = jan, + year = 2000, + note = {FIPS PUB 186-2}, +} + +%O + +@article{ obanaik05secure, + author = {Venkatesh Obanaik and Lillykutty Jacob and A.L. Ananda}, + title = {Secure performance enhancing proxy: + To ensure end-to-end security and enhance {TCP} performance + over {IPv6} wireless networks}, + journal = {Computer Networks}, + volume = 50, + number = 13, + month = sep, + year = 2006, + pages = {2225-2238}, +} + +@inproceedings{ olszewski09kendo, + author = {Marek Olszewski and Jason Ansel and Saman Amarasinghe}, + title = {Kendo: Efficient Deterministic Multithreading in Software}, + booktitle = {\bibconf[14th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + month = mar, + year = 2009, + location = {Washington, DC}, +} + +@inproceedings{ olszewski11kendo, + author = {Marek Olszewski and Jason Ansel and Saman Amarasinghe}, + title = {Scaling Deterministic Multithreading}, + booktitle = {\bibconf[2nd]{WoDet}{Workshop on Determinism + and Correctness in Parallel Programming}}, + month = mar, + day = 6, + year = 2011, + location = {Newport Beach, CA}, +} + +@article{ omalley92dynamic, + author = {Sean W. O'Malley and Larry L. Peterson}, + title = {A Dynamic Network Architecture}, + journal = {\bibbrev{TOCS}{Transactions on Computer Systems}}, + volume = 10, + number = 2, + month = may, + year = 1992, + pages = {110-143}, +} + +@article{ ou06truth, + author = {George Ou}, + title = {The truth about the {IPv6} transition}, + journal = {ZDNet}, + month = nov, + day = 13, + year = 2006, + note = {\url{http://blogs.zdnet.com/Ou/?p=367}}, +} + +@inproceedings{ ozveren94reliable, + author = {C\"uneyt M. \"Ozveren and Robert J. Simcoe + and George Varghese}, + title = {Reliable and Efficient Hop-by-Hop Flow Control}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1994, + location = {London, UK}, +} + +%P + +@inproceedings{ pacheco06xcpi, + author = {Dino M. Lopez-Pacheco and Cong-Duc Pham and Laurent Lefevre}, + title = {XCP-i : eXplicit Control Protocol for heterogeneous inter-networking of high-speed networks}, + booktitle = {IEEE Globecom}, + month = nov, + year = 2006, + location = {San Fransisco, CA}, +} + +@article{ padmanabhan95improving, + author = {Venkata N. Padmanabhan and Jeffrey C. Mogul}, + title = {Improving {HTTP} Latency}, + journal = {Computer Networks and ISDN Systems}, + volume = 28, + number = {1--2}, + month = dec, + year = 1995, + pages = {25--35}, +} + +@phdthesis{ padmanabhan98addressing, + author = {Venkata Narayana Padmanabhan}, + title = {Addressing the Challenges of Web Data Transport}, + school = {UC Berkeley}, + month = sep, + year = 1998, +} + +@inproceedings{ padmanabhan99coordinating, + author = {Venkata N. Padmanabhan}, + title = {Coordinating Congestion Management and Bandwidth Sharing + for Heterogeneous Data Streams}, + booktitle = {\bibconf[9th]{NOSSDAV}{Network and Operating System + Support for Digital Audio and Video}}, + month = jun, + year = 1999, + location = {Basking Ridge, NJ}, +} + +@article{ palsingh94parallel, + author = {Jaswinder Pal Singh and Anoop Gupta and Marc Levoy}, + title = {Parallel visualization algorithms: performance + and architectural implications}, + journal = {IEEE Computer}, + volume = 27, + number = 7, + month = jul, + year = 1994, + pages = {45--55}, +} + +@inproceedings{ paluska03footloose, + author = {J.M. Paluska and others}, + title = {Footloose: A Case for Physical Eventual Consistency + and Selective Conflict Resolution}, + booktitle = {\bibconf[5th]{WMCSA}{Workshop on + Mobile Computing Systems and Applications}}, + location = {Monterey, CA}, + year = 2003, + day = {9-10}, +} + +@inproceedings{ pan88supporting, + author = {Douglas Z. Pan and Mark A. Linton}, + title = {Supporting Reverse Execution of Parallel Programs}, + booktitle = {\bibconf{PADD}{Workshop on + Parallel and Distributed Debugging}}, + year = {1988}, + pages = {124--129}, + location = {Madison, Wisconsin}, + address = {New York, NY, USA}, +} + +@article{ pancake90parallel, + author = {Cherri M. Pancake and Donna Bergmar}, + title = {Do parallel languages respond to the needs of + scientific programmers?}, + journal = {Computer}, + volume = {23}, + number = {12}, + month = dec, + year = 1990, + pages = {13-23}, +} + +@inproceedings{papadimitriou13towards, + author = {Antonis Papadimitriou and + Mingchen Zhao and + Andreas Haeberlen}, + title = {Towards privacy-preserving fault detection}, + booktitle = {\bibconf[9th]{HotDep}{Workshop on Hot Topics in Dependable + Systems}}, + location = {Nemacolin Woodlands Resort, PA}, + month = nov, + year = 2013 +} + +@inproceedings{ park97highly, + author = {Vincent D. Park and M. Scott Corson}, + title = {A Highly Adaptive Distributed Routing Algorithm + for Mobile Wireless Networks}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = apr, + year = 1997, + location = {Kobe, Japan}, +} + +@article{ parker83detection, + author = {D. Stott {Parker, Jr.} and others}, + title = {Detection of Mutual Inconsistency in Distributed Systems}, + journal = {IEEE Transactions on Software Engineering}, + volume = {SE-9}, + number = 3, + month = may, + year = 1983, +} + +@inproceedings{ partridge87implementing, + author = {Craig Partridge}, + title = {Implementing the Reliable Data Protocol {(RDP)}}, + booktitle = {USENIX Summer Conference}, + month = jun, + year = 1987, +} + +@article{ partridge97tcpip, + author = {Craig Partridge and Timothy J. Shepard}, + title = {{TCP/IP} Performance over Satellite Links}, + journal = {IEEE Network}, + volume = 11, + number = 5, + month = sep, + year = 1997, + pages = {44-49}, +} + +@article{ patterson10multicore, + author={Patterson, D.}, + journal={Spectrum, IEEE}, + title={The trouble with multi-core}, + year={2010}, + month=jul, + volume={47}, + number={7}, + pages={28 -- 32, 53}, +} + + + +@inproceedings{ paul95asymmetric, + author = {S. Paul and others}, + title = {An Asymmetric Protocol for Digital Cellullar Communications}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = apr, + year = 1995, + location = {Boston, MA}, +} + +@inproceedings{ pearlman00impact, + author = {Marc R. Pearlman and others}, + title = {On the Impact of Alternate Path Routing for Load Balancing + in Mobile Ad Hoc Networks}, + booktitle = {\bibconf[1st]{MobiHoc}{Workshop on Mobile Ad Hoc + Networking \& Computing}}, + month = aug, + year = 2000, + location = {Boston, MA}, +} + +@inproceedings{pearson09privacy, + author = {Pearson, Siani}, + title = {Taking account of privacy when designing cloud computing services}, + booktitle = {\bibconf{ICSE-Cloud}{ICSE Workshop on + Software Engineering Challenges of Cloud Computing}}, + month = may, + year = 2009, + pages = {44--52}, + location = {Vancouver, BC, Canada} +} + +@inproceedings{ pei00fisheye, + author = "Guangyu Pei and Mario Gerla and Tsu-Wei Chen", + title = "Fisheye State Routing: + A Routing Scheme for Ad Hoc Wireless Networks", + booktitle = {\bibconf{ICC}{IEEE International Conference + on Communications}}, + pages = "70-74", + month = jun, + year = "2000", + location = "New Orleans, LA", + url = "citeseer.nj.nec.com/article/pei00fisheye.html" +} + +@inproceedings{ peng01improving, + author = {Jing Peng and Peter Andreadis and Claude B\'elisle + and Michel Barbeau}, + title = {Improving {TCP} Performance over Long Delay Satellite Links}, + booktitle = {OPNETWORK}, + year = 2001, +} + +@inproceedings{ percival05cache, + author = {Colin Percival}, + title = {Cache Missing for Fun and Profit}, + booktitle = {BSDCan}, + month = may, + year = 2005, + location = {Ottawa, Canada}, +} + +@inproceedings{ perkins94highly, + author = "Charles E. Perkins and Pravin Bhagwat", + title = "Highly Dynamic Destination-Sequenced Distance-Vector Routing ({DSDV}) for Mobile Computers", + booktitle = "{ACM} {SIGCOMM}'94 Conference on Communications Architectures, Protocols and Applications", + pages = "234--244", + year = "1994", +} + +@inproceedings{ perkins99adhoc, + author = "Charles E. Perkins and Elizabeth M. Belding-Royer", + title = "Ad Hoc On-Demand distance Vector Routing", + booktitle = "2nd IEEE Workshop on + Mobile Computing Systems and Applications", + pages = "90-100", + location = "New Orleans, LA", + month = feb, + year = "1999", +} + +@inproceedings{ peterson02flexible, + author = {David S. Peterson and Matt Bishop and Raju Pandey}, + title = {A Flexible Containment Mechanism for Executing Untrusted Code}, + booktitle = {11th USENIX Security Symposium}, + location = {San Francisco, CA}, + month = aug, + year = {2002}, + address = {Berkeley, CA, USA}, +} + +@inproceedings{ peterson04overcoming, + author = {Larry Peterson and Scott Shenker and Jonathan Turner}, + title = {Overcoming the {Internet} Impasse through Virtualization}, + booktitle = {\bibconf[3rd]{HotNets}{Workshop on Hot Topics in Networks}}, + location = {San Diego, CA}, + month = nov, + year = 2004, +} + +@article{peytonjones89parallel, + author = {Peyton Jones, Simon L.}, + title = {Parallel Implementations of Functional Programming Languages}, + volume = {32}, + number = {2}, + pages = {175--186}, + year = 1989, + journal = {The Computer Journal} +} + +@article{ pike95plan9, + author = {Rob Pike and others}, + title = {{Plan 9} from {Bell Labs}}, + journal = "Computing Systems", + volume = "8", + number = "3", + month = "Summer", + year = "1995", + pages = "221--254", +} + +@inproceedings{ plakal98lamport, + author = {Manoj Plakal and Daniel J. Sorin and Anne E. Condon and + Mark D. Hill}, + title = {\href{https://dl.acm.org/citation.cfm?doid=277651.277672}{Lamport Clocks: Verifying a Directory Cache-Coherence Protocol}}, + booktitle = {\bibconf[10th]{SPAA}{Symposium on Parallel Algorithms and Architectures}}, + month = jun, + year = 1998, + location = {Puerto Vallarta, Mexico}, +} + +@article{poddar16arx, + title={Arx: A strongly encrypted database system.}, + author={Poddar, Rishabh and Boelter, Tobias and Popa, Raluca Ada}, + journal={IACR Cryptology ePrint Archive}, + volume={2016}, + pages={591}, + year={2016} +} + +@inproceedings{popescu04turtle, + author="B. Popescu and B. Crispo and A. Tanenbaum", + title="Safe and Private Data Sharing with {Turtle}: + Friends Team-Up and Beat the System", + booktitle="\bibconf[12th]{SPW}{Cambridge Workshop on Security Protocols}", + year=2004 +} + +@inproceedings{ porter09operating, + author = {Donald E. Porter and Owen S. Hofmann and + Christopher J. Rossbach and Alexander Benn and Emmett Witchel}, + title = {Operating System Transactions}, + booktitle = {\bibconf[22nd]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + month = oct, + year = 2009, + location = {Big Sky, MT}, +} + +@inproceedings{potharaju13network, + author = {Rahul Potharaju and + Navendu Jain}, + title = {When the Network Crumbles: An Empirical Study + of Cloud Network Failures and their Impact + on Services}, + booktitle = {\bibconf[4th]{SoCC}{ACM Symposium on Cloud Computing}}, + location = {Santa Clara, CA}, + month = oct, + year = 2013 +} + +@inproceedings{ potlapally06satisfiability, + author = {Nachiketh R. Potlapally and Anand Raghunathan and + Srivaths Ravi and Niraj K. Jha and Ruby B. Lee}, + title = {Satisfiability-based Framework for Enabling + Side-channel Attacks on Cryptographic Software}, + booktitle = {\bibconf{DATE}{Design, Automation, and Test in Europe}}, + month = mar, + year = 2006, + location = {Munich, Germany}, +} + +@inproceedings{ pouwelse06tribler, + author = {J.A. Pouwelse and others}, + title = {Tribler: A Social-Based Peer-to-Peer System}, + booktitle = {\bibconf[5th]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + year = 2006, + month = feb, +} + +@inproceedings{prasad04effects, + author = {Ravi Prasad and Manish Jain and Constantinos Dovrolis}, + title = {Effects of Interrupt Coalescence on Network Measurements}, + booktitle = {Workshop on Passive and Active Measurements (PAM)}, + year = {2004} +} + +@inproceedings{ prasad07queueing, + author = {Ravi Prasad and others}, + title = {Queuing Delays in Randomized Load Balanced Networks}, + booktitle = {INFOCOMM}, + year = 2007, + month = may +} + +@inproceedings{ provos03improving, + author = {Niels Provos}, + title = {Improving Host Security with System Call Policies}, + booktitle = {12th USENIX Security Symposium}, + month = aug, + year = 2003, +} + +@article{pugh90skip, + author = {William Pugh}, + title = {Skip lists: a probabilistic alternative to balanced trees}, + journal = {Communications of the ACM}, + volume = {33}, + number = {6}, + year = {1990}, + pages = {668--676}, + publisher = {ACM Press}, +} + +@inproceedings{ quinlan02venti, + author = {S. Quinlan and S. Dorward}, + title = {{Venti}: a new approach to archival storage}, + booktitle = {\bibconf[1st]{FAST}{USENIX Conference on + File and Storage Technologies}}, + location = {Monterey, CA}, + year = {2002}, +} + +%R + +@inproceedings{ raffetseder07detecting, + author = {Thomas Raffetseder and Christopher Kruegel and Engin Kirda}, + title = {Detecting System Emulators}, + booktitle = {10th Information Security Conference}, + month = oct, + year = 2007, + location = {Valparaiso, Chile}, +} + +@inproceedings{ raghavendra08power, + author = {Raghavendra, Ramya and Ranganathan, Parthasarathy and + Talwar, Vanish and Wang, Zhikui and Zhu, Xiaoyun}, + title = {No ``power'' struggles: coordinated multi-level + power management for the data center}, + booktitle = {\bibconf[13th]{ASPLOS}{International Conference on + Architectural Support for Programming Languages + and Operating Systems}}, + year = {2008}, + isbn = {978-1-59593-958-6}, + location = {Seattle, WA, USA}, + pages = {48--59}, + numpages = {12}, + url = {http://doi.acm.org/10.1145/1346281.1346289}, + doi = {10.1145/1346281.1346289}, + acmid = {1346289}, +} + +@techreport{ raiciu09practical, + author = {Costin Raiciu and Damon Wischik and Mark Handley}, + title = {Practical Congestion Control for + Multipath Transport Protocols}, + institution = {University College London}, +} + +@inproceedings{ raju99new, + author = {Jyoti Raju and J.J. Garcia-Luna-Aceves}, + title = {A New Approach to On-demand Loop-Free Multipath Routing}, + booktitle = {\bibconf[8th]{ICCCN}{International Conference on + Computer Communications and Networks}}, + month = oct, + year = 1999, + location = {Boston, MA}, +} + +@inproceedings{ramamoorthy77fault, + author = {Chittoor V. Ramamoorthy and + Gary S. Ho and + Yih-Wu Han}, + title = {Fault tree analysis of computer systems}, + booktitle = {AFIPS National Computer Conference}, + year = 1977 +} + +@inproceedings{ raman00universal, + author = {Bhaskaran Raman and Randy H. Katz and Anthony D. Joseph}, + title = {{Universal Inbox}: + Providing Extensible Personal Mobility and Service Mobility in + an Integrated Communication Network}, + booktitle = {\bibconf[3rd]{WMCSA}{IEEE Workshop on + Mobile Computing Systems and Applications}}, + year = 2000, + month = dec, + location = {Monterey, CA}, +} + +@inproceedings{ ramasubramanian04design, + author = {Venugopalan Ramasubramanian and Emin G\"un Sirer}, + title = "The design and implementation of a next generation name service + for the {Internet}", + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + year = 2004, + month = aug, +} + +@inproceedings{ ramasubramanian09cimbiosys, + author = {Venugopalan Ramasubramanian and Thomas L. Rodeheffer and + Douglas B. Terry and Meg Walraed-Sullivan and + Ted Wobber and Catherine C. Marshall and Amin Vahdat}, + title = {Cimbiosys: A Platform for Content-based Partial Replication}, + booktitle = {\bibconf[6th]{NSDI}{USENIX Symposium + on Networked Systems Design and Implementation}}, + month = apr, + year = 2009, + location = {Boston, MA}, +} + +@inproceedings{ rangarajan99eruf, + author = {Anand Rangarajan and Anurag Acharya}, + title = {{ERUF}: Early Regulation of Unresponsive Best-Effort Traffic}, + booktitle = {\bibconf[7th]{ICNP}{International Conference on + Network Protocols}}, + month = oct, + year = 1999, + location = {Toronto, Canada}, +} + +@inproceedings{ranger07mapreduce, + author={Ranger, C. and Raghuraman, R. and Penmetsa, A. and Bradski, G. and + Kozyrakis, C.}, + booktitle={\bibconf[13th]{HPCA}{IEEE International Symposium + on High Performance Computer Architecture}}, + title={Evaluating {M}ap{R}educe for Multi-core and Multiprocessor Systems}, + year={2007}, + month=feb, + pages={13 -- 24}, +} + +@inproceedings{ rashid81accent, + author = {Richard F. Rashid and George G. Robertson}, + title = {Accent: A Communication Oriented Network + Operating System Kernel}, + booktitle = {\bibconf[5th]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + month = dec, + year = 1981, + location = {Pacific Grove, CA}, +} + +@inproceedings{ ratnasamy01scalable, + author = {Sylvia Ratnasamy and Paul Francis and Mark Handley + and Richard Karp and Scott Shenker}, + title = {A Scalable Content-Addressable Network}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2001, + location = {San Diego, CA}, +} + +@inproceedings{ ratnasamy05towards, + author = {Sylvia Ratnasamy and Scott Shenker and Steven McCanne}, + title = {Towards an Evolvable Internet Architecture}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2005, + location = {Philadelphia, PA}, +} + +@inproceedings{ ravichandran10collaborative, + author = {Kaushik Ravichandran and Romain Cledat and Santosh Pande}, + title = {Collaborative Threads: Exposing and Leveraging Dynamic Thread + State for Efficient Computation}, + booktitle = {\bibconf{HotPar '11}{2nd USENIX Workshop on Hot Topics in + Parallelism (HotPar '10)}}, + month = jun, + year = 2010, +} + +@article{ raynal92about, + author = {Michel Raynal}, + title = {About logical clocks for distributed systems}, + journal = {ACM SIGOPS Operating Systems Review}, + volume = 26, + number = 1, + month = jan, + year = 1992, +} + +@article{ reavis99trends, + author = {Jim Reavis}, + title = {Trends in government encryption policies}, + journal = {NetworkWorldFusion}, + month = aug, + day = 18, + year = 1999, + url = {http://www.networkworld.com/newsletters/sec/0816sec2.html}, +} + +@inproceedings{ reed10differential, + author = {Jason Reed and Adam J. Aviv and Daniel Wagner and + Andreas Haeberlen and Benjamin C. Pierce and + Jonathan M. Smith}, + title = {Differential Privacy for Collaborative Security}, + booktitle = {European Workshop on System Security (EuroSec '10)}, + location = {Paris, France}, + month = apr, + year = 2010, +} + +@inproceedings{ reiher94resolving, + author = "Peter Reiher and John Heidemann and David Ratner and + Greg Skinner and Gerald Popek", + title = "Resolving File Conflicts in the Ficus File System", + booktitle = "{USENIX} Summer", + pages = "183-195", + year = "1994", + url = "citeseer.ist.psu.edu/reiher94resolving.html" +} + +@article{ renesse15paxos, + author = {Robbert Van Renesse and Deniz Altinbuken}, + title = {{Paxos} Made Moderately Complex}, + journal = {ACM Computing Surveys (CSUR)}, + volume = 47, + number = 3, + month = apr, + year = 2015, +} + +@incollection {reppy93cml, + author = {Reppy, John}, + title = {Concurrent ML: Design, application and semantics}, + booktitle = {Functional Programming, Concurrency, Simulation and + Automated Reasoning}, + editor = {Lauer, Peter}, + publisher = {Springer}, + location = { Berlin / Heidelberg }, + pages = {165--198}, + volume = {693}, + year = {1993} +} + +@article{ richtel08smaller, + author = {Matt Richtel}, + title = {Smaller {PCs} Cause Worry for Industry}, + booktitle = {The New York Times}, + month = jul, + day = 21, + year = 2008, +} + +@inproceedings{ riedel98active, + author = {Erik Riedel and Garth Gibson and Christos Faloutsos}, + title = {Active Storage For Large-Scale Data Mining and Multimedia}, + booktitle = {Very Large Databases (VLDB)}, + location = {New York, NY}, + month = aug, + year = 1998, +} + +@inproceedings{ristenpart09cloud, + author = {Thomas Ristenpart and Eran Tromer and Hovav Shacham + and Stefan Savage}, + title = + {\href{https://css.csail.mit.edu/6.858/2011/readings/get-off-my-cloud.pdf}{Hey, + You, Get Off of My Cloud: Exploring Information Leakage + in Third-Party Compute Clouds}}, + booktitle = {\bibconf[16th]{CCS}{ACM Conference on + Computer and Communications Security}}, + year = {2009}, + pages = {199--212} +} + +@misc{ riverbed08rios, + author = {{Riverbed Technology, Inc.}}, + title = {The {Riverbed} Optimization System {(RiOS)} 5.5: + A Technical Overview}, + year = 2008, + note = {\url{http://www.riverbed.com/docs/TechOverview-Riverbed-RiOS_5.5.pdf}}, +} + +@misc{ rivest96sdsi, + author = "R.L. Rivest and B. Lampson", + title = {\href{http://theory.lcs.mit.edu/~cis/sdsi.html}{SDSI: A Simple + Distributed Security Infrastructure}}, + month = apr, + year = "1996", +} + +@inproceedings{ roberts70computer, + author = "Lawrence G. Roberts and Barry D. Wessler", + title = "Computer Network Development to Achieve Resource Sharing", + booktitle = "Spring Joint Computer Conference", + location = "Atlantic City, New Jersey", + month = may, + year = "1970", +} + +@inproceedings{ roberts03next, + author = {Lawrence G. Roberts}, + title = {The Next Generation of {IP} --- Flow Routing}, + booktitle = {\bibconf{SSGRR}{International Conference on Advances + in Infrastructure for Electronic Business, Science, + Education, Medicine, and Mobile Technologies + on the Internet}}, + location = {L'Aquila, Italy}, + month = jul, + year = 2003, +} + +@article{ roberts04internet, + author = {J. W. Roberts}, + title = {Internet Traffic, {QoS} and Pricing}, + journal = {Proceedings of the IEEE}, + volume = 92, + number = 9, + month = sep, + year = 2004, + pages = {1389- 1399}, +} + +@misc{ roberts08does, + author = {Lawrence G. Roberts}, + title = {Does {TCP} Need an Overhaul?}, + month = apr, + day = 3, + year = 2008, + note = {\url{http://www.internetevolution.com/author.asp?section_id=499}}, +} + +@inproceedings{rodrigues07large, + title={\href{https://www.net.t-labs.tu-berlin.de/papers/RKB-LBFTSNAL-07.pdf}{Large-scale Byzantine fault tolerance: Safe but not always live}}, + author={Rodrigues, Rodrigo and Kouznetsov, Petr and Bhattacharjee, Bobby}, + booktitle={Proceedings of the 3rd Workshop on Hot Topics in System Dependability}, + year={2007} +} + +@article{ roseman96building, + author = "Mark Roseman and Saul Greenberg", + title = "Building real-time groupware with {GroupKit}, a groupware toolkit", + journal = "ACM Transactions on Computer-Human Interaction", + volume = "3", + number = "1", + pages = "66--106", + year = "1996", + month = mar, + url = "citeseer.ist.psu.edu/roseman96building.html" +} + +@inproceedings{ roseman96teamrooms, + author = "Mark Roseman and Saul Greenberg", + title = "TeamRooms: Network Places for Collaboration", + booktitle = "Computer Supported Cooperative Work", + publisher = "ACM Press", + pages = "325-333", + year = "1996", + month = nov, + url = "citeseer.ist.psu.edu/roseman96teamroom.html" +} + +@article{ rosenblum97simos, + author = {Mendel Rosenblum and Edouard Bugnion and Scott Devine + and Stephen A. Herrod}, + title = {Using the {SimOS} Machine Simulator + to Study Complex Computer Systems}, + journal = {Modeling and Computer Simulation}, + year = 1997, + volume = 7, + number = 1, + pages = {78-103}, +} + +@article{ rosenthal05transparent, + author = {David S. H. Rosenthal and Thomas Lipkis and + Thomas S. Robertson and Seth Morabito}, + title = {Transparent Format Migration of Preserved Web Content}, + journal = {D-Lib Magazine}, + volume = {11}, + number = {1}, + month = jan, + year = 2005, + issn = {1082-9873}, + url = {http://www.dlib.org/dlib/january05/rosenthal/01rosenthal.html}, +} + +@article{ rothenberg95ensuring, + author = {Jeff Rothenberg}, + title = {Ensuring the Longevity of Digital Documents}, + journal = {Scientific American}, + month = jan, + year = 1995, + volume = 272, + number = 1, + pages = {24-29}, +} + +@inproceedings{ rowstron01past, + author = {Antony Rowstron and Peter Druschel}, + title = {\href{https://dl.acm.org/citation.cfm?id=502053}{Storage management and caching in PAST, + a large-scale, persistent peer-to-peer storage utility}}, + booktitle = {\bibconf[18th]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + location = {Banff, Canada}, + month = oct, + year = {2001}, +} + +@inproceedings{ rowstron01pastry, + author = "A. Rowstron and P. Druschel", + title = "Pastry: Scalable, distributed object location and routing + for large-scale peer-to-peer systems", + booktitle = "\bibconf{Middleware}{International Conference on + Distributed Systems Platforms}", + year = "2001" +} + +@article{ royer99review, + author = "E. Royer and C. Toh", + title = "A Review of Current Routing Protocols for Ad-Hoc Mobile Wireless Networks", + journal = "IEEE Personal Communications", + month = apr, + year = "1999", + url = "citeseer.nj.nec.com/royer99review.html" +} + +@inproceedings{ ruget94cheaper, + author = {Fr\'{e}d\'{e}ric Ruget}, + title = {\href{https://pdfs.semanticscholar.org/e060/433cd977fc11c29919bb01bc7c8b9500a144.pdf}{Cheaper matrix clocks}}, + booktitle = {International Workshop on Distributed Algorithms (WDAG)}, + month = sep, + year = 1994, + pages = {355-369}, +} + +@article{ ryu03advances, + author = {Seungwan Ryu and Christopher Rump and Chunming Qiao}, + title = {Advances in {Internet} Congestion Control}, + journal = {IEEE Communications Surveys}, + volume =5, + number = 1, + year = 2003, +} + +%S + +@book{saaty88analytic, + title={What is the analytic hierarchy process?}, + author={Saaty, Thomas L}, + year={1988}, + publisher={Springer} +} + +@inproceedings{ sadowski09singletrack, + author = {Caitlin Sadowski and Stephen N. Freund and Cormac Flanagan}, + title = {{SingleTrack}: A Dynamic Determinism Checker + for Multithreaded Programs}, + booktitle = {\bibconf[18th]{ESOP}{European Symposium on Programming}}, + month = mar, + year = 2009, + location = {York, United Kingdom}, +} + +@inproceedings{ salmon09perspective, + author = {Brandon Salmon and Steven W. Schlosser and + Lorrie Faith Cranor and Gregory R. Ganger}, + title = {Perspective: Semantic data management for the home}, + booktitle = {\bibconf[7th]{USENIX FAST}{USENIX Conference on + File and Storage Technologies}}, + month = feb, + year = 2009, + location = {San Francisco, CA}, +} + +@inproceedings{ saltz03tesla, + author = "Jon Salz and Alex C. Snoeren and Hari Balakrishnan", + title = "{TESLA: A Transparent, Extensible Session-Layer Architecture for End-to-End Network Services}", + booktitle = "4th Usenix Symposium on Internet Technologies and Systems", + location = "Seattle, Washington", + month = mar, + year = "2003", +} + +% same as rfc1498? +@incollection{ saltzer82naming, + author = {J. Saltzer}, + title = {On the Naming and Binding of Network Destinations}, + editor = {P. {Ravasio et al.}}, + booktitle = {Local Computer Networks}, + publisher = {North-Holland}, + address = {Amsterdam}, + pages = {311--317}, + year = {1982}, + note = {RFC 1498}, +} + +@article{ saltzer84endtoend, + author = {J. H. Saltzer and D. P. Reed and D. D. Clark}, + title = {End-To-End Arguments in System Design}, + journal = {\bibbrev{TOCS}{Transactions on Computer Systems}}, + volume = 2, + number = 4, + month = nov, + year = 1984, + pages = {277-288}, +} + +@inproceedings{santhanam05sandbox, + title = {Deploying Virtual Machines as Sandboxes for the Grid}, + author = {Sriya Santhanam and Pradheep Elango and Andrea Arpaci Dusseau and +Miron Livny}, + booktitle = {WORLDS}, + year = {2005}, + howpublished = "\url{http://www.cs.wisc.edu/~pradheep/SandboxingWorlds05.pdf}" +} + +@article{ santoro85labelling, + author = {Nicola Santoro and Ramez Khatib}, + title = {Labelling and Implicit Routing in Networks}, + journal = {Computer Journal}, + volume = 28, + number = 1, + pages = {5-8}, + year = 1985, +} + +@inproceedings{ santos09trusted, + author = {Nuno Santos and Krishna P. Gummadi and Rodrigo Rodrigues}, + title = {Towards Trusted Cloud Computing}, + booktitle = {\bibconf[1st]{HotCloud}{USENIX Workshop on + Hot Topics in Cloud Computing}}, + month = jun, + year = 2009, + location = {San Diego, CA}, +} + + +@inproceedings{santos12policy, + title = {Policy-Sealed Data: {A} New Abstraction for Building + Trusted Cloud Services}, + author = {Santos, Nuno and + Rodrigues, Rodrigo and + Gummadi, Krishna P and + Saroiu, Stefan}, + booktitle = {\bibconf[21st]{USENIX Security}{USECIX Security Symposium}}, + location = {Bellevue, WA}, + month = aug, + year = 2012 +} + + +@inproceedings{ santry99elephant, + author = {Douglas S. Santry and Michael J. Feeley and + Norman C. Hutchinson and Alistair C. Veitch and + Ross W. Carton and Jacob Ofir}, + title = {Deciding when to forget in the {Elephant} file system}, + booktitle = {\bibconf[17th]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + month = dec, + year = 1999, + location = {Charleston, SC}, +} + +@article{ sarin87discarding, + author = {Sunil K. Sarin and Nancy A. Lynch}, + title = {Discarding Obsolete Information in a + Replicated Database System}, + journal = {IEEE Transactions on Software Engineering}, + volume = {SE-13}, + number = 1, + month = jan, + year = 1987, +} + +@inproceedings{ saroiu02measurement, + author = "Stefan Saroiu and P. Krishna Gummadi and Steven D. Gribble", + title = "A Measurement Study of Peer-to-Peer File Sharing Systems", + booktitle = "Multimedia Computing and Networking (MMCN) 2002", + location = "San Jose, CA, USA", + month = jan, + year = 2002, +} + +@article{ sathaye99boa, + author = "S. Sathaye and P. Ledak and J. LeBlanc and S. Kosonocky and + M. Gschwind and J. Fritts and Z. Filan and A. Bright and + D. Appenzeller and E. Altman and C. Agricola", + title = "{BOA}: Targeting MultiGigahertz with Binary Translation", + journal = "IEEE TCCA Newsletter", + year = 1999, + month = "Fall", + pages = "2--11", + url = "citeseer.ist.psu.edu/sathaye99boa.html" +} + +@inproceedings{ savage99endtoend, + author = {Stefan Savage and Andy Collins and Eric Hoffman and + John Snell and Thomas Anderson}, + title = {The End-to-End Effects of Internet Path Selection}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1999, + location = {Cambridge, MA}, +} + +@article{ savage99tcp, + author = {Stefan Savage and Neal Cardwell and David Wetherall + and Tom Anderson}, + title = {{TCP} Congestion Control with a Misbehaving Receiver}, + journal = {Computer Communications Review}, + volume = 29, + number = 5, + month = oct, + year = 1999, +} + +@inproceedings{ scharf06headofline, + author = {Michael Scharf and Sebastian Kiesel}, + title = {Head-of-line Blocking in {TCP} and {SCTP}: + Analysis and Measurements}, + booktitle = {IEEE GLOBECOM}, + month = nov, + year = 2006, + location = {San Francisco, CA}, +} + +@inproceedings{scheurich87cache, + author = {Scheurich, C. and Dubois, M.}, + title = {Correct memory operation of cache-based multiprocessors}, + booktitle = {Proceedings of the 14th annual international symposium on + Computer architecture}, + year = 1987, + pages = {234--243}, +} + +@misc{ schoen07detecting, + author = {Seth Schoen}, + title = {Detecting Packet Injection: + A Guide to Observing Packet Spoofing by {ISPs}}, + howpublished = {Electronic Frontier Foundation whitepaper}, + month = nov, + year = 2007, + url = {http://www.eff.org/wp/detecting-packet-injection}, +} + +@article{schneider90implementing, + author = {Fred B. Schneider}, + title = {Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial}, + journal = {{ACM} Computing Surveys}, + volume = {22}, + number = {4}, + pages = {299--319}, + month = dec, + year = {1990}, + url = {http://doi.acm.org/10.1145/98163.98167}, + doi = {10.1145/98163.98167}, + timestamp = {Mon, 05 Dec 2011 18:03:13 +0100}, + biburl = {https://dblp.org/rec/bib/journals/csur/Schneider90}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@article{ schroeder91autonet, + author = {Michael D. Schroeder and others}, + title = {Autonet: a high-speed, self-configuring local area network + using point-to-point links}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 9, + number = 8, + month = oct, + year = 1991, + pages = {1318-1335}, +} + +% schulte94hardware is apparently the journal equivalent +@inproceedings{ schulte93exact, + author = {Michael Schulte and Earl Swartzlander}, + title = {Exact Rounding of Certain Elementary Functions}, + booktitle = {11th IEEE Symposium on Computer Arithmetic}, + location = {Windsor, Canada}, + month = jun, + year= 1993, + pages = {138-145}, +} + +@article{ schulte94hardware, + author = {M.J. Schulte and E.E. Swartzlander}, + title = {Hardware designs for exactly rounded elementary functions}, + journal = {IEEE Transactions on Computers}, + volume = 43, + number = 8, + pages = {964-973}, + month = aug, + year = 1994, +} + +@misc{ schwartz80burroughs, + author = {Jacob T. Schwartz}, + title = {The Burroughs {FMP} Machine}, + month = jan, + year = 1980, + note = {Ultracomputer Note \#5}, +} + +@inproceedings{schwarzkopf12seven, + author = {Malte Schwarzkopf and + Derek G. Murray and + Steven Hand}, + title = {The Seven Deadly Sins of Cloud Computing Research}, + booktitle = {\bibconf[4th]{HotCloud}{USENIX Workshop on + Hot Topics in Cloud Computing}}, + month = jun, + year = 2012, + location = {Boston, MA} +} + +@mastersthesis{ scofield07hopbyhop, + author = {Dan Scofield}, + title = {Hop-by-hop Transport Control for Multi-Hop Wireless Networks}, + school = {Brigham Young University}, + month = apr, + year = 2007, +} + +@inproceedings{ scott04overhead, + author = {K. Scott and others}, + title = {Overhead reduction techniques for + software dynamic translation}, + booktitle = {NSF Workshop on Next Generation Software}, + month = apr, + year = 2004, +} + +@inproceedings{ scott11toward, + author = {Michael L. Scott and Li Lu}, + title = {Toward a Formal Semantic Framework for + Deterministic Parallel Programming}, + booktitle = {\bibconf[2nd]{WoDet}{Workshop on Determinism + and Correctness in Parallel Programming}}, + month = mar, + day = 6, + year = 2011, + location = {Newport Beach, CA}, +} + +@inproceedings{ seshan97spand, + author = "Srinivasan Seshan and Mark Stemm and Randy Katz", + title = {SPAND: Shared Passive Network Performance Discovery}, + booktitle = {\bibconf{USITS}{USENIX Symposium on Internet Technologies + and Systems}}, + year = 1997 +} + +@inproceedings{ seward05valgrind, + author = {Julian Seward and Nicholas Nethercote}, + title = {Using {Valgrind} to detect undefined value errors + with bit-precision}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + location = {Anaheim, CA}, + month = apr, + year = 2005, +} + +@misc{ seward11valgrind, + author = {Julian Seward and others}, + title = {Valgrind}, + howpublished = {\url{http://valgrind.org/}}, + year = {2003 -- 2011}, +} + +@article{sezgin05sequential, + author = "Ali Sezgin and Ganesh Gopalakrishnan", + title = "On the definition of sequential consistency", + journal = "Information Processing Letters", + volume = "96", + number = "6", + pages = "193 -- 196", + year = "2005", +} + + +@inproceedings{ shah07auditing, + author = {Mehul A. Shah + and Mary Baker + and Jeffrey C. Mogul + and Ram Swaminathan}, + title = {Auditing to Keep Online Storage Services Honest}, + booktitle = {\bibconf[11th]{HotOS}{Workshop on Hot Topics + in Operating Systems}}, + month = may, + year = 2007, + location = {San Diego, CA}, +} + + +@inproceedings{sharma11cost, + title = {A Cost-Aware Elasticity Provisioning System for the Cloud}, + author = {Sharma, Upendra + and Shenoy, Prashant + and Sahu, Sambit + and Shaikh, Anees}, + booktitle= {\bibconf[31st]{ICDCS}{International Conference on + Distributed Computing Systems}}, + location = {Minneapolis, MN}, + month = jun, + year = 2011 +} + +@article{ shavit97software, + author = {Nir Shavit and Dan Touitou}, + title = {Software Transactional Memory}, + journal = {Distributed Computing}, + volume = 10, + number = 2, + month = feb, + year = 1997, + pages = {99-116}, +} + +@misc{ shenker93scheduling, + author = "S. Shenker and D. Clark and L. Zhang", + title = "A Scheduling Service Model and a Scheduling Architecture + for an Integrated Services Packet Network preprint", + text = "S. Shenker, D. Clark, and L. Zhang. A Scheduling Service Model and a Scheduling + Architecture for an Integrated Services Packet Network", + year = "1993", + url = "citeseer.ist.psu.edu/article/shenker93scheduling.html" +} + +@article{ shenker94making, + author = {Scott Shenker}, + title = {Making Greed Work in Networks: + A Game-Theoretic Analysis of Switch Service Disciplines}, + journal = {Computer Communications Review}, + volume = 24, + number = 4, + month = oct, + year = 1994, + pages = {47-57}, +} + +@inproceedings{shieh10seawall, + author = {Shieh, Alan and Kandula, Srikanth and Greenberg, Albert and Kim, Changhoon}, + title = {Seawall: Performance Isolation for Cloud Datacenter Networks}, + booktitle={\bibconf[2nd]{HotCloud}{USENIX Workshop on + Hot Topics in Cloud Computing}}, + year = {2010}, +} + +@article{ shirky00inpraise, + author = "Clay Shirky", + title = "In Praise of Freeloaders", + journal = "openp2p.com", + publisher = "O'Reilly", + month = dec, + year = "2000", +} + +@inproceedings{ shoch78internetwork, + author = {John F. Shoch}, + title = {Inter-Network Naming, Addressing, and Routing}, + booktitle = {IEEE COMPCON Fall}, + year = 1978, + pages = {72-79}, +} + +@book{ sidhu90inside, + author = {Gursharan S. Sidhu and Richard F. Andrews + and Alan B. Oppenheimer}, + title = {Inside {Appletalk}}, + publisher = {Addison-Wesley}, + year = 1990, + pages = {600}, + edition = {2rd}, + isbn = {0-201-55021-0}, +} + +@misc{ silverpeak09overview, + author = {{Silver Peak Systems, Inc.}}, + title = {An Overview of {Silver Peak's} {WAN} Acceleration Technology}, + year = 2009, + note = {\url{http://www.silver-peak.com/assets/download/pdf/wp_SilverPeak_Technology_Overview.pdf}}, +} + +@misc{ simulink12, + author = {The MathWorks}, + title = {Simulink}, + url = {http://www.mathworks.com/products/simulink} +} + +@article{ sinha02wtcp, + author = {Prasun Sinha and others}, + title = {{WTCP}: A Reliable Transport Protocol + for Wireless Wide-Area Networks}, + journal = {Wireless Networks}, + volume = 8, + number = 2, + month = mar, + year = 2002, + pages = {301-316}, +} + +@inproceedings{ sit02security, + author = {Emil Sit and Robert Morris}, + title = {Security Considerations for Peer-to-Peer + Distributed Hash Tables}, + booktitle = {\bibconf[1st]{IPTPS}{International Workshop + on Peer-to-Peer Systems}}, + month = mar, + year = 2002, + location = {Cambridge, MA}, +} + +@article{ sites92alpha, + author = {Richard L. Sites}, + title = {{Alpha AXP} Architecture}, + journal = {Digital Technical Journal}, + volume = 4, + number = 4, + year = 1992, +} + +@article{sites93binary, + author = {Richard L. Sites and Anton Chernoff and Matthew B. Kirk + and Maurice P. Marks and Scott G. Robinson}, + title = {Binary translation}, + journal = {Communications of the ACM}, + volume = {36}, + number = {2}, + year = {1993}, + issn = {0001-0782}, + pages = {69--81}, + doi = {http://doi.acm.org/10.1145/151220.151227}, + publisher = {ACM Press}, +} + +@inproceedings{ sivakumar00psockets, + author = {H. Sivakumar and S. Bailey and R.L. Grossman}, + title = {{PSockets}: The Case for Application-level Network Striping + for Data Intensive Applications + using High Speed Wide Area Networks}, + booktitle = {\bibconf{SC}{Conference on High Performance + Networking and Computing}}, + month = nov, + year = 2000, + location = {Dallas, TX}, +}, + +@article{ siw08top, + author = {{SecurityInfoWatch.com}}, + title = {Top computer security risks for healthcare}, + month = mar, + day = 21, + year = 2008, + url = {http://www.securityinfowatch.com/article/article.jsp?id=14710}, +} + +@book{ skillicorn05foundations, + author = {David Skillicorn}, + title = {Foundations of Parallel Programming}, + year = 2005, + publisher = {Cambridge University Press} +} + +@inproceedings{ small96comparison, + author = {Christopher Small and Margo Seltzer}, + title = {A Comparison of {OS} Extension Technologies}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + location = {San Diego, CA}, + month = jan, + year = 1996, +} + +@article{ small98misfit, + author = {Christopher Small and Margo Seltzer}, + title = {{MiSFIT}: {C}onstructing Safe Extensible Systems}, + journal = {{IEEE} Concurrency}, + volume = 6, + number = 3, + year = 1998, + pages = {34--41}, +} + +@inproceedings{ snoeren99adaptive, + author = {Alex C. Snoeren}, + title = {Adaptive Inverse Multiplexing for Wide-Area Wireless Networks}, + booktitle = {IEEE Globecom}, + year = 1999, + month = dec +} + +@inproceedings{ snoeren00endtoend, + author = "Alex C. Snoeren and Hari Balakrishnan", + title = "An End-to-End Approach to Host Mobility", + booktitle = "\bibconf[6th]{MOBICOM}{ACM/IEEE International Conference on + Mobile Computing and Networking}", + month = aug, + year = "2000", +} + +@inproceedings{ snoeren01reconsidering, + author = "Alex C. Snoeren and Hari Balakrishnan and M. Frans Kaashoek", + title = "Reconsidering {Internet} Mobility", + booktitle = "\bibconf[8th]{HotOS}{Workshop on + Hot Topics in Operating Systems}", + month = may, + year = "2001", + url = "http://nms.lcs.mit.edu/papers/migrate-hotOS.html", +} + +@inproceedings{ soltesz07container, + author = {Stephen Soltesz and Herbert P\"otzl and Marc E. Fiuczynski + and Andy Bavier and Larry Peterson}, + title = {Container-based Operating System Virtualization: + A Scalable, High-performance Alternative to Hypervisors}, + booktitle = {EuroSys}, + month = mar, + year = 2007, + location = {Lisbon, Portugal}, +} + +% XXX this bib entry is pretty incomplete +@inproceedings{ song01timing, + author = {D. Song and D. Wagner and X. Tian}, + title = {Timing analysis of keystrokes and {SSH} timing attacks}, + booktitle = {{USENIX} Security Symposium}, + year = 2001, +} + +@book{sorensen48method, + title = {A Method of Establishing Groups of Equal Amplitude in Plant + Sociology Based on Similarity of Species Content and Its + Application to Analyses of the Vegetation on {D}anish Commons}, + author = {S{\o}rensen, T.}, + lccn = {a49002195}, + url={http://books.google.co.in/books?id=rpS8GAAACAAJ}, + year={1948}, + publisher={I kommission hos E. Munksgaard} +} + +@inproceedings{ srinavasan04flashback, + author = {Sudarshan Srinivasan and Srikanth Kandula and + Christopher Andrews and Yuanyuan Zhou}, + title = {Flashback: a lightweight extension for rollback and deterministic replay + for software debugging}, + booktitle = {USENIX Annual Technical Conference}, + month = jun, + year = 2004, + location = {Boston, MA}, +} + +@inproceedings{ srivatsa04vulnerabilities, + author = {Mudhakar Srivatsa and Ling Liu}, + title = {Vulnerabilities and Security Threats in Structured + Peer-to-Peer Systems: A Quantitative Analysis}, + booktitle = {20th \bibconf{ACSAC}{Annual Computer Security + Applications Conference}}, + month = dec, + year = 2004, + location = {Tucson, AZ}, +} + +@inproceedings{ stajano99resurrecting, + author = {Frank Stajano and Ross Anderson}, + title = {The Resurrecting Duckling: + Security Issues for Ad-hoc Wireless Networks}, + booktitle = {7th International Workshop on Security Protocols}, + location = {Cambridge, UK}, + month = apr, + year = 1999, +} + +@article{stancevic03zero, + title={Zero copy I: user-mode perspective}, + author={Stancevic, Dragan}, + journal={Linux Journal}, + volume={2003}, + number={105}, + pages={3}, + year={2003}, + publisher={Belltown Media} +} + +@inproceedings{ stanojevic08can, + author = {Milan Stanojevic and Ratul Mahajan and Todd Millstein + and Madanlal Musuvathi}, + title = {Can You Fool Me? + Towards Automatically Checking Protocol Gullibility}, + booktitle = {\bibconf[7th]{HotNets}{Workshop + on Hot Topics in Networks}}, + location = {Calgary, Alberta, Canada}, + month = oct, + day = 6, + year = 2008, +} + +@inproceedings{ stark87semantics, + author = {Stark, E. W.}, + title = {Concurrent transition system semantics of process networks}, + booktitle = {\bibconf[14th]{POPL}{{ACM SIGACT-SIGPLAN} + symposium on Principles of programming languages}}, + location = {Munich, West Germany}, + month = jan, + year = 1987, + pages = {199-210}, +} + +@inproceedings{ stein99sbox, + author = {Lincoln D. Stein}, + title = {{SBOX}: Put {CGI} Scripts in a Box}, + booktitle = {USENIX}, + month = jun, + year = 1999, +} + +@inproceedings{ stoica98core, + author = {Ion Stoica and Scott Shenker and Hui Zhang}, + title = {Core-Stateless Fair Queueing: A Scalable Architecture to + Approximate Fair Bandwidth Allocations in High Speed Networks}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 1998, + location = {Vancouver, BC, Canada}, +} + +@inproceedings{stoica01chord, + author = {Ion Stoica and + Robert Tappan Morris and + David R. Karger and + M. Frans Kaashoek and + Hari Balakrishnan}, + title = {\href{https://dl.acm.org/citation.cfm?id=383071}{Chord: {A} scalable peer-to-peer lookup service for internet applications}}, + booktitle = {{SIGCOMM}}, + pages = {149--160}, + year = {2001}, + url = {http://doi.acm.org/10.1145/383059.383071}, + doi = {10.1145/383059.383071}, + timestamp = {Tue, 24 Oct 2017 18:34:07 +0200}, + biburl = {https://dblp.org/rec/bib/conf/sigcomm/StoicaMKKB01}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{ stoica02internet, + author = "Ion Stoica and others", + title = "Internet Indirection Infrastructure", + booktitle = "\bibbrev{SIGCOMM}{ACM SIGCOMM}", + year = "2002", + month = aug, + date = {19-23}, + location = {Pittsburgh, PA} +} + +@article{ stone08whats, + author = {Brad Stone}, + title = {What's in a domain name? {Serious} money}, + journal = {International Herald Tribune}, + month = jan, + day = 31, + year = 2008, +} + +@inproceedings{ strauss10eyo, + author = {Jacob Strauss and Justin Mazzola Paluska and + Chris Lesniewski-Laas and Bryan Ford and Robert Morris + and Frans Kaashoek}, + title = {Eyo: Device-Transparent Personal Storage}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2010, + location = {Boston, MA}, +} + +@book{ stroustrup97c++, + author = "Bjarne Stroustrup", + title = "The C++ Programming Language", + edition = "3rd", + publisher = "Addison-Wesley", + month = "June", + year = "1997", + isbn = "0201889544", +} + +@inproceedings{ subramanian04overqos, + author = {Lakshminarayanan Subramanian and Ion Stoica + and Hari Balakrishnan and Randy Katz}, + title = {{OverQoS}: An Overlay Based Architecture + for Enhancing {Internet} {QoS}}, + booktitle = {\bibconf[1st]{NSDI}{USENIX/ACM Symposium + on Networked Systems Design and Implementation}}, + location = "San Francisco, CA", + month = mar, + year = 2004, +} + +@inproceedings{ sugarman01virtualizing, + author = {Jeremy Sugerman and Ganesh Venkitachalam and Beng-Hong Lim}, + title = {Virtualizing {I/O} Devices + on {VMware Workstation}'s Hosted Virtual Machine Monitor}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + location = {Boston, MA}, + month = jun, + year = 2001, +} + +@inproceedings{ sundaresan03atp, + author = {K. Sundaresan and V. Anantharaman and H. Hsieh and R. Sivakumar}, + title = {{ATP}: A Reliable Transport Protocol for Ad-hoc Networks}, + booktitle = {\bibconf{MOBIHOC}{ACM International Symposium + on Mobile Ad Hoc Networking and Computing}}, + location = {Annapolis, MD}, + month = jun, + year = 2003, +} + +@article{ sunshine78connection, + author = {Carl A. Sunshine and Yogen K. Dalal}, + title = {Connection Management in Transport Protocols}, + journal = {Computer Networks}, + volume = {2}, + number = {6}, + pages = {454-473}, + month = dec, + year = 1978, +} + +@inproceedings{ swany04improving, + author = {Martin Swany}, + title = {Improving Throughput for Grid Applications + with Network Logistics}, + booktitle = {\bibconf{SC}{High Performance Computing, + Networking and Storage Conference}}, + month = nov, + year = 2004, + location = {Pittsburgh, PA}, +} + +@inproceedings{ swierk00roma, + author = {E. Swierk and E. K\i c\i man and V. Laviano + and M. Baker}, + title = {The {Roma} Personal Metadata Service}, + booktitle = {\bibconf[3rd]{WMCSA}{IEEE Workshop on + Mobile Computing Systems and Applications}}, + year = 2000, + month = dec, +} + +@inproceedings{ swift03improving, + author = {Michael M. Swift and Brian N. Bershad and Henry M. Levy}, + title = {Improving the reliability of commodity operating systems}, + booktitle = {\bibconf[19th]{SOSP}{ACM Symposium on + Operating Systems Principles}}, + year = {2003}, + location = {Bolton Landing, NY, USA}, +} + +%T + +@inproceedings{ takeda02online, + author = {Toshiyuki Takeda and Daniel Suthers}, + title = {Online Workspaces for Annotation and Discussion of Documents}, + booktitle = {International Conference on Computers in Education}, + month = dec, + date = {3--6}, + year = 2002, + location = {Auckland, New Zealand}, +} + +@inproceedings{ tai08making, + author = {Chia-Hui Tai and Jiang Zhu and Nandita Dukkipati}, + title = {Making large scale deployment of {RCP} practical + for real networks}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = apr, + year = 2008, + location = {Phoenix, AZ}, +} + +@inproceedings{ tan06compound, + author = {Kun Tan and Jingmin Song and Qian Zhang and Murari Sridharan}, + title = {{Compound TCP}: A Scalable and {TCP}-Friendly + Congestion Control for High-speed Networks}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = apr, + year = 2006, + location = {Barcelona, Spain}, +} + +@inproceedings{ tang10trust, + author = {Shuo Tang and Haohui Mai and Samuel T. King}, + title = {Trust and Protection in the Illinois Browser Operating System}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + location = {Vancouver, BC, Canada}, + month = oct, + year = 2010, +} + +@inproceedings{ tang12cleanos, + author = {Tang, Yang and Ames, Phillip and Bhamidipati, Sravan and Bijlani, Ashish and Geambasu, Roxana and Sarda, Nikhil}, + title = {CleanOS: limiting mobile data exposure with idle eviction}, + booktitle = {\bibbrev{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}}, + month = oct, + year = {2012}, +} + +@inproceedings{ tardieu06scheduling, + author = {Olivier Tardieu and Stephen A. Edwards}, + title = {Scheduling-Independent Threads and Exceptions in {SHIM}}, + booktitle = {\bibconf[6th]{EMSOFT}{Conference on Embedded Software}}, + month = oct, + year = 2006, + pages = {142-151}, + location = {Seoul, Korea}, +} + +% see also mullender86design +@inproceedings{ tanenbaum86using, + author = {Andrew S. Tanenbaum and Sape J. Mullender + and Robbert van Renesse}, + title = {Using Sparse Capabilities in a Distributed Operating System}, + booktitle = {\bibconf[6th]{ICDCS}{International Conference on + Distributed Computing Systems}}, + month = may, + year = 1986, + location = {Cambridge, MA}, +} + +@inproceedings{ tolia06architecture, + author = {Niraj Tolia and Michael Kaminsky and David G. Andersen + and Swapnil Patil}, + title = {An Architecture for {I}nternet Data Transfer}, + booktitle = {\bibconf[3rd]{NSDI}{USENIX/ACM Symposium + on Networked Systems Design and Implementation}}, + month = may, + year = 2006, + location = {San Jose, CA}, +} + +@article{ tsuchiya93extending, + author = {Paul F. Tsuchiya and Tony Eng}, + title = {Extending the {IP} Internet Through Address Reuse}, + journal = {Computer Communications Review}, + volume = 23, + number = 1, + pages = {16-33}, + month = jan, + year = 1993, +} + +@inproceedings{ tennenhouse89layered, + author = {David L. Tennenhouse}, + title = {Layered Multiplexing Considered Harmful}, + booktitle = {1st International Workshop on + Protocols for High-Speed Networks}, + location = {Zurich, Switzerland}, + month = may, + year = 1989, + isbn = {0-444-88536-6}, +} + +@article{ tennenhouse97survey, + author = "David L. Tennenhouse and Jonathan M. Smith and + W. David Sincoskie and David J. Wetherall and Gary J. Minden", + title = "A Survey of Active Network Research", + journal = "IEEE Communications Magazine", + volume = "35", + number = "1", + pages = "80--86", + year = "1997", + url = "citeseer.ist.psu.edu/tennenhouse97survey.html" +} + +@inproceedings{teregowda10citeseerx, + title={Cite{S}eer$^x$: {A} Cloud Perspective}, + author={Teregowda, Pradeep B and Urgaonkar, Bhuvan and Giles, C Lee}, + booktitle={\bibconf[2nd]{HotCloud}{USENIX Workshop on + Hot Topics in Cloud Computing}}, + location = {Boston, MA}, + month = jun, + year = 2010 +} + + +@inproceedings{ terry95managing, + author = "Douglas B. Terry and others", + title = "Managing Update Conflicts in {Bayou}, + a Weakly Connected Replicated Storage System", + booktitle = {\bibconf[15th]{SOSP}{ACM Symposium on + Operating System Principles}}, + year = "1995" +} + +@inproceedings{ thorup01approximate, + author = "Mikkel Thorup and Uri Zwick", + title = "Approximate distance oracles", + booktitle = "{ACM} Symposium on Theory of Computing", + pages = "183-192", + year = "2001", + url = "citeseer.ist.psu.edu/thorup01approximate.html" +} + +@inproceedings{thorup01compact, + author = {Mikkel Thorup and Uri Zwick}, + title = {Compact routing schemes}, + booktitle = {\bibconf{SPAA}{ACM Symposium on Parallel Algorithms + and Architectures}}, + year = {2001}, + isbn = {1-58113-409-6}, + pages = {1--10}, + location = {Crete Island, Greece}, + doi = {http://doi.acm.org/10.1145/378580.378581}, + publisher = {ACM Press}, + address = {New York, NY, USA}, +} + +@article{ tomlinson75selecting, + author = {Raymond S. Tomlinson}, + title = {Selecting Sequence Numbers}, + journal = {SIGOPS Operating Systems Review}, + volume = {9}, + number = {3}, + month = jul, + year = {1975}, + pages = {11--23}, +} + +@techreport{ touch06recursive, + author = {Joseph D. Touch and Yu-Shun Wang and Venkata Pingali}, + title = {A Recursive Network Architecture}, + institution = {University of Southern California + Information Sciences Institute}, + number = {ISI-TR-2006-626}, + month = oct, + year = 2006, +} + +@article{ trinder02parallel, + author = {P.W. Trinder and H-W. Loidl and R.F. Pointon}, + title = {Parallel and Distributed {H}askells}, + journal = {Journal of Functional Programming}, + volume = {12}, + number = {4\&5}, + pages = {469--510}, + year = {2002}, + url = {overcite.lcs.mit.edu/trinder02parallel.html}, +} + +@misc{ tis95elf, + author = {{Tool Interface Standard {(TIS)} Committee}}, + title = {Executable and Linking Format {(ELF)} Specification}, + month = may, + year = {1995}, +} + +@article{trinder98algorithm, + author = {Trinder, P. W. and Hammond, K. and Loidl, H.-W. and Peyton Jones, Simon L.}, + title = {Algorithm + strategy = parallelism}, + journal = {Journal of Functional Programming}, + volume = {8}, + number = {1}, + month = jan, + year = 1998, + pages = {23--60}, +} + +@inproceedings{ tsuchiya88landmark, + author = "Paul Francis Tsuchiya", + title = "The {Landmark} Hierarchy: A New Hierarchy for Routing + in Very Large Networks", + booktitle = "\bibbrev{SIGCOMM}{ACM SIGCOMM}", + pages = "35--42", + location = "Stanford, CA", + month = aug, + year = "1988", +} + +@inproceedings{ tzicker99integrating, + author = {{Tzi-cker} Chiueh and + Ganesh Venkitachalam and + Prashant Pradhan}, + title = {Integrating segmentation and paging protection for safe, + efficient and transparent software extensions}, + booktitle = "\bibconf[17th]{SOSP}{ACM Symposium + on Operating System Principles}", + month = dec, + year = {1999}, + pages = {140--153}, + ee = {http://www.acm.org/pubs/citations/proceedings/sigops/319151/p140-chiueh/}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +%U + +@misc{ upnp01igd, + author = "{UPnP Forum}", + title = "Internet Gateway Device {(IGD)} Standardized + Device Control Protocol", + month = nov, + year = "2001", + note = "\url{http://www.upnp.org/}", +} + +%V + +@inproceedings{van04chain, + title={Chain Replication for Supporting High Throughput and Availability.}, + author={Van Renesse, Robbert and Schneider, Fred B}, + booktitle={OSDI}, + volume={4}, + pages={91--104}, + year={2004} +} + +@article{valiant79thecomplexity, + author = {Leslie G. Valiant}, + title = {The Complexity of Enumeration and Reliability Problems}, + journal = {SIAM J. Comput.}, + volume = {8}, + number = {3}, + year = {1979}, + pages = {410-421} +} + +@article{ vamosi06security, + author = {Robert Vamosi}, + title = {Security Watch: Don't get burned by viruses and hackers}, + publisher = {CNET Reviews}, + month = sep, + day = 15, + year = 2006, + url = {http://reviews.cnet.com/4520-3513_7-6638552-1.html}, +} + +@inproceedings{ vangala03tcp, + author = {Sarma Vangala and Miguel A. Labrador}, + title = {The {TCP SACK}-Aware Snoop Protocol for {TCP} + over Wireless Networks}, + booktitle = {Vehicular Technology Conference}, + month = oct, + day = 9, + year = 2003, + location = {Orlando, FL}, +} + +@inproceedings{ vaziri06associating, + author = {Mandana Vaziri and Frank Tip and Julian Dolby}, + title = {Associating Synchronization Constraints with + Data in an Object-Oriented Language}, + booktitle = {\bibconf[33rd]{POPL}{ACM Symposium on + Principles of Programming Languages}}, + month = jan, + year = 2006, + location = {Charleston, SC}, + pages = {334-345}, +} + +@inproceedings{ vechev10automatic, + author = {Martin Vechev and Eran Yahav and Raghavan Raman + and Vivek Sarkar}, + title = {Automatic Verification of Determinism + for Structured Parallel Programs}, + booktitle = {\bibconf{SAS}{Static Analysis Symposium}}, + month = sep, + year = 2010, +} + +@article{veeraraghavan11doubleplay, + author = {Veeraraghavan, Kaushik and Lee, Dongyoon and Wester, Benjamin + and Ouyang, Jessica and Chen, Peter M. and Flinn, Jason and + Narayanasamy, Satish}, + title = {Double{P}lay: parallelizing sequential logging and replay}, + journal = {ACM SIGPLAN Notices}, + volume = {47}, + number = {4}, + month = mar, + year = {2011}, + pages = {15--26}, +} + +@misc{ versit96vcard, + author = {{versit} Consortium}, + title = {{vCard}: The Electronic Business Card}, + month = sep, + year = 1996, +} + + +@book{ vesely81fault, + author = {William E. Vesely and Francine F. Goldberg + and Norman H. Roberts and David F. Haasl}, + title = {Fault Tree Handbook}, + publisher = {U.S. Nuclear Regulatory Commission}, + month = jan, + year = 1981, +} + + +@inproceedings{ vuillaume06flexible, + author = {Camille Vuillaume and Katsuyuki Okeya}, + title = {Flexible Exponentiation with Resistance + to Side Channel Attacks}, + booktitle = {\bibconf[4th]{ACNS}{Conference on Applied Cryptography + and Network Security}}, + month = jun, + year = 2006, + pages = {268-283}, +} + +%W + +@book{ wadge85lucid, + author = {William W. Wadge and Edward A. Ashcroft}, + title = {Lucid, the Dataflow Programming Language}, + publisher = {Academic Press}, + location = {New York, NY}, + year = 1985, +} + +@article{ wadlow81xerox, + author = {Thomas A Wadlow}, + title = {The {Xerox} {Alto} Computer}, + journal = {Byte}, + year = {1981}, + month = sep, + volume = {6}, + number = {9}, + pages = {58--68}, +} + +@article{ wahbe93efficient, + author = "Robert Wahbe and Steven Lucco and Thomas E. Anderson + and Susan L. Graham", + title = "Efficient Software-Based Fault Isolation", + journal = "ACM SIGOPS Operating Systems Review", + volume = "27", + number = "5", + month = dec, + pages = "203--216", + year = "1993", + url = "citeseer.ist.psu.edu/wahbe93efficient.html" +} + +@inproceedings{ waldspurger94lottery, + author = {Carl A. Waldspurger and William E. Weihl}, + title = {Lottery Scheduling: Flexible Proportional-Share + Resource Management}, + booktitle = {\bibconf[1st]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = nov, + year = 1994, + location = {Monterey, CA}, +} + +@inproceedings{ walfish04middleboxes, + author = {Michael Walfish and Jeremy Stribling and Maxwell Krohn and + Hari Balakrishnan and Robert Morris and Scott Shenker}, + title = {Middleboxes No Longer Considered Harmful}, + booktitle = {USENIX Symposium on + Operating Systems Design and Implementation}, + location = {San Francisco, CA}, + month = dec, + year = {2004}, +} + +@inproceedings{ walfish04untangling, + author = "Michael Walfish and Hari Balakrishnan and Scott Shenker", + title = "Untangling the {Web} from {DNS}", + booktitle = "\bibconf[1st]{NSDI}{USENIX/ACM Symposium + on Networked Systems Design and Implementation}", + location = "San Francisco, CA", + month = mar, + year = "2004", +} + +@article{ walker83locus, + author = {Bruce Walker and Gerald Popek and Robert English + and Charles Kline and Greg Thiel}, + title = {The {LOCUS} Distributed Operating System}, + journal = {\bibbrev{OSR}{SIGOPS Operating Systems Review}}, + volume = 17, + number = 5, + month = oct, + year = 1983, +} + +@article{walker08benchmarking, + title ={Benchmarking Amazon {EC2} for High-Performance Scientific Computing}, + author ={Walker, Edward}, + journal ={{USENIX Login}}, + volume ={33}, + number ={5}, + pages ={18--23}, + year ={2008} +} + + +@article{ wallace91jpeg, + author = {G.K. Wallace}, + title = {The {JPEG} still picture compression standard}, + journal = {Communications of the ACM}, + volume = {34}, + number = {4}, + pages = {30-44}, + month = apr, + year = 1991, +} + +@inproceedings{walsh06experience, + author = {Kevin Walsh and Emin G{\"u}n Sirer}, + title = {Experience with an object reputation system for {P}eer-to-{P}eer + filesharing}, + booktitle = {\bibconf[3rd]{NSDI}{USENIX Symposium on Networked Systems Design and Implementation}}, + location = {San Jose, CA}, + month = may, + year = 2006 +} + +@article{ wang05tcp, + author = {Ren Wang and others}, + title = {{TCP} With Sender-Side Intelligence to Handle + Dynamic, Large, Leaky Pipes}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 23, + number = 2, + month = feb, + year = 2005, +} + +@inproceedings{ wang06covert, + author = {Zhenghong Wang and Ruby B. Lee}, + title = {Covert and Side Channels due to Processor Architecture}, + booktitle = {22nd \bibconf{ACSAC}{Annual Computer Security + Applications Conference}}, + month = dec, + year = 2006, + location = {Miami Beach, FL}, +} + +@inproceedings{ watson07exploiting, + author = {Robert N. M. Watson}, + title = {Exploiting Concurrency Vulnerabilities + in System Call Wrappers}, + booktitle = {1st USENIX Workshop on Offensive Technologies}, + month = aug, + year = 2007, +} + +@article{ wan05psfq, + author = {Chieh-Yih Wan and Andrew T. Campbell and + Lakshman Krishnamurthy}, + title = {{PSFQ}: A Reliable Transport Protocol for Sensor Networks}, + journal = {\bibbrev{IEEE JSAC}{IEEE Journal on Selected Areas in Communication}}, + volume = 23, + number = 4, + month = apr, + year = 2005, +} + +@inproceedings{wei05new, + author = {Wei Wei and Bart Selman}, + title = {A new approach to model counting}, + booktitle = {\bibconf[8th]{SAT}{Internal Conference on Theory and Applications of Satisfiability Testing}}, + month = jun, + year = 2005, + location = {St. Andrews, Scotland}, +} + +@inproceedings{ wei05tocttou, + author = {Jinpeng Wei and Calton Pu}, + title = {{TOCTTOU} Vulnerabilities in {UNIX}-Style File Systems: + An Anatomical Study}, + booktitle = {\bibconf[4th]{USENIX FAST}{USENIX Conference on + File and Storage Technologies}}, + month = dec, + year = 2005, + location = {San Francisco, CA}, +} + +@article{ wei06fast, + author = {David X. Wei and others}, + title = {{FAST TCP}: Motivation, Architecture, Algorithms, Performance}, + journal = {Transactions on Networking}, + volume = 14, + number = 6, + month = dec, + year = 2006, +} + +@techreport{ weinberger00loco-i, + author = {Marcelo J. Weinberger and Gadiel Seroussi and + Guillermo Sapiro}, + title = {The {LOCO-I} Lossless Image Compression Algorithm: + Principles and Standardization into {JPEG-LS}}, + institution = {Hewlett-Packard Laboratories}, + number = {HPL-98-193R1}, + month = nov, + year = 1998, +} + +@article{ weiser99mobile, + author = {Mark Weiser}, + title = {The computer for the 21st century}, + journal = {Mobile Computing and Communications Review}, + volume = 3, + number = 3, + month = jul, + year = 1999, +} + +@article{ weitzner08information, + author = {Daniel J. Weitzner and Hal Abelson and Tim Berners-Lee and + Joan Feigenbaum and James Hendler and Gerald Sussman}, + title = {Information Accountability}, + journal = {Communications of the ACM}, + volume = 51, + year = 2008, + pages = {82-88}, +} + + + +@article{whiting94dataflow, + author={Whiting, P.G. and Pascoe, R.S.V.