mirror of
https://github.com/pezkuwichain/consensus.git
synced 2026-04-22 02:07:56 +00:00
5041 lines
133 KiB
BibTeX
5041 lines
133 KiB
BibTeX
|
||
%A
|
||
|
||
@inproceedings{ abbott07browser,
|
||
author = {Timothy G. Abbott and Katherine J. Lai and
|
||
Michael R. Lieberman and Eric C. Price},
|
||
title = {Browser-Based Attacks on {Tor}},
|
||
booktitle = {\bibconf{PETS}{Privacy Enhancing Technologies}},
|
||
year = 2007,
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{abu-libdeh10symbiotic,
|
||
author = {Hussam Abu-Libdeh and
|
||
Paolo Costa and
|
||
Antony I. T. Rowstron and
|
||
Greg O'Shea and
|
||
Austin Donnelly},
|
||
title = {Symbiotic Routing in Future Data Centers},
|
||
booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}},
|
||
location = {New Delhi, India},
|
||
month = aug,
|
||
year = 2010
|
||
}
|
||
|
||
@misc{hearn15rapidly,
|
||
title={\href{https://en.bitcoin.it/wiki/Contract}{Rapidly-adjusted (micro)payments to a pre-determined party}},
|
||
author={Hearn, Mike and Spilman, J},
|
||
year={2015},
|
||
url={https://en.bitcoin.it/wiki/Contract},
|
||
}
|
||
|
||
@article{back14enabling,
|
||
title={\href{https://blockstream.com/sidechains.pdf}{Enabling Blockchain Innovations with Pegged Sidechains}},
|
||
author={Adam Back and Matt Corallo and Luke Dashjr and
|
||
Mark Friedenbach and Gregory Maxwell and
|
||
Andrew Miller and Andrew Poelstra and
|
||
Jorge Tim\'on and Pieter Wuille},
|
||
month=oct,
|
||
year=2014,
|
||
url={https://blockstream.com/sidechains.pdf},
|
||
}
|
||
|
||
@misc{poon15bitcoin,
|
||
title={\href{https://lightning.network/lightning-network-paper.pdf}{The {Bitcoin} Lightning Network: Scalable Off-Chain Instant Payments}},
|
||
author={Poon, Joseph and Dryja, Thaddeus},
|
||
month=jan,
|
||
year={2016},
|
||
url={https://lightning.network/lightning-network-paper.pdf},
|
||
}
|
||
|
||
@incollection{decker15fast,
|
||
title={\href{http://www.tik.ee.ethz.ch/file/716b955c130e6c703fac336ea17b1670/duplex-micropayment-channels.pdf}{A Fast and Scalable Payment Network with {Bitcoin} Duplex
|
||
Micropayment Channels}},
|
||
author={Decker, Christian and Wattenhofer, Roger},
|
||
booktitle={Stabilization, Safety, and Security of Distributed Systems},
|
||
pages={3--18},
|
||
month=aug,
|
||
year={2015},
|
||
publisher={Springer},
|
||
url={http://www.tik.ee.ethz.ch/file/716b955c130e6c703fac336ea17b1670/duplex-micropayment-channels.pdf},
|
||
}
|
||
|
||
.. note = {Adviser-Rivest, Ronald L.}, ..
|
||
@phdthesis{adida06advances,
|
||
author = {Adida, Ben},
|
||
title = {Advances in cryptographic voting systems},
|
||
year = {2006},
|
||
order_no = {AAI0810143},
|
||
publisher = {Massachusetts Institute of Technology},
|
||
school = {Massachusetts Institute of Technology},
|
||
address = {Cambridge, MA, USA},
|
||
}
|
||
|
||
@inproceedings{ ahn03kanonymous,
|
||
author = {Ahn, Luis von and Bortz, Andrew and Hopper, Nicholas J.},
|
||
title = {$k$-Anonymous Message Transmission},
|
||
booktitle = {\bibconf[10th]{CCS}{ACM conference on
|
||
Computer and Communications Security}},
|
||
year = {2003},
|
||
}
|
||
|
||
@article{ aiello04jfk,
|
||
author = {William Aiello and others},
|
||
title = {Just Fast Keying: Key Agreement In A Hostile {Internet}},
|
||
journal = {\bibconf{TISSEC}{ACM Transactions on Information and
|
||
System Security}},
|
||
month = may,
|
||
Year = "2004",
|
||
}
|
||
|
||
@inproceedings{aggrawal10private,
|
||
author = {Gaurav Aggrawal and Elie Bursztein and Collin Jackson and Dan Boneh},
|
||
title = {An analysis of private browsing modes in modern browsers},
|
||
year = 2010,
|
||
booktitle = {Usenix Security Symposium}
|
||
}
|
||
|
||
@misc{akamai,
|
||
title = {Akamai Technologies},
|
||
note = {\url{http://www.akamai.com}},
|
||
}
|
||
|
||
@misc{fullnodes,
|
||
author = {Bitnodes},
|
||
title = {\href{https://bitnodes.21.co/nodes/}{Bitcoin Network Snapshot}},
|
||
year = {2017},
|
||
month = {April}
|
||
}
|
||
|
||
|
||
|
||
@misc{ alexa,
|
||
key = {Alexa},
|
||
title = {Alexa Top 500 Global Sites},
|
||
note = {\url{http://www.alexa.com/topsites}},
|
||
month = {April},
|
||
year = {2012}
|
||
}
|
||
|
||
@InProceedings{alimi08shadow,
|
||
author = {Richard Alimi and Ye Wang and Y. Richard Yang},
|
||
title = {Shadow Configuration as a Network Management Primitive},
|
||
booktitle = {ACM SIGCOMM},
|
||
month = Aug,
|
||
year = 2008,
|
||
address = {Seattle, WA},
|
||
}
|
||
|
||
@incollection{ alsabah11defenstrator,
|
||
author = {AlSabah, Mashael and Bauer, Kevin and Goldberg, Ian and Grunwald, Dirk and McCoy, Damon and Savage, Stefan and Voelker, Geoffrey},
|
||
booktitle = {\bibconf[11th]{PETS}{Privacy Enhancing Technologies}},
|
||
title = {{DefenestraTor}: Throwing out Windows in {Tor}},
|
||
month = jul,
|
||
year = 2011,
|
||
location = {Waterloo, Canada},
|
||
}
|
||
|
||
@misc{ android,
|
||
title = {{Android SDK}},
|
||
note = {\url{http://developer.android.com/guide/basics/what-is-android.html}},
|
||
}
|
||
|
||
@inproceedings{ au06short,
|
||
author = {Man Ho Au and Sherman S.M. Chow and Willy Susilo and
|
||
Patrick P. Tsang},
|
||
title = {Short Linkable Ring Signatures Revisited},
|
||
booktitle = {\bibconf{EuroPKI}{European Public Key Infrastructure
|
||
Workshop}},
|
||
month = jun,
|
||
year = 2006,
|
||
location = {Torino, Italy},
|
||
}
|
||
|
||
%B
|
||
|
||
@inproceedings{bahl07highly,
|
||
author = {Paramvir Bahl and
|
||
Ranveer Chandra and
|
||
Albert G. Greenberg and
|
||
Srikanth Kandula and
|
||
David A. Maltz and
|
||
Ming Zhang},
|
||
title = {Towards Highly Reliable Enterprise Network Services Via
|
||
Inference of Multi-level Dependencies},
|
||
booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}},
|
||
location = {Kyoto, Japan},
|
||
month = aug,
|
||
year = 2007
|
||
}
|
||
|
||
@book{ basagni13mobile,
|
||
editor = {Stefano Basagni and Marco Conti and Silvia Giordano and
|
||
Ivan Stojmenovic},
|
||
title = {Mobile Ad Hoc Networking: Cutting Edge Directions},
|
||
edition = {2nd},
|
||
month = mar,
|
||
year = 2013,
|
||
publisher = {Wiley-IEEE Press},
|
||
isbn = {978-1118087282},
|
||
}
|
||
|
||
@misc{ basescu14crux,
|
||
author = {Cristina Basescu and Michael F. Nowlan and Kirill Nikitin
|
||
and Jose M. Faleiro and Bryan Ford},
|
||
title = {\href{https://arxiv.org/abs/1405.0637}{Crux: Locality-Preserving Distributed Services}},
|
||
month = may,
|
||
year = 2014,
|
||
}
|
||
|
||
@inproceedings{ baset06analysis,
|
||
author = {Salman A. Baset and Henning Schulzrinne},
|
||
title = {An Analysis of the {Skype} Peer-to-Peer
|
||
{Internet} Telephony Protocol},
|
||
booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM}},
|
||
month = apr,
|
||
year = 2006,
|
||
}
|
||
|
||
@inproceedings{ bauer07low,
|
||
author = {Kevin Bauer and Damon McCoy and Dirk Grunwald and
|
||
Tadayoshi Kohno and Douglas Sicker},
|
||
title = {Low-Resource Routing Attacks Against {Tor}},
|
||
booktitle = {\bibconf[6th]{WPES}{Workshop on Privacy in the
|
||
Electronic Society}},
|
||
month = oct,
|
||
year = 2007,
|
||
}
|
||
|
||
@incollection{ bellare98relations,
|
||
author = {Bellare, Mihir and Desai, Anand and Pointcheval, David and Rogaway, Phillip},
|
||
title = {Relations among notions of security for public-key encryption schemes},
|
||
booktitle = {Advances in Cryptology — CRYPTO '98},
|
||
series = {Lecture Notes in Computer Science},
|
||
publisher = {Springer Berlin / Heidelberg},
|
||
}
|
||
|
||
@inproceedings { bennett03gap,
|
||
author = {Krista Bennett and Christian Grothoff},
|
||
title = {{GAP} -- Practical Anonymous Networking},
|
||
booktitle = {\bibconf{PET}{Workshop on Privacy Enhancing Technologies}},
|
||
month = mar,
|
||
year = {2003},
|
||
location = {Dresden, Germany}
|
||
}
|
||
|
||
|
||
|
||
@article{ benslimane08Services,
|
||
author = {Djamal Benslimane and Schahram Dustdar and Amit Sheth},
|
||
title = {Services Mashups: The New Generation of Web Applications},
|
||
journal = {IEEE Internet Computing},
|
||
month = may,
|
||
year = 2008,
|
||
volume = 12,
|
||
number = 5,
|
||
}
|
||
|
||
@inproceedings{benson10network,
|
||
author = {Theophilus Benson and
|
||
Aditya Akella and
|
||
David A. Maltz},
|
||
title = {Network traffic characteristics of data centers in the
|
||
wild},
|
||
booktitle = {\bibconf{IMC}{Internet Measurement Conference}},
|
||
location = {Melbourne, Australia},
|
||
month = nov,
|
||
year = 2010
|
||
}
|
||
|
||
@article{ beresford03location,
|
||
author={Beresford, A.R. and Stajano, F.},
|
||
journal={{IEEE} Pervasive Computing},
|
||
title={Location privacy in pervasive computing},
|
||
year={2003},
|
||
}
|
||
|
||
|
||
@inproceedings{ berthold01disadvantages,
|
||
author = {Oliver Berthold and Andreas Pfitzmann and Ronny Standtke},
|
||
title = {The Disadvantages of Free {MIX} Routes
|
||
and How to Overcome Them},
|
||
booktitle = {Workshop on Design Issues in
|
||
Anonymity and Unobservability},
|
||
month = jul,
|
||
year = 2000,
|
||
location = {Berkeley, CA, USA},
|
||
}
|
||
|
||
@inproceedings{ bilge09contacts,
|
||
author = {Leyla Bilge and Thorsten Strufe and Davide Balzarotti and Engin Kirda},
|
||
title = {All Your Contacts Are Belong to Us: Automated Identity Theft Attacks on Social Networks},
|
||
booktitle = {18th International World Wide Web Conference},
|
||
month = {April},
|
||
year = {2009},
|
||
url = {http://www2009.eprints.org/56/}
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{ bohli06deniable,
|
||
author = {Jens-Matthias Bohli and Rainer Steinwandt},
|
||
title = {Deniable Group Key Agreement},
|
||
booktitle = {\bibconf{Vietcrypt}{First International Conference on
|
||
Cryptology in Vietnam}},
|
||
month = sep,
|
||
year = 2006,
|
||
location = {Hanoi, Vietnam},
|
||
}
|
||
|
||
@inproceedings{borisov04offtherecord,
|
||
author = {Borisov, Nikita and Goldberg, Ian and Brewer, Eric},
|
||
title = {Off-the-record communication, or, why not to use {PGP}},
|
||
booktitle = {\bibconf{WPES}{Workshop on Privacy in the
|
||
Electronic Society}},
|
||
month = oct,
|
||
year = {2004},
|
||
location = {Washington DC, USA},
|
||
isbn = {1-58113-968-3},
|
||
doi = {http://doi.acm.org/10.1145/1029179.1029200},
|
||
}
|
||
% publisher = {ACM},
|
||
% address = {New York, NY, USA},
|
||
|
||
@inproceedings{ borisov07denial,
|
||
author = {Borisov, Nikita and Danezis, George and Mittal, Prateek
|
||
and Tabriz, Parisa},
|
||
title = {Denial of Service or Denial of Security?
|
||
{How} Attacks on Reliability can Compromise Anonymity},
|
||
booktitle = {\bibconf[14th]{CCS}{Conference on Computer and Communications Security}},
|
||
month = oct,
|
||
year = 2007,
|
||
}
|
||
|
||
@article{ bray05dispute,
|
||
author = {Hiawatha Bray},
|
||
title = {Dispute threatens to snarl {Internet}},
|
||
journal = {Boston Globe},
|
||
month = oct,
|
||
day = 7,
|
||
year = 2005,
|
||
}
|
||
|
||
@inproceedings{ brickell06efficient,
|
||
author = {Justin Brickell and Vitaly Shmatikov},
|
||
title = {Efficient Anonymity-Preserving Data Collection},
|
||
booktitle = {\bibconf[12th]{KDD}{ACM SIGKDD International Conference
|
||
on Knowledge Discovery and Data Mining}},
|
||
month = aug,
|
||
year = 2006,
|
||
location = {Philadelphia, PA},
|
||
}
|
||
|
||
@article{brosh10delay,
|
||
author = {Eli Brosh and
|
||
Salman Abdul Baset and
|
||
Vishal Misra and
|
||
Dan Rubenstein and
|
||
Henning Schulzrinne},
|
||
title = {The Delay-Friendliness of {TCP} for Real-Time Traffic},
|
||
journal = {IEEE Transactions on Networking},
|
||
year = {2010},
|
||
ee = {http://dx.doi.org/10.1109/TNET.2010.2050780},
|
||
bibsource = {DBLP, http://dblp.uni-trier.de}
|
||
}
|
||
|
||
|
||
%C
|
||
|
||
@article{ carbone10dummynet,
|
||
author = {M. Carbone and L. Rizzo},
|
||
title = "{Dummynet Revisited}",
|
||
journal = "{ACM CCR}",
|
||
volume = 40,
|
||
number = 2,
|
||
month = apr,
|
||
year = 2010,
|
||
}
|
||
|
||
@techreport{cooper08X509,
|
||
author = {Cooper, D. and Santesson, S. and Farrell, S. and Boeyen, S. and Housley, R. and Polk, W.},
|
||
month = may,
|
||
title = {{RFC 5280 - Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile}},
|
||
url = {http://tools.ietf.org/html/rfc5280},
|
||
year = {2008}
|
||
}
|
||
|
||
|
||
|
||
@inproceedings{ cardoso07bandwidth,
|
||
author = {Jaime S. Cardoso},
|
||
title = {Bandwidth-efficient byte stuffing},
|
||
booktitle = {IEEE ICC 2007},
|
||
year = 2007,
|
||
}
|
||
|
||
@inproceedings{castro03splitstream,
|
||
title={\href{http://research.microsoft.com/en-us/um/people/antr/PAST/SplitStream-sosp.pdf}{{SplitStream}: high-bandwidth multicast in cooperative environments}},
|
||
author={Castro, Miguel and Druschel, Peter and Kermarrec, Anne-Marie and Nandi, Animesh and Rowstron, Antony and Singh, Atul},
|
||
booktitle={\bibconf{SOSP}{ACM Symposium on Operating Systems Principles}},
|
||
year={2003},
|
||
url={http://research.microsoft.com/en-us/um/people/antr/PAST/SplitStream-sosp.pdf},
|
||
}
|
||
|
||
@article{castro02practical,
|
||
title={Practical Byzantine fault tolerance and proactive recovery},
|
||
author={Castro, Miguel and Liskov, Barbara},
|
||
journal={ACM Transactions on Computer Systems (TOCS)},
|
||
year={2002},
|
||
}
|
||
|
||
|
||
@article{ chase07simulable,
|
||
author = {Melissa Chase and Anna Lysyanskaya},
|
||
title = {Simulatable {VRFs} with applications to multi-theorem {NIZK}},
|
||
booktitle = {CRYPTO},
|
||
location = {Santa Barbara, CA},
|
||
month = aug,
|
||
year = 2007,
|
||
}
|
||
|
||
@article{ chaum81untraceable,
|
||
author = {Chaum, David},
|
||
title = {\href{https://dl.acm.org/doi/10.1145/358549.358563}{Untraceable
|
||
Electronic Mail, Return Addresses, and Digital Pseudonyms}},
|
||
journal = {Communications of the {ACM}},
|
||
volume = {24},
|
||
issue = {2},
|
||
year = {1981},
|
||
month = {February},
|
||
}
|
||
|
||
@article{ chaum88dining,
|
||
author = {Chaum, David},
|
||
title = {The {Dining Cryptographers} problem:
|
||
Unconditional sender and recipient untraceability},
|
||
journal = {Journal of Cryptology},
|
||
month = jan,
|
||
year = 1988,
|
||
}
|
||
|
||
@inproceedings{ chakravarty08identifying,
|
||
author = {Sambuddho Chakravarty and Angelos Stavrou and
|
||
Angelos D. Keromytis},
|
||
title = {Identifying Proxy Nodes in a {Tor} Anonymization Circuit},
|
||
booktitle = {\bibconf{SITIS}{Signal Image Technology
|
||
and Internet Based Systems}},
|
||
month = nov,
|
||
year = 2008,
|
||
location = {Bali, Indonesia},
|
||
}
|
||
|
||
@inproceedings{chen04path,
|
||
author = {Mike Y. Chen and
|
||
Anthony Accardi and
|
||
Emre Kiciman and
|
||
David A. Patterson and
|
||
Armando Fox and
|
||
Eric A. Brewer},
|
||
title = {Path-Based Failure and Evolution Management},
|
||
booktitle = {\bibconf[1st]{NSDI}{USENIX Symposium on Networked System
|
||
Design and Implementation}},
|
||
location = {San Francisco, CA},
|
||
month = mar,
|
||
year = 2004
|
||
}
|
||
|
||
@inproceedings{ cheng12making,
|
||
author = {Cheng Li and Daniel Porto and Allen Clement and
|
||
Johannes Gehrke and Nuno Preguica and Rodrigo Rodrigues},
|
||
title = {Making Geo-Replicated Systems Fast as Possible,
|
||
Consistent when Necessary},
|
||
booktitle = {\bibconf[10th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}},
|
||
month = oct,
|
||
year = 2012,
|
||
}
|
||
|
||
@inproceedings{ cheshire97consistent,
|
||
author = {Stuart Cheshire and Mary Baker},
|
||
title = "{Consistent Overhead Byte Stuffing}",
|
||
booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}},
|
||
month = sep,
|
||
year = 1997
|
||
}
|
||
|
||
@article{ chlamtac03mobile,
|
||
author = {Imrich Chlamtac and Marco Conti and {Jennifer J.-N.} Liu},
|
||
title = {\href{https://www.sciencedirect.com/science/article/abs/pii/S1570870503000131}{Mobile ad hoc networking: imperatives and challenges}},
|
||
journal = {Ad Hoc Networks},
|
||
volume = 1,
|
||
number = 1,
|
||
month = jul,
|
||
year = 2003,
|
||
pages = {13-64},
|
||
}
|
||
|
||
@inproceedings{choudhury11firehose,
|
||
author = {Munmun de Choudhury and Scott Counts and Czerwinski},
|
||
month = {July},
|
||
publisher = {\bibconf{ICWSM}{International AAAI Conference on Weblogs and Social Media}},
|
||
title = {Find Me the Right Content! Diversity-based Sampling of Social Media Content for
|
||
Topic-centric Search.},
|
||
year = {2011},
|
||
}
|
||
|
||
@inproceedings{chuanxiong08dcell,
|
||
author = {Chuanxiong Guo and
|
||
Haitao Wu and
|
||
Kun Tan and
|
||
Lei Shi and
|
||
Yongguang Zhang and
|
||
Songwu Lu},
|
||
title = {{DCell}: {A} Scalable and Fault-tolerant Network
|
||
Structure for Data Centers},
|
||
booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}},
|
||
location = {Seattle, WA},
|
||
month = aug,
|
||
year = 2008
|
||
}
|
||
|
||
@inproceedings{ chun03planetlab,
|
||
author = {Brent Chun and others},
|
||
title = {{PlanetLab}: An Overlay Testbed for Broad-Coverage Services},
|
||
booktitle = {ACM \bibbrev{CCR}{Computer Communications Review}},
|
||
month = jul,
|
||
year = 2003,
|
||
}
|
||
|
||
@inproceedings{ clarke00freenet,
|
||
author = {Ian Clarke and Oskar Sandberg and Brandon Wiley
|
||
and Theodore W. Hong},
|
||
title = {{Freenet}: A Distributed Anonymous Information
|
||
Storage and Retrieval System},
|
||
booktitle = {Workshop on Design Issues in
|
||
Anonymity and Unobservability},
|
||
month = jul,
|
||
year = 2000,
|
||
location = {Berkeley, CA, USA},
|
||
}
|
||
|
||
@inproceedings{ clark07usability,
|
||
author = {Clark, Jeremy and van Oorschot, P. C. and Adams, Carlisle},
|
||
title = {Usability of anonymous web browsing: an examination of Tor interfaces and deployability},
|
||
booktitle = {\bibconf{SOUPS}{Symposium on Usable privacy and security}},
|
||
year = {2007},
|
||
}
|
||
|
||
@inproceedings{ cox06bos,
|
||
author = {Cox, Richard S. and Gribble, Steven D. and Levy, Henry M. and Hansen, Jacob Gorm},
|
||
title = {A Safety-Oriented Platform for Web Applications},
|
||
booktitle = {IEEE \bibconf{SP}{Security and Privacy}},
|
||
year = {2006},
|
||
}
|
||
|
||
@inproceedings{ corrigangibbs10dissent,
|
||
author = {Corrigan-Gibbs, Henry and Ford, Bryan},
|
||
title = {{Dissent}: accountable anonymous group messaging},
|
||
booktitle = {\bibconf[17th]{CCS}{ACM Conference on Computer and Communications Security}},
|
||
month = oct,
|
||
year = {2010},
|
||
}
|
||
|
||
@unpublished{ corrigangibbs10dissenterr1,
|
||
author = {Corrigan-Gibbs, Henry and Ford, Bryan},
|
||
title = {Dissent: Accountable Anonymous Group Messaging, Eratum},
|
||
year = {2010},
|
||
note = {\url{http://dedis.cs.yale.edu/2010/anon/papers/ccs10/erratum.pdf}},
|
||
}
|
||
|
||
@inproceedings{ corrigangibbs12scavenging,
|
||
author = {Corrigan-Gibbs, Henry and Ford, Bryan},
|
||
title = {Scavenging for Anonymity with {BlogDrop} (Abstract)},
|
||
booktitle = {Provable Privacy Workshop},
|
||
month = jul,
|
||
year = 2012,
|
||
location = {Vigo, Spain},
|
||
}
|
||
|
||
@inproceedings{corrigangibbs2014riposte,
|
||
title={Riposte: An Anonymous Messaging System Handling Millions of Users},
|
||
author={Corrigan-Gibbs, Henry and Boneh, Dan and Mazieres, David},
|
||
booktitle = {IEEE \bibconf{SP}{Security and Privacy}},
|
||
year={2014}
|
||
}
|
||
|
||
@article{cutillo09safebook,
|
||
title={Safebook: A privacy-preserving online social network leveraging on real-life trust},
|
||
author={Cutillo, Leucio Antonio and Molva, Refik and Strufe, Thorsten},
|
||
journal={Communications Magazine, {IEEE}},
|
||
year={2009},
|
||
}
|
||
|
||
%D
|
||
|
||
@inproceedings{ danezis03mixminion,
|
||
author = {George Danezis and Roger Dingledine and Nick Mathewson},
|
||
title = {{Mixminion}: Design of a {Type III}
|
||
Anonymous Remailer Protocol},
|
||
booktitle = {IEEE \bibconf{SP}{Security and Privacy}},
|
||
month = may,
|
||
year = 2003,
|
||
}
|
||
|
||
@article{ dana97global,
|
||
author = {Peter H. Dana},
|
||
title = {\href{https://link.springer.com/article/10.1023%2FA%3A1007906014916}{Global Positioning System (GPS) Time Dissemination for Real-Time Applications}},
|
||
journal = {Real Time Systems},
|
||
month = jan,
|
||
year = 1997,
|
||
volume = 12,
|
||
number = 1,
|
||
pages = {9-40},
|
||
}
|
||
|
||
@article{dean13tail,
|
||
title={The tail at scale},
|
||
author={Dean, Jeffrey and Barroso, Luiz Andr{\'e}},
|
||
journal={Communications of the ACM},
|
||
volume={56},
|
||
number={2},
|
||
pages={74--80},
|
||
year={2013},
|
||
publisher={ACM}
|
||
}
|
||
|
||
@article{ deering90multicast,
|
||
author = {Stephen E. Deering and David R. Cheriton},
|
||
title = {\href{http://dl.acm.org/citation.cfm?id=78953}{Multicast Routing in Datagram Internetworks
|
||
and Extended {LANs}}},
|
||
journal = {ACM Transactions on Computer Systems},
|
||
month = may,
|
||
year = 1990,
|
||
volume = 8,
|
||
number = 2,
|
||
url = {http://dl.acm.org/citation.cfm?id=78953},
|
||
}
|
||
|
||
@misc{ deterlab,
|
||
key = {DeterLab},
|
||
title = {\href{http://isi.deterlab.net/}{{DeterLab} Network Security Testbed}},
|
||
url = {http://isi.deterlab.net/},
|
||
month = {September},
|
||
year = {2012},
|
||
}
|
||
|
||
@book{ dicke92franchising,
|
||
author = {Thomas S. Dicke},
|
||
title = {Franchising in America},
|
||
publisher = {University of North Carolina Press},
|
||
year = 1992,
|
||
},
|
||
|
||
@inproceedings{ dingledine02reliable,
|
||
author = {Roger Dingledine and Paul Syverson},
|
||
title = {Reliable {MIX} Cascade Networks through Reputation},
|
||
booktitle = {Financial Cryptography},
|
||
month = mar,
|
||
year = 2002,
|
||
location = {Southampton, Bermuda},
|
||
}
|
||
|
||
@inproceedings{ dingledine04tor,
|
||
author = {Dingledine, Roger and Mathewson, Nick and Syverson, Paul},
|
||
title = {\href{https://dl.acm.org/citation.cfm?id=1251375.1251396}{Tor:
|
||
the second-generation onion router}},
|
||
booktitle = {12th USENIX Security Symposium},
|
||
month = aug,
|
||
year = {2004},
|
||
}
|
||
|
||
@inproceedings{ dingledine04synchronous,
|
||
author = {Roger Dingledine and Vitaly Shmatikov and Paul Syverson},
|
||
title = {Synchronous Batching: From Cascades to Free Routes},
|
||
booktitle = {\bibbrev{WPET}{Workshop on
|
||
Privacy Enhancing Technologies}},
|
||
month = may,
|
||
year = 2004,
|
||
location = {Toronto, Canada},
|
||
}
|
||
|
||
@misc{ dingledine06design,
|
||
author = {Roger Dingledine and Nick Mathewson},
|
||
title = {Design of a blocking-resistant anonymity system},
|
||
month = nov,
|
||
year = 2006,
|
||
note = {Tor Project technical report,
|
||
\url{https://svn.torproject.org/svn/projects/design-paper/blocking.html}},
|
||
}
|
||
|
||
@misc{ dingledine13guards,
|
||
author = {Roger Dingledine},
|
||
note = {\url{https://blog.torproject.org/blog/improving-tors-anonymity-changing-guard-parameters}},
|
||
year = {2013},
|
||
title = {Improving Tor's anonymity by changing guard parameters},
|
||
}
|
||
|
||
@misc{ torproject,
|
||
key = {Tor},
|
||
title = {Tor: {A}nonymity {O}nline},
|
||
author = {},
|
||
note = {\url{https://www.torproject.org}}
|
||
}
|
||
|
||
@misc{ torslow,
|
||
title = {Why is {Tor} so slow?},
|
||
author = {},
|
||
note = {\\ \url{https://www.torproject.org/docs/faq.html.en\#WhySlow}}
|
||
}
|
||
|
||
@misc{ tormetrics,
|
||
key = {Tor Metrics Portal},
|
||
title = {Tor Metrics Portal},
|
||
author = {},
|
||
note = {\\ \url{http://metrics.torproject.org/}},
|
||
}
|
||
|
||
@inproceedings{ dingledine06blending,
|
||
author = {Roger Dingledine and Andrei Serjantov and Paul Syverson},
|
||
title = {Blending different latency traffic with alpha-mixing},
|
||
booktitle = {\bibconf[6th]{WPET}{Workshop on
|
||
Privacy Enhancing Technologies}},
|
||
month = jun,
|
||
year = 2006,
|
||
location = {Cambridge, UK},
|
||
}
|
||
|
||
@misc{ dingledine12how,
|
||
author = {Roger Dingledine and Jacob Appelbaum},
|
||
title = {How governments have tried to block {Tor}},
|
||
year = 2012,
|
||
note = {Tor project presentation,
|
||
\url{https://svn.torproject.org/svn/projects/presentations/slides-28c3.pdf}},
|
||
}
|
||
|
||
@article{ dolev00xor,
|
||
author = {Shlomi Dolev and Rafail Ostrovsky},
|
||
title = {Xor-Trees for Efficient Anonymous Multicast and Reception},
|
||
journal = {\bibbrev{TISSEC}{ACM Transactions on
|
||
Information and System Security}},
|
||
month = may,
|
||
year = 2000,
|
||
}
|
||
|
||
@inproceedings{ douceur02sybil,
|
||
author = {John R. Douceur},
|
||
title = {\href{http://research.microsoft.com/pubs/74220/IPTPS2002.pdf}{The {Sybil} Attack}},
|
||
booktitle = {\bibconf[1st]{IPTPS}{International Workshop on Peer-to-Peer
|
||
Systems}},
|
||
location = {Cambridge, MA},
|
||
month = mar,
|
||
year = 2002,
|
||
url = {http://research.microsoft.com/pubs/74220/IPTPS2002.pdf},
|
||
}
|
||
|
||
@misc{ ducklin09facebook,
|
||
author = {Paul Ducklin},
|
||
title = {{Sophos Australia Facebook ID probe 2009}},
|
||
month = dec,
|
||
day = 6,
|
||
year = 2009,
|
||
note = {\url{http://www.sophos.com/blogs/duck/g/2009/12/06/facebook-id-probe-2009/}},
|
||
}
|
||
|
||
@inproceedings{ dukkipati05processor,
|
||
author = {Nandita Dukkipati and Masayoshi Kobayashi and Rui Zhang-Shen
|
||
and Nick McKeown},
|
||
title = {Processor Sharing Flows in the {Internet}},
|
||
booktitle = {\bibbrev{IWQoS}{13th International Workshop on
|
||
Quality of Service (IWQoS)}},
|
||
location = {Passau, Germany},
|
||
month = jun,
|
||
year = 2005,
|
||
}
|
||
|
||
@inproceedings{ dukkipati06rcpac,
|
||
author = {Nandita Dukkipati and Nick McKeown and Alexander G. Fraser},
|
||
title = {{RCP-AC}: Congestion Control to make flows complete quickly
|
||
in any environment},
|
||
booktitle = {High-Speed Networking Workshop: The Terabits Challenge},
|
||
location = {Barcelona, Spain},
|
||
month = apr,
|
||
year = 2006,
|
||
}
|
||
|
||
@inproceedings{dukkipati11proportional,
|
||
author = {Nandita Dukkipati and Matt Mathis and
|
||
Yuchung Cheng and Monia Ghobadi},
|
||
title = {Proportional Rate Reduction for {TCP}},
|
||
booktitle = {\bibconf{IMC}{Internet Measurement Conference}},
|
||
month = nov,
|
||
year = {2011},
|
||
location = {Berlin, Germany},
|
||
}
|
||
|
||
%E
|
||
|
||
@article{eastlake99domain,
|
||
title={Domain name system security extensions},
|
||
author={Eastlake, Donald E and others},
|
||
year={1999}
|
||
}
|
||
|
||
@inproceedings{ eckersley10browser,
|
||
author = {Peter Eckersley},
|
||
title = {How Unique Is Your Web Browser?},
|
||
booktitle = {\bibbrev{PETS}{Privacy-Enhancing
|
||
Technologies Symposium}},
|
||
month = jul,
|
||
year = 2010,
|
||
}
|
||
|
||
@inproceedings{ edman09awareness,
|
||
author = {Edman, Matthew and Syverson, Paul},
|
||
title = {As-awareness in Tor path selection},
|
||
booktitle = {\bibconf{CCS}{ACM conference on Computer and communications security}},
|
||
year = {2009},
|
||
}
|
||
|
||
@inproceedings{ ekwall02robust,
|
||
author = {Richard Ekwall and Peter Urban and Andre Schiper},
|
||
title = "{Robust TCP Connections for Fault Tolerant Computing}",
|
||
booktitle = "{International Conference on Parallel and Distributed Systems (ICPADS)}",
|
||
location = {Taiwan},
|
||
month = dec,
|
||
year = 2002,
|
||
}
|
||
|
||
@incollection{ elgamal85public,
|
||
author = {Taher ElGamal},
|
||
title = {A Public Key Cryptosystem and a Signature Scheme Based on Discrete Logarithms},
|
||
booktitle = {Advances in Cryptology},
|
||
series = {Lecture Notes in Computer Science},
|
||
editor = {Blakley, George and Chaum, David},
|
||
publisher = {Springer Berlin / Heidelberg},
|
||
url = {http://dx.doi.org/10.1007/3-540-39568-7_2},
|
||
year = {1985}
|
||
}
|
||
|
||
@inproceedings{elahi12guards,
|
||
author = {Elahi, Tariq and Bauer, Kevin and AlSabah, Mashael and Dingledine, Roger and Goldberg, Ian},
|
||
title = {Changing of the Guards: A Framework for Understanding and Improving Entry Guard Selection in Tor},
|
||
booktitle = {\bibconf{WPES}{Workshop on Privacy in the Electronic Society}},
|
||
year = {2012},
|
||
}
|
||
|
||
@misc{ emulab,
|
||
key = {Emulab},
|
||
title = {Emulab Network Emulation Testbed},
|
||
note = {\url{http://emulab.net/}},
|
||
year = {2012},
|
||
month = {September}
|
||
}
|
||
|
||
@misc{ erratasec12lulzsec,
|
||
author = {Errata Security},
|
||
title = {Notes on {Sabu} arrest},
|
||
year = {2012},
|
||
month = march,
|
||
note = {\url{http://blog.erratasec.com/2012/03/notes-on-sabu-arrest.html}},
|
||
}
|
||
|
||
@article{ethereum18shardingspec,
|
||
author = {},
|
||
title = {\href{https://github.com/ethereum/sharding/blob/develop/docs/doc.md#validator-manager-contract-vmc}{Ethereum's Sharding Specification}},
|
||
year={2018}
|
||
}
|
||
|
||
@misc{evdokimov_redsocks,
|
||
author = {Leonid Evdokimov},
|
||
title = {{redsocks - transparent socks redirector}},
|
||
note = {\url{http://darkk.net.ru/redsocks/}},
|
||
}
|
||
|
||
@misc{ ewasm,
|
||
key = {ewasm},
|
||
title = {\href{https://github.com/ewasm/design}{Ethereum flavored WebAssembly (ewasm)}},
|
||
note = {\url{https://github.com/ewasm/design}},
|
||
}
|
||
|
||
%F
|
||
|
||
@inproceedings{ fall03delay,
|
||
author = {Kevin Fall},
|
||
title = {A Delay-Tolerant Network Architecture
|
||
for Challenged {Internets}},
|
||
booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}},
|
||
month = aug,
|
||
year = 2003,
|
||
location = {Karlsruhe, Germany},
|
||
}
|
||
|
||
@misc{ feigenbaum06portia,
|
||
author = {J. Feigenbaum and D. J. {Weitzner, eds.}},
|
||
title = {Report on the 2006 {PORTIA/TAMI} Workshop
|
||
on Privacy and Accountability},
|
||
month = jun,
|
||
year = 2006,
|
||
}
|
||
|
||
@misc{ feigenbaum06report,
|
||
author = {Joan Feigenbaum and Daniel J. Weitzner},
|
||
title = {Report on the 2006 {PORTIA/TAMI} Workshop
|
||
on Privacy and Accountability},
|
||
month = jun,
|
||
year = 2006,
|
||
note = {\url{http://dig.csail.mit.edu/2006/tami-portia-accountability-ws/summary}},
|
||
}
|
||
|
||
@inproceedings{ feigenbaum07probabilistic,
|
||
author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
|
||
title = {Probabilistic Analysis of Onion Routing in a Black-box Model},
|
||
booktitle = {\bibconf[6th]{WPES}{Workshop on Privacy
|
||
in the Electronic Society}},
|
||
location = {Alexandria, VA},
|
||
month = oct,
|
||
year = 2007,
|
||
}
|
||
|
||
@inproceedings{ feigenbaum07model,
|
||
author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
|
||
title = {A Model of Onion Routing with Provable Anonymity},
|
||
booktitle = {Financial Cryptography},
|
||
month = feb,
|
||
year = 2007,
|
||
}
|
||
|
||
@inproceedings{ feigenbaum10preventing,
|
||
author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
|
||
title = {Preventing Active Timing Attacks in
|
||
Low-Latency Anonymous Communication (Extended Abstract)},
|
||
booktitle = {10th \bibbrev{PETS}{Privacy-Enhancing
|
||
Technologies Symposium}},
|
||
month = jul,
|
||
year = 2010,
|
||
note = {See also UT Austin CS Department TR 1965},
|
||
}
|
||
|
||
@article{ feigenbaum12probabilistic,
|
||
author = {Joan Feigenbaum and Aaron Johnson and Paul Syverson},
|
||
title = {Probabilistic Analysis of Onion Routing in a Black-Box Model},
|
||
journal = {\bibconf{TISSEC}{ACM Transactions on Information and System Security}},
|
||
month = nov,
|
||
year = 2012,
|
||
}
|
||
|
||
@inproceedings{ felt17measuring,
|
||
author = {Adrienne Porter Felt and Richard Barnes and April King and Chris
|
||
Palmer and Chris Bentzel and Parisa Tabriz},
|
||
title =
|
||
{\href{https://www.usenix.org/conference/usenixsecurity17/technical-sessions/presentation/felt}{Measuring
|
||
{HTTPS} Adoption on the Web}},
|
||
booktitle = {{USENIX} Security Symposium},
|
||
month = aug,
|
||
year = {2017},
|
||
pages = {1323--1338}
|
||
}
|
||
|
||
@inproceedings{ fidge88timestamps,
|
||
title={\href{https://zoo.cs.yale.edu/classes/cs426/2012/lab/bib/fidge88timestamps.pdf}{Timestamps in Message-Passing Systems That Preserve the Partial Ordering}},
|
||
author={Colin J. Fidge},
|
||
booktitle = {11th \bibbrev{ACSC}{Australian Computer Science Conference}},
|
||
year={1988}
|
||
}
|
||
|
||
@inproceedings{ fifield12evading,
|
||
title = {Evading censorship with browser-based proxies},
|
||
author = {Fifield, David and Hardison, Nate and
|
||
Ellithorpe, Jonathan and Stark, Emily and
|
||
Boneh, Dan and Dingledine, Roger and Porras, Phil},
|
||
booktitle = {12th \bibbrev{PETS}{Privacy Enhancing Technologies Symposium}},
|
||
year = {2012},
|
||
}
|
||
|
||
@article{fitzpatrick04memcached,
|
||
title = {Distributed Caching with Memcached},
|
||
author = {Brad Fitzpatrick},
|
||
journal = {Linux Journal},
|
||
year = {2004},
|
||
month = aug,
|
||
note = {http://www.linuxjournal.com/article/7451},
|
||
}
|
||
|
||
@inproceedings{flach13reducing,
|
||
author = {Tobias Flach and Nandita Dukkipati and
|
||
Andreas Terzis and Barath Raghavan and
|
||
Neal Cardwell and Yuchung Cheng and
|
||
Ankur Jain and Shuai Hao and
|
||
Ethan Katz-Bassett and Ramesh Govindan},
|
||