}, + journal={Annals of the History of Computing, IEEE}, + title={A history of data-flow languages}, + year={1994}, + month={winter }, + volume={16}, + number={4}, + pages={38 -59}, +} + +@article{ widmer01tcp, + author = {Joerg Widmer and Robert Denda and Martin Mauve}, + title = {A Survey on {TCP}-Friendly Congestion Control}, + journal = {IEEE Network}, + month = may, + year = 2001, + pages = {28-37}, +} + +@inproceedings{wieder12orchestrating, + author = {Alexander Wieder and + Pramod Bhatotia and + Ansley Post and + Rodrigo Rodrigues}, + title = {Orchestrating the Deployment of Computations in the Cloud + with Conductor}, + booktitle = {\bibconf[9th]{NSDI}{USENIX Symposium on Networked Systems + Design and Implementation}}, + location = {San Jose, CA}, + month = Apr, + year = 2012 +} + + +@article{ williams83lisa, + author = {Geoff Williams}, + title = {The {Lisa} Computer System}, + journal = {Byte}, + volume = {8}, + number = {2}, + pages = {33--55}, + month = feb, + year = {1983}, +} + +@article{williams84apple, + author = "Geoff Williams", + title = "The {Apple Macintosh} Computer", + journal = "Byte", + volume = "9", + number = "2", + pages = "30--54", + month = feb, + year = "1984", + CODEN = "BYTEDJ", + ISSN = "0360-5280", + keywords = "olit-appl macintosh", +} + +@inproceedings{ williams12xen, + author = {Dan Williams and Hani Jamjoom and Hakim Weatherspoon}, + title = {The {Xen-Blanket}: Virtualize Once, Run Everywhere}, + booktitle = {\bibconf{EuroSys}{European Conference + on Computer Systems}}, + month = apr, + year = 2012, + location = {Bern, Switzerland}, +} + +@techreport{winick02inet, + author = "Jared Winick and Sugih Jamin", + title = "{Inet-3.0: {Internet} Topology Generator}", + institution = "University of Michigan", + number = "CSE-TR-456-02", + year = "2002" +} + +@inproceedings{ winterbottom97design, + author = "Phil Winterbottom and Rob Pike", + title = "The Design of the {Inferno} Virtual Machine", + booktitle = "Hot Chips 9 Symposium", + year = "1997", + month = aug, + url = "citeseer.ist.psu.edu/winterbottom97design.html" +} + +@inproceedings{ witchel96embra, + author = "Emmett Witchel and Mendel Rosenblum", + title = "Embra: Fast and Flexible Machine Simulation", + booktitle = "Measurement and Modeling of Computer Systems", + pages = "68-79", + year = "1996", + url = "citeseer.ist.psu.edu/witchel96embra.html" +} + +@inproceedings{ wittie86bugnet, + author = {Larry Wittie}, + title = {The {Bugnet} Distributed Debugging System}, + booktitle = {\bibbrev{Making Distributed Systems Work}{ + Second European SIGOPS Workshop on + ``Making Distributed Systems Work''}}, + month = sep, + year = 1986, + location = {Amsterdam, Netherlands}, +} + +@book{witten05data, + title={Data Mining: Practical machine learning tools and techniques}, + author={Witten, Ian H and Frank, Eibe}, + publisher = {}, + year={2005}, +} + +@inproceedings{ wong99improving, + author = {Jackson W.K. Wong and Victor C.M. Leung}, + title = {Improving End-to-End Performance of {TCP} Using + Link-Layer Retransmissions over Mobile Internetworks}, + booktitle = {\bibconf{ICC}{IEEE International Conference + on Communications}}, + month = jun, + year = 1999, + location = {Vancouver, BC, Canada}, +} + +@inproceedings{ woo95splash2, + author = {Steven Cameron Woo and Moriyoshi Ohara and Evan Torrie + and Jaswinder Pal Singh and Anoop Gupta}, + title = {The {SPLASH-2} Programs: Characterization and + Methodological Considerations}, + booktitle = {\bibconf[22nd]{ISCA}{International Symposium on + Computer Architecture}}, + month = jun, + year = 1995, + pages = {24-36}, +} + +@inproceedings{ wray91analysis, + author = {John C. Wray}, + title = {An Analysis of Covert Timing Channels}, + booktitle = {{IEEE} Symposium on Security and Privacy}, + month = may, + year = 1991, + location = {Oakland, CA}, +} + +@inproceedings{ wu01direct, + author = {Haitao Wu and Keping Long and Shiduan Cheng and Jian Ma}, + title = {Direct Congestion Control Scheme{(DCCS)} for + Differentiated Services {IP} Networks}, + booktitle = {\bibconf{GLOBECOM}{IEEE Global Telecommunications + Conference}}, + month = dec, + year = 2001, + location = {San Antonio, TX}, +} + +@inproceedings{ wuu84efficient, + author = {Gene T.J. Wuu and Arthur J. Bernstein}, + title = {Efficient Solutions to the Replicated Log and Dictionary Problems}, + booktitle = {Principles of Distributed Computing}, + month = aug, + year = 1984, + pages = {232-242}, +} + +%X + +@inproceedings{ xia03analysis, + author = {Ye Xia and David Tse}, + title = {Analysis on Packet Resequencing + for Reliable Network Protocols}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = apr, + year = 2003, + location = {San Francisco, CA}, +} + +@inproceedings{ xiong10adhoc, + author = {WeiWei Xiong and Soyeon Park and Jiaqi Zhang and + Yuanyuan Zhou and Zhiqiang Ma}, + title = {Ad Hoc Synchronization Considered Harmful}, + booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + location = {Vancouver, BC, Canada}, + month = oct, + year = 2010, +} +@misc{ xiph04vorbis, + author = {{Xiph.org Foundation}}, + title = {{Vorbis I} Specification}, + note = {\\ {\small\tt http://www.xiph.org/ogg/vorbis/}} +} + +@inproceedings{xu03replay, + author = {Xu, Min and Bodik, Rastislav and Hill, Mark D.}, + title = {A "flight data recorder" for enabling full-system multiprocessor deterministic replay}, + booktitle = {\bibconf[30th]{ISCA}{annual international symposium + on Computer architecture}}, + month = jun, + year = 2003, + pages = {122--135}, + location = {San Diego, California}, +} + +@inproceedings{ xu04binary, + author = {Lisong Xu and Khaled Harfoush and Injong Rhee}, + title = {Binary Increase Congestion Control {(BIC)} + for Fast Long-Distance Networks}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + month = mar, + year = 2004, + location = {Hong Kong}, +} + +@article{ xu07extending, + author = {Lisong Xu}, + title = {Extending equation-based congestion control to + high-speed and long-distance networks}, + journal = {Computer Networks}, + volume = 51, + number = 7, + month = may, + year = 2007, + pages = {1847-1859}, +} + + +@inproceedings{xu09detecting, + author = {Wei Xu and Ling Huang and Armando Fox + and David Patterson and Michael I. Jordan}, + title = {Detecting large-scale system problems by mining console + logs}, + booktitle = {\bibconf[22nd]{SOSP}{ACM Symposium on Operating Systems Principles}}, + location = {Big Sky, MT}, + month = oct, + year = 2009 +} + +%Y + +@article{yang12data, + author = {Kan Yang and + Xiaohua Jia}, + title = {Data storage auditing service in cloud + computing: {C}hallenges, + methods and opportunities}, + journal = {World Wide Web}, + volume = {15}, + number = {4}, + year = {2012}, + pages = {409-428} +} + + +@inproceedings{ yavatkar94improving, + author = {Raj Yavatkar and Namrata Bhagawat}, + title = {Improving End-to-End Performance of {TCP} + over Mobile Internetworks}, + booktitle = {Workshop on Mobile Computing Systems and Applications}, + month = dec, + year = 1994, + location = {Santa Cruz, CA}, +} + +@inproceedings{ ye06monitoring, + author = {Bin Ye and Anura P. Jayasumana and Nischal M. Piratla}, + title = {On Monitoring of End-to-End Packet Reordering + over the {Internet}}, + booktitle = {\bibconf{INCS}{International Conference on + Networking and Services}}, + month = jul, + year = 2006, +} + +@inproceedings{ yee09native, + author = {Bennet Yee and David Sehr and Gregory Dardyk and + J. Bradley Chen and Robert Muth and Tavis Ormandy and + Shiki Okasaka and Neha Narula and Nicholas Fullagar}, + title = {Native Client: A Sandbox for Portable, Untrusted + x86 Native Code}, + booktitle = {{IEEE} Symposium on Security and Privacy}, + month = may, + year = 2009, + location = {Oakland, CA}, +} + +@inproceedings{ yi04hopbyhop, + author = {Yung Yi and Sanjay Shakkottai}, + title = {Hop-by-hop Congestion Control over a + Wireless Multi-hop Network}, + booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}}, + location = {Hong Kong}, + month = mar, + year = 2004, +} + +@article{ yi07hopbyhop, + author = {Yung Yi and Sanjay Shakkottai}, + title = {Hop-by-hop Congestion Control over a + Wireless Multi-hop Network}, + journal = {IEEE Transactions on Networking}, + volume = 15, + number = 1, + month = feb, + year = 2007, + pages = {133-144}, +} + +@inproceedings{ yip06pastwatch, + author = {Alexander Yip and Benjie Chen and Robert Morris}, + title = {Pastwatch: a Distributed Version Control System}, + booktitle = {\bibconf[3rd]{NSDI}{Symposium + on Networked Systems Design and Implementation}}, + month = may, + year = 2006, + location = {San Jose, CA}, +} + +@misc{ ylonen02ssh, + author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and S. Lehtinen", + title = "{SSH} Protocol Architecture", + month = sep, + year = "2002", + note = "Internet-Draft (Work in Progress)", +} + +@inproceedings{young87mach, + author = {Michael Young and + Avadis Tevanian and + Richard F. Rashid and + David B. Golub and + Jeffrey L. Eppinger and + Jonathan Chew and + William J. Bolosky and + David L. Black and + Robert V. Baron}, + title = {\href{https://doi.org/10.1145/41457.37507}{The Duality of Memory and Communication in the Implementation of a + Multiprocessor Operating System}}, + booktitle = {Proceedings of the Eleventh {ACM} Symposium on Operating System Principles, + {SOSP} 1987, Stouffer Austin Hotel, Austin, Texas, USA, November 8-11, + 1987}, + pages = {63--76}, + year = {1987}, + url = {https://doi.org/10.1145/41457.37507}, +} + +@inproceedings{ yu06sybilguard, + author = {Haifeng Yu and Michael Kaminsky and Phillip B. Gibbons + and Abraham Flaxman}, + title = {{SybilGuard}: Defending Against Sybil Attacks + via Social Networks}, + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + location = {Pisa, Italy}, + month = sep, + year = 2006 +} + + + +%Z + +@inproceedings{ zandy02reliable, + author = "Victor C. Zandy and Barton P. Miller", + title = "Reliable Network Connections", + booktitle = "\bibconf[8th]{MOBICOM}{ACM International Conference on + Mobile Computing and Networking}", + location = "Atlanta, GA", + month = sep, + year = "2002", + pages = "95--106", +} + +@inproceedings{ zeldovich06making, + author = {Nickolai Zeldovich and Silas Boyd-Wickizer and Eddie Kohler + and David Mazi\`eres}, + title = {Making Information Flow Explicit in {HiStar}}, + booktitle = {\bibconf[7th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + month = nov, + year = 2006, + location = {Seattle, WA}, +} + +@inproceedings{zhai13anuntold, + author = {Ennan Zhai and + Ruichuan Chen and + David Isaac Wolinsky and + Bryan Ford}, + title = {An Untold Story of Redundant Clouds: + {M}aking Your Service Deployment Truly Reliable}, + booktitle = {\bibconf[9th]{HotDep}{Workshop on Hot Topics in Dependable + Systems}}, + location = {Nemacolin Woodlands Resort, PA}, + month = nov, + year = 2013 +} + + +@techreport{zhai13auditing, + author = {Ennan Zhai and + David Isaac Wolinsky and + Hongda Xiao and + Hongqiang Liu and + Xueyuan Su and + Bryan Ford}, + title = {{Auditing the Structural Reliability of the Clouds}}, + number = {{YALEU/DCS/TR-1479}}, + institution = {{Department of Computer Science, Yale University}}, + year = {2013}, + note = {Available at \url{http://www.cs.yale.edu/homes/zhai-ennan/sra.pdf}} +} + +@inproceedings{zhai14heading, + author = {Ennan Zhai and + Ruichuan Chen and + David Isaac Wolinsky and + Bryan Ford}, + title = {Heading off correlated failures through {I}ndependence-as-a-{s}ervice}, + booktitle = {\bibconf[11th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}}, + location = {Broomfield, CO}, + month = oct, + year = 2014 +} + + +@inproceedings{ zhang91comparison, + author = "Hui Zhang and Srinivasan Keshav", + title = "Comparison of Rate-Based Service Disciplines", + booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}}, + pages = "113-121", + year = "1991", + url = "citeseer.ist.psu.edu/zhang91comparison.html" +} + +@inproceedings{ zhang00speeding, + author = {Yin Zhang and Lili Qiu and Srinivasan Keshav}, + title = {Speeding Up Short Data Transfers: Theory, Architectural + Support and Simulation Results}, + booktitle = {\bibconf[10th]{NOSSDAV}{Network and Operating System + Support for Digital Audio and Video}}, + month = jun, + year = 2000 +} + +@techreport{ zhang02improving, + author = {Ming Zhang and Brad Karp and Sally Floyd and Larry Peterson}, + title = {Improving {TCP}'s Performance under Reordering with {DSACK}}, + institution = {International Computer Science Institute}, + location = {Berkeley, CA}, + number = "TR-02-006", + year = "2002", + month = jul, +} + +@inproceedings{ zhang03rrtcp, + author = {Ming Zhang and Brad Karp and Sally Floyd and Larry Peterson}, + title = {{RR-TCP}: a reordering-robust {TCP} with {DSACK}}, + booktitle = {\bibconf[11th]{ICNP}{International Conference on + Network Protocols}}, + month = nov, + year = 2003, + location = {Atlanta, GA}, +} + +@inproceedings{ zhang04transport, + author = {Ming Zhang and Junwen Lai and Arvind Krishnamurthy + and Larry Peterson and Randolph Wang}, + title = {A transport layer approach for improving end-to-end + performance and robustness using redundant paths}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2004, +} + +@article{ zhang06reasons, + author = {Zongsheng Zhang and Go Hasegawa and Masayuki Murata}, + title = {Reasons not to Parallelize {TCP} Connections + for Long Fat Networks}, + journal = {Simulation Series}, + volume = 38, + number = 3, + pages = {354-362}, + year = 2006, +} + +@inproceedings{ zhang11cloudvisor, + author = {Fengzhe Zhang and Jin Chen and Haibo Chen and Binyu Zang}, + title = {{CloudVisor}: Retrofitting Protection of Virtual Machines + in Multi-tenant Cloud with Nested Virtualization}, + booktitle = {\bibconf[23rd]{SOSP}{{ACM} Symposium on + Operating Systems Principles (SOSP)}}, + month = oct, + year = 2011, + location = {Cascais, Portugal}, +} + +@inproceedings{ zhang11virtual, + author = {Yu Zhang and Bryan Ford}, + title = {A Virtual Memory Foundation for + Scalable Deterministic Parallelism}, + booktitle = {\bibconf[2nd]{APSys}{ACM SIGOPS Asia-Pacific + Workshop on Systems}}, + month = jul, + year = 2011, + location = {Shanghai, China}, +} + +@inproceedings{ zhang13lazy, + author = {Yu Zhang and Bryan Ford}, + title = {{Lazy Tree Mapping}: Generalizing and Scaling + Deterministic Parallelism}, + booktitle = {\bibconf[4th]{APSys}{ACM SIGOPS Asia-Pacific + Workshop on Systems}}, + month = jul, + year = 2013, + location = {Singapore, Singapore}, +} + +@inproceedings{ zhang11homealone, + author={Zhang, Yinqian and Juels, Ari and Oprea, Alina and Reiter, Michael K}, + booktitle={\bibconf{SP}{IEEE Security and Privacy}}, + title={{HomeAlone}: Co-residency Detection in the Cloud via Side-Channel Analysis}, + pages={313--328}, + year={2011}, +} + +@inproceedings{ zhang12cloud, + author = {Zhang, Yinqian and Juels, Ari and Reiter, Michael K. and Ristenpart, Thomas}, + booktitle = {\bibconf{CCS}{ACM Conference on Computer and Communications Security}}, + title = {Cross-{VM} side channels and their use to extract private keys.}, + year = 2012 +} + +@article{ zhao04tapestry, + author = {Ben Y. Zhao and Ling Huang and Jeremy Stribling + and Sean C. Rhea and Anthony D. Joseph + and John D. Kubiatowicz}, + title = {\href{https://ieeexplore.ieee.org/document/1258114}{Tapestry: A Resilient Global-scale Overlay for + Service Deployment}}, + journal = {IEEE Journal on Selected Areas in Communications}, + volume = 22, + number = 1, + month = jan, + year = 2004, + pages = {41-53}, +} + +@inproceedings{zhao14iprof, + author = {Xu Zhao and + Yongle Zhang and + David Lion and + Muhammad Faizan Ullah and + Yu Luo and + Ding Yuan and + Michael Stumm}, + title = {lprof: {A} Non-intrusive Request Flow Profiler for + Distributed Systems}, + booktitle = {\bibconf[11th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}}, + location = {Broomfield, CO}, + month = oct, + year = 2014 +} + +@inproceedings{zheng10ftcloud, + author = {Zibin Zheng and + Tom Chao Zhou and + Michael R. Lyu and + Irwin King}, + title = {{FTCloud}: {A} Component Ranking Framework for Fault-Tolerant Cloud Applications}, + booktitle = {ISSRE}, + year = {2010} +} + +@inproceedings{zhong08replication, + author = {Ming Zhong and + Kai Shen and + Joel I. Seiferas}, + title = {Replication Degree Customization for High Availability}, + booktitle = {\bibconf{EuroSys}{ACM SIGOPS/EuroSys European Conference + on Computer Systems}}, + location = {Glasgow, Scotland}, + month = mar, + year = 2008 +} + + +@article{ zimmermann80osi, + author = {Hubert Zimmermann}, + title = {{OSI} Reference Model---The {ISO} Model of Architecture + for Open Systems Interconnection}, + journal = {IEEE Transactions on Communications}, + volume = 28, + number = 4, + month = apr, + year = 1980, + pages = {425-432}, +} + + +%%%%% Misc + +@misc{ apple-mobileme, + author = {{Apple Computer, Inc.}}, + title = {{MobileMe}}, + note = {\url{http://www.apple.com/mobileme/}}, +} + +@misc{ amazon-ec2, + author = {{Amazon Web Services}}, + title = {Amazon Elastic Compute Cloud ({Amazon EC2})}, + note = {\url{http://aws.amazon.com/ec2/}}, +} + +@misc{ filevault, + author = {{Apple Computer, Inc.}}, + title = {{FileVault}}, + note = {\url{http://www.apple.com/macosx/features/filevault/}}, +} + +@misc{ bamboo, + key = {Bamboo}, + title = {The Bamboo Distributed Hash Table}, + note = {\url{http://bamboo-dht.org/}}, +} + +@misc{ bbftp, + author = {Tim Adye and others}, + title = {{bbFTP}}, + note = {\url{http://doc.in2p3.fr/bbftp/index.html}}, +} + +@misc{ bonjour, + author = {{Apple Computer, Inc.}}, + title = {Bonjour}, + note = {\url{http://developer.apple.com/networking/bonjour/}}, +} + +@misc{ cisco04rate, + author = {{Cisco, Inc.}}, + title = {Rate Based Satellite Control Protocol}, + year = 2004, + url = {http://www.cisco.com/en/US/docs/ios/12_3t/12_3t7/feature/guide/gt_rbscp.html}, +} + +@misc{ csharp-spec, + author = "{Microsoft Corporation}", + title = "C\# Language Specification, Version 3.0", + year = 2007, +} + +@misc{ dimes, + author = "{The DIMES project}", + note = "\texttt{http://www.netdimes.org/}" +} + +@misc{ firefox-pipelining, + author = {{Mozilla.org}}, + title = {Firefox Tips \& Tricks: Pipelining}, + note = {\url{http://www.mozilla.org/support/firefox/tips#oth_pipelining}} +} + +@misc{ facebook, + title = "Facebook", + key = "Facebook", + note = "{\tt http://www.facebook.com/}", +} + +@misc{ freenet, + note = "http://freenetproject.org/", +} + +@misc{ freepastry14, + title = {Freepastry release notes}, + note = {http://freepastry.rice.edu/FreePastry/README-1.4.1.html}, + month = may, + year = 2005, +} + +@misc{ friendster, + title = "Friendster", + key = "Friendster", + note = "{\tt http://www.friendster.com/}", +} + +@misc{ guha-stunt, + author = {Saikat Guha and Paul Francis}, + title = {Simple Traversal of {UDP} Through {NATs} and {TCP} too + {(STUNT)}}, + note = {{\tt http://nutss.gforge.cis.cornell.edu/}} +} + +@misc{ gurbani06handling, + author = {V. Gurbani and S. Lawrence}, + title = {Handling Large User Datagram Protocol {(UDP)} Responses + in the Session Initiation Protocol {(SIP)}}, + month = oct, + year = 2006, + note = "Internet-Draft (Work in Progress)", +} + +@misc{ ietf-behave, + author = {{Internet Engineering Task Force (IETF)}}, + title = {Behavior Engineering for Hindrance Avoidance (behave)}, + note = {\url{http://www.ietf.org/html.charters/behave-charter.html}}, +} + +@misc{ ita, + title = {The {Internet} Traffic Archive}, + key = {Internet Traffic Archive}, + note = {\url{http://ita.ee.lbl.gov/}}, +} + +@misc{ info-zip, + title = {{Info-ZIP}}, + key = {{Info-ZIP}}, + note = {{\tt http://www.info-zip.org/}}, +} + +@misc{ iso00jpeg, + author = {{International Standards Organization}}, + title = {{JPEG 2000} image coding system}, + year = 2000, + note = {ISO/IEC 15444-1}, +} + +@misc{ kafka, + key = {kafka}, + title = {kafka - A Distributed Streaming Platform}, + note = {\url{http://kafka.apache.org.}}, +} + +@misc{ + kegel99nat, + author = "Dan Kegel", + title = "{NAT} and Peer-to-Peer Networking", + month = jul, + year = "1999", + note = "\url{http://www.alumni.caltech.edu/~dank/peer-nat.html}" +} + +@article{ kudalur05ie7, + author = {Venkat Kudallur and others}, + title = {{IE7} Networking improvements + in content caching and decompression}, + journal = {IEBlog}, + month = oct, + year = 2005, + url = "{\tt http://blogs.msdn.com/ie/archive/2005/10/31/487509.aspx}" +} + +@misc{ mojonation, + note = "http://mojonation.net/", +} + +@misc{ mpi09, + author = {{Message Passing Interface Forum}}, + title = {{MPI}: A Message-Passing Interface Standard Version 2.2}, + month = sep, + year = 2009, +} + +@misc{ mpich2, + author = {{Mathematics and Computer Science Division Argonne National Laboratory}}, + title = {{MPICH2-1.4}: a high-performance and widely portable implementation of the {MPI} standard ( both MPI-1 and MPI-2 )}, + month = Jun, + year = 2011, + url = {\url{http://www.mcs.anl.gov/research/projects/mpich2/}} +} + + +@misc{ ms-livemesh, + author = {{Microsoft Corporation}}, + title = {{Live Mesh} tech preview}, + note = {\url{https://www.mesh.com/}}, +} + +@misc{ msjpegbug, + author = {{Microsoft Corporation}}, + title = "Buffer Overrun in {JPEG} Processing {(GDI+)} + Could Allow Code Execution (833987)", + note = "Microsoft Security Bulletin MS04-028", + year = 2004, + month = sep, + date = 14, +} + +@misc{ natcheck, + key = "NAT Check", + title = "{NAT} Check", + note = "{\tt http://midcom-p2p.sourceforge.net/}", +} + +@misc{ nats, + key = {NATS}, + title = {NATS - The Cloud Native Messaging System}, + note = {\url{http://nats.io}}, +} + +@misc{ openarena, + title = {{OpenArena} Project}, + note = {\url{http://openarena.ws/}} +} + +@misc{ openmp08, + author = {{OpenMP Architecture Review Board}}, + title = {{OpenMP} Application Program Interface Version 3.0}, + month = may, + year = 2008, + url = {\url{http://www.openmp.org/mp-documents/spec30.pdf}} +} + +@misc{ openmp05, + author = {OpenMP Architecture Review Board}, + title = {{OpenMP} Application Program Interface Version 2.5}, + month = may, + year = 2005, + note = {\url{http://www.openmp.org/mp-documents/spec25.pdf}} +} + +@misc{ openssl, + author = {OpenSSL Software Foundation}, + title = {\href{https://www.openssl.org/}{{OpenSSL} Project}}, + key = {OpenSSL}, +} + note = {\url{http://www.openssl.org/}}, + +@misc{ openssh, + title = "{OpenSSH} Project", + key = "OpenSSH", + note = "\url{http://www.openssh.org/}", +} + +@misc{ openvpn, + title = "{OpenVPN} Project", + key = "OpenVPN", + note = "\url{http://openvpn.net/}", +} + +@misc{ orkut, + title = "Orkut", + key = "Orkut", + note = "{\tt http://www.orkut.com/}", +} + +@misc{ pkzip, + title = {{PKZIP}}, + author = {{PKWARE Inc.}}, + note = {{\tt http://www.pkware.com/}}, +} + +@misc{ python, + key = {Python}, + title = {The {Python} Programming Language}, + note = {\url{http://www.python.org/}}, +} + +@misc{ rabbitmq, + key = {rabbitmq}, + title = {RabbitMQ - An Open Source Multi-Protocol Messaging Broker}, + note = {\url{https://www.rabbitmq.com/}}, +} + +@misc{ redis, + key = {Redis}, + title = {The Redis Pub Sub}, + note = {\url{http://redis.io/topics/pubsub}}, +} + +@misc{ trolltech-qt, + author = {Trolltech}, + title = {Qt Cross-Platform Application Framework}, + note = {\url{http://trolltech.com/products/qt/}} +} + +% obsoleted by rfc5533 +@misc{ shim6, + key = {Shim6}, + title = {Site Multihoming by {IPv6} Intermediation {(shim6)}}, + note = {\url{http://www.ietf.org/html.charters/shim6-charter.html}}, +} + +@misc{ skitter, + author = "CAIDA", + title = {Macroscopic Topology {AS} Adjacencies}, + note = "\url{http://www.caida.org/tools/measurement/ + skitter/as_adjacencies.xml}" +} + +@misc{ uberti04, + author = "Justin Uberti", + title = "E-mail on {IETF} {MIDCOM} mailing list", + year = "2004", + month = feb, + day = "13", + note = "Message-ID: \url{<402CEB11.1060906@aol.com>}" +} + +@misc{ zeroconf, + title = "Zero Configuration Networking {(Zeroconf)}", + key = "Zeroconf", + note = "{\tt http://www.zeroconf.org/}", +} + +@misc{ via04esther, + title = "Next Generation {C5J} {Esther} Processor Core + With Advanced Features For Securing {E}-Commerce Transactions", + author = "VIA Technologies", + year = "2004", + month = may, + note = "News Release", +} + +@misc{ via05padlock, + author = {{VIA Technologies, Inc.}}, + title = {{VIA} {PadLock} Security Engine}, + month = aug, + year = 2005, + note = {Technology Brief}, +} + +@misc{ openoffice-xml, + author = {{Sun Microsystems}}, + title = {{OpenOffice.org} {XML} File Format 1.0}, + month = dec, + year = 2002, + note = {{\small\tt xml.openoffice.org}} +} + +@misc{ openajax-two-http, + author = {OpenAjax Alliance}, + title = {The Two HTTP Connection Limit Issue}, + note = {\url{http://www.openajax.org/runtime/wiki/The_Two_HTTP_Connection_Limit_Issue}}, +} + +@misc{ mit-jos, + author = {Frans Kaashoek and others}, + title = {6.828: Operating System Engineering}, + note = {\url{http://pdos.csail.mit.edu/6.828/}}, +} + +@misc{ osi, + author = {{Open Source Initiative}}, + note = {\url{http://www.opensource.org/}}, +} + +@misc{ pios, + author = {Bryan Ford}, + title = {{PIOS}: Parallel Instructional Operating System}, + year = 2010, + note = {\url{http://zoo.cs.yale.edu/classes/cs422/pios}}, +} + +@misc{ git-scm, + key = {Git}, + title = {\href{http://git-scm.com/}{Git: The Fast Version Control System}}, +} + note = {\url{http://git-scm.com/}}, + +@misc{ mercurial-scm, + key = {Mercurial}, + title = {mercurial: distributed source control management}, + note = {\\ \url{http://mercurial.selenic.com/}}, +} + +@misc{ svn-scm, + key = {Subversion}, + title = {{Apache Subversion}}, + note = {\url{http://subversion.apache.org/}}, +} + +@misc{ skip-deltas, + key = {Skip-Deltas}, + title = {Skip-Deltas in Subversion}, + note = {\url{http://svn.apache.org/repos/asf/subversion/trunk/notes/skip-deltas}}, +} + +@misc{ xdelta, + key = {xdelta}, + title = {xdelta: open-source binary diff}, + note = {\url{http://xdelta.org}}, +} + +@article{anderson92scheduler, + author = {Thomas E. Anderson and Brian N. Bershad and Edward D. Lazowska and Henry M. Levy}, + title = {Scheduler Activations: Effective Kernel Support for the User-Level Management of Parallelism}, + journal = {ACM Transactions on Computer Systems}, + year = {1992}, + volume = {10}, + pages = {95--109} +} + +@article{ohearn07resources, +title = "Resources, concurrency, and local reasoning", +journal = "Theoretical Computer Science", +volume = "375", +number = "1-3", +pages = "271 - 307", +year = "2007", +note = "Festschrift for John C. Reynolds's 70th birthday", +issn = "0304-3975", +doi = "DOI: 10.1016/j.tcs.2006.12.035", +url = "http://www.sciencedirect.com/science/article/B6V1G-4MPKBVB-7/2/8ea8fc4dcd92e12ba34dbfacfd6a714a", +author = "Peter W. O'Hearn", +keywords = "Concurrency", +keywords = "Logics of programs", +keywords = "Separation logic" +} + + +@inproceedings{igarashi01piCalculus, + author = {Igarashi, Atsushi and Kobayashi, Naoki}, + title = {A generic type system for the Pi-calculus}, + booktitle = {POPL '01: Proceedings of the 28th ACM SIGPLAN-SIGACT symposium on Principles of programming languages}, + year = {2001}, + isbn = {1-58113-336-7}, + pages = {128--141}, + location = {London, United Kingdom}, + doi = {http://doi.acm.org/10.1145/360204.360215}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + + +@inproceedings{ isard07automatic, + author = "Isard, Michael and Birrell, Andrew", + title = "Automatic Mutual Exclusion", + booktitle = "\bibconf[11th]{HotOS}{Workshop on + Hot Topics in Operating Systems}", + month = may, + year = "2007", + url = "https://www.usenix.org/events/hotos07/tech/full_papers/isard/isard.pdf", + location = "San Diego, California, USA", + organization = "USENIX", + publisher = "USENIX", +} + +@inproceedings{joshi05detecting, + author = {Joshi, Ashlesha and King, Samuel T. and Dunlap, George W. + and Chen, Peter M.}, + title = {Detecting past and present intrusions through + vulnerability-specific predicates}, + booktitle = {\bibconf[20th]{SOSP}{{ACM} Symposium on + Operating Systems Principles (SOSP)}}, + year = {2005}, + isbn = {1-59593-079-5}, + pages = {91--104}, + location = {Brighton, UK}, + doi = {http://doi.acm.org/10.1145/1095810.1095820}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + + +@misc{leiserson97cilk, + author = {Charles E. Leiserson and Aske Plaat}, + title = {Programming Parallel Applications in {C}ilk}, + year = 1997, + url = {http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.31.3848&rep=rep1&type=pdf} +} + +@unpublished{leiserson98minicourse, + author = "Leiserson, Charles E. and Prokop, Harald", + title = "A Minicourse on Multithreaded Programming", + year = "1998", + note = "\url{http://supertech.csail.mit.edu/papers/minicourse.pdf}", +} + +@inproceedings{musuvathi08heisenbugs, + author = {Madanlal Musuvathi and Shaz Qadeer and Thomas Ball and + Gerard Basler}, + title = {Finding and Reproducing {Heisenbugs} in Concurrent Programs}, + booktitle = {\bibconf[8th]{OSDI}{USENIX Symposium on + Operating Systems Design and Implementation}}, + year = {2008}, + publisher = {USENIX Association}, + location = {San Diego, California, USA}, + address = {Berkeley, California, USA}, + pages = {267-280}, +} + +@inproceedings{choi98deterministic, + author = {Choi, Jong-Deok and Srinivasan, Harini}, + title = {Deterministic replay of {Java} multithreaded applications}, + booktitle = {SPDT '98: Proceedings of the SIGMETRICS symposium on Parallel and distributed tools}, + year = {1998}, + isbn = {1-58113-001-5}, + pages = {48--59}, + location = {Welches, Oregon, United States}, + doi = {http://doi.acm.org/10.1145/281035.281041}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@inproceedings{emrath88automatic, + author = {Emrath, Perry A. and Padua, David A.}, + title = {Automatic detection of nondeterminacy in parallel programs}, + booktitle = {PADD '88: Proceedings of the 1988 ACM SIGPLAN and SIGOPS workshop on Parallel and distributed debugging}, + year = {1988}, + isbn = {0-89791-296-9}, + pages = {89--99}, + location = {Madison, Wisconsin, United States}, + doi = {http://doi.acm.org/10.1145/68210.69224}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@inproceedings{ pool07relaxed, + author = "Pool, Jesse and Wong, Ian Sin Kwok and Lie, David", + title = "Relaxed Determinism: Making Redundant Execution on Multiprocessors Practical", + booktitle = "\bibconf[11th]{HotOS}{Workshop on + Hot Topics in Operating Systems}", + month = may, + year = "2007", + url = "http://www.usenix.org/events/hotos07/tech/full_papers/pool/pool.pdf", + location = "San Diego, California, USA", + organization = "USENIX", + publisher = "USENIX", +} + +@inproceedings{rajagopalan07thread, + author = "Rajagopalan, Mohan and Lewis, Brian T. and Anderson, Todd A.", + title = "Thread Scheduling for Multi-Core Platforms", + booktitle = "\bibconf[11th]{HotOS}{Workshop on + Hot Topics in Operating Systems}", + month = may, + year = "2007", + url = "http://www.usenix.org/events/hotos07/tech/full_papers/rajagopalan/rajagopalan.pdf", + location = "San Diego, California, USA", + organization = "USENIX", + publisher = "USENIX", +} + +@phdthesis{roe91parallel, + author = "Roe, Paul", + title = "Parallel Programming using Functional Languages", + school = "University of Glasgow", + year = "1991", + month = "feb", + note = "\url{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.46.7763&rep=rep1&type=pdf}", +} + +@article{stumm90algorithms, +title={Algorithms implementing distributed shared memory}, +author={Stumm, M. and Zhou, S.}, +journal={Computer}, +year={1990}, +month={May}, +volume={23}, +number={5}, +pages={54-64}, +keywords={local area networks, multiprogramming, network operating systemsapplication-level access behavior, distributed shared memory, environment, local area network, local virtual address spaces, memory access behavior, multiple hosts, performance, shared memory algorithms, virtual memory systems}, +doi={10.1109/2.53355}, +ISSN={0018-9162}, +} + +@inproceedings{aspnes00deterministic, + author = {Aspnes, James}, + title = {Fast deterministic consensus in a noisy environment}, + booktitle = {PODC '00: Proceedings of the nineteenth annual ACM symposium on Principles of distributed computing}, + year = {2000}, + isbn = {1-58113-183-6}, + pages = {299--308}, + location = {Portland, Oregon, United States}, + doi = {http://doi.acm.org/10.1145/343477.343631}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@inproceedings{barnes93method, + author = {Barnes, Greg}, + title = {A method for implementing lock-free shared-data structures}, + booktitle = {SPAA '93: Proceedings of the Fifth Annual ACM Symposium on + Parallel Algorithms and architectures}, + year = {1993}, + isbn = {0-89791-599-2}, + pages = {261--270}, + location = {Velen, Germany}, + doi = {http://doi.acm.org/10.1145/165231.165265}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{dolev08carSTM, + author = {Dolev, Shlomi and Hendler, Danny and Suissa, Adi}, + title = {{CAR-STM}: scheduling-based collision avoidance and + resolution for software transactional memory}, + booktitle = {PODC '08: Proceedings of the {T}wenty-{S}eventh ACM + {S}ymposium on {P}rinciples of {D}istributed {C}omputing}, + year = {2008}, + isbn = {978-1-59593-989-0}, + pages = {125--134}, + location = {Toronto, Canada}, + doi = {http://doi.acm.org/10.1145/1400751.1400769}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@TechReport{fraser04practical, + author = {Fraser, Keir}, + title = {{Practical lock-freedom}}, + year = 2004, + month = feb, + url = {http://www.cl.cam.ac.uk/techreports/UCAM-CL-TR-579.pdf}, + institution = {University of Cambridge, Computer Laboratory}, + issn = {1476-2986}, + number = {UCAM-CL-TR-579} +} + +@inproceedings{herlihy03stm, + author = {Herlihy, Maurice and Luchangco, Victor and Moir, Mark and Scherer,III, William N.}, + title = {Software transactional memory for dynamic-sized data structures}, + booktitle = {PODC '03: Proceedings of the twenty-second annual symposium on Principles of distributed computing}, + year = {2003}, + isbn = {1-58113-708-7}, + pages = {92--101}, + location = {Boston, Massachusetts}, + doi = {http://doi.acm.org/10.1145/872035.872048}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@article{herlihy91waitFree, + author = {Herlihy, Maurice}, + title = {Wait-free synchronization}, + journal = {ACM Trans. Program. Lang. Syst.}, + volume = {13}, + number = {1}, + year = {1991}, + issn = {0164-0925}, + pages = {124--149}, + doi = {http://doi.acm.org/10.1145/114005.102808}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@inproceedings{herlihy93tm, + author = {Herlihy, Maurice and Moss, J. Eliot B.}, + title = {Transactional memory: architectural support for lock-free data structures}, + booktitle = {ISCA '93: Proceedings of the 20th annual international symposium on Computer architecture}, + year = {1993}, + isbn = {0-8186-3810-9}, + pages = {289--300}, + location = {San Diego, California, United States}, + doi = {http://doi.acm.org/10.1145/165123.165164}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@inproceedings{herlihy93methodology, + author = {Herlihy, Maurice and Moss, J. Eliot B.}, + title = {Transactional memory: architectural support for lock-free data structures}, + booktitle = {ISCA '93: Proceedings of the 20th annual international symposium on Computer architecture}, + year = {1993}, + isbn = {0-8186-3810-9}, + pages = {289--300}, + location = {San Diego, California, United States}, + doi = {http://doi.acm.org/10.1145/165123.165164}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@article{hoare69axiomatic, + author = {Hoare, C. A. R.}, + title = {An axiomatic basis for computer programming}, + journal = {Communications of the ACM}, + volume = {12}, + number = {10}, + year = {1969}, + issn = {0001-0782}, + pages = {576--580}, + doi = {http://doi.acm.org/10.1145/363235.363259}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@book{ gosling05java, + author = {James Gosling and Bill Joy and Guy Steele and Gilad Bracha}, + title = {The {Java} Language Specification}, + edition = {third}, + publisher = {Addison-Wesley}, + year = {2005}, + month = may, +} + +@book{larus06tm, + author = {Larus, James R. and Rajwar, Ravi}, + title = {Transactional Memory}, + year = {2006}, + publisher = {Morgan \& Claypool}, + urlpage = {http://www.morganclaypool.com/doi/abs/10.2200/S00070ED1V01Y200611CAC002}, +} + + + +@inproceedings{seward05using, + author = {Seward, Julian and Nethercote, Nicholas}, + title = {Using Valgrind to detect undefined value errors with bit-precision}, + booktitle = {ATEC '05: Proceedings of the annual conference on USENIX Annual Technical Conference}, + year = {2005}, + pages = {2--2}, + location = {Anaheim, CA}, + publisher = {USENIX Association}, + address = {Berkeley, CA, USA}, + } + + +@article{nethercote03redux, +title = "Redux: A Dynamic Dataflow Tracer", +journal = "Electronic Notes in Theoretical Computer Science", +volume = "89", +number = "2", +pages = "149 - 170", +year = "2003", +note = "RV '2003, Run-time Verification (Satellite Workshop of CAV '03)", +issn = "1571-0661", +doi = "DOI: 10.1016/S1571-0661(04)81047-8", +url = "http://www.sciencedirect.com/science/article/B75H1-4DDWKTJ-PN/2/c52b80355187c6fb842f5b2f2ac32b8e", +author = "Nicholas Nethercote and Alan Mycroft" +} + +@inproceedings{reynolds02separation, +title={Separation logic: a logic for shared mutable data structures}, +author={Reynolds, J.C.}, +booktitle={Logic in Computer Science, 2002. Proceedings. 17th Annual IEEE Symposium on}, +year={2002}, +month={}, +volume={}, +number={}, +pages={ 55-74}, +keywords={ computational complexity, data structures, formal logic Hoare logic, address arithmetic, heap, imperative programming language, low-level imperative programs, program logic, reasoning, recursive procedures, separation logic, shared mutable data structures}, +doi={10.1109/LICS.2002.1029817}, +ISSN={1043-6871 }, +} + + +@inproceedings{nethercote07shadow, + author = {Nethercote, Nicholas and Seward, Julian}, + title = {How to shadow every byte of memory used by a program}, + booktitle = {VEE '07: Proceedings of the 3rd international conference on Virtual execution environments}, + year = {2007}, + isbn = {978-1-59593-630-1}, + pages = {65--74}, + location = {San Diego, California, USA}, + doi = {http://doi.acm.org/10.1145/1254810.1254820}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@article{nethercote03valgrind, +title = "Valgrind: A Program Supervision Framework", +journal = "Electronic Notes in Theoretical Computer Science", +volume = "89", +number = "2", +pages = "44 - 66", +year = "2003", +note = "RV '2003, Run-time Verification (Satellite Workshop of CAV '03)", +issn = "1571-0661", +doi = "DOI: 10.1016/S1571-0661(04)81042-9", +url = "http://www.sciencedirect.com/science/article/B75H1-4DDWKTJ-PG/2/49e9f28ff4e74ceeb8e34e4bf4050f5b", +author = "Nicholas Nethercote and Julian Seward" +} + +@inproceedings{feng07assumeGuarantee, + author = "Feng, Xinyu and Ferreira, Rodrigo and Shao, Zhong", + title = "On the Relationship Between Concurrent Separation Logic and Assume-Guarantee Reasoning", + booktitle = {\bibconf[16th]{ESOP}{European Symposium on Programming}}, + year = "2007", + pages = "173--188", + location = "Braga, Portugal", + month = jul, +} + +@inproceedings{ohearn01local, + author = "OÕHearn, Peter and Reynolds, John and Yang, Hongseok", + title = "Local Reasoning about Programs that Alter Data Structures", + booktitle = "Computer Science Logic: 15th International Workshop (CSL 2001)", + year = "2001", + pages = "1--19", + location = "Paris, France", +} +address = "Berlin, Germany", + +@article{Brookes07semantics, + title = "A semantics for concurrent separation logic", + journal = "Theoretical Computer Science", + volume = "375", + number = "1-3", + pages = "227 - 270", + year = "2007", + note = "Festschrift for John C. Reynolds's 70th birthday", + author = "Stephen Brookes", +} + +@article{terauchi08capabilityCalculus, + author = {Terauchi, Tachio and Aiken, Alex}, + title = {A capability calculus for concurrency and determinism}, + journal = {ACM Trans. Program. Lang. Syst.}, + volume = {30}, + number = {5}, + year = {2008}, + issn = {0164-0925}, + pages = {1--30}, + doi = {http://doi.acm.org/10.1145/1387673.1387676}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@inproceedings{saraswat07memmodels, + author = {Saraswat, Vijay A. and Jagadeesan, Radha and Michael, Maged and von Praun, Christoph}, + title = {A theory of memory models}, + booktitle = {PPoPP '07: Proceedings of the 12th ACM SIGPLAN symposium on Principles and practice of parallel programming}, + year = {2007}, + isbn = {978-1-59593-602-8}, + pages = {161--172}, + location = {San Jose, California, USA}, + doi = {http://doi.acm.org/10.1145/1229428.1229469}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@article{li89memoryCoherence, + author = {Li, Kai and Hudak, Paul}, + title = {Memory coherence in shared virtual memory systems}, + journal = {ACM Trans. Comput. Syst.}, + volume = {7}, + number = {4}, + year = {1989}, + issn = {0734-2071}, + pages = {321--359}, + doi = {http://doi.acm.org/10.1145/75104.75105}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@article{hudak86parafunctional, +title = {Para-Functional Programming}, +author = {Hudak, P.}, +journal = {Computer}, +year = 1986, +month = aug, +volume = 19, +number = 8, +pages={60--70}, +doi={10.1109/MC.1986.1663309}, +ISSN={0018-9162}, +} + +@article{kitchin06orc, + author = {Kitchin, David and Cook, William and Misra, Jayadev}, + title = {A Language for Task Orchestration and Its Semantic Properties}, + booktitle = {\bibconf[17th]{CONCUR}{International Conference on Concurrency Theory}}, + year = {2006}, + pages = {477--491}, + location = {Bonn, Germany}, +} + +@article{ackerman82dataflow, +title={Data Flow Languages}, +author={Ackerman, W.B.}, +journal={Computer}, +year={1982}, +month={Feb}, +volume={15}, +number={2}, +pages={ 15-25}, +doi={}, +ISSN={0018-9162}, +} + +@article{lee06problem, +title={The problem with threads}, +author={Lee, E.A.}, +journal={Computer}, +year={2006}, +month={May}, +volume={39}, +number={5}, +pages={ 33-42}, +keywords={ message passing, multi-threading MPI, OpenMP, PVM, computer architectures, concurrent programming, data-parallel language extension, general-purpose architectures, message-passing libraries, operating system, programming languages, sequential processes, software engineering, threads programming model}, +doi={10.1109/MC.2006.180}, +ISSN={0018-9162}, +} + +@article{rinard98jade, + author = {Rinard, Martin C. and Lam, Monica S.}, + title = {The design, implementation, and evaluation of Jade}, + journal = {ACM Trans. Program. Lang. Syst.}, + volume = {20}, + number = {3}, + year = {1998}, + issn = {0164-0925}, + pages = {483--545}, + doi = {http://doi.acm.org/10.1145/291889.291893}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + +@inproceedings{chakravarty07parallelHaskell, + author = {Chakravarty, Manuel M. T. and Leshchinskiy, Roman and + Jones, Simon Peyton and Keller, Gabriele and Marlow, Simon}, + title = {{D}ata {P}arallel {H}askell: a status report}, + booktitle = {\bibconf{DAMP}{Workshop on Declarative + Aspects of Multicore Programming}}, + year = {2007}, + isbn = {978-1-59593-690-5}, + pages = {10--18}, + location = {Nice, France}, + doi = {http://doi.acm.org/10.1145/1248648.1248652}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@book{brinchHansen02origin, + editor = {Brinch Hansen, Per}, + title = {The Origin of Concurrent Programming: From Semaphores to Remote Procedure Calls}, + year = {2002}, + publisher = {Springer-Verlag}, + address = {Berlin, Germany}, + } + +@inproceedings{hoare72theory, +author = {Hoare, C. A. R}, +title = {Towards a Theory of Parallel Programming}, +booktitle = {Operating Systems Techniques: Proceedings of a Seminar at Queen's University}, +location = {Belfast, Northern Ireland}, +year = {1972}, +editor = {Hoare, C. A. R. and Perrott, R. H.}, +publisher = {Academic Press}, +address = {New York, New York, USA}, +pages = {61--71}, +note = {Reprinted in \cite{brinchHansen02origin}, 231--244.}, +} + + +@techreport{jones93implicitExplicit, +author = {Jones, Mark and Hudak, Paul}, +title = {Implicit and Explicit Parallel Programming in {H}askell}, +institution = {Yale University}, +year = {1993}, +type = {Research Report}, +number = {YALEU/DCS/RR-982}, +month = {Aug}, +address = {New Haven, Connecticut, USA}, +note = {\url{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.125.3273&rep=rep1&type=pdf}}, +} + +@article{terauchi05witnessingSideEffects, + author = {Terauchi, Tachio and Aiken, Alex}, + title = {Witnessing side effects}, + journal = {ACM Trans. Program. Lang. Syst.}, + volume = {30}, + number = {3}, + year = {2008}, + issn = {0164-0925}, + pages = {1--42}, + doi = {http://doi.acm.org/10.1145/1353445.1353449}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@inproceedings{boyland03checkingInterference, + author = {Boyland, John}, + title = {Checking Interference with Fractional Permissions}, + booktitle = {\bibconf{SAS}{International Symposium on Static Analysis}}, + pages = {1075--1075}, + location = {San Diego, California, USA}, + month = {Jun}, + year = {2003}, +} + + +@article{ohearn99logicBunchedImplications, + title = {The Logic of Bunched Implications}, + author = {O'Hearn, Peter W. and Pym, David J.}, + journal = {The Bulletin of Symbolic Logic}, + volume = {5}, + number = {2}, + pages = {215--244}, + note = {\url{http://www.jstor.org/stable/421090}}, + issn = {10798986}, + year = {1999}, + publisher = {Association for Symbolic Logic}, +} + + + +@inproceedings{tesler68languageDesign, + author = {Tesler, L. G. and Enea, H. J.}, + title = {A language design for concurrent processes}, + booktitle = {AFIPS '68 (Spring): Proceedings of the April 30--May 2, 1968, spring joint computer conference}, + year = {1968}, + pages = {403--408}, + location = {Atlantic City, New Jersey}, + doi = {http://doi.acm.org/10.1145/1468075.1468134}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + + @inproceedings{anderson08sharC, + author = {Anderson, Zachary and Gay, David and Ennals, Rob and Brewer, Eric}, + title = {{SharC}: checking data sharing strategies for multithreaded {C}}, + booktitle = {PLDI '08: Proceedings of the 2008 ACM SIGPLAN conference on Programming language design and implementation}, + year = {2008}, + isbn = {978-1-59593-860-2}, + pages = {149--158}, + location = {Tucson, AZ, USA}, + doi = {http://doi.acm.org/10.1145/1375581.1375600}, + publisher = {ACM}, + address = {New York, NY, USA}, + } + + +@article{sutter05softwareConcurrencyRevolution, + author = {Sutter, Herb and Larus, James}, + title = {Software and the Concurrency Revolution}, + journal = {Queue}, + volume = {3}, + number = {7}, + year = {2005}, + issn = {1542-7730}, + pages = {54--62}, + doi = {http://doi.acm.org/10.1145/1095408.1095421}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@article{adl-tabatabai06unlockingConcurrency, + author = {Adl-Tabatabai, Ali-Reza and Kozyrakis, Christos and Saha, Bratin}, + title = {Unlocking Concurrency}, + journal = {Queue}, + volume = {4}, + number = {10}, + year = {2007}, + issn = {1542-7730}, + pages = {24--33}, + doi = {http://doi.acm.org/10.1145/1189276.1189288}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@techreport{anderson08sharCtechReport, + author = {Anderson, Zachary and Gay, David and Ennals, Rob and Brewer, Eric}, + title = {SharC: checking data sharing strategies for multithreaded C}, + institution = {\bibbrev{UCB EECS}{Department of Electrical Engineering and Computer Science, + University of California, Berkeley}}, + year = 2008, + type = {Technical Report}, + number = {UCB/EECS-2008-25}, + address = {Berkeley, California, USA}, + month = mar, + note = {\url{http://www.eecs.berkeley.edu/Pubs/TechRpts/2008/EECS-2008-25.pdf}}, +} + +@article{hudak89conceptionEvolutionApplication, + author = {Hudak, Paul}, + title = {Conception, evolution, and application of functional programming languages}, + journal = {ACM Comput. Surv.}, + volume = {21}, + number = {3}, + year = {1989}, + issn = {0360-0300}, + pages = {359--411}, + doi = {http://doi.acm.org/10.1145/72551.72554}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@article{savage97eraser, + author = {Savage, Stefan and Burrows, Michael and Nelson, Greg and Sobalvarro, Patrick and Anderson, Thomas}, + title = {Eraser: a dynamic data race detector for multithreaded programs}, + journal = {ACM Trans. Comput. Syst.}, + volume = {15}, + number = {4}, + year = {1997}, + issn = {0734-2071}, + pages = {391--411}, + doi = {http://doi.acm.org/10.1145/265924.265927}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + + + +@inproceedings{dubois86memoryAccessBuffering, + author = {Dubois, M. and Scheurich, C. and Briggs, F.}, + title = {Memory access buffering in multiprocessors}, + booktitle = {ISCA '86: Proceedings of the 13th annual international symposium on Computer architecture}, + year = {1986}, + isbn = {0-8186-0719-X}, + pages = {434--442}, + location = {Tokyo, Japan}, + doi = {http://doi.acm.org/10.1145/17407.17406}, + publisher = {IEEE Computer Society Press}, + address = {Los Alamitos, CA, USA}, +} + + +@book{reynolds98theories, + author = {Reynods, John C.}, + title = {Theories of Programming Languages}, + publisher = {Cambridge University Press}, + year = {1998}, + address = {Cambridge, UK}, +} + +@inbook{reynolds98nondeterminism, + author = {Reynods, John C.}, + title = {Chapter 7. Nondeterminism and Guarded Commands}, + booktitle = {Theories of Programming Languages}, + pages = {136--154}, + publisher = {Cambridge University Press}, + year = {1998}, + address = {Cambridge, UK}, +} + +@inbook{reynolds98concurrency, + author = {Reynods, John C.}, + title = {Chapter 8. {S}hared Variable Concurrency}, + booktitle = {Theories of Programming Languages}, + pages = {155--1180}, + publisher = {Cambridge University Press}, + year = {1998}, + address = {Cambridge, UK}, +} + +@inproceedings{bennett90munin, + author = {Bennett, J. K. and Carter, J. B. and Zwaenepoel, W.}, + title = {Munin: distributed shared memory based on + type-specific memory coherence}, + booktitle = {\bibconf[2nd]{PPOPP}{{ACM SIGPLAN} symposium on {P}rinciples \& practice + of parallel programming}}, + year = {1990}, + pages = {168--176}, + location = {Seattle, WA} +} + + +@article{muehlenfeld07faultDetection, +title = "Fault Detection in Multi-Threaded C++ Server Applications", +journal = "Electronic Notes in Theoretical Computer Science", +volume = "174", +number = "9", +pages = "5 - 22", +year = "2007", +note = "Proceedings of the Thread Verification Workshop (TV 2006)", +issn = "1571-0661", +doi = "DOI: 10.1016/j.entcs.2007.04.004", +url = "http://www.sciencedirect.com/science/article/B75H1-4NYD490-2/2/181e46d1b8e986484db0d034546ac20f", +author = "Arndt Mühlenfeld and Franz Wotawa", +} + + + +@inproceedings{ritchie80unix, + author = {Ritchie, Dennis}, + title = {The evolution of the {Unix} time-sharing system}, + booktitle = {Language Design and Programming Methodology}, + series = {\bibbrev{LNCS}{Lecture Notes in Computer Science}}, + pages = {25--35}, + year = 1980, + location = {Sydney, Australia}, + month = sep, + publisher = {Springer-Verlag}, + address = {Berlin, Germany}, +} + +@inproceedings{behren03, + author={Rob von Behren and Jeremy Condit and Feng Zhou + and George C. Necula and Eric Brewer}, + title={Capriccio: {S}calable Threads for Internet Services}, + booktitle={{SOSP}'03}, +} + +@misc{ ford10pios, + author = {Bryan Ford}, + title = {{PIOS}: Parallel Instructional Operating System}, + month = may, + year = 2010, + note = {\url{http://zoo.cs.yale.edu/classes/cs422/pios}} +} + +@misc{ domp, + author = {Amittai and Bryan Ford}, + title = {Deterministic {OpenMP}}, + month = jan, + year = 2010, + note = {\em Under submission.}, +} + +@misc{kvm, + author = {Qumranet}, + title = {Kernel-based Virtual Machine for Linux}, + howpublished = {\url{http://kvm.qumranet.com/kvmwiki}}, + month = {March}, + day = {14}, + year = {2007} +} + +@misc{aufs, + author = {Junjiro R. Okajima}, + year = {2013}, + month = {January}, + howpublished = {\url{http://aufs.sourceforge.net/}}, + title = {Aufs3 -- advanced multi layered unification filesystem version 3.3}, +} + +@misc{peacekeeper, + author = {Futuremark}, + title = {Peacekeeper -- The Universal Browser Test}, + year = {2013}, + month = {January}, + howpublished = {\url{http://peacekeeper.futuremark.com}}, +} + +@misc{hpopenview, + title = {{Open View: HP Technologies Inc.}}, + note = {\url{http://www.openview.hp.com.}} +} + +@misc{iCloud, + title = {{Apple's iCloud runs on Microsoft's Azure and Amazon's cloud}}, + note = {\url{http://venturebeat.com/2011/09/03/icloud-azure-amazon/}} +} + +@misc{lshw, + title = {{Hardware Lister (lshw)}}, + note = {\url{http://ezix.org/project/wiki/HardwareLiSter}} +} + +@misc{Azure, + title = {{Microsoft Azure}}, + note = {\url{http://www.windowsazure.com/}} +} + +@misc{EC2, + title = {{Amazon EC2 Web Services}}, + note = {\url{http://aws.amazon.com/ec2/}} +} + +@misc{S3, + title = {{Amazon S3's Redundant Storage}}, + note = {\url{http://aws.amazon.com/s3/faqs/}} +} + +@misc{HDFS, + title = {{Hadoop distributed file system (HDFS)}}, + note = {\url{http://www-01.ibm.com/software/data/infosphere/hadoop/hdfs/}} +} + +@misc{Netflix, + title = {Netflix}, + note = {\url{https://signup.netflix.com/}} + +} + +@misc{Beat, + title = {{How Netflix, Zynga Beat Amazon Cloud Failure}}, + note = {\url{http://www.informationweek.com/news/cloud-computing/infrastructure/232200511}} + +} + +@misc{Zynga, + title = {Zynga}, + note = {\url{https://zynga.com/}} +} + +@misc{hurricanesandy12, + title = {{Hurricane Sandy takes data centers + offline with flooding, power outages}}, + author = {Jon Brodkin}, + year = {2012}, + month = {10}, + note = {\url{http://arstechnica.com/information-technology/2012/10/hurricane_sandy_takes_data_centers_offline_with_flooding_power_outages/}} +} + +@misc{powerOut, + title = {{Netflix Outage}}, + note = {\url{http://www.huffingtonpost.com/2012/07/02/amazon-power-outage-cloud-computing_n_1642700.html}} +} + +@misc{christmasoutage12, + title = {{EC2 Outages on Christmas Day of 2012}}, + note = {\url{http://my.chicagotribune.com/#section/-1/ + article/p2p-73813597/}} +} + +@misc{EC2Crash11, + title = {{EC2 Crash in April of 2011}}, + note = {\url{http://money.cnn.com/2011/04/21/technology/ + amazon_server_outage/index.htm}} + +} + +@misc{storm12, + title = {{Internet Outages Highlight Problem for + Cloud Computing: Actual Clouds}}, + note = {\url{http://www.slate.com/blogs/future_tense/2012/07/02/ + amazon_ec2_outage_netflix_pinterest_instagram_ + down_after_aws_cloud_loses_power.html}} +} + +@misc{amazon12summary, + title = {{Summary of the Amazon EC2, Amazon EBS, + and Amazon RDS Service Event in the EU West Region}}, + note = {\url{http://aws.amazon.com/message/2329B7/}} +} + +@misc{ebscorrelated, + title = {{Correlated Failures within EBS and EC2}}, + note = {\url{https://aws.amazon.com/message/680342/}} +} + +@misc{networkx, + title = {{NetworkX}}, + note = {\url{http://networkx.github.com/}} +} + +@misc{EBS, + title = {{Amazon EBS}}, + note = {\url{http://aws.amazon.com/ebs/}} +} + +@misc{iCloudEvent, + title = {{iCloud Outage}}, + note = {\url{http://reviews.cnet.com/8301-13727_7-57511311-263/icloud-outage-affecting-users-for-two-days-running/}} +} + +@misc{Top10-2013, + title = {{The 10 Biggest Cloud Outages of 2013}}, + note = {\url{http://www.crn.com/slide-shows/cloud/240158298/the-10-biggest-cloud-outages-of-2013-so-far.htm?pgno=1}} +} + +@misc{zoo, + title = {{Yale Cluster}}, + note = {\url{http://zoo.cs.yale.edu/}} +} + +@misc{OpenStack, + title = {{OpenStack}}, + note = {\url{http://www.openstack.org/}} +} + +@misc{secrec, + title = {{The SecreC Language}}, + note = {\url{http://sharemind.cyber.ee/the-secrec-language}} +} + +@misc{wd, + title = {{Western digital support}}, + note = {\url{http://www.wdc.com/en/}} +} + +@misc{openstack-overview, + title = {{An Overview of OpenStack}}, + note = {\url{http://www.openstack.org/downloads/openstack-compute-datasheet.pdf}} +} + +@misc{Riak, + title = {{Riak 1.3.1}}, + note = {\url{http://docs.basho.com/riak/1.3.1/downloads/}} +} + +@misc{Baltimore2001, + author="The Associated Press", + title="Fire in Baltimore Snarls {I}nternet Traffic, Too", + year="2001", + month="July", + day="20", + note = {\url{http://www.nytimes.com/2001/07/20/technology/20BALT.html}} +} + +@misc{loadbalance, + title = {{ELB Service outage due to the failure of load balancers}}, + note = {\url{http://aws.amazon.com/message/680587/}} +} + +@misc{amazondc, + title = {{A Look Inside Amazon's Data Centers.}}, + note = {\url{http://www.datacenterknowledge.com/archives/2011/06/09/a-look-inside-amazons-data-centers/}} +} + +@misc{survey09, + title = {{Survey: Cloud computing `No Hype', but fear of security and control slowing adoption}}, + note = {\url{http://www.circleid.com/posts/20090226_cloud_computing_hype_security}} +} + +@article{euro11, + author = {Jack Clark}, + title = {Lightning strikes {A}mazon's {E}uropean cloud}, + journal = {ZDNet}, + month = aug, + year = 2011, + note = + {\url{http://www.zdnet.com/lightning-strikes-amazons-european-cloud-3040093641/}, + accessed on Sep 9, 2014} +} + +@misc{thep, + title = {Homomorphic Encryption Project}, + note = {\url{https://code.google.com/p/thep/}} +} + +@inproceedings{aviram2012generalized, + title={A generalized reduction construct for deterministic OpenMP}, + author={Aviram, Amittai and Ford, Bryan}, + booktitle={3rd Workshop on Determinism and Correctness in Parallel Programming (WoDet), London, England}, + year={2012} +} + +@misc{dep, + title = {Package dependency graph generation tool}, + note = {\url{https://apps.ubuntu.com/cat/applications/quantal/debtree/}} +} + +@misc{dep2, + title = {apt-rdepends}, + note = {\url{http://packages.debian.org/sid/apt-rdepends}} +} + +@misc{Zynge, + title = {Zynga}, + note = {\url{https://zynga.com}} +} + +@misc{NetflixandZynga, + title = {{How Netflix, Zynga Beat Amazon Cloud Failure}}, + note = {\url{http://www.informationweek.com/news/cloud-computing/infrastructure/232200511}} +} + +@misc{andinverter, + title = {And-Inverter Graph}, + note = {\url{http://en.wikipedia.org/wiki/And-inverter_graph}} +} + +@misc{keepass, + title = {{KeePass}}, + note = {\url{http://keepass.info/}}, +} + +@misc{opencv, + title = {{OpenCV}}, + note = {\url{http://opencv.org}}, +} + +@misc{vmwarefusionmigrate, + title = {Migrating a {Windows PC} to run in {VMWare Fusion}}, + year = {2008}, + howpublished = {\url{https://www.vmware.com/pdf/migrating_physical_pc_to_fusion.pdf}}, +} + +@misc{gplv2, + title = {{GNU} General Public License, version 2}, + year = {1991}, + month = {june}, + howpublished = {\url{http://www.gnu.org/licenses/gpl-2.0.html}}, +} + +@misc{cvss, + author = {{National Institute of Standards and Technology}}, + title = {{Common Vulnerability Scoring System (CVSS)}}, + note = {\url{http://nvd.nist.gov/cvss.cfm}, accessed on Sep 9, 2014} +} + + +@misc{snort, + title = {snort}, + note = {\url{http://www.snort.org}}, +} + +@misc{stackoverflow-dataset, + title = {StackOverflow Dataset}, + note = {\url{http://www.ics.uci.edu/~duboisc/stackoverflow/}} +} diff --git a/pdf/sec.bib b/pdf/sec.bib new file mode 100644 index 0000000..afe8cb9 --- /dev/null +++ b/pdf/sec.bib @@ -0,0 +1,7708 @@ +%A + +@inproceedings{abe00secure, + title={Provably secure partially blind signatures}, + author={Abe, Masayuki and Okamoto, Tatsuaki}, + booktitle={\bibconf[20th]{CRYPTO}{International Cryptology Conference}}, + location = {Santa Barbara, CA}, + mon = aug, + year=2000 +} + +@inproceedings{abe02one, + title={1-out-of-$n$ signatures from a variety of keys}, + author={Abe, M. and Ohkubo, M. and Suzuki, K.}, + booktitle={{ASIACRYPT}}, + pages={639--645}, + year={2002}, + publisher={Springer} +} + +@article{abraham16solidus, + author = {Ittai Abraham and + Dahlia Malkhi and + Kartik Nayak and + Ling Ren and + Alexander Spiegelman}, + title = {\href{http://arxiv.org/abs/1612.02916}{Solidus: An Incentive-compatible Cryptocurrency Based on Permissionless + Byzantine Consensus}}, + journal = {CoRR}, + volume = {abs/1612.02916}, + year = {2016}, + url = {http://arxiv.org/abs/1612.02916}, + timestamp = {Sat, 11 Feb 2017 15:57:00 +0100}, + biburl = {http://dblp.uni-trier.de/rec/bib/journals/corr/AbrahamMNRS16}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + +@techreport{ abraham17state, + author = {Ronald Abraham and Elizabeth S. Bennett and + Noopur Sen and Neil Buddy Shah}, + title = {\href{https://stateofaadhaar.in/wp-content/uploads/State-of-Aadhaar-Full-Report-2016-17-IDinsight.pdf}{State of Aadhaar Report 2016-17}}, + institution = {IDinsight}, + month = may, + year = 2017, +} + +@misc{ abraham17revisiting, + author = {Ittai Abraham and Guy Gueta and Dahlia Malkhi and + Lorenzo Alvisi and Rama Kotla and Jean-Philippe Martin}, + title = {\href{https://arxiv.org/pdf/1712.01367.pdf}{Revisiting Fast Practical Byzantine Fault Tolerance}}, + month = dec, + year = 2017, +} + +@misc{ abraham18dfinity, + author = {Ittai Abraham and Dahlia Malkhi and Kartik Nayak and Ling Ren}, + title = {\href{https://eprint.iacr.org/2018/1153}{Dfinity Consensus, Explored}}, + howpublished = {Cryptology ePrint Archive, Report 2018/1153}, + month = nov, + year = 2018, +} + +@techreport{ abraham18state, + author = {Ronald Abraham and Elizabeth S. Bennett and + Rajesh Bhusal and Shreya Dubey and Qian (Sindy) Li and + Akash Pattanayak and Neil Buddy Shah}, + title = {\href{https://stateofaadhaar.in/wp-content/uploads/State-of-Aadhaar-Report_2017-18.pdf}{State of Aadhaar Report 2017-18}}, + institution = {IDinsight}, + month = may, + year = 2018, +} + +% obsoleted by conference paper: abraham19vaba +@article{abraham18vaba, + author = {Ittai Abraham and + Dahlia Malkhi and + Alexander Spiegelman}, + title = {\href{https://arxiv.org/abs/1811.01332}{Validated Asynchronous Byzantine Agreement with Optimal Resilience and Asymptotically Optimal Time and Word Communication}}, + journal = {CoRR}, + volume = {abs/1811.01332}, + year = {2018}, + url = {https://arxiv.org/abs/1811.01332}, +} + +@inproceedings{ abraham19vaba, + author = {Ittai Abraham and Dahlia Malkhi and Alexander Spiegelman}, + title = {\href{https://dahliamalkhi.files.wordpress.com/2019/06/vaba-podc2019-2.pdf}{Asymptotically Optimal Validated Asynchronous Byzantine Agreement}}, + booktitle = {\bibconf{PODC}{ACM Symposium on Principles of Distributed Computing}}, + month = jul, + year = 2019, + location = {Toronto, Ontario, Canada}, +} + +@misc{ abley10dnssec, + author = {Joe Abley and David Blacka and David Conrad and Richard Lamb and Matt Larson and Fredrik Ljunggren and David Knight and Tomofumi Okubo and Jakob Schlyter}, + title = {\href{http://www.root-dnssec.org/wp-content/uploads/2010/06/draft-icann-dnssec-arch-v1dot4.pdf}{DNSSEC Root Zone -- High Level Technical Architecture}}, + month = jun, + year = 2010, + note = {Version 1.4}, +} + +@article{ ackerman15fbi, + author = {Spencer Ackerman}, + title = {\href{http://www.theguardian.com/technology/2015/jul/08/fbi-chief-backdoor-access-encryption-isis}{FBI chief wants 'backdoor access' to encrypted communications to fight Isis}}, + journal = {The Guardian}, + month = jul, + year = 2015, +} + +@article{adams01internet, + title={Internet {X}.509 Public Key Infrastructure Time Stamp Protocol {(TSP)}}, + author={Adams, Carlisle and Pinkas, Denis}, + year={2001} +} + +@inproceedings{ adida08helios, + author = {Ben Adida}, + title = {Helios: Web-based Open-Audit Voting}, + booktitle={USENIX Security Symposium}, + month = jul, + year = 2008, + location = {San Jose, CA}, +} + +@inproceedings{adleman83implementing, + title={Implementing an electronic notary public}, + author={Adleman, Leonard M}, + booktitle={Advances in Cryptology}, + year={1983}, +} + +@inproceedings{adrian15imprefect, + title = {\href{https://weakdh.org/imperfect-forward-secrecy-ccs15.pdf}{Imperfect Forward Secrecy: {H}ow {D}iffie-{H}ellman Fails in Practice}}, + author = {David Adrian and Karthikeyan Bhargavan and Zakir Durumeric + and Pierrick Gaudry and Matthew Green and J. Alex + Halderman and Nadia Heninger and Drew Springall and + Emmanuel Thom\'e and Luke Valenta and Benjamin + VanderSloot and Eric Wustrow and Santiago + Zanella-B\'eguelin and Paul Zimmermann}, + booktitle = {ACM Conference on Computer and Communications Security}, + month = oct, + year = 2015 +} + +@incollection{ aggarwal08general, + author = {Charu C. Aggarwal and Philip S. Yu}, + title = {A General Survey of Privacy-Preserving Data Mining Models + and Algorithms}, + booktitle = {Privacy-Preserving Data Mining: Models and Algorithms}, + isbn = {978-0-387-70991-8}, + publisher = {Springer}, + year = 2008, + chapter = {2}, + pages = {11-52}, +} + +@article{ akamai16akamai, + author = {Akamai Technologies, Inc.