title = {Reducing Web Latency: the Virtue of Gentle Aggression},
|
||
booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}},
|
||
year = {2013},
|
||
month = aug,
|
||
location = {Hong Kong, China},
|
||
}
|
||
|
||
@inproceedings{ ford07structured,
|
||
title = {Structured Streams: a New Transport Abstraction},
|
||
author = {Bryan Ford},
|
||
booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}},
|
||
year = {2007},
|
||
month = aug,
|
||
location = {Kyoto, Japan},
|
||
}
|
||
|
||
@inproceedings{ ford08breaking,
|
||
author = {Bryan Ford and Janardhan Iyengar},
|
||
title = {Breaking Up the Transport Logjam},
|
||
booktitle = {\bibbrev{HotNets-VII}{7th Workshop
|
||
on Hot Topics in Networks (HotNets-VII)}},
|
||
location = {Calgary, Alberta, Canada},
|
||
month = oct,
|
||
day = 6,
|
||
year = 2008,
|
||
}
|
||
|
||
@inproceedings{ ford09efficient,
|
||
author = {Bryan Ford and Janardhan Iyengar},
|
||
title = {Efficient Cross-Layer Negotiation},
|
||
booktitle = {\bibbrev{HotNets-VIII}{8th Workshop
|
||
on Hot Topics in Networks (HotNets-VIII)}},
|
||
location = {New York City, NY},
|
||
month = oct,
|
||
day = 22,
|
||
year = 2009,
|
||
}
|
||
|
||
@misc{ ford09flow,
|
||
author = {Janardhan Iyengar and Bryan Ford},
|
||
title = {Flow Splitting with Fate Sharing in a
|
||
Next Generation Transport Services Architecture},
|
||
month = dec,
|
||
year = 2009,
|
||
note = {\url{http://arxiv.org/abs/0912.0921}},
|
||
}
|
||
|
||
@inproceedings{freedman02tarzan,
|
||
title = {Tarzan: A peer-to-peer anonymizing network layer},
|
||
author = {Freedman, Michael J. and Morris, Robert},
|
||
booktitle = {\bibconf[9th]{CCS}{ACM Conference on Computer and Communications Security}},
|
||
year = {2002}
|
||
}
|
||
|
||
@inproceedings{freedman04coral,
|
||
author = {Michael J. Freedman and Eric Freudenthal and David Mazi\`{e}res},
|
||
title = {Democratizing Content Publication with {C}oral},
|
||
booktitle = {\bibconf[1st]{NSDI}{USENIX Symposium on Networked System
|
||
Design and Implementation}},
|
||
location = {San Francisco, CA},
|
||
month = mar,
|
||
year = 2004
|
||
}
|
||
|
||
@inproceedings{ fujisaki07traceable,
|
||
author = {Eiichiro Fujisaki and Koutarou Suzuki},
|
||
title = {Traceable Ring Signature},
|
||
booktitle = {\bibconf[10th]{PKC}{International Conference on
|
||
Theory and Practice of Public Key Cryptography}},
|
||
month = apr,
|
||
year = 2007,
|
||
location = {Beijing, China},
|
||
}
|
||
|
||
@inproceedings{ furukawa01efficient,
|
||
author = {Jun Furukawa and
|
||
Kazue Sako},
|
||
title = {An Efficient Scheme for Proving a Shuffle},
|
||
booktitle = {\bibconf{CRYPTO}{IACR International Cryptology Conference}},
|
||
location = {Santa Barbara, CA},
|
||
month = aug,
|
||
year = 2001
|
||
}
|
||
|
||
%G
|
||
|
||
@inproceedings{gedik05location,
|
||
author={Gedik, B. and Ling Liu},
|
||
booktitle={IEEE \bibconf{ICDCS}{International Conference on Distributed Computing Systems}},
|
||
title={Location Privacy in Mobile Systems: A Personalized Anonymization Model},
|
||
year={2005},
|
||
month={june},
|
||
}
|
||
|
||
@article{gettys11bufferbloat,
|
||
title = {{Bufferbloat}: Dark Buffers in the Internet},
|
||
author = {Jim Gettys and Kathleen Nichols},
|
||
journal = {{ACM} queue},
|
||
year = {2011},
|
||
month = nov,
|
||
note = {http://queue.acm.org/detail.cfm?id=2071893},
|
||
}
|
||
|
||
@inproceedings{ ghinita07prive,
|
||
author = {Ghinita, Gabriel and Kalnis, Panos and Skiadopoulos, Spiros},
|
||
title = {{PRIVE}: anonymous location-based queries in distributed mobile systems},
|
||
booktitle = {\bibconf[16th]{WWW}{International
|
||
World Wide Web Conference}},
|
||
month = may,
|
||
year = {2007},
|
||
location = {Banff, Alberta, Canada},
|
||
}
|
||
|
||
@inproceedings{ ghobadi12trickle,
|
||
author = {Monia Ghobadi and Yuchung Cheng and
|
||
Ankur Jain and Matt Mathis},
|
||
title = {{Trickle}: Rate Limiting {YouTube} Video Streaming},
|
||
booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}},
|
||
month = jun,
|
||
year = {2012},
|
||
location ={Boston, MA},
|
||
}
|
||
|
||
@inproceedings{gill11understanding,
|
||
author = {Phillipa Gill and
|
||
Navendu Jain and
|
||
Nachiappan Nagappan},
|
||
title = {Understanding Network Failures in Data Centers:
|
||
{M}easurement, Analysis, and Implications},
|
||
booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}},
|
||
location = {Toronto, Canada},
|
||
month = aug,
|
||
year = 2011
|
||
}
|
||
|
||
|
||
@inproceedings{ goel02supporting,
|
||
author = {Ashvin Goel and Charles Krasic and Kang Li
|
||
and Jonathan Walpole},
|
||
title = {Supporting low latency {TCP}-based media streams},
|
||
booktitle = {\bibconf[10th]{IWQoS}{International Workshop
|
||
on Quality of Service}},
|
||
month = may,
|
||
year = 2002,
|
||
location = {Miami Beach, FL},
|
||
}
|
||
|
||
@techreport{ goel03herbivore,
|
||
title = {{Herbivore}: A Scalable and Efficient Protocol for Anonymous Communication},
|
||
author = {Sharad Goel and Mark Robson and Milo Polte and Emin Gun Sirer},
|
||
institution = {Cornell University},
|
||
number = {2003-1890},
|
||
year = {2003},
|
||
month = {February},
|
||
www_pdf_url = {http://www.cs.cornell.edu/People/egs/papers/herbivore-tr.pdf},
|
||
}
|
||
|
||
@article{ goldschlag99onion,
|
||
author = {David Goldschlag and Michael Reed and Paul Syverson},
|
||
title = {Onion Routing for Anonymous and Private Internet Connections},
|
||
journal = {Communications of the ACM},
|
||
month = feb,
|
||
year = 1999,
|
||
volume = 42,
|
||
number = 2,
|
||
}
|
||
|
||
@article{ golijan12privacy,
|
||
author = {Rosa Golijan},
|
||
title = {Consumer {Reports}: {Facebook} privacy problems are on the rise},
|
||
year = {2012},
|
||
month = may,
|
||
howpublished = {\url{http://www.nbcnews.com/technology/consumer-reports-facebook-privacy-problems-are-rise-749990}},
|
||
}
|
||
|
||
@inproceedings{ gollakota08zigzag,
|
||
author = {Shyamnath Gollakota and Dina Katabi},
|
||
title = {ZigZag Decoding: Combating Hidden Terminals
|
||
in Wireless Networks},
|
||
booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}},
|
||
month = aug,
|
||
year = 2008,
|
||
location = {Seattle, WA},
|
||
}
|
||
|
||
@inproceedings{ golle04dining,
|
||
author = {Philippe Golle and
|
||
Ari Juels},
|
||
title = {Dining Cryptographers Revisited},
|
||
booktitle = {\bibconf{EUROCRYPT}{International Conference on Theory and
|
||
Applications of Cryptographic Techniques}},
|
||
location = {Interlaken, Switzerland},
|
||
month = may,
|
||
year = 2004
|
||
}
|
||
|
||
@inproceedings{ gopal11torchestra,
|
||
author = {Gopal, Deepika and Heninger, Nadia},
|
||
title = {Torchestra: reducing interactive traffic delays over {Tor}},
|
||
booktitle = {\bibconf{WPES}{Workshop on
|
||
Privacy in the Electronic Society}},
|
||
month = oct,
|
||
year = {2012},
|
||
location = {Raleigh, NC},
|
||
}
|
||
|
||
@article{ griffin02stable,
|
||
author = {Timothy G. Griffin and F. Bruce Shepherd and Gordon Wilfong},
|
||
title = {The Stable Paths Problem and Interdomain Routing},
|
||
journal = {Transactions on Networking},
|
||
volume = 10,
|
||
number = 2,
|
||
month = apr,
|
||
year = 2002,
|
||
}
|
||
|
||
@inproceedings{ guha08noyb,
|
||
title={NOYB: Privacy in online social networks},
|
||
author={Guha, Saikat and Tang, Kevin and Francis, Paul},
|
||
booktitle={\bibconf{WOSN}{Workshop on Online social networks}},
|
||
year={2008},
|
||
}
|
||
|
||
@inproceedings{gunawi04deploying,
|
||
author = {Gunawi, Haryadi S. and Arpaci-Dusseau, Andrea C. and Arpaci-Dusseau, Remzi H.},
|
||
title = "{Deploying Safe User-Level Network Services With icTCP}",
|
||
booktitle = {OSDI 04},
|
||
year = {2004},
|
||
publisher = {USENIX Association},
|
||
address = {Berkeley, CA, USA},
|
||
}
|
||
|
||
@inproceedings{guo06delving,
|
||
author = {Lei Guo and Enhua Tan and Songqing Chen and Zhen Xiao and Oliver Spatscheck and Xiaodong Zhang},
|
||
title = {Delving into {Internet} Streaming Media Delivery: a Quality and Resource Utilization Perspective},
|
||
booktitle = {\bibconf{IMC}{Internet Measurement Conference}},
|
||
month = oct,
|
||
year = {2006},
|
||
location = {Rio de Janeiro, Brazil},
|
||
}
|
||
|
||
%H
|
||
|
||
@article{ha08cubic,
|
||
author = {Sangtae Ha and Injong Rhee and Lisong Xu},
|
||
title = {{CUBIC}: a new {TCP}-friendly high-speed {TCP} variant},
|
||
journal = {\bibbrev{ACM SIGOPS} Operating Systems Review},
|
||
volume = {42},
|
||
number = {5},
|
||
year = {2008},
|
||
month = jul,
|
||
}
|
||
|
||
@inproceedings{ haeberlen09netreview,
|
||
author = {Andreas Haeberlen and Ioannis Avramopoulos and
|
||
Jennifer Rexford and Peter Druschel},
|
||
title = {{NetReview}: Detecting when interdomain routing goes wrong},
|
||
booktitle = {6th Symposium on Networked Systems Design
|
||
and Implementation (NSDI '09)},
|
||
month = apr,
|
||
year = 2009,
|
||
location = {Boston, MA},
|
||
}
|
||
|
||
@inproceedings{ han13expressive,
|
||
author = {Seungyeop Han and Vincent Liu and Qifan Pu
|
||
and Simon Peter and Thomas Anderson and Arvind Krishnamurthy
|
||
and David Wetherall},
|
||
title = {Expressive Privacy Control with Pseudonyms},
|
||
booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}},
|
||
month = aug,
|
||
year = 2013,
|
||
location = {Hong Kong},
|
||
}
|
||
|
||
@inproceedings{handley01network,
|
||
author = {Handley, Mark and Paxson, Vern and Kreibich, Christian},
|
||
title = "{Network Intrusion Detection: Evasion, Traffic Normalization, and End-to-end Protocol Semantics}",
|
||
booktitle = {SSYM'01: Proceedings of the 10th conference on USENIX Security Symposium},
|
||
year = {2001},
|
||
}
|
||
|
||
@article{handley06why,
|
||
author = {Handley, M.},
|
||
title = "{Why the Internet only just works}",
|
||
journal = {BT Technology Journal},
|
||
year = {2006},
|
||
doi = {http://dx.doi.org/10.1007/s10550-006-0084-z},
|
||
publisher = {Kluwer Academic Publishers},
|
||
address = {Hingham, MA, USA},
|
||
}
|
||
|
||
@ARTICLE{Hei07IPTV,
|
||
author = {X. Hei and others},
|
||
title = {A Measurement Study of a Large-Scale P2P IPTV System},
|
||
journal = {IEEE Transactions on Multimedia},
|
||
year = {2007},
|
||
}
|
||
|
||
@article{ honda05understanding,
|
||
author = {Osamu Honda and Hiroyuki Ohsaki and Makoto Imase
|
||
and Mika Ishizuka and Junichi Murayama},
|
||
journal = {Proceedings of SPIE},
|
||
volume = 6011,
|
||
pages = {138-146},
|
||
year = 2005,
|
||
}
|
||
|
||
@inproceedings{ honda11possible,
|
||
author = {Michio Honda and Yoshifumi Nishida and Costin Raiciu
|
||
and Adam Greenhalgh and Mark Handley and Hideyuki Tokuda},
|
||
title = {Is it Still Possible to Extend {TCP}?},
|
||
booktitle = {\bibbrev{IMC}{Internet Measurement Conference}},
|
||
month = nov,
|
||
year = 2011,
|
||
location = {Berlin, Germany},
|
||
}
|
||
|
||
@inproceedings{ hopper07how,
|
||
author = {Nicholas Hopper and Eugene Y. Vasserman and Eric Chan-Tin},
|
||
title = {How Much Anonymity does Network Latency Leak?},
|
||
booktitle = {\bibconf{CCS}{ACM Conference on
|
||
Computer and Communications Security}},
|
||
month = oct,
|
||
year = 2007,
|
||
}
|
||
|
||
@inproceedings{ hsiao12lap,
|
||
title={{LAP}: Lightweight anonymity and privacy},
|
||
author = {Hsiao, Hsu-Chun and Kim, Tiffany Hyun-Jin and Perrig, Adrian
|
||
and Yamada, Akira and Nelson, Samuel C. and Gruteser, Marco and Meng, Wei},
|
||
booktitle = {IEEE \bibconf{SP}{Security and Privacy}},
|
||
pages = {506--520},
|
||
year = {2012},
|
||
}
|
||
|
||
@INPROCEEDINGS{Huang08challenges,
|
||
author = {Yan Huang and others},
|
||
title = {Challenges, Design and Analysis of a Large-scale P2P VoD
|
||
System},
|
||
booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}},
|
||
year = {2008}
|
||
}
|
||
|
||
%I
|
||
@misc{ i2p,
|
||
title = {Invisible Internet Project (I2P)},
|
||
note = {\url{http://geti2p.net/en}},
|
||
year = 2015,
|
||
month = jan
|
||
}
|
||
|
||
@inproceedings{ iyengar10minion,
|
||
author = {Janardhan Iyengar and Bryan Ford and Dishant Ailawadi and Syed Obaid Amin and Michael Nowlan and Nabin Tiwari and Jeff Wise},
|
||
title = {Minion---an All-Terrain Packet Packhorse to Jump-Start Stalled Internet Transports},
|
||
booktitle = {PFLDNeT 2010},
|
||
month = nov,
|
||
year = 2010
|
||
}
|
||
|
||
% author = {Janardhan Iyengar and others},
|
||
@inproceedings{ iyengar12minion,
|
||
author = {Michael F. Nowlan and Nabin Tiwari and
|
||
Janardhan Iyengar and Syed Obaid Amin and Bryan Ford},
|
||
title = {Fitting Square Pegs Through Round Pipes:
|
||
Unordered Delivery Wire-Compatible with {TCP} and {TLS}},
|
||
month = apr,
|
||
year = {2012}
|
||
}
|
||
|
||
% XXX full version (currently arxiv/TR, maybe journal in future?)
|
||
% author = {Janardhan Iyengar and others},
|
||
@misc{ iyengar12minion-full,
|
||
author = {Janardhan Iyengar and Syed Obaid Amin and
|
||
Michael F. Nowlan and Nabin Tiwari and Bryan Ford},
|
||
title = {Minion: Unordered Delivery Wire-Compatible with {TCP} and {TLS}
|
||
(Full Version)},
|
||
month = apr,
|
||
year = 2012,
|
||
note = {Technical Report. \texttt{arXiv:1103.0463}}
|
||
}
|
||
|
||
@misc{ itu01pesq,
|
||
author = {\abbr{ITU}{International Telecommunication Union}},
|
||
title = {P.862: Perceptual evaluation of speech quality {(PESQ)}},
|
||
month = feb,
|
||
year = 2001,
|
||
}
|
||
|
||
@misc{ itu03transtime,
|
||
author = {\abbr{ITU}{International Telecommunication Union}},
|
||
title = {Recommendation {G.114}: One-way Transmission Time},
|
||
month = may,
|
||
year = 2003,
|
||
}
|
||
|
||
@misc{ itu05impl,
|
||
author = {ITU-T Telecommunication Standardization Sector of ITU},
|
||
title = {Recommendation P.862 (2001) Amendment 2 (11/05) reference
|
||
implementation and conformance testing},
|
||
month = nov,
|
||
year = 2005,
|
||
note = {\url{http://www.itu.int/rec/T-REC-P.862-200511-I!Amd2/en}}
|
||
}
|
||
|
||
@misc{ itu07wideband,
|
||
author = {ITU-T Telecommunication Standardization Sector of ITU},
|
||
title = {Wideband extension to Recommendation P.862 for the
|
||
assessment of wideband telephone networks and
|
||
speech codecs},
|
||
month = nov,
|
||
year = 2007,
|
||
url = {http://www.itu.int/rec/dologin_pub.asp?lang=e&id=T-REC-P.862.2-200711-I!!PDF-E&type=items}
|
||
}
|
||
|
||
@inproceedings{ iwanik04duo,
|
||
author = {Jan Iwanik and Marek Klonowski and Miroslaw Kutylowski},
|
||
title = {{DUO-Onions} and {Hydra-Onions} --
|
||
failure and adversary resistant onion protocols},
|
||
booktitle = {\bibbrev{IFIP CMS}{IFIP TC-6 TC-11 Conference on
|
||
Communications and Multimedia Security}},
|
||
month = sep,
|
||
year = 2004,
|
||
},
|
||
|
||
%J
|
||
|
||
@inproceedings{jahid11easier,
|
||
title={{EASiER}: Encryption-based access control in social networks with efficient revocation},
|
||
author={Jahid, Sonia and Mittal, Prateek and Borisov, Nikita},
|
||
booktitle={\bibconf{ASIACCS}{ACM Symposium on Information, Computer and Communications Security}},
|
||
year={2011},
|
||
}
|
||
|
||
@inproceedings{ jones11hiding,
|
||
author = {Nicholas Jones and Matvey Arye and Jacopo Cesareo
|
||
and Michael J. Freedman},
|
||
title = {Hiding Amongst the Clouds:
|
||
A Proposal for Cloud-based Onion Routing},
|
||
booktitle = {\bibconf{FOCI}{Workshop on Free and Open Communications
|
||
on the Internet}},
|
||
month = aug,
|
||
year = 2011,
|
||
location = {San Francisco, CA},
|
||
}
|
||
|
||
%K
|
||
|
||
|
||
@book{kaminow97optical,
|
||
title={Optical Fiber Telecommunications IIIA},
|
||
author={Kaminow, Ivan P and Koch, Thomas L},
|
||
year={1997},
|
||
publisher={Academic Press, New York}
|
||
}
|
||
|
||
|
||
@misc{kamkar10evercookie,
|
||
author = {Samy Kamkar},
|
||
year = {2010},
|
||
howpublished = {\url{http://http://samy.pl/evercookie/}},
|
||
month = {oct},
|
||
title = {evercookie},
|
||
}
|
||
|
||
@inproceedings{kandula05shrink,
|
||
author = {Srikanth Kandula and
|
||
Dina Katabi and
|
||
Jean-Philippe Vasseur},
|
||
title = {Shrink: {A} Tool for Failure Diagnosis in {IP} Networks},
|
||
booktitle = {MineNet},
|
||
location = {Philadephia, PA},
|
||
month = aug,
|
||
year = 2005
|
||
}
|
||
|
||
@inproceedings{kandula09detailed,
|
||
author = {Srikanth Kandula and
|
||
Ratul Mahajan and
|
||
Patrick Verkaik and
|
||
Sharad Agarwal and
|
||
Jitendra Padhye and
|
||
Paramvir Bahl},
|
||
title = {Detailed Diagnosis in Enterprise Networks},
|
||
booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}},
|
||
location = {Barcelona, Spain},
|
||
month = aug,
|
||
year = 2009
|
||
}
|
||
|
||
@inproceedings{ karlin11decoy,
|
||
author = {Josh Karlin and others},
|
||
title = {Decoy Routing: Toward Unblockable Internet Communication},
|
||
booktitle = {\bibconf{FOCI}{Workshop on Free and Open Communications
|
||
on the Internet}},
|
||
month = aug,
|
||
year = 2011,
|
||
location = {San Francisco, CA},
|
||
}
|
||
|
||
@inproceedings{katz06towards,
|
||
author = {Ethan Katz-Bassett and John P. John and Arvind Krishnamurthy
|
||
and David Wetherall and Thomas Anderson and Yatin Chawathe},
|
||
title = {Towards {IP} Geolocation using delay and topology measurements},
|
||
booktitle = {\bibconf{IMC}{Internet Measurement Conference}},
|
||
month = oct,
|
||
year = {2006},
|
||
location = {Rio de Janeiro, Brazil},
|
||
}
|
||
|
||
@article{kobeissi13cryptocat,
|
||
author = {Nadim Kobeissi and Arlo Breault},
|
||
title = {Cryptocat: Adopting Accessibility and Ease of Use as Security Properties},
|
||
journal = {CoRR},
|
||
url = {\url{http://arxiv.org/abs/1306.5156}},
|
||
}
|
||
|
||
@inproceedings{kompella05ip,
|
||
author = {Ramana Rao Kompella and
|
||
Jennifer Yates and
|
||
Albert G. Greenberg and
|
||
Alex C. Snoeren},
|
||
title = {{IP} Fault Localization Via Risk Modeling},
|
||
booktitle = {\bibconf[2nd]{NSDI}{USENIX Symposium on Networked System
|
||
Design and Implementation}},
|
||
location = {Boston, MA},
|
||
month = may,
|
||
year = 2005
|
||
}
|
||
|
||
|
||
@incollection{ kontaxis11sudoweb,
|
||
title={{SudoWeb}: Minimizing information disclosure to third parties in single sign-on platforms},
|
||
author={Kontaxis, Georgios and Polychronakis, Michalis and Markatos, Evangelos P},
|
||
booktitle={\bibconf{ISC}{Information Security Conference}},
|
||
year={2011},
|
||
}
|
||
|
||
@inproceedings{ kumar10characterization,
|
||
author = {Kumar, Ravi and Tomkins, Andrew},
|
||
title = {A characterization of online browsing behavior},
|
||
booktitle = {\bibconf[19th]{WWW}{International Conference on {World} {Wide} {Web}}},
|
||
year = {2010},
|
||
pages = {561--570},
|
||
}
|
||
|
||
@article{ kung95credit ,
|
||
author = {Kung, N.T. and Morris, R.},
|
||
journal = {Network, IEEE},
|
||
title = {Credit-based flow control for ATM networks},
|
||
year = {1995},
|
||
month = {mar/apr},
|
||
volume = {9},
|
||
number = {2},
|
||
pages = {40 -48},
|
||
doi = {10.1109/65.372658},
|
||
issn={0890-8044},
|
||
}
|
||
|
||
%L
|
||
|
||
@article{ lamport98parttime,
|
||
author = {Leslie Lamport},
|
||
title = {\href{https://dl.acm.org/citation.cfm?id=279229}{The Part-Time Parliament}},
|
||
journal = {ACM Transactions on Computer Systems},
|
||
volume = 16,
|
||
number = 2,
|
||
month = may,
|
||
year = 1989,
|
||
pages = {133-169},
|
||
}
|
||
|
||
@misc{ leblond10deanonymizing,
|
||
author = {Stevens Le Blond and Pere Manils and Abdelberi Chaabane
|
||
and Mohamed Ali Kaafar and Arnaud Legout
|
||
and Claude Castellucia and Walid Dabbous},
|
||
title = {De-anonymizing {BitTorrent} Users on {Tor}},
|
||
month = apr,
|
||
day = 8,
|
||
year = 2010,
|
||
note = {\url{http://arxiv.org/abs/1004.1267}},
|
||
}
|
||
|
||
@inproceedings{ leblond13anon,
|
||
author = {Le Blond, Stevens and Choffnes, David and Zhou, Wenxuan
|
||
and Druschel, Peter and Ballani, Hitesh and Francis, Paul},
|
||
title = {Towards Efficient Traffic-analysis Resistant
|
||
Anonymity Networks},
|
||
booktitle = {{ACM} {SIGCOMM}},
|
||
year = {2013},
|
||
month = {August},
|
||
}
|
||
|
||
@misc{ leger13silkroad,
|
||
author = {Donna Leinwand Leger},
|
||
title = {How FBI brought down cyer-underworld site Silk Road},
|
||
year = {2013},
|
||
note = {\url{http://www.usatoday.com/story/news/nation/2013/10/21/fbi-cracks-silk-road/2984921/}},
|
||
}
|
||
|
||
@article{lelewer87data,
|
||
author = {Lelewer, Debra A. and Hirschberg, Daniel S.},
|
||
title = {Data compression},
|
||
journal = {ACM Computing Surveys},
|
||
volume = {19},
|
||
issue = {3},
|
||
month = {September},
|
||
year = {1987},
|
||
pages = {261-296},
|
||
url = {http://doi.acm.org/10.1145/45072.45074},
|
||
publisher = {ACM},
|
||
address = {New York, NY, USA},
|
||
}
|
||
|
||
@incollection{levine04timing,
|
||
author = {Levine, Brian and Reiter, Michael and Wang, Chenxi and Wright, Matthew},
|
||
title = {Timing Attacks in Low-Latency Mix Systems},
|
||
booktitle = {Financial Cryptography},
|
||
pages = {251-265},
|
||
year = {2004}
|
||
}
|
||
|
||
@inproceedings{levin09trinc,
|
||
title={{TrInc}: Small Trusted Hardware for Large Distributed Systems.},
|
||
author={Levin, Dave and Douceur, John R and Lorch, Jacob R and Moscibroda, Thomas},
|
||
booktitle={NSDI},
|
||
year={2009}
|
||
}
|
||
|
||
@article{ lewandowski91gps,
|
||
author = {Wlodzimierz Lewandowski and Claudine Thomas},
|
||
title = {\href{https://ieeexplore.ieee.org/document/84976/authors#authors}{GPS Time Transfer}},
|
||
journal = {Proceedings of the IEEE},
|
||
volume = 79,
|
||
number = 7,
|
||
month = jul,
|
||
year = 1991,
|
||
pages = {991-1000},
|
||
}
|
||
|
||
@inproceedings{li13efficient,
|
||
author = {Zhenhua Li and Christo Wilson and Zhefu Jiang and Yao Liu and
|
||
Ben Y. Zhao and Cheng Jin and Zhi-Li Zhang and Yafei Dai},
|
||
title = {Efficient Batched Synchronization in {D}ropbox-like
|
||
Cloud Storage Services},
|
||
booktitle = {\bibconf[14th]{Middleware}{ACM/IFIP/USENIX International
|
||
Middleware Conference}},
|
||
location = {Beijing, China},
|
||
month = dec,
|
||
year = 2013
|
||
}
|
||
|
||
@inproceedings{li14network,
|
||
author = {Zhenhua Li and
|
||
Cheng Jin and
|
||
Tianyin Xu and
|
||
Christo Wilson and
|
||
Yao Liu and
|
||
Linsong Cheng and
|
||
Yunhao Liu and
|
||
Yafei Dai and
|
||
Zhi-Li Zhang},
|
||
title = {Towards Network-level Efficiency for Cloud Storage
|
||
Services},
|
||
booktitle = {\bibconf[14th]{IMC}{ACM Internet Measurement Conference}},
|
||
location = {Vancouver, Canada},
|
||
month = nov,
|
||
year = 2014
|
||
}
|
||
|
||
|
||
@inproceedings{ liu04linkable,
|
||
author = {Joseph K. Liu and Victor K. Wei and Duncan S. Wong},
|
||
title = {Linkable Spontaneous Anonymous Group Signature
|
||
for Ad Hoc Groups},
|
||
booktitle = {Australian Conference on
|
||
Information Security and Privacy},
|
||
month = jul,
|
||
year = 2004,
|
||
location = {Sydney, Australia},
|
||
pages = {614--623},
|
||
}
|
||
|
||
@inproceedings{liu13f10,
|
||
author = {Vincent Liu and
|
||
Daniel Halperin and
|
||
Arvind Krishnamurthy and
|
||
Thomas Anderson},
|
||
title = {{F10}: {A} Fault-Tolerant Engineered Network},
|
||
booktitle = {\bibconf[10th]{NSDI}{USENIX Symposium on Networked Systems
|
||
Design and Implementation}},
|
||
location = {Lombard, IL},
|
||
month = apr,
|
||
year = 2013
|
||
}
|
||
|
||
@misc{ lombardi02nist,
|
||
author = {Michael A. Lombardi},
|
||
title = {\href{http://tf.nist.gov/general/pdf/1383.pdf}{NIST Time and Frequency Services}},
|
||
note = {NIST Special Publication 432},
|
||
month = jan,
|
||
year = 2002,
|
||
}
|
||
|
||
@inproceedings{ lumezanu09triangle,
|
||
author = {Cristian Lumezanu and Randy Baden and Neil Spring
|
||
and Bobby Bhattacharjee},
|
||
title = {Triangle Inequality and Routing Policy Violations
|
||
in the {Internet}},
|
||
booktitle = {\bibconf{PAM}{Passive and Active Measurement Conference}},
|
||
month = apr,
|
||
year = 2009,
|
||
location = {Seoul, South Korea},
|
||
}
|
||
|
||
@inproceedings{ lv02search,
|
||
author = {Qin Lv and Pei Cao and Edith Cohen and
|
||
Kai Li and Scott Shenker},
|
||
booktitle = {\bibconf[16th]{ICS}{International Conference on Supercompiting}},
|
||
month = jun,
|
||
year = 2002,
|
||
location = {New York City, NY},
|
||
}
|
||
|
||
|
||
%M
|
||
|
||
@inproceedings{madhyastha06iplane,
|
||
author = {Harsha V. Madhyastha and Tomas Isdal and Michael Poatek and Colin Dixon and Tomas E. Anderson and Vrvind Krishnamurthy and Arun Venkataramani},
|
||
title = {{iPlane}:An information plane for distributed services},
|
||
booktitle = {OSDI},
|
||
year = 2006
|
||
}
|
||
|
||
@inproceedings{ maganis12opaak,
|
||
title={Opaak: using mobile phones to limit anonymous identities online},
|
||
author={Maganis, Gabriel and Shi, Elaine and Chen, Hao and Song, Dawn},
|
||
booktitle={\bibconf{MobiSys}{Conference on Mobile systems, applications, and services}},
|
||
year={2012},
|
||
}
|
||
|
||
@article{marko10using,
|
||
author = {Kurt Marko},
|
||
title = "{Using SSL Proxies To Block Unauthorized SSL VPNs}",
|
||
journal = {Processor Magazine, www.processor.com},
|
||
volume = 32,
|
||
number = 16,
|
||
month = jul,
|
||
year = 2010,
|
||
pages = {23}
|
||
}
|
||
|
||
@article{mckeown08openflow,
|
||
author = {Nick McKeown and Tom Anderson and Hari Balakrishnan and
|
||
Guru Parulkar and Larry Peterson and Jennifer Rexford
|
||
and Scott Shenker and Jonathan Turner},
|
||
title = {{OpenFlow}: Enabling Innovation in Campus Networks},
|
||
journal = {ACM SIGCOMM Computer Communication Review},
|
||
volume = 38,
|
||
number = 2,
|
||
pages = {69-74},
|
||
year = 2008,
|
||
}
|
||
|
||
@article{ meushaw00nettop,
|
||
author = {Robert Meushaw and Donald Simard},
|
||
title = {{NetTop}: Commercial Technology in High Assurance Applications},
|
||
journal = {Tech Trend Notes},
|
||
year = 2000,
|
||
}
|
||
|
||
@inproceedings{michalakis07ensuring,
|
||
title={Ensuring content integrity for untrusted peer-to-peer content distribution networks},
|
||
author={Michalakis, Nikolaos and Soul{\'e}, Robert and Grimm, Robert},
|
||
booktitle={Proceedings of the 4th USENIX conference on Networked systems design \& implementation},
|
||
pages={11--11},
|
||
year={2007},
|
||
organization={USENIX Association}
|
||
}
|
||
|
||
|
||
@article{ mills91internet,
|
||
author = {David L. Mills},
|
||
title = {\href{https://ieeexplore.ieee.org/document/103043}{Internet Time Synchronization: The Network Time Protocol}},
|
||
journal = {IEEE Transactions on Communications},
|
||
volume = 39,
|
||
number = 10,
|
||
month = oct,
|
||
year = 1991,
|
||
pages = {1482-1493},
|
||
}
|
||
|
||
@inproceedings{ mislove04ap3,
|
||
author = {Alan Mislove and Gaurav Oberoi and Ansley Post
|
||
and Charles Reis and Peter Druschel and Dan S. Wallach},
|
||
title = {{AP3}: Cooperative, decentralized anonymous communication},
|
||
booktitle = {\bibconf{SIGOPS EW}{ACM SIGOPS European Workshop}},
|
||
month = sep,
|
||
year = 2004,
|
||
location = {Leuven, Belgium},
|
||
}
|
||
|
||
@inproceedings{ mislove07measurement,
|
||
author = {Alan Mislove and Massimiliano Marcon and Krishna P. Gummadi
|
||
and Peter Druschel and Bobby Bhattacharjee},
|
||
title = {Measurement and Analysis of Online Social Networks},
|
||
booktitle = {\bibconf{IMC}{Internet Measurement Conference}},
|
||
month = oct,
|
||
year = 2007,
|
||
location = {San Diego, USA},
|
||
}
|
||
|
||
@inproceedings{ mittal11stealthy,
|
||
author = {Prateek Mittal and Ahmed Khurshid and Joshua Juen
|
||
and Matthew Caesar and Nikita Borisov},
|
||
title = {Stealthy Traffic Analysis of Low-Latency
|
||
Anonymous Communication Using Throughput Fingerprinting},
|
||
booktitle = {\bibconf[18th]{CCS}{ACM Conference on
|
||
Computer and Communications Security}},
|
||
month = oct,
|
||
year = 2011,
|
||
location = {Chicago, IL},
|
||
}
|
||
|
||
@inproceedings{ mockapetris88development,
|
||
author = {Paul V. Mockapetris and Kevin J. Dunlap},
|
||
title = {\href{http://www.dtic.mil/dtic/tr/fulltext/u2/a203901.pdf}{Development of the Domain Name System}},
|
||
booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}},
|
||
month = aug,
|
||
year = 1988,
|
||
location = {Stanford, CA},
|
||
}
|
||
|
||
@inproceedings{moghaddam12skypemorph,
|
||
title = {{SkypeMorph}: Protocol obfuscation for {Tor} bridges},
|
||
author = {Mohajeri Moghaddam, Hooman and Li, Baiyu and
|
||
Derakhshani, Mohammad and Goldberg, Ian},
|
||
booktitle = {\bibconf[19th]{CCS}{ACM Conference on
|
||
Computer and Communications Security}},
|
||
location = {Raleigh, NC},
|
||
month = oct,
|
||
year = 2012
|
||
}
|
||
|
||
@inproceedings{ mogul03tcp,
|
||
author = {Jeff Mogul},
|
||
title = "{TCP} Offload is a Dumb Idea Whose Time Has Come",
|
||
booktitle = {HotOS IX},
|
||
month = may,
|
||
year = 2003
|
||
}
|
||
|
||
@inproceedings{ molteni02using,
|
||
author = {M. Molteni and M. Villari},
|
||
title = "{Using SCTP with Partial Reliability for MPEG-4 Multimedia Streaming}",
|
||
booktitle = {BSDCon Europe},
|
||
month = oct,
|
||
year = 2002
|
||
}
|
||
|
||
@inproceedings{moreno09elastic,
|
||
author = {Moreno-Vozmediano, Rafael and Montero, Ruben S. and Llorente, Ignacio M.},
|
||
title = {Elastic Management of Cluster-based Services in the Cloud},
|
||
booktitle = {Proceedings of the 1st Workshop on Automated Control for Datacenters and Clouds},
|
||
series = {ACDC '09},
|
||
year = {2009},
|
||
isbn = {978-1-60558-585-7},
|
||
location = {Barcelona, Spain},
|
||
pages = {19--24},
|
||
numpages = {6},
|
||
url = {http://doi.acm.org/10.1145/1555271.1555277},
|
||
doi = {10.1145/1555271.1555277},
|
||
acmid = {1555277},
|
||
publisher = {ACM},
|
||
address = {New York, NY, USA},
|
||
keywords = {cloud computing, cluster-based services, virtualization},
|
||
}
|
||
|
||
@article{muller,
|
||
author = {N.J. Muller},
|
||
title = {Managing Service Level Agreements},
|
||
journal = {International Journal of Network Management},
|
||
volume = {9},
|
||
number = {3},
|
||
year = {1999},
|
||
pages = {155-166},
|
||
publisher = {John Wiley & Sons},
|
||
address = {New York, NY, USA},
|
||
}
|
||
|
||
@inproceedings{ murdoch05low,
|
||
author = {Steven J. Murdoch and George Danezis},
|
||
title = {Low-Cost Traffic Analysis of {Tor}},
|
||
booktitle = {IEEE \bibconf{SP}{Security and Privacy}},
|
||
month = may,
|
||
year = 2005,
|
||
}
|
||
|
||
@techreport{ murdoch11comparison,
|
||
author = {Steven J. Murdoch},
|
||
title = {Comparison of {Tor} Datagram Designs},
|
||
institution = {The Tor Project},
|
||
number = {2011-11-001},
|
||
year = {2011},
|
||
month = {November},
|
||
url = {https://research.torproject.org/techreports/datagram-comparison-2011-11-07.pdf}
|
||
}
|
||
|
||
@inproceedings{mysore09portland,
|
||
author = {Radhika Niranjan Mysore and
|
||
Andreas Pamboris and
|
||
Nathan Farrington and
|
||
Nelson Huang and
|
||
Pardis Miri and
|
||
Sivasankar Radhakrishnan and
|
||
Vikram Subramanya and
|
||
Amin Vahdat},
|
||
title = {{PortLand}: {A} Scalable Fault-tolerant Layer 2 Data Center
|
||
Network Fabric},
|
||
booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}},
|
||
location = {arcelona, Spain},
|
||
month = aug,
|
||
year = 2009
|
||
}
|
||
|
||
|
||
%N
|
||
|
||
% author = {Preethi Natarajan and Janardhan R. Iyengar and
|
||
% Paul. D. Amer and Randall Stewart},
|
||
@inproceedings{ natarajan06sctp,
|
||
author = {Preethi Natarajan and others},
|
||
title = {{SCTP}: An innovative transport layer protocol
|
||
for the {Web}},
|
||
booktitle = {\bibconf[15th]{WWW}{World Wide Web Conference}},
|
||
location = {Edinburgh, Scotland},
|
||
month = may,
|
||
year = 2006,
|
||
}
|
||
|
||
@inproceedings{natarajan12nsdminer,
|
||
author = {Arun Natarajan and Peng Ning and Yao Liu and
|
||
Sushil Jajodia and Steve E. Hutchinson},
|
||
title = {{NSDMiner}: {A}utomated discovery of network
|
||
service dependencies},
|
||
booktitle = {\bibconf[31st]{INFOCOM}{IEEE INFOCOM}},
|
||
location = {Orlando, FL},
|
||
month = mar,
|
||
year = 2012
|
||
}
|
||
|
||
@inproceedings{neff01verifiable,
|
||
author = {Neff, C. Andrew},
|
||
title = {A verifiable secret shuffle and its application to e-voting},
|
||
booktitle = {\bibconf[8th]{CCS}{ACM Conference on
|
||
Computer and Communications Security}},
|
||
pages={116--125},
|
||
month = nov,
|
||
year = {2001},
|
||
}
|
||
|
||
@article{nichols12controlling,
|
||
title = {Controlling queue delay},
|
||
author = {Kathleen Nichols and Van Jacobson},
|
||
journal = {{ACM} queue},
|
||
year = {2012},
|
||
month = may,
|
||
note = {http://queue.acm.org/detail.cfm?id=2209336},
|
||
}
|
||
|
||
@inproceedings{nobori14vpn,
|
||
title={{VPN} {Gate}: A Volunteer-Organized Public {VPN} Relay System with Blocking Resistance for Bypassing Government Censorship Firewalls},
|
||
author={Nobori, Daiyuu and Shinjo, Yasushi},
|
||
booktitle={\bibconf{NSDI}{Symposium on Networked Systems Design and Implementation}},
|
||
}
|
||
|
||
@book{ northcutt05inside,
|
||
author = {Stephen Northcutt and Lenny Zeltser and Scott Winters and Karen Kent and Ronald Ritchey},