}, + title = {\href{https://www.akamai.com/}{Akamai: Content Delivery Network (CDN) \& Cloud Computing + }}, + month = may, + year = 2016, +} + +@article{al19lazyledger, + title={LazyLedger: A Distributed Data Availability Ledger With Client-Side Smart Contracts}, + author={Al-Bassam, Mustafa}, + journal={arXiv preprint arXiv:1905.09274}, + year={2019} +} + +@inproceedings{ alhamed13opensource, + author = {Alhamed, Khalid and Silaghi, Marius C. and Hussien, Ihsan and + Yang, Yi}, + title = + {\href{http://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.381.4290&rep=rep1&type=pdf} + {Security by Decentralized Certification of Automatic-Updates for Open Source + Software controlled by Volunteers}}, + booktitle = {Workshop on Decentralized Coordination}, + year = {2013} +} + + +@inproceedings{ alhamed13stacking, + author = {Alhamed, Khalid and Silaghi, Marius C. and Hussien, Ihsan and + Stansifer, Ryan and Yang, Yi}, + title = {\href{http://dx.doi.org/10.1109/WI-IAT.2013.123}{"Stacking the Deck" + Attack on Software Updates: Solution by Distributed Recommendation of + Testers}}, + booktitle = {Proceedings of the 2013 IEEE/WIC/ACM International Joint + Conferences on Web Intelligence (WI) and Intelligent Agent Technologies (IAT) + - Volume 02}, + series = {WI-IAT '13}, + year = {2013}, + pages = {293--300}, + numpages = {8}, + publisher = {IEEE Computer Society}, +} + + +@inproceedings{al18chainspace, + author = {Mustafa Al{-}Bassam and Alberto Sonnino and Shehar Bano and + Dave Hrycyszyn and George Danezis}, + title = {\href{https://arxiv.org/pdf/1708.03778.pdf}{Chainspace: {A} Sharded Smart Contracts Platform}}, + booktitle = {25th Annual Network and Distributed System Security Symposium, {NDSS} + 2018, San Diego, California, USA, February 18-21, 2018}, + year = {2018}, +} + + +@inproceedings{ali16blockstack, + author = {Muneeb Ali and Jude Nelson and Ryan Shea and Michael J. Freedman}, + title = {\href{https://www.usenix.org/conference/atc16/technical-sessions/presentation/ali}{Blockstack: A Global Naming and Storage System Secured by Blockchains}}, + booktitle = {2016 USENIX Annual Technical Conference (USENIX ATC 16)}, + year = {2016}, + month = Jun, + isbn = {978-1-931971-30-0}, + address = {Denver, CO}, + pages = {181--194}, + publisher = {USENIX Association}, +} + +@inproceedings{ alicherry09doublecheck, + author = {Mansoor Alicherry and Angelos D. Keromytis}, + title = {{DoubleCheck}: Multi-path Verification Against + Man-in-the-Middle Attacks}, + booktitle = {\bibconf[14th]{ISCC}{IEEE Symposium on + Computers and Communications}}, + month = jul, + year = 2009, +} + +@misc{ allen18evoting, + author = {Jeff R. Allen}, + title = {\href{https://blog.dedis.ch/post/evoting/}{E-voting at EPFL}}, + howpublished = {\href{https://blog.dedis.ch}{DEDIS laboratory blog}}, + month = jul, + year = 2018, +} + +@inproceedings{ ambrosin14updaticator, + author={Ambrosin, Moreno and Busold, Christoph + and Conti, Mauro and Sadeghi, Ahmad-Reza and Schunter, Matthias}, + editor={Kuty{\l}owski, Miros{\l}aw and Vaidya, Jaideep}, + title={\href{http://www.schunter.org/blog/wp-content/uploads/2014/09/main.pdf} + {Updaticator: Updating Billions of Devices by an Efficient, Scalable and Secure + Software Update Distribution over Untrusted Cache-enabled Networks}}, + booktitle={Computer Security - ESORICS 2014: 19th European Symposium on + Research in Computer Security, Proceedings, Part I}, + year= {2014} +} + + +@article{amroudi17verifiable, + title={\href{https://link.springer.com/article/10.1007/s11277-017-4245-9}{A Verifiable (k, n, m)-Threshold Multi-secret Sharing Scheme Based on NTRU Cryptosystem}}, + author={Amroudi, Ali Nakhaei and Zaghain, Ali and Sajadieh, Mahdi}, + journal={Wireless Personal Communications}, + volume={96}, + number={1}, + pages={1393--1405}, + year={2017}, + publisher={Springer} +} + + +@misc{ andresen16classic, + author = {Gavin Andresen}, + title = {\href{http://gavinandresen.ninja/classic-unlimited-xt-core}{{Classic? Unlimited? XT? Core?}}}, + month = jan, + year = 2016, + url = {http://gavinandresen.ninja/classic-unlimited-xt-core}, +} + +@inproceedings{andrychowicz14secure, + title={\href{https://ieeexplore.ieee.org/abstract/document/6956580}{Secure multiparty computations on bitcoin}}, + author={Andrychowicz, Marcin and Dziembowski, Stefan and Malinowski, Daniel and Mazurek, Lukasz}, + booktitle={Security and Privacy (SP), 2014 IEEE Symposium on}, + pages={443--458}, + year={2014}, + organization={IEEE} +} + +@inproceedings{androulaki08reputation, + author = {Elli Androulaki and + Seung Geol Choi and + Steven M. Bellovin and + Tal Malkin}, + title = {Reputation systems for anonymous networks}, + booktitle = {\bibconf[8th]{PETS}{Privacy Enhancing Technologies}}, + location = {Leuven, Belgium}, + month = jul, + year = 2008 +} + +@inproceedings{androulaki18hyperledger, + author = {Elli Androulaki and + Artem Barger and + Vita Bortnikov and + Christian Cachin and + Konstantinos Christidis and + Angelo De Caro and + David Enyeart and + Christopher Ferris and + Gennady Laventman and + Yacov Manevich and + others}, + title = {\href{https://arxiv.org/pdf/1801.10228v1.pdf}{Hyperledger fabric: a distributed operating system for permissioned + blockchains}}, + booktitle = {Proceedings of the Thirteenth EuroSys Conference, EuroSys 2018, Porto, + Portugal, April 23-26, 2018}, + pages = {30:1--30:15}, + year = {2018}, + url = {http://doi.acm.org/10.1145/3190508.3190538}, + doi = {10.1145/3190508.3190538}, + timestamp = {Wed, 18 Apr 2018 10:45:31 +0200}, + biburl = {https://dblp.org/rec/bib/conf/eurosys/AndroulakiBBCCC18}, + bibsource = {dblp computer science bibliography, https://dblp.org} +} + +@inproceedings{androulaki18channels, + title={\href{https://link.springer.com/chapter/10.1007/978-3-319-99073-6_6}{Channels: Horizontal Scaling and Confidentiality on Permissioned Blockchains}}, + author={Androulaki, Elli and Cachin, Christian and De Caro, Angelo and Kokoris-Kogias, Eleftherios}, + booktitle={European Symposium on Research in Computer Security}, + pages={111--131}, + year={2018}, + organization={Springer} +} + +@article{ anderson13cell, + author = {Nate Anderson}, + title = {\href{http://arstechnica.com/tech-policy/2013/08/how-cell-tower-dumps-caught-the-high-country-bandits-and-why-it-matters/}{How ``cell tower dumps'' caught the {High Country Bandits}---and why it matters}}, + journal = {arstechnica}, + month = aug # "~29,", + year = 2013, + day = 29, +} + +@misc{ ansi16trusted, + author = {{American National Standards Institute}}, + title = {\href{https://webstore.ansi.org/standards/ascx9/ansix9952016}{ANSI X9.95-2016: Trusted Time Stamp Management And Security}}, + month = dec, + year = 2016, +} + +@article{apostolaki16hijacking, + title={\href{http://arxiv.org/abs/1605.07524}{Hijacking Bitcoin: Large-scale Network Attacks on Cryptocurrencies}}, + author={Apostolaki, Maria and Zohar, Aviv and Vanbever, Laurent}, + journal = {38th IEEE Symposium on Security and Privacy}, + month = may, + year = {2017}, + location = {San Jose, CA}, +} + +@misc{ apple14icloud, + author = {Apple Support}, + title = {\href{https://support.apple.com/en-us/HT204085}{Frequently asked questions about iCloud Keychain}}, + month = may, + year = 2016, +} + +@inproceedings{ ariyapperuma07security, + author = {Suranjith Ariyapperuma and Chris J. Mitchell}, + title = {\href{https://repository.royalholloway.ac.uk/file/f209fcf0-4b82-e17c-656d-e832730b2037/10/svidad.pdf}{Security vulnerabilities in {DNS} and {DNSSEC}}}, + booktitle = {\bibconf[2nd]{ARES}{International Conference on + Availability, Reliability and Security}}, + month = apr, + year = 2007, +} + +@article{ arthur11diginotar, + author = { Charles Arthur}, + title = {\href{http://www.theguardian.com/technology/2011/sep/05/diginotar-certificate-hack-cyberwar}{DigiNotar SSL certificate hack amounts to cyberwar, says expert}}, + journal = {The Guardian}, + month = sep, + year = 2011, + day = 5, +} + +@article{ateniese06improved, + title={\href{https://dl.acm.org/citation.cfm?id=1127346}{Improved proxy re-encryption schemes with applications to secure distributed storage}}, + author={Ateniese, Giuseppe and Fu, Kevin and Green, Matthew and Hohenberger, Susan}, + journal={ACM Transactions on Information and System Security (TISSEC)}, + volume={9}, + number={1}, + pages={1--30}, + year={2006}, + publisher={ACM} +} + +@article{arma14disable, + author = {Arma}, + title = {\href{https://blog.torproject.org/blog/possible-upcoming-attempts-disable-tor-network}{Possible upcoming attempts to disable the Tor network}}, + journal = {Tor Project Blog}, + month = december, + year = 2014, + day = 19, +} + +@inproceedings{ateniese00practical, + title={A practical and provably secure coalition-resistant group signature scheme}, + author={Ateniese, Giuseppe and Camenisch, Jan and Joye, Marc and Tsudik, Gene}, + booktitle={\bibconf[20th]{CRYPTO}{International Cryptology Conference}}, + location = {Santa Barbara, CA}, + mon = aug, + year=2000 +} + +@inproceedings{ateniese03quasi, + title={Quasi-efficient revocation of group signatures}, + author={Ateniese, Giuseppe and Song, Dawn and Tsudik, Gene}, + booktitle={\bibconf[7th]{FC}{Financial Cryptography Conference}}, + location = {Guadeloupe, France}, + month = jan, + year = 2003 +} + +@article{ attah19five, + author = {Elikem Attah}, + title = {\href{https://cryptoslate.com/prolific-51-attacks-crypto-verge-ethereum-classic-bitcoin-gold-feathercoin-vertcoin/}{Five most prolific 51\% attacks in crypto: Verge, Ethereum Classic, Bitcoin Gold, Feathercoin, Vertcoin}}, + journal = {Cryptoslate}, + month = apr, + year = 2019, +} + +@inproceedings{atzei17attacks, + author = {Atzei, Nicola and Bartoletti, Massimo and Cimoli, Tiziana}, + title = {\href{https://doi.org/10.1007/978-3-662-54455-6_8}{A Survey of Attacks on Ethereum Smart Contracts SoK}}, + booktitle = {Proceedings of the 6th International Conference on Principles of Security and Trust - Volume 10204}, + year = {2017}, + pages = {164--186}, + publisher = {Springer-Verlag New York, Inc.}, +} + +@misc{ augur, + title = {\href{https://www.augur.net/}{Augur: A Decentralized Oracle \& Prediction Market + Protocol}}, +} + +@inproceedings{ aura06scanning, + author = {Aura, Tuomas and Kuhn, Thomas A. and Roe, Michael}, + title = {Scanning electronic documents + for personally identifiable information}, + booktitle = {\bibconf[5th]{WPES}{ACM workshop on Privacy in electronic society}}, + year = {2006}, + location = {Alexandria, Virginia, USA}, + pages = {41--50}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{au08practical, + author = {Man Ho Au and + Willy Susilo and + Yi Mu}, + title={Practical anonymous divisible E-Cash from bounded accumulators}, + booktitle={\bibconf[12th]{FC}{Financial Cryptography and Data Security}}, + location = {Cozumel, Mexico}, + month = jan, + year=2008 +} + +@inproceedings{au12blacr, + title={{BLACR}: {TTP}-Free Blacklistable Anonymous Credentials with Reputation}, + author={Man H Au and + Apu Kapadia and + Willy Susilo}, + booktitle={\bibconf[19th]{NDSS}{Annual Network \& Distributed System Security + Symposium}}, + location = {San Diego, CA}, + month = Feb, + year=2012 +} + +@misc{ aubort18epfl, + author = {Sarah Aubort}, + title = {\href{https://actu.epfl.ch/news/epfl-uses-blockchain-technology-to-secure-e-voting/}{EPFL uses blockchain technology to secure e-voting systems}}, + howpublished = {EPFL News}, + month = jun, + year = 2018, +} + +@inproceedings{azaria16medrec, + title={\href{https://ieeexplore.ieee.org/abstract/document/7573685/}{Medrec: Using blockchain for medical data access and permission management}}, + author={Azaria, Asaph and Ekblaw, Ariel and Vieira, Thiago and Lippman, Andrew}, + booktitle={Open and Big Data (OBD), International Conference on}, + pages={25--30}, + year={2016}, + organization={IEEE} +} + +%B + +@inproceedings{backes14backref, + author = {Backes, Michael and Clark, Jeremy and Kate, Aniket and Simeonovski, Milivoj and Druschel, Peter}, + title = {{BackRef}: Accountability in Anonymous Communication Networks}, + booktitle = {\bibbrev{ACNS}{Applied Cryptography and Network Security}}, + year = {2014}, +} + +@inproceedings{backstrom07wherefore, + author = {Lars Backstrom and + Cynthia Dwork and + Jon M. Kleinberg}, + title = {Wherefore art thou r3579x?: anonymized social networks, + hidden patterns, and structural steganography}, + booktitle = {\bibconf[16th]{WWW}{International Conference + on World Wide Web}}, + month = may, + year = 2007, + location = {Canada} +} + +@misc{ badertscher19ouroboros, + author = {Christian Badertscher and Peter Ga\u{z}i and Aggelos Kiayias and Alexander Russell and Vassilis Zikas}, + title = {\href{https://eprint.iacr.org/2019/838}{Ouroboros Chronos: Permissionless Clock Synchronization via Proof-of-Stake}}, + howpublished = {Cryptology ePrint Archive, Report 2019/838}, + year = {2019}, +} + +@inproceedings{ baek04identity, + author = {Joonsang Baek and Yuliang Zheng}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-540-24632-9_19}{Identity-Based Threshold Decryption}}, + booktitle = {\bibconf[7th]{PKC}{International Workshop on Theory and Practice in Public Key Cryptography}}, + month = mar, + year = 2004, + location = {Singapore}, +} + +@inproceedings{ bagherzandi08multisignatures, + author = {Ali Bagherzandi and Jung Hee Cheon and Stanis\l{}aw Jarecki}, + title = {Multisignatures Secure under the Discrete Logarithm Assumption and a Generalized Forking Lemma}, + booktitle = {\bibconf[15th]{CCS}{ACM Conference on Computer and Communications Security}}, + month = oct, + year = 2008, +} + +@misc{baigneres15curve, + author = {Thomas Baign\`{e}res and C\'{e}cile Delerabl\'{e}e and Matthieu Finiasz and Louis Goubin and Tancr\`{e}de Lepoint and Matthieu Rivain}, + title = {\href{http://eprint.iacr.org/2015/1249}{Trap Me If You Can -- Million Dollar Curve}}, + howpublished = {Cryptology ePrint Archive, Report 2015/1249}, + year = {2015}, +} + +@techreport{ baird16hashgraph, + author = {Leemon Baird}, + title = {\href{http://www.swirlds.com/wp-content/uploads/2016/06/2016-05-31-Swirlds-Consensus-Algorithm-TR-2016-01.pdf}{Hashgraph Consensus: fair, fast, {Byzantine} fault tolerance}}, + institution = {Swirlds}, + number = {TR-2016-01}, + month = may, + year = 2016, +} + +@article{ ball13NSA, + author = { James Ball and Dominic Rushe}, + title = {\href{http://www.theguardian.com/world/2013/jun/06/us-tech-giants-nsa-data}{NSA Prism program taps in to user data of Apple, Google and others +}}, + month = oct, + year = 2013, +} + +@inproceedings{ballani2007hijacking, + title={\href{https://people.mpi-sws.org/~francis/sigcomm07-interception.pdf} + {A Study of Prefix Hijacking and Interception in the Internet}}, + author={Ballani, Hitesh and Francis, Paul and Zhang, Xinyang}, + booktitle={ACM SIGCOMM Computer Communication Review}, + volume={37}, + number={4}, + year={2007}, + organization={ACM} +} + +@inproceedings{ bao09liveness, + author = {Wei Bao and Hong Li and Nan Li and Wei Jiang}, + title = {\href{https://ieeexplore.ieee.org/document/5054589}{A Liveness Detection Method for Face Recognition Based on Optical Flow Field}}, + booktitle = {International Conference on Image Analysis and Signal Processing}, + month = apr, + year = 2009, + location = {Taizhou, China}, +} + +@misc{barme97great, + title = {\href{http://www.wired.com/1997/06/china-3/}{The Great Firewall of China}}, + author = { GEREMIE R. BARME AND SANG YE. }, + year={1997}, +} + +@inproceedings{ barrera14baton, + author = {Barrera, David and McCarney, Daniel and Clark, Jeremy and van + Oorschot, Paul C.}, + title = {\href{http://doi.acm.org/10.1145/2627393.2627397}{Baton: + Certificate Agility for Android's Decentralized Signing Infrastructure}}, + booktitle = {Proceedings of the 2014 ACM Conference on Security and Privacy + in Wireless \& Mobile Networks}, + series = {WiSec '14}, + year = {2014}, + location = {Oxford, United Kingdom}, + numpages = {12}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{ barrera12meteor, + title={\href{http://www.enck.org/pubs/most12.pdf}{Meteor: Seeding a + Security-Enhancing Infrastructure for Multi-market Application Ecosystems}}, + author={Barrera, David and Enck, William and van Oorschot, Paul C.}, + booktitle={Mobile Security Technologies 2012}, + year={2012}, + organization={IEEE} +} + +@article{ barret10OPM, + author = {Devlin Barret}, + title = {\href{http://www.wsj.com/articles/u-s-suspects-hackers-in-china-behind-government-data-breach-sources-say-1433451888}{U.S. Suspects Hackers in China Breached About four (4) Million People's Records, Officials Say}}, + month = jun, + year = 2015, +} + + +@inproceedings{ basin14arpki, + author = {David Basin and Cas Cremers and Tiffany Hyun-Jin Kim and + Adrian Perrig and Ralf Sasse and Pawel Szalachowski}, + title = {\href{http://www.netsec.ethz.ch/research/arpki/}{{ARPKI}: Attack Resilient Public-Key Infrastructure}}, + booktitle = {\bibconf{CCS}{ACM Conference on + Computer and Communications Security}}, + year = 2014, +} + +@inproceedings{ bates14forced, + author = {Adam Bates and Joe Pletcher and Tyler Nichols and + Braden Hollembaek and Kevin R. B. Butler}, + title = {Forced Perspectives: + Evaluating an {SSL} Trust Enhancement at Scale}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = nov, + year = 2014, + location = {Vancouver, BC, Canada}, +} + +@inproceedings{bauer03new, + title = {New covert channels in {HTTP}: + adding unwitting {Web} browsers to anonymity sets}, + author = {Bauer, Matthias}, + booktitle = {\bibconf[1st]{WPES}{ACM + Workshop on Privacy in the Electronic Society}}, + pages = {72--78}, + year = {2003}, +} + +% author = {Bauer, Kevin and McCoy, Damon and Grunwald, Dirk and Sicker, Douglas}, +@inproceedings{bauer05bittorrent, + author = {Bauer, Kevin and others}, + title = {BitBlender: light-weight anonymity for {BitTorrent}}, + booktitle = {\bibbrev{AIPACa}{Workshop on Applications of private and anonymous communications}}, + year = {2008}, +} + +@misc{beacon14reddit, + key={Reddit}, + title = {Reddit: {NIST} {R}andomness {B}eacon}, + howpublished = {\url{http://www.reddit.com/r/crypto/comments/21apkx/nist_randomness_beacon/}}, +} + +@misc{beacon14se, + key={StackExchenge}, + title = {How useful is {NIST}'s {R}andomness {B}eacon for cryptographic use?}, + howpublished = {\url{http://crypto.stackexchange.com/questions/15225/how-useful-is-nists-randomness-beacon-for-cryptographic-use}}, +} + +@inproceedings{ bellare93random, + title = {Random oracles are practical: A paradigm for designing efficient protocols}, + author = {Bellare, Mihir and Rogaway, Phillip}, + booktitle = {\bibconf[1st]{CCS}{ACM Conference on + Computer and Communications Security}}, + pages = {62--73}, + year = {1993}, +} + + +@inproceedings{ bellare94optimal, + author = {Mihir Bellare and Phillip Rogaway}, + title = {Optimal Asymmetric Encryption -- How to Encrypt with {RSA}}, + booktitle = {Eurocrypt}, + month = may, + year = 1994, + location = {Perugia, Italy}, +} + +@inproceedings{ bellare09hedged, + title = {Hedged public-key encryption: How to protect against bad randomness}, + author = {Bellare, Mihir and Brakerski, Zvika and + Naor, Moni and Ristenpart, Thomas and Segev, Gil and Shacham, Hovav and Yilek, Scott}, + booktitle = {{ASIACRYPT}}, + pages = {232--249}, + year = {2009}, + publisher = {Springer} +} + +@inproceedings{bellare06multi, + title={Multi-signatures in the plain public-key model and a general forking lemma}, + author={Bellare, Mihir and Neven, Gregory}, + booktitle = {\bibconf{CCS}{ACM Conference on + Computer and Communications Security}}, + year={2006}, +} + +@inproceedings{ bellare09format, + title={\href{https://eprint.iacr.org/2009/251.pdf}{Format-preserving + encryption}}, + author={Bellare, Mihir and Ristenpart, Thomas and Rogaway, Phillip and + Stegers, Till}, + booktitle={International Workshop on Selected Areas in Cryptography}, + pages={295--312}, + month = aug, + year={2009} +} + +@inproceedings{ bellissimo06secure, + author = {Anthony Bellissimo and John Burgess and Kevin Fu}, + title = {\href{https://www.usenix.org/legacy/event/hotsec06/tech/full_papers/bellissimo/bellissimo.pdf}{Secure Software Updates: Disappointments and New Challenges}}, + booktitle = {\bibconf[1st]{HotSec}{USENIX Workshop on Hot Topics in Security}}, + month = jul, + year = 2006, + location = {Vancouver, BC, Canada}, +} + +@inproceedings{ bencsath12duqu, + title={\href{https://www.crysys.hu/publications/files/BencsathPBF12eurosec.pdf}{Duqu: Analysis, Detection, and Lessons Learned}}, + author={Bencs{\'a}th, Boldizs{\'a}r and P{\'e}k, G{\'a}bor and Butty{\'a}n, + Levente and F{\'e}legyh{\'a}zi, M{\'a}rk}, + booktitle={ACM European Workshop on System Security (EuroSec)}, + year={2012} +} + +@inproceedings{bendavid08fairplaymp, + title={{FairplayMP}: a system for secure multi-party computation}, + author={Ben-David, Assaf and Nisan, Noam and Pinkas, Benny}, + booktitle={{ACM} Conference on Computer and Communications Security}, + month={October}, + year={2008} +} + +@inproceedings{bender06ring, + title={Ring signatures: Stronger definitions, and constructions without random oracles}, + author={Bender, A. and Katz, J. and Morselli, R.}, + booktitle={\bibconf[3rd]{TCC}{Theory of Cryptography Conference}}, + pages={60--79}, + year={2006}, + publisher={Springer} +} + +@article {bender09ring, + title = {Ring signatures: Stronger definitions, and constructions without random oracles}, + journal = {Journal of Cryptology}, + year = {2009}, + author = {Bender,A. and Katz, Jonathan and Morselli,R.} +} + +@misc{bentov16snow, + author = {Iddo Bentov and Rafael Pass and Elaine Shi}, + title = {\href{http://eprint.iacr.org/2016/919}{Snow White: Provably Secure Proofs of Stake}}, + howpublished = {Cryptology ePrint Archive, Report 2016/919}, + year = {2016}, +} + + +@article{ bernstein12highspeed, + author = {Daniel J. Bernstein and Niels Duif and Tanja Lange + and Peter Schwabe and Bo-Yin Yang}, + title = {\href{http://link.springer.com/article/10.1007/s13389-012-0027-1}{High-speed high-security signatures}}, + journal = {Journal of Cryptographic Engineering}, + volume = 2, + number = 2, + pages = {77-89}, + year = 2012, + url = {http://link.springer.com/article/10.1007/s13389-012-0027-1}, +} + +@inproceedings{ bernstein13elligator, + title={\href{https://elligator.cr.yp.to/elligator-20130828.pdf}{Elligator: + Elliptic-curve points indistinguishable from uniform random strings}}, + author={Bernstein, Daniel J and Hamburg, Mike and Krasnova, Anna and + Lange, Tanja}, + booktitle = {ACM CCS}, + month = nov, + year = 2013 +} + +@misc{bernstein15dualec, + title = {\href{http://eprint.iacr.org/2015/767}{Dual {EC}: {A Standardized Back Door}}}, + author = {{Bernstein}, Daniel J. and {Lange}, Tanja and {Niederhagen}, Ruben}, + howpublished = {Cryptology ePrint Archive, Report 2015/767}, + year = {2015}, +} + +@inproceedings{berthold00cascade, + title = {The disadvantages of free {MIX} routes and how to overcome them}, + author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke}, + booktitle = {Workshop on Design Issues in Anonymity and Unobservability}, + year = {2000}, + month = {July}, + pages = {30--45}, +} + +@inproceedings{berthold00anonymity, + author = {Berthold, Oliver and Federrath, Hannes and K\"{o}hntopp, Marit}, + title = {Project ``anonymity and unobservability in the Internet''}, + booktitle = {\bibbrev{CFP}{Conference on Computers, freedom and privacy: challenging the assumptions}}, + year = {2000}, + month = {April} +} + +@inproceedings{ berthold02dummy, + author = {Berthold, Oliver and Langos, Heinrich}, + title = {Dummy traffic against long term intersection attacks}, + booktitle = {\bibconf[2nd]{PET}{Workshop on Privacy Enhancing Technologies}}, + year = {2002}, +} + +@inproceedings{bethencourt10signatures, + author = {John Bethencourt and + Elaine Shi and + Dawn Song}, + title = {Signatures of Reputation}, + booktitle = {\bibconf[14th]{FC}{Financial Cryptography and Data Security}}, + location = {Canary Islands, Spain}, + month = jan, + year = 2010 +} + +@inproceedings{bian2007off, + title={Off-the-record instant messaging for group conversation}, + author={Bian, Jiang and Seker, Remzi and Topaloglu, Umit}, + booktitle={Information Reuse and Integration, 2007. IRI 2007. IEEE International Conference on}, + year={2007}, +} + +@article{ bier09rules, + author={Bier, E. and Chow, R. and Golle, + P. and King, T.H. and Staddon, J.}, + journal={Security Privacy, IEEE}, + title={The Rules of Redaction: Identify, Protect, Review (and Repeat)}, + year={2009}, + month={nov.-dec. }, + volume={7}, + number={6}, + pages={46 -53}, +} + +@article{ bischoff18passports, + author = {Paul Bischoff}, + title = {\href{https://www.comparitech.com/blog/vpn-privacy/passports-on-the-dark-web-how-much-is-yours-worth/}{Passports on the dark web: how much is yours worth?}}, + journal = {Comparitech}, + month = oct, + year = 2018, + day = 4, +} + +@inproceedings{bhattacharya11computer, + title={Computer viruses in urban {Indian} telecenters: Characterizing an unsolved problem}, + author={Bhattacharya, Prasanta and Thies, William}, + booktitle={\bibconf[5th]{NSDR}{ACM workshop on Networked systems for developing regions}}, + year={2011}, + month=jun, +} + +@inproceedings{bhargavan14triple, + title={\href{https://www.ieee-security.org/TC/SP2014/papers/TripleHandshakesandCookieCutters_c_BreakingandFixingAuthenticationoverTLS.pdf}{Triple handshakes and cookie cutters: Breaking and fixing authentication over TLS}}, + author={Bhargavan, Karthikeyan and Lavaud, Antoine Delignat and Fournet, C{\'e}dric and Pironti, Alfredo and Strub, Pierre Yves}, + booktitle={IEEE Symposium on Security and Privacy}, + year={2014} +} + +@inproceedings{blakley79keys, + title = {\href{https://www.computer.org/csdl/proceedings/afips/1979/5087/00/50870313.pdf}{Safeguarding cryptographic keys}}, + author={Blakley, George Robert}, + booktitle={Proceedings of the national computer conference}, + volume={48}, + pages={313--317}, + year={1979} +} + +@inproceedings{blomer15anonymous, + author = {Johannes Bl{\"{o}}mer and + Jakob Juhnke and + Christina Kolb}, + title = {Anonymous and publicly linkable reputation systems}, + booktitle = {\bibconf[19th]{FC}{Financial Cryptography and Data Security}}, + location = {Puerto Rico}, + month = jan, + year = 2015 +} + +@techreport{blough11ct, + title={CT-T: MedVault-ensuring security and privacy for electronic medical records}, + author={Blough, Douglas M and Liu, Ling and Sainfort, Francois and Ahamad, Mustaque}, + year={2011}, + institution={Georgia Institute of Technology} +} + +@article{blum86prng, + author = {Blum, Lenore and Blum, Manuel and Shub, Michael}, + title = {A simple unpredictable pseudo random number generator}, + journal = {SIAM J. Comput.}, + year = {1986} +} + +@inproceedings{blum19synchronous, + title={Synchronous Consensus with Optimal Asynchronous Fallback Guarantees}, + author={Blum, Erica and Katz, Jonathan and Loss, Julian}, + booktitle={Theory of Cryptography Conference}, + pages={131--150}, + year={2019}, + organization={Springer} +} + +@incollection{blundo94randomness, + author = {Blundo, Carlo and + De Santis, Alfredo and + Vaccaro, Ugo}, + title = {Randomness in distribution protocols}, + booktitle = {Automata, Languages and Programming}, + volume = {820}, + series = {Lecture Notes in Computer Science}, + editor = {Abiteboul, Serge and Shamir, Eli}, + publisher = {Springer Berlin Heidelberg}, + pages = {568-579}, + year = {1994}, + language = {English}, + doi = {10.1007/3-540-58201-0_99}, + url = {http://dx.doi.org/10.1007/3-540-58201-0_99}, + isbn = {978-3-540-58201-4}, +} + +@inproceedings{blundo12espresso, + author = {Carlo Blundo and + Emiliano de Cristofaro and + Paolo Gasti}, + title = {{EsPRESSo}: Efficient Privacy-Preserving Evaluation + of Sample Set Similarity}, + booktitle = {DPM/SETOP}, + month = sep, + year = 2012 +} + +@article{blundo14espresso, + author = {Carlo Blundo and + Emiliano de Cristofaro and + Paolo Gasti}, + title = {{EsPRESSo}: {E}fficient Privacy-Preserving Evaluation + of Sample Set Similarity}, + journal = {Journal of Computer Security}, + volume = {22}, + number = {3}, + pages = {355--381}, + year = 2014 +} + +@inproceedings{ bobbio14reproducible, + author = {J\'er\'emy {Bobbio (Lunar)}}, + title = {\href{https://archive.fosdem.org/2014/schedule/event/reproducibledebian/}{Reproducible Builds for Debian}}, + booktitle = {FOSDEM}, + month = feb, + year = 2014, +} + +@article{bogdanov13pushing, + title={Pushing back the rain\ --\ how to create trustworthy services in the cloud}, + author={Bogdanov, Dan and Kalu, Aivo}, + journal={{ISACA} Journal}, + volume={3}, + year={2013}, + pages={49--51} +} + +@inproceedings{ bogetoft09secure, + author = {Peter Bogetoft and Dan Lund Christensen and Ivan Dam\r{g}ard and + Martin Geisler and Thomas Jakobsen and Mikkel Kr\o{}igaard and + Janus Dam Nielsen and Jesper Buus Nielsen and Kurt Nielsen and + Jakob Pagter and Michael Schwartzbach and Tomas Toft}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-642-03549-4_20}{Secure Multiparty Computation Goes Live}}, + booktitle = {\bibconf[13th]{FC}{International Conference on Financial Cryptography and Data Security}}, + month = feb, + year = 2009, + location = {Accra Beach, Barbados}, +} + +@incollection { boneh98decision, + author = {Dan Boneh}, + title = {The Decision {Diffie-Hellman} problem}, + booktitle = {Algorithmic Number Theory}, + series = {Lecture Notes in Computer Science}, + editor = {Joe Buhler}, + publisher = {Springer Berlin / Heidelberg}, + pages = {48-63}, + volume = {1423}, + note = {10.1007/BFb0054851}, + year = {1998} +} + +@incollection{ boneh01identity, + author = {Dan Boneh and Matt Franklin}, + title = {Identity-Based Encryption from the {Weil} Pairing}, + booktitle = {\bibconf[21st]{CRYPTO}{IACR International Cryptology Conference}}, + year = {2001} +} + +@article{boneh1998decision, + title={The decision diffie-hellman problem}, + author={Boneh, Dan}, + journal={Algorithmic number theory}, + pages={48--63}, + year={1998}, + publisher={Springer} +} + +@inproceedings{boneh01short, + title = {\href{https://www.iacr.org/archive/asiacrypt2001/22480516.pdf}{Short signatures from the Weil pairing}}, + author={Boneh, Dan and Lynn, Ben and Shacham, Hovav}, + booktitle={International Conference on the Theory and Application of Cryptology and Information Security}, + pages={514--532}, + year={2001}, + organization={Springer} +} + +@article{boneh03survey, + title={A survey of two signature aggregation techniques}, + author={Boneh, Dan and Gentry, Craig and Lynn, Ben and Shacham, Hovav and others}, + journal={RSA cryptobytes}, + year={2003} +} + +@inproceedings{ boneh04efficient, + title = {Efficient {selective-ID} secure identity-based encryption without random oracles}, + author = {Boneh, Dan and Boyen, Xavier}, + booktitle = {\bibconf{Eurocrypt}{International Conference on the + Theory and Applications of Cryptographic Techniques}}, + pages = {223--238}, + year = {2004}, +} + +@inproceedings{boneh04short, + title={Short group signatures}, + author={Boneh, Dan and Boyen, Xavier and Shacham, Hovav}, + booktitle={\bibconf[24th]{CRYPTO}{International Cryptology Conference}}, + location = {Santa Barbara, CA}, + mon = aug, + year=2004 +} + +@inproceedings{ boneh16balloon, + author = {Dan Boneh and Henry Corrigan-Gibbs and Stuart Schechter}, + title = {\href{https://eprint.iacr.org/2016/027}{Balloon Hashing: A Memory-Hard Function Providing Provable Protection Against Sequential Attacks}}, + booktitle = {Asiacrypt}, + month = dec, + year = 2016, + location = {Hanoi, Vietnam}, +} + +@inproceedings{ boneh18compact, + author = {Dan Boneh and Manu Drijvers and Gregory Neven}, + title = {\href{https://eprint.iacr.org/2018/483}{Compact Multi-Signatures for Smaller Blockchains}}, + booktitle = {Advances in Cryptology -- ASIACRYPT 2018}, + month = dec, + year = 2018, +} + +@inproceedings{ boneh18verifiable, + author = {Dan Boneh and Joseph Bonneau and Benedikt B\"unz and Ben Fisch}, + title = {Verifiable Delay Functions}, + booktitle = {\bibconf[38th]{CRYPTO}{Advances in Cryptology}}, + month = aug, + year = 2018, + location = {Santa Barbara, CA, USA}, +} + +@misc{ bonneau15bitcoin, + author = {Joseph Bonneau and Jeremy Clark and Steven Goldfeder}, + title = {\href{https://eprint.iacr.org/2015/1015.pdf}{On Bitcoin as a public randomness source}}, + howpublished = {{IACR} eprint archive}, + month = oct, + year = 2015, +} + +@inproceedings{ bonneau16ethiks, + author={Bonneau, Joseph}, + title={\href{https://link.springer.com/chapter/10.1007/978-3-662-53357-4_7}{EthIKS: Using Ethereum to Audit a CONIKS Key Transparency Log}}, + booktitle={\bibconf{FC}{Financial Cryptography and Data Security}}, + pages={95--105}, + year={2016}, + publisher={Springer Berlin Heidelberg}, + isbn={978-3-662-53357-4}, + doi={10.1007/978-3-662-53357-4_7}, + url={http://dx.doi.org/10.1007/978-3-662-53357-4_7} +} + +@inproceedings{borge17PoP, + title={\href{http://bford.info/pub/dec/pop-abs}{{Proof-of-Personhood}: Redemocratizing Permissionless Cryptocurrencies}}, + booktitle={\href{http://prosecco.gforge.inria.fr/ieee-blockchain2016/}{1st IEEE Security and Privacy on the Blockchain}}, + author = {Maria Borge and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Nicolas Gailly and Linus Gasser and Bryan Ford}, + month = apr, + year={2017}, +} + +@inproceedings{borisov2004off, + title={Off-the-record communication, or, why not to use PGP}, + author={Borisov, Nikita and Goldberg, Ian and Brewer, Eric}, + booktitle = {\bibconf{WPES}{ACM workshop on Privacy in the electronic society}}, + year={2004}, +} + +% obsoleted by conference version: boldyreva03threshold +@inproceedings{boldyreva02threshold, + title={\href{https://eprint.iacr.org/2002/118}{Threshold Signatures, Multisignatures and Blind Signatures Based on the {Gap-Diffie-Hellman-Group} Signature Scheme}}, + author={Boldyreva, Alexandra}, + booktitle={Public Key Cryptography -- PKC 2003}, + publisher= {Springer}, + year={2002}, +} + +@inproceedings{boldyreva03threshold, + title = {\href{https://link.springer.com/chapter/10.1007/3-540-36288-6_3}{Threshold Signatures, Multisignatures and Blind Signatures Based on the {Gap-Diffie-Hellman-Group} Signature Scheme}}, + author = {Boldyreva, Alexandra}, + booktitle = {\bibconf[6th]{PKC}{International Workshop on Practice and Theory in Public Key Cryptography}}, + month = jan, + year = 2003, + location = {Miami, FL, USA}, +} + +@inproceedings{bos2014elliptic, + title={Elliptic curve cryptography in practice}, + author={Bos, Joppe W and Halderman, J Alex and Heninger, Nadia and Moore, Jonathan and Naehrig, Michael and Wustrow, Eric}, + booktitle={International Conference on Financial Cryptography and Data Security}, + pages={157--175}, + year={2014}, + organization={Springer} +} + +@inproceedings{bos15post, + title={\href{https://ieeexplore.ieee.org/abstract/document/7163047}{Post-quantum key exchange for the TLS protocol from the ring learning with errors problem}}, + author={Bos, Joppe W and Costello, Craig and Naehrig, Michael and Stebila, Douglas}, + booktitle={Security and Privacy (SP), 2015 IEEE Symposium on}, + pages={553--570}, + year={2015}, + organization={IEEE} +} + +@misc{boyle11coin, + author = {Elette Boyle and Shafi Goldwasser and Yael Tauman Kalai}, + title = {\href{https://eprint.iacr.org/2011/291.pdf}{Leakage-Resilient Coin Tossing}}, + howpublished = {Cryptology ePrint Archive, Report 2011/291}, + year = {2011}, +} + +@article{brennan12stylometry, + author = {Brennan, Michael and Afroz, Sadia and Greenstadt, Rachel}, + title = {Adversarial Stylometry: Circumventing Authorship Recognition to Preserve Privacy and Anonymity}, + journal = {\bibconf{TISSEC}{ACM Transactions on Information and System Security}}, +month = nov, +year = {2012}, +} + +@inproceedings{ bresson02dynamic, + author = {Bresson, Emmanuel and Chevassut, Olivier and Pointcheval, David}, + title = {Dynamic Group {Diffie-Hellman} Key Exchange under Standard Assumptions}, + booktitle = {Proceedings of the International Conference on the Theory and + Applications of Cryptographic Techniques: Advances in Cryptology}, + series = {Eurocrypt}, + year = {2002}, + isbn = {3-540-43553-0}, + pages = {321--336}, + publisher = {Springer-Verlag}, + address = {London, UK, UK}, +} + +@article{ bright11diginotar, + author = { Peter Bright}, + title = {\href{http://arstechnica.com/security/2011/08/earlier-this-year-an-iranian/}{Another fraudulent certificate raises the same old questions about certificate authorities}}, + journal = {arstechnica}, + month = aug, + year = 2011, + day = 29, +} + + +@article{ bright11comodo, + author = { Peter Bright}, + title = {\href{http://arstechnica.com/security/2011/03/how-the-comodo-certificate-fraud-calls-ca-trust-into-question/}{How the Comodo certificate fraud calls CA trust into questions}}, + journal = {arstechnica}, + month = mar, + year = 2011, + day = 24, +} + +@inproceedings{buchmann07merkle, + title = {Merkle Signatures with Virtually Unlimited Signature Capacity.}, + author = {Buchmann, Johannes and Dahmen, Erik and Klintsevich, Elena and Okeya, Katsuyuki and Vuillaume, Camille}, + booktitle = {\bibbrev{ACNS}{Applied Cryptography and Network Security}}, + year = 2007 +} + +@thesis{buchman16tendermint, + title={\href{https://atrium.lib.uoguelph.ca/xmlui/bitstream/handle/10214/9769/Buchman_Ethan_201606_MAsc.pdf?sequence=7&isAllowed=y}{Tendermint: Byzantine Fault Tolerance in the Age of Blockchains}}, + author={Buchman, Ethan}, + year={2016} +} + +@misc{ robinson17using, + author = {David ``Karit'' Robinson}, + title = {\href{https://zxsecurity.co.nz/presentations/201707_Defcon-ZXSecurity-GPSSpoofing.pdf}{Using GPS Spoofing to Control Time}}, + howpublished = {DEFCON 25}, + month = jul, + year = 2017, +} + +@article{bunz17proofs, + author = {Benedikt B{\"{u}}nz and + Jonathan Bootle and + Dan Boneh and + Andrew Poelstra and + Pieter Wuille and + Greg Maxwell}, + title = {\href{https://eprint.iacr.org/2017/1066.pdf}{Bulletproofs: Short Proofs for Confidential Transactions and + More}}, + journal = {{IACR} Cryptology ePrint Archive}, + volume = {2017}, + pages = {1066}, + year = {2017}, + url = {http://eprint.iacr.org/2017/1066}, + timestamp = {Mon, 19 Mar 2018 14:21:51 +0100} +} + +@article{ burgess15un, + author = {Matt Burgess}, + title = {\href{http://www.wired.co.uk/news/archive/2015-11/10/surveillance-investigatory-powers-scary-joseph-cannataci}{UN privacy chief: UK surveillance bill is 'worse than scary'}}, + journal = {Wired.co.uk}, + month = nov, + year = 2015, + day = 10, +} + +@inproceedings{burkhart10sepia, + title={Sepia: Privacy-preserving aggregation of multi-domain network events and statistics}, + author={Burkhart, Martin and Strasser, Mario and Many, Dilip and Dimitropoulos, Xenofontas}, + booktitle={{USENIX} Security Symposium}, + month={August}, + year={2010} +} + +@inproceedings{burrows06chubby, + title={The Chubby lock service for loosely-coupled distributed systems}, + author={Burrows, Mike}, + booktitle={Proceedings of the 7th symposium on Operating systems design and implementation}, + pages={335--350}, + year={2006} +} + +@misc{buterin15notes, + title={\href{https://pdfs.semanticscholar.org/ae5b/c3aaf0e02a42f4cd41916072c87db0e04ac6.pdf}{Notes on Scalable Blockchain Protocols (verson 0.3)}}, + author={Buterin, Vitalik and Coleman, Jeff and Wampler-Doty, Matthew}, + year={2015} +} + +@article{buterin2016hardfork, + author = {Vitalik Buterin}, + title = {\href{https://blog.ethereum.org/2016/07/20/hard-fork-completed/}{Hard fork completed}}, + year={2016} +} + +@article{ byers04leakage, + author = {Simon Byers}, + title = {Information Leakage Caused by Hidden + Data in Published Documents}, + journal ={IEEE Security and Privacy}, + volume = {2}, + year = {2004}, + pages = {23-27}, + publisher = {IEEE Computer Society}, + address = {Los Alamitos, CA, USA}, +} + +%C + +@misc{ c4ads19above, + author = {C4ADS}, + title = {\href{https://www.c4reports.org/aboveusonlystars}{Above Us Only Stars: Exposing GPS Spoofing in Russia and Syria}}, + month = apr, + year = 2019, +} + +@inproceedings{cachin16architecture, + title={\href{https://www.zurich.ibm.com/dccl/papers/cachin_dccl.pdf}{Architecture of the Hyperledger blockchain fabric}}, + author={Cachin, Christian}, + booktitle={Workshop on Distributed Cryptocurrencies and Consensus Ledgers}, + year={2016} +} + +@inproceedings{ cachin00random, + author = {Christian Cachin and Klaus Kursawe and Victor Shoup}, + title = {\href{http://link.springer.com/article/10.1007/s00145-005-0318-0}{Random Oracles in {Constantinople}: + Practical Asynchronous {Byzantine} Agreement + Using Cryptography}}, + booktitle = {19th ACM Symposium on Principles of Distributed Computing + (PODC)}, + year = 2000, +} + % month = jul, + % url = {http://link.springer.com/article/10.1007/s00145-005-0318-0}, + +@inproceedings{ cachin01secure, + author = {Christian Cachin and Klaus Kursawe and Frank Petzold + and Victor Shoup}, + title = {\href{http://www.zurich.ibm.com/~cca/papers/abc.pdf}{Secure and Efficient Asynchronous Broadcast Protocols}}, + booktitle = {Advances in Cryptology (CRYPTO)}, + year = 2001, +} + % month = aug, + % url = {http://www.zurich.ibm.com/~cca/papers/abc.pdf}, + +@inproceedings{ cachin02asynchronous, + author = {Christian Cachin and Klaus Kursawe and Anna Lysyanskaya and + Reto Strobl}, + title = {\href{https://dl.acm.org/citation.cfm?id=586124}{Asynchronous Verifiable Secret Sharing and Proactive Cryptosystems}}, + booktitle = {\bibconf[9th]{CCS}{ACM Conference on + Computer and Communications Security}}, + month = nov, + year = 2002, +} + +@inproceedings{ cachin02secure, + author = {Christian Cachin and Jonathan A. Poritz}, + title = {\href{https://cachin.com/cc/papers/sintra.pdf}{Secure Intrusion-tolerant Replication on the Internet}}, + booktitle = {\bibconf{DSN}{Dependable Systems and Networks}}, + month = jun, + year = 2002, + location = {Bethesda, MD, USA}, +} + +@inproceedings{ cachin04secure, + author = {Christian Cachin and Asad Samar}, + title = {Secure distributed {DNS}}, + booktitle = {Dependable Systems and Networks (DSN)}, + month = jul, + year = 2004, + url = {http://www.zurich.ibm.com/~cca/papers/dnsrepl.pdf}, +} + +@article{ cachin05random, + title={Random oracles in {Constantinople}: Practical asynchronous Byzantine agreement using cryptography}, + author={Cachin, Christian and Kursawe, Klaus and Shoup, Victor}, + journal={Journal of Cryptology}, + volume={18}, + number={3}, + pages={219--246}, + year={2005}, + publisher={Springer} +} + +@inproceedings{ cai12touching, + author = {Xiang Cai and Xin Cheng Zhang and Brijesh Joshi + and Rob Johnson}, + title = {\href{https://nymity.ch/tor-dns/pdf/Cai2012a.pdf}{Touching from a Distance: Website Fingerprinting Attacks and Defenses}}, + booktitle = {ACM Conference on Computer and Communications Security}, + month = oct, + year = 2012, +} + +@inproceedings{ calandrino07machine, + author = {Joseph A. Calandrino and J. Alex Halderman and Edward W. Felten}, + title = {\href{https://www.usenix.org/legacy/event/evt07/tech/full_papers/calandrino/calandrino_html/}{Machine-Assisted Election Auditing}}, + booktitle = {\bibconf{ETV}{USENIX/ACCURATE Electronic Voting Technology Workshop}}, + month = aug, + year = 2007, +} + +@misc{callas07openpgp, + title={\href{https://tools.ietf.org/html/rfc4880}{RFC 4880: OpenPGP Message Format}}, + author={Callas, J. and Donnerhacke, L. and Finney, H. and Shaw, D. and Thayer, R.}, + year={2007}, +} + +@inproceedings{ camenisch97efficient, + title={Efficient group signature schemes for large groups}, + author={Camenisch, Jan and Stadler, Markus}, + booktitle={CRYPTO '97}, + month=aug, + year={1997}, + location={Santa Barbara, CA}, +} + +@inproceedings{ camenisch01efficient, + title={An efficient system for non-transferable anonymous credentials with optional anonymity revocation}, + author={Jan Camenisch and Anna Lysyanskaya}, + booktitle={EUROCRYPT}, + month = may, + year=2001 +} + +@inproceedings{ camenisch02dynamic, + title={Dynamic accumulators and application to efficient revocation of + anonymous credentials}, + author={Jan Camenisch and Anna Lysyanskaya}, + booktitle={\bibconf[22nd]{CRYPTO}{Annual International Cryptology Conference}}, + location={Santa Barbara, CAT}, + month=aug, + year=2001 +} + +@inproceedings{camenisch05compact, + author = {Camenisch, Jan and + Hohenberger, Susan and + Lysyanskaya, Anna}, + title = {Compact e-cash}, + booktitle = {\bibconf[24th]{EUROCRYPT}{International Conference + on the theory and Applications of Cryptographic Techniques}}, + location = {Aarhus, Denmark}, + month = may, + year = 2005 +} + +@inproceedings{camenisch06balancing, + author={Jan Camenisch and + Susan Hohenberger and + Anna Lysyanskaya}, + title={Balancing Accountability and Privacy Using E-Cash (Extended Abstract)}, + booktitle = {\bibconf[5th]{SCN}{Security and Cryptography for Networks}}, + location = {Maiori, Italy}, + month = sep, + year = 2006 +} + +@inproceedings{camenisch07endorsed, + author={Jan Camenisch and + Anna Lysyanskaya and + Mira Meyerovich}, + title={Endorsed e-cash}, + booktitle={\bibconf[28th]{S{\&}P}{IEEE Symposium on Security and Privacy}}, + location={Oakland, CA}, + month=may, + year=2007 +} + +@inproceedings{camenisch08cred, + author = {Camenisch, Jan and Gro\ss, Thomas}, + title = {Efficient attributes for anonymous credentials}, + booktitle = {Proceedings of the 14th ACM Conference on Computer and Communications Security}, + series = {{CCS}}, year = {2008}, + pages = {345--356}, + publisher = {ACM}, +} + + +@inproceedings{ cao13redefining, + author = {Yinzhi Cao and Vaibhav Rastogi and Zhichun Li and Yan Chen + and Alexander Moshchuk}, + title = {Redefining Web Browser Principals with a + Configurable Origin Policy}, + booktitle = {\bibconf[43rd]{DSN}{IEEE/IFIP International Conference + on Dependable Systems and Networks}}, + month = jun, + year = 2013, + location = {Budapest}, +} + +@inproceedings{ cappos08look, + author = {Justin Cappos and Justin Samuel and Scott Baker + and John H. Hartman}, + title = {\href{http://www.cs.arizona.edu/stork/packagemanagersecurity/ccs2008.pdf}{A Look In the Mirror: Attacks on Package Managers}}, + booktitle = {\bibconf[15th]{CCS}{ACM Conference on + Computer and Communications Security}}, + month = oct, + year = 2008, + location = {Alexandria, VA}, +} + +@inproceedings{ cappos13avoiding, + author = {Justin Cappos}, + title = {Avoiding Theoretical Optimality to Efficiently + and Privately Retrieve Security Updates}, + booktitle = {\bibconf[17th]{FC}{Financial Cryptography and Data Security}}, + month = apr, + year = 2013, +} + +@inproceedings{ cascudo17scrape, + author = {Ignacio Cascudo and Bernardo David}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-319-61204-1_27}{SCRAPE: Scalable Randomness Attested by Public Entities}}, + booktitle = {\bibconf[15th]{ACNS}{International Conference on Applied Cryptography and Network Security}}, + month = jul, + year = 2017, + location = {Kanazawa, Japan}, +} + +@article{ castiglione07advantages, + author = "A. Castiglione and A. De Santis and C. Soriente", + title = "Taking advantages of a disadvantage: Digital forensics and steganography using document metadata", + journal = "Journal of Systems and Software", + volume = "80", + number = "5", + pages = "750 - 764", + year = "2007", +} + +@inproceedings{cha03identity, + title={An identity-based signature from gap Diffie-Hellman groups}, + author={Cha, Jae Choon and Cheon, Jung Hee}, + booktitle={{PKC}}, + volume={2567}, + pages={18--30}, + year={2003} +} + +@inproceedings{chandra07paxos, + title={Paxos made live: an engineering perspective}, + author={Chandra, Tushar D and Griesemer, Robert and Redstone, Joshua}, + booktitle={Proceedings of the twenty-sixth annual ACM symposium on Principles of distributed computing}, + pages={398--407}, + year={2007} +} + +@article{ chanthadavong15biometrics, + author = {Aimee Chanthadavong}, + title = {\href{https://www.zdnet.com/article/biometrics-the-password-you-cannot-change/}{Biometrics: The password you cannot change}}, + journal = {ZDNet}, + month = aug, + year = 2015, +} + +@inproceedings{chase16transparency, + title={Transparency Overlays and Applications}, + author={Chase, Melissa and Meiklejohn, Sarah}, + booktitle={Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, + pages={168--179}, + year={2016}, + organization={ACM} +} + +@inproceedings{chaum82blind, + title={Blind Signatures for Untraceable Payments.}, + author={Chaum, David}, + booktitle = {\bibconf{CRYPTO}{International Cryptology Conference}}, + year={1982} +} + +@inproceedings{chaum86demonstrating, + title={Demonstrating possession of a discrete logarithm without revealing it}, + author={Chaum, David and Evertse, Jan-Hendrik and van de Graaf, Jeroen and Peralta, Ren{\'e}}, + booktitle={Conference on the Theory and Application of Cryptographic Techniques}, + pages={200--212}, + year={1986}, + organization={Springer} +} + +@inproceedings{ chaum88untraceable, + author = {David Chaum and Amos Fiat and Moni Naor}, + title = {Untraceable Electronic Cash}, + booktitle = {\bibconf{CRYPTO}{International Cryptology Conference}}, + month = aug, + year = 1988, + location = {Santa Barbara, CA}, +} + +@inproceedings{chaum91group, + title={Group signatures}, + author={Chaum, David and Van Heyst, Eug{\`e}ne}, + booktitle={\bibconf{EUROCRYPT}{Advances in Cryptology}}, + month = apr, + year = 1991 +} + +@inproceedings{ chaum92wallet, + author = {Chaum, David and Pedersen, Torben P.}, + title = {Wallet Databases with Observers}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + year = {1992}, +} + +@misc{ chaum16random, + author = {David Chaum}, + title = {\href{https://rsvoting.org/whitepaper/white_paper.pdf}{Random-Sample Voting}}, + year = 2016, +} + +@inproceedings{checkoway11comprehensive, + title={Comprehensive Experimental Analyses of Automotive Attack Surfaces}, + author={Checkoway, Stephen and McCoy, Damon and + Kantor, Brian and Anderson, Danny and Shacham, Hovav and Savage, Stefan and + Koscher, Karl and Czeskis, Alexei and Roesner, Franziska and Kohno, Tadayoshi}, + booktitle={{USENIX} Security Symposium}, + year={2011} +} + +@inproceedings{checkoway14practical, + title={On the practical exploitability of {Dual EC} in {TLS} implementations}, + author={Checkoway, Stephen and Fredrikson, Matthew and Niederhagen, Ruben and Everspaugh, Adam and Green, Matthew and Lange, Tanja and Ristenpart, Thomas and Bernstein, Daniel J and Maskiewicz, Jake and Shacham, Hovav}, + booktitle={USENIX Security Symposium}, + year={2014} +} + + +@inproceedings{chen13splitx, + author = {Ruichuan Chen and + Istemi Ekin Akkus and + Paul Francis}, + title = {Split{X}: {H}igh-Performance Private Analytics}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + location = {Hong Kong, China}, + month = aug, + year = 2013 +} + +@article{cheng18ekiden, + title={\href{https://arxiv.org/pdf/1804.05141.pdf}{Ekiden: A Platform for Confidentiality-Preserving, Trustworthy, and + Performant Smart Contract Execution}}, + author={Cheng, Raymond and Zhang, Fan and Kos, Jernej and He, Warren and Hynes, Nicholas and Johnson, Noah and Juels, Ari and Miller, Andrew and Song, Dawn}, + journal={arXiv preprint arXiv:1804.05141}, + year={2018} +} + +@inproceedings{cherif11optimistic, + title={\href{https://dl.acm.org/citation.cfm?id=1982374}{Optimistic + access control for distributed collaborative editors}}, + author={Cherif, Asma and Imine, Abdessamad and Rusinowitch, + Micha{\"e}l}, + booktitle={ACM Symposium on Applied Computing}, + pages={861--868}, + year={2011} +} + +@article{ chesney18deep, + author = {Robert Chesney and Danielle Keats Citron}, + title = {\href{https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3213954}{Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security}}, + journal = {California Law Review}, + month = jul, + year = 2018, +} + +Chesney, Robert and Citron, Danielle Keats, Deep Fakes: A Looming Challenge for Privacy, Democracy, and National Security (July 14, 2018). 107 California Law Review (2019, Forthcoming); U of Texas Law, Public Law Research Paper No. 692; U of Maryland Legal Studies Research Paper No. 2018-21. Available at SSRN: https://ssrn.com/abstract=3213954 or http://dx.doi.org/10.2139/ssrn.3213954 + +@incollection{ chevallier06encoding, + author = {Chevallier-Mames, Benoît and Paillier, Pascal and Pointcheval, David}, + title = {Encoding-Free ElGamal Encryption Without Random Oracles}, + booktitle = {Public Key Cryptography - PKC 2006}, + series = {Lecture Notes in Computer Science}, + editor = {Yung, Moti and Dodis, Yevgeniy and Kiayias, Aggelos and Malkin, Tal}, + publisher = {Springer Berlin / Heidelberg}, + pages = {91-104}, + volume = {3958}, + year = {2006} +} + +@article{chokhani99internet, + title={Internet {X.509} public key infrastructure certificate policy and certification practices framework}, + author={Chokhani, Santosh and Ford, Warwick}, + year={1999}, + note={RFC 2527}, +} + +@inproceedings{ chor85verifiable, + author = {Benny Chor and Shafi Goldwasser and Silvio Micali and Baruch Awerbuch}, + title = {\href{https://ieeexplore.ieee.org/document/4568164}{Verifiable Secret Sharing and Achieving Simultaneity in the Presence of Faults}}, + booktitle = {\bibconf[26th]{SFCS}{Symposium on Foundations of Computer Science}}, + month = oct, + year = 1985, + location = {Portland, OR, USA}, +} + +@article{christin13incognisense, + author = {Delphine Christin and + Christian Ro{\ss}kopf and + Matthias Hollick and + Leonardo A. Martucci and + Salil S. Kanhere}, + title = {Incogni{S}ense: {A}n anonymity-preserving reputation + framework for participatory sensing applications}, + journal = {Pervasive and Mobile Computing}, + volume = {9}, + number = {3}, + pages = {353--371}, + year = 2013 +} + +@inproceedings{clark10beacon, + author = {Jeremy Clark and Urs Hengartner}, + title = {\href{https://www.usenix.org/conference/evtwote-10/use-financial-data-random-beacon}{On the Use of Financial Data as a Random Beacon}}, + booktitle = {\bibconf{EVT/WOTE}{Electronic Voting Technology Workshop/Workshop on Trustworthy Elections}}, + month = aug, + year = {2010}, + location = {Washington, DC, USA}, +} + +@inproceedings{clark13sok, + title={{SoK}: {SSL} and {HTTPS}: Revisiting past challenges and evaluating certificate trust model enhancements}, + author={Clark, Jeremy and van Oorschot, Paul C}, + booktitle = {{IEEE} Symposium on Security and Privacy}, + booktitle = {IEEE \bibconf[34th]{SP}{Symposium on Security and Privacy}}, + month = may, + year = {2013}, +} + +@inproceedings{clauss13kanonymous, + author = {Sebastian Clau{\ss} and + Stefan Schiffner and + Florian Kerschbaum}, + title = {\emph{k}-anonymous reputation}, + booktitle = {\bibconf[8th]{AsiaCCS}{ACM Symposium on Information, + Computer and Communications Security}}, + location = {Hangzhou, China}, + month = may, + year = 2013 +} + +@inproceedings{clement09making, + title={\href{https://www.usenix.org/legacy/events/nsdi09/tech/full_papers/clement/clement.pdf}{Making {Byzantine} Fault Tolerant Systems Tolerate Byzantine Faults}}, + author={Clement, Allen and Wong, Edmund L and Alvisi, Lorenzo and Dahlin, Michael and Marchetti, Mirco}, + booktitle={6th USENIX Symposium on Networked Systems Design and Implementation}, + year={2009}, +} + % month = apr, + % url={https://www.usenix.org/legacy/events/nsdi09/tech/full_papers/clement/clement.pdf}, + +@article{ cloudflare16cloudflare, + author = {CloudFlare, Inc.}, + title = {\href{https://www.cloudflare.com/}{CloudFlare - The web performance \& security company + }}, + month = may, + year = 2016, +} + +@article{ cohen08bittorent, + author = {Bram Cohen}, + title = {\href{http://www.bittorrent.org/beps/bep_0003.html}{The BitTorrent Protocol Specification}}, + month = jan, + year = 2008, +} + +@misc{coindesk180x, + author = {CoinDesk}, + title = {\href{https://www.coindesk.com/decentralized-exchange-crypto-dex}{Decentralized Exchanges Aren’t Living Up to Their Name - And Data Proves It}}, + month = jul, + year = 2018, +} + +@misc{coindeskethupgrade, + author = {CoinDesk}, + title = {\href{https://www.coindesk.com/ethereum-network-draws-developer-ire-after-scheduling-new-years-day-upgrade}{Ethereum Network Draws Developer Ire After Scheduling New Year’s Day Upgrade}}, + month = dec, + year = 2019, +} + +@article{ comodo11comodo, + author = {Comodo Group}, + title = {\href{https://www.comodo.com/Comodo-Fraud-Incident-2011-03-23.html}{Comodo Fraud Incident +}}, + month = jul, + year = 2015, +} + +@misc{ conner-simons19programmers, + author = {Adam Conner-Simons}, + title = {\href{https://www.csail.mit.edu/news/programmers-solve-mits-20-year-old-cryptographic-puzzle}{Programmers solve MIT’s 20-year-old cryptographic puzzle}}, + month = apr, + year = 2019, +} + +@inproceedings{ corrigangibbs13conscript, + author = {Corrigan-Gibbs, Henry and Ford, Bryan}, + title = {Conscript your friends into larger anonymity sets with {JavaScript}}, + booktitle = {\bibconf{WPES}{Workshop in Privacy in the Electronic Society}}, + month = nov, + year = {2013}, + comment = {workshop}, +} + +@misc{ corrigangibbs13conscript-ext, + year = {2013}, + month = sep, + title = {Conscript Your Friends into Larger Anonymity Sets with {JavaScript} + (Extended version)}, + howpublished = {\url{http://arxiv.org/abs/1309.0958}}, + author = {Henry Corrigan-Gibbs and Bryan Ford}, +} + +@inproceedings{ corrigangibbs13ensuring, + author = {Corrigan-Gibbs, Henry and Mu, Wendy and Boneh, Dan and Ford, Bryan}, + title = {Ensuring High-Quality Randomness in Cryptographic Key Generation}, + booktitle = {\bibconf[20th]{CCS}{ACM Conference on + Computer and Communications Security}}, + month = nov, + year = {2013}, + comment = {conference}, + day = {4}, + venueurl = {www.sigsac.org/ccs/CCS2013/}, +} + +@inproceedings{ corrigangibbs13proactively, + author = {Corrigan-Gibbs, Henry and Wolinsky, David Isaac + and Ford, Bryan}, + title={Proactively Accountable Anonymous Messaging in {Verdict}}, + booktitle={22nd USENIX Security Symposium}, + month = aug, + year = 2013, + location = {Washington, DC}, +} + +@techreport{ corrigangibbs13proactively-tr, + title={Proactively Accountable Anonymous Messaging in {Verdict}}, + author={Henry Corrigan-Gibbs and David Isaac Wolinsky and Bryan Ford}, + number = {YALEU/DCS/TR1478}, + month = jun, + year = 2013, + institution = {Department of Computer Science, Yale University}, +} + +@inproceedings{ costello15geppetto, + author = {Craig Costello and C\'edric Fournet and Jon Howell and + Markulf Kohlweiss and Benjamin Kreuter and Michael Naehrig and + Bryan Parno and Samee Zahur}, + title = {\href{https://ieeexplore.ieee.org/abstract/document/7163030}{Geppetto: Versatile Verifiable Computation}}, + booktitle = {IEEE Security and Privacy}, + month = may, + year = 2015, +} + +@misc{coyne14keybase, + title = {\href{https://keybase.io}{Keybase.io}}, + author = {Chris Coyne and Maxwell Krohn}, + year = 2014, +} + +@inproceedings{ cramer94proofs, + title={Proofs of partial knowledge and simplified design of witness hiding protocols}, + author={Cramer, Ronald and Damg{\aa}rd, Ivan and Schoenmakers, Berry}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + pages={174--187}, + year={1994}, +} + +@inproceedings{ cramer97advances, + author = {Ronald Cramer and + Rosario Gennaro and + Berry Schoenmakers}, + title={A Secure and Optimally Efficient Multi-Authority Election Scheme}, + booktitle = {\bibconf{EUROCRYPT}{{Conference on Theory and applications + of cryptographic techniques}}}, + location = {Konstanz, Germany}, + month = may, + year = 1997 +} + +@incollection{ cramer98zero, + year={1998}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + volume={1462}, + series={Lecture Notes in Computer Science}, + editor={Krawczyk, Hugo}, + title={Zero-knowledge proofs for finite field arithmetic, or: Can zero-knowledge be for free?