|
||
title = {Inside Network Perimeter Security},
|
||
publisher = {SAMS Publishing},
|
||
year = 2005,
|
||
},
|
||
|
||
|
||
%O
|
||
|
||
@inproceedings{ ongaro14search,
|
||
author = {Diego Ongaro and John Ousterhout},
|
||
title = {In Search of an Understandable Consensus Algorithm},
|
||
booktitle = {\bibconf{USENIX ATC}{USENIX Annual Technical Conference}},
|
||
year = 2014,
|
||
}
|
||
% month = jun,
|
||
% location = {Philadelphia, PA},
|
||
|
||
@article{oreilly2.0,
|
||
author = {Tim O'Reilly},
|
||
title = {What is Web 2.0},
|
||
day = 30,
|
||
month = sep,
|
||
year = 2005,
|
||
publisher = {O'Reilly Media Inc.},
|
||
note = {\url{http://oreilly.com/web2/archive/what-is-web-20.html}},
|
||
}
|
||
|
||
%P
|
||
|
||
@inproceedings{ panchenko11website,
|
||
author = {Andriy Panchenko and Lukas Niessen and Andreas Zinnen
|
||
and Thomas Engel},
|
||
title = {\href{https://anonymous-proxy-servers.net/paper/wpes11-panchenko.pdf}{Website Fingerprinting in Onion Routing Based Anonymization Networks}},
|
||
booktitle = {\bibconf{WPES}{Workshop on Privacy in the
|
||
Electronic Society}},
|
||
month = oct,
|
||
year = 2011,
|
||
}
|
||
|
||
@article{papazoglou03service,
|
||
author = {M. P. Papazoglou, D. Georgakopoulos},
|
||
title = {Service-Oriented Computing: Introduction},
|
||
journal = {Communications of the ACM},
|
||
volume = {46},
|
||
number = {10},
|
||
year = {2003},
|
||
pages = {24-28},
|
||
publisher = {ACM},
|
||
address = {New York, NY, USA},
|
||
}
|
||
|
||
@article{ papazoglou08service,
|
||
author = {Michael P. Papazoglou and others},
|
||
title = {Service-Oriented Computing: a Research Roadmap},
|
||
journal = {Cooperative Information Systems},
|
||
volume = 17,
|
||
number = 2,
|
||
year = 2008,
|
||
pages = {223-255},
|
||
}
|
||
|
||
@inproceedings{ patelSTP,
|
||
author = {P. Patel and others},
|
||
title = {Upgrading Transport Protocols Using Mobile Code},
|
||
booktitle = {19th \bibbrev{SOSP}{{ACM} Symposium on
|
||
Operating Systems Principles (SOSP)}},
|
||
month = oct,
|
||
year = 2003,
|
||
location = {Lake George, NY},
|
||
}
|
||
|
||
@inproceedings{ paterson11tag,
|
||
title={\href{https://www.iacr.org/archive/asiacrypt2011/70730368/70730368.pdf}{Tag
|
||
size does matter: Attacks and proofs for the {TLS} record protocol}},
|
||
author={Paterson, Kenneth G and Ristenpart, Thomas and Shrimpton, Thomas},
|
||
booktitle={International Conference on the Theory and Application of
|
||
Cryptology and Information Security},
|
||
pages={372--389},
|
||
month=dec,
|
||
year={2011}
|
||
}
|
||
|
||
@inproceedings{peddycord12accurate,
|
||
author = {Barry Peddycord III and
|
||
Peng Ning and
|
||
Sushil Jajodia},
|
||
title = {On the Accurate Identification of
|
||
Network Service Dependencies in Distributed Systems},
|
||
booktitle = {\bibconf[26th]{LISA}{Large Installation System
|
||
Administration Conference}},
|
||
location = {San Diego, CA},
|
||
month = dec,
|
||
year = 2012
|
||
}
|
||
|
||
@inproceedings{ perng2006multicasting,
|
||
author={ Perng, G. and Reiter, M.K. and Chenxi Wang},
|
||
booktitle={\bibconf[26th]{ICDCS}{International Conference on
|
||
Distributed Computing Systems}},
|
||
title={{M2}: Multicasting Mixes for
|
||
Efficient and Anonymous Communication},
|
||
year={2006},
|
||
month={},
|
||
volume={},
|
||
number={},
|
||
pages={59-59},
|
||
keywords={},
|
||
doi={10.1109/ICDCS.2006.53},
|
||
ISSN={1063-6927},
|
||
}
|
||
|
||
@inproceedings{popa09macroscope,
|
||
author = {Lucian Popa and
|
||
Byung-Gon Chun and
|
||
Ion Stoica and
|
||
Jaideep Chandrashekar and
|
||
Nina Taft},
|
||
title = {{M}acroscope: {E}nd-point approach to networked application
|
||
dependency discovery},
|
||
booktitle = {CoNEXT},
|
||
year = 2009
|
||
}
|
||
|
||
|
||
@misc{phobos13freedom,
|
||
author = {phobos},
|
||
year = {2013},
|
||
month = {aug},
|
||
title = {Hidden Services, Current Events, and Freedom Hosting},
|
||
howpublished = {\url{https://blog.torproject.org/blog/hidden-services-current-events-and-freedom-hosting}},
|
||
}
|
||
|
||
|
||
@inproceedings{ popa10http,
|
||
author = {Lucian Popa and Ali Ghodsi and Ion Stoica},
|
||
title = {{HTTP} as the Narrow Waist of the Future {Internet}},
|
||
booktitle = {\bibbrev{HotNets-IX}{9th ACM Workshop on
|
||
Hot Topics in Networks (HotNets-IX)}},
|
||
location = {Monterey, CA},
|
||
month = oct,
|
||
year = 2010,
|
||
}
|
||
|
||
@inproceedings{ power10piccolo,
|
||
author = {Russell Power and Jinyang Li},
|
||
title = {Piccolo: Building Fast, Distributed Programs
|
||
with Partitioned Tables},
|
||
booktitle = {\bibconf[9th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}},
|
||
month = oct,
|
||
year = 2010,
|
||
}
|
||
|
||
@misc{ powertutor,
|
||
title = {{PowerTutor}},
|
||
key = {PowerTutor},
|
||
howpublished = {\url{http://powertutor.org/}},
|
||
}
|
||
|
||
@misc{ preston11facebook,
|
||
title = {{Facebook} officials keep quiet in its role in revolts},
|
||
author = {Jennifer Preston},
|
||
howpublished = {New York Times},
|
||
day = 14,
|
||
month = feb,
|
||
year = 2011,
|
||
note = {\url{http://www.nytimes.com/2011/02/15/business/media/15facebook.html}},
|
||
}
|
||
|
||
@misc{ pwn2own,
|
||
title = {Pwn2Own},
|
||
note = {\url{http://www.pwn2own.com/}},
|
||
}
|
||
|
||
%Q
|
||
|
||
@misc{quic,
|
||
key = {{QUIC}},
|
||
title = {{QUIC}: Multiplexed Stream Transport over {UDP}},
|
||
note = {{http://blog.chromium.org/2013/06/experimenting-with-quic.html}},
|
||
}
|
||
|
||
%R
|
||
|
||
% author = {Costin Raiciu and Sebastien Barre and Christopher Pluntke
|
||
% and Adam Greenhalgh and Damon Wischik and Mark Handley},
|
||
@inproceedings{ raiciu11improving,
|
||
author = {Costin Raiciu and others},
|
||
title = {Improving Datacenter Performance and Robustness
|
||
with {Multipath TCP}},
|
||
booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}},
|
||
month = aug,
|
||
year = 2011,
|
||
location = {Toronto, Ontario, Canada},
|
||
}
|
||
|
||
@inproceedings{ raimondo05secure,
|
||
author = {Mario Di Raimondo and Rosario Gennaro and Hugo Krawczyk},
|
||
title = {Secure Off-the-Record Messaging},
|
||
booktitle = {\bibconf{WPES}{Workshop on Privacy in the
|
||
Electronic Society}},
|
||
month = nov,
|
||
year = 2005,
|
||
location = {Alexandria, VA, USA},
|
||
}
|
||
|
||
@article{rappa,
|
||
author = {Michael Rappa},
|
||
title = {Business Models on the Web},
|
||
note = {\\Accessed on July 7 2010. \\
|
||
\url{http://digitalenterprise.org/models/models.html#Advertising}}
|
||
}
|
||
|
||
@inproceedings{reardon09improving,
|
||
author = {Reardon, Joel and Goldberg, Ian},
|
||
title = {Improving tor using a {TCP}-over-{DTLS} tunnel},
|
||
booktitle = {18th USENIX Security Symposium},
|
||
month = aug,
|
||
year = {2009},
|
||
location = {Montreal, Canada},
|
||
}
|
||
|
||
% author = {Charles Reis and Steven D. Gribble and Tadayoshi Kohno
|
||
% and Nicholas C. Weaver},
|
||
@inproceedings{ reis08detecting,
|
||
author = {Charles Reis and others},
|
||
title = {Detecting In-Flight Page Changes with Web Tripwires},
|
||
booktitle = {\bibconf[5th]{NSDI}{Symposium on Networked System
|
||
Design and Implementation}},
|
||
month = apr,
|
||
year = 2008,
|
||
location = {San Francisco, CA},
|
||
}
|
||
|
||
@article{reiter99crowds,
|
||
author = {Reiter, Michael K. and Rubin, Aviel D.},
|
||
title = {Anonymous {Web} transactions with {Crowds}},
|
||
journal = {Communications of the ACM},
|
||
volume = {42},
|
||
number = {2},
|
||
year = {1999},
|
||
issn = {0001-0782},
|
||
pages = {32--48},
|
||
doi = {http://doi.acm.org/10.1145/293411.293778},
|
||
publisher = {ACM},
|
||
address = {New York, NY, USA},
|
||
}
|
||
|
||
@inproceedings{rivest01leak,
|
||
author = {Ronald L. Rivest and
|
||
Adi Shamir and
|
||
Yael Tauman},
|
||
title = {How to Leak a Secret},
|
||
booktitle = {\bibconf[7th]{ASIACRYPT}{International Conference on the
|
||
Theory and Application of Cryptology and Information Security}},
|
||
location = {Gold Coast, Australia},
|
||
month = dec,
|
||
year = 2001
|
||
}
|
||
|
||
@misc{ yegge11platforms,
|
||
author = {Steve Yegge},
|
||
title = {Stevey's Google Platforms Rant},
|
||
month = oct,
|
||
year = 2011,
|
||
note = {\url{https://plus.google.com/+RipRowan/posts/eVeouesvaVX}},
|
||
}
|
||
|
||
%S
|
||
|
||
@inproceedings{ sahai02automatedsla,
|
||
author = {Akhil Sahai and others},
|
||
title = {Automated SLA Monitoring for Web Services},
|
||
booktitle = {IEEE/IFIP DSOM},
|
||
year = {2002},
|
||
pages = {28-41},
|
||
publisher = {Springer-Verlag}
|
||
}
|
||
|
||
@inproceedings{ schollmeier01definition,
|
||
author = {Schollmeier, Rudiger},
|
||
title = {A Definition of Peer-to-Peer Networking for the
|
||
Classification of Peer-to-Peer Architectures and Applications},
|
||
booktitle = {1st International Conference on Peer-to-Peer Computing},
|
||
month = aug,
|
||
year = 2001,
|
||
location = {Linkoping, Sweden},
|
||
}
|
||
|
||
@inproceedings{ semke98automatic,
|
||
author = {Jeffrey Semke and Matthew Mathis and Jamshid Mahdavi},
|
||
title = {Automatic TCP Buffer Tuning},
|
||
booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}},
|
||
month = sep,
|
||
year = 1998,
|
||
location = {Vancouver, BC, Canada},
|
||
}
|
||
|
||
@article{schneider1990implementing,
|
||
title={Implementing fault-tolerant services using the state machine approach: A tutorial},
|
||
author={Schneider, Fred B},
|
||
journal={ACM Computing Surveys (CSUR)},
|
||
volume={22},
|
||
number={4},
|
||
pages={299--319},
|
||
year={1990},
|
||
publisher={ACM}
|
||
}
|
||
|
||
@article{ serjantov03trickle,
|
||
Author = {Serjantov, Andrei and Dingledine, Roger and Syverson, Paul},
|
||
Title = {From a Trickle to a Flood:
|
||
Active Attacks on Several Mix Types},
|
||
booktitle = {5th International Workshop on Information Hiding},
|
||
Year = {2002},
|
||
}
|
||
|
||
@inproceedings{ sherr09scalable,
|
||
author = {Micah Sherr and Matt Blaze and Boon Thau Loo},
|
||
title = {Scalable Link-Based Relay Selection for Anonymous Routing},
|
||
booktitle = {9th \bibbrev{PETS}{Privacy-Enhancing
|
||
Technologies Symposium}},
|
||
month = aug,
|
||
year = 2009,
|
||
location = {Seattle, WA},
|
||
}
|
||
|
||
@inproceedings{silverston07measuring,
|
||
author = {Thomas Silverston and Olivier Fourmaux},
|
||
title = {Measuring P2P IPTV Systems},
|
||
booktitle = {17th \bibbrev{NOSSDA}{International Workshop on Network and
|
||
Operating Systems Support for Digital Audio \& Video}},
|
||
}
|
||
|
||
% author = {Emin G\"un Sirer and Sharad Goel and Mark Robson
|
||
% and Do\v{g}an Engin},
|
||
@inproceedings{ sirer04eluding,
|
||
author = {Sirer, Emin G\"un and Goel, Sharad and Robson, Mark
|
||
and Engin, D\v{o}gan},
|
||
title = {Eluding Carnivores: File Sharing with Strong Anonymity},
|
||
booktitle = {11th ACM SIGOPS European Workshop},
|
||
month = sep,
|
||
year = 2004,
|
||
}
|
||
|
||
@INPROCEEDINGS{Skene04preciseservice,
|
||
author = {James Skene and D. Davide Lamanna and Wolfgang Emmerich},
|
||
title = {Precise Service Level Agreements},
|
||
booktitle = {In: Proc. of 26th Intl. Conference on Software Engineering
|
||
(ICSE)},
|
||
year = {2004},
|
||
pages = {179-188},
|
||
publisher = {IEEE Press}
|
||
}
|
||
|
||
@inproceedings{ smits11bridgespa,
|
||
author = {Rob Smits and others},
|
||
title = {{BridgeSPA}: Improving {Tor} Bridges with
|
||
Single Packet Authorization},
|
||
booktitle = {\bibconf{WPES}{Workshop on Privacy in the
|
||
Electronic Society}},
|
||
month = oct,
|
||
year = 2011,
|
||
location = {Chicago, IL},
|
||
}
|
||
|
||
@misc{ smux,
|
||
author = {Jim Gettys and Henrik Frystyk Nielsen},
|
||
title = "{SMUX Protocol Specification}",
|
||
booktitle = {W3C working draft (expired)},
|
||
note = {\url{http://www.w3.org/TR/WD-mux}},
|
||
month = jul,
|
||
year = 1998
|
||
}
|
||
|
||
@inproceedings{song12faceless,
|
||
author = {Xiaoxiao Song and
|
||
David Isaac Wolinsky and
|
||
Bryan Ford},
|
||
title = {Faceless: decentralized anonymous group messaging for online
|
||
social networks},
|
||
booktitle = {\bibconf{SNS}{EuroSys Workshop on Social Network Systems}},
|
||
year = {2012},
|
||
month = {April},
|
||
}
|
||
|
||
@misc{ spdy,
|
||
title = {{SPDY}: An Experimental Protocol For a Faster {Web}},
|
||
note = {\url{http://www.chromium.org/spdy/spdy-whitepaper}},
|
||
}
|
||
|
||
@INPROCEEDINGS{srivastava03Web,
|
||
author = {Biplav Srivastava and Jana Koehler},
|
||
title = {Web Service Composition - Current Solutions and Open Problems},
|
||
booktitle = {ICAPS 2003 Workshop on Planning for Web Services},
|
||
year = {2003},
|
||
pages = {28--35}
|
||
}
|
||
|
||
@inproceedings{ stajano99cocaine,
|
||
author = {Frank Stajano and Ross Anderson},
|
||
title = {The Cocaine Auction Protocol:
|
||
On The Power Of Anonymous Broadcast},
|
||
booktitle = {3rd International Workshop on Information Hiding},
|
||
month = sep,
|
||
year = 1999,
|
||
}
|
||
|
||
@inproceedings{suchara11network,
|
||
author = {Martin Suchara and
|
||
Dahai Xu and
|
||
Robert D. Doverspike and
|
||
David Johnson and
|
||
Jennifer Rexford},
|
||
title = {Network Architecture for Joint Failure Recovery and
|
||
Traffic Engineering},
|
||
booktitle = {\bibconf{SIGMETRICS}{ACM SIGMETRICS}},
|
||
location = {San Jose, CA},
|
||
month = jun,
|
||
year = 2011
|
||
}
|
||
|
||
@article{ sundararaman05clock,
|
||
author = {Bharath Sundararaman and Ugo Buy and Ajay D. Kshemkalyani},
|
||
title = {\href{https://www.sciencedirect.com/science/article/pii/S1570870505000144?via%3Dihub}{Clock synchronization for wireless sensor networks: a survey}},
|
||
journal = {Ad Hoc Networks},
|
||
volume = 3,
|
||
number = 3,
|
||
month = may,
|
||
year = 2005,
|
||
}
|
||
|
||
@inproceedings{stutzbach06understanding,
|
||
title={Understanding churn in peer-to-peer networks},
|
||
author={Stutzbach, Daniel and Rejaie, Reza},
|
||
booktitle={\bibconf{IMC}{ACM SIGCOMM conference on Internet measurement}},
|
||
year={2006},
|
||
}
|
||
|
||
@inproceedings{ syverson11sleeping,
|
||
author = {Paul Syverson},
|
||
title = {Sleeping dogs lie on a bed of onions but wake when mixed},
|
||
booktitle = {\bibconf{HotPETs}{Hot Topics in
|
||
Privacy Enhancing Technologies}},
|
||
month = jul,
|
||
year = 2011,
|
||
location = {Waterloo, Canada},
|
||
}
|
||
|
||
%T
|
||
|
||
@misc{ tahrir,
|
||
key = {Tahrir},
|
||
title = {The Tahrir Project},
|
||
note = {\url{https://github.com/sanity/tahrir/wiki/Overview}},
|
||
}
|
||
|
||
@misc{ tails,
|
||
key = {Tails},
|
||
title = {Tails: The Amnesic Incognito Live System},
|
||
note = {\url{https://tails.boum.org/}},
|
||
month = {September},
|
||
year = {2012}
|
||
}
|
||
|
||
@inproceedings{ tang10improved,
|
||
author = {Tang, Can and Goldberg, Ian},
|
||
title = {An improved algorithm for {Tor} circuit scheduling},
|
||
booktitle = {\bibconf[17th]{CCS}{ACM conference on
|
||
Computer and Communications Security}},
|
||
month = oct,
|
||
year = {2010},
|
||
location = {Chicago, IL},
|
||
}
|
||
|
||
@inproceedings{ terpstra10channel,
|
||
author = {Wesley W. Terpstra and Christof Leng and Max Lehn
|
||
and Alejandro P. Buchmann},
|
||
title = {Channel-based Unidirectional Stream Protocol {(CUSP)}},
|
||
booktitle = {\bibbrev{INFOCOM}{IEEE INFOCOM} Mini Conference},
|
||
month = mar,
|
||
year = 2010,
|
||
}
|
||
|
||
@article{ thrasyvoulos10routing,
|
||
author = {Thrasyvoulos Spyropoulos and Rao Naveed Bin Rais and
|
||
Thierry Turletti and Katia Obraczka and Athanasios Vasilakos},
|
||
title = {\href{https://link.springer.com/article/10.1007/s11276-010-0276-9}{Routing for disruption tolerant networks: taxonomy and design}},
|
||
journal = {Wireless Networks},
|
||
month = nov,
|
||
year = 2010,
|
||
volume = 16,
|
||
number = 8,
|
||
pages = {2349–2370},
|
||
}
|
||
|
||
@article{ tiloca17axiom,
|
||
title={\href{http://www.diva-portal.org/smash/get/diva2:1128111/FULLTEXT01.pdf}{Axiom: DTLS-based secure IoT group communication}},
|
||
author={Tiloca, Marco and Nikitin, Kirill and Raza, Shahid},
|
||
journal={ACM Transactions on Embedded Computing Systems},
|
||
volume={16},
|
||
number={3},
|
||
month=apr,
|
||
year={2017}
|
||
}
|
||
|
||
@misc{ titz01why,
|
||
author = {Olaf Titz},
|
||
title = {Why {TCP} Over {TCP} Is A Bad Idea},
|
||
month = apr,
|
||
year = 2001,
|
||
note = {\url{http://sites.inka.de/bigred/devel/tcp-tcp.html}},
|
||
}
|
||
|
||
@misc{ torbrowser,
|
||