}, + author={Cramer, Ronald and Damgård, Ivan}, + pages={424-441} +} + +@inproceedings{ cramer00general, + author = {Ronald Cramer and Ivan Dam\r{g}ard and Ueli Maurer}, + title = {\href{https://link.springer.com/chapter/10.1007/3-540-45539-6_22}{General Secure Multi-party Computation from any Linear Secret-Sharing Scheme}}, + booktitle = {Eurocrypt}, + month = may, + year = 2000, + location = {Bruges, Belgium}, +} + +@article{cramer01design, + author = {Ronald Cramer and Victor Shoup}, + title = {Design and Analysis of Practical Public-Key Encryption Schemes Secure against Adaptive Chosen Ciphertext Attack}, + journal = {SIAM Journal on Computing}, + year = {2001}, + volume = {33}, + pages = {167--226} +} + +@inproceedings{ cramer01multiparty, + author = {Ronald Cramer and Ivan Damg\r{a}rd and Jesper B. Nielsen}, + title = {\href{https://link.springer.com/chapter/10.1007/3-540-44987-6_18}{Multiparty Computation from Threshold Homomorphic Encryption}}, + booktitle = {Eurocrypt}, + month = may, + year = 2001, +} + +@inproceedings{cristofaro12fast, + author = {Emiliano De Cristofaro and + Paolo Gasti and + Gene Tsudik}, + title = {Fast and Private Computation of Cardinality of Set Intersection + and Union}, + booktitle = {CANS}, + month = dec, + year = 2012 +} + +@inproceedings{cristofaro13linear, + author = {Emiliano De Cristofaro and + Jihye Kim and + Gene Tsudik}, + title = {Linear-Complexity Private Set Intersection Protocols Secure + in Malicious Model}, + booktitle = {ASIACRYPT}, + year = {2010} +} + +@inproceedings{ croman16scaling, + author = {Kyle Croman and Christian Decke and Ittay Eyal and Adem Efe Gencer and Ari Juels and Ahmed Kosba and Andrew Miller and Prateek Saxena and Elaine Shi and Emin Gun Sirer and Dawn Song an and Roger Wattenhofer}, + title = {\href{http://fc16.ifca.ai/bitcoin/papers/CDE+16.pdf}{On Scaling Decentralized Blockchains (A Position Paper)}}, + booktitle = {3rd Workshop on Bitcoin and Blockchain Research}, + year = {2016}, + url = {http://fc16.ifca.ai/bitcoin/papers/CDE+16.pdf}, +} + +@inproceedings{ crosby09efficient, + author = {Scott A. Crosby and Dan S. Wallach}, + title = {Efficient Data Structures for Tamper-Evident Logging}, + booktitle = {USENIX Security Symposium}, + month = aug, + year = 2009, + location = {Montreal, Canada}, +} + +@misc{curiousmind18firelotto, + author = {CuriosMind}, + title = {\href{https://medium.com/@Curious_Mind/worlds-hottest-decentralized-lottery-powered-by-blockchain-90a35bad464a}{World's Hottest Decentralized Lottery Powered by Blockchain}}, + month = feb, + year = 2018, +} + +@inproceedings{cui15paxos, + title={Paxos made transparent}, + author={Cui, Heming and Gu, Rui and Liu, Cheng and Chen, Tianyu and Yang, Junfeng}, + booktitle={Proceedings of the 25th Symposium on Operating Systems Principles}, + pages={105--120}, + year={2015} +} + +@misc{ czernik18frontrunning, + author = {Matt Czernik}, + title = {\href{https://medium.com/@matt.czernik/on-blockchain-frontrunning-part-i-cut-the-line-or-make-a-new-one-b33850663b55}{On Blockchain Frontrunning}}, + month = feb, + year = 2018, +} + +%D + +@inproceedings{dachman-soled09efficient, + author = {Dana Dachman-Soled and + Tal Malkin and + Mariana Raykova and + Moti Yung}, + title = {Efficient Robust Private Set Intersection}, + booktitle = {\bibbrev{ACNS}{Applied Cryptography and Network Security}}, + year = {2009} +} + +@inproceedings{ dacosta12trust, + author = {Italo Dacosta and Mustaque Ahamad and Patrick Traynor}, + title = {Trust No One Else: Detecting {MITM} Attacks against {SSL/TLS} + without Third-Parties}, + booktitle = {\bibconf[17th]{ESORICS}{European Symposium on + Research in Computer Security}}, + month = sep, + year = 2012, + location = {Pisa, Italy}, +} + +@misc{ dai96pipenet, + author = {Wei Dai}, + title = {{PipeNet 1.1}}, + year = 1996, + month = aug, + note = {UseNet post. \url{http://www.weidai.com/pipenet.txt}}, +} + +@article{daian2016dao, + author = {Phil Daian}, + title = {\href{https://web.archive.org/web/20191001182349/https://hackingdistributed.com/2016/06/18/analysis-of-the-dao-exploit/}{Analysis of the DAO exploit}}, + year={2016} +} + +@misc{ daian18on-chain, + author = {Philip Daian and Tyler Kell and Ian Miers and Ari Juels}, + title = {\href{http://hackingdistributed.com/2018/07/02/on-chain-vote-buying/}{On-Chain Vote Buying and the Rise of Dark DAOs}}, + month = jul, + day = 2, + year = 2018, + note = {\href{http://hackingdistributed.com}{Hacking, Distributed}}, +} + +@inproceedings{ damgaard01generalisation, + title={A Generalisation, a Simpli. cation and Some Applications of Paillier's Probabilistic Public-Key System}, + author={Damg{\aa}rd, Ivan and Jurik, Mads}, + booktitle={Public Key Cryptography}, + pages={119--136}, + year={2001}, + organization={Springer} +} + +@inproceedings{damgard09asynchronous, + title={Asynchronous multiparty computation: Theory and implementation}, + author={Damg{\aa}rd, Ivan and Geisler, Martin and Kroig{\aa}rd, Mikkel and Nielsen, Jesper Buus}, + booktitle={International Conference on Practice and Theory in Public-Key Cryptography}, + publisher={Springer}, + month={March}, + year={2009} +} + +@misc{damgard02sigma, + title={\href{http://www.cs.au.dk/~ivan/Sigma.pdf}{On {$\Sigma$}-protocols}}, + author={Damg\r{a}rd, Ivan}, + year = 2010, +} + +@article{danezis16centrally, + title={\href{https://eprint.iacr.org/2015/502.pdf}{Centrally Banked Cryptocurrencies}}, + author={Danezis, George and Meiklejohn, Sarah}, + journal={\bibconf[23rd]{NDSS}{Annual Network \& Distributed System Security + Symposium}}, + location = {San Diego, CA}, + month = Feb, + year=2016 +} + +@article{danezis18blockmania, + title={Blockmania: from Block DAGs to Consensus}, + author={Danezis, George and Hrycyszyn, David}, + journal={arXiv preprint arXiv:1809.01620}, + year={2018} +} + + +@inproceedings{ danezis04statistical, + title = {Statistical Disclosure or Intersection Attacks on Anonymity Systems}, + author = {Danezis, George and Serjantov, Andrei}, + booktitle = {Workshop on Information Hiding}, + year = {2004}, + month = {May}, + location = {Toronto, Ontario, Canada}, +} + +@article{ davidson13strongbox, + author = {Amy Davidson}, + title = {Introducing Strongbox}, + journal = {The New Yorker}, + month = may, + day = 15, + year = 2013, +} + +@article{ davis96kerberos, + author = {Donald T. Davis and Daniel E. Geer and Theodore Ts'o}, + title = {\href{https://www.usenix.org/legacy/publications/compsystems/1996/win_davis.pdf}{Kerberos With Clocks Adrift: History, Protocols, and Implementation}}, + journal = {Computing systems}, + volume = 9, + number = 1, + year = 1996, + pages = {29-46}, +}, + +@InProceedings{decker16bitcoin, + author = {Christian Decker and Jochen Seidel and Roger Wattenhofer}, + title = {\href{http://www.tik.ee.ethz.ch/file/ed3e5da74fbca5584920e434d9976a12/peercensus.pdf}{Bitcoin Meets Strong Consistency}}, + booktitle = {{17th International Conference on Distributed Computing and Networking (ICDCN), Singapore}}, + month = {January}, + year = {2016}, + url = {http://www.tik.ee.ethz.ch/file/ed3e5da74fbca5584920e434d9976a12/peercensus.pdf}, +} + + +@misc{ delacruz18blockchain, + author = {Juan Delacruz, IBM Blockchain}, + title = {\href{https://www.ibm.com/blogs/blockchain/2018/02/blockchain-is-tackling-the-challenge-of-data-sharing-in-government/}{Blockchain is tackling the challenge of data sharing in government}}, + month = may, + year = 2018, +} + +@inproceedings{ delaune06coercion, + author = {Ste\'ephanie Delaune and Steve Kremer and Mark Ryan}, + title = {\href{https://ieeexplore.ieee.org/abstract/document/1648706}{Coercion-Resistance and Receipt-Freeness in Electronic Voting}}, + booktitle = {\bibconf[19th]{CSFW}{IEEE Computer Security Foundations Workshop}}, + month = jul, + year = 2006, +} + +@inproceedings{delmolino16step, + title={\href{https://link.springer.com/chapter/10.1007/978-3-662-53357-4_6}{Step by Step Towards Creating a Safe Smart Contract: Lessons and Insights from a Cryptocurrency Lab}}, + author={Delmolino, Kevin and Arnett, Mitchell and Kosba, Ahmed and Miller, Andrew and Shi, Elaine}, + booktitle={International Conference on Financial Cryptography and Data Security}, + pages={79--94}, + year={2016}, + organization={Springer} +} + +@article{denning96key, + title={Key escrow encryption systems}, + author={Denning, Dorothy E and Branstad, Dennis K}, + journal={Communications of the ACM}, + volume={39}, + number={3}, + pages={35}, + year={1996} +} + +@inproceedings{ desmedt87tampering, + title={Public-key systems based on the difficulty of tampering (Is there a difference between {DES} and {RSA}?)}, + author={Desmedt, Yvo and Quisquater, Jean-Jacques}, + booktitle={\bibconf{CRYPTO}{Advances in Cryptology}}, + year={1987}, +} + +@inproceedings{ desmedt89threshold, + author = {Yvo Desmedt and Yair Frankel}, + title = {Threshold cryptosystems}, + booktitle = {\bibconf{CRYPTO}{Advances in Cryptology}}, + month = aug, + year = 1989, +} + +@article{ dey10pseudoid, + title={{PseudoID}: Enhancing privacy in federated login}, + author={Dey, Arkajit and Weis, Stephen}, + journal={\bibconf{HotPETs}{Hot topics in privacy enhancing technologies}}, + year={2010} +} + +@inproceedings{di2006deniable, + title={Deniable authentication and key exchange}, + author={Di Raimondo, Mario and Gennaro, Rosario and Krawczyk, Hugo}, + booktitle = {\bibconf{CCS}{ACM conference on computer and + communications security}}, + year={2006}, +} + +@inproceedings{diaz02measuring, + author = {D\'{\i}az, Claudia and Seys, Stefaan and Claessens, Joris and Preneel, Bart}, + title = {Towards measuring anonymity}, + booktitle = {Proceedings of the 2nd international conference on Privacy enhancing technologies}, + series = {PET'02}, + year = {2003}, +} + +@incollection{diaz07accountable, + title={Accountable anonymous communication}, + author={Diaz, Claudia and Preneel, Bart}, + booktitle={Security, Privacy, and Trust in Modern Data Management}, + pages={239--253}, + year={2007}, + publisher={Springer} +} + +@inproceedings{dingledine03reputation, + author = {Roger Dingledine and Nick Mathewson and Paul Syverson}, + title = {Reputation in P2P Anonymity Systems}, + booktitle = {In Workshop on Economics of Peer-to-Peer Systems}, + year = {2003} +} + +@inproceedings{ dingledine09performance, + author = {Roger Dingledine and Steven J. Murdoch}, + title = {Performance Improvements on {Tor} or, + Why {Tor} is slow and what we're going to do about it}, + booktitle = {DEFCON 17}, + month = jul, + year = 2009, + location = {Las Vegas, NV}, + url = {http://www.hackerjeopardy.com/images/defcon-17/dc-17-presentations/defcon-17-roger_dingledine-tor.pdf}, +} + +@article{dierks08transport, + title={The transport layer security (TLS) protocol version 1.2}, + author={Dierks, Tim}, + year={2008} +} + +@article{diffie76new, + title={New directions in cryptography}, + author={Diffie, Whitfield and Hellman, Martin E}, + journal={IEEE \bibconf{IT}{Transactions on Information Theory}}, + year={1976}, +} + +@misc{digistamp, + key = {digistamp}, + title = {Digi{S}tamp - {T}rusted {T}ime{S}tamp {A}uthority}, + howpublished = {\url{https://www.digistamp.com/}} +} + +@inproceedings{dinur03revealing, + title={\href{https://dl.acm.org/citation.cfm?id=773173}{Revealing information while preserving privacy}}, + author={Dinur, Irit and Nissim, Kobbi}, + booktitle={Proceedings of the twenty-second ACM SIGMOD-SIGACT-SIGART symposium on Principles of database systems}, + pages={202--210}, + year={2003}, + organization={ACM} +} + +@article{ doctorow16using, + author = {Cory Doctorow}, + title = {\href{http://boingboing.net/2016/03/10/using-distributed-code-signatu.html}{Using distributed code-signatures to make it much harder to order secret backdoors}}, + journal = {BoingBoing}, + month = mar, + year = 2016, +} + +@inproceedings{ dodis04anonymous, + title={Anonymous identification in ad hoc groups}, + author={Dodis, Y. and Kiayias, A. and Nicolosi, A. and Shoup, V.}, + booktitle={Eurocrypt}, + pages={609--626}, + year={2004}, +} + +@inproceedings{dodis05verifiable, + title={A verifiable random function with short proofs and keys}, + author={Dodis, Yevgeniy and Yampolskiy, Aleksandr}, + booktitle={International Workshop on Public Key Cryptography}, + pages={416--431}, + year={2005}, + organization={Springer} +} + +@inproceedings{ dodis18fast, + title={\href{https://eprint.iacr.org/2019/016.pdf}{Fast message franking: From invisible salamanders to encryptment}}, + author={Dodis, Yevgeniy and Grubbs, Paul and Ristenpart, Thomas and Woodage, Joanne}, + booktitle={Annual International Cryptology Conference (CRYPTO)}, + pages={155--186}, + year={2018} +} + +@inproceedings{dong13private, + author = {Changyu Dong and Liqun Chen and Zikai Wen}, + title = {When Private Set Intersection Meets Big Data: An Efficient and Scalable Protocol}, + booktitle = {\bibconf{CCS}{ACM Conference on Computer and Communications Security}}, + year = {2013}, + moth = nov +} + +@inproceedings{ dong13protecting, + author = {Xinshu Dong and Zhaofeng Chen and Hossein Siadati and + Shruti Tople and Prateek Saxena and Zhenkai Liang}, + title = {Protecting Sensitive Web Content from + Client-side Vulnerabilities with {CRYPTONs}}, + booktitle = {\bibconf[20th]{CCS}{ACM conference on + Computer and communications security}}, + month = nov, + year = 2013, + location = {Berlin, Germany}, +} + +@inproceedings{ dorrendorf07cryptanalysis, + author = {Dorrendorf, Leo and Gutterman, Zvi and Pinkas, Benny}, + title = {Cryptanalysis of the {Windows} Random Number Generator}, + booktitle = {Proceedings of the 14th ACM Conference on Computer and Communications Security}, + series = {{CCS}}, + year = {2007}, + pages = {476--485}, +} + + +@inproceedings{ drijvers19security, + author = {Manu Drijvers and Kasra Edalatnejad and Bryan Ford and Eike Kiltz + and Julian Loss and Gregory Neven and Igors Stepanovs}, + title = {On the Security of Two-Round Multi-Signatures}, + booktitle = {\bibconf[40th]{SP}{IEEE Symposium on Security and Privacy}}, + month = may, + year = 2019, +} + + +@inproceedings{ duan18beat, + author = {Sisi Duan and Michael K. Reiter and Haibin Zhang}, + title = {\href{https://dl.acm.org/citation.cfm?id=3243812}{BEAT: Asynchronous BFT Made Practical}}, + booktitle = {\bibconf{CCS}{Computer and Communications Security}}, + month = oct, + year = 2018, + location = {Toronto, Canada}, +} + +@article{dubovitskaya17secure, + title={\href{https://arxiv.org/pdf/1709.06528.pdf}{Secure and Trustable Electronic Medical Records Sharing using Blockchain}}, + author={Dubovitskaya, Alevtina and Xu, Zhigang and Ryu, Samuel and Schumacher, Michael and Wang, Fusheng}, + journal={arXiv preprint arXiv:1709.06528}, + year={2017} +} + +@article{ dufaux08scrambling, + author = {Fr\'ed\'eric Dufaux and Touradj Ebrahimi}, + title = {Scrambling for Privacy Protection in + Video Surveillance Systems}, + journal = {IEEE Transactions on Circuits and Systems + for Video Technology}, + volume = 18, + number = 8, + year = 2008, + pages = {1168--1174}, +} + +@inproceedings{dunn12eternal, + title={Eternal sunshine of the spotless machine: Protecting privacy with ephemeral channels}, + author={Dunn, Alan M and Lee, Michael Z and Jana, Suman and Kim, Sangman and Silberstein, Mark and Xu, Yuanzhong and Shmatikov, Vitaly and Witchel, Emmett}, + booktitle={Proc. of the USENIX Symposium on Operating Systems Design and Implementation (OSDI)}, + year={2012} +} + +@article{ durden15tiger, + author = {Tyler Durden}, + title = {\href{https://www.zerohedge.com/news/2015-08-13/1300-tiger-penis-800k-snipers-complete-black-market-price-guide}{From \$1,300 Tiger Penis To \$800K Snipers: The Complete Black Market Price Guide}}, + journal = {ZeroHedge}, + month = aug, + day = 13, + year = 2015, +} + +@misc{durham11namecoin, + title = {\href{https://namecoin.info/}{Namecoin}}, + author={Vincent Durham}, + year={2011}, +} + +@inproceedings{ dwork92pricing, + author = {Cynthia Dwork and Moni Naor}, + title = {\href{https://link.springer.com/chapter/10.1007%2F3-540-48071-4_10}{Pricing via Processing or Combatting Junk Mail}}, + booktitle = {\bibconf[12th]{CRYPTO}{Advances in Cryptology}}, + month = aug, + year = 1992, + location = {Santa Barbara, California, USA}, +} + +@inproceedings{ dwork08differential, + author = {Cynthia Dwork}, + title = {Differential Privacy: A Survey of Results}, + booktitle = {International Conference on Theory and Applications + of Models of Computation (TAMC)}, + year = 2008, +} + +@inproceedings{ dyer12peekaboo, + author = {Kevin P. Dyer and Scott E. Coull and Thomas Ristenpart + and Thomas Shrimpton}, + title={\href{https://kpdyer.com/publications/oakland2012-peekaboo.pdf}{Peek-a-Boo, {I} Still See You: Why Efficient Traffic Analysis Countermeasures Fail}}, + booktitle = {IEEE Symposium on Security and Privacy}, + month = may, + year = 2012 +} + +@inproceedings{ dziembowski15proofs, + author = {Stefan Dziembowski and Sebastian Faust and + Vladimir Kolmogorov and Krzysztof Pietrzak}, + title = {\href{https://eprint.iacr.org/2013/796.pdf}{Proofs of Space}}, + booktitle = {35th International Cryptology Conference (CRYPTO)}, + month = aug, + year = 2015, +} + +%E + +@misc{eff11observatory, + title = {\href{https://www.eff.org/observatory}{The EFF SSL Observatory}}, + author={{Electronic Frontier Foundation}}, + year={2011}, +} + +@inproceedings{egele13empirical, + title={An Empirical Study of Cryptographic Misuse in {Android} Applications}, + author={Egele, Manuel and Brumley, David and Fratantonio, Yanick and Kruegel, Christopher}, + booktitle = {\bibconf[20th]{CCS}{ACM conference on computer and + communications security}}, + year={2013}, + month=nov, +} + +@misc{eip18, + title={\href{http://eips.ethereum.org/EIPS/eip-665}{EIP 665: Add precompiled contract for Ed25519 signature + verification}}, + author={Oberstein, Tobias}, + month=mar, + year=2018, +} + +@inproceedings{el12efficient, + title={\href{https://link.springer.com/chapter/10.1007%2F978-3-642-30955-7_14}{An efficient lattice-based secret sharing construction}}, + author={El Bansarkhani, Rachid and Meziani, Mohammed}, + booktitle={IFIP International Workshop on Information Security Theory and Practice}, + pages={160--168}, + year={2012}, + organization={Springer} +} + +@article{elgamal85crypto, + author={Taher Elgamal}, + journal={IEEE Transactions on Information Theory}, + title={\href{https://ieeexplore.ieee.org/abstract/document/1057074/}{A public key cryptosystem and a signature scheme based on discrete logarithms}}, + year={1985}, + volume={31}, + number={4}, + pages={469-472}, + doi={10.1109/TIT.1985.1057074}, + ISSN={0018-9448}, + month={July}, +} + +@article{elkins96mime, + title={MIME security with pretty good privacy}, + author={Elkins, M.}, + year={1996} +} + +@article{EU16GDPR, + title={\href{https://www.eugdpr.org/}{General Data Protection Regulation (GDPR)}}, + author={{European Parliament and Council of the European Union}}, + journal={Official Journal of the European Union (OJ)}, + volume={\href{https://eur-lex.europa.eu/legal-content/EN/TXT/?uri=CELEX:32016R0679}{L119}}, + pages={1--88}, + year={2016}, +} + +@article{ellis14guardian, + title={\href{https://www.theguardian.com/technology/2014/jun/05/guardian-launches-securedrop-whistleblowers-documents}{The Guardian introduces SecureDrop for document leaks}}, + author={Ellis, Justin}, + journal={Nieman Journalism Lab}, + year={2014} +} + +@misc{ellison07ceremony, + author = {Carl M. Ellison}, + title = {\href{http://eprint.iacr.org/2007/399}{Ceremony Design and Analysis}}, + journal = {{IACR} Cryptology ePrint Archive}, + pages = {399}, + year = {2007}, + url = {http://eprint.iacr.org/2007/399}, +} + +@misc{eos, + title={\href{https://eos.io/}{eosio | Blockchain software architecture}}, +} + +@inproceedings{ eskandari19transparent, + author = {Shayan Eskandari and Seyedehmahsa Moosavi and Jeremy Clark}, + title = {\href{http://fc19.ifca.ai/wtsc/TransparentDishonesty.pdf}{Transparent Dishonesty: front-running attacks on Blockchain}}, + booktitle = {\bibconf[3rd]{WTSC}{Workshop on Trusted Smart Contracts}}, + month = feb, + year = 2019, +} + +@inproceedings{ evans09practical, + author = {Nathan S. Evans and Roger Dingledine and Christian Grothoff}, + title = {A Practical Congestion Attack on {Tor} Using Long Paths}, + booktitle={18th USENIX Security Symposium}, + month = aug, + year = 2009, + location = {Montreal, Canada}, +} + +@article{everspaugh15pythia, + title={\href{https://eprint.iacr.org/2015/644.pdf}{The Pythia PRF Service.}}, + author={Everspaugh, Adam and Chatterjee, Rahul and Scott, Samuel and Juels, Ari and Ristenpart, Thomas and Tech, Cornell}, + journal={IACR Cryptology ePrint Archive}, + volume={2015}, + pages={644}, + year={2015} +} + + +@inproceedings{evfimievski03limiting, + author = {Alexandre V. Evfimievski and + Johannes Gehrke and + Ramakrishnan Srikant}, + title = {Limiting privacy breaches in privacy preserving data mining}, + booktitle = {PODS}, + year = {2003} +} + +@misc{ ey18health, + author = {Ernst \& Young}, + title = {\href{https://www.hyperledger.org/wp-content/uploads/2016/10/ey-blockchain-in-health.pdf}{Blockchain in health}}, + month = may, + year = 2018, +} + +@inproceedings{eyal16bitcoinng, + title = {\href{https://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-eyal.pdf}{{Bitcoin-NG}: A Scalable Blockchain Protocol}}, + author = {Eyal, Ittay and Gencer, Adem Efe and Sirer, Emin G\"un and van Renesse, Robbert}, + booktitle = {13th USENIX Symposium on Networked Systems Design and Implementation (NSDI 16)}, + year = {2016}, + month = Mar, + address = {Santa Clara, CA}, + url = {https://www.usenix.org/system/files/conference/nsdi16/nsdi16-paper-eyal.pdf}, + publisher = {USENIX Association}, +} + +@incollection{eyal14majority, + title={\href{https://www.cs.cornell.edu/~ie53/publications/btcProcFC.pdf}{Majority is not enough: {Bitcoin} mining is vulnerable}}, + author={Eyal, Ittay and Sirer, Emin G{\"u}n}, + booktitle={Financial Cryptography and Data Security}, + pages={436--454}, + year={2014}, + publisher={Springer}, + url={https://www.cs.cornell.edu/~ie53/publications/btcProcFC.pdf}, +} + + +%F + +@inproceedings{fahl14apptransparency, + author = {Fahl, Sascha and Dechand, Sergej and Perl, Henning and Fischer, Felix and Smrcek, Jaromir and Smith, Matthew}, + title = {\href{https://dl.acm.org/citation.cfm?id=2660311}{Hey, {NSA}: Stay Away from My Market! {Future} Proofing App Markets Against Powerful Attackers}}, + booktitle = {Proceedings of the 2014 ACM SIGSAC Conference on Computer and Communications Security}, + year = {2014}, + isbn = {978-1-4503-2957-6}, + numpages = {13}, + url = {http://doi.acm.org/10.1145/2660267.2660311}, + doi = {10.1145/2660267.2660311}, + acmid = {2660311}, + publisher = {ACM}, +} + location = {Scottsdale, Arizona, USA}, + keywords = {android, apps, market, nsa, security, transparency}, + address = {New York, NY, USA}, + pages = {1143--1155}, + series = {CCS '14}, + + + +@article{fan12somewhat, + title={\href{https://eprint.iacr.org/2012/144.pdf}{Somewhat Practical Fully Homomorphic Encryption.}}, + author={Fan, Junfeng and Vercauteren, Frederik}, + journal={IACR Cryptology ePrint Archive}, + volume={2012}, + pages={144}, + year={2012}, + publisher={Citeseer} +} + +@misc { federrath11monitor, + author = {Hannes Federrath}, + title = {The {Anonym-O-Meter}}, + howpublished = {\url{http://anon.inf.tu-dresden.de/help/jap_help/en/help/jap.JAPNewView_anonymometer.html}}, + year = {2013}, + month = {July} +} + +@inproceedings{feigenbaum17multiple, + title={\href{https://link.springer.com/chapter/10.1007/978-3-319-71075-4_2}{Multiple Objectives of Lawful-Surveillance Protocols (Transcript of Discussion)}}, + author={Feigenbaum, Joan}, + booktitle={Cambridge International Workshop on Security Protocols}, + pages={9--17}, + year={2017}, + organization={Springer} +} + + +@article{ feinberg15gogo, + author = {Ashley Feinberg}, + title = {\href{http://gizmodo.com/gogo-is-using-man-in-the-middle-malware-tactics-on-its-1677559652}{{Gogo} {Wi-Fi} Is Using Man-in-the-Middle Malware Tactics on Its Own Users}}, + journal = {Gizmodo}, + month = jan, + year = 2015, +} + +@inproceedings{feldman87practical, + title={\href{https://ieeexplore.ieee.org/abstract/document/4568297/}{A practical scheme for non-interactive verifiable secret sharing}}, + author={Feldman, Paul}, + booktitle={Foundations of Computer Science, 1987., 28th Annual Symposium on}, + pages={427--438}, + year={1987}, + organization={IEEE} +} + +@inproceedings{ fiat87prove, + title={How to prove yourself: practical solutions to identification and signature problems}, + author={Fiat, Amos and Shamir, Adi}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + pages={186--194}, + year={1987}, +} + +@article{ fienberg71randomization, + author = {Stephen E. Fienberg}, + title = {\href{https://science.sciencemag.org/content/171/3968/255}{Randomization and Social Affairs: The 1970 Draft Lottery}}, + journal = {Science}, + volume = 171, + number = 3968, + month = jan, + year = 1971, + pages = {255-261}, + doi = {10.1126/science.171.3968.255}, +} + +@misc{firelotto, + title = {\href{https://firelotto.io/}{Fire Lotto blockchain lottery}}, + year = {2018}, +} + + +@misc{fleischer12tor, + author = {Gregory Fleischer}, + month = {July}, + year = {2009}, + booktitle = {DEFCON 17}, + howpublished = {\url{http://ww.defcon.org/images/defcon-17/dc-17-presentations/defcon-17-gregory_fleischer-attacking_tor.pdf}}, + title = {Attacking Tor at the Application Layer}, +} + +@misc{ ford15verify, + author = {Bryan Ford}, + title = {\href{https://bford.info/2015/10/07/names.html}{Let's verify real people, not real names.}}, + month = oct, + year = 2015, +} + +@article{ ford16apple, + author = {Bryan Ford}, + title = {\href{https://freedom-to-tinker.com/blog/bford/apple-fbi-and-software-transparency/}{Apple, FBI, and Software Transparency}}, + journal = {\href{https://freedom-to-tinker.com/}{Freedom to Tinker}}, + month = mar, + year = 2016, +} + +@misc{ ford17technology, + author = {Bryan Ford}, + title = {\href{https://bford.info/2017/06/23/turing50/}{Technology Governs Us. Will it Govern Us Well? + +}}, + month = jun, + year = 2017, + note = {Opening remarks to panel ``Restoring Personal Privacy without Compromising National Security'' at \href{https://www.acm.org/turing-award-50/conference}{50 Years of the ACM Turing Award Celebration}}, +} + +@misc{ ford19privacy, + author = {Bryan Ford}, + title = {Privacy-preserving foundation for online personal identity}, + month = may, + year = 2019, + note = {ONR grant N000141912361}, +} + +@misc{ ford19rationality, + author = {Bryan Ford and Rainer B\"ohme}, + title = {\href{https://arxiv.org/abs/1910.08820}{Rationality is Self-Defeating in Permissionless Systems}}, + month = sep, + year = 2019, +} + +@article{ forgrave18man, + author = {Reid Forgrave}, + title = {\href{https://www.nytimes.com/interactive/2018/05/03/magazine/money-issue-iowa-lottery-fraud-mystery.html}{The Man Who Cracked the Lottery}}, + journal = {The New York Times Magazine}, + month = may, + year = 2018, +} + +@inproceedings{ franklin97fair, + author = {Matthew K. Franklin and Michael K. Reiter}, + title = {Fair Exchange with a Semi-Trusted Third Party}, + booktitle = {\bibbrev{CCS}{ACM Conference on + Computer and Communications Security}}, + month = apr, + year = 1997, +} + +@inproceedings{ franklin06passive, + title = {{Passive Data Link Layer 802.11 Wireless Device Driver Fingerprinting}}, + author = {Franklin, Jason and Mccoy, Damon and Tabriz, Parisa and Neagoe, Vicentiu and Van Randwyk, Jami and Sicker, Douglas}, + booktitle = {USENIX Security}, + year = {2006}, + month = {July}, + pages = {167--178}, +} + +@article{franklin13unique, + title={\href{https://eprint.iacr.org/2012/577.pdf}{A Framework for Unique Ring Signatures.}}, + author={Franklin, Matthew K and Zhang, Haibin}, + journal={IACR Cryptology ePrint Archive}, + volume={2012}, + pages={577}, + year={2012}, + url = {https://eprint.iacr.org/2012/577.pdf}, +} + +@misc{freeTSA, + key={Free Timestamping Authority}, + title = {Free {T}imestamping {A}uthority}, + howpublished = {\url{http://www.freetsa.org/}} +} + +@inproceedings{freedman04efficient, + author = {Michael J. Freedman and + Kobbi Nissim and + Benny Pinkas}, + title = {Efficient Private Matching and Set Intersection}, + booktitle = {\bibconf{EUROCRYPT}{{Conference on Theory and applications + of cryptographic techniques}}}, + location = {Interlaken, Switzerland}, + month = may, + year = 2004 +} + +@inproceedings{frikken07privacy, + author = {Keith B. Frikken}, + title = {Privacy-Preserving Set Union}, + booktitle = {\bibbrev{ACNS}{Applied Cryptography and Network Security}}, + year = {2007} +} + +@journal{ froelicher17unlynx, + author = {David Froelicher and Patricia Egger and Jo\~ao S\'a Sousa and + Jean Louis Raisaro and Zhicong Huang and Christian Mouchet and + Bryan Ford and Jean-Pierre Hubaux}, + title = {\href{https://content.sciendo.com/view/journals/popets/2017/4/article-p232.xml}{UnLynx: A Decentralized System for Privacy-Conscious Data Sharing}}, + journal = {Proceedings on Privacy Enhancing Technologies}, + volume = 2017, + number = 4, + month = oct, + year = 2017, + pages = {232–250}, +} + +@thesis{ fu05distribution, + author={Fu, Kevin E.}, + title={\href{http://dspace.mit.edu/handle/1721.1/34464}{Integrity and + Access Control in Untrusted Content Distribution Networks}}, + school={Massachusetts Institute of Technology}, + year={2005} +} + +@inproceedings{ fujisaki01rsa, + title={{RSA-OAEP} is secure under the {RSA} assumption}, + author={Fujisaki, Eiichiro and Okamoto, Tatsuaki and Pointcheval, David and Stern, Jacques}, + pages={260--274}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + year={2001}, + organization={Springer} +} + +%G + +@inproceedings{ galindo15neuchatel, + author = {David Galindo and Sandra Guasch and Jordi Puiggal\'i}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-319-22270-7_1}{Neuch\^atel’s Cast-as-Intended Verification Mechanism}}, + booktitle = {International Conference on E-Voting and Identity}, + month = sep, + year = 2015, + pages = {3-18}, +} + +@article{ gallagher13snowden, + author = {Ryan Gallagher}, + title = {New {Snowden} Documents Show {NSA} Deemed {Google} Networks + a ``Target''}, + journal = {Slate}, + month = sep # "~9,", + day = 9, + year = 2013, +} + +@inproceedings{gafni98round, + title={Round-by-Round Fault Detectors, Unifying Synchrony and Asynchrony (Extendeda Abstract)}, + author={Gafni, Eli}, + booktitle={Proc. 17th Annual ACM Symposium on Principles of Distributed Computing (PODC), Puerto Vallarta, Mexico, June}, + pages={143--152}, + year={1998} +} + + +@article{ ganeriwal08secure, + author = {Saurabh Ganeriwal and Christina P\"opper and + Srdjan \v{C}apkun and Mani B. Srivastava}, + title = {\href{https://dl.acm.org/citation.cfm?doid=1380564.1380571}{Secure Time Synchronization in Sensor Networks}}, + journal = {ACM Transactions on Information and System Security (TISSEC)}, + volume = 11, + number = 4, + month = jul, + year = 2008, +} + +@inproceedings{garay07practical, + author = {Juan A. Garay and + Berry Schoenmakers and + Jos{\'{e}} Villegas}, + title = {Practical and secure solutions for integer comparison}, + booktitle = {\bibconf[10th]{PKC}{Public Key Cryptography}}, + location = {Beijing, China}, + month = apr, + year = 2007 +} + +@incollection{garay15bitcoin, + title={\href{https://eprint.iacr.org/2014/765.pdf}{The {Bitcoin} backbone protocol: Analysis and applications}}, + author={Garay, Juan and Kiayias, Aggelos and Leonardos, Nikos}, + booktitle={EUROCRYPT 2015}, + pages={281--310}, + year={2015}, + publisher={Springer}, + url={https://eprint.iacr.org/2014/765.pdf}, +} + +@inproceedings{garcia18paxos, + title={Paxos consensus, deconstructed and abstracted}, + author={Garc{\'\i}a-P{\'e}rez, {\'A}lvaro and Gotsman, Alexey and Meshman, Yuri and Sergey, Ilya}, + booktitle={European Symposium on Programming}, + pages={912--939}, + year={2018}, + organization={Springer, Cham} +} + +@inproceedings{geambasu09vanish, + title={\href{https://www.usenix.org/legacy/events/sec09/tech/full_papers/sec09_crypto.pdf}{Vanish: Increasing Data Privacy with Self-Destructing Data.}}, + author={Geambasu, Roxana and Kohno, Tadayoshi and Levy, Amit A and Levy, Henry M}, + booktitle={USENIX Security Symposium}, + pages={299--316}, + year={2009} +} + + + +@inproceedings{ geddes13cover, + author = {John Geddes and Max Schuchard and Nicholas Hopper}, + title = {Cover Your {ACKs}: Pitfalls of Covert Channel + Censorship Circumvention}, + booktitle = {\bibbrev[20th]{CCS}{ACM Conference on + Computer and Communications Security}}, + month = nov, + year = {2013}, +} + +@article{gellman13broke, + author = {Gellman, Barton}, + title = {{NSA} broke privacy rules thousands of times per year, audit finds}, + journal = {The New York Times}, + month = Aug # {~15,}, + year = {2013} +} + +@article{ gellman13secret, + author={Gellman, Barton and Timberg, Craig and Rich, Steven}, + title={Secret {NSA} documents show campaign against {Tor} encrypted network}, + journal={The Washington Post}, + year=2013, + month=Oct # {~4,}, +} + +@article{ gellman13nsa, + author = {Barton Gellman and Ashkan Soltani}, + title = {{NSA} tracking cellphone locations worldwide, + {Snowden} documents show}, + journal = {The Washington Post}, + year = 2013, + month = dec # {~4,}, +} + +@article{gellman14offensive, + author = {Barton Gellman and Ellen Nakashima}, + title = {\href{www.washingtonpost.com/world/national-security/us-spy-agencies-mounted-231-offensive-cyber-operations-in-2011-documents-show/2013/08/30/d090a6ae-119e-11e3-b4cb-fd7ce041d814_story.html}{U.S. spy agencies mounted 231 offensive cyber-operations in 2011, documents show}}, + journal = {The Washington Post}, + month = aug, + year = 2013, + day = 30, +} + +@misc{ genecoin18make, + author = {Genecoin}, + title = {\href{http://genecoin.me/}{Make a Backup of Yourself Using Bitcoin}}, + month = may, + year = 2018, +} + + + +@inproceedings{ gencer18decentralization, + author = {Adem Efe Gencer and Soumya Basu and Ittay Eyal and + Robbert van Renesse and Emin G\"un Sirer}, + title = {\href{https://fc18.ifca.ai/preproceedings/75.pdf}{Decentralization in Bitcoin and Ethereum Networks}}, + booktitle = {Financial Cryptography and Data Security}, + month = feb, + year = 2018, + url = {https://fc18.ifca.ai/preproceedings/75.pdf}, +} + +@article{gencer17aspen, + author = {Adem Efe Gencer and + Robbert van Renesse and + Emin G{\"{u}}n Sirer}, + title = {\href{http://fc17.ifca.ai/preproceedings/paper_73.pdf}{ Short Paper: Service-Oriented Sharding for Blockchains}}, + journal={Financial Cryptography and Data Security 2017}, + year = {2017}, + url = {http://fc17.ifca.ai/preproceedings/paper_73.pdf}, +} + +@inproceedings{ gennaro98simplified, + author = {Rosario Gennaro and Michael O. Rabin and Tal Rabin}, + title = {\href{https://dl.acm.org/citation.cfm?doid=277697.277716}{Simplified VSS and Fast-track Multiparty Computations with Applications to Threshold Cryptography}}, + booktitle = {\bibconf[17th]{PODC}{Principles of Distributed Computing}}, + month = jun, + year = 1998, + location = {Puerto Vallarta, Mexico}, +} + +% obsoleted by journal version: gennaro07secure +@inproceedings{ gennaro99secure, + title={\href{https://link.springer.com/chapter/10.1007/3-540-48910-X_21}{Secure distributed key generation for discrete-log based cryptosystems}}, + author={Gennaro, Rosario and Jarecki, Stanis{\l}aw and Krawczyk, Hugo and + Rabin, Tal}, + booktitle={Eurocrypt}, + volume={99}, + pages={295--310}, + year={1999}, + organization={Springer} +} + +@article{ gennaro07secure, + author = {Rosario Gennaro and Stanis\l{}aw Jarecki and Hugo Krawczyk and Tal Rabin}, + title = {\href{https://link.springer.com/article/10.1007/s00145-006-0347-3}{Secure Distributed Key Generation for Discrete-Log Based Cryptosystems}}, + month = jan, + year = 2007, + volume = 20, + number = 1, + pages = {51-83}, +} + +@inproceedings{ gentry09fully, + author = {Craig Gentry}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/1536414.1536440}{Fully Homomorphic Encryption Using Ideal Lattices}}, + booktitle = {\bibconf{STOC}{ACM Symposium on Theory of Computing}}, + month = may, + year = 2009, + location = {Bethesda, Maryland}, +} + +@article{ gervais14bitcoin, + author = {Arthur Gervais and Ghassan O. Karame and Srdjan Capkun + and Vedran Capkun}, + title = {\href{https://www.ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/system-security-group-dam/research/publications/pub2014/spmagazine_gervais.pdf}{Is Bitcoin a Decentralized Currency?}}, + journal = {IEEE Security and Privacy Magazine}, + year = 2014, + volume={12}, + number={3}, + pages={54--60}, + url = {https://www.ethz.ch/content/dam/ethz/special-interest/infk/inst-infsec/system-security-group-dam/research/publications/pub2014/spmagazine_gervais.pdf}, +} + +@inproceedings{gervais15tampering, + title={\href{https://eprint.iacr.org/2015/578.pdf}{Tampering with the Delivery of Blocks and Transactions in {Bitcoin}}}, + author={Gervais, Arthur and Ritzdorf, Hubert and Karame, Ghassan O and Capkun, Srdjan}, + booktitle={22nd ACM SIGSAC Conference on Computer and Communications Security}, + pages={692--705}, + year={2015}, + organization={ACM}, + url = {https://eprint.iacr.org/2015/578.pdf}, +} + +@inproceedings{ gervais16security, + title={\href{https://dl.acm.org/citation.cfm?id=2976749.2978341}{On the Security and Performance of Proof of Work Blockchains}}, + author={Gervais, Arthur and Karame, Ghassan O and W\"ust, Karl and Glykantzis, Vasileios and Ritzdorf, Hubert and \v{C}apkun, Srdjan}, + month = oct, + year = 2016, + location = {Hofburg Palace, Vienna, Austria}, +} + +@inproceedings{georgiev12most, + title={The most dangerous code in the world: validating + {SSL} certificates in non-browser software}, + author={Georgiev, Martin and Iyengar, Subodh and Jana, Suman and + Anubhai, Rishita and Boneh, Dan and Shmatikov, Vitaly}, + booktitle={\bibconf[19th]{CCS}{ACM conference on Computer and communications security}}, + year={2012}, + month=oct, +} + + +@inproceedings{ghosh14torpath, + author = {Mainak Ghosh and Miles Richardson and Bryan Ford + and Rob Jansen}, + title = {A {TorPath} to {TorCoin}: + Proof-of-Bandwidth Altcoins for Compensating Relays}, + booktitle = {Workshop on Hot Topics in Privacy Enhancing Technologies + (HotPETs)}, + year = 2014, + location = {Amsterdam, Netherlands}, +} + +@misc{gilad17algorand, + author = {Yossi Gilad and Rotem Hemo and Silvio Micali and Georgios Vlachos and Nickolai Zeldovich}, + title = {\href{https://dl.acm.org/authorize?N47148}{Algorand: Scaling Byzantine Agreements for Cryptocurrencies}}, + booktitle = {26th ACM Symposium on Operating Systems Principles (SOSP)}, + month = oct, + year = {2017}, +} + +@misc{ gill13characterizing, + author = {Phillipa Gill and others}, + title = {Characterizing Censorship of {Web} Content Worldwide}, + year = 2013, + note = {\url{http://www.cs.stonybrook.edu/~phillipa/papers/GCDG_May8.pdf}}, +} + +@inproceedings{goldreich01secure, + author = {Oded Goldreich}, + title = {Secure multi-party computation}, + month = jun, + year = 2001, + note = {\url{http://www.wisdom.weizmann.ac.il/~odedg/pp.html}} +} + +@inproceedings{goldberg09multi, + title={Multi-party off-the-record messaging}, + author={Goldberg, Ian and Ustao{\u{g}}lu, Berkant and Van Gundy, Matthew D and Chen, Hao}, + booktitle = {\bibconf{CCS}{ACM Conference on Computer and Communications Security}}, + year={2009}, +} + +@article{goldberg96randomness, + title = {Randomness and the {Netscape} browser}, + author = {Goldberg, Ian and Wagner, David}, + journal = {Dr. {Dobb}'s Journal--Software Tools for the Professional Programmer}, + volume = {21}, + number = {1}, + pages = {66--71}, + year = {1996}, +} + + +@article{ goodin13attackers, + author = {Dan Goodin}, + title = {Attackers wield {Firefox} exploit + to uncloak anonymous {Tor} users}, + journal = {ars technica}, + month = aug, + day = 5, + year = 2013, +} + +@article{ goodin13crack, + author = {Dan Goodin}, + title = {\href{http://arstechnica.com/security/2012/09/crime-hijacks-https-sessions/}{Crack in {Internet’s} foundation of trust allows {HTTPS} session hijacking}}, + month = sep, + year = 2012, + journal = {ars technica}, +} + +@inproceedings{goyal06attribute, + title={Attribute-based encryption for fine-grained access control of encrypted data}, + author={Goyal, Vipul and Pandey, Omkant and Sahai, Amit and Waters, Brent}, + booktitle={Proceedings of the 13th ACM conference on Computer and communications security}, + pages={89--98}, + year={2006}, + organization={Acm} +} + +@article{ greer14heartbleed, + author = {Dan Greer}, + title = {Heartbleed as Metaphor}, + journal = {Lawfare}, + month = apr, + day = 21, + year = 2014, + note = {\url{http://www.lawfareblog.com/2014/04/heartbleed-as-metaphor/}, + accessed on Sep 9, 2014} +} + +@article{ greenberg15tor, + title = {\href{http://www.wired.com/2015/11/tor-says-feds-paid-carnegie-mellon-1m-to-help-unmask-users/}{Tor Says Feds Paid Carnegie Mellon \$1M to Help Unmask Users}}, + journal = {Wired}, + month = nov, + year = 2015, +} + +@inproceedings{groth04evaluating, + author = {Jens Groth}, + title = {Evaluating security of voting schemes in the universal + composability framework}, + booktitle = {\bibconf[2nd]{ACNS}{Applied Cryptography + and Network Security}}, + location = {Yellow Mountain, China}, + month = Jun, + year = 2004 +} + +@phdthesis{ groth04honest, + title = {Honest verifier zero-knowledge arguments applied}, + author = {Jens Groth}, + school = {University of Aarhus}, + year = {2004}, + month = {October}, +} + +@inproceedings{groth05noninteractive, + author = {Jens Groth}, + title = {Non-interactive zero-knowledge arguments for voting}, + booktitle = {\bibconf[3rd]{ACNS}{Applied Cryptography + and Network Security}}, + location = {New York, NY}, + month = Jun, + year = 2005 +} + +% journal version of a 2003 conference paper in PKC +@article{ groth10verifiable, + author = {Jens Groth}, + title = {\href{https://link.springer.com/article/10.1007/s00145-010-9067-9}{A Verifiable Secret Shuffle of Homomorphic Encryptions}}, + journal = {Journal of Cryptology}, + volume = 23, + pages = {546-579}, + month = may, + year = 2010, +} + +@inproceedings{ grubbs17leakage, + title={\href{https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=7958603}{Leakage-abuse + attacks against order-revealing encryption}}, + author={Grubbs, Paul and Sekniqi, Kevin and Bindschaedler, Vincent and + Naveed, Muhammad and Ristenpart, Thomas}, + booktitle={IEEE Symposium on Security and Privacy (SP)}, + pages={655--672}, + year={2017} +} + +@inproceedings{guarnizo2019pdfs, + title= {\href{https://arxiv.org/pdf/1808.06641.pdf}{PDFS: Practical Data Feed Service for Smart Contracts}}, + author={Guarnizo, Juan and Szalachowski, Pawel}, + booktitle={European Symposium on Research in Computer Security}, + pages={767--789}, + year={2019}, + organization={Springer} +} + +@article{guerraoui02non, + title={\href{https://pdfs.semanticscholar.org/1998/ddf989eb4bb7ba8fe1e678c26f2029e9911f.pdf}{Non-blocking atomic commit in asynchronous distributed systems with failure detectors}}, + author={Guerraoui, Rachid}, + journal={Distributed Computing}, + volume={15}, + number={1}, + pages={17--25}, + year={2002}, + publisher={Springer} +} + +@inproceedings{guerraoui13byzantine, + author = {Guerraoui, Rachid and Huc, Florian and Kermarrec, Anne-Marie}, + title = {Highly Dynamic Distributed Computing with Byzantine Failures}, + booktitle = {Proceedings of the 2013 ACM Symposium on Principles of Distributed Computing}, + series = {PODC '13}, + year = {2013}, + pages = {176--183}, + numpages = {8}, + publisher = {ACM}, + address = {New York, NY, USA}, + isbn = {978-1-4503-2065-8}, + url = {http://doi.acm.org/10.1145/2484239.2484263}, + doi = {10.1145/2484239.2484263}, + acmid = {2484263}, +} + +@inproceedings{ gutterman05hold, + author = {Zvi Gutterman and Dahlia Malkhi}, + title = {Hold Your Sessions: An Attack on {Java} Session-Id Generation}, + booktitle = {{CT-RSA}}, + year = 2005, + pages = {44-57}, +} + +@inproceedings{ gutterman06analysis, + author = {Zvi Gutterman and Benny Pinkas and Tzachy Reinman}, + title = {Analysis of the {Linux} Random Number Generator}, + booktitle = {{IEEE} Symposium on Security and Privacy}, + year = {2006}, + pages = {371-385}, +} + +%H + +@article{ haber91how, + author = {Stuart Haber and W. Scott Stornetta}, + title = {How to Time-Stamp a Digital Document}, + journal = {Journal of Cryptology}, + year = 1991, +} + +@misc { hanke18dfinity, + author = {Timo Hanke and Mahnush Movahedi and Dominic Williams}, + title = {\href{https://arxiv.org/abs/1805.04548}{DFINITY Technology Overview Series: Consensus System}}, + month = may, + year = 2018, +} + +@inproceedings{haeberlen11fuzz, + author = {Andreas Haeberlen and + Benjamin C. Pierce and + Arjun Narayan}, + title = {Differential Privacy Under Fire}, + booktitle = {\bibconf[20th]{USENIX Security}{Proceedings of USENIX Security Symposium}}, + location = {San Francisco, CA}, + month = aug, + year = 2011 +} + +@inproceedings{ haenni16cast, + author = {Rolf Haenni and Reto E. Koenig and Eric Dubuis}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-319-52240-1_5}{Cast-as-Intended Verification in Electronic Elections Based on Oblivious Transfer}}, + booktitle = {International Joint Conference on Electronic Voting}, + month = oct, + year = 2016, + location = {Bregenz, Austria}, +} + +@misc{ haenni19chvote, + author = {Rolf Haenni and Reto E. Koenig and Philipp Locher and Eric Dubuis}, + title = {\href{https://eprint.iacr.org/2017/325.pdf}{CHVote System Specification}}, + month = dec, + year = 2019, +} + +@inproceedings{halderman07harvesting, + author = {Halderman, J. Alex and Waters, Brent}, + title = {{Harvesting Verifiable Challenges from Oblivious Online Sources}}, + booktitle = {Proceedings of the 14th ACM Conference on Computer and Communications Security}, + series = {CCS '07}, + year = {2007}, + pages = {330--341}, + publisher = {ACM}, + address = {New York, NY, USA}, + isbn = {978-1-59593-703-2}, + location = {Alexandria, Virginia, USA}, + numpages = {12}, + url = {http://doi.acm.org/10.1145/1315245.1315287}, + doi = {10.1145/1315245.1315287}, + acmid = {1315287}, +} + +@inproceedings{hunt10zookeeper, + title={ZooKeeper: Wait-free Coordination for Internet-scale Systems.}, + author={Hunt, Patrick and Konar, Mahadev and Junqueira, Flavio Paiva and Reed, Benjamin}, + booktitle={USENIX annual technical conference}, + volume={8}, + number={9}, + year={2010} +} + +@inproceedings{hardjono2016cloud, + title={\href{https://hardjono.mit.edu/sites/default/files/documents/hardjono-smith-acm-iotpts2016.pdf}{Cloud-based commissioning of constrained devices using permissioned + blockchains}}, + author={Hardjono, Thomas and Smith, Ned}, + booktitle={Proceedings of the 2nd ACM International Workshop on IoT Privacy, + Trust, and Security}, + pages={29--36}, + year={2016}, + organization={ACM} +} + +@inproceedings{ hatsukazu87ibe, + author = {Hatsukazu Tanaka}, + title = {A Realization Scheme for the Identity-Based Cryptosystem}, + booktitle = {\bibconf{CRYPTO}{Advances in Cryptology}}, + year = {1987}, +} + +@misc{ havocscope19fake, + author = {Havocscope}, + title = {\href{https://www.havocscope.com/fake-id/}{Fake ID Cards, Driver Licenses, and Stolen Passports}}, + year = 2019, +} + +@article{he04quest, + title = {The quest for personal control over mobile location privacy}, + author = {Qi He and Dapeng Wu and Khosla, P.}, + journal = {Communications Magazine, IEEE}, + year = {2004}, + month = {may}, + volume = {42}, + number = {5}, + pages = {130 -- 136}, +} + +@inproceedings{heilman15eclipse, + title={\href{https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-heilman.pdf}{Eclipse Attacks on {Bitcoin}'s Peer-to-Peer Network}}, + author={Heilman, Ethan and Kendler, Alison and Zohar, Aviv and Goldberg, Sharon}, + booktitle={24th USENIX Security Symposium}, + pages={129--144}, + year={2015}, + url={https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-heilman.pdf}, +} + + +@inproceedings{henry10making, + title={Making a nymbler nymble using verbs}, + author={Henry, Ryan and Henry, Kevin and Goldberg, Ian}, + booktitle={PETS}, + year=2010 +} + +@inproceedings{henecka10tasty, + author={Henecka, Wilko and K\"ogl, Stefan and Sadeghi, Ahmad-reza and Schneider, Thomas and Wehrenberg, Immo}, + title={Tasty: Tool for Automating Secure Two-partY computations}, + booktitle={{ACM} Conference on Computer and Communications Security}, + month={August}, + year={2010} +} + +@inproceedings{ heninger12mining, + author = {Heninger, Nadia and Durumeric, Zakir and Wustrow, Eric and Halderman, J. Alex}, + title = {Mining Your {$P$}s and {$Q$}s: Detection of Widespread Weak Keys in Network Devices}, + year = 2012, + month = aug, + booktitle = {21st {USENIX} Security Symposium} +} + +@inproceedings{ herrmann09website, + author = {Dominik Herrmann and Rolf Wendolsky and Hannes Federrath}, + title = {Website Fingerprinting: Attacking Popular + Privacy Enhancing Technologies + with the Multinomial Na\"ive-Bayes Classifier}, + booktitle = {CCSW}, + month = nov, + year = 2009, +} + +@article{ herzberg95proactive, + title={\href{https://link.springer.com/chapter/10.1007/3-540-44750-4_27}{Proactive Secret Sharing Or: How to Cope With Perpetual Leakage}}, + author={Herzberg, Amir and Jarecki, Stanis{\l}aw and Krawczyk, Hugo and Yung, Moti}, + booktitle = {\bibconf[15th]{CRYPTO}{Advances in Cryptology}}, + pages={339--352}, + month=aug, + year={1995}, + location = {Santa Barbara, California, USA}, +} + +@inproceedings{ hildenbrandt18kevm, + author = {Everett Hildenbrandt and Manasvi Saxena and Nishant Rodrigues and + Xiaoran Zhu and Philip Daian and Dwight Guth and + Brandon Moore and Daejun Park and Yi Zhang and + Andrei Stefanescu and Grigore Rosu}, + title = {\href{https://ieeexplore.ieee.org/abstract/document/8429306}{KEVM: A Complete Formal Semantics of the Ethereum Virtual Machine}}, + booktitle = {\bibconf[31st]{CSF}{Computer Security Foundations Symposium}}, + month = jul, + year = 2018, +} + +@article{ hirt00player, + author = {Martin Hirt and Ueli Maurer}, + title = {\href{https://link.springer.com/article/10.1007/s001459910003}{Player Simulation and General Adversary Structures in Perfect Multiparty Computation}}, + volume = 31, + pages = {31-60}, + month = apr, + year = 2000, +} + +@misc{ hoffman-andrews14verizon, + author = {Jacob Hoffman-Andrews}, + title = {Verizon Injecting Perma-Cookies to Track Mobile Customers, + Bypassing Privacy Controls}, + publisher = {Electronic Frontier Foundation}, + month = nov, + year = 2014, +} + +@inproceedings{ hohenberger14anonize, + author = {Susan Hohenberger and Steven Myers and Rafael Pass + and abhi shelat}, + title = {{ANONIZE}: A Large-Scale Anonymous Survey System}, + booktitle = {IEEE Security and Privacy}, + month = may, + year = 2014, +} + +@inproceedings{hohenberger06privacy, + author = {Susan Hohenberger and + Stephen A. Weis}, + title = {Honest-Verifier Private Disjointness Testing Without Random + Oracles}, + booktitle = {\bibconf{PETS}{Privacy Enhancing Technologies}}, + location = {New York, NY}, + month = jun, + year = 2006 +} + + +@inproceedings{holzer12secure, + author={Holzer, Andreas and Franz, Martin and Katzenbeisser, Stefan and Veith, Helmut}, + title={Secure two-party computations in {ANSI C}}, + booktitle={{ACM} Conference on Computer and Communications Security}, + month={October}, + year={2012} +} + + +@inproceedings{ hopper06on, + author = {Nicholas Hopper and Eugene Y. Vasserman}, + title = {On the Effectiveness of $k$-Anonymity Against + Traffic Analysis and Surveillance}, + booktitle = {WPES}, + month = oct, + year = 2006, + location = {Alexandria, VA}, +} + +@article{ horowitz18mystery, + author = {Jason Horowitz}, + title = {\href{https://www.nytimes.com/2018/02/28/world/europe/italy-election-davide-casaleggio-five-star.html}{The Mystery Man Who Runs Italy’s `Five Star' From the Shadows}}, + journal = {The New York Times}, + month = feb, + day = 28, + year = 2018, +} + +@inproceedings{houmansadr13freewave, + title={{I Want my Voice to be Heard: IP over Voice-over-IP for Unobservable Censorship Circumvention}}, + author={Amir Houmansadr and Thomas Riedl and Nikita Borisov and Andrew Singer}, + booktitle={\bibbrev{NDSS}{Network and Distributed System Security Symposium}}, + year={2013} +} + +@inproceedings{ houmansadr13parrot, + author = {Houmansadr, Amir and Brubaker, Chad and Shmatikov, Vitaly}, + title = {The Parrot is Dead: + Observing Unobservable Network Communications}, + booktitle = {IEEE \bibconf[34th]{SP}{Symposium on Security and Privacy}}, + month = may, + year = {2013}, +} + + +@inproceedings{huang12private, + author = {Yan Huang and + David Evans and + Jonathan Katz}, + title = {Private Set Intersection: Are Garbled Circuits Better than + Custom Protocols?}, + booktitle = {NDSS}, + year = {2012} +} + +@article{huang2017seshare, + title={\href{https://onlinelibrary.wiley.com/doi/full/10.1002/cpe.4359}{SeShare: Secure cloud data sharing based on blockchain and public auditing}}, + author={Huang, Longxia and Zhang, Gongxuan and Yu, Shui and Fu, Anmin and Yearwood, John}, + journal={Concurrency and Computation: Practice and Experience}, + publisher={Wiley Online Library} +} + + + +@inproceedings{ huhnlein03ibe, + title={Towards practical non-interactive public key cryptosystems using non-maximal imaginary quadratic orders}, + author={H{\"u}hnlein, Detlef and Jacobson, Michael and Weber, Damian}, + booktitle={Journal Designs, Codes and Cryptography}, + year={2003}, +} + +@inproceedings{ huisman06temporal, + author = {Marieke Huisman and + Pratik Worah and + Kim Sunesen}, + title = {A temporal logic characterisation of observational determinism}, + booktitle = {IEEE \bibconf[19th]{CSFW}{computer Security Foundation Workshop}}, + month = jul, + year = {2006}, +} + + +%I + +@misc{ intel14software, + author = {{Intel}}, + title = {\href{https://software.intel.com/sites/default/files/managed/48/88/329298-002.pdf}{Software Guard Extensions Programming Reference}}, + month = oct, + year = 2014, +} + +@inproceedings{ ioannidis06privacy, + author = {Ioannidis, Sotiris and + Sidiroglou, Stelios and Keromytis, Angelos D.}, + title = {Privacy as an operating system service}, + booktitle = {Proceedings of the 1st USENIX + Workshop on Hot Topics in Security}, + series = {HOTSEC'06}, + year = {2006}, + location = {Vancouver, B.C., Canada}, + pages = {8--8}, + publisher = {USENIX Association}, + address = {Berkeley, CA, USA}, +} + + + +%J + + +@article{jaccard, + author = {Paul Jaccard}, + journal = {Bulletin de la Soci\'et\'e Vaudoise des Sciences Naturelles}, + title = {{\'Etude} comparative de la distribution florale dans une portion des {A}lpes et du {J}ura}, + volume = 37, + number = 142, + pages = {547-579}, + month = jun, + year = 1901, +} + + + + +@inproceedings{jansen14onions, + author = {Rob Jansen and Andrew Miller and Paul Syverson + and Bryan Ford}, + title = {From Onions to Shallots: Rewarding {Tor} Relays with {TEARS}}, + booktitle = {Workshop on Hot Topics in Privacy Enhancing Technologies + (HotPETs)}, + month = jul, + year = 2014, + location = {Amsterdam, Netherlands}, +} + +@inproceedings{jakobsson00addition, + title={Addition of {El Gamal} Plaintexts}, + author={Jakobsson, Markus and Juels, Ari}, + booktitle={\bibconf{ASIACRYPT}{Advances in Cryptology}}, + year={2000}, +} + +@inproceedings{jakobsson99quorum, + title={\href{https://link.springer.com/chapter/10.1007/3-540-49162-7_9}{On quorum controlled asymmetric proxy re-encryption}}, + author={Jakobsson, Markus}, + booktitle={Public key cryptography}, + pages={632--632}, + year={1999}, + organization={Springer} +} + +@inproceedings{ jarabek12thinav, + author = {Jarabek, Chris and Barrera, David and Aycock, John}, + title = {\href{http://doi.acm.org/10.1145/2420950.2420983}{ThinAV: Truly + Lightweight Mobile Cloud-based Anti-malware}}, + booktitle = {Proceedings of the 28th Annual Computer Security Applications + Conference}, + series = {ACSAC '12}, + year = {2012}, + location = {Orlando, Florida, USA}, + numpages = {10}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{ji15your, + author = {Shouling Ji and + Weiqing Li and + Neil Zhenqiang Gong and + Prateek Mittal and + Raheem A. Beyah}, + title = {On Your Social Network De-anonymizablity: + {Q}uantification and Large Scale Evaluation with Seed Knowledge}, + booktitle = {\bibconf[22nd]{NDSS}{Network and Distributed System Security + Symposium}}, + location = {San Diego, CA}, + month = apr, + year = 2015 +} + +@inproceedings{ jiang07preserving, + author = {Jiang, Tao and Wang, Helen J. and Hu, Yih-Chun}, + title = {Preserving location privacy in wireless lans}, + booktitle = {Proceedings of the 5th international conference on Mobile systems, applications and services}, + series = {MobiSys '07}, + year = {2007}, + location = {San Juan, Puerto Rico}, + pages = {246--257}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@inproceedings{ johansen07firepatch, + author={Johansen, H{\aa}vard and Johansen, Dag and van Renesse, Robbert}, + editor={Venter, Hein and Eloff, Mariki and Labuschagne, Les and Eloff, Jan + and von Solms, Rossouw}, + title={\href{http://dl.ifip.org/db/conf/sec/sec2007/JohansenJR07.pdf} + {FirePatch: Secure and Time-Critical Dissemination of Software Patches}}, + bookTitle={New Approaches for Security, Privacy and Trust in Complex + Environments: Proceedings of the IFIP TC-11 22nd International Information + Security Conference (SEC 2007)}, + month={may}, + year={2007} +} + + + +@inproceedings{ johnson13users, + author = {Johnson, Aaron and Wacek, Chris and Jansen, Rob and Sherr, Micah and Syverson, Paul}, + title = {Users Get Routed: Traffic Correlation on {Tor} by Realistic Adversaries}, + booktitle = {\bibconf[20th]{CCS}{ACM Conference on + Computer and Communications Security}}, + month = nov, + year = {2013}, +} + +@inproceedings{johnson07nymble, + title={Nymble: {A}nonymous {IP}-address blocking}, + author={Johnson, Peter C and Kapadia, Apu and Tsang, Patrick P and Smith, Sean W}, + booktitle={PETS}, + year=2007 +} + +@article{josang07survey, + title={A survey of trust and reputation systems for online service provision}, + author={J{\o}sang, Audun and Ismail, Roslan and Boyd, Colin}, + journal={Decision support systems}, + volume={43}, + number={2}, + pages={618--644}, + year={2007}, + publisher={Elsevier} +} + +@misc{ jovanovic16byzcoin, + title = {\href{http://hackingdistributed.com/2016/08/04/byzcoin/}{ByzCoin: Securely Scaling Blockchains}}, + author = {Philipp Jovanovic}, + month = {August}, + year = {2016}, + howpublished = {\href{http://hackingdistributed.com/}{Hacking, Distributed}}, +} + +@inproceedings{ juels02verifiable, + author = {Juels, Ari and Guajardo, Jorge}, + title = {{RSA} Key Generation with Verifiable Randomness}, + year = 2002, + month = feb, + booktitle = {Public Key Cryptography} +} + +@inproceedings{ juels16investigating, + author = {Ari Juels and Ahmed Kosba and Elaine Shi}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/2976749.2978362}{The Ring of Gyges: Investigating the Future of Criminal Smart Contracts}}, + booktitle = {\bibconf{CCS}{ACM Conference on Computer and + Communications Security}}, + month = oct, + year = 2016, +} + +@inproceedings{junqueira11zab, + title={Zab: High-performance broadcast for primary-backup systems}, + author={Junqueira, Flavio P and Reed, Benjamin C and Serafini, Marco}, + booktitle={2011 IEEE/IFIP 41st International Conference on Dependable Systems \& Networks (DSN)}, + pages={245--256}, + year={2011}, + organization={IEEE} +} + +%K + +@inproceedings{kalodner2018arbitrum, + title={Arbitrum: Scalable, private smart contracts}, + author={Kalodner, Harry and Goldfeder, Steven and Chen, Xiaoqi and Weinberg, S Matthew and Felten, Edward W}, + booktitle={Proceedings of the 27th USENIX Conference on Security Symposium}, + pages={1353--1370}, + year={2018}, + organization={USENIX Association} +} + +@inproceedings{karame12double, + title={\href{https://eprint.iacr.org/2012/248.pdf}{Double-spending fast payments in {Bitcoin}}}, + author={Karame, Ghassan O and Androulaki, Elli and Capkun, Srdjan}, + booktitle={19th ACM Conference on Computer and communications security}, + pages={906--917}, + year={2012}, + organization={ACM}, + url={https://eprint.iacr.org/2012/248.pdf}, +} + + +@INPROCEEDINGS{ karger05multilevel, + author = {Paul A. Karger}, + title = {Multi-level security requirements for hypervisors}, + booktitle = {Computer Security Applications Conference, 21st Annual}, + series = {ACSAC '05}, + year = {2005}, + month = {Dec.}, +} + +@inproceedings{kate09distributed, + title={\href{https://ieeexplore.ieee.org/abstract/document/5158416/}{Distributed Key Generation for the Internet}}, + author={Kate, Aniket and Goldberg, Ian}, + booktitle={\bibconf[29th]{ICDCS}{International Conference on Distributed Computing Systems}}, + pages={119--128}, + month=jun, + year={2009}, + organization={IEEE} +} + +@inproceedings{ kate10distributed, + author = {Aniket Kate and Ian Goldberg}, + title = {\href{https://link.springer.com/chapter/10.1007/978-3-642-15317-4_27}{Distributed Private-Key Generators for Identity-Based Cryptography}}, + booktitle = {\bibconf[7th]{SCN}{Security and Cryptography for Networks}}, + month = sep, + year = 2010, + location = {Amalfi, Italy}, +} + +@misc{ kate12distributed, + author = {Aniket Kate and Yizhou Huang and Ian Goldberg}, + title = {\href{https://eprint.iacr.org/2012/377.pdf}{Distributed Key Generation in the Wild}}, + howpublished = {Cryptology ePrint Archive, Report 2012/377}, + month = jul, + year = 2012, +} + +@incollection{katz01cryptographic, + title={Cryptographic counters and applications to electronic voting}, + author={Katz, Jonathan and Myers, Steven and Ostrovsky, Rafail}, + booktitle={Eurocrypt}, + pages={78--92}, + year={2001}, + publisher={Springer} +} + + +@misc{keating07arrested, + title = {Use Tor P2P - Get Arrested}, + author = {Tom Keating}, + publisher = {{TMC}net}, + month = "September", + day = 17, + year = 2007, + note = {\url{http://blog.tmcnet.com/blog/tom-keating/p2p/use-tor-p2p-get-arrested.asp}} +} + +@inproceedings{kedogan02limits, + author = {Kedogan, Dogan and Agrawal, Dakshi and Penz, Stefan}, + title = {Limits of Anonymity in Open Environments}, + booktitle = {Workshop on Information Hiding}, + month = oct, + year = {2002}, +} + +@phdthesis{kelly09taxonomy, + author = {Kelly, Douglas J.}, + title = {A taxonomy for and analysis of anonymous communications networks}, + year = {2009}, + isbn = {978-1-109-07876-3}, + note = {AAI3351544}, + publisher = {Air Force Institute of Technology}, + address = {Wright Patterson AFB, OH, USA}, +} + +@inproceedings{kelly08towards, + title={Towards Mathematically Modeling the Anonymity Reasoning Ability of an Adversary}, + author={Kelly, Douglas and Raines, Richard and Baldwin, Rusty and Mullins, Barry and Grimaila, Michael}, + booktitle={\bibbrev{IPCCC}{International Performance, Computing, + and Communications Conference}}, + pages={524--531}, + year={2008}, + organization={IEEE} +} + +@misc{ kessem15CaaS, + author = {Limor Kessem}, + title = {\href{https://securityintelligence.com/certificates-as-a-service-code-signing-certs-become-popular-cybercrime-commodity/}{Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity +}}, + month = sep, + year = 2015, +} + + +@article{ kessem15certificates, + author = {Limor Kessem}, + title = {\href{https://securityintelligence.com/certificates-as-a-service-code-signing-certs-become-popular-cybercrime-commodity/}{Certificates-as-a-Service? Code Signing Certs Become Popular Cybercrime Commodity}}, + month = sep, + year = 2015, + journal = {Security Intelligence}, +} + +@inproceedings{kirsch08paxos, + title={Paxos for system builders: An overview}, + author={Kirsch, Jonathan and Amir, Yair}, + booktitle={Proceedings of the 2nd Workshop on Large-Scale Distributed Systems and Middleware}, + pages={1--6}, + year={2008} +} + + +@article{khattak11trust, + title={Analysis of Open Environment Sign-in Schemes-Privacy Enhanced \& Trustworthy Approach}, + author={Khattak, Zubair Ahmad and Manan, Jamalul-lail Ab and Sulaiman, Suziah and others}, + journal={Journal of Advances in Information Technology}, + year={2011} +} + +@article{ khrennikov14putin, + author = {Ilya Khrennikov}, + title = {\href{http://www.bloomberg.com/news/2014-07-29/putin-sets-110-000-bounty-for-cracking-tor-as-anonymous-internet-usage-in-russia-surges.html}{Putin Sets \$110,000 Bounty for Cracking Tor as Anonymous Internet Usage in Russia Surges}}, + journal = {Bloomberg Business}, + month = jul, + year = 2014, +} + +@misc{ kiayias16ouroboros, + author = {Aggelos Kiayias and Alexander Russell and Bernardo David and Roman Oliynykov}, + title = {\href{http://eprint.iacr.org/2016/889}{Ouroboros: A Provably Secure Proof-of-Stake Blockchain Protocol}}, + howpublished = {Cryptology ePrint Archive, Report 2016/889}, + year = {2016}, +} + +@inproceedings{kiayias05testing, + author = {Aggelos Kiayias and + Antonina Mitrofanova}, + title = {Testing Disjointness of Private Datasets}, + booktitle = {Financial Cryptography and Data Security}, + year = {2005} +} + +@techreport{kiayias15speed, + title={\href{https://eprint.iacr.org/2015/1019.pdf}{Speed-Security Tradeoffs in Blockchain Protocols}}, + author={Kiayias, Aggelos and Panagiotakos, Giorgos}, + year={2015}, + institution={IACR: Cryptology ePrint Archive} +} + +@inproceedings{kim01communication, + title={\href{https://netsec.ethz.ch/publications/papers/ifip-sec-2001.pdf}{Communication-efficient group key agreement}}, + author={Kim, Yongdae and Perrig, Adrian and Tsudik, Gene}, + booktitle={IFIP International Information Security Conference}, + pages={229--244}, + year={2001} +} + +@inproceedings{ kim13accountable, + author = {Tiffany Hyun-Jin Kim and Lin-Shung Huang and Adrian Perrig and Collin Jackson and Virgil Gligor}, + title = {\href{https://www.cs.cmu.edu/~xia/resources/Documents/kim-www13.pdf}{Accountable Key Infrastructure {(AKI)}: A Proposal for a Public-Key Validation Infrastructure}}, + booktitle = {\bibconf{WWW}{International Word Wide Web Conference}}, + year = 2014, +} + +@article{ kirk13could, + author = {Jeremy Kirk}, + title = {\href{http://www.computerworld.com/article/2498077/desktop-apps/could-the-bitcoin-network-be-used-as-an-ultrasecure-notary-service-.html}{Could the {Bitcoin} network be used as an ultrasecure notary service?}}, + month = may, + year = 2013, + journal = {Computerworld}, +} + +@inproceedings{kissner05privacy, + author = {Lea Kissner and + Dawn Xiaodong Song}, + title = {Privacy-Preserving Set Operations}, + booktitle = {\bibconf[25th]{CRYPTO}{Annual International + Cryptology Conference}}, + publisher = {Springer}, + location = {Santa Barbara, CA}, + month = aug, + year = 2005 +} + +@article{ kline08security, + author = {Candice L. Kline}, + title = {\href{https://heinonline.org/HOL/LandingPage?handle=hein.journals/utol39&div=34}{Security Theater and Database-Driven Information Markets: a Case for an Omnibus U.S. Data Privacy Statute}}, + journal = {The University of Toledo Law Review}, + volume = 39, + number = 1, + month = feb, + year = 2008, +} + +@inproceedings{ knockel11three, + author = {Jeffrey Knockel and Jedidiah R. Crandall and Jared Saia}, + title = {Three Researchers, Five Conjectures: + An Empirical Analysis of {TOM-Skype} Censorship and Surveillance}, + booktitle = {\bibbrev{FOCI}{USENIX Workshop on Free and Open + Communications on the Internet}}, + month = aug, + year = 2011, + location = {San Francisco, CA}, +} + +@article{ kobeissi13cryptocat, + title={Cryptocat: Adopting Accessibility and Ease of Use as Security Properties}, + author={Kobeissi, Nadim and Breault, Arlo}, + journal={arXiv preprint arXiv:1306.5156}, + year={2013} +} + +@inproceedings{ kokoris16enhancing, + author = {Eleftherios Kokoris-Kogias and Philipp Jovanovic and Nicolas Gailly and Ismail Khoffi and Linus Gasser and Bryan Ford}, + title = {\href{http://arxiv.org/abs/1602.06997}{Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing}}, + booktitle = {Proceedings of the 25th USENIX Conference on Security Symposium}, + year = {2016}, +} + +@inproceedings{ kokoris16enhancing-short, + author = {Eleftherios Kokoris-Kogias and others}, + title = {\href{http://arxiv.org/abs/1602.06997}{Enhancing Bitcoin Security and Performance with Strong Consistency via Collective Signing}}, + booktitle = {25th USENIX Conference on Security Symposium}, + year = {2016}, +} + +@techreport{kokoris16managing, + title={\href{https://www.securityweek2016.tu-darmstadt.de/fileadmin/user_upload/Group_securityweek2016/pets2016/1_Managing_identities_bryan_ford_etc.pdf}{Managing Identities Using Blockchains and CoSi}}, + author={Kokoris-Kogias, Eleftherios and Gasser, Linus and Khoffi, Ismail and Jovanovic, Philipp and Gailly, Nicolas and Ford, Bryan}, + year={2016}, + institution={9th Workshop on Hot Topics in Privacy Enhancing Technologies (HotPETs 2016)} +} + +@inproceedings{kokoris17omniledger, + title={\href{https://eprint.iacr.org/2017/406.pdf}{OmniLedger: A Secure, Scale-Out, Decentralized Ledger via Sharding}}, + author={Kokoris-Kogias, Eleftherios and Jovanovic, Philipp and Gasser, Linus and Gailly, Nicolas and Syta, Ewa and Ford, Bryan}, + booktitle={39th {IEEE Symposium on Security and Privacy}}, + pages={19--34}, + year={2018}, + organization={IEEE} +} + +@misc{kokoris18calypso, + author = {Eleftherios Kokoris-Kogias and Enis Ceyhun Alp and Sandra Deepthy Siby and Nicolas Gailly and Linus Gasser and Philipp Jovanovic and Ewa Syta and Bryan Ford}, + title = {\href{https://eprint.iacr.org/2018/209}{Verifiable Management of Private Data under Byzantine Failures}}, + howpublished = {Cryptology ePrint Archive, Report 2018/209}, + year = {2018}, +} + +@phdthesis{kokoris19secure, + title={\href{https://drive.google.com/open?id=1tl1nNqLUhgubzxlRkNfMBcWZVl_N0WT3}{Secure, Confidential Blockchains Providing High Throughput and Low Latency}}, + author={Kokoris-Kogias, Eleftherios}, + school = {\'Ecole Polytechnique F\'ed\'erale de Lausanne (EPFL)}, + month = may, + year = 2019, +} + +@misc{ kokoris19bootstrapping, + author = {Eleftherios Kokoris-Kogias and Alexander Spiegelman and + Dahlia Malkhi and Ittai Abraham}, + title = {\href{https://eprint.iacr.org/2019/1015.pdf}{Bootstrapping + Consensus Without Trusted Setup: + Fully Asynchronous Distributed Key Generation}}, + month = sep, + year = 2019, + howpublished = {Cryptology ePrint Archive Report 2019/1015}, +} + +@inproceedings{kosba2016hawk, + title={Hawk: The blockchain model of cryptography and privacy-preserving smart contracts}, + author={Kosba, Ahmed and Miller, Andrew and Shi, Elaine and Wen, Zikai and Papamanthou, Charalampos}, + booktitle={2016 IEEE symposium on security and privacy (SP)}, + pages={839--858}, + year={2016}, + organization={IEEE} +} + +@inproceedings{koscher10experimental, + title={Experimental security analysis of a modern automobile}, + author={Koscher, Karl and Czeskis, Alexei and Roesner, Franziska and + Patel, Shwetak and Kohno, Tadayoshi and Checkoway, Stephen and + McCoy, Damon and Kantor, Brian and Anderson, Danny and Shacham, Hovav and + Savage, Stefan}, + booktitle={IEEE Security and Privacy}, + year={2010}, + month=may, +} + +@misc{ kozlov19league, + author = {Dina Kozlov}, + title = {\href{https://blog.cloudflare.com/league-of-entropy/}{League of Entropy: Not All Heroes Wear Capes}}, + howpublished = {CloudFlare Blog}, + month = jun, + year = 2019, +} + +@inproceedings{ kranch15upgrading, + author = {Michael Kranch and Joseph Bonneau}, + title = {Upgrading {HTTPS} in Mid-Air: An Empirical Study of + Strict Transport Security and Key Pinning}, + booktitle = {Network and Distributed System Security Symposium (NDSS)}, + month = feb, + year = 2015, +} + + +@inproceedings{kreuter13pcf, + author={Kreuter, Ben and Mood, Benjamin and shelat, abhi and Butler, Kevin}, + title={{PCF}: A Portable Circuit Format for Scalable Two-Party Secure Computation}, + booktitle={{USENIX} Security Symposium}, + month={August}, + year={2013}, +} + +@misc{ kroll14secure, + author = {Joshua A. Kroll and Edward W. Felten and Dan Boneh}, + title = {\href{https://freedom-to-tinker.com/blog/felten/secure-protocols-for-accountable-warrant-execution/}{Secure protocols for accountable warrant execution}}, + month = apr, + year = 2014, +} + +@inproceedings{krohn04fly, + title={On-the-fly verification of rateless erasure codes for efficient content distribution}, + author={Krohn, Maxwell N and Freedman, Michael J and Mazieres, David}, + booktitle={Security and Privacy, 2004. Proceedings. 2004 IEEE Symposium on}, + pages={226--240}, + year={2004}, + organization={IEEE} +} + + +@inproceedings{kulynych17claimchain, + title={\href{https://dl.acm.org/citation.cfm?id=3268947}{ClaimChain: Improving the Security and Privacy of In-band Key Distribution for Messaging}}, + author={Kulynych, Bogdan and Lueks, Wouter and Isaakidis, Marios and Danezis, George and Troncoso, Carmela}, + booktitle={Proceedings of the 2018 Workshop on Privacy in the Electronic Society}, + pages={86--103}, + year={2018}, + organization={ACM} +} + +@inproceedings{kumaresan15use, + title={\href{https://people.csail.mit.edu/ranjit/papers/poker.pdf}{How to use bitcoin to play decentralized poker}}, + author={Kumaresan, Ranjit and Moran, Tal and Bentov, Iddo}, + booktitle={Proceedings of the 22nd ACM SIGSAC Conference on Computer and Communications Security}, + pages={195--206}, + year={2015}, + organization={ACM} +} + +@inproceedings{ kuppusamy16diplomat, + author = {Trishank Karthik Kuppusamy and Santiago Torres-Arias and Vladimir Diaz and Justin Cappos}, + title = {\href{https://www.usenix.org/node/194973}{Diplomat: Using Delegations to Protect Community Repositories}}, + booktitle = {\bibconf[13th]{NSDI}{USENIX Symposium on Networked Systems Design and Implementation}}, + month = mar, + year = 2016, +} + +@inproceedings{kwon16riffle, + author = {Albert Kwon and + David Lazar and + Srinivas Devadas and + Bryan Ford}, + title = {Riffle: {A}n efficient communication system with strong + anonymity}, + booktitle = {\bibconf[16th]{PETS}{Privacy Enhancing Technologies}}, + location = {Darmstadt, Germany}, + month = jul, + year = 2016 +} + +@article{kwon14tendermint, + title={\href{http://tendermint.com/docs/tendermint.pdf}{TenderMint: Consensus without Mining}}, + author={Kwon, Jae}, + year={2014} +} + +@article{kwon16atom, + author = {Albert Kwon and + Henry Corrigan{-}Gibbs and + Srinivas Devadas and + Bryan Ford}, + title = {Atom: Scalable Anonymity Resistant to Traffic Analysis}, + journal = {CoRR}, + volume = {abs/1612.07841}, + year = {2016}, + url = {http://arxiv.org/abs/1612.07841}, + archivePrefix = {arXiv}, + eprint = {1612.07841}, + timestamp = {Wed, 07 Jun 2017 14:40:14 +0200}, + biburl = {http://dblp.org/rec/bib/journals/corr/KwonCDF16}, + bibsource = {dblp computer science bibliography, http://dblp.org} +} + + +@misc{kyber, + title = {\href{https://github.com/dedis/kyber}{The {Kyber} Cryptography Library}}, + key = {kyber}, + year = {2010 -- 2018}, +} + +%L + +@article{lampson1992, + Author = {Lampson, Butler and Abadi, Mart\'{\i}n and Burrows, Michael and Wobber, Edward}, + Journal = {ACM Trans. Comput. Syst.}, + Title = {Authentication in distributed systems: theory and practice}, + Year = {1992} + } + +@inproceedings{lampson96build, + title={How to build a highly available system using consensus}, + author={Lampson, Butler W}, + booktitle={International Workshop on Distributed Algorithms}, + pages={1--17}, + year={1996}, + organization={Springer} +} + +@article{langley13anssi, + author = {Adam Langley}, + title = {\href{http://googleonlinesecurity.blogspot.com/2013/12/further-improving-digital-certificate.html}{Further improving digital certificate security}}, + journal = {Google Online Security Blog}, + month = dec, + year = 2013, + day = 7, +} + +@article{langley15cnnic, + author = {Adam Langley}, + title = {\href{http://googleonlinesecurity.blogspot.nl/2015/03/maintaining-digital-certificate-security.html?m=1}{Maintaining digital certificate security }}, + journal = {Google Online Security Blog}, + month = mar, + year = 2015, + day = 23, +} + +@article{laurie14CT, + author = {Laurie, Ben}, + title = {\href{https://queue.acm.org/detail.cfm?id=2668154}{Certificate Transparency}}, + journal = {ACM Queue}, + month = sep, + year = {2014}, + volume = 12, + number = 8, +} + +@misc{laurie13CTrfc, + title={RFC 6962: Certificate transparency}, + author={Laurie, Ben and Langley, Adam and Kasper, Emilia}, + month = jun, + year={2013}, +} + +@misc{ laurie15improving, + author = {Ben Laurie}, + title = {\href{https://www.certificate-transparency.org/ev-ct-plan}{Improving the Security of EV Certificates}}, + month = may, + year = 2015, +} + +@inproceedings{leblond2014ngo, + title={A look at targeted attacks through the lense of an {NGO}}, + author={Le Blond, Stevens and Uritesc, Adina and Gilbert, Cedric and Leong Chua, Zheng + and Saxena, Prateek and Kirda, Engin}, + booktitle={USENIX Security}, + year={2014} +} + +@inproceedings{ leblond18enforcing, + author = {Stevens Le Blond and Alejandro Cuevas and + Juan Ramón Troncoso-Pastoriza and Philipp Jovanovic and + Bryan Ford and Jean-Pierre Hubaux}, + title = {\href{https://bford.info/pub/dec/immunity-abs/}{On Enforcing the Digital Immunity of a Large Humanitarian Organization}}, + booktitle = {\bibconf{S\&P}{IEEE Symposium on Security and Privacy}}, + month = may, + year = 2018, +} + +@inproceedings{lee13anon, + title={Anon-pass: Practical anonymous subscriptions}, + author={Lee, Michael Z and Dunn, Alan M and Waters, Brent and Witchel, Emmett and Katz, Jonathan}, + booktitle = {\bibconf{S\&P}{IEEE Symposium on Security and Privacy}}, + year={2013}, +} + +@article{ lenstra12ron, + title = {Ron was wrong, Whit is right}, + author = {Lenstra, Arjen K and Hughes, James P and + Augier, Maxime and Bos, Joppe W and Kleinjung, Thorsten and Wachter, Christophe}, + journal = {{IACR} eprint archive}, + volume = 64, + year = 2012, +} + +@misc{ lenstra15random, + author = {Arjen K. Lenstra and Benjamin Wesolowski}, + title = {\href{https://eprint.iacr.org/2015/366.pdf}{A random zoo: sloth, unicorn, and trx}}, + howpublished = {{IACR} eprint archive}, + month = apr, + year = 2015, +} + +@article{ lemos11effobs, + author = {Robert Lemos}, + title = {\href{http://www.infoworld.com/article/2620473/encryption/eff-builds-system-to-warn-of-certificate-breaches.html}{EFF builds system to warn of certificate breaches}}, + journal = {InfoWorld }, + month = september, + year = 2011, + day = 21, +} + +@misc{lee11litecoin, + title={\href{https://bitcointalk.org/index.php?topic=47417.0}{Litecoin -- A Light Version of Bitcoin}}, + author={Charlie Lee}, + year={2011} +} + +@inproceedings{ lee20replicated, + author = {Jonathan Lee and Kirill Nikitin and Srinath Setty}, + title = {\href{https://eprint.iacr.org/2020/195.pdf}{Replicated state machines + without replicated execution}}, + booktitle = {To appear in the IEEE Symposium on Security and Privacy}, + month = may, + year = {2020}, +} + + +@article{levy03poisoning, + author={E. Levy}, + journal={IEEE Security Privacy}, + title={\href{http://ieeexplore.ieee.org/document/1203227/}{Poisoning the + software supply chain}}, + year={2003}, + volume={1}, + number={3}, + pages={70-73}, + month={may} +} + +@inproceedings{lewenberg15inclusive, + title={\href{https://link.springer.com/chapter/10.1007/978-3-662-47854-7_33}{Inclusive block chain protocols}}, + author={Lewenberg, Yoad and Sompolinsky, Yonatan and Zohar, Aviv}, + booktitle={International Conference on Financial Cryptography and Data Security}, + pages={528--547}, + year={2015}, + organization={Springer} +} + +@inproceedings{li04secure, + title={Secure untrusted data repository (SUNDR)}, + author={Li, Jinyuan and Krohn, Maxwell N and Mazi{\`e}res, David and Shasha, Dennis}, + booktitle={OSDI}, + year={2004} +} + +@inproceedings{ li06bar, + author = {Harry C. Li and Allen Clement and Edmund L. Wong and Jeff Napper + and Indrajit Roy and Lorenzo Alvisi and Michael Dahlin}, + title = {\href{https://dl.acm.org/citation.cfm?id=1298474}{BAR Gossip}}, + booktitle = {\bibconf[7th]{OSDI}{Operating Systems Design and Implementation}}, + month = nov, + year = 2006, + location = {Seattle, Washington, USA}, +} + +@article{ li06revere, + author = {Li, Jun and Reiher, P. L. and Popek, G. J.}, + title = + {\href{http://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=1258125}{Resilient + Self-organizing Overlay Networks for Security Update Delivery}}, + journal = {IEEE J.Sel. A. Commun.}, + issue_date = {September 2006}, + volume = {22}, + number = {1}, + month = sep, + year = {2006}, + numpages = {14}, + publisher = {IEEE Press}, +} + +@inproceedings{liang06index, + title={The Index Poisoning Attack in P2P File Sharing Systems.}, + author={Liang, Jian and Naoumov, Naoum and Ross, Keith W}, + booktitle={INFOCOM}, + pages={1--12}, + year={2006}, + organization={Citeseer} +} + +@article{ lindeman12gentle, + author = {Mark Lindeman and Philip B. Stark}, + title = {\href{https://ieeexplore.ieee.org/document/6175884}{A Gentle Introduction to Risk-Limiting Audits}}, + journal = {IEEE Security \& Privacy}, + volume = 10, + number = 5, + month = sep, + year = 2012, +} + +@inproceedings{linn16blockchain, + title={\href{https://www.healthit.gov/sites/default/files/11-74-ablockchainforhealthcare.pdf}{Blockchain for health data and its potential use in health it and health care related research}}, + author={Linn, Laure A and Koo, Martha B}, + booktitle={ONC/NIST Use of Blockchain for Healthcare and Research Workshop. Gaithersburg, Maryland, United States: ONC/NIST}, + year={2016} +} + +@misc{linux16hyperledger, + title = {\href{https://www.hyperledger.org/}{Hyperledger Project}}, + author = {{Linux Foundation}}, + url = {https://www.hyperledger.org/}, + year = {2016}, +} + + +@inproceedings{liu05linkable, + author = {Liu, Joseph K and + Wong, Duncan S}, + title = {Linkable ring signatures: {S}ecurity models and new schemes}, + booktitle = {\bibconf{ICCSA}{Computational Science and Its Applications}}, + location = {Singapore}, + month = may, + year=2005 +} + +@inproceedings{ liu13screenpass, + author = {Dongtao Liu and Eduardo Cuervo and Valentin Pistol and + Ryan Scudellari and Landon P. Cox}, + title = {ScreenPass: Secure Password Entry on Touchscreen Devices}, + booktitle = {\bibconf[11th]{MobiSys}{International Conference on + Mobile Systems, Applications, and Services}}, + month = jun, + year = 2013, + location = {Taipei, Taiwan}, +} + +@inproceedings{ liu15end, + author = {Yabing Liu and Will Tome and Liang Zhang and David Choffnes + and Dave Levin and Bruce Maggs and Alan Mislove + and Aaron Schulman and Christo Wilson}, + title = {\href{http://conferences2.sigcomm.org/imc/2015/papers/p183.pdf}{An End-to-End Measurement of Certificate Revocation in the Web's PKI}}, + booktitle = {\bibconf{IMC}{Internet Measurement Conference}}, + month = oct, + year = 2015, + location = {Tokyo, Japan}, +} + +@inproceedings{liu2013improved, + title={Improved group off-the-record messaging}, + author={Liu, Hong and Vasserman, Eugene Y and Hopper, Nicholas}, + booktitle = {\bibconf{WPES}{ACM workshop on Privacy in the electronic society}}, + year={2013}, +} + +@misc{loss18combining, + author = {Julian Loss and Tal Moran}, + title = {\href{https://eprint.iacr.org/2018/235}{Combining Asynchronous and Synchronous Byzantine Agreement: The Best of Both Worlds}}, + howpublished = {Cryptology ePrint Archive, Report 2018/235}, + year = {2018}, +} + +@article{ loucaides19what, + author = {Darren Loucaides}, + title = {\href{https://www.wired.com/story/italy-five-star-movement-techno-utopians/}{What Happens When Techno-Utopians Actually Run a Country}}, + journal = {Wired}, + month = feb, + day = 14, + year = 2019, +} + +@article{lu08pseudotrust, + author={Li Lu and Jinsong Han and Yunhao Liu and Lei Hu + and Jin-Peng Huai and Ni, L. and Jian Ma}, + journal={Parallel and Distributed Systems, IEEE Transactions on}, + title={Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps}, + year={2008}, + month= oct, + volume={19}, + number={10}, + pages={1325 -1337}, +} + + + +@incollection{lu06sequential, + title={Sequential aggregate signatures and multisignatures without random oracles}, + author={Lu, Steve and Ostrovsky, Rafail and Sahai, Amit and Shacham, Hovav and Waters, Brent}, + booktitle={\bibconf{EUROCRYPT}{Conference on Theory and application of cryptographic techniques}}, + year={2006}, + +} + +@article{lu08pseudotrust, + author={Li Lu and Jinsong Han and Yunhao Liu and Lei Hu + and Jin-Peng Huai and Ni, L. and Jian Ma}, + journal={Parallel and Distributed Systems, IEEE Transactions on}, + title={Pseudo Trust: Zero-Knowledge Authentication in Anonymous P2Ps}, + year={2008}, + month= oct, + volume={19}, + number={10}, + pages={1325 -1337}, +} + +@inproceedings{lucas09flybynight, + author = {Matthew M. Lucas and + Nikita Borisov}, + title = {{flyByNight}: mitigating the privacy risks of social networking}, + booktitle = {\bibconf{SOUPS}{Symposium on Usable Privacy and Security}}, + year = {2009}, +} + +@inproceedings{ luckie15resilience, + author = {Matthew Luckie and Robert Beverly and Tiange Wu and Mark Allman and + kc claffy}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/2815675.2815700}{Resilience of Deployed TCP to Blind Attacks}}, + booktitle = {\bibbrev{IMC}{Internet Measurement Conference}}, + year = 2015, +} +% month = oct, + +@phdthesis{lueks17security, + title={\href{http://repository.ubn.ru.nl/bitstream/handle/2066/176475/176475.pdf?sequence=1}{Security and Privacy via Cryptography Having your cake and eating it too}}, + author={Lueks, W}, + year={2017}, + school={[Sl: sn]} +} + + +@inproceedings{luo09facecloak, + author = {Wanying Luo and + Qi Xie and + Urs Hengartner}, + title = {{FaceCloak}: {A}n Architecture for User Privacy on + Social Networking Sites}, + booktitle = {\bibconf{CSE}{International Conference on + Computational Science and Engineering}}, + year = {2009} +} + +@inproceedings{luu15demystifying, + author = {Luu, Loi and Teutsch, Jason and Kulkarni, Raghav and Saxena, Prateek}, + title = {\href{http://doi.acm.org/10.1145/2810103.2813659}{Demystifying + Incentives in the Consensus Computer}}, + booktitle = {Proceedings of the 22Nd ACM SIGSAC Conference on Computer and Communications Security}, + series = {CCS '15}, + year = {2015}, + location = {Denver, Colorado, USA}, + pages = {706--719}, + numpages = {14}, + publisher = {ACM}, +} + +@inproceedings{luu16secure, + author = {Luu, Loi and Narayanan, Viswesh and Zheng, Chaodong and Baweja, Kunal and Gilbert, Seth and Saxena, Prateek}, + title = {\href{http://doi.acm.org/10.1145/2976749.2978389}{A Secure Sharding Protocol For Open Blockchains}}, + booktitle = {Proceedings of the 2016 ACM SIGSAC Conference on Computer and Communications Security}, + series = {CCS '16}, + year = {2016}, + isbn = {978-1-4503-4139-4}, + location = {Vienna, Austria}, + pages = {17--30}, + numpages = {14}, + url = {http://doi.acm.org/10.1145/2976749.2978389}, + doi = {10.1145/2976749.2978389}, + acmid = {2978389}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {bitcoin, consensus protocol, sharding}, +} + +@phdthesis{ lynn07pairing, + author = {Lynn, Ben}, + title = {On the implementation of pairing-based cryptosystems}, + year = {2007}, + publisher = {Stanford University}, + school = {Stanford University}, + address = {Stanford, CA, USA}, +} + +@inproceedings{ lysyanskaya00pseudonym, + title={Pseudonym systems}, + author={Lysyanskaya, Anna and Rivest, Ronald L and Sahai, Amit and Wolf, Stefan}, + booktitle={Selected Areas in Cryptography}, + pages={184--199}, + year={2000}, + organization={Springer} +} + + + +%M + +@article{ ma09new, + author = {Di Ma and Gene Tsudik}, + title = {A New Approach to Secure Logging}, + journal = {ACM Transactions on Storage}, + volume = 5, + number = 1, + month = mar, + year = 2009, +} + +@article{macaskill13decoded, + author = {Ewen Macaskill and Gabriel Dance}, + title = {\href{http://www.theguardian.com/world/interactive/2013/nov/01/snowden-nsa-files-surveillance-revelations-decoded}{NSA Files Decoded}}, + journal = {the Guardian}, + month = november, + year = 2013, + day = 1, +} + +@article{ macaskill13gchq, + author = {Ewen MacAskill and Julian Borger and Nick Hopkins and + Nick Davies and James Ball}, + title = {{GCHQ} taps fibre-optic cables for secret access + to world's communications}, + journal = {The Guardian}, + month = jun, + day = 21, + year = 2013, + note = {\url{http://www.guardian.co.uk/uk/2013/jun/21/gchq-cables-secret-world-communications-nsa}}, +} + +@article{ mack18psa, + author = {David Mack}, + title = {\href{https://www.buzzfeednews.com/article/davidmack/obama-fake-news-jordan-peele-psa-video-buzzfeed}{This PSA About Fake News From Barack Obama Is Not What It Appears}}, + journal = {Buzzfeed News}, + month = apr, + year = 2018, +} + +@inproceedings{maesa17blockchain, + title={\href{https://scholar.googleusercontent.com/scholar.bib?q=info:9OGqDno-XxgJ:scholar.google.com/&output=citation&scisig=AAGBfm0AAAAAWvLFmOBeDy6bsqG1HLtJ9UOamXOaHd8B&scisf=4&ct=citation&cd=-1&hl=en}{Blockchain based access control}}, + author={Maesa, Damiano Di Francesco and Mori, Paolo and Ricci, Laura}, + booktitle={IFIP International Conference on Distributed Applications and Interoperable Systems}, + pages={206--220}, + year={2017}, + organization={Springer} +} + + + +@inproceedings{ maheswaran13cryptobook, + title={{Crypto-Book}: {A}n Architecture for Privacy Preserving Online Identities}, + author={Maheswaran, John and Wolinsky, David Isaac and Ford, Bryan}, + booktitle={\bibconf[12th]{HotNets}{ACM Workshop on Hot Topics + in Networks}}, + location = {College Park, MD}, + month = Nov, + year = 2013 +} + +@inproceedings{ maheswaran16building, + author = {John Maheswaran and Daniel Jackowitz and Ennan Zhai and David Isaac Wolinsky and Bryan Ford}, + title = {\href{http://dedis.cs.yale.edu/dissent/papers/cryptobook-abs}{Building Privacy-Preserving Cryptographic Credentials from Federated Online Identities}}, + booktitle = {CODASPY}, + month = mar, + year = 2016, +} + +@inproceedings{mahlki2004fairplay, + title={Fairplay\ --\ a secure two-party computation system}, + author={Malkhi, Dahlia and Nisan, Noam and Pinkas, Benny and Sella, Yaron}, + booktitle={{USENIX} Security Symposium}, + month={August}, + year={2004} +} + +@incollection{mahmoody11time, + title={\href{https://link.springer.com/chapter/10.1007%2F978-3-642-22792-9_3}{Time-Lock Puzzles in the Random Oracle Model}}, + author={Mahmoody, Mohammad and Moran, Tal and Vadhan, Salil}, + booktitle={\bibconf{CRYPTO}{Advances in Cryptology}}, + pages={39--50}, + year={2011}, + publisher={Springer} +} + +@misc{maidsafe16project, + title={\href{https://github.com/maidsafe/Whitepapers/blob/master/Project-Safe.md}{MaidSafe.net announces project SAFE to the community}}, + author={Maidsafe}, + year={2016} + } + +@inproceedings{ maniatis02secure, + author = {Petros Maniatis and Mary Baker}, + title = {Secure History Preservation through Timeline Entanglement}, + booktitle = {11th USENIX Security Symposium}, + month = aug, + year = 2002, + location = {San Francisco, CA}, +} + +@article{maram19dynamic, + title={Dynamic-Committee Proactive Secret Sharing}, + author={Maram, Sai Krishna Deepak and Zhang, Fan and Wang, Lun and Low, Andrew and Zhang, Yupeng and Juels, Ari and Song, Dawn}, + year = {2019}, +} + + +% previously malhotra15attacking (eprint) +@inproceedings{ malhotra16attacking, + author = {Aanchal Malhotra and Isaac E. Cohen and Erik Brakke + and Sharon Goldberg}, + title = {\href{https://www.ndss-symposium.org/wp-content/uploads/2017/09/attacking-network-time-protocol.pdf}{Attacking the Network Time Protocol}}, + booktitle = {\bibconf{NDSS}{Network and Distributed System Security Symposium}}, + month = feb, + year = 2016, + location = {San Diego, CA, USA}, +} + +@article{ malhotra16broadcast, + author = {Aanchal Malhotra and Sharon Goldberg}, + title = {\href{http://www.sigcomm.org/node/3899}{Attacking NTP’s Authenticated Broadcast Mode}}, + journal = {ACM SIGCOMM Computer Communication Review}, + month = apr, + year = 2016, + volume = 46, + number = 2, +} + +@inproceedings{ malhotra17security, + author = {Aanchal Malhotra and Matthew Van Gundy and Mayank Varia and + Haydn Kennedy and Jonathan Gardner and Sharon Goldberg}, + title = {\href{https://fc17.ifca.ai/preproceedings/paper_29.pdf}{The Security of NTP’s Datagram Protocol}}, + booktitle = {\bibconf{FC}{Financial Cryptography and Data Security}}, + month = apr, + year = 2017, + location = {Malta}, +} + +@article{ malkhi98byzantine, + author = {Dahlia Malkhi and Michael Reiter}, + title = {\href{https://dl.acm.org/doi/abs/10.1007/s004460050050}{Byzantine Quorum Systems}}, + journal = {Distributed Computing}, + month = oct, + year = 1998, + volume = 11, + number = 4, +} + +@inproceedings{malkhi19flexible, + title={Flexible Byzantine fault tolerance}, + author={Malkhi, Dahlia and Nayak, Kartik and Ren, Ling}, + booktitle={Proceedings of the 2019 ACM SIGSAC Conference on Computer and Communications Security}, + pages={1041--1053}, + year={2019} +} + +@inproceedings{matsumoto2017ikp, + title={\href{https://ieeexplore.ieee.org/document/7958590}{IKP: Turning a PKI + around with decentralized automated incentives}}, + author={Matsumoto, Stephanos and Reischuk, Raphael M}, + booktitle={Security and Privacy (SP), 2017 IEEE Symposium on}, + pages={410--426}, + year={2017}, + organization={IEEE} +} + +@article{ manils10compromising, + title = {Compromising {Tor} anonymity exploiting {P2P} information leakage}, + author = {Manils, P. and Abdelberri, C. and Blond, S.L. + and Kaafar, M.A. and Castelluccia, C. and Legout, A. and Dabbous, W.}, + journal = {arXiv preprint arXiv:1004.1461}, + year = {2010}, +} + +@misc{ marlinspike13trust, + author = {M. Marlinspike and T. {Perrin, Ed.}}, + title = {Trust Assertions for Certificate Keys}, + month = jan, + year = 2013, + note = {Internet-Draft draft-perrin-tls-tack-02.txt (Work in Progress)}, +} + +@inproceedings{ marlinspike11ssl, + author = {Moxie Marlinspike}, + title = {{SSL} And The Future Of Authenticity}, + booktitle = {BlackHat USA}, + month = aug, + year = 2001, +} + +@article{ mathews16flaws, + author = {Hans Verghese Mathews}, + title = {\href{https://www.epw.in/journal/2016/9/special-articles/flaws-uidai-process.html}{Flaws in the UIDAI Process}}, + journal = {Economic \& Political Weekly}, + volume = 51, + number = 9, + month = feb, + year = 2016, +} + +@inproceedings { mathewson04disclosure, + author = {Mathewson, Nick and Dingledine, Roger}, + title = {Practical traffic analysis: extending and resisting statistical disclosure}, + booktitle = {\bibconf[4th]{PETS}{International Workshop on + Privacy Enhancing Technologies}}, + year = {2004}, + month = {May}, +} + +@misc{mazieres07paxos, + title={Paxos made practical}, + author={Mazieres, David}, + year={2007} +} + +@inproceedings{ maurer91ibe, + title={Non-interactive public-key cryptography}, + author={Maurer, Ueli and Yacobi, Yacov}, + booktitle={\bibconf{EUROCRYPT}{Conference on Theory and application of cryptographic techniques}}, + year={1991}, +} + +@inproceedings{mccorry2017smart, + title={\href{https://eprint.iacr.org/2017/110.pdf}{A Smart Contract for + Boardroom Voting with Maximum Voter Privacy}}, + author={McCorry, Patrick and Shahandashti, Siamak F and Hao, Feng}, + booktitle={International Conference on Financial Cryptography and Data Security}, + pages={357--375}, + year={2017}, +} + +@inproceedings{ mccoy08shining, + title = {Shining light in dark places: Understanding the {Tor} network}, + author = {McCoy, D. and Bauer, K. and Grunwald, D. and Kohno, T. and Sicker, D.}, + booktitle = {Privacy Enhancing Technologies}, + pages = {63--76}, + year = {2008}, +} + +@misc{ mcgonaghy16dcs, + author = {Trent McConaghy}, + title = {\href{https://blog.bigchaindb.com/the-dcs-triangle-5ce0e9e0f1dc}{The DCS Triangle}}, + month = jun, + year = 2016, +} + +@inproceedings{melara15coniks, + title={\href{https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf}{{CONIKS}: Bringing Key Transparency to End Users}}, + author={Melara, Marcela S and Blankstein, Aaron and Bonneau, Joseph and Felten, Edward W and Freedman, Michael J}, + booktitle={Proceedings of the 24th USENIX Conference on Security Symposium}, + pages={383--398}, + year={2015}, + organization={USENIX Association} +} + + +%author={Melara, Marcela S and Blankstein, Aaron and Bonneau, Joseph and Felten, Edward W and %Freedman, Michael J} +@inproceedings{melara15coniks2, + title={\href{https://www.usenix.org/system/files/conference/usenixsecurity15/sec15-paper-melara.pdf}{{CONIKS}: Bringing key transparency to end users}}, + author={Melara and others}, + booktitle={24th USENIX Conference on Security Symposium}, + year={2015}, +} + +@article{ menezes93elliptic, + author = {Menezes, Alfred J. and Vanstone, Scott A.}, + title = {Elliptic curve cryptosystems and their implementation}, + journal = {Journal of Cryptology}, + publisher = {Springer New York}, + issn = {0933-2790}, + keyword = {Computer Science}, + pages = {209-224}, + volume = {6}, + issue = {4}, + year = {1993} +} + +@phdthesis{ merkle79secrecy, + title = {\href{http://www.merkle.com/papers/Thesis1979.pdf}{Secrecy, Authentication, and Public Key Systems}}, + author = {Ralph Charles Merkle}, + school = {Stanford University}, + month = jun, + year = {1979}, + url = {http://www.merkle.com/papers/Thesis1979.pdf}, +} + +@inproceedings{merkle89certified, + title={\href{https://link.springer.com/chapter/10.1007%2F0-387-34805-0_21?LI=true}{A certified digital signature}}, + author={Merkle, Ralph}, + booktitle={Advances in Cryptology—CRYPTO 89 Proceedings}, + pages={218--238}, + year={1990}, + organization={Springer} +} + +@inproceedings{ micali99verifiable, + author = {Micali, Silvio and Vadhan, Salil and Rabin, Michael}, + title = {\href{https://people.csail.mit.edu/silvio/Selected%20Scientific%20Papers/Pseudo%20Randomness/Verifiable_Random_Functions.pdf}{Verifiable Random Functions}}, + booktitle = {Proceedings of the 40th Annual Symposium on Foundations of Computer Science}, + series = {FOCS '99}, + year = {1999}, + pages = {120--130}, + publisher = {IEEE Computer Society}, +} + +@inproceedings{micali01accountable, + title={Accountable-subgroup multisignatures}, + author={Micali, Silvio and Ohta, Kazuo and Reyzin, Leonid}, + booktitle = {\bibconf{CCS}{ACM Conference on Computer and + Communications Security}}, + year={2001}, +} + +@inproceedings{michels96risk, + title={On the risk of disruption in several multiparty signature schemes}, + author={Michels, Markus and Horster, Patrick}, + booktitle={\bibconf{ASIACRYPT}{Advances in Cryptology}}, + year={1996}, +} + +@inproceedings{ miers13zerocoin, + author = {Ian Miers and + Christina Garman and + Matthew Green and + Aviel D. Rubin}, + title = {\href{https://ieeexplore.ieee.org/abstract/document/6547123/}{Zerocoin: + Anonymous Distributed E-Cash from {Bitcoin}}}, + booktitle = {\bibconf[34th]{S{\&}P}{IEEE Symposium on Security and Privacy}}, + location = {San Francisco, CA}, + month = may, + year = 2013 +} + +@techreport{miller14anonymous, + title={Anonymous {Byzantine} Consensus from Moderately-Hard Puzzles: + A Model for {Bitcoin}}, + author={Miller, Andrew and LaViola Jr., Joseph J.}, + institution={University of Central Florida}, + number={CS-TR-14-01}, + month=apr, + year={2014}, + url={https://socrates1024.s3.amazonaws.com/consensus.pdf}, +} + +@inproceedings{miller15shadow, + title={\href{https://www.usenix.org/conference/cset15/workshop-program/presentation/miller}{Shadow-Bitcoin: scalable simulation via direct execution of multi-threaded applications}}, + author={Miller, Andrew and Jansen, Rob}, + booktitle={8th Workshop on Cyber Security Experimentation and Test (CSET 15)}, + year={2015}, + url={https://www.usenix.org/conference/cset15/workshop-program/presentation/miller}, +} + +% obsoleted by conference version miller16honey +@techreport{miller16honey-eprint, + title={\href{https://eprint.iacr.org/2016/199.pdf}{The Honey Badger of BFT protocols}}, + author={Miller, Andrew and Xia, Yu and Croman, Kyle and Shi, Elaine and Song, Dawn}, + year={2016}, + institution={Cryptology ePrint Archive 2016/199} + +} + +@inproceedings{miller16honey, + author = {Miller, Andrew and Xia, Yu and Croman, Kyle and Shi, Elaine and Song, Dawn}, + title = {\href{https://eprint.iacr.org/2016/199.pdf}{The Honey Badger of BFT Protocols}}, + booktitle = {\bibconf{CCS}{Computer and Communications Security}}, + year = {2016}, + keywords = {BFT, asynchronous, atomic broadcast, blockchain}, +} + +@inproceedings{ miller14know, + author = {Brad Miller and Ling Huang andA.D.Joseph and J.D. Tygar}, + title = {I Know Why You Went to the Clinic: + Risks and Realization of {HTTPS} Traffic Analysis}, + booktitle = {PETS}, + month = jul, + year = 2014, +} + +@article { mimoso15dlink, + author = {Michael Mimoso}, + title = {\href{https://threatpost.com/d-link-accidentally-leaks-private-code-signing-keys/114727/}{D-Link Accidentally Leaks Private Code-Signing Keys}}, + journal = {ThreatPost}, + month = sep, + year = 2015, +} + +@inproceedings{minkus14know, + author = {Tehila Minkus and + Keith W. Ross}, + title = {I Know What You're Buying: {P}rivacy breaches on e{B}ay}, + booktitle = {\bibconf[14th]{PETS}{International Symposium on Privacy + Enhancing Technologies}}, + location = {Amsterdam, Netherlands}, + month = jul, + year = 2014 +} + +@inproceedings{ mislove08ostra, + author = {Alan Mislove and Ansley Post and Peter Druschel and + Krishna P. Gummadi}, + title = {Ostra: Leveraging trust to thwart unwanted communication}, + booktitle = {\bibconf[5th]{NSDI}{USENIX Symposium on Networked Systems Design and Implementation}}, + month = apr, + year = 2008, + pages = {15-30}, +} + +@misc{ moeller00mixmaster, + author = {Moeller, Ulf and Cottrell, Lance}, + month = jan, + year = 2003, + title = {Mixmaster Protocol: Version 2}, + howpublished = {\url{http://freehaven.net/anonbib/cache/mixmaster-spec.txt}} +} + +@inproceedings{moniz06randomized, + author = {Moniz, Henrique and Neves, Nuno Ferreira and Correia, Miguel and Verissimo, Paulo}, + title = {\href{https://www.gsd.inesc-id.pt/~mpc/pubs/hmoniz-randomized.pdf}{Randomized Intrusion-Tolerant Asynchronous Services}}, + year = {2006}, + booktitle = {Proceedings of the International Conference on Dependable Systems and Networks}, + pages = {568--577}, + series = {DSN ’06} +} + +@inproceedings{ mont03hp, + author = {Marco Casassa Mont and Keith Harrison and Martin Sadler}, + title = {The {HP} Time Vault Service: Exploiting {IBE} + for Timed Release of Confidential Information}, + booktitle = {\bibconf[12th]{WWW}{International World Wide Web Conference}}, + month = may, + year = 2003, +} + +@misc{ moore13unplug, + author = {{HD} Moore}, + month = jan, + year = 2013, + title = {Whitepaper: Security Flaws in Universal Plug and Play: Unplug, Don't Play}, + howpublished = {\url{https://community.rapid7.com/docs/DOC-2150}}, +} + +@inproceedings{morenosanchezk15privacy, + author = {Pedro Moreno{-}Sanchez and + Aniket Kate and + Matteo Maffei and + Kim Pecina}, + title = {Privacy Preserving Payments in Credit Networks: + {E}nabling trust with privacy in online marketplaces}, + booktitle = {\bibconf[22th]{NDSS}{Annual Network and Distributed System + Security Symposium}}, + location = {San Diego, CA}, + month = feb, + year = 2015 +} + +@article{ morris14inside, + author = {David Z. Morris}, + title = {\href{http://fortune.com/2014/04/09/inside-the-world-of-national-cryptocurrencies/}{Inside the world of national cryptocurrencies}}, + journal = {Fortune}, + month = apr, + year = 2014, +} + +@techreport{ moshchuk12content, + author = {Alexander Moshchuk and Helen J. Wang and Yunxin Liu}, + title = {Content-Based Isolation: + Rethinking Isolation Policy in Modern Client Systems}, + number = {MSR-TR-2012-82}, + month = aug, + year = 2012, + institution = {Microsoft Research}, +} + +@article{movahedi14broadcast, + author = {Mahnush Movahedi and + Jared Saia and + Mahdi Zamani}, + title = {Secure Anonymous Broadcast}, + journal = {CoRR}, + volume = {abs/1405.5326}, + year = {2014}, + url = {http://arxiv.org/abs/1405.5326}, +} + +@inproceedings{ murdoch07sampled, + author = {Murdoch, Steven J. and Zieli\'{n}ski, Piotr}, + title = {Sampled Traffic Analysis by {Internet}-Exchange-Level Adversaries}, + booktitle = {\bibconf[7th]{PETS}{Privacy Enhancing Technologies Symposium}}, + year = {2007}, +} + + +%N + +@misc{ nakamoto08bitcoin, + author = {Satoshi Nakamoto}, + title = {\href{https://bitcoin.org/bitcoin.pdf}{Bitcoin: A Peer-to-Peer Electronic Cash System}}, + year = 2008, +} + month = oct, + + +@INPROCEEDINGS{naor02deniable, + author = {Moni Naor}, + title = {Deniable Ring Authentication}, + booktitle = {\bibconf['02]{CRYPTO}{Advances in Cryptology}}, + year = {2002}, +} + + + +@inproceedings{narayanan11location, + title={Location privacy via private proximity testing}, + author={Narayanan, Arvind and Thiagarajan, Narendran and Lakhani, Mugdha and Hamburg, Michael and Boneh, Dan}, + booktitle={Proc. of NDSS}, + volume={2011}, + year={2011} +} + +@inproceedings{narayanan08robust, + author = {Arvind Narayanan and + Vitaly Shmatikov}, + title = {Robust de-anonymization of large sparse datasets}, + booktitle = {\bibconf[29th]{IEEE S{\&}P}{IEEE Symposium on Security and + Privacy}}, + month = may, + year = 2008, + location = {Oakland, CA} +} + +@inproceedings{narayanan12feasibility, + author = {Arvind Narayanan and + Hristo S. Paskov and + Neil Zhenqiang Gong and + John Bethencourt and + Emil Stefanov and + Eui Chul Richard Shin and + Dawn Song}, + title = {On the feasibility on {I}nternet-scale author identification}, + booktitle = {\bibconf{S{\&}P}{IEEE Symposium on Security and + Privacy}}, + month = may, + year = 2012, + location = {San Francisco, CA} +} + +@inproceedings{narayanan10socialkeys, + title={{SocialKeys}: Transparent Cryptography via Key Distribution over Social Networks}, + booktitle={IAB Workshop on Internet Privacy}, + year={2010}, + author={Narayanan, Arvind}, +} + + +@inproceedings{ narula18zkledger, + author = {Neha Narula and Willy Vasquez and Madars Virza}, + title = {\href{https://www.usenix.org/conference/nsdi18/presentation/narula}{{zkLedger}: Privacy-Preserving Auditing for Distributed Ledgers}}, + booktitle = {15th USENIX Symposium on Networked Systems Design and Implementation (NSDI)}, + month = apr, + year = 2018, + url = {https://www.usenix.org/conference/nsdi18/presentation/narula}, +} + +@inproceedings{nayak15stubborn, + title={\href{http://eprint.iacr.org/2015/796.pdf}{Stubborn Mining: Generalizing Selfish Mining and Combining with an Eclipse Attack}}, + booktitle={1st IEEE European Symposium on Security and Privacy}, + author={Nayak, Kartik and Kumar, Srijan and Miller, Andrew and Shi, Elaine}, + month = mar, + year={2015}, + url={http://eprint.iacr.org/2015/796.pdf}, +} + +@inproceedings{neisse2017blockchain, + title={\href{https://scholar.googleusercontent.com/scholar.bib?q=info:kywG5E9XAn4J:scholar.google.com/&output=citation&scisig=AAGBfm0AAAAAWvLF7wUSaMoQQGWDZfAxB_86sCVMGCJ5&scisf=4&ct=citation&cd=-1&hl=en}{A Blockchain-based Approach for Data Accountability and Provenance Tracking}}, + author={Neisse, Ricardo and Steri, Gary and Nai-Fovino, Igor}, + booktitle={Proceedings of the 12th International Conference on Availability, Reliability and Security}, + pages={14}, + year={2017}, + organization={ACM} +} + + +@article{nguyen06verifiable, + author = {Lan Nguyen and + Reihaneh Safavi{-}Naini and + Kaoru Kurosawa}, + title = {Verifiable shuffles: a formal model and a {P}aillier-based + three-round construction with provable security}, + journal = {Int. J. Inf. Sec.}, + volume = {5}, + number = {4}, + pages = {241--255}, + year = 2006 +} + + +@inproceedings {nikitin17chainiac, + author = {Kirill Nikitin and Eleftherios Kokoris-Kogias and Philipp Jovanovic and Nicolas Gailly and Linus Gasser and Ismail Khoffi and Justin Cappos and Bryan Ford}, + title = {\href{https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/nikitin}{{CHAINIAC}: Proactive Software-Update Transparency via Collectively Signed Skipchains and Verified Builds}}, + booktitle = {26th {USENIX} Security Symposium}, + year = {2017}, + pages = {1271--1287} +} + +@article{ nikitin19reducing, + author = {Kirill Nikitin and Ludovic Barman and Wouter Lueks and + Matthew Underwood and Jean-Pierre Hubaux and Bryan Ford}, + title = {\href{https://content.sciendo.com/view/journals/popets/2019/4/article-p6.xml}{Reducing Metadata Leakage from Encrypted Files and Communication with {PURBs}}}, + journal = {Proceedings on Privacy Enhancing Technologies}, + volume = 2019, + number = 4, + month = jul, + year = 2019 +} + +% obsoleted by NISTIR 8213 +@misc{nist-beacon, + author={{National Institute of Standards and Technology}}, + title = {\href{https://csrc.nist.gov/Projects/Interoperable-Randomness-Beacons}{Interoperable Randomness Beacons}}, + year={2017}, +} + +@misc{ nist09fips186, + author = {{National Institute of Standards and Technology}}, + title = {{FIPS PUB 186-3: Digital Signature Standard (DSS)}}, + year = {2009} +} + +@misc{ nist12recommendation, + author = {{National Institute of Standards and Technology}}, + title = {{Special Publication 800-57: Recommendation for Key Management}}, + year = {2012} +} + +@inbook{nist15security, + title = {\href{http://nvlpubs.nist.gov/nistpubs/ir/2015/NIST.IR.7966.pdf}{Security of Interactive and automated Access +Management Using Secure Shell (SSH)}}, +chapter = "5.1.2", + author={{NIST}}, + year={2015}, +} + +@techreport{ nist19reference, + author = {John Kelsey and Lu\'is T. A. N. Brand\~ao and Rene Peralta + and Harold Booth}, + title = {\href{https://csrc.nist.gov/publications/detail/nistir/8213/draft}{A Reference for Randomness Beacons: Format and Protocol Version 2}}, + month = may, + year = 2019, + institution = {{National Institute of Standards and Technology}}, + number = {NISTIR 8213 (DRAFT)} +} + +@misc{ nordberg15gossiping, + author = {L. Nordberg and D. Gillmor and T. Ritter}, + title = {\href{https://tools.ietf.org/html/draft-linus-trans-gossip-ct-02}{Gossiping in CT}}, + howpublished = {Internet-Draft draft-linus-trans-gossip-ct-02}, + month = jul, + year = 2015, +} + +@misc{ nullbyte14hack, + author = {{Null Byte}}, + title = {\href{http://null-byte.wonderhowto.com/how-to/hack-like-pro-hijack-software-updates-install-rootkit-for-backdoor-access-0149225/}{Hack Like a Pro: How to Hijack Software Updates to Install a Rootkit for Backdoor Access}}, + howpublished = {WonderHowTo}, + year = 2014, +} + +%O + +@misc{ ocean18data, + author = {{Ocean Protocol Foundation}}, + title = {\href{https://oceanprotocol.com/#papers}{Ocean Protocol: A Decentralized Substrate for AI Data \& Services}}, + month = may, + year = 2018, +} + +@article{okamoto99multi, + title={Multi-signature schemes secure against active insider attacks}, + author={Ohta, Kazuo and Okamoto, Tatsuaki}, + journal={IEICE Transactions on Fundamentals of Electronics, Communications and Computer Sciences}, + month=jan, + year={1999}, +} + +@inproceedings{oluwasanmi:2012:beacon, + author = {Oluwasanmi, Olumuyiwa and Saia, Jared}, + title = {{Scalable Byzantine Agreement with a Random Beacon}}, + booktitle = {Stabilization, Safety, and Security of Distributed Systems}, + volume = {7596}, + series = {Lecture Notes in Computer Science}, + editor = {Richa, Andr\'{e}a W. and Scheideler, Christian}, + publisher = {Springer Berlin Heidelberg}, + pages = {253-265}, + year = {2012}, + isbn = {978-3-642-33535-8}, + doi = {10.1007/978-3-642-33536-5_25}, + url = {http://dx.doi.org/10.1007/978-3-642-33536-5_25}, +} + +@misc{oraclize, + title = {\href{http://www.oraclize.it/}{Oraclize - blockchain oracle + service, enabling data-rich smart contracts}}, +} + +@inproceedings{oswald05sidechannel, + author = {Elisabeth Oswald and + Stefan Mangard and + Norbert Pramstaller and + Vincent Rijmen}, + title = {A side-channel analysis resistant description of the {AES} + {S-Box}}, + booktitle = {\bibconf{FSE}{Fast Software Encryption Workshop}}, + location = {Paris, France}, + month = feb, + year = 2005 +} + +@article{ouaddah2016fairaccess, + title={FairAccess: a new Blockchain-based access control framework for the Internet of Things}, + author={Ouaddah, Aafaf and Abou Elkalam, Anas and Ait Ouahman, Abdellah}, + journal={Security and Communication Networks}, + volume={9}, + number={18}, + pages={5943--5964}, + year={2016}, + publisher={Wiley Online Library} +} + +%P + +@techreport{pagnia99impossibility, + title={\href{https://pdfs.semanticscholar.org/208b/22c7a094ada20736593afcc8c759c7d1b79c.pdf}{On the impossibility of fair exchange without a trusted third party}}, + author={Pagnia, Henning and G{\"a}rtner, Felix C}, + year={1999}, + institution={Technical Report TUD-BS-1999-02, Darmstadt University of Technology, Department of Computer Science, Darmstadt, Germany} +} + +@inproceedings{paillier99public, + author = {Pascal Paillier}, + title = {Public-{K}ey Cryptosystems Based on Composite + Degree Residuosity Classes}, + booktitle = {\bibconf{EUROCRYPT}{Advances in Cryptology}}, + month = may, + year = 1999 +} + +@inproceedings{ palomar06p2p, + author={Palomar, E. and Estevez-Tapiador, J.M. and Hernandez-Castro, J.C. + and Ribagorda, A.}, + title={\href{http://ieeexplore.ieee.org/lpdocs/epic03/wrapper.htm?arnumber=1698436} + {A Protocol for Secure Content Distribution in Pure P2P Networks}}, + booktitle={Proceeding of the 17th International Conference on Database and + Expert Systems Applications}, + year={2006} +} + +@incollection{ pan08liveness, + author = {Gang Pan and Zhaohui Wu and Lin Sun}, + title = {\href{https://www.intechopen.com/books/recent_advances_in_face_recognition/liveness_detection_for_face_recognition/}{Liveness Detection for Face Recognition}}, + booktitle = {Recent Advances in Face Recognition}, + publisher = {IntechOpen}, + month = dec, + year = 2008, +} + +@inproceedings{ pang07fingerprinting, + author = {Pang, Jeffrey and Greenstein, Ben and Gummadi, Ramakrishna and Seshan, Srinivasan and Wetherall, David}, + title = {802.11 user fingerprinting}, + booktitle = {ACM International Conference on Mobile Computing and Networking (MobiCom)}, + year = {2007}, + pages = {99--110}, +} + +@article{parity2017alert, + author = {}, + title = {\href{https://paritytech.io/security-alert-2/}{Parity Wallet Security Alert}}, + year={2017} +} + +@misc{ park18spacemint, + author = {Sunoo Park and Albert Kwon and Georg Fuchsbauer + and Peter Ga\v{z}i and Jo\"el Alwen + and Krzysztof Pietrzak}, + title = {\href{https://fc18.ifca.ai/preproceedings/78.pdf}{SpaceMint: A Cryptocurrency Based on Proofs of Space}}, + booktitle = {Financial Cryptography and Data Security}, + month = feb, + year = 2018, + url = {https://fc18.ifca.ai/preproceedings/78.pdf}, +} + +% obsoleted by pass17hybrid +@misc{pass16hybrid, + author = {Rafael Pass and Elaine Shi}, + title = {\href{http://eprint.iacr.org/2016/917}{Hybrid Consensus: Efficient Consensus in the Permissionless Model}}, + howpublished = {Cryptology ePrint Archive, Report 2016/917}, + year = {2016}, +} + +@article{pass16analysis, + title={\href{https://eprint.iacr.org/2016/454.pdf}{Analysis of the Blockchain Protocol in Asynchronous Networks}}, + author={Pass, Rafael and Tech, Cornell and Seeman, Lior}, + journal={Annual International Conference on the Theory and Applications of Cryptographic Techniques ({EUROCRYPT})}, + year={2017}, + organization={Springer} +} + +@inproceedings{ pass17hybrid, + author = {Rafael Pass and Elaine Shi}, + title = {\href{http://drops.dagstuhl.de/opus/volltexte/2017/8004/}{Hybrid Consensus: Efficient Consensus in the Permissionless Model}}, + booktitle = {\bibconf[31st]{DISC}{International Symposium on Distributed Computing}}, + month = oct, + year = {2017}, + location = {Vienna, Austria}, +} + +@inproceedings{ pass17fruitchains, + author = {Rafael Pass and Elaine Shi}, + title = {\href{https://dl.acm.org/citation.cfm?id=3087809}{FruitChains: A Fair Blockchain}}, + booktitle = {\bibconf{PODC}{ACM Symposium on Principles of Distributed Computing}}, + month = jul, + year = 2017, + location = {Washington, DC, USA}, +} + +@incollection{pass03deniability, + title={On deniability in the common reference string and random oracle model}, + author={Pass, Rafael}, + booktitle={Advances in Cryptology-CRYPTO 2003}, + pages={316--337}, + year={2003}, + publisher={Springer} +} + +@inproceedings{pavlov04supporting, + author = {Elan Pavlov and + Jeffrey S. Rosenschein and + Zvi Topol}, + title = {Supporting privacy in decentralized additive reputation + systems}, + booktitle = {\bibconf[2nd]{iTrust}{Trust Management}}, + location = {Oxford, UK}, + month = mar, + year = 2004 +} + +@inproceedings{pedersen1991non, + title={Non-interactive and information-theoretic secure verifiable secret sharing.}, + author={Pedersen, Torben P and others}, + organization={Springer} +} + + +@inproceedings{peng06secrecy, + author = {Pai Peng and + Peng Ning and + Douglas S. Reeves}, + title = {On the secrecy of timing-based active watermarking trace-back + techniques}, + booktitle = {\bibconf{S{\&}P}{IEEE Symposium on Security and Privacy}}, + location = {Berkeley, CA}, + month = may, + year = 2006 +} + +@inproceedings{peng06ciphertext, + author = {Kun Peng and + Colin Boyd and + Ed Dawson and + Byoungcheon Lee}, + title = {Ciphertext comparison, a new solution + to millionaire problem}, + booktitle = {\bibconf[7th]{ICICS}{Information and Communications Security}}, + location = {Beijing, China}, + month = dec, + year = 2005 +} + +@article{ peralta92distribution, + author = {Ren\'e Peralta}, + title = {On the Distribution of Quadratic Residues and Nonresidues Modulo a Prime Number}, + journal = {Mathematics of Computation}, + year = {1992}, + pages = {443--440}, + volume = {58}, + number = {197}, +} + +@inproceedings{ petullo13minimalt, + author = {W. Michael Petullo and Xu Zhang and Jon A. Solworth + and Daniel J. Bernstein and Tanja Lange}, + title = {\href{http://cr.yp.to/tcpip/minimalt-20130522.pdf}{MinimaLT: Minimal-latency Networking Through Better Security}}, + booktitle = {ACM CCS}, + month = nov, + year = 2013, +} + +@inproceedings{pfitzmann91isdn, + title = {{ISDN-mixes: Untraceable communication with very small bandwidth overhead}}, + author = {Andreas Pfitzmann and Birgit Pfitzmann and Michael Waidner}, + booktitle = {GI/ITG Conference on Communication in Distributed Systems}, + year = {1991}, + month = {February}, +} + +@inproceedings{pfitzmann01anonymity, + title={Anonymity, unobservability, and pseudonymity? proposal for terminology}, + author={Pfitzmann, Andreas and K{\"o}hntopp, Marit}, + booktitle={Designing privacy enhancing technologies}, + pages={1--9}, + year={2001}, + organization={Springer} +} + +@misc{ pfitzmann10terminology, + title = {A terminology for talking about privacy by data minimization: + Anonymity, Unlinkability, Undetectability, Unobservability, + Pseudonymity, and Identity Management}, + author = {Andreas Pfitzmann and Marit Hansen}, + month = aug, + year = 2010, +} + +@article{pilkington15blockchain, + title={\href{https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2662660}{Blockchain Technology: Principles and Applications}}, + author={Pilkington, Marc}, + journal={Research Handbook on Digital Transformation}, + year={2015} +} + +@misc{poa, + title={\href{https://poa.network/}{POA Network}}, +} + +@inproceedings{poddebniak18efail, + author = {Damian Poddebniak and Christian Dresen and Jens Müller and + Fabian Ising and Sebastian Schinzel and Simon Friedberger and Juraj + Somorovsky and Jörg Schwenk}, + title = {\href{https://efail.de/efail-attack-paper.pdf}{Efail: Breaking + S/MIME and OpenPGP Email Encryption using Exfiltration Channels}}, + booktitle = {{USENIX} Security Symposium}, + year = {2018} +} + +@article{pohlig78improved, + author = {Stephen C. Pohlig and + Martin E. Hellman}, + title = {An improved algorithm for computing logarithms over + {GF(p)} and its cryptographic significance ({C}orresp.)}, + journal = {IEEE Transactions on Information Theory}, + volume = {24}, + number = {1}, + year = {1978}, + pages = {106-110} +} + +@misc{popov16rnd, + author = {Serguei Popov}, + title = {\href{http://eprint.iacr.org/2016/228}{On a decentralized trustless pseudo-random number generation algorithm}}, + howpublished = {Cryptology ePrint Archive, Report 2016/228}, + year = {2016}, +} + + +@misc{ popov18tangle, + author = {Serguei Popov}, + title = {\href{https://www.iota.org/research/academic-papers}{The Tangle}}, + month = apr, + year = 2018, +} + +@article{ porup15how, + author = {J.M. Porup}, + title = {\href{http://motherboard.vice.com/read/how-debian-is-trying-to-shut-down-the-cia-and-make-software-trustworthy-again}{How Debian Is Trying to Shut Down the CIA and Make Software Trustworthy Again}}, + journal = {Motherboard}, + month = sep, + day = 7, + year = 2015, +} + +@article{ poulsen13feds, + author = {Kevin Poulsen}, + title = {Feds Are Suspects in New Malware That Attacks {Tor} Anonymity}, + journal = {Wired}, + month = aug # "~5,", + year = 2013, + url = {http://www.wired.com/threatlevel/2013/08/freedom-hosting/}, +} + +@misc{ provable, + title = {\href{https://provable.xyz/}{Provable - Oraclize 2.0 - + blockchain oracle service, enabling data-rich smart contracts}}, +} + +@article{ psiaki16gnss, + author = {Mark L. Psiaki and Todd E. Humphreys}, + title = {\href{https://ieeexplore.ieee.org/document/7445815}{GNSS Spoofing and Detection}}, + journal = {Proceedings of the IEEE}, + volume = 104, + number = 6, + month = apr, + year = 2016, +} + +%Q + +%R + +@article{ rabin80probabilistic, + title={Probabilistic algorithm for testing primality}, + author={Rabin, Michael O}, + journal={Journal of number theory}, + volume={12}, + number={1}, + pages={128--138}, + year={1980}, + publisher={Elsevier} +} + +@article{rabin83beacons, + title = {Transaction {{Protection}} by {{Beacons}}}, + author = {{Rabin}, Michael O.}, + volume = {27}, + number = {2}, + journal = {Journal of Computer and System Sciences}, + year = {1983}, + pages = {256--267}, + doi = {10.1016/0022-0000(83)90042-9}, +} + +@inproceedings{ rabin98simplified, + author = {Tal Rabin}, + title = {\href{https://doi.org/10.1007/BFb0055722}{A Simplified Approach to Threshold and Proactive {RSA}}}, + booktitle = {\bibconf{CRYPTO}{Advances in Cryptology}}, + month = aug, + year = 1998, +} + +@inproceedings{ rackoff91noninteractive, + year={1991}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + title={Non-Interactive Zero-Knowledge Proof of Knowledge and Chosen Ciphertext Attack}, + author={Rackoff, Charles and Simon, Daniel R.}, + pages={433-444}, +} + +@article{raisaro19medco, + title = {MedCo: Enabling Secure and Privacy-Preserving Exploration of Distributed Clinical and Genomic Data}, + author = {Raisaro, Jean Louis and Troncoso-Pastoriza, Juan Ramón and Misbach, Mickaël and Gomes de Sá E Sousa, Joao André and Pradervand, Sylvain and Missiaglia, Edoardo and Michielin, Olivier and Ford, Bryan Alexander and Hubaux, Jean-Pierre}, + journal = {IEEE/ACM Transactions on Computational Biology and Bioinformatics}, + number = {4}, + volume = {16}, + pages = {1328-1341}, + year = {2019}, + abstract = {The increasing number of health-data breaches is creating a complicated environment for medical-data sharing and, consequently, for medical progress. Therefore, the development of new solutions that can reassure clinical sites by enabling privacy-preserving sharing of sensitive medical data in compliance with stringent regulations (e.g., HIPAA, GDPR) is now more urgent than ever. In this work, we introduce MedCo, the first operational system that enables a group of clinical sites to federate and collectively protect their data in order to share them with external investigators without worrying about security and privacy concerns. MedCo uses (a) collective homomorphic encryption to provide trust decentralization and end-to-end confidentiality protection, and (b) obfuscation techniques to achieve formal notions of privacy, such as differential privacy. A critical feature of MedCo is that it is fully integrated within the i2b2 (Informatics for Integrating Biology and the Bedside) framework, currently used in more than 300 hospitals worldwide. Therefore, it is easily adoptable by clinical sites. We demonstrate MedCo’s practicality by testing it on data from The Cancer Genome Atlas in a simulated network of three institutions. Its performance is comparable to the ones of SHRINE (networked i2b2), which, in contrast, does not provide any data protection guarantee.}, + url = {http://infoscience.epfl.ch/record/256348}, + doi = {10.1109/TCBB.2018.2854776}, +} + +@article{rajabi18verifiable, + title={\href{https://www.sciencedirect.com/science/article/pii/S0020025516316152}{A Verifiable Threshold Secret Sharing Scheme Based On Lattices}}, + author={Rajabi, Bahman and Eslami, Ziba}, + journal={Information Sciences}, + year={2018}, + publisher={Elsevier} +} + +@inproceedings{ ramasamy06parsimonious, + author = {HariGovind V. Ramasamy and Christian Cachin}, + title = {Parsimonious Asynchronous {Byzantine}-Fault-Tolerant + Atomic Broadcast}, + booktitle = {9th International Conference on Principles of Distributed Systems (OPODIS)}, + month = dec, + year = 2005, + url = {https://www.zurich.ibm.com/~cca/papers/oabc.pdf}, +} + +@inproceedings{raymond00traffic, + author = {Jean-Fran\c{c}ois Raymond}, + title = {Traffic Analysis: Protocols, Attacks, Design Issues and Open Problems}, + booktitle = {Workshop on Design Issues in Anonymity and Unobservability}, + year = {2000}, +} + +@misc{randao18, + author = {randao.org}, + title = {\href{https://www.randao.org}{Randao: Blockchain Based Verifiable Random Number Generator}}, + year = {2018}, +} + +@inproceedings{reardon13sok, + title={Sok: Secure data deletion}, + author={Reardon, Joel and Basin, David and Capkun, Srdjan}, + booktitle={Security and Privacy (SP), 2013 IEEE Symposium on}, + pages={301--315}, + year={2013}, + organization={IEEE} +} + +@inproceedings{ reiter94secure, + author = {Michael K. Reiter}, + title = {\href{https://dl.acm.org/citation.cfm?id=191194}{Secure Agreement Protocols: Reliable and Atomic Group Multicast in Rampart}}, + booktitle = {\bibconf[2nd]{CCS}{Computer and Communications Security}}, + year = 1994, +} + % month = nov, + % location = {Fairfax, Virginia, USA}, + +@misc{ reitman13securedrop, + title = {Freedom of the Press Foundation Launches {SecureDrop}, + an Open-Source Submission Platform for Whistleblowers}, + author = {Rainey Reitman}, + publisher = {Freedom of the Press Foundation}, + month = oct, + day = 15, + year = 2013, + note = {\url{https://pressfreedomfoundation.org/blog/2013/10/freedom-press-foundation-launches-securedrop}} +} + +@article{reutov2018ethereumprngs, + author = {Arseny Reutov}, + title = {\href{https://blog.positive.com/predicting-random-numbers-in-ethereum-smart-contracts-e5358c6b8620}{Predicting Random Numbers in Ethereum Smart Contracts}}, + year={2018} +} + +@article{risen13nsa, + author = {Risen, James and Poitras, Laura}, + title = {{NSA} Report Outlined Goals for More Power}, + journal = {The New York Times}, + month = Nov # {~22,}, + year = {2013} +} + +@inproceedings{ ristenpart10good, + title = {When good randomness goes bad: + Virtual machine reset vulnerabilities and hedging deployed cryptography}, + author = {Ristenpart, Thomas and Yilek, Scott}, + booktitle = {Network and Distributed System Security Symposium}, + year = {2010}, +} + +@techreport{rivest96time, + author = {Ronald L. Rivest and Adi Shamir and David A. Wagner}, + title={\href{https://dl.acm.org/citation.cfm?id=888615}{Time-lock puzzles and timed-release crypto}}, + month=mar, + year={1996}, + publisher={Massachusetts Institute of Technology}, + address = {Cambridge, MA, USA}, +} + +@article{rivest78rsa, + title={A method for obtaining digital signatures and public-key cryptosystems}, + author={Rivest, Ronald L and Shamir, Adi and Adleman, Len}, + journal={Communications of the ACM}, + year={1978}, +} + +@inproceedings{rivest06how, + author = {Ronald Rivest and + Adi Shamir and + Yael Tauman}, + title = {How to Leak a Secret: Theory and Applications of Ring Signatures}, + booktitle = {Essays in Memory of Shimon Even}, + year = {2006}, + pages = {164-186}, + ee = {http://dx.doi.org/10.1007/11685654_7}, + bibsource = {DBLP, http://dblp.uni-trier.de} +} + +@inproceedings{rogaway02authenticated, + title={Authenticated-encryption with associated-data}, + author={Rogaway, Phillip}, + booktitle={Proceedings of the 9th ACM conference on Computer and communications security}, + pages={98--107}, + year={2002} +} + +@inproceedings{ roesner12user, + author = {Franziska Roesner and Tadayoshi Kohno and + Alexander Moshchuk and Bryan Parno and Helen J. Wang and + Crispin Cowan}, + title = {User-Driven Access Control: + Rethinking Permission Granting in Modern Operating Systems}, + booktitle = {IEEE Symposium on Security and Privacy}, + month = may, + year = 2012, + location = {San Francisco, CA}, +} + +@incollection{ roosta07time, + author = {Tanya Roosta and Mike Manzo and Shankar Sastry}, + title = {\href{https://link.springer.com/chapter/10.1007%2F978-0-387-46276-9_14}{Time Synchronization Attacks in Sensor Networks}}, + booktitle = {Secure Localization and Time Synchronization for Wireless Sensor and Ad Hoc Networks}, + editor = {Radha Poovendran and Cliff Wang and Sumit Roy}, + publisher = {Springer}, + year = 2007, + pages = {325-345}, +} + +@inproceedings{ roth13secure, + title={A Secure Submission System for Online Whistleblowing Platforms}, + author={Roth, Volker and G{\"u}ldenring, Benjamin and + Rieffel, Eleanor and Dietrich, Sven and Ries, Lars}, + year = 2013, + month = apr, + booktitle = {\bibconf[17th]{FC}{Financial Cryptography and Data Security}} +} + +@article{rosenblatt15superfish, + author = {Seth Rosenblatt}, + title = {\href{http://www.cnet.com/news/superfish-torments-lenovo-owners-with-more-than-adware/}{Lenovo's Superfish security snafu blows up in its face}}, + journal = {CNET}, + month = february, + year = 2015, + day = 20, +} + +@inproceedings{ruffing14coinshuffle, + author = {Tim Ruffing and Pedro Moreno{-}Sanchez and + Aniket Kate}, + title = {\href{https://petsymposium.org/2014/papers/Ruffing.pdf}{{CoinShuffle}: {P}ractical Decentralized Coin Mixing for {Bitcoin}}}, + booktitle = {Privacy Enhancing Technologies Symposium (PETS)}, + month = jul, + year = 2014, + location = {Amsterdam, Netherlands}, + url = {https://petsymposium.org/2014/papers/Ruffing.pdf}, +} + +@inproceedings{ ryan14enhanced, + author = {Mark D. Ryan}, + title = {Enhanced Certificate Transparency and + End-to-end Encrypted Mail}, + booktitle = {\bibconf{NDSS}{Network and Distributed System + Security Symposium}}, + month = feb, + year = 2014, +} + +@article{ ryge16most, + author = {Leif Ryge}, + title = {\href{http://arstechnica.com/security/2016/02/most-software-already-has-a-golden-key-backdoor-its-called-auto-update/}{Most software already has a ``golden key'' backdoor: the system update}}, + journal = {arstechnica}, + month = feb, + year = 2016, +} + +%S + +%FC 2016 citation pending + +@misc{safeTSA, + key={Safe creative TSA}, + title = {Safe {C}reative {T}imestamping {A}uthority {(TSA)} server}, + howpublished = {\url{http://tsa.safecreative.org/}} +} + +@misc{saia:2014:scalable-mpc, + author = {Jared Saia and Mahdi Zamani}, + title = {\href{http://eprint.iacr.org/2014/872}{Recent Results in Scalable Multi-Party Computation}}, + howpublished = {Cryptology ePrint Archive, Report 2014/872}, + year = {2014}, +} + +@inproceedings{ samuel10survivable, + author = {Justin Samuel and Nick Mathewson and Justin Cappos + and Roger Dingledine}, + title = {\href{http://justinsamuel.com/papers/survivable-key-compromise-ccs2010.pdf}{Survivable Key Compromise in Software Update Systems}}, + booktitle={\bibconf[17th]{CCS}{ACM Conference on + Computer and Communications security}}, + month = oct, + year = 2010, + location = {Chicago, IL}, +} + +@inproceedings{ sandler07casting, + author = {Daniel Sandler and Dan S. Wallach}, + title = {Casting Votes in the {Auditorium}}, + booktitle = {\bibconf{EVT}{USENIX/ACCURATE Electronic + Voting Technology Workshop}}, + month = aug, + year = 2007, + location = {Boston, MA}, +} + +@inproceedings{sapirshtein15optimal, + title={Optimal Selfish Mining Strategies in {Bitcoin}}, + author={Sapirshtein, Ayelet and Sompolinsky, Yonatan and Zohar, Aviv}, + booktitle={Financial Cryptography and Data Security}, + month=feb, + year={2016}, + url={http://fc16.ifca.ai/preproceedings/30_Sapirshtein.pdf}, +} + + +@inproceedings{sasson2014zerocash, + title={\href{https://ieeexplore.ieee.org/abstract/document/6956581/}{Zerocash: Decentralized anonymous payments from {B}itcoin}}, + author={Sasson, Eli Ben and Chiesa, Alessandro and Garman, Christina and Green, Matthew and Miers, Ian and Tromer, Eran and Virza, Madars}, + booktitle={Security and Privacy (SP), 2014 IEEE Symposium on}, + pages={459--474}, + year={2014}, + organization={IEEE} +} + + +@inproceedings{schechter99auth, + author = {Schechter, Stuart and Parnell, Todd and Hartemink, Alexander}, + title = {Anonymous Authentication of Membership in Dynamic Groups}, + booktitle = {Proceedings of the Third International Conference on Financial Cryptography}, + series = {FC '99}, + year = {1999}, + pages = {184--195}, + publisher = {Springer-Verlag}, + address = {London, UK, UK}, +} + +@inproceedings{schiffner11limits, + author = {Stefan Schiffner and + Andreas Pashalidis and + Elmar Tischhauser}, + title = {On the limits of privacy in reputation systems}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the Electronic Society}}, + location = {Chicago, IL}, + month = oct, + year = 2011 +} + +@article{schlichting83fail, + title={Fail-stop processors: an approach to designing fault-tolerant computing systems}, + author={Schlichting, Richard D and Schneider, Fred B}, + journal={ACM Transactions on Computer Systems (TOCS)}, + volume={1}, + number={3}, + pages={222--238}, + year={1983}, + publisher={ACM New York, NY, USA} +} + +% journal version: schneier99secure +@inproceedings{ schneier98cryptographic, + author = {Bruce Schneier and John Kelsey}, + title = {Cryptographic Support for Secure Logs on Untrusted Machines}, + booktitle = {7th USENIX Security Symposium}, + month = jan, + year = 1998, + location = {San Antonio, Texas}, +} + + +@article{ schneier99secure, + author = {Bruce Schneier and John Kelsey}, + title = {Secure Audit Logs to Support Computer Forensics}, + journal = {ACM Transactions on Information and System Security}, + volume = 2, + number = 2, + year = 1999, +} + % month = may, + % pages = {159-176}, + +@article{ schneier13attacking, + author = {Bruce Schneier}, + title = {Attacking {Tor}: how the {NSA} targets users' online anonymity}, + journal = {The Guardian}, + month = oct, + day = 4, + year = 2013, +} + +@article{ schneier09tigers, + author = {Bruce Schneier}, + title = {\href{https://www.theguardian.com/technology/2009/jan/08/identity-fraud-security-biometrics-schneier-id}{Tigers use scent, birds use calls -- biometrics are just animal instinct}}, + journal = {The Guardian}, + month = jan, + year = 2009, +} + +@article{ schneier13nsa, + author = {Bruce Schneier}, + title = {NSA surveillance: A guide to staying secure}, + journal = {The Guardian}, + month = sep, + day = 6, + year = 2013, +} + +@article{schneier13offensive, + author = {Bruce Schneier}, + title = {\href{https://www.schneier.com/blog/archives/2013/06/us_offensive_cy.html}{US Offensive Cyberwar Policy}}, + journal = {Schneier on Security}, + month = jun, + year = 2013, + day = 21, +} + +@article{ schnorr91efficient, + title = {\href{https://www.researchgate.net/profile/Claus_Schnorr/publication/227088517_Efficient_signature_generation_by_smart_cards/links/0046353849579ce09c000000.pdf}{Efficient signature generation by smart cards}}, + author = {Schnorr, Claus P.