title = {Tor Browser Bundle},
|
||
note = {\url{https://www.torproject.org/projects/torbrowser.html.en}},
|
||
}
|
||
|
||
@inproceedings{ tran09sybil,
|
||
author = {Nguyen Tran and Bonan Min and Jinyang Li
|
||
and Lakshminarayanan Submaranian},
|
||
title = {Sybil-resilient online content voting},
|
||
booktitle = {\bibconf[6th]{NSDI}{Symposium on Networked System
|
||
Design and Implementation}},
|
||
month = apr,
|
||
year = 2009,
|
||
pages = {15--28},
|
||
}
|
||
|
||
@inproceedings{ tsang05short,
|
||
author = {Patrick P. Tsang and Victor K. Wei},
|
||
title = {Short Linkable Ring Signatures for E-voting, E-cash
|
||
and Attestation},
|
||
booktitle = {\bibconf{ISPEC}{Information Security Practice
|
||
and Experience}},
|
||
month = apr,
|
||
year = 2005,
|
||
location = {Singapore},
|
||
}
|
||
|
||
@inproceedings{tuulos04irc,
|
||
author={Tuulos, V.H. and Tirri, H.},
|
||
booktitle={\bibconf{WI}{IEEE/WIC/ACM Conference on Web Intelligence}},
|
||
title={Combining Topic Models and Social Networks for Chat Data Mining},
|
||
year={2004},
|
||
month={Sept},
|
||
}
|
||
|
||
@article{ varadhan00persistent,
|
||
author = {Kannan Varadhan and Ramesh Govindan and Deborah Estrin},
|
||
title = {Persistent route oscillations in inter-domain routing},
|
||
journal = {Computer Networks},
|
||
volume = 32,
|
||
number = 1,
|
||
month = jan,
|
||
year = 2000,
|
||
pages = {1-16},
|
||
}
|
||
|
||
@inproceedings{ vasserman09membership,
|
||
author = {Eugene Vasserman and Rob Jansen and James Tyra
|
||
and Nicholas Hopper and Yongdae Kim},
|
||
title = {Membership-Concealing Overlay Networks},
|
||
booktitle = {\bibconf[16th]{CCS}{ACM conference on
|
||
Computer and Communications Security}},
|
||
location = {Chicago, IL},
|
||
month = nov,
|
||
year = 2009
|
||
}
|
||
|
||
@inproceedings{ venkataraman06chunkyspread,
|
||
author = {Vidhyashankar Venkataraman and Kaouru Yoshida
|
||
and Paul Francis},
|
||
title = {\href{http://www.ieee-icnp.org/2006/papers/s1a1.pdf}{Chunkyspread: Heterogeneous Unstructured Tree-Based
|
||
Peer-to-Peer Multicast}},
|
||
booktitle = {\bibconf[14th]{ICNP}{International Conference on
|
||
Network Protocols}},
|
||
month = nov,
|
||
year = 2006,
|
||
location = {Santa Barbara, CA},
|
||
url = {http://www.ieee-icnp.org/2006/papers/s1a1.pdf},
|
||
}
|
||
|
||
@inproceedings{ viswanath12canal,
|
||
author = {Bimal Viswanath and Mainack Mondal and Krishna P. Gummadi and
|
||
Alan Mislove and Ansley Post},
|
||
title = {Canal: Scaling Social Network-Based Sybil Tolerance Schemes},
|
||
booktitle = {\bibconf{SNS}{EuroSys Workshop on Social Network Systems}},
|
||
year = {2012},
|
||
month = {April},
|
||
}
|
||
|
||
@inproceedings{ vratonjic10integrity,
|
||
author = {Nevena Vratonjic and Julien Freudiger and Jean-Pierre Hubaux},
|
||
title = {Integrity of the Web Content: The Case of Online Advertising},
|
||
booktitle = {\bibbrev{CollSec}{Workshop on Collaborative Methods
|
||
for Security and Privacy}},
|
||
month = aug,
|
||
year = 2010,
|
||
location = {Washington, DC},
|
||
}
|
||
|
||
%W
|
||
|
||
@inproceedings{ wolinsky13buddies,
|
||
author = {David Isaac Wolinsky and Ewa Syta and Bryan Ford},
|
||
title = {Hang With Your Buddies to Resist Intersection Attacks},
|
||
booktitle = {\bibconf[20th]{CCS}{Conference on Computer and Communications Security}},
|
||
month = {November},
|
||
year = {2013},
|
||
}
|
||
|
||
@inproceedings{wang13artsense,
|
||
author = {Xinlei Oscar Wang and
|
||
Wei Cheng and
|
||
Prasant Mohapatra and
|
||
Tarek F. Abdelzaher},
|
||
title = {{ARTS}ense: {A}nonymous reputation and trust in participatory
|
||
sensing},
|
||
booktitle = {\bibconf[32nd]{INFOCOM}{IEEE International Conference on
|
||
Computer Communications}},
|
||
location = {Turin, Italy},
|
||
month = apr,
|
||
year = 2013
|
||
}
|
||
|
||
|
||
@inproceedings{ waidner89dining,
|
||
author = {Michael Waidner and Birgit Pfitzmann},
|
||
title = {The {Dining Cryptographers} in the Disco:
|
||
Unconditional Sender and Recipient Untraceability
|
||
with Computationally Secure Serviceability},
|
||
booktitle = {Eurocrypt},
|
||
location = {Houthalen, Belgium},
|
||
month = apr,
|
||
year = 1989,
|
||
pages = {302--319},
|
||
}
|
||
|
||
@inproceedings{ weinberg12stegotorus,
|
||
author = {Zachary Weinberg and Jeffrey Wang and Vinod Yegneswaran and
|
||
Linda Briesemeister and Steven Cheung and Frank Wang and
|
||
Dan Boneh},
|
||
title = {{StegoTorus}: a camouflage proxy for the
|
||
{Tor} anonymity system},
|
||
booktitle = {\bibconf[19th]{CCS}{ACM conference on
|
||
Computer and Communications Security}},
|
||
month = oct,
|
||
year = {2012},
|
||
location = {Raleigh, NC},
|
||
}
|
||
|
||
@misc{ whonix,
|
||
key = {Whonix},
|
||
title = {Whonix},
|
||
note = {\url{http://sourceforge.net/p/whonix}},
|
||
}
|
||
|
||
@inproceedings{winstein13tcp,
|
||
author = {Keith Winstein and Hari Balakrishnan},
|
||
title = {{TCP ex Machina}: Computer-Generated Congestion Control},
|
||
booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}},
|
||
year = {2013},
|
||
month = aug,
|
||
location = {Hong Kong, China},
|
||
}
|
||
|
||
@misc{ wortham2010cellphones,
|
||
title = {{Cellphones Now Used More for Data Than for Calls}},
|
||
author = {Jenna Wortham},
|
||
publisher = {New York Times},
|
||
day = 13,
|
||
month = may,
|
||
year = 2010,
|
||
note = {\url{http://www.nytimes.com/2010/05/14/technology/personaltech/14talk.html}},
|
||
}
|
||
|
||
% author = {Ye Wang and Hao Wang and Ajay Mahimkar and Richard Alimi
|
||
% and Yin Zhang and Lili Qiu and Y. Richard Yang},
|
||
@inproceedings{ wang10r3,
|
||
author = {Ye Wang and others},
|
||
title = {R3: Resilient Routing Reconfiguration},
|
||
booktitle = {\bibbrev{SIGCOMM}{ACM SIGCOMM}},
|
||
month = aug,
|
||
year = 2010,
|
||
location = {New Delhi, India},
|
||
}
|
||
|
||
@inproceedings{ wang15seeing,
|
||
title={\href{https://censorbib.nymity.ch/pdf/Wang2015a.pdf}{Seeing through
|
||
network-protocol obfuscation}},
|
||
author={Wang, Liang and Dyer, Kevin P and Akella, Aditya and Ristenpart,
|
||
Thomas and Shrimpton, Thomas},
|
||
booktitle={22nd ACM Conference on Computer and Communications Security
|
||
(CCS)},
|
||
pages={57--69},
|
||
month=oct,
|
||
year={2015}
|
||
}
|
||
|
||
@misc{ web100,
|
||
title = "{The Web100 Project}",
|
||
note = {\url{http://www.web100.org}}
|
||
}
|
||
|
||
@unpublished{ wiedemann11dissenterr2,
|
||
author = {Andrew Wiedemann and Doug von Kohorn and Henry Corrigan-Gibbs and Bryan Ford},
|
||
title = {Dissent: Accountable Anonymous Group Messaging, Erratum 2},
|
||
year = {2011},
|
||
note = {\url{http://dedis.cs.yale.edu/2010/anon/papers/ccs10/erratum2.pdf}}
|
||
}
|
||
|
||
@inproceedings{wolinsky09vpn,
|
||
author = {David Isaac Wolinsky and Yonggang Liu and Pierre St. Juste
|
||
and Girish Venkatasubramanian and Renato Figueiredo},
|
||
title = {On the Design of Scalable, Self-Configuring Virtual Networks},
|
||
booktitle = {IEEE/ACM Supercomputing},
|
||
month = {November},
|
||
year = {2009}
|
||
}
|
||
|
||
@inproceedings{wolinsky11grid,
|
||
author = {David Isaac Wolinsky and Renato Figueiredo},
|
||
title = {Experiences with Self-Organizing Decentralized Grids Using the Grid Appliance},
|
||
booktitle = {\bibconf{ACM HPDC}{International Symposium on High Performance Distributed Computing}},
|
||
year = 2011,
|
||
}
|
||
|
||
|
||
@inproceedings{ wolinsky12scalable,
|
||
author = {Wolinsky, David Isaac and Corrigan-Gibbs, Henry and
|
||
Ford, Bryan and Johnson, Aaron},
|
||
title = {Scalable Anonymous Group Communication in the Anytrust Model},
|
||
booktitle = {\bibconf{EuroSec}{European Workshop
|
||
on System Security}},
|
||
month = apr,
|
||
day = 10,
|
||
year = 2012,
|
||
location = {Bern, Switzerland},
|
||
}
|
||
|
||
@inproceedings{ wolinsky12dissent,
|
||
author = {Wolinsky, David Isaac and Corrigan-Gibbs, Henry
|
||
and Johnson, Aaron and Ford, Bryan},
|
||
title = {Dissent in Numbers: Making Strong Anonymity Scale},
|
||
booktitle = {\bibconf[10th]{OSDI}{USENIX Symposium on Operating Systems Design and Implementation}},
|
||
month = oct,
|
||
year = 2012,
|
||
}
|
||
|
||
@inproceedings{wolinsky13grid,
|
||
year={2013},
|
||
booktitle={Cluster Computing},
|
||
title={Experiences with self-organizing, decentralized grids using the grid appliance},
|
||
author={Wolinsky, David Isaac and Chuchaisri, Panoat and Lee, Kyungyong and Figueiredo, Renato},
|
||
}
|
||
|
||
@inproceedings{ wolinsky14bootstrap,
|
||
title = {Dissent Design Document},
|
||
note = {\url{https://github.com/DeDiS/Dissent/blob/master/DESIGN}},
|
||
year = {2014}
|
||
}
|
||
|
||
@inproceedings{wu12netpilot,
|
||
author = {Xin Wu and
|
||
Daniel Turner and
|
||
Chao-Chih Chen and
|
||
David A. Maltz and
|
||
Xiaowei Yang and
|
||
Lihua Yuan and
|
||
Ming Zhang},
|
||
title = {Net{P}ilot: {A}utomating datacenter network
|
||
failure mitigation},
|
||
booktitle = {\bibconf{SIGCOMM}{ACM SIGCOMM}},
|
||
location = {Helsinki, Finland},
|
||
month = aug,
|
||
year = 2012
|
||
}
|
||
|
||
|
||
%X
|
||
|
||
@inproceedings{xie05static,
|
||
author = {Geoffrey G. Xie and
|
||
Jibin Zhan and
|
||
David A. Maltz and
|
||
Hui Zhang and
|
||
Albert G. Greenberg and
|
||
G\'{\i}sli Hj{\'a}lmt{\'y}sson and
|
||
Jennifer Rexford},
|
||
title = {On Static Reachability Analysis of {IP} Networks},
|
||
booktitle = {\bibconf{INFOCOM}{IEEE INFOCOM}},
|
||
location = {Miami, FL},
|
||
month = mar,
|
||
year = 2005
|
||
}
|
||
|
||
%Y
|
||
|
||
%%%%
|
||
% It looks like this paper was (at least) partially plagarized from:
|
||
% "k-Anonymous Message Transmission"
|
||
% von Ahn, Bortz, and Hopper (CCS'03)
|
||
%
|
||
% inproceedings{ yao04new,
|
||
% author = {Gang Yao and Dengguo Feng},
|
||
% title = {A New $k$-Anonymous Message Transmission Protocol},
|
||
% booktitle = {\bibbrev{WISA}{Workshop on
|
||
% Information Security Applications (WISA)}},
|
||
% month = aug,
|
||
% year = 2004,
|
||
% location = {Jeju Island, Korea},
|
||
% }
|
||
|
||
%Z
|
||
|
||
@INPROCEEDINGS{zec02estimating,
|
||
author = {Marko Zec and Miljenko Mikuc and Mario Zagar},
|
||
title = "Estimating the Impact of Interrupt Coalescing Delays on Steady State {TCP} Throughput",
|
||
booktitle = {SoftCOM},
|
||
year = {2002}
|
||
}
|
||
|
||
@ARTICLE{Zeng04qos-awaremiddleware,
|
||
author = {Liangzhao Zeng and others},
|
||
title = {QoS-aware middleware for Web services composition},
|
||
journal = {IEEE Transactions on Software Engineering},
|
||
year = {2004},
|
||
volume = {30},
|
||
pages = {311--327}
|
||
}
|
||
|
||
@inproceedings{zhang04planetseer,
|
||
author = {Ming Zhang and Chi Zhang and Vivek Pai and Larry Peterson and Randy Wang},
|
||
title = {{PlanetSeer}: Internet path failure monitoring
|
||
and characterization in wide-area services},
|
||
booktitle = {OSDI},
|
||
year = 2004
|
||
}
|
||
|
||
@inproceedings{ zhao02brocade,
|
||
author = {Zhao, Ben Y. and Duan, Yitao and Huang, Ling and
|
||
Joseph, Anthony D. and Kubiatowicz, John},
|
||
title = {Brocade: Landmark Routing on Overlay Networks},
|
||
booktitle = {1st International Workshop on Peer-to-Peer Systems},
|
||
month = mar,
|
||
year = 2002,
|
||
}
|
||
|
||
@book{ zhao04wireless,
|
||
author = {Feng Zhao and Leonidas Guibas},
|
||
title = {Wireless Sensor Networks: An Information Processing Approach},
|
||
publisher = {Morgan Kaufmann},
|
||
month = jul,
|
||
year = 2004,
|
||
isbn = {978-1493303779},
|
||
pages = {376},
|
||
}
|
||
|
||
@article{ day83osi,
|
||
author = {John D. Day and Hubert Zimmermann},
|
||
title = {\href{https://ieeexplore.ieee.org/abstract/document/1457043}{The {OSI} Reference Model}},
|
||
journal = {Proceedings of the IEEE},
|
||
volume = 71,
|
||
number = 12,
|
||
month = dec,
|
||
year = 1983,
|
||
}
|
||
|
||
|
||
%%%%% RFCs
|
||
|
||
@misc{ rfc768,
|
||
author = {J. Postel},
|
||
title = {User Datagram Protocol},
|
||
month = aug,
|
||
year = 1980,
|
||
note = {RFC 768},
|
||
}
|
||
|
||
@misc{ rfc791,
|
||
key = "IP",
|
||
title = "Internet Protocol",
|
||
month = sep,
|
||
year = "1981",
|
||
note = "RFC 791",
|
||
}
|
||
|
||
@misc{ rfc792,
|
||
author = {J. Postel},
|
||
title = {Internet Control Message Protocol},
|
||
month = sep,
|
||
year = 1981,
|
||
note = {RFC 792},
|
||
}
|
||
|
||
@misc{ rfc793,
|
||
key = "TCP",
|
||
title = "Transmission Control Protocol",
|
||
month = sep,
|
||
year = "1981",
|
||
note = "RFC 793",
|
||
}
|
||
|
||
@misc{ rfc813,
|
||
author = {David D. Clark},
|
||
title = {Window and Acknowledgement Strategy in {TCP}},
|
||
month = jul,
|
||
year = 1982,
|
||
note = {RFC 813},
|
||
}
|
||
|
||
@misc{ rfc821,
|
||
author = {Jonathan B. Postel},
|
||
title = {Simple Mail Transfer Protocol},
|
||
month = aug,
|
||
year = 1982,
|
||
note = {RFC 821},
|
||
}
|
||
|
||
@misc{ rfc826,
|
||
author = "David C. Plummer",
|
||
title = "An Ethernet Address Resolution Protocol",
|
||
month = nov,
|
||
year = "1982",
|
||
note = "RFC 826",
|
||
}
|
||
|
||
@misc{ rfc854,
|
||
author = "J. Postel and J. Reynolds",
|
||
title = "Telnet Protocol Specification",
|
||
month = may,
|
||
year = 1983,
|
||
note = "RFC 854",
|
||
}
|
||
|
||
@misc{ rfc896,
|
||
author = "J. Nagle",
|
||
title = "{Congestion Control in IP/TCP Internetworks}",
|
||
month = jan,
|
||
year = 1984,
|
||
note = "RFC 896",
|
||
}
|
||
|
||
% Note: updated by rfc1151
|
||
@misc{ rfc908,
|
||
author = {David Velten and Robert Hinden and Jack Sax},
|
||
title = {Reliable Data Protocol},
|
||
month = jul,
|
||
year = 1984,
|
||
note = {RFC 908},
|
||
}
|
||
|
||
@misc{ rfc955,
|
||
author = {R. Braden},
|
||
title = {Towards a Transport Service for
|
||
Transaction Processing Applications},
|
||
month = sep,
|
||
year = 1985,
|
||
note = {RFC 955},
|
||
}
|
||
|
||
@misc{ rfc959,
|
||
author = {J. Postel and J. Reynolds},
|
||
title = {File Transfer Protocol {(FTP)}},
|
||
month = oct,
|
||
year = 1985,
|
||
note = {RFC 959},
|
||
}
|
||
|
||
@misc{ rfc1009,
|
||
author = {R. Braden and J. Postel},
|
||
title = {Requirements for {Internet} Gateways},
|
||
month = jun,
|
||
year = 1987,
|
||
note = {RFC 1009},
|
||
}
|
||
|
||
@misc{ rfc1016,
|
||
author = {W. Prue and J. Postel},
|
||
title = {Something a Host Could Do with Source Quench:
|
||
The Source Quench Introduced Delay {(SQuID)}},
|
||
month = jul,
|
||
year = 1987,
|
||
note = {RFC 1016},
|
||
}
|
||
|
||
@misc{ rfc1034,
|
||
author = "P. Mockapetris",
|
||
title = "Domain names: concepts and facilities",
|
||
month = nov,
|
||
year = 1987,
|
||
note = "RFC 1034",
|
||
}
|
||
|
||
@misc{ rfc1035,
|
||
author = "P. Mockapetris",
|
||
title = "Domain names: implementation and specification",
|
||
month = nov,
|
||
year = "1987",
|
||
note = "RFC 1035",
|
||
}
|
||
|
||
@misc{ rfc1036,
|
||
author = {M. Horton and R. Adams},
|
||
title = {\href{https://tools.ietf.org/html/rfc1036}{Standard for Interchange of {USENET} Messages}},
|
||
month = dec,
|
||
year = 1987,
|
||
note = {RFC 1036},
|
||
}
|
||
|
||
@misc{ rfc1058,
|
||
author = "C. Hedrick",
|
||
title = "Routing Information Protocol",
|
||
month = jun,
|
||
year = "1988",
|
||
note = "RFC 1058",
|
||
}
|
||
|
||
@misc{ rfc1078,
|
||
author = {M. Lottor},
|
||
title = {{TCP} port service Multiplexer {(TCPMUX)}},
|
||
month = nov,
|
||
year = 1988,
|
||
note = {RFC 1078},
|
||
}
|
||
|
||
@misc{ rfc1122,
|
||
author = {R. {Braden, ed.}},
|
||
title = {Requirements for {Internet} Hosts -- Communication Layers},
|
||
month = oct,
|
||
year = 1989,
|
||
note = {RFC 1122},
|
||
}
|
||
|
||
@misc{ rfc1151,
|
||
author = {C. Partridge and R. Hinden},
|
||
title = {Version 2 of the Reliable Data Protocol {(RDP)}},
|
||
month = apr,
|
||
year = 1990,
|
||
note = {RFC 1151},
|
||
}
|
||
|
||
@misc{ rfc1247,
|
||
author = "J. Moy",
|
||
title = "{OSPF} Version 2",
|
||
month = jul,
|
||
year = "1991",
|
||
note = "RFC 1247",
|
||
}
|
||
|
||
@misc{ rfc1258,
|
||
author = "B. Kantor",
|
||
title = "{BSD} {Rlogin}",
|
||
month = sep,
|
||
year = 1991,
|
||
note = "RFC 1258",
|
||
}
|
||
|
||
@misc{ rfc1263,
|
||
author = {S. O'Malley and L. Peterson},
|
||
title = {{TCP} Extensions Considered Harmful},
|
||
month = oct,
|
||
year = 1991,
|
||
note = {RFC 1263},
|
||
}
|
||
|
||
@misc{ rfc1323,
|
||
author = "V. Jacobson and R. Braden and D. Borman",
|
||
title = "{TCP} Extensions for High Performance",
|
||
month = may,
|
||
year = 1992,
|
||
note = "RFC 1323",
|
||
}
|
||
|
||
% same as saltzer82naming?