}, + journal = {Journal of Cryptology}, + volume = {4}, + number = {3}, + pages = {161--174}, + year = {1991}, + publisher = {Springer}, + url = {https://www.researchgate.net/profile/Claus_Schnorr/publication/227088517_Efficient_signature_generation_by_smart_cards/links/0046353849579ce09c000000.pdf}, +} + +@inproceedings{ schoenmakers99simple, + title = {\href{https://link.springer.com/chapter/10.1007/3-540-48405-1_10}{A Simple Publicly Verifiable Secret Sharing Scheme and Its Application to Electronic Voting}}, + author = {Schoenmakers, Berry}, + booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}}, + pages = {784--784}, + month = aug, + year = {1999}, +} + +@article{ schryen09security, + author = {Guido Schryen and Eliot Rich}, + title = {\href{https://ieeexplore.ieee.org/document/5272405}{Security in Large-Scale Internet Elections: A Retrospective Analysis of Elections in Estonia, The Netherlands, and Switzerland}}, + journal = {IEEE Transactions on Information Forensics and Security}, + volume = 4, + number = 4, + month = dec, + year = 2009, + pages = {729-744}, +} + +@article{schwartz14ripple, + title={\href{https://ripple.com/files/ripple_consensus_whitepaper.pdf}{The Ripple protocol consensus algorithm}}, + author={Schwartz, David and Youngs, Noah and Britto, Arthur}, + journal={Ripple Labs Inc White Paper}, + pages={5}, + year={2014} +} + +@misc{secbit18fomo3d, + author = {SECBIT}, + title = {\href{https://medium.com/coinmonks/how-the-winner-got-fomo3d-prize-a-detailed-explanation-b30a69b7813f}{How the winner got Fomo3D prize - A Detailed Explanation}}, + month = aug, + year = 2018, +} + +@misc{ sedgwick08charlie, + year={2008}, + month = {May}, + howpublished = {\url{http://www.bostonmagazine.com/articles/2008/04/the-shaggy-god/}}, + author = {John Sedgwick}, + title = {The Shaggy God}, +} + +@inproceedings{ segal14catching, + author = {Aaron Segal and Bryan Ford and Joan Feigenbaum}, + title = {Catching Bandits and Only Bandits: + Privacy-Preserving Intersection Warrants + for Lawful Surveillance}, + booktitle = {4th USENIX Workshop on Free and Open Communications + on the Internet (FOCI'14)}, + month = aug, + year = 2014, +} + +@inproceedings{ segal16privacy, + author = {Aaron Segal and Joan Feigenbaum and Bryan Ford}, + title = {\href{https://dedis.cs.yale.edu/dissent/papers/wpes16-chaining-abs/}{Privacy-Preserving Lawful Contact Chaining}}, + booktitle = {\bibconf{WPES}{Workshop on Privacy in the Electronic Society}}, + month = oct, + year = 2016, +} + +@article{seres18evoting, + author = {István András Seres}, + title = {\href{https://medium.com/coinmonks/implementing-an-e-voting-protocol-with-blind-signatures-on-ethereum-411e88af044a}{Implementing an e-voting protocol with blind signatures on Ethereum}}, + year={2018} +} + +@article{sermersheim06lightweight, + title={Lightweight directory access protocol (LDAP): The protocol}, + author={Sermersheim, Jim}, + year={2006} +} + +@article{serjantov05passive, + year={2005}, + journal={International Journal of Information Security}, + title={Passive-attack analysis for connection-based anonymity systems}, + author={Serjantov, Andrei and Sewell, Peter}, + pages={172-180}, +} + +@inproceedings{serjantov02metric, + author = {Serjantov, Andrei and Danezis, George}, + title = {Towards an information theoretic metric for anonymity}, + booktitle = {Proceedings of the 2nd international conference on Privacy enhancing technologies}, + series = {PET'02}, + year = {2003}, +} + +@inproceedings{ sethi18security, + author = {Tegjyot Singh Sethi and Mehmed Kantardzic and Joung Woo Ryu}, + title = {\href{https://www.springerprofessional.de/en/security-theater-on-the-vulnerability-of-classifiers-to-explorat/12276254}{`Security Theater': On the Vulnerability of Classifiers to Exploratory Attacks}}, + booktitle = {\bibconf[12th]{PAISI}{Pacific Asia Workshop on Intelligence and Security Informatics}}, + month = may, + year = 2017, + location = {Jeju Island, South Korea}, +} + +@inproceedings{ setty12taking, + title={Taking proof-based verified computation a few steps closer to practicality}, + author={Setty, Srinath and Vu, Victor and Panpalia, Nikhil and Braun, Benjamin and Blumberg, Andrew J. and Walfish, Michael}, + booktitle={USENIX Security Symposium}, + year={2012} +} + +@article{sfox19eth2, + author = {SFOX}, + title = {\href{https://blog.sfox.com/ethereum-2-0-what-the-next-three-years-of-ethereum-will-look-like-b366a46f9704}{Ethereum 2.0: What the Next Three Years of Ethereum Will Look Like}}, + year={2019} +} + +@inproceedings{shafagh2017towards, + title={\href{https://dl.acm.org/citation.cfm?id=3140656}{Towards Blockchain-based Auditable Storage and Sharing of IoT Data}}, + author={Shafagh, Hossein and Burkhalter, Lukas and Hithnawi, Anwar and + Duquennoy, Simon}, + booktitle={Proceedings of the 2017 on Cloud Computing Security Workshop}, + pages={45--50}, + year={2017}, + organization={ACM} +} + + +@article{shah08privacy, + author = {Mehul A. Shah and + Ram Swaminathan and + Mary Baker}, + title = {Privacy-Preserving Audit and Extraction of + Digital Contents}, + journal = {IACR Cryptology ePrint Archive}, + volume = {2008}, + year = {2008}, + pages = {186} +} + +% was incorrectly labeled shamir85ibe +@inproceedings{shamir84identity, + title = {\href{https://link.springer.com/chapter/10.1007/3-540-39568-7_5}{Identity-Based Cryptosystems and Signature Schemes}}, + author = {Shamir, Adi}, + booktitle = {\bibconf{CRYPTO}{Advances in Cryptology}}, + month = aug, + year = 1984, + pages = {47-53}, +} + +@article{shamir79share, + author = {Adi Shamir}, + title = {\href{https://cs.jhu.edu/~sdoshi/crypto/papers/shamirturing.pdf}{How to Share a Secret}}, + journal = {Communications of the ACM}, + volume = {22}, + number = {11}, + year = {1979}, + pages = {612-613} +} + +@inproceedings{shamir79mental, + title = {Mental Poker}, + author = {Adi Shamir and + Ron Rivest and + Leonard Adleman}, + booktitle = {{MIT} {R}eport, {LCS/TM}-125}, + month = feb, + year = 1979 +} + +@inproceedings{shelat2011two, + author={shelat, abhi and Shen, Chih-Hao}, + title={Two-output secure computation with malicious adversaries}, + booktitle={International Conference on Theory and Applications of Cryptographic Techniques}, + publisher={Springer}, + month={March}, + year={2011} +} + +@article{shen11blind, + author = {Victor R. L. Shen and + Yu fang Chung and + Tzer Shyong Chen and + Yu An Lin}, + title = {A blind signature based on discrete logarithm problem}, + journal = {ICIC}, + volume = 7, + number = 9, + month = sep, + year = 2011 +} + +@INPROCEEDINGS{sherwood02p5, + author={Sherwood, R. and Bhattacharjee, B. and Srinivasan, A.}, + booktitle={Security and Privacy}, + title={P5 : a protocol for scalable anonymous communication}, + year={2002}, + pages={58-70}, +} + +@inproceedings{ shmatikov06measuring, + author = {Vitaly Shmatikov and Ming-Hsiu Wang}, + title = {Measuring Relationship Anonymity in Mix Networks}, + booktitle = {WPES}, + month = oct, + year = 2006, + location = {Alexandria, VA}, +} + +@inproceedings{ shmatikov06timing, + title={\href{https://www.cs.cornell.edu/~shmat/shmat_esorics06.pdf}{Timing analysis in low-latency mix networks: Attacks and defenses}}, + author={Shmatikov, Vitaly and Wang, Ming-Hsiu}, + booktitle={European Symposium on Research in Computer Security}, + month = sep, + year={2006} +} + +@article{shor99polynomial, + title={\href{https://epubs.siam.org/doi/10.1137/S0036144598347011}{Polynomial-time algorithms for prime factorization and discrete logarithms on a quantum computer}}, + author={Shor, Peter W}, + journal={SIAM review}, + volume={41}, + number={2}, + pages={303--332}, + year={1999}, + publisher={SIAM} +} + +@article{shoup98securing, + title={\href{https://link.springer.com/chapter/10.1007/BFb0054113}{Securing threshold cryptosystems against chosen ciphertext attack}}, + author={Shoup, Victor and Gennaro, Rosario}, + journal={Advances in Cryptology --- EUROCRYPT'98}, + pages={1--16}, + year={1998}, + publisher={Springer} +} + +@inproceedings{ shue13street, + author = {Craig A. Shue and Nathanael Paul and Curtis R. Taylor}, + title = {From an {IP} Address to a Street Address: + Using Wireless Signals to Locate a Target}, + booktitle = {\bibbrev[7th]{WOOT}{USENIX Workshop + on Offensive Technologies}}, + month = aug, + year = 2013, +} + +@misc{shumow07dualec, + author = {Dan Shumow and Niels Ferguson}, + title = {\href{http://rump2007.cr.yp.to/15-shumow.pdf}{On the Possibility of a Back Door in the NIST SP800-90 Dual EC PRNG}}, + howpublished = {CRYPTO 2007 Rump Session}, + year = {2007}, + note = {\url{http://rump2007.cr.yp.to/15-shumow.pdf}} +} + + + +@inproceedings{singh06eclipse, + author = {Atul Singh and Tseun Ngan and Peter Druschel and Dan Wallach}, + title = {Eclipse Attacks on Overlay Networks: Threats and Defenses}, + booktitle = {Proceedings of IEEE INFOCOM}, + year = {2006}, + month = {April}, + address = {Barcelona, Spain} +} + + +@misc{simoens10pvdkg, + author = {Koen Simoens and Roel Peeters and Bart Preneel}, + title = {{Increased Resilience in Threshold Cryptography: Sharing a Secret with Devices That Cannot Store Shares}}, + howpublished = {Cryptology ePrint Archive, Report 2010/207}, + year = {2010}, + note = {\url{http://eprint.iacr.org/2010/207}}, +} + +@misc{ sirer13introducing, + author = {Emin G\"un Sirer}, + title = {\href{http://hackingdistributed.com/2013/06/20/virtual-notary-intro/}{Introducing Virtual Notary}}, + month = jun, + year = 2013, +} + +@inproceedings{ smith98secure, + author = {Geoffrey Smith and + Dennis M. Volpano}, + title = {Secure information flow in a multi-threaded imperative language}, + booktitle = {\bibconf[25th]{POPL}{Symposium on Principles of Programming + Languages}}, + month = jan, + year = 1998, +} + + +@article{snow14factom, + title={Factom Business Processes Secured by Immutable Audit Trails on the Blockchain}, + author={Snow, Paul and Deery, Brian and Lu, Jack and Johnston, David and Kirby, Peter}, + journal={Whitepaper, Factom, November}, + year={2014} +} + +@article{ soghoian12petraeus, + title = {Surveillance and Security Lessons From the {Petraeus} Scandal}, + author = {Soghoian, Chris}, + journal = {ACLU Blog}, + month = nov # "~13,", + year = {2012}, + url = {http://www.aclu.org/blog/technology-and-liberty-national-security/surveillance-and-security-lessons-petraeus-scandal}, +} + +@inproceedings{ soghoian11certified, + author = {Soghoian, Christopher and Stamm, Sid}, + title = {\href{https://s3.amazonaws.com/files.cloudprivacy.net/ssl-mitm.pdf}{Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL}}, + booktitle = {Proceedings of the 15th International Conference on Financial Cryptography and Data Security}, + series = {FC'11}, + year = {2012}, + numpages = {10}, + publisher = {Springer-Verlag} +} + +@article{soltani13new, + author={Soltani, Ashkan and Gellman, Barton}, + title={\href{http://www.washingtonpost.com/blogs/the-switch/wp/2013/12/10/new-documents-show-how-the-nsa-infers-relationships-based-on-mobile-location-data/}{New documents show how the {NSA} infers relationships based on mobile location data}}, + journal = {The Washington Post}, + year = 2013, + month = dec # {~10,}, +} + + +@misc{sompolinsky13fastbitcoin, + author = {Yonatan Sompolinsky and Aviv Zohar}, + title = {\href{http://eprint.iacr.org/2013/881}{Accelerating {Bitcoin}'s Transaction Processing. + Fast Money Grows on Trees, Not Chains}}, + month = dec, + year = {2013}, + url = {http://eprint.iacr.org/2013/881}, +} + +@inproceedings{son2010dnscache, + title={\href{https://www.cs.cornell.edu/~shmat/shmat_securecomm10.pdf}{The + Hitchhiker’s Guide to DNS Cache Poisoning}}, + author={Son, Sooel and Shmatikov, Vitaly}, + booktitle={International Conference on Security and Privacy in Communication + Systems}, + pages={466--483}, + year={2010}, + organization={Springer} +} + +@misc{song18guess, + author = {Jonghyuk Song}, + title = + {\href{https://medium.com/coinmonks/attack-on-pseudo-random-number-generator-prng-used-in-1000-guess-an-ethereum-lottery-game-7b76655f953d}{Attack + on Pseudo-random number generator (PRNG) used in 1000 Guess, an + Ethereum lottery game (CVE-2018–12454)}}, + month = jul, + year = 2018, +} + + +@article{sonnino18coconut, + title={\href{https://arxiv.org/abs/1802.07344}{Coconut: Threshold Issuance Selective Disclosure Credentials with Applications to Distributed Ledgers}}, + author={Sonnino, Alberto and Al-Bassam, Mustafa and Bano, Shehar and Danezis, George}, + journal={arXiv preprint arXiv:1802.07344}, + year={2018} +} + +@article{ sputnik15russia, + key = {Sputnik}, + title = {\href{http://sputniknews.com/business/20150918/1027204933/russian-national-cryptocurrency.html}{Russia's Bitruble to be World's First State-Controlled Cryptocurrency}}, + journal = {Sputnik}, + month = sep, + year = 2015, +} + +@inproceedings{ spycher10coercion, + author = {Oliver Spycher and Rolf Haenni and Eric Dubuis}, + title = {\href{https://dl.gi.de/handle/20.500.12116/19498}{Coercion-Resistant Hybrid Voting Systems}}, + booktitle = {4th International Conference on Electronic Voting}, + month = jul, + year = 2010, +} + +@inproceedings{ srinivasan08protecting, + author = {Vijay Srinivasan and John Stankovic and Kamin Whitehouse}, + title = {Protecting your Daily In-Home Activity Information from a + Wireless Snooping Attack}, + booktitle = {UbiComp}, + month = sep, + year = 2008, +} + +@inproceedings{ stark09symmetric, + title = {Symmetric cryptography in {JavaScript}}, + author = {Stark, Emily and Hamburg, Michael and Boneh, Dan}, + booktitle = {Computer Security Applications Conference}, + pages = {373--381}, + year = {2009}, + organization = {{IEEE}} +} + +@inproceedings{stefanov12policy, + author = {Emil Stefanov and + Elaine Shi and + Dawn Song}, + title = {Policy-Enhanced Private Set Intersection: {S}haring Information While Enforcing Privacy Policies}, + booktitle = {Public Key Cryptography}, + year = {2012} +} + + +@article{subramanian17decentralized, + title={\href{https://dl.acm.org/citation.cfm?id=3158333}{Decentralized blockchain-based electronic marketplaces}}, + author={Subramanian, Hemang}, + journal={Communications of the ACM}, + volume={61}, + number={1}, + pages={78--84}, + year={2017}, + publisher={ACM} +} + + + +@book{swan15blockchain, + title={\href{http://shop.oreilly.com/product/0636920037040.do}{Blockchain: Blueprint for a new economy}}, + author={Swan, Melanie}, + year={2015}, + publisher={O'Reilly Media, Inc.} +} + + + +@misc{ swende17frontrunning, + author = {Martin Holst Swende}, + title = {\href{http://swende.se/blog/Frontrunning.html}{Blockchain Frontrunning}}, + month = oct, + year = 2017, +} + +@article{ sweeney96replacing, + author = {Latanya Sweeney}, + title = {Replacing personally-identifying information in medical records, the scrub system}, + journal = {Journal of the American Medical Informatics Association}, + year = {1996} +} + +@article{ syta14security, + author = {Ewa Syta and Aaron Johnson and Henry Corrigan-Gibbs and + Shu-Chun Weng and David Isaac Wolinsky and Bryan Ford}, + title = {Security Analysis of Accountable Anonymity in {Dissent}}, + journal = {\bibconf{TISSEC}{ACM Transactions on Information and System Security}}, + month = aug, + year = 2014, +} + +@misc{ syta14deniable, + author = {Ewa Syta and Benjamin Peterson and David Isaac Wolinsky and + Michael Fischer and Bryan Ford}, + title = {\href{https://cpsc.yale.edu/sites/default/files/files/TR1486.pdf}{Deniable Anonymous Group Authentication}}, + institution = {Yale University}, + number = {YALEU/DCS/TR-1486}, + month = feb, + year = 2014, +} + +% formerly used incorrect key syta15decentralizing +@inproceedings{ syta16keeping, + title={\href{http://dedis.cs.yale.edu/dissent/papers/witness-abs}{Keeping Authorities ``Honest or Bust'' with Decentralized Witness Cosigning}}, + author={Syta, Ewa and Tamas, Iulia and Visher, Dylan and Wolinsky, David Isaac and Jovanovic, Philipp and Gasser, Linus and Gailly, Nicolas and Khoffi, Ismail and Ford, Bryan}, + booktitle = {37th IEEE Symposium on Security and Privacy}, + month = may, + year={2016}, +} + +% formerly syta16scalable +@inproceedings{syta17scalable, + author = {Ewa Syta and Philipp Jovanovic and Eleftherios Kokoris-Kogias and Nicolas Gailly and Linus Gasser and Ismail Khoffi and Michael J. Fischer and Bryan Ford}, + title = {\href{https://www.ieee-security.org/TC/SP2017/papers/413.pdf}{Scalable Bias-Resistant Distributed Randomness}}, + booktitle = {38th IEEE Symposium on Security and Privacy}, + month = may, + year = {2017}, + location = {San Jose, CA}, +} + +@inproceedings{syverson09entropist, + author = {Paul Syverson}, + title = {Why {I'm} not an entropist}, + booktitle = {17th International Workshop on Security Protocols}, + month = apr, + year = {2009}, +} + +% later published version: szabo97formalizing +@article{szabo94smart, + title={Smart contracts}, + author={Szabo, Nick}, + journal={Unpublished manuscript}, + year={1994} +} + +@article{ szabo97formalizing, + author = {Nick Szabo}, + title = {\href{https://firstmonday.org/ojs/index.php/fm/article/view/548}{Formalizing and Securing Relationships on Public Networks}}, + journal = {First Monday}, + month = sep, + year = 1997, + volume = 2, + number = 9, +} + +@inproceedings{ szalachowski14policert, + author = {Pawel Szalachowski and Stephanos Matsumoto and Adrian Perrig}, + title = {\href{http://www.netsec.ethz.ch/publications/papers/ccsfp512-szalachowskiA.pdf}{{PoliCert}: Secure and Flexible {TLS} Certificate Management}}, + booktitle = {\bibconf{CCS}{ACM Conference on Computer and + Communications Security}}, + year = 2014, +} + +@inproceedings{ szalachowski16pkisn, + author = {Pawel Szalachowski and Laurent Chuat and Adrian Perrig}, + title = {\href{http://arxiv.org/abs/1601.03874}{{PKI} Safety Net {(PKISN):} Addressing the Too-Big-to-Be-Revoked Problem of the {TLS} Ecosystem}}, + booktitle = {1st IEEE European Symposium on Security and Privacy}, + month = mar, + year = {2016}, +} + +@inproceedings{ szalachowski18towards, + author = {Pawel Szalachowski}, + title = {\href{https://ieeexplore.ieee.org/document/8525399}{Towards More Reliable Bitcoin Timestamps}}, + booktitle = {Crypto Valley Conference}, + month = jun, + year = 2018, + location = {Zug, Switzerland} +} + + +%T + +@article{ taylor11behind, + author = {Taylor, Greg and Cox, George}, + title = {Behind Intel's New Random-Number Generator}, + year = 2011, + month = sep, + journal = {{IEEE} Spectrum}, +} + + +@article{thomas15interledger, + title={\href{https://interledger.org/interledger.pdf}{A protocol for interledger payments}}, + author={Thomas, Stefan and Schwartz, Evan}, + url={https://interledger.org/interledger.pdf}, + year={2015} +} + + +@article{thompson84reflections, + author = {Thompson, Ken}, + title = {\href{https://www.ece.cmu.edu/~ganger/712.fall02/papers/p761-thompson.pdf}{Reflections on Trusting Trust}}, + journal = {Commun. ACM}, + volume = {27}, + number = {8}, + month = aug, + year = {1984}, + pages = {761--763}, + publisher = {ACM}, +} + +@article{ thomsen15ashley, + author = {Simon Thomsen}, + title = {\href{http://uk.businessinsider.com/cheating-affair-website-ashley-madison-hacked-user-data-leaked-2015-7?r=US&IR=T}{Ashley Madison data breach +}}, + month = jul, + year = 2015, +} + +@inproceedings{tomescu17catena, + author={Alin Tomescu and Srini Devadas}, + title={\href{https://people.csail.mit.edu/devadas/pubs/catena.pdf}{Catena: Efficient Non-equivocation via Bitcoin}}, + booktitle={38th IEEE Symposium on Security and Privacy}, + year={2017}, + pages={393-409}, + doi={10.1109/SP.2017.19}, + month={May}, +} + +@inproceedings{ topalovic12towards, + author = {Emin Topalovic and Brennan Saeta and Lin-Shung Huang and + Collin Jackson and Dan Boneh}, + title = {\href{http://www.ieee-security.org/TC/W2SP/2012/papers/w2sp12-final9.pdf}{Towards Short-Lived Certificates}}, + booktitle = {\bibconf{W2SP}{Web 2.0 Security \& Privacy}}, + month = may, + year = 2012, + location = {San Francisco, CA, USA}, +} + +@inproceedings{torres16omitting, + author = {Santiago Torres-Arias and Anil Kumar Ammula and Reza Curtmola + and Justin Cappos}, + title = + {\href{https://www.usenix.org/system/files/conference/usenixsecurity16/sec16_paper_torres-arias.pdf} + {On Omitting Commits and Committing Omissions: Preventing Git Metadata + Tampering That (Re)introduces Software Vulnerabilities}}, + booktitle = {\bibconf[25th]{USENIX Security 16}{USENIX Security Symposium}}, + year = {2016}, + month=aug +} + +@misc{ tsakalaki13ensure, + author = {Elpiniki Tsakalaki}, + title = {{MSC32-C}. Ensure your random number generator is properly seeded}, + howpublished = {\url{https://www.securecoding.cert.org/confluence/display/seccode/MSC32-C.+Ensure+your+random+number+generator+is+properly+seeded}}, +} + +@inproceedings{tsang07blacklistable, + title={Blacklistable anonymous credentials: {B}locking + misbehaving users without {TTP}s}, + author={Tsang, Patrick P and Au, Man Ho and Kapadia, Apu and Smith, Sean W}, + booktitle={\bibconf[14th]{CCS}{Proceedings of the 14th + ACM conference on Computer and communications security}}, + month=oct, + year=2007 +} + +@inproceedings{ tsang10blac, + author = {Patrick P. Tsang and Man Ho Au and Apu Kapadia and + Sean W. Smith}, + title = {BLAC: Revoking Repeatedly Misbehaving Anonymous Users + Without Relying on TTPs}, + journal = {ACM Transactions on Information and System Security (TISSEC)}, + volume = 13, + number = 4, + month = dec, + year = 2010, +} + + + + + +@inproceedings{tsang08perea, + author = {Tsang, Patrick P. and Au, Man Ho and Kapadia, Apu and Smith, Sean W.}, + title = {PEREA: towards practical TTP-free revocation in anonymous authentication}, + booktitle = {Proceedings of the 15th ACM conference on Computer and communications security}, + booktitle = {\bibconf{CCS}{ACM conference on computer and + communications security}}, + year = {2008}, + pages = {333--344}, + numpages = {12}, + publisher = {ACM}, + address = {New York, NY, USA}, +} + +@incollection{ tsiounis98security, + year = {1998}, + booktitle = {Public Key Cryptography}, + volume = {1431}, + series = {Lecture Notes in Computer Science}, + editor = {Imai, Hideki and Zheng, Yuliang}, + title = {On the security of {ElGamal} based encryption}, + publisher = {Springer Berlin Heidelberg}, + author = {Tsiounis, Yiannis and Yung, Moti}, + pages ={117-134} + } + +@article{ tsujii89ibe, + title={An {ID}-based cryptosystem based on the discrete logarithm problem}, + author={Tsujii, Shigeo and Itoh, Toshiya}, + journal={{IEEE} Journal on Selected Areas in Communications}, + year={1989}, +} + +@misc{tor-directory, + key={Tor directory protocol}, + title = {Tor directory protocol, version 3}, + howpublished = {\url{https://gitweb.torproject.org/torspec.git/tree/dir-spec.txt}}, + year = 2014, +} + +@article{ tung15google, + author = {Liam Tung}, + title = {\href{http://www.zdnet.com/article/google-banishes-chinas-main-digital-certificate-authority-cnnic/}{Google boots China's main digital certificate authority CNNIC}}, + journal = {ZDNet}, + month = apr, + day = 2, + year = 2015, +} + +%V + +@article{ vaas13use, + author = {Lisa Vaas}, + title = {\href{http://nakedsecurity.sophos.com/2013/12/20/use-of-tor-pointed-fbi-to-harvard-university-bomb-hoax-suspect/}{Use of Tor pointed FBI to Harvard University bomb hoax suspect}}, + journal = {Naked Security}, + month = dec # "~20,", + year = 2013, +} + +@article{vaidya05secure, + author = {Jaideep Vaidya and Chris Clifton}, + title = {Secure set intersection cardinality with application to + association rule mining}, + journal = {Journal of Computer Security}, + volume = {13}, + number = {4}, + year = 2005, + pages = {593-622} +} + +@misc{ valverde15replay, + author = {Thiago Valverde}, + title = {\href{http://blog.valverde.me/2015/12/07/bad-life-advice/}{Bad life advice -- Replay attacks against {HTTPS}}}, + month = dec, + year = 2015, + note = {Blog}, +} + +@inproceedings{van2018foreshadow, + title={Foreshadow: Extracting the Keys to the Intel $\{$SGX$\}$ Kingdom with Transient Out-of-Order Execution}, + author={Van Bulck, Jo and Minkin, Marina and Weisse, Ofir and Genkin, Daniel and Kasikci, Baris and Piessens, Frank and Silberstein, Mark and Wenisch, Thomas F and Yarom, Yuval and Strackx, Raoul}, + booktitle={27th $\{$USENIX$\}$ Security Symposium ($\{$USENIX$\}$ Security 18)}, + pages={991--1008}, + year={2018} +} + +@article{van15paxos, + title={Paxos made moderately complex}, + author={Van Renesse, Robbert and Altinbuken, Deniz}, + journal={ACM Computing Surveys (CSUR)}, + volume={47}, + number={3}, + pages={1--36}, + year={2015}, + publisher={ACM New York, NY, USA} +} + + +@misc{ venkatanarayanan17enrolment, + author = {Anand Venkatanarayanan}, + title = {\href{https://medium.com/karana/aadhaar-enrollment-rejections-are-accelerating-5aa76191d9a9}{Enrolment rejections are accelerating}}, + howpublished = {Medium}, + month = nov, + year = 2017, +} + +@inproceedings{venkatadri18privacy, + title={\href{https://mislove.org/publications/PII-Oakland.pdf}{Privacy Risks with Facebook’s PII-based Targeting: Auditing a Data Broker’s Advertising Interface}}, + author={Venkatadri, Giridhari and Andreou, Athanasios and Liu, Yabing and Mislove, Alan and Gummadi, Krishna P and Loiseau, Patrick and Goga, Oana}, + booktitle={IEEE Symposium on Security and Privacy (SP)}, + pages={221--239}, + year={2018} +} + + +@inproceedings{ verde14no, + author = {Nino Vincenzo Verde and Giuseppe Ateniese + and Emanuele Gabrielli and Luigi Vincenzo Mancini + and Angelo Spognardi}, + title = {``No NAT'd User left Behind'': Fingerprinting Users + behind {NAT} from {NetFlow} Records alone}, + booktitle = {\bibconf[34th]{ICDCS}{International Conference on Distributed Computing Systems}}, + month = jul, + year = 2014, +} + +@inproceedings{ verkamp12inferring, + author = {John-Paul Verkamp and Minaxi Gupta}, + title = {Inferring Mechanics of {Web} Censorship Around the World}, + booktitle = {\bibconf[2nd]{FOCI}{USENIX Workshop on + Free and Open Communications on the Internet}}, + month = aug, + year = 2012, + location = {Bellevue, WA}, +} + +@inproceedings{ viswanath10analysis, + author = {Bimal Viswanath and Ansley Post}, + title = {\href{http://ccr.sigcomm.org/online/files/p363.pdf}{An Analysis of Social Network-Based Sybil Defenses}}, + booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}}, + month = aug, + year = 2010, + location = {New Delhi, India}, +} + +@misc{ voisin13mat, + year = {2013}, + month = {may}, + title = {The Metadata Anonymization Toolkit}, + howpublished = {\url{http://arxiv.org/abs/1212.3648}}, + author = {Julien Voisin and Christophe Guyeux and Jacques M. Bahi}, +} + +@inproceedings{ volpano97eliminating, + author = {Dennis M. Volpano and + Geoffrey Smith}, + title = {Eliminating covert flows with minimum typings}, + booktitle = {\bibconf[10th]{CSFW}{Computer Security Foundations Workshop}}, + month = jun, + year = 1997, +} + +@misc{ vorick18state, + author = {David Vorick}, + title = {\href{https://blog.sia.tech/the-state-of-cryptocurrency-mining-538004a37f9b}{The State of Cryptocurrency Mining}}, + month = may, + year = 2018, + url = {https://blog.sia.tech/the-state-of-cryptocurrency-mining-538004a37f9b}, +} + +@inproceedings{von06selectively, + title={Selectively traceable anonymity}, + author={von Ahn, Luis and Bortz, Andrew and Hopper, Nicholas J and O?eill, Kevin}, + booktitle={Privacy Enhancing Technologies}, + pages={208--222}, + year={2006}, + organization={Springer} +} + +@inproceedings{ vratonjic11inconvenient, + author = {Nevena Vratonjic and Julien Freudiger and Vincent Bindschaedler and Jean-Pierre Hubaux}, + title = {\href{https://link.springer.com/chapter/10.1007%2F978-1-4614-1981-5_5}{The Inconvenient Truth about Web Certificates}}, + booktitle = {\bibconf[10th]{WEIS}{Workshop on Economics of Information Security}}, + month = jun, + year = 2011, + pages = {79-117}, +} + +@inproceedings{vukolic15quest, + title={\href{http://vukolic.com/iNetSec_2015.pdf}{The quest for scalable blockchain fabric: Proof-of-work vs. BFT replication}}, + author={Vukoli{\'c}, Marko}, + booktitle={International Workshop on Open Problems in Network Security}, + pages={112--125}, + year={2015}, + organization={Springer} +} + +%W + +@inproceedings{wang08cache, + author = {Zhenhong Wang and + Ruby B. Lee}, + title = {A novel cache architecture with enhanced performance and security}, + booktitle = {IEEE/ACM \bibconf[41th]{Micro}{International Symposium on Microarchitecture}}, + year = 2008 +} + +@inproceedings{wang10privacy, + author = {Cong Wang and + Qian Wang and + Kui Ren and + Wenjing Lou}, + title = {Privacy-Preserving Public Auditing for Data Storage Security + in Cloud Computing}, + booktitle = {\bibconf[29th]{INFOCOM}{IEEE INFOCOM}}, + location = {San Deigo, CA}, + month = mar, + year = 2010 +} + + +@article{wang10publicly, + author = {Cong Wang and + Kui Ren and + Wenjing Lou and + Jin Li}, + title = {Toward publicly auditable secure + cloud data storage services}, + journal = {IEEE Network}, + volume = {24}, + number = {4}, + year = {2010}, + pages = {19-24} +} + +@article{wang11enabling, + author = {Qian Wang and + Cong Wang and + Kui Ren and + Wenjing Lou and + Jin Li}, + title = {Enabling Public Auditability and Data Dynamics for Storage + Security in Cloud Computing}, + journal = {IEEE Transactions on Parallel and Distributed Systems}, + volume = {22}, + number = {5}, + year = {2011}, + pages = {847-859} +} + +@article{wang13privacy, + author = {Cong Wang and + Sherman S. M. Chow and + Qian Wang and + Kui Ren and + Wenjing Lou}, + title = {Privacy-Preserving Public Auditing for + Secure Cloud Storage}, + journal = {IEEE Transactions on Computers}, + volume = {62}, + number = {2}, + year = {2013}, + pages = {362-375} +} + +@inproceedings{ wang12censorspoofer, + author = {Qiyan Wang and Xun Gong and Giang T. K. Nguyen and + Amir Houmansadr and Nikita Borisov}, + title = {{CensorSpoofer}: Asymmetric Communication using {IP} Spoofing + for Censorship-Resistant Web Browsing}, + booktitle = {\bibconf[19th]{CCS}{ACM Conference on + Computer and Communications Security}}, + location = {Raleigh, NC}, + month = oct, + year = 2012, +} + +@inproceedings{ wang14effective, + author = {Tao Wang and Xiang Cai and Rishab Nithyanand and Rob + Johnson and Ian Goldberg}, + title = + {\href{https://www.usenix.org/conference/usenixsecurity14/technical-sessions/presentation/wang_tao} + {Effective Attacks and Provable Defenses for Website Fingerprinting}}, + booktitle = {{USENIX} Security Symposium}, + month = aug, + year = 2014 +} + +@article{watanabe11signature, + title={Account Management Method with Blind Signature Scheme}, + author={Watanabe, Ryu and Miyake, Yutaka}, + journal={Engineering and Technology, World of Science}, + year={2011} +} + +@inproceedings{waters04dosresistance, + author = {Waters, Brent and Juels, Ari and Halderman, J. Alex and Felten, Edward W.}, + title = {{New Client Puzzle Outsourcing Techniques for DoS Resistance}}, + booktitle = {Proceedings of the 11th ACM Conference on Computer and Communications Security}, + series = {CCS '04}, + year = {2004}, + isbn = {1-58113-961-6}, + location = {Washington DC, USA}, + pages = {246--256}, + numpages = {11}, + url = {http://doi.acm.org/10.1145/1030083.1030117}, + doi = {10.1145/1030083.1030117}, + acmid = {1030117}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {DoS, client puzzles, denial-of-service}, +} + +@inproceedings{ waters05efficient, + author = {Brent Waters}, + title = {\href{https://link.springer.com/chapter/10.1007%2F11426639_7}{Efficient Identity-Based Encryption Without Random Oracles}}, + booktitle = {Eurocrypt}, + month = may, + year = 2005, +} + +@article{ watts13rowling, + author = {Robert Watts}, + title = {{JK Rowling} unmasked as author of acclaimed detective novel}, + journal = {The Telegraph}, + month = jul # "~13,", + year = 2013, + url = {http://www.telegraph.co.uk/culture/books/10178344/JK-Rowling-unmasked-as-author-of-acclaimed-detective-novel.html} +} + +@article{ weissman15how, + author = {Cale Guthrie Weissman}, + title = {\href{https://www.businessinsider.in/How-a-man-who-worked-for-the-Lottery-Association-may-have-hacked-the-system-for-a-winning-ticket/articleshow/46913403.cms}{How a man who worked for the Lottery Association may have hacked the system for a winning ticket}}, + journal = {Business Insider}, + month = apr, + day = 13, + year = 2015, +} + +@inproceedings{ wesolowski19efficient, + author = {Benjamin Wesolowski}, + title = {\href{https://link.springer.com/chapter/10.1007%2F978-3-030-17659-4_13}{Efficient Verifiable Delay Functions}}, + booktitle = {Eurocrypt}, + month = may, + year = 2019, +} + +@article{ wen15face, + author = {Di Wen and Hu Hanand Anil K. Jain}, + title = {\href{https://ieeexplore.ieee.org/document/7031384}{Face Spoof Detection With Image Distortion Analysis}}, + journal = {IEEE Transactions on Information Forensics and Security}, + volume = 10, + number = 4, + month = apr, + year = 2015, +} + +@inproceedings{ wendlandt08perspectives, + author = {Dan Wendlandt and David G. Andersen and Adrian Perrig}, + title = {Perspectives: Improving {SSH}-style Host Authentication + with Multi-Path Probing}, + booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}}, + month = jun, + year = 2008, + location = {Boston, MA}, +} + +@inproceedings{ whitten99johnny, + author = {Whitten, Alma and Tygar, J. D.}, + title = {Why Johnny can't encrypt: a usability evaluation of PGP 5.0}, + booktitle = {Proceedings of the 8th conference on USENIX Security Symposium - Volume 8}, + series = {SSYM'99}, + year = {1999}, + location = {Washington, D.C.}, + pages = {14--14}, + publisher = {USENIX Association}, + address = {Berkeley, CA, USA}, +} + +@inproceedings{ wikstrom05sender, + author = {Douglas Wikstr\"om}, + title = {\href{https://link.springer.com/chapter/10.1007/11593447_15}{A Sender Verifiable Mix-Net and a New Proof of a Shuffle}}, + booktitle = {Advances in Cryptology -- ASIACRYPT}, + month = dec, + year = 2005, + location = {Chennai, India}, +} + +@book{william04recommendation, + title={Recommendation for the triple data encryption algorithm ({TDEA}) block cipher}, + author={Barker, William Curt}, + year={2004}, + publisher={US Department of Commerce, Technology Administration, National Institute of Standards and Technology} +} + +@inproceedings{wolchok10defeating, + title={Defeating Vanish with Low-Cost Sybil Attacks Against Large DHTs.}, + author={Wolchok, Scott and Hofmann, Owen S and Heninger, Nadia and Felten, Edward W and Halderman, J Alex and Rossbach, Christopher J and Waters, Brent and Witchel, Emmett}, + booktitle={NDSS}, + year={2010} +} + +@inproceedings{ wolinsky14managing, + author = {David Isaac Wolinsky and Daniel Jackowitz and Bryan Ford}, + title = {Managing {NymBoxes} for Identity and Tracking Protection}, + booktitle = {USENIX Conference on Timely Results in Operating Systems}, + month = oct, + year = 2014, + location = {Broomfield, CO}, +} + +@inproceedings{wong02verifiable, + title={\href{https://dl.acm.org/citation.cfm?id=830217}{Verifiable secret redistribution for archive systems}}, + author={Wong, Theodore M and Wang, Chenxi and Wing, Jeannette M}, + booktitle={Security in Storage Workshop, 2002. Proceedings. First International IEEE}, + pages={94--105}, + year={2002}, + organization={IEEE} +} + +@article{wood14ethereum, + title={\href{https://github.com/ethereum/wiki/wiki/White-Paper}{Ethereum: A Secure Decentralised Generalised Transaction Ledger}}, + author={Wood, Gavin}, + journal={Ethereum Project Yellow Paper}, + year={2014} +} + +@inproceedings{ wright03defending, + author = {Matthew Wright and Micah Adler and Brian N. Levine + and Clay Shields}, + title = {Defending Anonymous Communications Against + Passive Logging Attacks}, + booktitle = {IEEE Security and Privacy}, + month = may, + year = 2003, +} + +@inproceedings{wright18crypto, + title={\href{https://web.cecs.pdx.edu/~cvwright/papers/crumplezones.pdf}{Crypto Crumple Zones: Enabling limited Access without Mass Surveillance}}, + author={Wright, Charles and Varia, Mayank}, + booktitle={2018 IEEE European Symposium on Security and Privacy (EuroS\&P)}, + pages={288--306}, + year={2018}, + organization={IEEE} +} + +@article{wright08passive, + author = {Wright, Matthew K. and Adler, Micah and Levine, Brian Neil and Shields, Clay}, + title = {Passive-Logging Attacks Against Anonymous Communications Systems}, + journal = {\bibbrev{TISSEC}{ACM Transactions on Information and System Security}}, + month = may, + year = {2008}, +} + +@inproceedings{ wu15deterland, + author = {Weiyi Wu and Bryan Ford}, + title = {\href{https://dedis.cs.yale.edu/cloud/papers/trios15-deterland-abs/}{Deterministically Deterring Timing Attacks in Deterland}}, + booktitle = {Conference on Timely Results in Operating Systems (TRIOS)}, + month = oct, + year = 2015, +} + +%X + +@article{xia17bbds, + title={BBDS: Blockchain-based data sharing for electronic medical records in cloud environments}, + author={Xia, Qi and Sifah, Emmanuel Boateng and Smahi, Abla and Amofa, Sandro and Zhang, Xiaosong}, + journal={Information}, + volume={8}, + number={2}, + pages={44}, + year={2017}, + publisher={Multidisciplinary Digital Publishing Institute} +} + + + +@article{xia17medshare, + title={MeDShare: Trust-Less Medical Data Sharing Among Cloud Service + Providers via Blockchain}, + author={Xia, Qi and Sifah, Emmanuel Boateng and Asamoah, Kwame Omono and Gao, + Jianbin and Du, Xiaojiang and Guizani, Mohsen}, + journal={IEEE Access}, + volume={5}, + pages={14757--14767}, + year={2017}, + publisher={IEEE} +} + +@inproceedings{xiao13structural, + author = {Hongda Xiao and + Bryan Ford and + Joan Feigenbaum}, + title = {Structural Cloud Audits that Protect Private Information}, + booktitle = {\bibconf{CCSW}{ACM Cloud Computing Security Workshop}}, + location = {Berlin, Germany}, + month = nov, + year = 2013 +} + + +%Y + +@inproceedings{yao82protocols, + author = {Andrew Chi-Chih Yao}, + title = {Protocols for Secure Computations ({E}xtended Abstract)}, + booktitle = {\bibconf[23rd]{FOCS}{Annual Symposium on Foundations of + Computer Science}}, + location = {Chicago, IL}, + month = nov, + year = 1982 +} + + +@article{yermack17corporate, + title={\href{https://academic.oup.com/rof/article/21/1/7/2888422}{Corporate governance and blockchains}}, + author={Yermack, David}, + journal={Review of Finance}, + volume={21}, + number={1}, + pages={7--31}, + year={2017}, + publisher={Oxford University Press} +} + + +@inproceedings{ yilek09private, + author = {Scott Yilek and Eric Rescorla and Hovav Shacham and + Brandon Enright and Stefan Savage}, + title = {When Private Keys are Public: Results From the 2008 + {Debian} {OpenSSL} Vulnerability}, + booktitle = {Proceedings of IMC}, + year = 2009, + editor = {Anja Feldmann and Laurent Mathy}, + month = nov, + publisher = {ACM Press}, + pages = {15-27} +} + +@inproceedings{ yin19hotstuff, + author = {Maofan Yin and Dahlia Malkhi and Michael K. Reiter and Guy Golan Gueta and Ittai Abraham}, + title = {\href{https://research.vmware.com/files/attachments/0/0/0/0/0/7/7/podc.pdf}{HotStuff: BFT Consensus with Linearity and Responsiveness}}, + booktitle = {\bibconf{PODC}{Principles of Distributed Computing}}, + month = jul, + year = 2019, + location = {Toronto, Ontario, Canada}, +} + +@article{ylonen06secure, + title={The secure shell (SSH) protocol architecture}, + author={Ylonen, Tatu and Lonvick, Chris}, + year={2006} +} + + +@inproceedings{ young97kleptography, + title = {Kleptography: Using cryptography against cryptography}, + author = {Young, Adam and Yung, Moti}, + booktitle = {{EUROCRYPT}}, + pages = {62--74}, + year = {1997}, +} + +@inproceedings{ yu08sybillimit, + author = {Haifeng Yu and Phillip B. Gibbons and Michael Kaminsky + and Feng Xiao}, + title = {\href{https://www.iscs.nus.edu.sg/~yuhf/sybillimit-tr.pdf}{{SybilLimit}: {A} Near-Optimal Social Network Defense + against Sybil Attacks}}, + booktitle = {\bibconf[29th]{S{\&}P}{IEEE Symposium on Security and + Privacy}}, + location = {Oakland, CA}, + month = may, + year = 2008, + url = {https://www.iscs.nus.edu.sg/~yuhf/sybillimit-tr.pdf}, +} + +@inproceedings{yu09dsybil, + author = {Haifeng Yu and + Chenwei Shi and + Michael Kaminsky and + Phillip B. Gibbons and + Feng Xiao}, + title = {D{S}ybil: {O}ptimal Sybil-resistance for recommendation systems}, + booktitle = {\bibconf[30th]{S{\&}P}{IEEE Symposium on Security and Privacy}}, + location = {Oakland, CA}, + month = may, + year = 2009 +} + + + +%Z + +@misc{zamani14mpc, + author = {Mahdi Zamani and Mahnush Movahedi and Jared Saia}, + title = {\href{https://eprint.iacr.org/2014/149.pdf}{Millions of Millionaires: Multiparty Computation in Large Networks}}, + howpublished = {Cryptology ePrint Archive, Report 2014/149}, + year = {2014}, +} + +@inproceedings{zander13scalable, + author = {Sebastian Zander and + Lachlan L. H. Andrew and + Grenville Armitage}, + title = {Scalable private set intersection cardinality for + capture-recapture with multiple private datasets}, + booktitle = {Centre for Advanced Internet Architectures, Technical + Report 130930A}, + year = 2013 +} + + + +@inproceedings{zhai16anonrep, + author = {Ennan Zhai and + David Isaac Wolinsky and + Ruichuan Chen and + Ewa Syta and + Chao Teng and + Bryan Ford}, + title = {Anon{R}ep: {T}owards tracking-resistant anonymous + reputation}, + booktitle = {\bibconf[13th]{NSDI}{USENIX Symposium on Networked + Systems Design and Implementation}}, + location = {Santa Clara, CA}, + month = mar, + year = 2016 +} + +@inproceedings{ zhang11inferring, + author = {Zhang, Fan and He, Wenbo and Liu, Xue and Bridges, Patrick G. Bridges}, + title = + {\href{http://www.math.unipd.it/~conti/teaching/CNS1415/atpapers/Profiling/profiling.pdf} + {Inferring Users' Online Activities Through Traffic Analysis}}, + booktitle = {WiSec}, + month = jun, + year = 2011 +} + +@inproceedings{ zhang16towncrier, + author = {Zhang, Fan and Cecchetti, Ethan and Croman, Kyle and Juels, Ari and Shi, Elaine}, + title = {\href{https://dl.acm.org/citation.cfm?id=2978326}{Town Crier: An Authenticated Data Feed for Smart Contracts}}, + booktitle = {2016 ACM SIGSAC Conference on Computer and Communications Security}, + series = {CCS '16}, + year = {2016}, + month = nov, + location = {Vienna, Austria}, + pages = {270--282}, + numpages = {13}, +} + +@misc{zhang17rem, + author = {Fan Zhang and Ittay Eyal and Robert Escriva and Ari Juels and Robbert van Renesse}, + title = {\href{http://eprint.iacr.org/2017/179.pdf}{REM: Resource-Efficient Mining for Blockchains}}, + howpublished = {Cryptology ePrint Archive, Report 2017/179}, + year = {2017}, + note = {\url{http://eprint.iacr.org/2017/179}}, +} + +@inproceedings{zhang2013picco, + author={Zhang, Yihua and Steele, Aaron and Blanton, Marina}, + title={Picco: A general-purpose compiler for private distributed computation}, + booktitle={{ACM} Conference on Computer and Communications Security}, + month={November}, + year={2013} +} + +@inproceedings{ zhang19statement, + author = {Bingsheng Zhang and Hong-Sheng Zhou}, + title = {\href{https://fc19.ifca.ai/preproceedings/97-preproceedings.pdf}{Statement Voting}}, + booktitle = {\bibconf[23rd]{FC}{International Conference on Financial Cryptography and Data Security 2019}}, + month = feb, + year = 2019, + location = {St. Kitts}, +} + +@article{zhang2019deco, + title={\href{https://arxiv.org/pdf/1909.00938.pdf}{DECO: Liberating Web Data + Using Decentralized Oracles for TLS}}, + author={Zhang, Fan and Maram, Sai Krishna Deepak and Malvai, Harjasleen and Goldfeder, Steven and Juels, Ari}, + journal={arXiv preprint arXiv:1909.00938}, + year={2019} +} + +@article{zhou02coca, + title={\href{http://www.cs.cornell.edu/fbs/publications/cocaTOCS.pdf}{COCA: A Secure Distributed Online Certification Authority}}, + author={Zhou, Lidong and Schneider, Fred B and Van Renesse, Robbert}, + journal={ACM Transactions on Computer Systems (TOCS)}, + volume={20}, + number={4}, + pages={329--368}, + year={2002}, + publisher={ACM} +} + +@article{ zhou05apss, + author = {Lidong Zhou and Fred B. Schneider and Robbert Van Renesse}, + title = {\href{https://dl.acm.org/citation.cfm?id=1085127}{APSS: Proactive Secret Sharing in Asynchronous Systems}}, + journal = {ACM Transactions on Information and System Security (TISSEC)}, + volume = 8, + number = 3, + month = aug, + year = 2005, + pages = {259-286}, +} + +@inproceedings{ zhou12droidranger, + series = {CODASPY '12}, + title = + {\href{https://www.internetsociety.org/sites/default/files/07_5.pdf}{Hey, + {{You}}, + {{Get Off}} of {{My Market}}: {{Detecting Repackaged + Smartphone Applications}} in {{Third}}-party {{Android Marketplaces}}}}, + booktitle = {Proceedings of the {{Second ACM Conference}} on {{Data}} and + {{Application Security}} and {{Privacy}}}, + publisher = {{ACM}}, + author = {Zhou, Wu and Zhou, Yajin and Jiang, Xuxian and Ning, Peng}, + year = {2012} +} + +@techreport{zamyatin19sok, + title={Sok: Communication across distributed ledgers}, + author={Zamyatin, Alexei and Al-Bassam, Mustafa and Zindros, Dionysis and Kokoris-Kogias, Eleftherios and Moreno-Sanchez, Pedro and Kiayias, Aggelos and Knottenbelt, William J}, + year={2019}, + institution={IACR Cryptology ePrint Archive, 2019: 1128} +} + +@article{zyskind2015enigma, + title={\href{https://arxiv.org/pdf/1506.03471.pdf}{Enigma: Decentralized computation platform with guaranteed privacy}}, + author={Zyskind, Guy and Nathan, Oz and Pentland, Alex}, + journal={arXiv preprint arXiv:1506.03471}, + year={2015} +} + +@inproceedings{zyskind2015decentralizing, + title={\href{https://ieeexplore.ieee.org/abstract/document/7163223/}{Decentralizing privacy: Using blockchain to protect personal data}}, + author={Zyskind, Guy and Nathan, Oz and others}, + booktitle={Security and Privacy Workshops (SPW), 2015 IEEE}, + pages={180--184}, + year={2015}, + organization={IEEE} +} + + + +% Misc... + +@misc{bbc12cispa, + author = {{BBC}}, + month = {April}, + year = {2012}, + title = {Cyber-security bill Cispa passes US House}, + howpublished = {\url{http://www.bbc.co.uk/news/world-us-canada-17864539}} +} + +@misc{cnn12wikileaks, + author = {Laura Smith-Spark}, + month = {July}, + year = {2012}, + title = {Extradition deadline passes for WikiLeaks' Assange}, + booktitle = {{CNN}}, + howpublished = {\url{http://articles.cnn.com/2012-07-07/world/world_europe_uk-sweden-assange_1_julian-assange-swedish-prosecution-authority-wikileaks-assange}} +} + +@misc{ debian-snapshots, + author = {Debian}, + key = {debian-snapshots}, + title = {\href{http://snapshot.debian.org/} {snapshot.debian.org}} +} + + +@misc{ debian16repository, + author = {Debian}, + title = + {\href{https://wiki.debian.org/DebianRepository}{Debian Repository}}, + month = aug, + year = 2016 +} + + +@misc{ git-notes, + key = {Gitnotes}, + title = {\href{https://git-scm.com/docs/git-notes}{Git-notes Documentation}}, + month = sep, + year = 2016 +} + + +@misc{ google16play, + author = {Google Inc.}, + title = + {\href{https://play.google.com/store?hl=en}{Google Play}}, + month = sep, + year = 2016 +} + + + +@misc{ intercept15strawhorse, + author = {The Intercept}, + title = + {\href{https://theintercept.com/document/2015/03/10/strawhorse-attacking-macos-ios-software-development-kit/} + {Strawhorse: Attacking the macOS and iOS Software Development Kit}}, + day = 10, + month = mar, + year = {2015} +} + +@misc{ keybase, + key = {Keybase}, + title = {\href{https://keybase.io/}{Keybase -- Public Key Crypto for Everyone, Publicly Auditable Proofs of Identity}}, + year = {2016} +} + +@misc{ mozilla-cors, + title = {{HTTP} access control ({CORS})}, + author = {{Mozilla Developer Network}}, + howpublished = {\url{https://developer.mozilla.org/en-US/docs/HTTP/Access_control_CORS}} +} + +@misc{ openpgpjs, + title = {{OpenPGP.js}}, + key = {OpenPGP.js}, + howpublished = {\url{http://openpgpjs.github.io/}}, +} + +@misc{pbc, + author = {Stanford University}, + title = {The Pairing-Based Cryptography Library}, + howpublished = {\url{http://crypto.stanford.edu/pbc/}} +} + +@misc{perry11firefox, + author = {Mike Perry}, + month = {May}, + year = {2011}, + howpublished = {\url{https://blog.torproject.org/blog/toggle-or-not-toggle-end-torbutton}}, + title = {To Toggle, or not to Toggle: The End of Torbutton}, +} + +@misc{ python-pypi, + author = {Python Community}, + title = {\href{https://pypi.python.org/pypi}{PyPI - the Python Package Index}}, + month = sep, + year = 2016 +} + +@misc{ sjcl-ecc, + title = {Stanford {Javascript} Crypto Library - {ECC} branch}, + key = {Stanford {Javascript} Crypto Library - {ECC} branch}, + howpublished = {\url{https://github.com/bitwiseshiftleft/sjcl/tree/ecc}}, +} + + +@misc{ sourceforge, + author = {SourceFroge}, + key = {sourceforge}, + note = {\url{https://sourceforge.net/}} +} + +@misc{ ubuntu16repositories, + author = {Canonical Ltd.}, + title = {\href{https://help.ubuntu.com/community/Repositories/Ubuntu}{Ubuntu Repositories}}, + month = sep, + year = 2016 +} + +@misc{ windows16store, + author = {Microsoft Inc.}, + title = + {\href{https://www.microsoft.com/en-us/store/apps/windows}{Windows Apps + - Microsoft Store}}, + month = sep, + year = 2016 +} + +@misc{ www13cross, + title = {Cross-Origin Resource Sharing}, + editor = {Anne van Kesteren}, + year = 2013, + month = jan, + day = 29, + publisher = {{W3C}}, + key = {van Kesteren}, + howpublished = {\url{http://www.w3.org/TR/2013/CR-cors-20130129/}}, +} + + + + +% To fix POSITION + + +@misc{ frields08fedora, + title = {\href{https://www.redhat.com/archives/fedora-announce-list/2008-August/msg00012.html}{Infrastructure Report}}, + author = {{Frields, Paul W.}}, + month = aug, + year = {2008} +} + +@misc{ freebsd12incident, + title = {\href{https://www.freebsd.org/news/2012-compromise.html}{Security + Incident on FreeBSD Infrastructure}}, + author = {{The FreeBSD Project}}, + month =nov, + year={2012}, +} + +@misc{ quintin16canary, + title = + {\href{https://www.eff.org/deeplinks/2016/05/canary-watch-one-year-later}{Canary + Watch – One Year Later}}, + author = {{Quintin, Cooper}}, + month = may, + year = {2016}, +} + +@misc{ redhat08openssh, + title = {\href{https://rhn.redhat.com/errata/RHSA-2008-0855.html} {Critical: OpenSSH Security Update}}, + author = {Red Hat}, + month = aug, + year = {2008} +} + +@misc{ zetter13flame, + title = + {\href{https://www.wired.com/2013/03/flame-windows-update-copycat/} + {Flame {{Windows Update Attack Could Have Been Repeated}} in 3 + {{Days}}, {{Says Microsoft}}}}, + journaltitle = {WIRED}, + author = {Zetter, Kim}, + month = mar, + year = {2013} +} + +@article{ zetter19experts, + author = {Kim Zetter}, + title = {\href{https://motherboard.vice.com/en_us/article/vbwz94/experts-find-serious-problems-with-switzerlands-online-voting-system-before-public-penetration-test-even-begins}{Experts Find Serious Problems With Switzerland's Online Voting System Before Public Penetration Test Even Begins}}, + journal = {Motherboard}, + month = feb, + day = 21, + year = 2019, +} + +@misc{libreoffice, + title = {\href{https://www.libreoffice.org/about-us/who-are-we/} {LibreOffice}}, + author = {The Document Foundation}, + month = sep, + year = 2016 +} + +@misc{ gimp, + author = {The GIMP Team}, + title = {\href{http://www.gimp.org/}{GNU Image Manipulation Program}}, + month = sep, + year = 2016 +} + + +@misc{string16introducing, + title = {\href{http://string.technology/2016/09/14/threshold-relay-random-beacon.en/}{Intoducing Random Beascons Using Threshold Relay Chains}}, + author = {Timo Hanke and Dominic Williams}, + month= sep, + year= 2016 +} + + +@misc{scaling, + title = {\href{https://en.bitcoin.it/wiki/Scalability}{Scalability}}, + author = {{Bitcoin Wiki}}, + url = {https://en.bitcoin.it/wiki/Scalability}, + year = {2016}, +} + +@misc{uport, + title = "UPORT: A PLATFORM FOR SELF-SOVEREIGN IDENTITY", + author = "Dr. Christian Lundkvist and Rouven Heck and Joel Torstensson and Zac Mitton and Michael Sena", + url = {\href{https://whitepaper.uport.me/uPort_whitepaper_DRAFT20170221.pdf}}, + year = "2017", +} + +@misc{civic, + title = "Civic", + author = "Civic team", + url = {\href{https://tokensale.civic.com/CivicTokenSaleWhitePaper.pdf}}, + year = "2017", +} + +@misc{VISA, + title = {\href{https://usa.visa.com/dam/VCOM/download/corporate/media/visa-fact-sheet-Jun2015.pdf}{Visa Inc. at a Glance}}, + author = {{Visa}}, + year = {2017}, +} + + + +@misc{murmur, + title = {Murmur Hash}, + note = {\url{http://en.wikipedia.org/wiki/MurmurHash}} +} + +@misc{health16blockchain, + author = {{The Office of the National Coordinator for Health Information Technology}}, + title = {Use of Blockchain in Health IT and Health-related Research Challenge}, + year = {2016}, + month = {Sep}, +} + +@misc{PoE, + author = {{Wikipedia}}, + title = {\href{http://en.wikipedia.org/wiki/Proof_of_Existence}{Proof of Existence}}, + year = {2017}, + month = {April}, +} + + +@misc{securedrop, + title = {{SecureDrop}}, + key = {SecureDrop}, + note = {\url{https://pressfreedomfoundation.org/securedrop/}}, +} + +@misc{random-org, + author = {{Randomness and Integrity Services Ltd.}}, + title = {\url{random.org}}, + year = 1998, +}, + + +@misc{ debian16APT, + author = {Debian}, + title = {\href{https://wiki.debian.org/Apt}{Advanced Package Tool}}, + month = may, + year = 2016 +} + +@misc{ yum16YUM, + author = {YUM}, + title = {\href{http://yum.baseurl.org/}{Yellowdog Updater Modified}}, + month = may, + year = 2016 +} + +@misc{ homebrew16BREW, + author = {Max Howell}, + title = {\href{http://brew.sh/}{Homebrew -- The Missing Packet Manager for macOS}}, + month = may, + year = 2016 +} + +@misc{ easyinstall16python, + author = {Python Community}, + title = {\href{https://wiki.python.org/moin/EasyInstall}{EasyInstall Module}}, + month = may, + year = 2016, +} + + + + + + + + + +%%%%%% +% Vulnerabilites from the CVD + +@misc{ cve-2000-0357, + key = {cve-2000-0357}, + title = {{CVE-2000-0357}: {ORBit} and esound in + {Red Hat Linux} do not use sufficiently random numbers}, + year = 1999, + month = dec, +} + +@misc{ cve-2001-0950, + key = {cve-2001-0950}, + title = {{CVE-2001-0950}: {ValiCert Enterprise Validation Authority} + uses insufficiently random data}, + year = 2001, + month = jan, +} + +@misc{ cve-2001-1141, + key = {cve-2001-1141}, + title = {{CVE-2001-1141}: {PRNG} in {SSLeay} and {OpenSSL} + could be used by attackers to predict future pseudo-random numbers}, + year = 2001, + month = jul, +} + +@misc{ cve-2001-1467, + key = {cve-2001-1467}, + title = {{CVE-2001-1467}: mkpasswd, as used by {Red Hat Linux}, + seeds its random number generator with its process {ID}}, + year = 2001, + month = apr, +} + +@misc{ cve-2003-1376, + key = {cve-2003-1376}, + title = {{CVE-2003-1376}: {WinZip} uses weak random number generation + for password protected {ZIP files}}, + year = 2003, + month = dec, +} + +@misc{ cve-2005-3087, + key = {cve-2005-3087}, + title = {{CVE-2005-3087}: {SecureW2 TLS} implementation uses weak random + number generators during generation of the pre-master secret}, + year = 2005, + month = sep, +} + +@misc{ cve-2006-1378, + key = {cve-2006-1378}, + title = {{CVE-2006-1378}: {PasswordSafe} uses a weak random number generator}, + year = 2006, + month = mar, +} + +@misc{ cve-2006-1833, + key = {cve-2006-1833}, + title = {{CVE-2006-1833}: {Intel RNG Driver} in {NetBSD} may + always generate the same random number}, + year = 2006, + month = apr, +} + +@misc{ cve-2007-2453, + key = {cve-2007-2453}, + title = {{CVE-2007-2453}: Random number feature in {Linux} kernel + does not properly seed pools when there is no entropy}, + year = 2007, + month = jun, +} + +@misc{ cve-2008-0141, + key = {cve-2008-0141}, + title = {{CVE-2008-0141}: {WebPortal CMS} generates + predictable passwords containing only the time of day}, + year = 2008, + month = jan, +} + +@misc{ cve-2008-0166, + key = {cve-2008-0166}, + title = {{CVE-2008-0166}: {OpenSSL} on {Debian}-based operating + systems uses a random number generator + that generates predictable numbers}, + year = 2008, + month = jan, +} + +@misc{ cve-2008-2108, + key = {cve-2008-2108}, + title = {{CVE-2008-2108}: {GENERATE\_SEED} macro in PHP + produces 24 bits of entropy and simplifies brute force attacks against + the rand and mt\_rand functions}, + year = 2008, + month = may, +} + +@misc{ cve-2008-5162, + key = {cve-2008-5162}, + title = {{CVE-2008-5162}: The arc4random function in {FreeBSD} + does not have a proper entropy source + for a short time period immediately after boot}, + year = 2008, + month = nov, +} + +@misc{ cve-2009-0255, + key = {cve-2009-0255}, + title = {{CVE-2009-0255}: {TYPO3} creates the encryption key with an insufficiently random seed}, + year = 2009, + month = jan, +} + +@misc{ cve-2009-3238, + key = {cve-2009-3238}, + title = {{CVE-2009-3238}: {Linux} kernel produces insufficiently random numbers}, + year = 2009, + month = sep, +} + +@misc{ cve-2009-3278, + key = {cve-2009-3278}, + title = {{CVE-2009-3278}: {QNAP} uses rand library function to generate a certain recovery key}, + year = 2009, + month = sep, +} + +@misc{ cve-2011-3599, + key = {cve-2011-3599}, + title = {{CVE-2011-3599}: {Crypt::DSA} for Perl, when /dev/random is absent, + uses the {Data::Random} module}, + year = 2011, + month = oct, + +} + +%%%%% FIPS +@misc{ dsa, + author = {{Federal Information Processing Standards Publication}}, + title = {Digital Signature Standard ({DSS})}, + year = {2013}, + month = {July}, + note = {FIPS 186-4}, +} diff --git a/pdf/soc.bib b/pdf/soc.bib new file mode 100644 index 0000000..3700889 --- /dev/null +++ b/pdf/soc.bib @@ -0,0 +1,3562 @@ + +%A + +@article{ abdul-rahman97pgp, + author = {Alfarez Abdul-Rahman}, + title = {\href{https://ldlus.org/college/WOT/The_PGP_Trust_Model.pdf}{The PGP Trust Model}}, + journal = {Journal of Electronic Commerce}, + volume = 10, + number = 3, + pages = {27-31}, + month = apr, + year = 1997, +} + +@misc{ abhishek17digital, + author = {Kumar Abhishek and Diwakar Mandal}, + title = {\href{https://gomedici.com/diving-deep-into-id-verification-market-comprehensive-evaluation-of-competitive-landscape/}{Digital ID Verification: Competitive Analysis of Key Players}}, + howpublished = {MEDICI}, + month = oct, + year = 2017, +} + +@incollection{ abramowitz12grand, + author = {Alan I. Abramowitz}, + title = {\href{https://faculty.washington.edu/jwilker/353/AbramowitzTea.pdf}{Grand Old Tea Party: Partisan Polarization and the Rise of the Tea Party Movement}}, + booktitle = {Steep: The Precipitous Rise of the Tea Party}, + year = 2012, + isbn = {9780520274235}, +} + +@article{ acemoglu18power, + author = {Daron Acemoglu and Tarek A. Hassan and Ahmed Tahoun}, + title = {\href{https://academic.oup.com/rfs/article/31/1/1/4060544}{The Power of the Street: Evidence from Egypt’s Arab Spring}}, + journal = {The Review of Financial Studies}, + volume = 31, + number = 1, + month = jan, + year = 2018, + pages = {1-42}, +} + +@article{ agarwal18on-chain, + author = {Arpit Agarwal}, + title = {\href{https://medium.com/coinmonks/on-chain-liquid-democracy-c08ed8c07f6e}{On-chain Liquid Democracy}}, + journal = {Medium}, + month = nov, + year = 2018, +} + +@article{ agrawal12corporate, + author = {Ashwini K. Agrawal}, + title = {\href{https://www.jstor.org/stable/41302016}{Corporate Governance Objectives of Labor Union Shareholders: Evidence from Proxy Voting}}, + journal = {The Review of Financial Studies}, + volume = 25, + number = 1, + month = jan, + year = 2012, + pages = {187-226}, +} + +@inproceedings{ ahn03captcha, + author = {Luis von Ahn and Manuel Blum and Nicholas J. Hopper + and John Langford}, + title = {{CAPTCHA:} Using Hard {AI} Problems for Security}, + booktitle = {Eurocrypt}, + year = 2003, +} + +@article{ aker10mobile, + author = {Jenny C. Aker and Isaac M. Mbiti}, + title = {\href{https://www.aeaweb.org/articles?id=10.1257/jep.24.3.207}{Mobile Phones and Economic Development in Africa}}, + journal = {Journal of Economic Perspectives}, + volume = 24, + number = 3, + month = sep, + year = 2010, + pages = {207-232}, +} + +@article{ akst95, + author = {Daniel Akst}, + title = {The Cutting Edge: + The {Helsinki} Incident and the Right to Anonymity}, + journal = {L.A. Times}, + month = feb, + day = 22, + year = 1995, + pages = {D1}, +} + +@article{ alam15digital, + author = {Khorshed Alam and Sophia Imran}, + title = {\href{https://www.emerald.com/insight/content/doi/10.1108/ITP-04-2014-0083/full/html}{The digital divide and social inclusion among refugee migrants: A case in regional Australia}}, + journal = {Information Technology \& People}, + month = jun, + year = 2015, +} + +@article{ alger06voting, + author = {Dan Alger}, + title = {\href{https://link.springer.com/content/pdf/10.1007/s11127-006-3059-1.pdf}{Voting by Proxy}}, + journal = {Public Choice}, + volume = 126, + number = {1/2}, + month = jan, + year = 2006, + pages = {1-26}, +} + +@article{ allcott17social, + author = {Hunt Allcott and Matthew Gentzkow}, + title = {\href{https://pubs.aeaweb.org/doi/pdfplus/10.1257/jep.31.2.211}{Social Media and Fake News in the 2016 Election}}, + volume = 31, + number = 2, + year = 2017, + pages = {211–236}, +} + +@article{ allen05roots, + author = {Neal Allen and Brian J. Brox}, + title = {\href{http://www.tulane.edu/~bbrox/Allen%26Brox.pdf}{The Roots of Third Party Voting}}, + journal = {Party Politics}, + volume = 11, + number = 5, + pages = {623-637}, +} + +@article{ alvarez09internet, + author = {R. Michael Alvarez and Thad E. Hall and + Alexander H. Trechsel}, + title = {Internet Voting in Comparative Perspective: + The Case of {E}stonia}, + journal = {Political Science \& Politics}, + volume = 42, + number = 3, + month = jun, + year = 2009, + pages = {497-505}, +} + +% superseded by ananny18presence +@misc{ ananny18silence, + author = {Mike Ananny}, + title = {What to do with silence? Exploring the political significances of sociotechnical absences}, + month = jun, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ ananny18presence, + author = {Mike Ananny}, + title = {Presence of Absence:Exploring the democratic significance of silence}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@article{ armingeon14social, + author = {Klaus Armingeon and Lisa Sch\"{a}del}, + title = {\href{https://www.tandfonline.com/doi/abs/10.1080/01402382.2014.929341}{Social Inequality in Political Participation: The Dark Sides of Individualisation}}, + journal = {West European Politics}, + volume = 38, + number = 3, + month = jan, + year = 2015, +} + +@article{ asongu13how, + author = {Asongu, Simplice A.