|
||
@misc{ rfc1498,
|
||
author = {J. Saltzer},
|
||
title = {On the Naming and Binding of Network Destinations},
|
||
month = aug,
|
||
year = 1993,
|
||
note = "RFC 1498",
|
||
}
|
||
|
||
@misc{ rfc1518,
|
||
author = "Y. Rekhter and T. {Li (editors)}",
|
||
title = "An Architecture for {IP} Address Allocation with {CIDR}",
|
||
month = sep,
|
||
year = "1993",
|
||
note = "RFC 1518",
|
||
}
|
||
|
||
@misc{ rfc1519,
|
||
author = "V. Fuller and T. Li and J. Yu and K. Varadhan",
|
||
title = "Classless Inter-Domain Routing {(CIDR)}:
|
||
an Address Assignment and Aggregation Strategy",
|
||
month = sep,
|
||
year = "1993",
|
||
note = "RFC 1519",
|
||
}
|
||
|
||
@misc{ rfc1631,
|
||
author = {K. Egevang and P. Francis},
|
||
title = {The {IP} Network Address Translator {(NAT)}},
|
||
month = may,
|
||
year = 1994,
|
||
note = {RFC 1631},
|
||
}
|
||
|
||
@misc{ rfc1644,
|
||
author = "R. Braden",
|
||
title = "{T/TCP} -- {TCP} Extensions for Transactions",
|
||
month = jul,
|
||
year = 1994,
|
||
note = "RFC 1644",
|
||
}
|
||
|
||
@misc{ rfc1705,
|
||
author = {R. Carlson and D. Ficarella},
|
||
title = "Six Virtual Inches to the Left: The Problem with {IPng}",
|
||
month = oct,
|
||
year = 1995,
|
||
note = "RFC 1705",
|
||
}
|
||
|
||
@misc{ rfc1771,
|
||
author = "Y. Rekhter and T. {Li (editors)}",
|
||
title = "A Border Gateway Protocol 4 {(BGP-4)}",
|
||
month = mar,
|
||
year = "1995",
|
||
note = "RFC 1771",
|
||
}
|
||
|
||
@misc{ rfc1812,
|
||
author = {F. {Baker, ed.}},
|
||
title = {Requirements for {IP} Version 4 Routers},
|
||
month = jun,
|
||
year = 1995,
|
||
note = {RFC 1812},
|
||
}
|
||
|
||
@misc{ rfc1831,
|
||
author = {R. Srinivasan},
|
||
title = {{RPC:} Remote Procedure Call Protocol Specification Version 2},
|
||
month = aug,
|
||
year = 1995,
|
||
note = {RFC 1831},
|
||
}
|
||
|
||
@misc{ rfc1832,
|
||
author = {R. Srinivasan},
|
||
title = {{XDR:} External Data Representation Standard},
|
||
month = aug,
|
||
year = 1995,
|
||
note = {RFC 1832},
|
||
}
|
||
|
||
@misc{ rfc1833,
|
||
author = {R. Srinivasan},
|
||
title = {Binding Protocols for {ONC RPC} Version 2},
|
||
month = aug,
|
||
year = 1995,
|
||
note = {RFC 1833},
|
||
}
|
||
|
||
@misc{ rfc1858,
|
||
author = {G. Ziemba and D. Reed and P. Traina},
|
||
title = {Security Considerations for IP Fragment Filtering},
|
||
month = oct,
|
||
year = 1995,
|
||
note = {RFC 1858},
|
||
}
|
||
|
||
@misc{ rfc1881,
|
||
author = "IAB and IESG",
|
||
title = "{IPv6} Address Allocation Management",
|
||
month = dec,
|
||
year = "1995",
|
||
note = "RFC 1881",
|
||
}
|
||
|
||
@misc{ rfc1887,
|
||
author = "Y. Rekhter and T. Li",
|
||
title = "An Architecture for {IPv6} Unicast Address Allocation",
|
||
month = dec,
|
||
year = "1995",
|
||
note = "RFC 1887",
|
||
}
|
||
|
||
@misc{ rfc1918,
|
||
author = "Y. Rekhter and others",
|
||
title = "Address Allocation for Private Internets",
|
||
month = feb,
|
||
year = 1996,
|
||
note = "RFC 1918",
|
||
}
|
||
|
||
|
||
@misc{ rfc1928,
|
||
author = "M. Leech and others",
|
||
title = "{SOCKS} Protocol",
|
||
month = mar,
|
||
year = "1996",
|
||
note = "RFC 1928",
|
||
}
|
||
|
||
@misc{ rfc1939,
|
||
author = {J. Myers and M. Rose},
|
||
title = {Post Office Protocol -- Version 3},
|
||
month = may,
|
||
year = 1996,
|
||
note = {RFC 1939},
|
||
}
|
||
|
||
@misc{ rfc1945,
|
||
author = "T. Berners-Lee and R. Fielding and H. Frystyk",
|
||
title = "Hypertext Transfer Protocol -- {HTTP/1.0}",
|
||
month = may,
|
||
year = 1996,
|
||
note = "RFC 1945",
|
||
}
|
||
|
||
@misc{ rfc1948,
|
||
author = "S. Bellovin",
|
||
title = "Defending Against Sequence Number Attacks",
|
||
month = may,
|
||
year = 1996,
|
||
note = "RFC 1948",
|
||
}
|
||
|
||
@misc{ rfc1950,
|
||
author = {P. Deutsch and J-L. Gailly},
|
||
title = {{ZLIB} Compressed Data Format Specification version 3.3},
|
||
month = may,
|
||
year = 1996,
|
||
note = "RFC 1950",
|
||
}
|
||
|
||
@misc{ rfc1955,
|
||
author = {R. Hinden},
|
||
title = {New Scheme for {Internet} Routing and Addressing {(ENCAPS)}
|
||
for {IPNG}},
|
||
month = jun,
|
||
year = 1996,
|
||
note = "RFC 1955",
|
||
},
|
||
|
||
@misc{ rfc1992,
|
||
author = "I. Castineyra and N. Chiappa and M. Steenstrup",
|
||
title = "The {Nimrod} Routing Architecture",
|
||
month = aug,
|
||
year = "1996",
|
||
note = "RFC 1992",
|
||
}
|
||
|
||
@misc{ rfc2008,
|
||
author = {Y. Rekhter and T. Li},
|
||
title = {Implications of Various Address Allocation Policies
|
||
for {Internet} Routing},
|
||
month = oct,
|
||
year = 1996,
|
||
note = {RFC 2008},
|
||
}
|
||
|
||
@misc{ rfc2018,
|
||
author = "M. Mathis and J. Mahdav and S. Floyd and A. Romanow",
|
||
title = "{TCP} Selective Acknowledgment Options",
|
||
month = oct,
|
||
year = 1996,
|
||
note = "RFC 2018",
|
||
}
|
||
|
||
@misc{ rfc2050,
|
||
author = "K. Hubbard and M. Kosters and D. Conrad and D. Karrenberg and J. Postel",
|
||
title = "Internet Registry {IP} Allocation Guidelines",
|
||
month = nov,
|
||
year = "1996",
|
||
note = "RFC 2050",
|
||
}
|
||
|
||
@misc{ rfc2076,
|
||
author = {J. Palme},
|
||
title = {Common Internet Message Headers},
|
||
month = feb,
|
||
year = 1997,
|
||
note = {RFC 2076},
|
||
}
|
||
|
||
@misc{ rfc2101,
|
||
author = "B. Carpenter and J. Crowcroft and Y. Rekhter",
|
||
title = "{IPv4} Address Behaviour Today",
|
||
month = feb,
|
||
year = "1997",
|
||
note = "RFC 2101",
|
||
}
|
||
|
||
@misc{ rfc2103,
|
||
author = "R. Ramanathan",
|
||
title = "Mobility Support for {Nimrod}:
|
||
Challenges and Solution Approaches",
|
||
month = feb,
|
||
year = "1997",
|
||
note = "RFC 2103",
|
||
}
|
||
|
||
@misc{ rfc2131,
|
||
author = "R. Droms",
|
||
title = "Dynamic Host Configuration Protocol",
|
||
month = mar,
|
||
year = "1997",
|
||
note = "RFC 2131",
|
||
}
|
||
|
||
@misc{ rfc2132,
|
||
author = {S. Alexander and R. Droms},
|
||
title = {{DHCP} Options and {BOOTP} Vendor Extensions},
|
||
month = mar,
|
||
year = 1997,
|
||
note = {RFC 2132},
|
||
}
|
||
|
||
@misc{ rfc2136,
|
||
author = "P. {Vixie, Editor} and S. Thomson and Y. Rekhter and J. Bound",
|
||
title = "Dynamic Updates in the Domain Name System",
|
||
month = apr,
|
||
year = "1997",
|
||
note = "RFC 2136",
|
||
}
|
||
|
||
@misc{ rfc2140,
|
||
author = {J. Touch},
|
||
title = {{TCP} Control Block Interdependence},
|
||
month = apr,
|
||
year = 1997,
|
||
note = "RFC 2140",
|
||
}
|
||
|
||
@misc{ rfc2205,
|
||
author = {R. {Braden, Ed.}},
|
||
title = {Resource ReSerVation Protocol {(RSVP)} --
|
||
Version 1 Functional Specification},
|
||
month = sep,
|
||
year = 1997,
|
||
note = {RFC 2205},
|
||
}
|
||
|
||
@misc{ rfc2228,
|
||
author = {M. Horowitz and S. Lunt},
|
||
title = {{FTP} Security Extensions},
|
||
month = oct,
|
||
year = 1997,
|
||
note = {RFC 2228},
|
||
}
|
||
|
||
% obsoleted by rfc4346, rfc5246, rfc8446
|
||
@misc{ rfc2246,
|
||
author = "T. Dierks and C. Allen",
|
||
title = "The {TLS} Protocol Version 1.0",
|
||
month = jan,
|
||
year = "1999",
|
||
note = "RFC 2246",
|
||
}
|
||
|
||
@misc{ rfc2260,
|
||
author = "T. Bates and Y. Rekhter",
|
||
title = "Scalable Support for Multi-homed Multi-provider Connectivity",
|
||
month = jan,
|
||
year = 1998,
|
||
note = "RFC 2260",
|
||
}
|
||
|
||
@misc{ rfc2309,
|
||
author = {B. Braden and others},
|
||
title = {Recommendations on Queue Management and Congestion Avoidance
|
||
in the {Internet}},
|
||
month = apr,
|
||
year = 1998,
|
||
note = "RFC 2309",
|
||
}
|
||
|
||
@misc{ rfc2326,
|
||
author = {H. Schulzrinne and A. Rao and R. Lanphier},
|
||
title = {Real Time Streaming Protocol {(RTSP)}},
|
||
month = apr,
|
||
year = 1998,
|
||
note = {RFC 2326},
|
||
}
|
||
|
||
% Note: obsoleted by RFC 4301
|
||
@misc{ rfc2401,
|
||
author = "S. Kent and R. Atkinson",
|
||
title = "Security Architecture for the {Internet Protocol}",
|
||
month = nov,
|
||
year = "1998",
|
||
note = "RFC 2401",
|
||
}
|
||
|
||
% Note: obsoleted by RFC 4303
|
||
@misc{ rfc2406,
|
||
author = "S. Kent and R. Atkinson",
|
||
title = "{IP} Encapsulating Security Payload",
|
||
month = nov,
|
||
year = "1998",
|
||
note = "RFC 2406",
|
||
}
|
||
% title = "{IP} Encapsulating Security Payload {(ESP)}",
|
||
|
||
@misc{ rfc2460,
|
||
author = "S. Deering and R. Hinden",
|
||
title = "Internet Protocol, Version 6 {(IPv6)} Specification",
|
||
month = dec,
|
||
year = "1998",
|
||
note = "RFC 2460",
|
||
}
|
||
|
||
@misc{ rfc2462,
|
||
author = "S. Thomson and T. Narten",
|
||
title = "{IPv6} Stateless Address Autoconfiguration",
|
||
month = dec,
|
||
year = "1998",
|
||
note = "RFC 2462",
|
||
}
|
||
|
||
@misc{ rfc2527,
|
||
author = {S. Chokhani and W. Ford},
|
||
title = {Internet {X.509} Public Key Infrastructure
|
||
Certificate Policy and Certification Practices Framework},
|
||
month = mar,
|
||
year = 1999,
|
||
note = {RFC 2527},
|
||
}
|
||
|
||
|
||
@misc{ rfc2535,
|
||
author = "D. Eastlake",
|
||
title = "Domain Name System Security Extensions",
|
||
month = mar,
|
||
year = "1999",
|
||
note = "RFC 2535",
|
||
}
|
||
|
||
@misc {rfc2536,
|
||
author = "D. EastLake",
|
||
title = "{DSA} {KEYs} and {SIGs} in the {Domain Name System (DNS)}",
|
||
month = mar,
|
||
year = "1999",
|
||
note = "RFC 2536",
|
||
}
|
||
|
||
@misc{ rfc2581,
|
||
author = "M. Allman and V. Paxson and W. Stevens",
|
||
title = "{TCP} Congestion Control",
|
||
month = apr,
|
||
year = "1999",
|
||
note = "RFC 2581",
|
||
}
|
||
|
||
@misc{ rfc2616,
|
||
author = {R. Fielding and others},
|
||
title = {Hypertext Transfer Protocol -- {HTTP/1.1}},
|
||
month = jun,
|
||
year = 1999,
|
||
note = {RFC 2616},
|
||
}
|
||
|
||
@misc{ rfc2647,
|
||
author = {D. Newman},
|
||
title = {Benchmarking Terminology for Firewall Performance},
|
||
month = aug,
|
||
year = 1999,
|
||
note = {RFC 2647},
|
||
}
|
||
|
||
@misc{ rfc2663,
|
||
author = "P. Srisuresh and M. Holdrege",
|
||
title = "{IP} Network Address Translator {(NAT)}
|
||
Terminology and Considerations",
|
||
month = aug,
|
||
year = "1999",
|
||
note = "RFC 2663",
|
||
}
|
||
|
||
@misc{rfc2692,
|
||
author={C. Ellison},
|
||
title="{SPKI Requirements}",
|
||
year=1999,
|
||
month=sep,
|
||
note={RFC 2692}
|
||
}
|
||
|
||
@misc{rfc2693,
|
||
author={C. Ellison and others},
|
||
title="{SPKI Certificate Theory}",
|
||
year=1999,
|
||
month=sep,
|
||
note={RFC 2693}
|
||
}
|
||
|
||
@misc{ rfc2757,
|
||
author = {G. Montenegro and others},
|
||
title = {Long Thin Networks},
|
||
month = jan,
|
||
year = 2000,
|
||
note = {RFC 2757},
|
||
}
|
||
|
||
@misc{ rfc2764,
|
||
title = "{A Framework for IP Based Virtual Private Networks}",
|
||
author = "B. Gleeson and others",
|
||
year = "2000",
|
||
month = feb,
|
||
note = "RFC 2764",
|
||
}
|
||
|
||
@misc{ rfc2766,
|
||
author = "G. Tsirtsis and P. Srisuresh",
|
||
title = "Network Address Translation - Protocol Translation {(NAT-PT)}",
|
||
month = feb,
|
||
year = "2000",
|
||
note = "RFC 2766",
|
||
}
|
||
|
||
@misc{ rfc2782,
|
||
author = "A. Gulbrandsen and P. Vixie and L. Esibov",
|
||
title = "A {DNS} {RR} for specifying the location of services
|
||
{(DNS SRV)}",
|
||
month = feb,
|
||
year = "2000",
|
||
note = "RFC 2782",
|
||
}
|
||
|
||
@misc{ rfc2818,
|
||
author = {E. Rescorla},
|
||
title = {{HTTP} Over {TLS}},
|
||
month = may,
|
||
year = 2000,
|
||
note = {RFC 2818},
|
||
}
|
||
|
||
@misc{ rfc2821,
|
||
author = {J. {Klensin, ed.}},
|
||
title = {Simple Mail Transfer Protocol},
|
||
month = apr,
|
||
year = 2001,
|
||
note = {RFC 2821},
|
||
}
|
||
|
||
@misc{ rfc2822,
|
||
author = {P. {Resnick, ed.}},
|
||
title = {Internet Message Format},
|
||
month = apr,
|
||
year = 2001,
|
||
note = {RFC 2822},
|
||
}
|
||
|
||
@misc{ rfc2883,
|
||
author = "S. Floyd and J. Mahdavi and M. Mathis and M. Podolsky",
|
||
title = "An Extension to the Selective Acknowledgement
|
||
{(SACK)} Option for {TCP}",
|
||
month = jul,
|
||
year = 2000,
|
||
note = "RFC 2883",
|
||
}
|
||
|
||
@misc{ rfc2914,
|
||
author = "S. Floyd",
|
||
title = "Congestion Control Principles",
|
||
month = sep,
|
||
year = "2000",
|
||
note = "RFC 2914",
|
||
}
|
||
|
||
% obsoleted by rfc4960
|
||
@misc{ rfc2960,
|
||
author = "R. Stewart and others",
|
||
title = "Stream Control Transmission Protocol",
|
||
month = oct,
|
||
year = 2000,
|
||
note = "RFC 2960",
|
||
}
|
||
|
||
@misc{ rfc2979,
|
||
author = {N. Freed},
|
||
title = {Behavior of and Requirements for {Internet} Firewalls},
|
||
month = oct,
|
||
year = 2000,
|
||
note = {RFC 2979},
|
||
}
|
||
|
||
@misc{ rfc3007,
|
||
author = "B. Wellington",
|
||
title = "Secure Domain Name System {(DNS)} Dynamic Update",
|
||
month = nov,
|
||
year = "2000",
|
||
note = "RFC 3007",
|
||
}
|
||
|
||
@misc{ rfc3022,
|
||
author = "P. Srisuresh and K. Egevang",
|
||
title = "Traditional {IP} Network Address Translator
|
||
{(Traditional NAT)}",
|
||
month = jan,
|
||
year = "2001",
|
||
note = "RFC 3022",
|
||
}
|
||
|
||
@misc{ rfc3027,
|
||
author = "M. Holdrege and P. Srisuresh",
|
||
title = "Protocol Complications
|
||
with the {IP} Network Address Translator",
|
||
month = jan,
|
||
year = "2001",
|
||
note = "RFC 3027",
|
||
}
|
||
|
||
@misc{ rfc3080,
|
||
author = {M. Rose},
|
||
title = {The Blocks Extensible Exchange Protocol Core},
|
||
month = mar,
|
||
year = 2001,
|
||
note = "RFC 3080",
|
||
}
|
||
|
||
@misc{ rfc3102,
|
||
author = "M. Borella and J. Lo and D. Grabelsky and G. Montenegro",
|
||
title = "Realm Specific {IP}: Framework",
|
||
month = oct,
|
||
year = "2001",
|
||
note = "RFC 3102",
|
||
}
|
||
|
||
% author = {J. Border and M. Kojo and J. Griner and G. Montenegro
|
||
% and Z. Shelby},
|
||
@misc{ rfc3135,
|
||
author = {J. Border and others},
|
||
title = {Performance Enhancing Proxies Intended to Mitigate
|
||
Link-Related Degradations},
|
||
month = jun,
|
||
year = 2001,
|
||
note = {RFC 3135},
|
||
}
|
||
|
||
@misc{ rfc3142,
|
||
author = {J. Hagino and K. Yamamoto},
|
||
title = {An {IPv6}-to-{IPv4} Transport Relay Translator},
|
||
month = jun,
|
||
year = 2001,
|
||
note = {RFC 3142},
|
||
}
|
||
|
||
@misc{ rfc3161,
|
||
author = {C. Adams and P. Cain and D. Pinkas and R. Zuccherato},
|
||
title = {Internet X.509 Public Key Infrastructure
|
||
Time-Stamp Protocol (TSP)},
|
||
month = aug,
|
||
year = 2001,
|
||
note = {RFC 3161},
|
||
}
|
||
|
||
@misc{ rfc3168,
|
||
author = {K. Ramakrishnan and S. Floyd and D. Black},
|
||
title = {The Addition of Explicit Congestion Notification {(ECN)}
|
||
to {IP}},
|
||
month = sep,
|
||
year = 2001,
|
||
note = {RFC 3168},
|
||
}
|
||
|
||
@misc{ rfc3178,
|
||
author = "J. Hagino and H. Snyder",
|
||
title = "{IPv6} Multihoming Support at Site Exit Routers",
|
||
month = oct,
|
||
year = "2001",
|
||
note = "RFC 3178",
|
||
}
|
||
|
||
@misc{ rfc3234,
|
||
author = "Brian Carpenter and Scott Brim",
|
||
title = "{Middleboxes: Taxonomy and Issues}",
|
||
month = feb,
|
||
year = "2002",
|
||
note = "RFC 3234",
|
||
}
|
||
|
||
@misc{ rfc3235,
|
||
author = "D. Senie",
|
||
title = "Network Address Translator {(NAT)}-Friendly
|
||
Application Design Guidelines",
|
||
month = jan,
|
||
year = "2002",
|
||
note = "RFC 3235",
|
||
}
|
||
|
||
@misc{ rfc3261,
|
||
author = "J. Rosenberg and others",
|
||
title = "{SIP:} Session Initiation Protocol",
|
||
month = jun,
|
||
year = 2002,
|
||
note = "RFC 3261",
|
||
}
|
||
|
||
@misc{ rfc3280,
|
||
author = "R. Housley and W. Polk and W. Ford and D. Solo",
|
||
title = "Internet {X.509} Public Key Infrastructure
|
||
Certificate and Certificate Revocation List {(CRL)} Profile",
|
||
month = apr,
|
||
year = 2002,
|
||
note = "RFC 3280",
|
||
}
|
||
|
||
@misc{ rfc3303,
|
||
author = "P. Srisuresh and J. Kuthan and J. Rosenberg and A. Molitor
|
||
and A. Rayhan",
|
||
title = "Middlebox communication architecture and framework",
|
||
month = aug,
|
||
year = "2002",
|
||
note = "RFC 3303",
|
||
}
|
||
|
||
@misc{ rfc3315,
|
||
author = {R. {Droms, editor} and J. Bound and B. Volz and T. Lemon
|
||
and C. Perkins and M. Carney},
|
||
title = {Dynamic Host Configuration Protocol for {IPv6} {(DHCPv6)}},
|
||
month = jul,
|
||
year = 2003,
|
||
note = {RFC 3315},
|
||
}
|
||
|
||
@misc{ rfc3344,
|
||
author = "C. {Perkins, Editor}",
|
||
title = "{IP} Mobility Support for {IPv4}",
|
||
month = aug,
|
||
year = "2002",
|
||
note = "RFC 3344",
|
||
}
|
||
|
||
@misc{ rfc3428,
|
||
author = "B. {Campbell, Editor}",
|
||
title = "{Session Initiation Protocol Extension for Instant Messaging}",
|
||
month = dec,
|
||
year = "2002",
|
||
note = "RFC 3428",
|
||
}
|
||
|
||
@misc{ rfc3448,
|
||
author = "M. Handley and S. Floyd and J. Padhye and J. Widmer",
|
||
title = "{TCP} Friendly Rate Control {(TFRC)}: Protocol Specification",
|
||
month = jan,
|
||
year = 2003,
|
||
note = "RFC 3448",
|
||
}
|
||
|
||
@misc{ rfc3489,
|
||
author = "J. Rosenberg and others",
|
||
title = "{STUN} - Simple Traversal of User Datagram Protocol {(UDP)}
|
||
Through Network Address Translators {(NATs)}",
|
||
month = mar,
|
||
year = "2003",
|
||
note = "RFC 3489",
|
||
}
|
||
|
||
@misc{ rfc3501,
|
||
author = {M. Crispin},
|
||
title = {Internet Message Access Protocol - Version 4rev1},
|
||
month = mar,
|
||
year = 2003,
|
||
note = {RFC 3501},
|
||
}
|
||
|
||
@misc{ rfc3514,
|
||
author = {S. Bellovin},
|
||
title = {The Security Flag in the {IPv4} Header},
|
||
month = apr,
|
||
year = 2003,
|
||
note = {RFC 3514},
|
||