}, + title = {\href{https://www.tandfonline.com/doi/abs/10.1080/15228916.2013.765309}{How has Mobile Phone Penetration Stimulated Financial Development in Africa?}}, + journal = {Journal of African Business}, + volume = 14, + number = 1, + month = apr, + year = 2013, + pages = {7-18}, +} + +@techreport{ asongu13impact, + author = {Asongu, Simplice A.}, + title = {\href{https://www.econstor.eu/handle/10419/123599}{The impact of mobile phone penetration on African inequality}}, + institution = {African Governance and Development Institute (AGDI)}, + number = {AGDI Working Paper, No. WP/13/021}, + year = 2013, +} + +@article{ arthur95, + author = {Charles Arthur}, + title = {Identity Crisis on the Internet}, + journal = {New Scientist}, + month = mar, + day = 11, + year = 1995, +} + +@article{atzori2015blockchain, + title={Blockchain technology and decentralized governance: Is the state still necessary?}, + author={Atzori, Marcella}, + year={2015} +} + +@inproceedings{ aziz15computational, + author = {Haris Aziz and Serge Gaspers and Joachim Gudmundsson and + Simon Mackenzie and Nicholas Mattei and Toby Walsh}, + title = {\href{https://dl.acm.org/citation.cfm?id=2772896}{Computational Aspects of Multi-Winner Approval Voting}}, + booktitle = {International Conference on Autonomous Agents and Multiagent Systems (AAMAS)}, + month = may, + year = 2015, + location = {Istanbul, Turkey}, + pages = {107-115}, +} + + +%B + +@misc{ back02hashcash, + author = {Adam Back}, + title = {\href{http://www.hashcash.org/papers/hashcash.pdf}{Hashcash -- A Denial of Service Counter-Measure}}, + month = aug, + year = 2002, +} + note = {\url{http://www.cypherspace.org/adam/hashcash/}}, + +@inproceedings{ backstrom07wherefore, + author = {Lars Backstrom and Cynthia Dwork and Jon Kleinberg}, + title = {Wherefore Art Thou {R3579X}? + Anonymized Social Networks, Hidden Patterns, + and Structural Steganography}, + booktitle = {\bibconf[16th]{WWW}{World Wide Web Conference}}, + month = may, + year = 2007, + location = {Banff, Alberta, Canada}, +} + +@book{ balinski11majority, + author = {Michel Balinski and Rida Laraki}, + title = {Majority Judgment: Measuring, Ranking, and Electing}, + publisher = {The MIT Press}, + month = jan, + year = 2011, +} + +@article{ balkin04digital, + author = {Jack M. Balkin}, + title = {Digital Speech and Democratic Culture: + A Theory of Freedom of Expression for the Information Society}, + journal = {Faculty Scholarship Series}, + year = 2004, + note = {Paper 240}, +} + +@misc{ ball14case, + author = {Laurence M. Ball}, + title = {\href{https://www.imf.org/en/Publications/WP/Issues/2016/12/31/The-Case-for-a-Long-Run-Inflation-Target-of-Four-Percent-41625}{The Case for a Long-Run Inflation Target of Four Percent}}, + howpublished = {International Monetary Fund}, + note = {Working Paper No. 14/92}, + month = jun, + day = 9, + year = 2014, + isbn = {9781498395601/1018-5941}, +} + +@article{ ball18donald, + author = {Molly Ball}, + title = {\href{http://time.com/5422644/trump-white-women-2016/}{Donald Trump Didn't Really Win 52\% of White Women in 2016}}, + journal = {TIME}, + month = oct, + day = 18, + year = 2018, +} + +@article{ barbera15tweeting, + author = {Pablo Barber\'{a} and John T. Jost and Jonathan Nagler and + Joshua A. Tucker and Richard Bonneau}, + title = {\href{https://journals.sagepub.com/doi/10.1177/0956797615594620}{Tweeting From Left to Right: Is Online Political Communication More Than an Echo Chamber?}}, + journal = {Psychological Science}, + volume = 26, + number = 10, + month = oct, + year = 2015, + pages = {1531-1542}, +} + +@misc{ bbc16switzerland, + author = {{BBC News}}, + title = {\href{https://www.bbc.com/news/world-europe-36454060}{Switzerland's voters reject basic income plan}}, + month = jun, + day = 5, + year = 2016, +} + +@article{ becker12liquid, + author = {Sven Becker}, + title = {\href{http://www.spiegel.de/international/germany/liquid-democracy-web-platform-makes-professor-most-powerful-pirate-a-818683.html}{Liquid Democracy: Web Platform Makes Professor Most Powerful Pirate}}, + journal = {Spiegel Online}, + month = mar, + day = 2, + year = 2012, +} + +@article{ behrens14evolution, + author = {Jan Behrens}, + title = {\href{https://liquid-democracy-journal.org/issue/1/The_Liquid_Democracy_Journal-Issue001-04-The_evolution_of_proportional_representation_in_LiquidFeedback.html}{The evolution of proportional representation in {LiquidFeedback}}}, + journal = {Liquid Democracy Journal}, + month = mar, + year = 2014, + volume = 1, +} + +@misc{ benes12chicago, + author = {Jaromir Benes and Michael Kumhof}, + title = {\href{https://www.imf.org/external/pubs/ft/wp/2012/wp12202.pdf}{The Chicago Plan Revisited}}, + month = aug, + year = 2012, + url = {https://www.imf.org/external/pubs/ft/wp/2012/wp12202.pdf}, + note = {IMF Working Paper}, +} + +@book{ benkler07wealth, + author = {Yochai Benkler}, + title = {The Wealth of Networks: How Social Production Transforms Markets and Freedom}, + publisher = {Yale University Press}, + month = oct, + year = 2007, + isbn = {978-0300125771}, +} + +@incollection{ benkler15peer, + author = {Yochai Benkler and Aaron Shaw and Benjamin Mako Hill}, + title = {\href{https://mako.cc/academic/benkler_shaw_hill-peer_production_ci.pdf}{Peer Production: A Form of Collective Intelligence}}, + booktitle = {\href{https://mitpress.mit.edu/books/handbook-collective-intelligence}{Handbook of Collective Intelligence}}, + month = oct, + year = 2015, + isbn = {9780262029810}, +} + +@misc{ berger18bot, + author = {Andreas Berger}, + title = {\href{https://singularityhub.com/2018/07/07/bot-vs-bot-will-the-internet-soon-be-a-place-without-humans/#sm.0001ny1wyu1iuco7q081h41v7wnyr}{Bot vs. Bot: Will the Internet Soon Be a Place Without Humans?}}, + howpublished = {Singularity Hub}, + month = jul, + year = 2018, +} + +@misc{ bernholz18emerging, + author = {Lucy Bernholz}, + title = {The Emerging Apparatus for Digitized Data}, + month = jun, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ bernholz18toward, + author = {Lucy Bernholz}, + title = {Toward a new nonprofit: Civil society institutions in the digital age}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@article{ bessi16social, + author = {Alessandro Bessi and Emilio Ferrara}, + title = {\href{https://firstmonday.org/ojs/index.php/fm/article/view/7090/5653}{Social bots distort the 2016 U.S. Presidential election online discussion}}, + journal = {First Monday}, + volume = 21, + number = 11, + month = nov, + year = 2016, +} + +@article{ bhatia17indias, + author = {Amiya Bhatia and Jacqueline Bhabha}, + title = {\href{https://www.tandfonline.com/doi/full/10.1080/13600818.2016.1263726}{India’s Aadhaar scheme and the promise of inclusive social protection}}, + journal = {Oxford Development Studies}, + volume = 45, + number = 1, + month = jan, + year = 2017, + pages = {64-79}, +} + +@article{ bidadanure19political, + author = {Juliana Uhuru Bidadanure}, + title = {\href{https://www.annualreviews.org/doi/10.1146/annurev-polisci-050317-070954}{The Political Theory of Universal Basic Income}}, + journal = {Annual Review of Political Science}, + volume = 22, + month = may, + year = 2019, +} + +@article{ bieber02meeting, + author = {Meredith A. Bieber}, + title = {Meeting the Statute or Beating It: + Using {John Doe} Indictments Based on {DNA} + to Meet the Statute of Limitations}, + journal = {University of Pennsylvania Law Review}, + year = 2002, + volume = 150, + number = 3, + pages = {1079-1098}, +} + +@article{ blais90proportional, + author = {Andr\'e Blais and R.K. Carty}, + title = {\href{https://doi.org/10.1111/j.1475-6765.1990.tb00227.x}{Does proportional representation foster voter turnout?}}, + journal = {European Journal of Political Research}, + month = mar, + year = 1990, + volume= 18, + number = 2, +} + +@misc{ blakely07, + author = {Rhys Blakely}, + title = {Spam menace spreads to mobile phones}, + month = oct, + day = 5, + year = 2007, + url = {http://business.timesonline.co.uk/tol/business/industry_sectors/telecoms/article2591888.ece}, +} + +@article{ blinder19new, + author = {Alan Blinder}, + title = {\href{https://www.nytimes.com/2019/02/21/us/mark-harris-nc-voter-fraud.html}{New Election Ordered in North Carolina Race at Center of Fraud Inquiry}}, + journal = {The New York Times}, + month = feb, + day = 21, + year = 2019, +} + +@article{ blum16liquid, + author = {Christian Blum and Christina Isabel Zuber}, + title = {Liquid Democracy: Potentials, Problems, and Perspectives}, + journal = {The Journal of Political Philosophy}, + volume = 24, + number = 2, + month = jun, + year = 2016, + pages = {162-182}, +} + +@article{ blumler01new, + author = {Jay G. Blumler and Michael Gurevitch}, + title = {\href{https://www.tandfonline.com/doi/abs/10.1080/713768514}{The New Media and Our Political Communication Discontents: Democratizing Cyberspace}}, + volume = 4, + number = 1, + pages = {1-13}, + year = 2001, +}, + +@article{ boldi11viscous, + author = {Paolo Boldi and Francesco Bonchi and Carlos Castillo + and Sebastiano Vigna}, + title = {Viscous Democracy for Social Networks}, + journal = {Communications of the ACM}, + volume = 54, + number = 6, + month = jun, + year = 2011, +} + +@incollection{ brams14satisfaction, + author = {Steven J. Brams and D. Marc Kilgour}, + title = {\href{https://doi.org/10.1007/978-3-319-05158-1_18}{Satisfaction Approval Voting}}, + booktitle = {Voting Power and Procedures}, + publisher = {Springer, Cham}, + month = apr, + year = 2014, + pages = {323-346}, +} + +@article{ branscomb95, + author = {Anne Wells Branscomb}, + title = {Anonymity, Autonomy, and Accountability: + Challenges to the First Amendment in Cyberspaces}, + journal = {Yale Law Journal}, + volume = 104, + number = 7, + month = may, + year = 1995, + pages = {1639-1679}, +} + +@article{ braverman16more, + author = {Beth Braverman}, + title = {\href{http://www.businessinsider.com/more-than-a-million-americans-will-leave-us-for-medical-care-this-year-2016-8}{More than one million Americans will leave the US for medical care this year}}, + journal = {Business Insider}, + month = aug, + year = 2016, +} + +@misc{ brennan08keysigning, + author = {V. Alex Brennen}, + title = {\url{https://web.archive.org/web/20080518042553/http://www.cryptnet.net/fdp/crypto/keysigning_party/en/keysigning_party.html}{The Keysigning Party HOWTO}}, + month = jan, + year = 2008, +} + +@book{ brewster03unaccountable, + author = {Mike Brewster}, + title = {Unaccountable: How the Accounting Profession Forfeited a Public Trust}, + publisher = {Wiley}, + month = mar, + year = 2003, + isbn = {978-0471423621}, +} + +@book{ brin05kiln, + author = {David Brin}, + title = {Kiln People}, + publisher = {Tor Books}, + month = oct, + year = 2005, + isbn = {0765342618}, +} + +@article{ broniatowski18weaponized, + author = {David A. Broniatowski and Amelia M. Jamison and SiHua Qi and Lulwah AlKulaib and Tao Chen and Adrian Benton and Sandra C. Quinnand Mark Dredze}, + title = {\href{https://ajph.aphapublications.org/doi/10.2105/AJPH.2018.304567}{Weaponized Health Communication: Twitter Bots and Russian Trolls Amplify the Vaccine Debate}}, + journal = {American Journal of Public Health}, + month = sep, + year = 2018, +} + +@article{ browning18suffocation, + author = {Christopher R. Browning}, + title = {\href{https://www.nybooks.com/articles/2018/10/25/suffocation-of-democracy/}{The Suffocation of Democracy}}, + journal = {New York Review of Books}, + month = oct, + day = 25, + year = 2018, +} + +@article{ brugger02ban, + title = {Ban on or Protection of Hate Speech-Some Observations Based on {German} and {American} Law}, + author = {Brugger, Winfried}, + journal = {Tul. Eur. \& Civ. LF}, + volume = {17}, + pages = {1--21}, + year = {2002}, + publisher = {HeinOnline}, +} + +@article{ bu13sock, + author = {Zhan Bu and Zhengyou Xia and Jiandong Wang}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S0950705112002365}{A sock puppet detection algorithm on virtual spaces}}, + journal = {Knowledge-Based Systems}, + volume = 37, + month = jan, + year = 2013, + pages = {366-377}, +} + +@article{ budak16fair, + author = {Ceren Budak and Sharad Goel and Justin M. Rao}, + journal = {\href{https://academic.oup.com/poq/article/80/S1/250/2223443}{Fair and Balanced? Quantifying Media Bias through Crowdsourced Content Analysis}}, + volume = 80, + number = {S1}, + month = jan, + year = 2016, + pages = {250–271}, +} + +@article{ bugnion04international, + author = {Bugnion, Francois}, + title = {The International Committee of the Red Cross + and the Development of International Humanitarian Law}, + journal = {Chicago Journal of International Law}, + volume = 5, + number = 1, + year = 2004, +} + +%C + +@misc{ cage18philanthropy, + author = {Julia Cag\'{e}}, + title = {From Philanthropy to Democracy: Rethinking Governance and Funding of High-Quality News in the Digital Age}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@book{ cahn92time, + author = {Edgar S. Cahn}, + title = {{Time Dollars}: The New Currency That Enables {Americans} to + Turn Their Hidden Resource-Time-Into Personal Security and + Community Renewal}, + publisher = {Rodale}, + month = jan, + day = 1, + year = 1992, + isbn = {978-0878579853}, +} + +@misc{ caplan18artisan, + author = {Robyn Caplan}, + title = {The Artisan and the Decision Factory: How Organizational Dynamics Impact Speech Regulation at a Global Scale}, + month = jun, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ caplan18content, + author = {Robyn Caplan}, + title = {Content Standards and the (Private) Governance of Speech}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@article{ carey18human, + author = {Bridget Carey}, + title = {\href{https://www.cnet.com/news/google-duplex-assistant-bot-deception-scary-ethics-question/}{Human or bot? Google Duplex scares me}}, + journal = {\href{https://www.cnet.com/}{CNet}}, + month = may, + day = 11, + year = 2018, +} + +@article{ carter02proportional, + author = {Elisabeth L. Carter}, + title = {\href{https://www.tandfonline.com/doi/pdf/10.1080/713601617?casa_token=e0_e5lqLeaMAAAAA:V0r3xNNzbANLyePg2K3eKxId3wpmoM9sooodrypkZ-Qv_IJq2khL82Y-pYG2qQgoKZUfipUC5azZ1P8}{Proportional Representation and the Fortunes of Right-Wing Extremist Parties}}, + journal = {West European Politics}, + year = 2002, + month = jun, + volume = 25, + number = 3, + pages = {125-146}, +} + +@inproceedings{ casado07peering, + author = {Martin Casado and Michael J. Freedman}, + title = {Peering Through the Shroud: + The Effect of Edge Opacity on {IP}-Based Client Identification}, + booktitle = {4th NSDI}, + address = {Cambridge, MA}, + month = apr, + year = 2007, +} + +@article{ champ08stamp, + author = {Bruce Champ}, + title = {\href{https://www.clevelandfed.org/newsroom-and-events/publications/economic-commentary/economic-commentary-archives/2008-economic-commentaries/ec-20080401-stamp-scrip-money-people-paid-to-use.aspx}{Stamp Scrip: Money People Paid to Use}}, + day = 4, + month = jan, + year = 2008, + url = {https://www.clevelandfed.org/newsroom-and-events/publications/economic-commentary/economic-commentary-archives/2008-economic-commentaries/ec-20080401-stamp-scrip-money-people-paid-to-use.aspx}, +} + +@article{ chaudhuri17aadhaar, + author = {Bidisha Chaudhuri and Lion K\"{o}nig}, + title = {\href{https://www.tandfonline.com/doi/full/10.1080/09584935.2017.1369934}{The Aadhaar scheme: a cornerstone of a new citizenship regime in India?}}, + journal = {Contemporary South Asia}, + volume = 26, + number = 2, + month = sep, + year = 2017, + pages = {127-142}, +} + +@inproceedings{ chellapilla05computers, + author = "Kumar Chellapilla and Kevin Larson and Patrice Simard + and Mary Czerwinski", + title = "Computers Beat Humans at Single Character Recognition in + Reading based Human Interaction Proofs {(HIPs)}", + booktitle = "2nd Conference on E-mail and Anti-Spam", + month = jul, + year = 2005, + url = "http://www.ceas.cc/papers-2005/160.pdf", +} + +@article{ cho15how, + author = {Youngho Cho}, + title = {\href{https://journals.sagepub.com/doi/10.1111/1467-9248.12088}{How Well are Global Citizenries Informed about Democracy? Ascertaining the Breadth and Distribution of Their Democratic Enlightenment and Its Sources}}, + journal = {Political Studies}, + volume = 63, + number = 1, + month = mar, + year = 2015, + pages = {240-258}, +} + +@article{ chong03, + author = "Curtis Chong", + title = "Graphical Verification: Another Accessibility Challenge", + journal = "The Braille Monitor", + month = nov, + year = 2003, + url = "http://www.nfb.org/Images/nfb/Publications/bm/bm03/bm0311/bm031104.htm", +} + +@article{ citrin09proposition, + author = {Jack Citrin}, + title = {\href{https://cloudfront.escholarship.org/dist/prd/content/qt7mt1q84g/qt7mt1q84g.pdf}{Proposition 13 and the Transformation of California Government}}, + journal = {The California Journal of Politics \& Policy}, + volume = 1, + number = 1, + month = apr, + year = 2009, +} + +@misc{ clinton10freedom, + author = "Clinton, Hillary Rodham", + title = "Remarks on Internet Freedom", + howpublished = {\url{http://www.state.gov/secretary/rm/2010/01/135519.htm}}, + month = jan, + year = 2010, + note = {Accessed on 30/01/2013}, +} + +@article{ cohen96, + author = {Julie E. Cohen}, + title = {A Right to Read Anonymously: + A Closer Look at “Copyright Management” in Cyberspace}, + journal = {Connecticut Law Review}, + volume = 28, + pages = {981–1039}, + year = 1996, +} + +@misc{ cohen18democracy, + author = {Joshua Cohen and Archon Fung}, + title = {Democracy, Design, and the Digital Public Sphere}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@article{ collins02studies, + author = {H.M. Collins and Robert Evans}, + title = {\href{https://journals.sagepub.com/doi/10.1177/0306312702032002003}{The Third Wave of Science Studies: Studies of Expertise and Experience}}, + volume = 32, + number = 2, + month = apr, + year = 2002, + pages = {235-296}, +} + +@misc{ comninos11twitter, + author = {Alex Comninos}, + title = {\href{https://www.apc.org/sites/default/files/AlexComninos_MobileInternet.pdf}{Twitter revolutions and cyber crackdowns: User-generated content and social networking in the Arab spring and beyond}}, + publisher = {Association for Progressive Communications}, + month = jun, + year = 2011, +} + +@techreport{ conyon08ranking, + author = {M. J. Conyon and M. R. Muldoon}, + title = {Ranking the Importance of Boards of Directors}, + month = jan, + year = 2008, + institution = {Manchester Institute for Mathematical Sciences}, + number = {2006.65}, +} + +@inproceedings{ corrigangibbs13welcome, + author = {Henry Corrigan-Gibbs and Bryan Ford}, + title = {Welcome to the World of Human Rights: Please Make Yourself Uncomfortable}, + booktitle = {\bibconf{CREDS}{Cyber-security Research Ethics Dialog and Strategy Workshop}}, + month = may, + year = 2013, +} + +@book{ cost15republic, + author = {Jay Cost}, + title = {A Republic No More: Big Government and the Rise of American Political Corruption}, + publisher = {Encounter Books}, + month = feb, + year = 2015, + isbn = {978-1594037276}, +} + +@article{ cranor98spam, + author = {Lorrie Faith Cranor and Brian A. LaMacchia}, + title = {\href{https://dl.acm.org/citation.cfm?id=280336}{Spam!}}, + journal = {Communications of the ACM}, + volume = 41, + number = 8, + month = aug, + year = 1998, +} + +@misc{ creditsuisse17global, + author = {{Credit Suisse Research Institute}}, + title = {\href{https://www.credit-suisse.com/corporate/en/research/research-institute/global-wealth-report.html}{Global Wealth Report 2017}}, + month = nov, + year = 2017, +} + +@article{ crichton18liquid, + author = {Danny Crichton}, + title = {\href{https://techcrunch.com/2018/02/24/liquid-democracy-uses-blockchain/}{Liquid democracy uses blockchain to fix politics, and now you can vote for it}}, + journal = {TechCrunch}, + month = feb, + day = 24, + year = 2018, +} + +@article{ curtice08exit, + author = {John Curtice and David Firth}, + title = {\href{https://www.jstor.org/stable/30135085}{Exit polling in a cold climate: the {BBC–ITV} experience in Britain in 2005}}, + journal = {Journal of the Royal Statistical Society}, + year = 2008, + volume = 171, + number = 3, + pages = {509-539}, +} + +%D + +@book{ dahl61who, + author = {Robert A. Dahl}, + title = {\href{https://yalebooks.yale.edu/book/9780300103922/who-governs}{Who Governs? Democracy and Power in an American City}}, + publisher = {Yale University Press}, + year = 1961, + isbn = {978-0585354538}, +} + +@book{ dahl89democracy, + author = {Robert A. Dahl}, + title = {\href{https://yalebooks.yale.edu/book/9780300049381/democracy-and-its-critics}{Democracy and Its Critics}}, + publisher = {Yale University Press}, + year = 1989, + isbn = {978-0300044096}, +} + +@inproceedings{ datta16algorithmic, + author = {Anupam Datta and Shayak Sen and Yair Zick}, + title = {\href{https://ieeexplore.ieee.org/abstract/document/7546525}{Algorithmic Transparency via Quantitative Input Influence: Theory and Experiments with Learning Systems}}, + booktitle = {IEEE Symposium on Security and Privacy}, + month = may, + year = 2016, +} + +@article{ davenport02, + author = {David Davenport}, + title = {Anonymity on the {Internet}: why the price may be too high}, + journal = {Communications of the ACM}, + volume = 45, + number = 4, + pages = {33-35}, + month = apr, + year = 2002, +} + +@inproceedings{dantu05voipspam, + author = {Ram Dantu and Prakash Kolan}, + title = {Detecting spam in {VoIP} networks}, + booktitle = {Proc. SRUTI}, + year = {2005}, + location = {Cambridge, MA}, +} + +@article{ davis07business, + author = {Gerald F. Davis and E. Han Kim}, + title = {\href{https://econpapers.repec.org/article/eeejfinec/v_3a85_3ay_3a2007_3ai_3a2_3ap_3a552-570.htm}{Business ties and proxy voting by mutual funds}}, + journal = {Journal of Financial Economics}, + volume = 85, + number = 2, + year = 2007, + pages = {552-570}, +} + +@misc{ dcc, + author = {{Distributed Checksum Clearinghouse}}, + note = {\url{http://www.dcc-servers.net/dcc/graphs/}}, + url = {http://www.dcc-servers.net/dcc/graphs/}, +} + +@article{ defila94wir, + author = {Heidi Defila}, + title = {\href{https://web.archive.org/web/20061017101214/http://www.reinventingmoney.com/wirbusiness.php}{60 Years WIR Business Circle Cooperative -- Origins and Ideology}}, + journal = {WIR Magazin}, + month = sep, + year = 1994, + url = {https://web.archive.org/web/20061017101214/http://www.reinventingmoney.com/wirbusiness.php}, + note = {Translation, by Frederika Almstedt with assistance from Thomas Greco}, +} + +@book{ deibert08access, + author = {Ronald Deibert and John Palfrey and Rafal Rohozinski + and Jonathan Zittrain}, + title = {Access Denied: The Practice and Policy of + Global {Internet} Filtering}, + month = jan, + year = 2008, + publisher = {MIT Press}, + isbn = {0262541963}, +} + +@article{ devereaux14data, + author = {Ryan Devereaux and Glenn Greenwald and Laura Poitras}, + title = {\href{https://firstlook.org/theintercept/article/2014/05/19/data-pirates-caribbean-nsa-recording-every-cell-phone-call-bahamas/}{Data Pirates of the {Caribbean}: The {NSA} Is Recording Every Cell Phone Call in the {Bahamas}}}, + journal = {The Intercept}, + year = 2014, + month = may # {~20,}, +} + +@article{ diakopoulos16algorithmic, + author = {Nicholas Diakopoulos and Michael Koliska}, + title = {\href{https://www.tandfonline.com/doi/abs/10.1080/21670811.2016.1208053?journalCode=rdij20}{Algorithmic Transparency in the News Media}}, + journal = {Digital Journalism}, + volume = 5, + number = 7, + month = jul, + year = 2016, +} + +@misc{ digiconomist19bitcoin, + author = {Digiconomist}, + title = {\href{https://digiconomist.net/bitcoin-energy-consumption}{Bitcoin Energy Consumption Index}}, + year = 2019, +} + +@article{ dijk06digital, + author = {{Jan A.G.M.} {van Dijk}}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S0304422X06000167}{Digital divide research, achievements and shortcomings}}, + journal = {Poetics}, + volume = 34, + number = {4--5}, + month = aug, + year = 2006, + pages = {221-235}, +} + +@article{ dixon17failure, + author = {Pam Dixon}, + title = {\href{https://link.springer.com/article/10.1007/s12553-017-0202-6}{A Failure to ``Do No Harm'' -- India's Aadhaar biometric ID program and its inability to protect privacy in relation to measures in Europe and the U.S.}}, + journal = {Health and Technology}, + volume = 7, + number = 4, + month = dec, + year = 2017, + pages = {539-567}, +} + +@article{ doctorow04solving, + author = "Cory Doctorow", + title = "Solving and creating {CAPTCHAs} with free porn", + journal = "Boing Boing", + month = jan, + year = 2004, + url = "http://www.boingboing.net/2004/01/27/solving_and_creating.html", +} + +@book{ dodgson84principles, + author = {Charles L. Dodgson}, + title = {The Principles of Parliamentary Representation}, + publisher = {Harrison and Sons}, + year = {1884}, +} + +@article{ donaghue10human, + title = {Human Rights, Development INGOs and Priorities for Action}, + author = {Donaghue, K.}, + journal = {Ethical questions and international NGOs}, + pages = {39--63}, + year = {2010}, + publisher = {Springer}, +} + +@article{ donnelly18finland, + author = {Grace Donnelly}, + title = {\href{http://fortune.com/2018/04/19/finland-universal-basic-income-experiment-ending/}{Finland's Basic Income Experiment Will End in 2019}}, + journal = {Fortune}, + month = apr, + day = 19, + year = 2018, +} + +@article{ doughty05know, + author = {Caroline Doughty}, + title = {\href{https://journals.sagepub.com/doi/10.1177/0266382105060603}{Know your customer: Automation is key to comply with legislation}}, + journal = {Business Information Review}, + volume = 22, + number = 4, + month = dec, + year = 2005, + pages = {248-252}, +} + +@misc{ douglas39program, + title = {\href{https://web.archive.org/web/20121103110209/http://home.comcast.net/~zthustra/pdf/a_program_for_monetary_reform.pdf}{A Program for Monetary Reform}}, + author = {Paul H. Douglas and Irving Fisher and Frank D. Graham and + Earl J. Hamilton and Willford I. King and + Charles R. Whittlesey}, + year = 1939, +} + +@article{ doward18big, + author = {Jamie Doward}, + title = {\href{https://www.theguardian.com/technology/2018/jan/28/tech-backlash-facebook-google-fake-news-business-monopoly-regulation}{The big tech backlash: Tech giants are drawing political fire over fake news and Russian meddling}}, + journal = {The Guardian}, + month = jan, + year = 2018, +} + +@book{ dowlen08political, + author = {Oliver Dowlen}, + title = {The Political Potential of Sortition: A Study of the Random Selection of Citizens for Public Office}, + publisher = {Imprint Academic}, + month = aug, + year = 2008, + pages = 264, + isbn = {978-1845401375}, +} + +@misc{ dropbox17retention, + title = + {\href{https://www.theregister.co.uk/2017/01/24/dropbox_brings_old_files_back_from_dead/}{Dropbox: + Oops, yeah, we didn't actually delete all your files - this bug + kept them in the cloud}}, + author = {Shaun Nichols}, + month = jan, + year = {2017 (accessed on Jan 10, 2019)}, +} + +@article{ dubois18echo, + author = {Elizabeth Dubois and Grant Blank}, + title = {\href{https://www.tandfonline.com/doi/full/10.1080/1369118X.2018.1428656}{The echo chamber is overstated: the moderating effect of political interest and diverse media}}, + volume = 21, + number = 5, + month = jan, + year = 2018, + pages = {729-745}, +} + +@article{ duhigg12how, + author = {Charles Duhigg}, + title = {How Companies Learn Your Secrets}, + journal = {The New York Times}, + month = feb, + day = 16, + year = 2012, + note = {\url{http://www.nytimes.com/2012/02/19/magazine/shopping-habits.html}}, +} + +@inproceedings{ durst04landsgemeinde, + author = {Hansj\"{o}rg D\"{u}rst}, + title = {\href{https://cladista.clad.org/bitstream/handle/123456789/2992/0049818.pdf}{The ``landsgemeinde'': the cantonal assembly of Glarus (Switzerland), history, present and future}}, + booktitle = {IX Congreso Internacional del CLAD sobre la Reforma del Estado y de la Administraci\'{o}n P\'{u}blica}, + month = nov, + year = 2004, + location = {Madrid, Spain}, +} + +%E + +@article{ eberl15one, + author = {Jakob-Moritz Eberl and Hajo G. Boomgaarden and Markus Wagner}, + title = {\href{https://journals.sagepub.com/doi/10.1177/0093650215614364}{One Bias Fits All? Three Types of Media Bias and Their Effects on Party Preferences}}, + journal = {Communication Research}, + volume = 44, + number = 8, + month = nov, + year = 2015, + pages = {1125-1148}, +} + +@article{ edens12hired, + author = {Edens, John F. and Smith, Shannon Toney and Magyar, Melissa S. + and Mullen, Kacy and Pitta, Amy and Petrila, John}, + title = {\href{https://psycnet.apa.org/fulltext/2012-10753-001.pdf}{``Hired Guns,'' ``Charlatans,'' and Their ``Voodoo Psychobabble'': Case Law References to Various Forms of Perceived Bias Among Mental Health Expert Witnesses}}, + journal = {Psychological Services}, + volume = 9, + number = 3, + month = aug, + year = 2012, + pages = {259-271}, +} + +@misc{embury18british, + title = {\href{https://www.independent.co.uk/travel/british-airways-website-theft-customer-data-stolen-flights-credit-card-a8526376.html}{British Airways website theft: Customers urged to contact banks as airline launches investigation over stolen data}}, + author = {Tom Embury-Dennis and Simon Calder}, + month = sep, + year = {2018 (accessed on Oct 27, 2018)}, +} + +@misc{ enikolopov18social, + author = {Ruben Enikolopov and Alexey Makarin and Maria Petrova}, + title = {\href{https://papers.ssrn.com/sol3/papers.cfm?abstract_id=2696236}{Social Media and Protest Participation: Evidence from Russia}}, + month = oct, + year = 2018, +} + +@article{ esau17design, + author = {Katharina Esau and Dennis Friess and Christiane Eilders}, + title = {\href{https://onlinelibrary.wiley.com/doi/full/10.1002/poi3.154}{Design Matters! An Empirical Analysis of Online Deliberation on Different News Platforms}}, + journal = {Policy and Internet}, + volume = 9, + number = 3, + month = sep, + year = 2017, + pages = {321-342}, +}, + +@misc{ eternalgloom18overview, + author = {{eternalgloom}}, + title = {\href{https://bitcointalk.org/index.php?topic=3242065.0}{Overview of Universal Basic Income Crypto Projects}}, + howpublished = {Bitcoin Forum}, + month = apr, + year = 2018, +} + +@misc{ ethics12about, + title = {About | {Ethics \& International Affairs}}, + note = {Accessed on 24/01/2013}, + howpublished = {\url{http://www.ethicsandinternationalaffairs.org/about/}}, +} + +@article{ evers05, + author = {Joris Evers}, + title = {{ISPs} versus the zombies}, + journal = {CNET News}, + month = jul, + day = 19, + year = 2005, + url = {http://news.com.com/ISPs+versus+the+zombies/2100-7349_3-5793719.html}, +} + +%F + +% obsoleted by farrell18democratic +@misc{ farrell18fake, + author = {Henry Farrell and Melissa Schwartzberg}, + title = {In fake news we trust? Epistemic trust and + the transformation of the media}, + month = jun, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ farrell18democratic, + author = {Henry Farrell and Melissa Schwartzberg}, + title = {The Democratic Consequences of the New Public Sphere}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ federal15why, + author = {{Federal Reserve}}, + title = {\href{https://www.federalreserve.gov/faqs/economy_14400.htm}{Why does the Federal Reserve aim for 2 percent inflation over time?}}, + month = jan, + year = 2015, + url = {https://www.federalreserve.gov/faqs/economy_14400.htm}, +} + +@inproceedings{feigenbaum11accountability, + title={Accountability and deterrence in online life}, + author={Feigenbaum, Joan and Hendler, James A and Jaggard, Aaron D and Weitzner, Daniel J and Wright, Rebecca N}, + booktitle = {\bibconf['11]{ICWS}{International Conference on Web Science, ACM}}, + year={2011} +} + +@article{ feigenbaum14data, + author = {Joan Feigenbaum and Bryan Ford}, + title = {\href{http://www.huffingtonpost.com/joan-feigenbaum/data-hoarding-surveillance_b_5179305.html}{Is Data Hoarding Necessary for Lawful Surveillance?}}, + journal = {The Huffington Post}, + month = apr # {~19,}, + year = 2014, +} + +@book{ feldman06citizens, + author = {Leonard C. Feldman}, + title = {Citizens without Shelter: Homelessness, Democracy, and Political Exclusion}, + publisher = {Cornell University Press}, + month = jan, + year = 2006, + isbn = {978-0801472909}, +} + +@article{ ferrara16rise, + author = {Emilio Ferrara and Onur Varol and Clayton Davis and + Filippo Menczer and Alessandro Flammini}, + title = {\href{https://dl.acm.org/citation.cfm?id=2818717}{The Rise of Social Bots}}, + journal = {Communications of the ACM}, + volume = 59, + number = 7, + month = jul, + year = 2016, +} + +@article{ filetti16participating, + author = {Andrea Filetti}, + title = {\href{http://siba-ese.unisalento.it/index.php/paco/article/viewFile/15893/13784}{Participating Unequally? Assessing the Macro-Micro Relationship Between Income Inequality and Political Engagement in Europe}}, + journal = {Partecipazione e Conflitto}, + volume = 9, + number = 1, + year = 2016, +} + +@inproceedings{ fiore02observed, + author = {Andrew T. Fiore and Scott LeeTiernan and Marc A. Smith}, + title = {\href{https://dl.acm.org/citation.cfm?id=503434}{Observed Behavior and Perceived Value of Authors in Usenet Newsgroups: Bridging the Gap}}, + booktitle = {Proceedings of the SIGCHI Conference on Human Factors in Computing Systems}, + month = apr, + year = 2002, + pages = {323-330}, +} + +@book{ fishkin93democracy, + author = {James S. Fishkin}, + title = {Democracy and Deliberation: + New Directions for Democratic Reform}, + publisher = {Yale University Press}, + month = sep, + year = 1993, + isbn = {978-0300051636}, +} + +@article{ fishkin05experimenting, + author = {James S Fishkin and Robert C Luskin}, + title = {\href{https://link.springer.com/article/10.1057%2Fpalgrave.ap.5500121}{Experimenting with a Democratic Ideal: Deliberative Polling and Public Opinion}}, + journal = {Acta Politica}, + month = sep, + year = 2005, + volume = 40, + number = 3, + pages = {284–298}, +} + +@article{ flavin15campaign, + author = {Patrick Flavin}, + title = {\href{https://doi.org/10.1177%2F1065912914554041}{Campaign Finance Laws, Policy Outcomes, and Political Equality in the American States}}, + journal = {Political Research Quarterly}, + volume = 68, + number = 1, + year = 2015, +} + +@misc{ ford02delegative, + author = {Bryan Ford}, + title = {\href{http://bford.info/deleg/deleg.pdf}{Delegative Democracy}}, + month = may, + year = 2002, +} + +@inproceedings{ford08nyms, + author = {Bryan Ford and Jacob Strauss}, + title = {\href{http://bford.info/pub/net/sybil.pdf}{An offline foundation for online accountable pseudonyms}}, + booktitle = {1st International Workshop on Social Network Systems (SocialNets)}, + year = {2008}, + url = {http://bford.info/pub/net/sybil.pdf}, +} + +@misc{ ford14delegative, + author = {Bryan Ford}, + title = {\href{https://bford.github.io/2014/11/16/deleg.html}{Delegative Democracy Revisited}}, + month = nov, + day = 16, + year = 2014, +} + +@misc{ ford19remote, + author = {Bryan Ford}, + title = {\href{https://bford.info/2019/02/22/voting/}{The Remote Voting Minefield: from North Carolina to Switzerland}}, + month = feb, + year = 2019, +} + +@misc{ ford19liquid, + author = {Bryan Ford}, + title = {\href{https://bford.info/book/}{A Liquid Perspective on Democratic Choice}}, + note = {Draft (forthcoming)}, + year = 2020, +} + +@misc{ ford19money, + author = {Bryan Ford}, + title = {\href{https://bford.info/book/}{Democratic Value and Money for Decentralized Digital Society}}, + note = {Draft (forthcoming)}, + year = 2020, +} + +@misc{ ford19expert, + author = {Bryan Ford}, + title = {\href{https://bford.info/book/}{Experts and Charlatans, Breakthroughs and Bandwagons: Collectively Distinguishing Signal from Noise Under Attack}}, + note = {Draft (forthcoming)}, + year = 2020, +} + +@misc{ ford19ident, + author = {Bryan Ford}, + title = {To Divide or Unite People Online: + Digital Identity, Personhood, and Citizenship}, + note = {Draft (forthcoming)}, + year = 2020, +} + +@incollection{ford20technologizing, + author = {Bryan Ford}, + title = {\href{https://bford.info/pub/soc/dt2-chapter-abs}{Technologizing Democracy or Democratizing Technology? {A} Layered-Architecture Perspective on Potentials and Challenges}}, + booktitle = {Digital Technology and Democratic Theory (forthcoming)}, + publisher = {University of Chicago Press}, + month = may, + year = 2020, + note = {Preprint: \url{https://bford.info/pub/soc/dt2-chapter-abs}} +} + +@article{ forget11town, + author = {Evelyn L. Forget}, + title = {\href{https://utpjournals.press/doi/full/10.3138/cpp.37.3.283}{The Town with No Poverty: The Health Effects of a Canadian Guaranteed Annual Income Field Experiment}}, + volume = 37, + number = 3, + month = sep, + year = 2011, + pages = {283-305}, +} + +@article{ friedman01socialcost, + author = {Friedman, E. and P. Resnick}, + title = {{The Social Cost of Cheap Pseudonyms}}, + journal = {Journal of Economics and Management Strategy}, + Volume = {10}, + Number = {2}, + pages = {173--199} +} + +@inproceedings{ freitas15reverse, + author = {Carlos A. Freitas and Fabricio Benevenuto and + Saptarshi Ghosh and Adriano Veloso}, + title = {\href{https://dl.acm.org/citation.cfm?doid=2808797.2809292}{Reverse Engineering Socialbot Infiltration Strategies in Twitter}}, + booktitle = {\bibconf{ASONAM}{Advances in Social Networks Analysis and Mining}}, + month = aug, + year = 2015, + pages = {25-32}, + location = {Paris, France}, +} + +@article{ froomkin96, + author = {A. Michael Froomkin}, + title = {Flood Control on the Information Ocean: + Living With Anonymity, Digital Cash, and Distributed Databases}, + journal = {Law and Commerce}, + volume = 15, + pages = {395-515}, + year = 1996, +} + +@article{ froomkin99, + author = {A. Michael Froomkin}, + title = {Legal Issues in Anonymity and Pseudonymity}, + journal = {Information Society}, + volume = 15, + number = 2, + pages = {11327}, + month = apr, + year = 1999, +} + +@misc{ ftc10protecting, + author = {{Federal Trade Commission}}, + title = {Protecting Consumer Privacy in an Era of Rapid Change}, + month = dec, + year = 2010, + note = {Preliminary FTC Staff Report}, +} + +@article{ funk10social, + author = {Patricia Funk}, + title = {\href{https://www.jstor.org/stable/25700915}{Social incentives and voter turnout: evidence from the Swiss mail ballot system}}, + journal = {Journal of the European Economic Association}, + volume = 8, + number = 5, + month = sep, + year = 2010, +} + +@misc{ fxssi18top, + author = {{FXSSI}}, + title = {\href{https://fxssi.com/top-10-of-the-weakest-world-currencies-in-current-year}{TOP 10 The Weakest World Currencies in 2018}}, + month = mar, + year = 2018, +} + +%G + +@misc{ gangadharan18digital, + author = {Seeta Gangadharan}, + title = {Digital Exclusion as a Political Resource}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@article{ garzia12voting, + author = {Diego Garzia and Stefan Marschall}, + title = {\href{https://core.ac.uk/download/pdf/45682386.pdf}{Voting Advice Applications under review: the state of research}}, + journal = {International Journal of Electronic Governance}, + volume = 5, + number = {3/4}, + year = 2012, +} + +@techreport{ gasser09three, + author = {Jan Gerlach and Urs Gasser}, + title = {\href{https://cyber.harvard.edu/sites/cyber.harvard.edu/files/Gerlach-Gasser_SwissCases_Evoting.pdf}{Three Case Studies from Switzerland: {E-Voting}}}, + institution = {Berkman Center}, + number = {Research Publication No. 2009-03.1}, + month = mar, + year = 2009, +} + +@article{ gellman09privacy, + author = {Robert Gellman}, + title = {Privacy in the Clouds: Risks to Privacy and Confidentiality + from Cloud Computing}, + journal = {World Privacy Forum}, + year = 2009, + pages = {1-16}, +}, + +@article{ gemberling14expert, + author = {Tess M. Gemberling and Robert J. Cramer}, + title = {\href{https://psycnet.apa.org/fulltext/2014-13439-004.pdf}{Expert testimony on sensitive myth-ridden topics: Ethics and recommendations for psychological professionals}}, + journal = {Professional Psychology: Research and Practice}, + volume = 45, + number = 2, + month = apr, + year = 2014, + pages = {120-127}, +} + +@article{ germann17internet, + author = {Micha Germann and Uwe Serd\"{u}lt}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S026137941630453X}{Internet voting and turnout: Evidence from {Switzerland}}}, + journal = {Electoral Studies}, + volume = 47, + month = jun, + year = 2017, + pages = {1-12}, +} + +@book{ gervais15collective, + author = {Daniel Gervais}, + title = {Collective Management of Copyright and Related Rights}, + edition = {3rd}, + publisher = {Wolters Kluwer}, + month = nov, + year = 2015, + isbn = {978-9041154415}, +} + +@book{ gesell58natural, + author = {Silvio Gesell}, + title = {The Natural Economic Order}, + publisher = {Peter Owen Limited}, + location = {London}, + note = {Translated by Philip Pye M.A.}, + year = 1958, +} + +@inproceedings{ ghosh12understanding, + author = {Saptarshi Ghosh and Bimal Viswanath and Farshad Kooti and + Naveen Kumar Sharma and Gautam Korlam and + Fabricio Benevenuto and Niloy Ganguly and + Krishna Phani Gummadi}, + title = {\href{https://dl.acm.org/citation.cfm?id=2187846}{Understanding and Combating Link Farming in the Twitter Social Network}}, + booktitle = {\bibconf[21st]{WWW}{International Conference on World Wide Web}}, + month = apr, + year = 2012, + location = {Lyon, France}, +} + +@article{ gilens14theories, + author = {Martin Gilens and Benjamin I. Page}, + title = {\href{http://piketty.pse.ens.fr/files/GilensPage2014.pdf}{Testing Theories of American Politics: Elites, Interest Groups, and Average Citizens}}, + journal = {Perspectives on Politics}, + volume = 12, + number = 3, + month = sep, + year = 2014, + pages = {564-581}, +} + +@book{ glover95hometown, + author = {Paul Glover}, + title = {Hometown money: How to enrich your community with local currency}, + publisher = {Ithaca Money}, + isbn = {978-0962291135}, + year = 1995, +} + +@article{ golder16far, + author = {Matt Golder}, + title = {\href{https://www.annualreviews.org/doi/full/10.1146/annurev-polisci-042814-012441}{Far Right Parties in Europe}}, + journal = {Annual Review of Political Science}, + volume = 19, + pages = {477-497}, + month = may, + year = 2016, +} + +@misc{ golz18fluid, + author = {Paul G\"{o}lz and Anson Kahng and Simon Mackenzie and + Ariel D. Procaccia}, + title = {\href{https://arxiv.org/abs/1808.01906}{The Fluid Mechanics of Liquid Democracy}}, + month = aug, + year = 2018, + howpublished = {arXiv preprint 1808.01906v1}, +} + +@misc{ greene13eff, + author = {David Greene}, + title = {{EFF} Files 22 Firsthand Accounts of How {NSA} Surveillance + Chilled the Right to Association}, + month = nov, + day = 6, + year = 2013, + note = {\url{https://www.eff.org/press/releases/eff-files-22-firsthand-accounts-how-nsa-surveillance-chilled-right-association}}, +} + +@misc{ green-armytage04proposal, + author = {James Green-Armytage}, + title = {\href{http://web.archive.org/web/20040603225236/http://fc.antioch.edu/~jarmyta@antioch-college.edu/voting_methods/proxy.htm}{A Proposal for Direct Democracy Based on a Non-Binding Proxy System}}, + month = jun, + year = 2004, +} + +@misc{ green-armytage05direct, + author = {James Green-Armytage}, + title = {\href{http://web.archive.org/web/20050428192452/http://fc.antioch.edu/~james_green-armytage/vm/proxy.htm}{Direct Democracy by Delegable Proxy}}, + month = apr, + year = 2005, +} + +@article{ green-armytage14direct, + author = {James Green-Armytage}, + title = {\href{https://link.springer.com/article/10.1007/s10602-014-9176-9}{Direct Voting and Proxy Voting}}, + journal = {Constitutional Political Economy}, + volume = 26, + number = 2, + month = dec, + year = 2014, + pages = {190–220}, +} + +@article{ greenwald13NSA, + author = {Glenn Greenwald}, + title = {\href{http://www.theguardian.com/world/2013/jun/06/nsa-phone-records-verizon-court-order/}{{NSA} collecting phone records of millions of Verizon customers daily}}, + journal = {The Guardian}, + year = 2013, + month = jun # {~6,}, +} + +@article{ gronlund09challenge, + author = {Kimmo Gr\"{o}nlund and Kim Strandberg and Staffan Himmelroos}, + title = {The challenge of deliberative democracy online -- + A comparison of face-to-face and virtual experiments + in citizen deliberation}, + journal = {Information Polity}, + volume = 14, + number = 3, + month = aug, + year = 2009, + pages = {187-201}, +} + +%H + +@article{ hacker05abandoning, + author = {Jacob S. Hacker and Paul Pierson}, + title = {\href{https://www.jstor.org/stable/3688109}{Abandoning the Middle: The Bush Tax Cuts and the Limits of Democratic Control}}, + journal = {Perspectives on Politics}, + volume = 3, + number = 1, + month = mar, + year = 2005, +} + +@article{ hafner06, + author = {Katie Hafner}, + title = {Growing {Wikipedia} Refines Its `Anyone Can Edit' Policy}, + journal = {New York Times}, + month = jun, + day = 17, + year = 2006, + url = {http://www.nytimes.com/2006/06/17/technology/17wiki.html}, +} + +@article{ hajnal17voter, + author = {Zoltan Hajnal and Nazita Lajevardi and Lindsay Nielson}, + title = {\href{https://www.journals.uchicago.edu/doi/10.1086/688343}{Voter Identification Laws and the Suppression of Minority Votes}}, + journal = {The Journal of Politics}, + volume = 79, + number = 2, + month = apr, + year = 2017, + pages = {363-379}, +} + +@misc{ hardt15google, + author = {Steve Hardt and Lia C. R. Lopes}, + title = {\href{https://www.tdcommons.org/dpubs_series/79/}{Google Votes: A Liquid Democracy Experiment on a Corporate Social Network}}, + institution = {Technical Disclosure Commons}, + month = jun, + year = 2015, +} + +@article{ hargrave07, + author = {Sean Hargrave}, + title = {Why {VoIP} is the next target for spammers}, + journal = {The Guardian}, + month = nov, + day = 1, + year = 2007, + url = {http://www.guardian.co.uk/technology/2007/nov/01/news.hacking} +} + +@book{ hauben97netizens, + author = {Michael Hauben and Ronda Hauben}, + title = {\href{https://www.wiley.com/en-us/Netizens%3A+On+the+History+and+Impact+of+Usenet+and+the+Internet-p-9780818677069}{Netizens: On the History and Impact of Usenet and the Internet}}, + publisher = {IEEE Computer Society Press}, + isbn = {978-0-818-67706-9}, + month = apr, + year = 1997, +} + +@misc{ hawkins18hidden, + author = {Stephen Hawkins and Daniel Yudkin and M\'{i}riam Juan-Torres + and Tim Dixon}, + title = {\href{https://www.moreincommon.com/hidden-tribes/}{Hidden Tribes: A Study of America’s Polarized Landscape}}, + howpublished = {More in Common report}, + month = oct, + year = 2018, +} + +@article{ healy03fall, + author = {Paul M. Healy and Krishna G. Palepu}, + title = {The Fall of {Enron}}, + journal = {Journal of Economic Perspectives}, + volume = 17, + number = 2, + year = 2003, + pages = {3-26}, +} + +@inproceedings{ heckle07, + author = {Rosa R. Heckle and Wayne G. Lutters}, + title = {Privacy Implications for Single Sign-on Authentication + In a Hospital Environment (poster)}, + booktitle = {Symposium on Usable Privacy and Security}, + location = {Pittsburgh, PA}, + month = jul, + day = {18-20}, + year = 2007, +} + +@book{ heinlein66moon, + author = {Robert A. Heinlein}, + title = {The Moon is a Harsh Mistress}, + publisher = {G. P. Putnam's Sons}, + month = jun, + year = 1966, +} + +@article{ hermann06special, + author = {Gretchen M. Hermann}, + title = {\href{https://search.proquest.com/docview/205167848}{Special Money: {Ithaca HOURS} and Garage Sales}}, + journal = {Ethnology}, + volume = 45, + number = 2, + year = 2006, + url = {https://search.proquest.com/docview/205167848}, +} + +@misc{ hern2018china, + title = {\href{https://www.theguardian.com/world/2018/aug/02/google-working-on-censored-search-engine-for-china}{Google 'working on censored search engine' for China}}, + author = {Alex Hern}, + month = aug, + year = {2018 (accessed on Jan 10, 2019)}, +} + +@article{ hicks15principle, + author = {William D. Hicks and Seth C. McKee and Mitchell D. Sellers + and Daniel A. Smith}, + title = {\href{https://journals.sagepub.com/doi/10.1177/1065912914554039}{A Principle or a Strategy? Voter Identification Laws and Partisan Competition in the American States}}, + journal = {Political Research Quarterly}, + month = mar, + year = 2015, + volume = 68, + number = 1, + pages = {18-33}, +} + +@article{ highton17voter, + author = {Benjamin Highton}, + title = {\href{https://www.annualreviews.org/doi/10.1146/annurev-polisci-051215-022822}{Voter Identification Laws and Turnout in the United States}}, + volume = 20, + month = may, + year = 2017, + pages = {149-167}, +} + +@article{ hill87algorithm, + author = {I. D. Hill and B. A. Wichmann and D. R. Woodall}, + title = {\href{https://doi.org/10.1093/comjnl/30.3.277}{Algorithm 123 — Single Transferable Vote by Meek’s Method}}, + journal = {The Computer Journal}, + volume = 30, + number = 3, + month = jan, + year = 1987, + pages = {277–281}, +} + +@article{ hill99internet, + author = {Kevin A. Hill and John E. Hughes}, + title = {\href{https://www.tandfonline.com/doi/abs/10.1080/13510349908403613}{Is the Internet an Instrument of Global Democratization?}}, + journal = {Democratization}, + volume = 6, + number = 2, + month = sep, + year = 2007, + pages = {99-127}, + doi = {10.1080/13510349908403613}, +} + +@article{ hill05meek, + author = {I. D. Hill and C. H. E. Warren}, + title = {\href{http://www.votingmatters.org.uk/ISSUE20/I20P1.PDF}{Meek versus Warren}}, + journal = {Voting matters}, + volume = 20, + month = jun, + year = 2005, +} + +@article{ hill12target, + author = {Kashmir Hill}, + title = {How Target Figured Out A Teen Girl Was Pregnant + Before Her Father Did}, + journal = {Forbes}, + month = feb, + day = 16, + year = 2012, + note = {\url{http://www.forbes.com/sites/kashmirhill/2012/02/16/how-target-figured-out-a-teen-girl-was-pregnant-before-her-father-did/}}, +} + +@article{ hill14pregnancy, + author = {Kashmir Hill}, + title = {You Can Hide Your Pregnancy Online, + But You'll Feel Like A Criminal}, + journal = {Forbes}, + month = apr, + day = 29, + year = 2014, + note = {\url{http://www.forbes.com/sites/kashmirhill/2014/04/29/you-can-hide-your-pregnancy-online-but-youll-feel-like-a-criminal/}}, +} + +@article{hollis16share, + title={\href{https://www.ncbi.nlm.nih.gov/pmc/articles/PMC5001759/}{To Share or Not to Share: Ethical Acquisition and Use of Medical Data}}, + author={Hollis, Kate Fultz}, + journal={AMIA Summits on Translational Science Proceedings}, + volume={2016}, + pages={420}, + year={2016}, + publisher={American Medical Informatics Association} +} + +@incollection{ hilty13collective, + author = {Reto M. Hilty and Sylvie N\'erisson}, + title = {\href{https://pure.mpg.de/pubman/faces/ViewItemFullPage.jsp?itemId=item_1758891}{Collective Copyright Management and Digitization: The European Experience}}, + booktitle = {Handbook on the Digital Creative Economy}, + editor = {Ruth Towse and Christian Handke}, + pages = {222-234}, + year = 2013, +} + +@book{ howard13democracy, + author = {Philip N. Howard and Muzammil M. Hussain}, + title = {Democracy's Fourth Wave? Digital Media and the Arab Spring}, + month = mar, + year = 2013, + publisher = {Oxford University Press}, + isbn = {0199936978}, +} + +@misc{ hipaa17benefits, + author = {{HIPAA Journal}}, + title = {\href{https://www.hipaajournal.com/blockchain-medical-records/}{The Benefits of Using Blockchain for Medical Records}}, + month = sep, + year = 2017, +} + +@book{ hobbes1651leviathan, + author = {Thomas Hobbes}, + title = {Leviathan}, + year = 1651, + isbn = {978-1439297254}, +} + +@article{ hougan18bitcoin, + author = {Matt Hougan}, + title = {\href{https://www.forbes.com/sites/matthougan/2018/04/23/bitcoin-hodling-is-the-best-strategy-with-one-big-caveat/}{For Bitcoin, HODLing Is The Best Strategy... With One Big Caveat}}, + journal = {Forbes}, + month = apr, + year = 2018, +} + +@misc{ hrc14right, + author = {{Human Rights Council}}, + title = {\href{http://www.ohchr.org/EN/HRBodies/HRC/RegularSessions/Session27/Documents/A.HRC.27.37_en.pdf}{The right to privacy in the digital age: + Report of the Office of the United Nations High Commissioner + for Human Rights}}, + month = jun, + day = 30, + year = 2014, +} + +@article{ hsieh06doonesbury, + author = {Hannah Hsieh}, + title = {{Doonesbury} Online Poll Hacked in Favor of {MIT}}, + journal = {MIT Tech}, + volume = 126, + number = 27, + month = jun, + day = 9, + year = 2006, +} + +@misc{ hudson93lost, + author = {Michael Hudson}, + title = {\href{http://michael-hudson.com/wp-content/uploads/2010/03/HudsonLostTradition.pdf}{The Lost Tradition of {Biblical} Debt Cancellations}}, + year = 1993, + location = {New York}, +} + +%I + +@misc{ ifes06, + author = {{IFES and UNDP}}, + title = {Getting to the {CORE}: + A Global Survey on the Cost of Registration and Elections}, + month = jun, + day = 30, + year = 2006, +} + +@article{ isbister10whose, + title = {Whose Impact, and Is It All About Impact?}, + author = {Isbister, J.}, + journal = {Ethical Questions and International NGOs}, + pages = {147--156}, + year = {2010}, + publisher = {Springer}, +} + +@article{ israel17cognitive, + author = {Jonas Israel and Stefan Marschall and Martin Schultze}, + title = {\href{https://www.tandfonline.com/doi/full/10.1080/17457289.2016.1268142}{Cognitive dissonance and the effects of Voting Advice Applications on voting behaviour: evidence from the European Elections 2014}}, + journal = {Journal of Elections, Public Opinion and Parties}, + volume = 27, + number = 1, + year = 2017, + pages = {56-74}, +} + +@misc{ ito03emergent, + author = {Joi Ito}, + title = {Emergent Democracy}, + month = apr, + year = 2003, + note = {\url{http://joi.ito.com/joiwiki/EmergentDemocracyPaper}}, +} + +@inproceedings{ iyengar03facilitating, + author = {Shanto Iyengar and Robert C. Luskin and James S. Fishkin}, + title = {\href{https://pcl.stanford.edu/common/docs/research/iyengar/2003/facilitating.pdf}{Facilitating Informed Public Opinion: Evidence from Face-to-face and Online Deliberative Polls}}, + booktitle = {Annual Meeting of the American Political Science Association}, + year = 2003, +} + +@article{ iyengar15fear, + author = {Shanto Iyengar and Sean J. Westwood}, + title = {\href{https://www.jstor.org/stable/24583091}{Fear and Loathing across Party Lines: New Evidence on Group Polarization}}, + journal = {American Journal of Political Science}, + volume = 59, + number = 3, + month = jul, + year = 2015, + pages = {690-707}, +} + +%J + +@techreport{ jackson18post, + author = {Tim Jackson}, + title = {\href{https://www.cusp.ac.uk/themes/aetw/wp12/}{The Post-Growth Challenge -- Secular Stagnation, Inequality and the Limits to Growth}}, + institution = {Centre for the Understanding of Sustainable Prosperity}, + number = {Working Paper No 12}, + month = may, + year = 2018, +} + +@techreport{ jackson18confronting, + author = {Tim Jackson and Peter Victor}, + title = {\href{https://www.cusp.ac.uk/themes/s2/wp11/}{Confronting inequality in a post-growth world -- Basic income, factor substitution and the future of work}}, + institution = {Centre for the Understanding of Sustainable Prosperity}, + number = {Working Paper No 11}, + month = apr, + year = 2018, +} + +@article{ jacob12social, + author = {Jeffrey Jacob and Merlin Brinkerhoff and Emily Jovic and Gerald Wheatley}, + title = {\href{https://citeseerx.ist.psu.edu/viewdoc/download?doi=10.1.1.525.6764&rep=rep1&type=pdf}{The Social and Cultural Capital of Community Currency: An {Ithaca} {HOURS} Case Study Survey}}, + journal = {International Journal of Community Currency Research}, + volume = 8, + number = 42, + month = may, + day = 23, + year = 2012, +} + +@book{ jamieson93dirty, + author = {Kathleen Hall Jamieson}, + title = {Dirty Politics: Deception, Distraction, and Democracy}, + publisher = {Oxford University Press}, + month = oct, + year = 1993, + isbn = {978-0195085532}, +} + +%K + +@article{ kalla16campaign, + author = {Joshua L. Kalla and David E. Broockman}, + title = {\href{https://doi.org/10.1111/ajps.12180}{Campaign Contributions Facilitate Access to Congressional Officials: A Randomized Field Experiment}}, + journal = {American Journal of Political Science}, + volume = 60, + number = 3, + month = jul, + year = 2016, + pages = {545-558}, +} + +@misc{ kalsey04, + author = {Adam Kalsey}, + title = {Why {IP} banning is useless}, + note = {\url{http://kalsey.com/2004/02/why_ip_banning_is_useless}}, + month = feb, + year = 2004, +} + +@inproceedings{ kamara14restructuring, + author = {Seny Kamara}, + title = {\href{http://outsourcedbits.org/2014/03/10/restructuring-the-nsa-metadata-program/}{Restructuring the {NSA} Metadata Program}}, + booktitle = {\bibconf{WAHC}{Workshop on + Applied Homomorphic Cryptography}}, + month = mar, + day = 7, + year = 2014, + url = {http://outsourcedbits.org/2014/03/10/restructuring-the-nsa-metadata-program/}, +} + +@book{ kara17modern, + author = {Siddharth Kara}, + title = {\href{https://cup.columbia.edu/book/modern-slavery/9780231158466}{Modern Slavery: A Global Perspective}}, + publisher = {Columbia University Press}, + month = oct, + year = 2017, + isbn = {9780231158466}, +} + +@article{ kayany98contexts, + author = {Joseph M. Kayany}, + title = {\href{https://doi.org/10.1002/(SICI)1097-4571(1998)49:12%3C1135::AID-ASI8%3E3.0.CO;2-W}{Contexts of uninhibited online behavior: Flaming in social newsgroups on usenet}}, + journal = {Journal of the Association for Information Science and Technol;ogy}, + month = dec, + year = 1998, +} + +@article{ kaye16across, + author = {Barbara K. Kaye and Thomas J. Johnson}, + title = {\href{https://www.tandfonline.com/doi/full/10.1080/08838151.2016.1234477}{Across the Great Divide: How Partisanship and Perceptions of Media Bias Influence Changes in Time Spent with Media}}, + journal = {Journal of Broadcasting \& Electronic Media}, + volume = 60, + number = 4, + month = nov, + year = 2016, + pages = {604-623}, +} + +@article{ keller15partisan, + author = {Eric Keller and Nathan J. Kelly}, + title = {\href{https://doi.org/10.1177/1065912915591218}{Partisan Politics, Financial Deregulation, and the New Gilded Age}}, + journal = {Political Research Quarterly}, + month = jun, + year = 2015, + volume = 68, + number = 3, + pages = {428–442}, +} + +@incollection{ kelly16party, + author = {Norm Kelly}, + title = {\href{http://press-files.anu.edu.au/downloads/press/n2109/pdf/ch03.pdf}{Party registration and political participation: Regulating small and `micro' parties}}, + booktitle = {\href{https://press.anu.edu.au/publications/party-rules}{Party Rules?}}, + chapter = {3}, + month = oct, + year = 2016, + isbn = {9781760460778}, +} + +@book{ keynes65general, + author = {John Maynard Keynes}, + title = {The General Theory of Employment, Interest and Money}, + publisher = {Harcourt, Brace \& World}, + month = may, + year = 1965, + isbn = {978-0156347112}, +} + +@incollection{ kilgour10approval, + author = {D. Marc Kilgour}, + title = {\href{https://doi.org/10.1007/978-3-642-02839-7_6}{Approval Balloting for Multi-winner Elections}}, + booktitle = {Handbook on Approval Voting}, + publisher = {Springer}, + month = apr, + year = 2010, + pages = {105-124}, +} + +@article{kim17factors, + title={\href{https://bmcmedethics.biomedcentral.com/articles/10.1186/s12910-017-0185-x}{Factors affecting willingness to share electronic health data among California consumers}}, + author={Kim, Katherine K and Sankar, Pamela and Wilson, Machelle D and Haynes, Sarah C}, + journal={BMC medical ethics}, + volume={18}, + number={1}, + pages={25}, + year={2017}, + publisher={BioMed Central} +} + +@article{ knight05, + author = {Will Knight}, + title = {{Wikipedia} tightens editorial rules after complaint}, + url = {http://www.newscientist.com/article.ns?id=dn8425}, + journal = {New Scientist}, + month = dec, + year = 2005, +} + +@article{ koistinen14good, + author = {Pertti Koistinen and Johanna Perki\"o}, + title = {\href{https://search.proquest.com/docview/1703954350}{Good and Bad Times of Social Innovations: The Case of Universal Basic Income in Finland}}, + journal = {Basic Income Studies}, + volume = 9, + number = {1--2}, + year = 2014, +} + +@article{korsmo13high, + title={\href{https://lawreview.richmond.edu/files/2014/03/Korsmo-482-AC.pdf}{High-Frequency Trading: A Regulatory Strategy}}, + author={Korsmo, Charles R}, + journal={U. Rich. L. Rev.}, + volume={48}, + pages={523}, + year={2013}, + publisher={HeinOnline} +} + +@article{ koprowski03, + author = {Gene J. Koprowski}, + title = {Spam Filtering and the Plague of False Positives}, + journal = {TechNewsWorld}, + month = sep, + day = 30, + year = 2003, + url = {http://www.technewsworld.com/story/31703.html}, +} + +@article{ kotzee12expertise, + author = {Ben Kotzee}, + title = {\href{https://www.tandfonline.com/doi/abs/10.1080/13639080.2012.738291}{Expertise, fluency and social realism about professional knowledge}}, + journal = {Journal of Education and Work}, + volume = 27, + number = 2, + month = nov, + year = 2012, + pages = {161-178}, +} + +@article{ kraut12aristotle, + author = {Kraut, Richard}, + title = {Aristotle's Ethics}, + journal = {The Stanford Encyclopedia of Philosophy}, + month = dec, + year = 2012, + url = {http://plato.stanford.edu/archives/win2012/entries/aristotle-ethics/}, +} + +@article{ kreimer01technologies, + author = {Seth F. Kreimer}, + title = {Technologies of Protest: Insurgent Social Movements and + the {First Amendment} in the Era of the {Internet}}, + journal = {University of Pennsylvania Law Review}, + month = {October}, + year = {2001} +} + +%L + +@article{ lalley18quadratic, + author = {Steven Lalley and E. Glen Weyl}, + title = {\href{https://dx.doi.org/10.2139/ssrn.2003531}{Quadratic Voting: How Mechanism Design Can Radicalize Democracy}}, + journal = {American Economic Association Papers and Proceedings}, + year = 2018, + volume = 1, + number = 1, +} + +@misc{ landemore18democracy, + author = {H\'{e}l\`{e}ne Landemore and Rob Reich and Karine Serfaty}, + title = {Democracy and the Online Public Sphere in an Era of Digital Platforms: The Case of Facebook}, + month = jun, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ landemore18open, + author = {H\'{e}l\`{e}ne Landemore}, + title = {Open Democracy and Digital Technologies}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ lanphier95model, + author = {Rob Lanphier}, + title = {\href{https://robla.net/1996/steward/}{A Model for Electronic Democracy?}}, + year = 1995, +} + +@misc{ larkina17nimses, + author = {Anna Larkina}, + title = {\href{https://www.kaspersky.com/blog/nimses-insecurity/17114/}{Why {Nimses} isn’t safe (so far)}}, + month = jun, + day = 16, + year = 2017, + url = {https://www.kaspersky.com/blog/nimses-insecurity/17114/}, +} + +@article{ lee96, + author = {Gia B. Lee}, + title = {Addressing Anonymous Messages in Cyberspace}, + journal = {Journal of Computer-Mediated Communication: + Emerging Law on the Electronic Frontier}, + volume = 2, + number = 1, + month = jun, + year = 1996, + url = {http://jcmc.indiana.edu/vol2/issue1/anon.html}, +} + +@misc{lee18facebook, + title = {\href{https://arstechnica.com/tech-policy/2018/03/facebooks-cambridge-analytica-scandal-explained/}{Facebook’s Cambridge Analytica Scandal, Explained [Updated]}}, + author = {Timothy B. Lee}, + month = mar, + year = {2018 (accessed on Jul 27, 2018)}, +} + +% obsoleted by lee18democratic +@misc{ lee18societal, + author = {David Lee and Margaret Levi and John Seely Brown}, + title = {Societal Collaboration in a Whitewater Sociotechnical World}, + month = jun, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@misc{ lee18democratic, + author = {David Lee and Margaret Levi and John Seely Brown}, + title = {Democratic Societal Collaboration in a Whitewater World}, + month = dec, + year = 2018, + note = {Digital Technology and Democratic Theory Workshop}, +} + +@article{ leibovich15politics, + author = {Mark Leibovich}, + title = {\href{https://www.nytimes.com/2015/09/06/magazine/the-politics-of-distraction.html}{The Politics of Distraction}}, + journal = {The New York Times Magazine}, + month = sep, + year = 2015, +} + +@article{ lenneberg10respect, + title = {To Respect or Not to Respect}, + author = {Lenneberg, Conny}, + journal = {Ethical Questions and International NGOs}, + pages = {193--205}, + year = {2010}, + publisher = {Springer}, +} + +@article{ liberatore03democratising, + authhor = {Angela Liberatore and Silvio Funtowicz}, + title = {\href{https://academic.oup.com/spp/article/30/3/146/1628309}{`Democratising' expertise, `expertising' democracy: what does this mean, and why bother?}}, + journal = {Science and Public Policy}, + volume = 30, + number = 3, + month = jun, + year = 2003, + pages = {146-150}, +} + +@misc{ libertyalliance, + author = {{Liberty Alliance Project}}, + note = {\url{http://www.projectliberty.org/}}, + url = {http://www.projectliberty.org/}, +} + +@article{ lim12clicks, + author = {Merlyna Lim}, + title = {Clicks, Cabs, and Coffee Houses: Social Media and + Oppositional Movements in Egypt, 2004 -- 2011}, + journal = {Journal of Communication}, + volume = 62, + pages = {231-248}, +} + +@article{ lipton18blockchains, + author = {Alexander Lipton}, + title = {Blockchains and distributed ledgers in retrospective and perspective}, + journal = {The Journal of Risk Finance}, + volume = 19, + number = 1, + year = 2018, + pages = {4-25}, + doi = {10.1108/JRF-02-2017-0035}, +} + +@article{ lipton18banking, + author = {Alexander Lipton}, + title = {Banking on blockchain -- opportunities and challenges}, + month = mar, + day = 21, + year = 2018, +} + +@inproceedings{ litvinenko12social, + author = {Anna Litvinenko}, + title = {Social Media and Perspectives of Liquid Democracy: The Example + of Political Communication in the {P}irate party in {G}ermany}, + booktitle = {12th European Conference on e-Government}, + location = {Barcelona, Spain}, + month = jun, + year = 2012, + pages = {403-408}, +} + +@article{ liu16sockpuppet, + author = {Dong Liu and Quanyuan Wu and Weihong Han and Bin Zhou}, + title = {\href{https://link.springer.com/article/10.1007/s11704-015-4287-7}{Sockpuppet gang detection on social media sites}}, + journal = {Frontiers of Computer Science}, + volume = 10, + number = 1, + month = feb, + year = 2016, + pages = {124–135}, +} + +@book{ locke1689second, + author = {John Locke}, + title = {Second Treatise of Government}, + month = dec, + year = 1689, +} + +@article{ louwerse14design, + author = {Tom Louwerse and Martin Rosema}, + title = {\href{https://link.springer.com/article/10.1057/ap.2013.30}{The design effects of voting advice applications: Comparing methods of calculating matches}}, + journal = {Acta Politica}, + volume = 49, + number = 3, + month = jul, + year = 2014, + pages = {286–312}, +} + +@misc{ lynch05, + author = {M. Lynch}, + title = {Lives on Hold: the Human Cost of Statelessness}, + publisher = {Refugees International}, + month = feb, + year = 2005, +} + +@article{ nakashima13new, + author = {Ellen Nakashima and Barton Gellman and Greg Miller}, + title = {New documents reveal parameters of {NSA}'s secret surveillance programs}, + year = 2013, + month = jun, + day = 21, + note = {Washington Post}, +} + +%O + +@misc{ osullivan18worry, + author = {Domhnall O'Sullivan}, + title = {\href{https://www.swissinfo.ch/eng/business/democratic-duty_should-we-worry-about-low-voter-turnouts-in-switzerland-/44248880}{Should we worry about low voter turnouts in Switzerland?}}, + howpublished = {\url{swissinfo.ch}}, + month = aug, + day = 10, + year = 2018, +} + +@article{ oakes12hacking, + author = {Dan Oakes}, + title = {Hacking case's body of evidence}, + journal = {The Age}, + month = apr, + day = 12, + year = 2012, +} + +@misc{ obrien12google, + author = {Danny O'Brien}, + title = {{Google+}, real names and real problems}, + publisher = {Committee to Protect Journalists}, + month = jan, + year = 2012, + note = {\url{http://www.cpj.org/internet/2012/01/google-real-names-and-real-problems.php}}, +} + +@misc{ocean18ocean, + title = {\href{https://oceanprotocol.com/tech-whitepaper.pdf}{Ocean Protocol: +A Decentralized Substrate for AI Data \& Services}}, + author = {Ocean Protocol Foundation and BigchainDB and DEX Pte Ltd}, + year = {2018 (accessed October 27, 2018)}, +} + +@misc{ oecd13exploring, + author = {OECD}, + title = {Exploring the Economics of Personal Data}, + month = apr, + year = 2013, + note = {OECD Digital Economy Papers No. 220}, +} + +@article{ okleshen98usenet, + author = {Cara Okleshen and Sanford Grossbart}, + title = {\href{http://acrwebsite.org/volumes/8170/volumes/v25/NA-25}{Usenet Groups, Virtual Community and Consumer Behaviors}}, + journal = {Advances in Consumer Research}, + volume = 25, + pages = {Pages 276-282}, +} + +@misc{ openid, + author = {OpenID}, + note = {\url{http://openid.net/}}, + url = {http://openid.net/}, +} + +@book{ ostrom90governing, + author = {Elinor Ostrom}, + title = {Governing the Commons: The Evolution of Institutions for Collective Action}, + publisher = {Cambridge University Press}, + month = nov, + year = 1990, +} + +%P + +@article{ packer18report, + author = {George Packer}, + title = {\href{https://www.newyorker.com/news/daily-comment/a-new-report-offers-insights-into-tribalism-in-the-age-of-trump}{A New Report Offers Insights Into Tribalism in the Age of Trump}}, + journal = {The New Yorker}, + month = oct, + day = 12, + year = 2018, +} + +@book{ parijs17basic, + author = {Philippe Van Parijs}, + title = {Basic Income: A Radical Proposal for a Free Society and a Sane Economy}, + publisher = {Harvard University Press}, + month = mar, + year = 2017, +} + +@article{pell14stingray, + title={Your Secret StingRay’s No Secret Anymore: The Vanishing Government Monopoly over Cell Phone Surveillance and its Impact on National Security and Consumer Privacy}, + author={Pell, Stephanie K and Soghoian, Christopher}, + journal = {Harvard Journal of Law and Technology}, + month = dec, + year = 2014, +} + +@article{ pennycook18who, + author = {Gordon Pennycook and David G. Rand}, + title = {\href{https://papers.ssrn.com/sol3/papers.cfm?abstract_id=3023545}{Who falls for fake news? The roles of bullshit receptivity, overclaiming, familiarity, and analytic thinking}}, + month = jun, + year = 2018, +} + +@book{ piketty17capital, + author = {Thomas Piketty}, + title = {Capital in the Twenty-First Century}, + publisher = {Belknap Press}, + month = aug, + year = 2017, + isbn = {978-0674979857}, +} + +@article{ polonski17artificial, + author = {Vyacheslav Polonski}, + title = {\href{http://theconversation.com/how-artificial-intelligence-conquered-democracy-77675}{How Artificial Intelligence Conquered Democracy}}, + journal = {The Conversation}, + month = aug, + day = 8, + year = 2017, +} + +@article{ posner15voting, + author = {Eric A. Posner and E. Glen Weyl}, + title = {Voting Squared: Quadratic Voting in Democratic Politics}, + year = 2015, + volume = 68, + number = 2, + journal = {Vanderbilt Law Review}, +} + +@book{ powell12influence, + author = {Lynda W. Powell}, + title = {The Influence of Campaign Contributions in State Legislatures: The Effects of Institutions and Politics}, + publisher = {University of Michigan Press}, + month = mar, + year = 2012, +} + +@book{ standing16precariat, + author = {Guy Standing}, + title = {The Precariat: The New Dangerous Class}, + publisher = {Bloomsbury Academic}, + month = feb, + year = 2011, + isbn = {9781849664561}, +} + +@book{ standing17basic, + author = {Guy Standing}, + title = {\href{https://yalebooks.yale.edu/book/9780300230840/basic-income}{Basic Income: A Guide for the Open-Minded}}, + publisher = {Yale University Press}, + month = aug, + year = 2017, + isbn = {978-0300230840}, +} + +@article{ prior13media, + author = {Markus Prior}, + title = {Media and Political Polarization}, + journal = {\href{https://doi.org/10.1146/annurev-polisci-100711-135242}{Annual Review of Political Science}}, + volume = 16, + pages = {101-127}, + month = may, + year = 2013, +} + +@misc{ prism2013, + title = {\href{https://www.zdnet.com/article/fbi-nsa-said-to-be-secretly-mining-data-from-nine-u-s-tech-giants/}{FBI, NSA said to be secretly mining data from nine U.S. tech giants}}, + author = {Rachel King}, + month = jun, + year = 2013, +} + +@book{ prunier95rwanda, + title = {The Rwanda crisis: History of a genocide}, + author = {Prunier, G\'{e}rard}, + year = {1995}, + publisher = {Columbia University Press}, +} + + +%Q + +@article{ quinlan15facilitating, + author = {Stephen Quinlan}, + title = {\href{https://www.tandfonline.com/doi/full/10.1080/07907184.2015.1099041}{Facilitating the Electorate: A Multilevel Analysis of Election Timing, Registration Procedures, and Turnout}}, + journal = {Irish Political Studies}, + month = nov, + year = 2015, + volume = 30, + number = 4, + pages = {482-509}, +} + + +%R + +@misc{radsch2019netflix, + title = {\href{https://www.aljazeera.com/indepth/opinion/netflix-enabling-saudi-crackdown-press-freedom-190107051448233.html}{Why is Netflix enabling the Saudi crackdown on press freedom?}}, + author = {Courtney Radsch}, + month = jan, + year = {2019 (accessed on Jan 10, 2019)}, +} + +@inproceedings{ ramachandran06, + author = {Anirudh Ramachandran and David Dagon and Nick Feamster}, + title = {Can {DNS}-Based Blacklists Keep Up with Bots?}, + booktitle = {3rd Conference on Email and Anti-Spam}, + month = jul, + day = 27, + year = 2006, +} + +@book{ rapoport05threes, + author = {Ronald B. Rapoport and Walter J. Stone}, + title = {Three's a Crowd: + The Dynamic of Third Parties, Ross Perot, + and Republican Resurgence}, + month = nov, + publisher = {University of Michigan Press}, + year = 2005, + isbn = {978-0472114535}, +} + +@article{ rasor14conversation, + author = {Dina Rasor}, + title = {Conversation With {James Risen}: Can Journalists Protect + Their National Security Sources?}, + journal = {Truthout}, + month = apr, + day = 23, + year = 2014, + note = {\url{http://www.truth-out.org/opinion/item/23207-conversation-with-james-risen-can-journalists-protect-their-national-security-sources}}, +} + +@article{ ratcliffe19glitch, + author = {Rebecca Ratcliffe}, + title = {\href{https://www.theguardian.com/technology/2019/oct/16/glitch-india-biometric-welfare-system-starvation?CMP=Share_iOSApp_Other}{How a glitch in India's biometric welfare system can be lethal}}, + journal = {The Guardian}, + month = oct, + year = 2019, + day = 16, +} + +@article{ read18how, + author = {Max Read}, + title = {\href{http://nymag.com/intelligencer/2018/12/how-much-of-the-internet-is-fake.html}{How Much of the Internet Is Fake? Turns Out, a Lot of It, Actually.}}, + journal = {New York Magazine}, + month = dec, + year = 2018, +} + +@book{ reinhart11this, + author = {Carmen M. Reinhart and Kenneth S. Rogoff}, + title = {This Time Is Different: Eight Centuries of Financial Folly}, + publisher = {Princeton University Press}, + month = aug, + year = 2011, + isbn = {978-0691152646}, +} + +@book{ reich18just, + author = {Rob Reich}, + title = {\href{https://press.princeton.edu/titles/14186.html}{Just Giving: Why Philanthropy Is Failing Democracy and How It Can Do Better}}, + publisher = {Princeton University Press}, + month = nov, + year = 2018, + isbn = {978-0691183497}, +} + +@inproceedings{ reinisch07swiss, + author = {Charlotte Reinisch}, + title = {\href{https://ecpr.eu/Events/PaperDetails.aspx?PaperID=12373&EventID=52}{Swiss {\em Landsgemeinden}: a deliberative democratic evaluation of two outdoor parliaments}}, + booktitle = {ECPR Joint Sessions}, + month = may, + year = 2007, + location = {Helsinki, Finland}, +} + +@inproceedings{ ribeiro18media, + author = {Filipe N. Ribeiro and Lucas Henriqueo and Fabricio Benevenutoo and Abhijnan Chakraborty and Juhi Kulshrestha and Mahmoudreza Babaei and Krishna P. Gummadi}, + title = {Media Bias Monitor: Quantifying Biases of Social Media News Outlets at Large-Scale}, + booktitle = {\bibconf[12th]{ICWSM}{International AAAI Conference on Web and Social Media}}, + location = {Stanford, California, USA}, + month = jun, + year = 2018, +} + +@misc{ ribeiro19auditing, + author = {Manoel Horta Ribeiro and Raphael Ottoni and Robert West and + Virgílio A. F. Almeida and Wagner Meira}, + title = {\href{https://arxiv.org/abs/1908.08313}{Auditing Radicalization Pathways on YouTube}}, + month = aug, + year = 2019, +} + +@book{ riddick86rules, + author = {Floyd Millard Riddick and Mariam H. Butcher}, + title = {Riddick's Rules of Procedure: A Modern Guide to Faster and More Efficient Meetings}, + publisher = {Scribner}, + month = jan, + year = 1986, + isbn = {978-0684184272}, +} + +@article{ robinson50bias, + author = {W. S. Robinson}, + title = {\href{https://www.jstor.org/stable/2086402}{Bias, Probability, and Trial by Jury}}, + journal = {American Sociological Review}, + volume = 15, + number = 1, + month = feb, + year = 1950, + pages = {73-78}, +} + +@inproceedings{ rodriguez07smartocracy, + author = {Marko A. Rodriguez and Daniel J. Steinbock and + Jennifer H. Watkins and Carlos Gershenson and Johan Bollen and + Victor Grey and Brad deGraf}, + title = {Smartocracy: Social Networks for Collective Decision Making}, + booktitle = {40th Hawaii International Conference on System Sciences}, + month = jan, + year = 2007, +} + +@article{ rogers18what, + author = {Kaleigh Rogers}, + title = {\href{https://motherboard.vice.com/en_us/article/d35kbj/americans-who-dont-have-internet}{What It's Like to Live in {America} Without Broadband {Internet}}}, + journal = {\href{https://motherboard.vice.com/en_us}{Motherboard}}, + month = apr, + day = 16, + year = 2018, + url = {https://motherboard.vice.com/en_us/article/d35kbj/americans-who-dont-have-internet}, +} + +@book{ rothenberg99avoiding, + author = {Jeff Rothenberg}, + title = {Avoiding Technological Quicksand: + Finding a Viable Technical Foundation for + Digital Preservation}, + publisher = {Council on Library and Information Resources}, + year = 1999, + month = jan, + location = {Washington, DC}, + isbn = {1-887334-63-7}, +} + +@book{ rousseau1762social, + author = {Jean-Jacques Rousseau}, + title = {The Social Contract}, + year = 1762, +} + +@book{ runciman13confidence, + author = {David Runciman}, + title = {The Confidence Trap: A History of Democracy in Crisis from World War I to the Present}, + publisher = {Princeton University Press}, + year = 2013, + isbn = {9780691148687}, +} + +%S + +@inproceedings{ saez-trumper13social, + author = {Diego Saez-Trumper and Carlos Castillo and Mounia Lalmas}, + title = {\href{https://dl.acm.org/citation.cfm?doid=2505515.2505623}{Social Media News Communities: Gatekeeping, Coverage, and Statement Bias}}, + booktitle = {\bibconf[22nd]{CIKM}{ACM International Conference on Information \& Knowledge Management}}, + month = oct, + year = 2013, + pages = {1679-1684}, +} + +@article{ samuel18rigging, + author = {Ian Samuel}, + title = {\href{https://www.theguardian.com/commentisfree/2018/nov/04/america-minority-rule-voter-suppression-gerrymandering-supreme-court}{Rigging the vote: how the American right is on the way to permanent minority rule}}, + journal = {The Guardian}, + month = nov, + day = 4, + year = 2018, +} + +@article{ savage13court, + author = {Charlie Savage}, + title = {Court Rejects Appeal Bid by Writer in Leak Case}, + journal = {New York Times}, + month = oct, + day = 15, + year = 2013, +} + +@misc{ sayke03liquid, + author = {Sayke}, + title = {Liquid Democracy}, + year = 2003, + note = {\url{https://web.archive.org/web/20040726071737/twistedmatrix.com/wiki/python/LiquidDemocracy}}, +} + +@misc{ sayke03voting, + author = {Sayke}, + title = {Liquid Democracy Voting System}, + year = 2003, + note = {\url{https://web.archive.org/web/20040518131300/twistedmatrix.com/wiki/python/LiquidDemocracyVotingSystem}}, +} + +@article{ schaub12maximizing, + author = {Hans-Peter Schaub}, + title = {\href{https://onlinelibrary.wiley.com/doi/abs/10.1111/j.1662-6370.2012.02075.x}{Maximising Direct Democracy -- by Popular Assemblies or by Ballot Votes?}}, + journal = {Swiss Political Science Review}, + volume = 18, + number = 3, + pages = {305–331}, + month = aug, + year = 2012, +} + +@book{ schrag98paradise, + author = {Peter Schrag}, + title = {Paradise Lost: California's Experience, America's Future}, + publisher = {The New Press}, + month = apr, + year = 1998, + isbn = {978-1565843578}, +} + +@book{ schreiber75sybil, + author = {Flora Rheta Schreiber}, + title = {Sybil: the true story of a woman possessed by + sixteen separate personalities}, + publisher = {Warner Books}, + year = 1973, + url = {http://www.amazon.com/exec/obidos/tg/detail/-/0446359408/}, +} + +@article{ schwab17these, + author = {Kristin Schwab}, + title = {\href{https://www.theguardian.com/world/2017/apr/19/americans-move-canada-trump-bush-immigration}{These Americans moved to Canada for political reasons. They don't regret it}}, + journal = {The Guardian}, + month = apr, + year = 2017, +} + +@misc{ schwartz18fiduciaries, + title = {\href{https://www.eff.org/deeplinks/2018/10/information-fiduciaries-must-protect-your-data-privacy?fbclid=IwAR2Hd6n4o0hhG0GspGeTRtKx5ghHu0nz6EPBBsjJVLHFmvHS844pKn1C0_o}{“Information Fiduciaries” Must Protect Your Data Privacy}}, + author = {Adam Schwartz and Cindy Cohn}, + year = {2018 (accessed October 27, 2018)}, +} + +@misc{ schultze11diginotar, + title = {DigiNotar Hack Highlights the Critical Failures of our SSL Web Security Model}, + author = {Steve Schultze}, + year = 2011, + month = sep, + day = 6, + howpublished = {Published on \url{https://freedom-to-tinker.com/}} +} + +@misc{ scott17five, + author = {Grace Lisa Scott}, + title = {\href{https://www.inverse.com/article/36745-5-lifelike-robots-that-take-you-straight-into-the-uncanny-valley}{5 Lifelike Robots That Take You Straight Into the Uncanny Valley}}, + howpublished = {Inverse}, + month = sep, + year = 2017, +} + +@article{ selbst17meaningful, + author = {Andrew D. Selbst and Julia Powles}, + title = {\href{https://doi.org/10.1093/idpl/ipx022}{Meaningful information and the right to explanation}}, + journal = {International Data Privacy Law}, + volume = 7, + number = 4, + month = nov, + year = 2017, + pages = {233-242}, +} + +@article{ sengupta11rushdie, + author = {Somini Sengupta}, + title = {Rushdie Runs Afoul of Web's Real-Name Police}, + journal = {New York Times}, + month = nov, + day = 14, + year = 2011, +} + +@inproceedings{ serdult15fifteen, + author = {Uwe Serd\"{u}lt and Micha Germann and Fernando Mendez and + Alicia Portenier and Christoph Wellig}, + title = {\href{https://ieeexplore.ieee.org/document/7114482}{Fifteen Years of Internet Voting in Switzerland: History, Governance and Use}}, + booktitle = {\bibconf[2nd]{ICEDEG}{International Conference on + eDemocracy \& eGovernment}}, + month = apr, + year = 2015, + location = {Quito, Ecuador}, +} + +@article{ shao18spread, + author = {Chengcheng Shao and Giovanni Luca Ciampaglia and Onur Varol + and Kai-Cheng Yang and Alessandro Flammini + and Filippo Menczer}, + title = {\href{https://www.nature.com/articles/s41467-018-06930-7}{The spread of low-credibility content by social bots}}, + journal = {Nature Communications}, + volume = 9, + month = nov, + year = 2018, +} + +@article{ shaw04, + author = {Russell Shaw}, + title = {\href{http://www.imediaconnection.com/content/3649.asp}{Avoid the Spam Filter}}, + journal = {iMedia Connection}, + month = jun, + day = 16, + year = 2004, + url = {http://www.imediaconnection.com/content/3649.asp}, +} + +@book{ shlapentokh11feudal, + author = {Vladimir Shlapentokh and Joshua Woods}, + title = {Feudal America: Elements of the Middle Ages + in Contemporary Society}, + publisher = {Penn State University Press}, + month = jan, + year = 2011, + isbn = {0271037814}, +} + +@article{ shubik70homo, + author = {Martin Shubik}, + title = {\href{https://link.springer.com/content/pdf/10.1007/BF01718192.pdf}{On Homo Politicus and the Instant Referendum}}, + journal = {Public Choice}, + year = 1970, + volume = 9, + pages = {79-84}, +} + +@article{ simon06impact, + author = {Simon Luechinger and Myra Rosinger and Alois Stutzer}, + title = {The Impact of Postal Voting on Participation: + Evidence for {S}witzerland}, + journal = {Swiss Political Science Review}, + volume = 13, + number = 2, + year = 2007, + pages = {167-202}, +} + +@book{ skocpol13tea, + author = {Theda Skocpol and Vanessa Williamson}, + title = {The Tea Party and the Remaking of Republican Conservatism}, + year = 2013, + publisher = {Oxford University Press}, + isbn = {978-0190633660}, +} + +@book{ skyrms14evolution, + author = {Brian Skyrms}, + title = {Evolution of the Social Contract}, + edition = {2nd}, + month = oct, + year = 2014, + isbn = {978-1107434288}, +} + +@article{ smith14political, + author = {Warwick Smith}, + title = {\href{https://www.theguardian.com/commentisfree/2014/sep/11/political-donations-corrupt-democracy-in-ways-you-might-not-realise}{Political donations corrupt democracy in ways you might not realise}}, + month = sep, + year = 2014, +} + +@inproceedings{ solorio14sockpuppet, + author = {Thamar Solorio and Ragib Hasan and Mainul Mizan}, + title = {\href{http://www.lrec-conf.org/proceedings/lrec2014/pdf/1007_Paper.pdf}{Sockpuppet Detection in Wikipedia: A Corpus of Real-World Deceptive Writing for Linking Identities}}, + booktitle = {\bibconf[9th]{LREC}{International Conference on Language Resources and Evaluation}}, + month = may, + year = 2014, + location = {Reykjavik, Iceland}, +} + +@book{ solove11nothing, + author = {Daniel J. Solove}, + title = {Nothing to Hide: The False Tradeoff Between + Privacy and Security}, + year = 2011, + publisher = {Yale University Press}, + isbn = {978-0-300-17231-7}, +} + +@misc{ soltani09flash, + author = {Ashkan Soltani and Shannon Canty and Quentin Mayo + and Lauren Thomas and Chris Jay Hoofnagle}, + title = {Flash Cookies and Privacy}, + booktitle = {SSRN preprint}, + month = aug, + year = 2009, +} + +@misc{ spamnation, + author = {Spamnation}, + title = {Spam Statistics}, + note = {\url{http://spamnation.info/stats/}}, + url = {http://spamnation.info/stats/}, +} + +@misc{ speck13money, + author = {Bruno Wilhelm Speck and Paloma Baena Olabe}, + title = {Money in Politics: Sound Political Competition + and Trust in Government}, + month = nov, + year = 2013, + note = {OECD Background Paper}, +} + +@article{ srinivasan18poverty, + author = {Janaki Srinivasan and Savita Bailur and Emrys Schoemaker and + Sarita Seshagiri}, + title = {\href{https://ijoc.org/index.php/ijoc/article/view/7046}{The Poverty of Privacy: Understanding Privacy Trade-Offs From Identity Infrastructure Users in India}}, + journal = {International Journal of Communication}, + volume = 12, + month = mar, + year = 2018, + pages = {1228–1247}, +} + +@article{ stallings95pgp, + author = {William Stallings}, + title = {The {PGP Web of Trust}}, + journal = {BYTE Magazine}, + volume = 20, + number = 2, + month = feb, + year = 1995, + pages = {161--164}, +} + +@article{ stein03queers, + author = {Edward Stein}, + title = {Queers Anonymous: Lesbians, Gay Men, Free Speech, + and Cyberspace}, + journal = {Harvard Civil Rights-Civil Liberties Law Review}, + year = 2003, + url = {http://www.law.harvard.edu/students/orgs/crcl/vol38_1/stein.php}, +} + +@article{ stewart18republicans, + author = {Emily Stewart}, + title = {\href{https://www.vox.com/policy-and-politics/2018/10/17/17990064/republican-tax-cuts-bill-2018-midterm-elections}{Republicans were supposed to run on their tax cuts. Instead, they’re running away from them.}}, + journal = {Vox}, + month = oct, + day = 17, + year = 2018, +} + +@article{ stone07hand, + author = {Brad Stone and Matt Richtel}, + title = {\href{http://www.nytimes.com/2007/07/16/technology/16blog.html}{The Hand That Controls the Sock Puppet Could Get Slapped}}, + journal = {New York Times}, + month = jul, + day = 16, + year = 2007, + url = {http://www.nytimes.com/2007/07/16/technology/16blog.html}, +} + +@article{ stone08, + author = {Brad Stone}, + title = {Breaking {Google} {Captchas} for Some Extra Cash}, + journal = {New York Times}, + month = mar, + day = 13, + year = 2008, + url = {http://bits.blogs.nytimes.com/2008/03/13/breaking-google-captchas-for-3-a-day/}, +} + +@misc{ studer98wir, + author = {Tobias Studer}, + title = {\href{http://base.socioeco.org/docs/wir_and_the_swiss_national_economy.pdf}{{WIR} and the {Swiss} National Economy}}, + year = 1998, + translator = {Philip H. Beard}, + url = {http://base.socioeco.org/docs/wir_and_the_swiss_national_economy.pdf}, +} + +@article{ swierczek11fiveyears, + title = {5 years of {Liquid Democracy} in {Germany}}, + author = {Bj\"orn Swierczek}, + journal = {The Liquid Democracy Journal}, + month = mar, + year = 2014, + volume = 1, +} + +%T + +@article{ taub17why, + author = {Amanda Taub}, + title = {\href{https://www.nytimes.com/2017/04/12/upshot/why-americans-vote-against-their-interest-partisanship.html}{Why Americans Vote `Against Their Interest': Partisanship}}, + journal = {New York Times}, + month = apr, + day = 12, + year = 2017, +} + +@article{ teich99anonymous, + author = {Al Teich and Mark S. Frankel and Rob Kling + and {Ya-ching} Lee}, + title = {Anonymous Communication Policies for the {Internet}: + Results and Recommendations of the {AAAS} Conference}, + journal = {Information Society}, + month = may, + year = 1999, + url = {http://www.indiana.edu/~tisj/readers/full-text/15-2%20teich.pdf#search=%22Anonymous%20Communication%20Policies%22}, +} + +@misc{ templeton01remember, + author = {Brad Templeton}, + title = {\href{https://web.archive.org/web/20050824032345/http://www.oreillynet.com/pub/a/network/2001/12/21/usenet.html?page=1}{I Remember {USENET}}}, + howpublished = {O'Reilly Network}, + month = dec, + day = 21, + year = 2001, +} + +@misc{ templeton01origin, + author = {Brad Templeton}, + title = {\href{https://web.archive.org/web/20050825120621/http://www.templetons.com/brad/spamterm.html}{Origin of the term ``spam'' to mean net abuse}}, + howpublished = {O'Reilly Network}, + month = dec, + year = 2001, +} + +@misc{ templeton03reflections, + author = {Brad Templeton}, + title = {\href{https://web.archive.org/web/20050826005609/http://www.templetons.com/brad/spam/spam25.html}{Reflections on the 25th Anniversary of Spam}}, + howpublished = {O'Reilly Network}, + month = may, + year = 2003, +} + +@article{ thompson06, + author = {Bill Thompson}, + title = {Not as wiki as it used to be}, + journal = {BBC News}, + month = aug, + day = 25, + year = 2006, + url = {http://news.bbc.co.uk/2/hi/technology/5286458.stm}, +} + +@article{ tisdall18american, + author = {Simon Tisdall}, + title = {\href{https://www.theguardian.com/commentisfree/2018/aug/07/american-democracy-crisis-trump-supreme-court}{American democracy is in crisis, and not just because of Trump}}, + month = aug, + day = 7, + year = 2018, +} + +@article{ tracy13tally, + author = {Ryan Tracy}, + title = {\href{http://www.wsj.com/articles/SB10001424052702304579404579232343313671258}{Tally of U.S. Banks Sinks to Record Low}}, + journal = {The Wall Street Journal}, + month = dec, + year = 2013, +} + +@book{ tullock67toward, + author = {Gordon Tullock}, + title = {Toward a Mathematics of Politics}, + publisher = {The University of Michigan Press}, + month = dec, + year = 1967, + isbn = {978-0472061877}, +} + +@article{ turner05picturing, + author = {Tammara Combs Turner and Marc A. Smith and Danyel Fisher + and Howard T. Welser}, + title = {\href{https://doi.org/10.1111/j.1083-6101.2005.tb00270.x}{Picturing Usenet: Mapping Computer-Mediated Collective Action}}, + journal = {Journal of Computer-Mediated Communication}, + volume = 10, + number = 4, + month = jul, + year = 2005, +} + +%M + +@inproceedings{ macdorman06subjective, + author = {Karl F. MacDorman}, + title = {Subjective Ratings of Robot Video Clips for Human Likeness, Familiarity, and Eeriness: An Exploration of the Uncanny Valley}, + booktitle = {ICCS/CogSci-2006 Symposium: Toward Social Mechanisms of Android Science}, + month = jul, + year = 2006, + pages = {26–29}, + location = {Vancouver, Canada}, +} + +@article{ madestam13political, + author = {Andreas Madestam and Daniel Shoag and Stan Veuger + and David Yanagizawa-Drott}, + title = {\href{https://academic.oup.com/qje/article/128/4/1633/1849540}{Do Political Protests Matter? Evidence from the Tea Party Movement}}, + journal = {The Quarterly Journal of Economics}, + volume = 128, + number = 4, + month = nov, + year = 2013, + pages = {1633–1685}, +} + +@article{ mala18who, + author = {Elisa Mala}, + title = {\href{https://www.nytimes.com/2018/05/18/style/cryptokitty-auction.html}{Who Spends \$140,000 on a CryptoKitty?}}, + journal = {The New York Times}, + month = may, + day = 18, + year = 2018, +} + +@book{ manza08locked, + author = {Jeff Manza and Christopher Uggen}, + title = {Locked Out: Felon Disenfranchisement and American Democracy}, + publisher = {Oxford University Press}, + month = apr, + year = 2008, + isbn = {978-0195341942}, +} + +@incollection{ mastini18ideas, + title = {Ideas for Sufficiency}, + booktitle = {\href{http://www.foeeurope.org/sites/default/files/resource_use/2018/foee_sufficiency_booklet.pdf}{Sufficiency: Moving Beyond the Gospel of Eco-Efficiency}}, + chapter = {8}, + month = mar, + year = 2018, +} + +@misc{ may19inaccessibility, + author = {Matt May}, + title = {\href{https://www.w3.org/TR/turingtest/}{Inaccessibility of {CAPTCHA:} Alternatives to Visual Turing Tests on the Web}}, + note = {W3C Working Draft 14}, + month = feb, + year = 2019, +} + +@incollection{ mbiti16mobile, + author = {Isaac Mbiti and David N. Weil}, + title = {\href{https://www.nber.org/chapters/c13367}{Mobile Banking: The Impact of M-Pesa in Kenya}}, + booktitle = {African Successes, Volume III: Modernization and Development}, + editor = {Sebastian Edwards and Simon Johnson and David N. Weil}, + publisher = {University of Chicago Press}, + month = sep, + year = 2016, + pages = {247-293}, + isbn = {978-0-226-31572-0}, +} + +@article{ meek69nouvelle, + author = {B. L. Meek}, + title = {Une nouvelle approche du scrutin transf\'{e}rable}, + journal = {Math\'{e}matiques et Sciences humaines}, + volume = 25, + year = 1969, + pages = {13-23}, +} + +@article{ mendel20weve, + author = {Gideon Mendel}, + title = {\href{https://www.theguardian.com/australia-news/2020/feb/01/pissed-mother-nature-off-big-time-coming-home-after-australia-fires}{`We've pissed mother nature off, big time': the people coming home after Australia's fires}}, + journal = {The Guardian}, + month = feb, + year = 2020, +} + +@article{ mendez17what, + author = {Fernando Mendez and Uwe Serd\"{u}lt}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S0740624X17301624}{What drives fidelity to internet voting? Evidence from the roll–out of internet voting in {Switzerland}}}, + journal = {Government Information Quarterly}, + volume = 34, + number = 3, + month = sep, + year = 2017, + pages = {511-523}, +} + +@article{ messias13you, + author = {Johnnatan Messias and Lucas Schmidt and + Ricardo Oliveira and Fabr\'{i}cio Benevenuto}, + title = {\href{https://firstmonday.org/article/view/4217/3700}{You followed my bot! Transforming robots into influential users in Twitter}}, + volume = 18, + number = 7, + month = jul, + year = 2013, +} + +@article{ miller08teruko, + author = {Jill Miller}, + title = {\href{http://intersections.anu.edu.au/issue17/miller.htm}{Teruko Mizushima: Pioneer Trader in Time as a Currency}}, + journal = {Intersections: Gender and Sexuality in Asia and the Pacific}, + issue = 17, + month = jul, + year = 2008, + url = {http://intersections.anu.edu.au/issue17/miller.htm}, +} + +@inproceedings{miller17zero, + title={\href{https://ieeexplore.ieee.org/document/7966964}{Zero-collateral lotteries in Bitcoin and Ethereum}}, + author={Miller, Andrew and Bentov, Iddo}, + booktitle={Security and Privacy Workshops (EuroS\&PW), 2017 IEEE European Symposium on}, + pages={4--13}, + year={2017}, + organization={IEEE} +} + +@article{ miller69program, + author = {James C. {Miller III}}, + title = {A Program for Direct and Proxy Voting + in the Legislative Process}, + journal = {Public Choice}, + volume = 7, + year = 1969, + pages = {107-113}, +} + +@article{ mori12uncanny, + author = {Masahiro Mori}, + title = {\href{https://ieeexplore.ieee.org/stamp/stamp.jsp?arnumber=6213238}{The Uncanny Valley}}, + journal = {IEEE Robotics \& Automation Magazine}, + month = jun, + year = 2012, + note = {Translated by Karl F. MacDorman and Norri Kageki}, +} + +@article{ moynihan04building, + author = {Donald P. Moynihan}, + title = {Building Secure Elections: + E-Voting, Security, and Systems Theory}, + journal = {Public Administration Review}, + volume = 64, + number = 5, + month = sep, + year = 2004, + pages = {515-528}, +} + +@article{ muhle18survey, + author = {Alexander M\"uhle and Andreas Gr\"uner and + Tatiana Gayvoronskaya and Christoph Meinel}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S1574013718301217}{A survey on essential components of a self-sovereign identity}}, + journal = {Computer Science Review}, + month = nov, + year = 2018, + volume = 30, + pages = {80-86}, +} + + +%N + +@misc{ nanalyze17six, + author = {nanalyze}, + title = {\href{https://www.nanalyze.com/2017/09/6-digital-identity-verification-startups/}{6 Digital Identity Verification Startups to Check Out}}, + month = sep, + year = 2017, +} + +@misc{ nimses17, + author = {Nimses}, + title = {\href{https://nimses.com/}{One Nim is One Minute of Human Life}}, + year = 2017, +} + +@misc{ noyer16thoughts, + author = {Christian Noyer}, + title = {\href{https://www.bis.org/review/r160115c.htm}{Thoughts on the zero lower bound in relation with monetary and financial stability}}, + month = jan, + day = 12, + year = 2016, + url = {https://www.bis.org/review/r160115c.htm}, + notes = {Speech by Mr Christian Noyer, Honorary Governor of the Bank of France and Former Chairman of the Board of Directors of the Bank for International Settlements, at the Farewell Symposium in his honour, held by the Bank of France and the Bank for International Settlements, Paris, 12 January 2016.}, +} + +@misc{ nygren15proof, + author = {Johan Nygren}, + title = {\href{http://proofofindividuality.online/}{Proof-of-individuality anti-sybil token}}, + year = 2015, + url = {http://proofofindividuality.online/}, +} + +%U + +@article{ ulery11accuracy, + author = {Bradford T. Ulery and R. Austin Hicklin and JoAnn Buscaglia + and Maria Antonia Roberts}, + title = {\href{https://www.jstor.org/stable/pdf/41242255.pdf}{Accuracy and reliability of forensic latent fingerprint decisions}}, + journal = {Proceedings of the National Academy of Sciences of the United States of America}, + volume = 108, + number = 19, + month = may, + day = 10, + year = 2011, + publisher = {National Academy of Sciences}, +} + +@book{ un12millennium, + title = "The Millennium Development Goals Report", + publisher = "United Nations", + address = "New York", + month = jun, + year = 2012, +} + +@misc{ un48universal, + author = "United Nations General Assembly", + title = "The Universal Declaration of Human Rights", + howpublished = {Resolution 217 {A (III)}}, + month = dec, + year = 1948, +} + +@misc{ un50statute, + author = "United Nations General Assembly", + title = "Statute of the Office of the United + Nations High Commissioner for Refugees", + howpublished = {Resolution 428{(V)}}, + month = dec, + year = 1950, +} + +%V + +@book{ vinge93fire, + author = {Vernor Vinge}, + title = {A Fire Upon The Deep}, + publisher = {Tor Science Fiction}, + month = feb, + year = 1993, + isbn = {978-0812515282}, +} + +@article{ volokh00freedom, + author = {Eugene Volokh}, + title = {Freedom of Speech and Information Privacy: + The Troubling Implications of a Right to Stop People + from Speaking about You}, + journal = {Stanford Law Review}, + month = may, + year = 2000, +} + +@article{ vries18bitcoin, + author = {Alex {de Vries}}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S2542435118301776}{Bitcoin's Growing Energy Problem}}, + journal = {Joule}, + volume = 2, + number = 5, + month = may, + year = 2018, + pages = {801-805}, +} + +%W + +@misc{ wagner16swiss, + author = {Che Wagner}, + title = {\href{https://medium.com/economicsecproj/the-swiss-universal-basic-income-vote-2016-d74ae9beafea}{The Swiss Universal Basic Income Vote 2016: What’s Next?}}, + month = feb, + year = 2017, +} + +@misc{ wallace99nameless, + author = {Jonathan D. Wallace}, + title = {Nameless in Cyberspace: Anonymity on the Internet}, + note = {Cato Briefing Paper No. 54}, + month = dec, + day = 8, + year = 1999, + url = {http://www.cato.org/pubs/briefs/bp54.pdf}, +} + +@article{ warren94counting, + author = {C. H. E. Warren}, + title = {\href{http://www.votingmatters.org.uk/ISSUE1/P4.HTM}{Counting in STV elections}}, + journal = {Voting matters}, + volume = 1, + month = mar, + year = 1994, +} + +@article{ weiskel05sidekick, + author = {Timothy C. Weiskel}, + title = {\href{https://doi.org/10.1177%2F0002764205280203}{From Sidekick to Sideshow--- Celebrity, Entertainment, and the Politics of Distraction}}, + journal = {American Behavioral Scientist}, + volume = 49, + number = 3, + month = nov, + year = 2005, + pages = {393-409}, +} + +@article{ weiss06principles, + author = {Weiss, Thomas G.}, + title = {Principles, Politics, and Humanitarian Action}, + month = apr, + year = 2006, + journal = {Ethics \& International Affairs}, + volume = 13, + number = 1, +} + +@article{ weitzer15human, + author = {Ronald Weitzer}, + title = {\href{https://doi.org/10.1146/annurev-soc-073014-112506}{Human Trafficking and Contemporary Slavery}}, + journal = {Annual Review of Sociology}, + volume = 41, + month = aug, + year = 2015, + pages = {223-242}, +} + +@article{ white11differences, + title = {Differences in Medicine, Differences in Ethics}, + author={White, Luise}, + journal={Evidence, Ethos and Experiment: + The Anthropology and History of Medical Research in Africa}, + editor = {Geissler, P. Wenzel and Molyneux, Catherine}, + pages = {445--461}, + year = {2011}, + publisher = {Berghahn Books} +} + +@misc{ wikileaks, + key = {WikiLeaks}, + title = {WikiLeaks}, + note = {\url{http://wikileaks.org/}}, +} + +@misc{ windowsliveid, + author = {{Windows Live ID}}, + note = {\url{http://www.passport.net/}}, + url = {http://www.passport.net/}, +} + +@article{ woolley16automating, + author = {Samuel C. Woolley}, + title = {\href{https://uncommonculture.org/ojs/index.php/fm/article/view/6161/5300}{Automating power: Social bot interference in global politics}}, + journal = {First Monday}, + volume = 21, + number = 4, + month = apr, + year = 2016, +} + +@misc{ woolley17computational, + author = {Samuel C. Woolley and Douglas R. Guilbeault}, + title = {\href{https://comprop.oii.ox.ac.uk/research/working-papers/computational-propaganda-in-the-united-states-of-america-manufacturing-consensus-online/}{Computational Propaganda in the United States of America: Manufacturing Consensus Online}}, + note = {Working Paper No. 2017.5}, + year = 2017, +} + +@misc{ wouters05, + author = {Paul Wouters}, + title = {Personal spam statistics 1997-2004}, + note = {\url{http://www.xtdnet.nl/paul/spam/}}, + month = jan, + year = 2005, +} + +@inproceedings{ wright11finegrained, + author = {Joss Wright and Tulio {de Souza} and Ian Brown}, + title = {Fine-Grained Censorship Mapping + Information Sources, Legality and Ethics}, + booktitle = {\bibconf{FOCI}{Workshop on Free and Open Communications + on the Internet}}, + month = aug, + year = 2011, + location = {San Francisco, CA}, +} + +@article{ wu18settled, + author = {Tim Wu}, + title = {\href{https://www.theguardian.com/commentisfree/2018/nov/19/shallow-conception-democracy-tim-wu}{We've settled on a shallow conception of democracy. And that's dangerous}}, + journal = {The Guardian}, + month = nov, + day = 19, + year = 2018, +} + +%Y + +@article{ yale61, + author = {{Yale Law Journal}}, + title = {The Constitutional Right to Anonymity: + Free Speech, Disclosure and the Devil}, + journal = {Yale Law Journal}, + volume = 70, + number = 7, + month = jun, + year = 1961, + pages = {1084-1128}, + type = {Note} +} + +@inproceedings{ yamak16detection, + author = {Zaher Yamak and Julien Saunier and Laurent Vercouter}, + title = {\href{https://dl.acm.org/citation.cfm?doid=2872518.2890586}{Detection of Multiple Identity Manipulation in Collaborative Projects}}, + booktitle = {\bibconf[25th]{WWW Companion}{International Conference Companion on World Wide Web}}, + month = apr, + year = 2016, + pages = {955-960}, +} + +@article{ yamakawa07toward, + author = {Hiroshi Yamakawa and Michiko Yoshida and Motohiro Tsuchiya}, + title = {Toward Delegated Democracy: + Vote by Yourself, or Trust Your Network}, + journal = {International Journal of Social, Human Science and Engineering}, + volume = 1, + number = 6, + year = 2007, +} + +@misc{ ycr17basic, + author = {{Y Combinator Research}}, + title = {\href{https://static1.squarespace.com/static/599c23b2e6f2e1aeb8d35ec6/t/59c3188c4c326da3497c355f/1505958039366/YCR-Basic-Income-Proposal.pdf}{Basic Income Project Proposal}}, + month = sep, + year = 2017, +} + +@article{ yokoo04, + author = {Makoto Yokoo and Yuko Sakurai and Shigeo Matsubara}, + title = {The Effect of False-name Bids in Combinatorial Auctions: + New Fraud in {Internet} Auctions}, + journal = {Games and Economic Behavior}, + volume = 46, + number = 1, + pages = {174-188}, + month = jan, + year = 2004, +} + +@misc{ yahoo08captcha, + title = {{Yahoo CAPTCHA is Broken}}, + note = {\url{http://network-security-research.blogspot.com/}}, + month = jan, + year = 2008 +} + +%Z + +@book{ zinn05peoples, + author = { Howard Zinn }, + title = {A People's History of the {United States}}, + publisher = {Harper Perennial Modern Classics}, + month = aug, + year = 2005, + isbn = {978-0060838652}, +} + +@book{ zupan17inside, + author = {Mark A. Zupan}, + title = {Inside Job: How Government Insiders Subvert the Public Interest}, + publisher = {Cambridge University Press}, + month = mar, + year = 2017, + isbn = {978-1316607770}, +} + + diff --git a/pdf/theory.bib b/pdf/theory.bib new file mode 100644 index 0000000..02fcaef --- /dev/null +++ b/pdf/theory.bib @@ -0,0 +1,704 @@ + +%A +@article{archetti12game, + title={Game theory of public goods in one-shot social dilemmas without assortment}, + author={Archetti, Marco and Scheuring, Istvan}, + journal={Journal of theoretical biology}, + volume={299}, + pages={9--20}, + year={2012}, + publisher={Elsevier} +} + +@article{ alistarh18communication, + author = {Dan Alistarh and James Aspnes and Valerie King and + Jared Saia}, + title = {\href{https://link.springer.com/article/10.1007/s00446-017-0315-1}{Communication-efficient randomized consensus}}, + volume = 31, + pages = {pages489–501}, + month = nov, + year = 2018, +} + +@article{ aspnes03randomized, + author = {James Aspnes}, + title = {\href{https://link.springer.com/article/10.1007%2Fs00446-002-0081-5}{Randomized protocols for asynchronous consensus}}, + journal = {Distributed Computing}, + volume = 16, + number = {2--3}, + pages = {165--175}, + month = sep, + year = 2003, +} + +@article{ aspnes15faster, + author = {James Aspnes}, + title = {\href{https://link.springer.com/article/10.1007%2Fs00446-013-0195-y}{Faster randomized consensus with an oblivious adversary}}, + journal = {Distributed Computing}, + volume = 28, + number = 1, + month = feb, + year = 2015, + pages = {21-29}, +} + +@inproceedings{ aumann96efficient, + author = {Yonatan Aumann and Michael A. Bender}, + title = {\href{https://doi.org/10.1007/3-540-61440-0_164}{Efficient Asynchronous Consensus with the Value-Oblivious Adversary Scheduler}}, + booktitle = {\bibconf[23rd]{ICALP}{International Colloquium on + Automata, Languages and Programming}}, + month = jul, + year = 1996, + location = {Paderborn, Germany}, +} + +@article{ aumann05efficient, + author = {Yonatan Aumann and Michael A. Bender}, + title = {\href{https://link.springer.com/article/10.1007%2Fs00446-004-0113-4}{Efficient low-contention asynchronous consensus with the value-oblivious adversary scheduler}}, + journal = {Distributed Computing}, + volume = 17, + number = 3, + month = mar, + year = 2005, + pages = {191-207}, +} + +@article{avarikioti19divide, + title={Divide and Scale: Formalization of Distributed Ledger Sharding Protocols}, + author={Avarikioti, Georgia and Kokoris-Kogias, Eleftherios and Wattenhofer, Roger}, + journal={arXiv preprint arXiv:1910.10434}, + year={2019} +} + +@article{ awerbuch85complexity, + author = {Baruch Awerbuch}, + title = {\href{https://dl.acm.org/citation.cfm?id=4227}{Complexity of Network Synchronization}}, + journal = {Journal of the Association for Computing Machinery}, + volume = 32, + number = 4, + month = oct, + year = 1985, + pages = {804-823}, +} + + +%B + +@article{babai2006probability, + title={The probability of generating the symmetric group when one of the generators is random}, + author={Babai, Laszlo and Hayes, Thomas P.}, + journal={Publ. Math. Debrecen}, + volume={69}, + number={3}, + pages={271--280}, + year={2006}, + publisher={Citeseer} +} + +@inproceedings{ bangalore18almost, + author = {Laasya Bangalore and Ashish Choudhury and Arpita Patra}, + title = {\href{https://dl.acm.org/citation.cfm?id=3212735}{Almost-Surely Terminating Asynchronous Byzantine Agreement Revisited}}, + booktitle = {\bibconf{PODC}{Principles of Distributed Computing}}, + month = jul, + year = 2018, + pages = {295-304}, +} + +@incollection{bellare03forward, + title={Forward-security in private-key cryptography}, + author={Bellare, Mihir and Yee, Bennet}, + booktitle = {\bibconf['03]{CT-RSA}{Topics in Cryptology - CT RSA }}, + year={2003}, +} + +@inproceedings{bellare93defining, + title={On defining proofs of knowledge}, + author={Bellare, Mihir and Goldreich, Oded}, + booktitle = {\bibconf['92]{CRYPTO}{Advances in Cryptology }}, + year={1993}, +} + +@inproceedings{ ben-or83another, + author = {Michael Ben-Or}, + title = {Another advantage of free choice: + Completely asynchronous agreement protocols}, + booktitle = {Principles of Distributed Computing (PODC)}, + year = 1983, +} + +@inproceedings{ ben-or85fast, + author = {Michael Ben-Or}, + title = {\href{https://dl.acm.org/citation.cfm?id=323609}{Fast Asynchronous Byzantine Agreement (Extended Abstract)}}, + booktitle = {\bibconf[4th]{PODC}{Principles of Distributed Computing}}, + year = 1985, + pages = {149-151}, + location = {Minaki, Ontario, Canada}, +} + +@inproceedings{ bracha84asynchronous, + author = {Gabriel Bracha}, + title = {\href{https://dl.acm.org/citation.cfm?id=806743}{An asynchronous [(n-1)/3]-Resilient Consensus Protocol}}, + booktitle = {\bibconf[3rd]{PODC}{ACM Symposium on Principles of Distributed Computing}}, + year = 1984, + location = {Vancouver, British Columbia, Canada}, +} +% pages = {154-162}, + +@article{ bracha85asynchronous, + author = {Gabriel Bracha and Sam Toueg}, + title = {\href{https://dl.acm.org/citation.cfm?id=214134}{Asynchronous Consensus and Broadcast Protocols}}, + journal = {Journal of the Association for Computing Machinery (JACM)}, + volume = 32, + number = 4, + year = 1985, +} +% pages = {824-840}, + + +%C + +@book{ cachin11introduction, + author = {Christian Cachin and Rachid Guerraoui Lu\'is Rodrigues}, + title = {Introduction to Reliable and Secure Distributed Programming}, + publisher = {Springer}, + month = feb, + year = 2011, + isbn = {978-3642152597}, +} + +@misc{ cachin19asymmetric, + author = {Christian Cachin and Bj\"orn Tackmann}, + title = {\href{https://arxiv.org/pdf/1906.09314.pdf}{Asymmetric Distributed Trust}}, + month = jun, + year = 2019, +} + +@techreport{ camenisch97proof, + author = {Jan Camenisch and Markus Stadler}, + title = {Proof Systems for General Statements about Discrete + Logarithms}, + institution = {Dept. of Computer Science, ETH Zurich}, + year = 1997, + month = {March}, + number = 260, +} + +@inproceedings{ canetti93fast, + author = {Ran Canetti and Tal Rabin}, + title = {\href{https://dl.acm.org/citation.cfm?id=167105}{Fast Asynchronous Byzantine Agreement with Optimal Resilience}}, + booktitle = {\bibconf[25th]{STOC}{ACM Symposium on Theory of computing}}, + month = may, + year = 1993, + location = {San Diego, California, USA}, + pages = {42-51}, +} + +% long version: unpublished? +@misc{ canetti98fast, + author = {Ran Canetti and Tal Rabin}, + title = {\href{http://people.csail.mit.edu/canetti/materials/cr93.ps}{Fast Asynchronous Byzantine Agreement with Optimal Resilience}}, + month = sep, + year = 1998, + institution = {IBM T.J. Watson Research Center}, +} + +@inproceedings{ clarkson08civitas , + author = {Clarkson, M.R. and Chong, S. and Myers, A.C.}, + booktitle = {IEEE \bibconf{SP}{Symposium on Security and Privacy}}, + title = {Civitas: Toward a Secure Voting System}, + year = {2008}, + month = {may}, +} + +@article{ cristian95atomic, + author = {Flaviu Cristian and Houtan Aghili and Ray Strong and + Danny Dolev}, + title = {\href{https://www.sciencedirect.com/science/article/pii/S0890540185710607}{Atomic Broadcast: From Simple Message Diffusion to Byzantine Agreement}}, + journal = {Information and Computation}, + volume = 118, + number = 1, + month = apr, + year = 1995, + pages = {158-179}, +} + +%D + +@article{ defago04total, + author = {Xavier D\'efago and Andr\'e Schiper and P\'eter Urb\'an}, + title = {\href{https://dl.acm.org/doi/abs/10.1145/1041680.1041682}{Total Order Broadcast and Multicast Algorithms:Taxonomy and Survey}}, + journal = {ACM Computing Surveys}, + month = dec, + year = 2004, +} + +%F + +@article{ feigenbaum08graph, + author = {Joan Feigenbaum and Sampath Kannan and Andrew McGregor + and Siddharth Suri and Jian Zhang}, + title = {Graph Distances in the Data-Stream Model}, + journal = {SIAM Journal on Computing}, + volume = 38, + year = 2008, + pages = {1709-1727}, +} + +@article{ feigenbaum05graph, + author = {Joan Feigenbaum and Sampath Kannan and Andrew McGregor + and Siddharth Suri and Jian Zhang}, + title = {On Graph Problems in a Semi-Streaming Model}, + journal = {Theoretical Computer Science}, + volume = 348, + year = 2005, + pages = {207-216}, +} + +@article{ feigenbaum05computing, + author = {Joan Feigenbaum and Sampath Kannan and Jian Zhang}, + title = {Computing Diameter in the Streaming and Sliding-Window Models}, + journal = {Algorithmica}, + volume = 41, + year = 2005, + pages = {25-41}, +} + +@inproceedings{ feldman88optimal, + author = {Paul Feldman and Silvio Micali}, + title = {\href{https://dl.acm.org/citation.cfm?id=62225}{Optimal Algorithms for Byzantine Agreement}}, + booktitle = {\bibconf[20th]{STOC}{Symposium on Theory of Computing}}, + month = may, + year = 1988, + pages = {148-161}, + location = {Chicago, Illinois, USA}, +} + +@phdthesis{ feldman88thesis, + author = {Paul Feldman}, + title = {\href{https://dspace.mit.edu/bitstream/handle/1721.1/14368/20051076-MIT.pdf}{Optimal Algorithms for Byzantine Agreement}}, + school = {Massachusetts Institute of Technology}, + month = may, + year = 1988, +} + +@article{ fischer85impossibility, + title={\href{https://groups.csail.mit.edu/tds/papers/Lynch/jacm85.pdf}{Impossibility of distributed consensus with one faulty process}}, + author={Fischer, Michael J and Lynch, Nancy A and Paterson, Michael S}, + journal={Journal of the ACM (JACM)}, + volume={32}, + number={2}, + pages={374--382}, + year={1985}, + publisher={ACM} +} + +@article{ friedman05simple, + author = {Roy Friedman and Achour Mostefaoui and Michel Raynal}, + title = {Simple and Efficient Oracle-Based Consensus Protocols + for Asynchronous {Byzantine} Systems}, + journal = {IEEE Transactions on Dependable and Secure Computing}, + volume = 2, + number = 1, + month = jan, + year = 2005, +} + + +%J + +@book{ johnson77urn, + author = {Norman Lloyd Johnson}, + title = {Urn models and their application: An approach to modern discrete probability theory}, + publisher = {Wiley}, + year = 1977, + isbn = {978-0471446309}, +} + +%K + +%L + +@book{ lynch96distributed, + author = {Nancy A. Lynch}, + title = {Distributed Algorithms}, + publisher = {Morgan Kaufmann}, + month = mar, + year = 1996, + isbn = {978-1558603486}, +} + + +%M + +@book{ mahmoud08polya, + author = {Hosam Mahmoud}, + title = {P\'olya Urn Models}, + publisher = {Chapman and Hall/CRC}, + month = jun, + year = 2008, + isbn = {978-1420059830}, +} + +@inproceedings{merkle88digital, + title={\href{https://people.eecs.berkeley.edu/~raluca/cs261-f15/readings/merkle.pdf}{A Digital Signature Based on a Conventional Encryption Function}}, + author={Merkle, Ralph C}, + booktitle={\bibconf{CRYPTO}{Advances in Cryptology}}, + year={1988}, +} + +@article{ moran58random, + author = {{P. A. P.} Moran}, + title = {Random Processes in Genetics}, + journal = {\href{https://doi.org/10.1017/S0305004100033193}{Mathematical Proceedings of the Cambridge Philosophical Society}}, + volume = 54, + number = 1, + month = jan, + year = 1958, + pages = {60-71}, +} + +@inproceedings{ mostefaoui14signature, + author = {Achour Most\'efaoui and Hamouma Moumen and Michel Raynal}, + title = {\href{https://dl.acm.org/citation.cfm?id=2611468}{Signature-Free Asynchronous Byzantine Consensus with $t < n/3$ and $O(n^2)$ Messages}}, + booktitle = {\bibconf{PODC}{Principles of Distributed Computing}}, + month = jul, + year = 2014, + location = {Paris, France}, +} + +@inproceedings{munro92detskiplists, + author = {Munro, J. Ian and Papadakis, Thomas and Sedgewick, Robert}, + title = {\href{http://www.ic.unicamp.br/~celio/peer2peer/skip-net-graph/deterministic-skip-lists-munro.pdf}{Deterministic Skip Lists}}, + booktitle = {Proceedings of the Third Annual ACM-SIAM Symposium on Discrete Algorithms}, + series = {SODA '92}, + year = {1992}, + isbn = {0-89791-466-X}, + location = {Orlando, Florida, USA}, + pages = {367--375}, + numpages = {9}, + url = {http://dl.acm.org/citation.cfm?id=139404.139478}, + acmid = {139478}, + publisher = {Society for Industrial and Applied Mathematics}, + address = {Philadelphia, PA, USA}, +} + + +%N + +@book{ nowak06evolutionary, + author = {Martin A. Nowak}, + title = {Evolutionary Dynamics: Exploring the Equations of Life}, + publisher = {Belknap Press}, + month = sep, + year = 2006, + isbn = {978-0674023383}, +} + + +%P + +@article{pease80reaching, + author={Pease, Marshall and Shostak, Robert and Lamport, Leslie}, + title={\href{http://dl.acm.org/citation.cfm?id=322188}{Reaching Agreement in the Presence of Faults}}, + journal={Journal of the ACM (JACM)}, + volume={27}, + number={2}, + pages={228--234}, + month=apr, + year={1980}, + publisher={ACM} +} + +@misc{ propp15polyas, + author = {James Propp}, + title = {\href{https://mathenchant.wordpress.com/2015/10/16/polyas-urn/}{P\'olya's Urn}}, + month = oct, + year = 2015, +} + +@article{pugh90skiplists, + author = {Pugh, William}, + title = + {\href{http://courses.cs.vt.edu/cs2604/fall05/wmcquain/Notes/Supplemental/PughSkiplistPaper.pdf}{Skip + Lists: A Probabilistic Alternative to Balanced Trees}}, + journal = {Communications of the ACM}, + issue_date = {June 1990}, + volume = {33}, + number = {6}, + month = jun, + year = {1990}, + issn = {0001-0782}, + pages = {668--676}, + numpages = {9}, + url = {http://doi.acm.org/10.1145/78973.78977}, + doi = {10.1145/78973.78977}, + acmid = {78977}, + publisher = {ACM}, + address = {New York, NY, USA}, + keywords = {data structures, searching, trees}, +} + + +%R + +@inproceedings{ rabin83randomized, + author = {Michael O. Rabin}, + title = {Randomized {Byzantine} Generals}, + booktitle = {Symposium on Foundations of Computer Science (SFCS)}, + month = nov, + year = 1983, +} + +@book{rapoport65prisoner, + title={Prisoner's dilemma: A study in conflict and cooperation}, + author={Rapoport, Anatol and Chammah, Albert M and Orwant, Carol J}, + volume={165}, + year={1965}, + publisher={University of Michigan press} +} + +%S + +@article{skala13hypergeometric, + author = {Matthew Skala}, + title = {{Hypergeometric Tail Inequalities: Ending the Insanity}}, + journal = {CoRR}, + volume = {abs/1311.5939}, + year = {2013}, + url = {https://arxiv.org/abs/1311.5939}, +} + +@inproceedings{ stadler96publicly, + title={\href{https://link.springer.com/content/pdf/10.1007/3-540-68339-9_17.pdf}{Publicly Verifiable Secret Sharing}}, + author={Stadler, Markus}, + booktitle = {Eurocrypt}, + month=may, + year={1996}, +} + +@inproceedings{ +CJI09, author = "R.~Chang and G.~Jiang and F.~Ivan{\v{c}}i{\'{c}} and + S.~Sankaranarayanan and V.~Shmatikov", +title = "Inputs of Coma: + Static Detection of Denial-of-Serice Vulnerabilities", +year = {2009}, +booktitle ={CSF}} + +@article( +CMS05, author="R.~Chadha and J.C.~Mitchell and A.~Scedrov and V.~Shmatikov", +title="Contract signing, optimism, and advantage", +journal="J. Logic and Algebraic Programming", +pages="189--218", +volume="64", number="2", +Year="2003") + +@inproceedings( +DS, Author="A.~Serjantov and G.~Danezis", +Title="Towards an information theoretic metric for anonymity", +Booktitle="Proc.\ 2nd International Workshop on + Privacy-Enhancing Technologies", +Series={LNCS}, +Volume={2482}, +Pages="41--53", +Year="2002") + +@inproceedings( +MS05, author="A.~Mahimkar and V.~Shmatikov", +title="Game-based analysis of denial-of-service prevention protocols", +booktitle="Proc.\ 18th {IEEE} Computer Security Foundations + Workshop ({CSFW})", +publisher="{IEEE}", +year="2005", +pages="287--301") + +@article( +NS06, Author="G.~Norman and V.~Shmatikov", +Title="Analysis of probabilistic contract signing", +Journal="J. Computer Security", +Year="2006", +Pages="561--589", +Volume="14", +Number="6") + +@inproceedings( +nymble, author="P.~Johnson and A.~Kapadia and P.~Tsang and S.~Smith", +title="Nymble: anonymous {IP}-address blocking", +booktitle="Proc.\ {PET}", +year="2007") + +@article( +S04, Author="V.~Shmatikov", +Title="Probabilistic model checking of an anonymity system", +Journal="J. Computer Security", +Year="2004", +Pages="355--377", +Volume="12", +Number="3-4") + +@article( +SM02, author="V.~Shmatikov and J.C.~Mitchell", +title="Finite-state analysis of two contract signing protocols", +journal="Theoretical Computer Science", +volume=283, number="2", +pages="419-450", +year=2002) + +@inproceedings( +SW-esorics06, author="V.~Shmatikov and M-H.~Wang", +Title="Timing analysis in low-latency mix networks: + attacks and defenses", +Booktitle="Proc.\ {ESORICS}", +Year="2006") + +@inproceedings( +SW-fmse06, author="V.~Shmatikov and M-H.~Wang", +Title="Measuring relationship anonymity in mix networks", +Booktitle="Proc.\ {WPES}", +Year="2006") + +@inproceedings( +torsk-attack, author="Q.~Wang and P.~Mittal and N.~Borisov", +title="In Search of an Anonymous and Secure Lookup: + Attacks on Peer-to-peer Anonymous Communication Systems", +booktitle="Proc.\ {CCS}", +year="2010") + +@inproceedings( tsang-ccs07, + author="P.~Tsang and M.H.~Au and A.~Kapadia and S.~Smith", + title="Blacklistable anonymous credentials: + blocking misbehaving users without {TTPs}", + booktitle="Proc.\ {CCS}", + year="2007" +) + +@inproceedings( +tsang-ccs08, author="P.~Tsang and M.H.~Au and A.~Kapadia and S.~Smith", +title="{PEREA}: Towards Practical {TTP}-Free Revocation in + Anonymous Authentication", +booktitle="Proc.\ {CCS}", +year="2008") + + +@article{ afk, + author = {Mart\'in Abadi and Joan Feigenbaum and Joe Kilian}, + title = {On Hiding Information from an Oracle}, + journal = {Journal of Computer and System Sciences}, + volume = 39, + year = 1989, + pages = {21-50}, + note = {Special issue of selected papers from the 1987 + IEEE Conference on Structure in Complexity Theory} +}, + +@inproceedings{ bfl, + author = {Matt Blaze and Joan Feigenbaum and Jack Lacy}, + title = {Decentralized Trust Management}, + booktitle = {Proceedings of the 17th Symposium on Security and Privacy}, + year = 1996, + pages = {164-173}, +} + +@inproceedings{ bfs, + author = {Matt Blaze and Joan Feigenbaum and Martin Strauss}, + title = {Compliance Checking in the {PolicyMaker} + Trust Management System}, + booktitle = {Proceedings of the 2nd Financial Crypto Conference}, + year = 1998, +} + +@article{ ff, + author = {Joan Feigenbaum and Lance Fortnow}, + title = {Random-Self-Reducibility of Complete Sets}, + journal = {SIAM Journal on Computing}, + volume = 22, + year = 1993, + pages = {994-1005}, + note = {Extended abstract appears in Proceedings of the + 1991 IEEE Conference on Structure in Complexity Theory}, +} + +@article{ fksv, + author = {Joan Feigenbaum and Sampath Kannan and Martin Strauss + and Mahesh Viswanathan}, + title = {An Approximate {L1}-Difference Algorithm for + Massive Data Streams}, + journal = {SIAM Journal on Computing}, + volume = 32, + year = 2002, + pages = {131--151}, + note = {Extended abstract appears in Proceedings of the + 1999 IEEE Symposium on Foundations of Computer Science}, +} + +@article{ fkmsz, + author = {Joan Feigenbaum and Sampath Kannan and Andrew McGregor + and Siddharth Suri and Jian Zhang}, + title = {On Graph Problems in a Semi-Streaming Model}, + journal = {Theoretical Computer Science}, + volume = 348, + year = 2005, + pages = {207--216}, + note = {Special issue of selected papers from the 2004 International + Colloquium on Automata, Languages, and Programming}, +} + +@article{ fps, + author = {Joan Feigenbaum and Christos Papadimitriou and Scott Shenker}, + title = {Sharing the Cost of Multicast Transmissions}, + journal = {Journal of Computer and System Sciences}, + volume = 63, + year = 2001, + pages = {21--41}, + note = {Preliminary version appears in Proceedings of the 2000 + ACM Symposium on Theory of Computing}, +} + +@article{ fpss, + author = { Joan Feigenbaum and Christos Papadimitriou and Rahul Sami + and Scott Shenker}, + title = {A {BGP}-based Mechanism for Lowest-Cost Routing}, + journal = {Distributed Computing}, + volume = 18, + year = 2005, + pages = {61--72}, + note = {Special issue of selected papers from the 2002 ACM Symposium + on Principles of Distributed Computing}, +} + +@inproceedings{shoup00practical, + title={\href{https://link.springer.com/content/pdf/10.1007/3-540-45539-6_15.pdf}{Practical Threshold Signatures}}, + author={Shoup, Victor}, + booktitle={Eurocrypt}, + month = may, + year={2000}, +} + + +@book{stinson05crypto, + author = {Douglas R. Stinson}, + title = {Cryptography: Theory and Practice}, + year = {2005}, +} + +@inproceedings{guerraoui10next, + title={\href{http://www.vukolic.com/700-Eurosys.pdf}{The next 700 {BFT} protocols}}, + author={Guerraoui, Rachid and Kne{\v{z}}evi{\'c}, Nikola and Qu{\'e}ma, Vivien and Vukoli{\'c}, Marko}, + booktitle={5th European conference on Computer systems}, + pages={363--376}, + year={2010}, + organization={ACM}, + url={http://www.vukolic.com/700-Eurosys.pdf}, +} + + +%V + +@book{ vanderbei13linear, + author = {Robert J. Vanderbei}, + title = {Linear Programming: Foundations and Extensions}, + publisher = {Springer}, + month = jul, + year = 2013, + isbn = {978-1461476290}, +} +