}
|
||
|
||
@misc{ rfc3519,
|
||
author = {H. Levkowetz and S. Vaarala},
|
||
title = {Mobile {IP} Traversal of Network Address Translation
|
||
{(NAT)} Devices},
|
||
month = apr,
|
||
year = 2003,
|
||
note = {RFC 3519},
|
||
}
|
||
|
||
|
||
@misc{ rfc3530,
|
||
author = {S. Shepler and B. Callaghan and D. Robinson and R. Thurlow
|
||
and C. Beame and M. Eisler and D. Noveck},
|
||
title = {Network File System {(NFS)} version 4 Protocol},
|
||
month = apr,
|
||
year = 2003,
|
||
note = {RFC 3530},
|
||
}
|
||
|
||
@misc{ rfc3550,
|
||
author = {H. Schulzrinne and S. Casner and R. Frederick
|
||
and V. Jacobson},
|
||
title = {{RTP}: A Transport Protocol for Real-Time Applications},
|
||
month = jul,
|
||
year = 2003,
|
||
note = "RFC 3550",
|
||
}
|
||
|
||
@misc{ rfc3582,
|
||
author = "J. Abley and B. Black and V. Gill",
|
||
title = "Goals for {IPv6} Site-Multihoming Architectures",
|
||
month = aug,
|
||
year = "2003",
|
||
note = "RFC 3582",
|
||
}
|
||
|
||
@misc{ rfc3633,
|
||
author = "O. Troan and R. Droms",
|
||
title = "{IPv6} Prefix Options for
|
||
Dynamic Host Configuration Protocol {(DHCP)} version 6",
|
||
month = dec,
|
||
year = 2003,
|
||
note = "RFC 3633",
|
||
}
|
||
|
||
@misc{ rfc3649,
|
||
author = {S. Floyd},
|
||
title = {{HighSpeed TCP} for Large Congestion Windows},
|
||
month = dec,
|
||
year = 2003,
|
||
note = {RFC 3649},
|
||
}
|
||
|
||
@misc{ rfc3686,
|
||
author = {R. Housley},
|
||
title = {Using Advanced Encryption Standard {(AES)} Counter Mode
|
||
With {IPsec} Encapsulating Security Payload {(ESP)}},
|
||
month = jan,
|
||
year = 2004,
|
||
note = {RFC 3686},
|
||
}
|
||
|
||
@misc{ rfc3708,
|
||
author = {E. Blanton and M. Allman},
|
||
title = {Using {TCP} Duplicate Selective Acknowledgement {(DSACKs)} and
|
||
Stream Control Transmission Protocol {(SCTP)}
|
||
Duplicate Transmission Sequence Numbers {(TSNs)}
|
||
to Detect Spurious Retransmissions},
|
||
month = feb,
|
||
year = 2004,
|
||
note = {RFC 3708},
|
||
}
|
||
|
||
@misc{ rfc3715,
|
||
author = {B. Aboba and W. Dixon},
|
||
title = {{IPsec-Network Address Translation (NAT) Compatibility Requirements}},
|
||
month = mar,
|
||
year = 2005,
|
||
note = {RFC 3715},
|
||
}
|
||
|
||
@misc{ rfc3720,
|
||
author = {J. Satran and K. Meth and C. Sapuntzakis and M. Chadalapaka
|
||
and E. Zeidner},
|
||
title = {Internet Small Computer Systems Interface {(iSCSI)}},
|
||
month = apr,
|
||
year = 2004,
|
||
note = {RFC 3720},
|
||
}
|
||
|
||
@misc{ rfc3758,
|
||
author = {R. Stewart and M. Ramalho and Q. Xie and M. Tuexen and P. Conrad},
|
||
title = {SCTP Partial Reliability Extension},
|
||
month = may,
|
||
year = 2004,
|
||
note = {RFC 3758},
|
||
}
|
||
|
||
@misc{ rfc3828,
|
||
author = "L-A. Larzon and M. Degermark and S. Pink and
|
||
L-E. {Jonsson, Ed.} and G. {Fairhurst, Ed.}",
|
||
title = "The Lightweight User Datagram Protocol {(UDP-Lite)}",
|
||
month = jul,
|
||
year = 2004,
|
||
note = "RFC 3828",
|
||
}
|
||
|
||
@misc{ rfc3833,
|
||
author = {D. Atkins and R. Austein},
|
||
title = {\href{http://tools.ietf.org/html/rfc3833}{Threat Analysis of the Domain Name System (DNS)}},
|
||
month = aug,
|
||
year = 2004,
|
||
note = {RFC 3833},
|
||
}
|
||
|
||
@misc{ rfc3920,
|
||
author = "P. {Saint-Andre, Editor}",
|
||
title = {Extensible Messaging and Presence Protocol (XMPP): Core},
|
||
month = oct,
|
||
year = 2004,
|
||
note = {RFC 3920},
|
||
}
|
||
|
||
@misc{ rfc3947,
|
||
author = {T. Kivinen},
|
||
title = {Negotiation of {NAT}-Traversal in the {IKE}},
|
||
month = jan,
|
||
year = 2005,
|
||
note = {RFC 3947},
|
||
}
|
||
|
||
@misc{ rfc3948,
|
||
author = {A. Huttunen and B. Swander and V. Volpe and L. DiBurro
|
||
and M. Stenberg},
|
||
title = {{UDP} Encapsulation of {IPsec ESP} Packets},
|
||
month = jan,
|
||
year = 2005,
|
||
note = {RFC 3948},
|
||
}
|
||
|
||
@misc{ rfc3972,
|
||
author = {T. Aura},
|
||
title = {Cryptographically Generated Addresses (CGA)},
|
||
month = mar,
|
||
year = 2005,
|
||
note = {RFC 3972},
|
||
}
|
||
|
||
@misc{ rfc3977,
|
||
author = {C. Feather},
|
||
title = {Network News Transfer Protocol {(NNTP)}},
|
||
month = oct,
|
||
year = 2006,
|
||
note = {RFC 3977},
|
||
}
|
||
|
||
@misc{ rfc4033,
|
||
author = "R. Arends and R. Austein and M. Larson
|
||
and D. Massey and S. Rose",
|
||
title = "{DNS Security Introduction and Requirements}",
|
||
month = mar,
|
||
year = 2005,
|
||
note = "RFC 4033",
|
||
}
|
||
|
||
@misc{ rfc4116,
|
||
author = {J. Abley and K. Lindqvist and E. Davies and
|
||
B. Black and V. Gill},
|
||
title = {{IPv4} Multihoming Practices and Limitations},
|
||
month = jul,
|
||
year = 2005,
|
||
note = {RFC 4116},
|
||
}
|
||
|
||
@misc{ rfc4193,
|
||
author = {R. Hinden and B. Haberman},
|
||
title = {Unique Local {IPv6} Unicast Addresses},
|
||
month = oct,
|
||
year = 2005,
|
||
note = {RFC 4193},
|
||
}
|
||
|
||
@misc{ rfc4301,
|
||
author = "S. Kent and K. Seo",
|
||
title = "Security Architecture for the {Internet} Protocol",
|
||
month = dec,
|
||
year = "2005",
|
||
note = "RFC 4301",
|
||
}
|
||
|
||
@misc{ rfc4302,
|
||
author = {S. Kent},
|
||
title = {{IP} Authentication Header},
|
||
month = dec,
|
||
year = 2005,
|
||
note = {RFC 4302},
|
||
}
|
||
|
||
@misc{ rfc4303,
|
||
author = "S. Kent",
|
||
title = "{IP} Encapsulating Security Payload {(ESP)}",
|
||
month = dec,
|
||
year = "2005",
|
||
note = "RFC 4303",
|
||
}
|
||
|
||
@misc{ rfc4306,
|
||
author = {C. {Kaufman, Ed.}},
|
||
title = {Internet Key Exchange {(IKEv2)} Protocol},
|
||
month = dec,
|
||
year = 2005,
|
||
note = "RFC 4306",
|
||
}
|
||
|
||
@misc{ rfc4251,
|
||
author = "T. Ylonen and C. {Lonvick, Ed.}",
|
||
title = "The Secure Shell Protocol Architecture",
|
||
month = jan,
|
||
year = 2006,
|
||
note = "RFC 4251",
|
||
}
|
||
% title = "The Secure Shell {(SSH)} Protocol Architecture",
|
||
|
||
@misc{ rfc4252,
|
||
author = {T. Ylonen and C. {Lonvick, Ed.}},
|
||
title = {The Secure Shell {(SSH)} Authentication Protocol},
|
||
month = jan,
|
||
year = 2006,
|
||
note = {RFC 4252},
|
||
}
|
||
|
||
@misc{ rfc4253,
|
||
author = {T. Ylonen and C. {Lonvick, Ed.}},
|
||
title = {\href{https://tools.ietf.org/html/rfc4253}{The Secure Shell {(SSH)} Transport Layer Protocol}},
|
||
month = jan,
|
||
year = 2006,
|
||
note = {RFC 4253},
|
||
}
|
||
|
||
@misc{ rfc4254,
|
||
author = "T. Ylonen and C. {Lonvick, Ed.}",
|
||
title = "The Secure Shell {(SSH)} Connection Protocol",
|
||
month = jan,
|
||
year = 2006,
|
||
note = "RFC 4254",
|
||
}
|
||
|
||
@misc{ rfc4271,
|
||
author = "Y. Rekhter and T. Li and S. {Hares (editors)}",
|
||
title = "A Border Gateway Protocol 4 {(BGP-4)}",
|
||
month = jan,
|
||
year = 2006,
|
||
note = "RFC 4271",
|
||
}
|
||
|
||
@misc{ rfc4340,
|
||
author = "E. Kohler and M. Handley and S. Floyd",
|
||
title = "Datagram Congestion Control Protocol {(DCCP)}",
|
||
month = mar,
|
||
year = 2006,
|
||
note = "RFC 4340",
|
||
}
|
||
|
||
@misc{ rfc4341,
|
||
author = "E. Kohler and S. Floyd",
|
||
title = "Profile for Datagram Congestion Control Protocol (DCCP) Congestion Control ID 2: TCP-like Congestion Control",
|
||
month = mar,
|
||
year = 2006,
|
||
note = "RFC 4341",
|
||
}
|
||
|
||
@misc{ rfc4346,
|
||
author = {T. Dierks and E. Rescorla},
|
||
title = {The Transport Layer Security {(TLS)} Protocol Version 1.1},
|
||
month = apr,
|
||
year = 2006,
|
||
note = {RFC 4346},
|
||
}
|
||
|
||
@misc{ rfc4347,
|
||
author = "E. Rescorla and N. Modadugu",
|
||
title = "Datagram Transport Layer Security",
|
||
month = apr,
|
||
year = 2006,
|
||
note = "RFC 4347",
|
||
}
|
||
|
||
@misc{ rfc4380,
|
||
author = {C. Huitema},
|
||
title = {{Teredo}: Tunneling {IPv6} over {UDP} through
|
||
Network Address Translations {(NATs)}},
|
||
month = feb,
|
||
year = 2006,
|
||
note = {RFC 4380},
|
||
}
|
||
|
||
|
||
@misc{ rfc4423,
|
||
author = {R. Moskowitz and P. Nikander},
|
||
title = {Host Identity Protocol {(HIP)} Architecture},
|
||
month = may,
|
||
year = 2006,
|
||
note = {RFC 4423},
|
||
}
|
||
|
||
@misc{ rfc4510,
|
||
author = {K. {Zeilenga, Ed.}},
|
||
title = {\href{https://tools.ietf.org/html/rfc4510}{Lightweight Directory Access Protocol {(LDAP)}: Technical Specification Road Map}},
|
||
month = jun,
|
||
year = 2006,
|
||
note = {RFC 4510},
|
||
}
|
||
|
||
@misc{ rfc4634,
|
||
author = {D. {Eastlake 3rd} and T. Hansen},
|
||
title = {{US} Secure Hash Algorithms ({SHA} and {HMAC-SHA})},
|
||
month = jul,
|
||
year = 2006,
|
||
note = {RFC 4634},
|
||
}
|
||
|
||
@misc{ rfc4786,
|
||
author = {J. Abley and K. Lindqvist},
|
||
title = {Operation of Anycast Services},
|
||
month = dec,
|
||
year = 2006,
|
||
note = {RFC 4786},
|
||
}
|
||
|
||
@misc{ rfc4787,
|
||
author = {F. {Audet, ed.} and C. Jennings},
|
||
title = {Network Address Translation {(NAT)} Behavioral Requirements
|
||
for Unicast {UDP}},
|
||
month = jan,
|
||
year = 2007,
|
||
note = {RFC 4787},
|
||
}
|
||
|
||
@misc{ rfc4843,
|
||
author = {P. Nikander and J. Laganier and F. Dupont},
|
||
title = {An {IPv6} Prefix for Overlay Routable Cryptographic
|
||
Hash Identifiers {(ORCHID)}},
|
||
month = apr,
|
||
year = 2007,
|
||
note = {RFC 4843},
|
||
}
|
||
|
||
@misc{ rfc4864,
|
||
author = {G. {Van de Velde} and T. Hain and R. Droms and B. Carpenter
|
||
and E. Klein},
|
||
title = {Local Network Protection for {IPv6}},
|
||
month = may,
|
||
year = 2007,
|
||
note = {RFC 4864},
|
||
}
|
||
|
||
@misc{ rfc4868,
|
||
author = {S. Kelly and S. Frankel},
|
||
title = {Using {HMAC-SHA-256}, {HMAC-SHA-384}, and {HMAC-SHA-512}
|
||
with {IPsec}},
|
||
month = may,
|
||
year = 2007,
|
||
note = {RFC 4868},
|
||
}
|
||
|
||
@misc{ rfc4960,
|
||
author = "R. {Stewart, ed.}",
|
||
title = "Stream Control Transmission Protocol",
|
||
month = sep,
|
||
year = 2007,
|
||
note = "RFC 4960",
|
||
}
|
||
|
||
@misc{ rfc4984,
|
||
author = {D. {Meyer, Ed.} and L. {Zhang, Ed.} and K. {Fall, Ed.}},
|
||
title = {Report from the {IAB} Workshop on Routing and Addressing},
|
||
month = sep,
|
||
year = 2007,
|
||
note = "RFC 4984",
|
||
}
|
||
|
||
@misc{ rfc4987,
|
||
author = {W. Eddy},
|
||
title = {{TCP} {SYN} Flooding Attacks and Common Mitigations},
|
||
month = aug,
|
||
year = 2007,
|
||
note = "RFC 4987",
|
||
}
|
||
|
||
@misc{ rfc5050,
|
||
author = {K. Scott and S. Burleigh},
|
||
title = {Bundle Protocol Specification},
|
||
month = nov,
|
||
year = 2007,
|
||
note = {RFC 5050},
|
||
}
|
||
|
||
@misc{ rfc5062,
|
||
author = {R. Stewart and M. Tuexen and G. Camarillo},
|
||
title = {Security Attacks Found Against the
|
||
{Stream Control Transmission Protocol (SCTP)}
|
||
and Current Countermeasures},
|
||
month = sep,
|
||
year = 2007,
|
||
note = {RFC 5062},
|
||
}
|
||
|
||
@misc{ rfc5128,
|
||
author = {P. Srisuresh and B. Ford and D. Kegel},
|
||
title = {State of Peer-to-Peer {(P2P)} Communication across
|
||
Network Address Translators {(NATs)}},
|
||
month = mar,
|
||
year = 2008,
|
||
note = "RFC 5128",
|
||
}
|
||
|
||
@misc{ rfc5135,
|
||
author = {D. Wing and T. Eckert},
|
||
title = {{IP} Multicast Requirements
|
||
for a Network Address Translator {(NAT)}
|
||
and a Network Address Port Translator {(NAPT)}},
|
||
month = feb,
|
||
year = 2008,
|
||
note = "RFC 5135",
|
||
}
|
||
|
||
@misc{ rfc5190,
|
||
author = {J. Quittek and M. Stiemerling and P. Srisuresh},
|
||
title = {Definitions of Managed Objects for Middlebox Communication},
|
||
month = mar,
|
||
year = 2008,
|
||
note = {RFC 5190},
|
||
}
|
||
|
||
@misc{ rfc5201,
|
||
author = {R. Moskowitz and others},
|
||
title = {Host Identity Protocol},
|
||
month = apr,
|
||
year = 2008,
|
||
note = {RFC 5201},
|
||
}
|
||
|
||
@misc{ rfc5207,
|
||
author = {M. Stiemerling and J. Quittek and L. Eggert},
|
||
title = {{NAT} and Firewall Traversal Issues
|
||
of Host Identity Protocol {(HIP)} Communication},
|
||
month = apr,
|
||
year = 2008,
|
||
note = {RFC 5207},
|
||
}
|
||
|
||
@misc{ rfc5238,
|
||
author = {T. Phelan},
|
||
title = "{Datagram Transport Layer Security {(DTLS)} over the
|
||
Datagram Congestion Control Protocol {(DCCP)}}",
|
||
month = may,
|
||
year = 2008,
|
||
note = {RFC 5238},
|
||
}
|
||
|
||
% obsoleted by rfc8446
|
||
@techreport{ rfc5246,
|
||
author = {Dierks, T. and Rescorla, E.},
|
||
title = {\href{https://tools.ietf.org/html/rfc5246}{The Transport Layer
|
||
Security ({TLS}) Protocol Version 1.2}},
|
||
type = {RFC},
|
||
number = {5246},
|
||
institution = {RFC Editor},
|
||
year = 2008,
|
||
month = aug
|
||
}
|
||
|
||
@misc{ rfc5382,
|
||
author = {S. {Guha, Ed.} and K. Biswas and B. Ford and
|
||
S. Sivakumar and P. Srisuresh},
|
||
title = {{NAT} Behavioral Requirements for {TCP}},
|
||
month = oct,
|
||
year = 2008,
|
||
note = {RFC 5382},
|
||
}
|
||
|
||
@misc{ rfc5389,
|
||
author = {J. Rosenberg and R. Mahy and P. Matthews and D. Wing},
|
||
title = {Session Traversal Utilities for {NAT} {(STUN)}},
|
||
month = oct,
|
||
year = 2008,
|
||
note = {RFC 5389},
|
||
}
|
||
|
||
@misc{ rfc5456,
|
||
author = {M. Spencer and B. Capouch and E. {Guy, Ed.} and
|
||
F. Miller and K. Shumard},
|
||
title = {{IAX}: {Inter-Asterisk eXchange} Version 2},
|
||
month = feb,
|
||
year = 2010,
|
||
note = {RFC 5456},
|
||
}
|
||
|
||
@misc{ rfc5533,
|
||
author = {E. Nordmark and M. Bagnulo},
|
||
title = {Shim6: Level 3 Multihoming Shim Protocol for IPv6},
|
||
month = jun,
|
||
year = 2009,
|
||
note = {RFC 5533},
|
||
}
|
||
|
||
@misc{ rfc5762,
|
||
author = {C. Perkins},
|
||
title = {{RTP} and the Datagram Congestion Control Protocol ({DCCP})},
|
||
month = apr,
|
||
year = 2010,
|
||
note = {RFC 5762},
|
||
}
|
||
|
||
@misc { rfc5849,
|
||
author = {E. Hammer-Lahav},
|
||
title = {\href{https://tools.ietf.org/html/rfc5849}{The {OAuth} 1.0 Protocol}},
|
||
month = apr,
|
||
year = 2010,
|
||
note = {RFC 5849},
|
||
}
|
||
|
||
@misc{ rfc5905,
|
||
author = {D. Mills and J. {Martin, Ed.} and J. Burbank and W. Kasch},
|
||
title = {Network Time Protocol Version 4:
|
||
Protocol and Algorithms Specification},
|
||
month = jun,
|
||
year = 2010,
|
||
note = {RFC 5905},
|
||
}
|
||
|
||
@misc{ rfc5906,
|
||
author = {B. {Haberman, Ed.} and D. Mills},
|
||
title = {Network Time Protocol Version 4: Autokey Specification},
|
||
month = jun,
|
||
year = 2010,
|
||
note = {RFC 5906},
|
||
}
|
||
|
||
@misc{ rfc6101,
|
||
title={The Secure Sockets Layer {(SSL)} Protocol Version 3.0},
|
||
author={Freier, Alan and Karlton, Philip and Kocher, Paul},
|
||
month = aug,
|
||
year={2011},
|
||
note = {RFC 6101},
|
||
}
|
||
|
||
@misc{ rfc6347,
|
||
author = {E. Rescorla and N. Modadugu},
|
||
title = {\href{https://tools.ietf.org/html/rfc6347}{Datagram Transport Layer Security Version 1.2}},
|
||
month = jan,
|
||
year = 2012,
|
||
note = "RFC 6347",
|
||
}
|
||
|
||
@techreport{ rfc6698,
|
||
author = {Hoffman, P. and Schlyter, J.},
|
||
title = {\href{https://tools.ietf.org/html/rfc6698}{The {DNS}-Based
|
||
Authentication of Named Entities ({DANE}) Transport Layer Security ({TLS})
|
||
Protocol: {TLSA}}},
|
||
type = {RFC},
|
||
number = {6698},
|
||
institution = {RFC Editor},
|
||
year = {2012},
|
||
month = aug
|
||
}
|
||
|
||
@misc { rfc6749,
|
||
author = {Ed Hardt},
|
||
title = {\href{https://tools.ietf.org/html/rfc7009}{The {OAuth} 2.0 Authorization Framework}},
|
||
month = oct,
|
||
year = 2012,
|
||
note = {RFC 6749},
|
||
}
|
||
|
||
@misc{ rfc6781,
|
||
author = {O. Kolkman and W. Mekking and R. Gieben},
|
||
title = {\href{https://tools.ietf.org/html/rfc6781}{DNSSEC Operational Practices, Version 2}},
|
||
month = dec,
|
||
year = 2012,
|
||
note = {RFC 6781},
|
||
}
|
||
|
||
@misc{ rfc6961,
|
||
author = {Y. Pettersen},
|
||
title = {\href{https://tools.ietf.org/html/rfc6961}{The Transport Layer Security (TLS) Multiple Certificate Status Request Extension}},
|
||
month = jun,
|
||
year = 2013,
|
||
note = {RFC 6961},
|
||
}
|
||
|
||
@misc{ rfc6962,
|
||
author = {B. Laurie and A. Langley and E. Kasper},
|
||
title = {Certificate Transparency},
|
||
month = jun,
|
||
year = 2013,
|
||
note = {RFC 6962},
|
||
}
|
||
|
||
@misc { rfc7009,
|
||
author = {T. Loddersted and S. Dronia and M. Scurtescu},
|
||
title = {\href{https://tools.ietf.org/html/rfc7009}{{OAuth} 2.0 Token Revocation}},
|
||
month = aug,
|
||
year = 2013,
|
||
note = {RFC 7009},
|
||
}
|
||
|
||
@misc{ rfc7530,
|
||
author = {T. Haynes and D. Noveck},
|
||
title = {\href{https://tools.ietf.org/html/rfc7530}{Network File System {(NFS)} version 4 Protocol}},
|
||
month = mar,
|
||
year = 2015,
|
||
note = {RFC 7530},
|
||
}
|
||
|
||
@misc{ rfc7540,
|
||
author = {M. Belshe and R. Peon and M. {Thomson, Ed.}},
|
||
title = {Hypertext Transfer Protocol Version 2 {(HTTP/2)}},
|
||
month = may,
|
||
year = 2015,
|
||
note = {RFC 7540},
|
||
}
|
||
|
||
@techreport{rfc8446,
|
||
author = {Rescorla, E.},
|
||
title = {\href{https://tools.ietf.org/html/rfc8446}{The Transport Layer
|
||
Security ({TLS}) Protocol Version 1.3}},
|
||
type = {RFC},
|
||
number = {8446},
|
||
institution = {RFC Editor},
|
||
year = 2018,
|
||
month = aug
|
||
}
|
||
|
||
%%%%% Internet-Drafts
|
||
|
||
@misc{ rescorla20encrypted,
|
||
author = {E. Rescorla and K. Oku and N. Sullivan and C.A. Wood},
|
||
title = "{\href{https://tlswg.org/draft-ietf-tls-esni/draft-ietf-tls-esni.html}{Encrypted Server Name Indication for TLS 1.3}}",
|
||
month = feb,
|
||
year = 2020,
|
||
note = "Internet-Draft draft-ietf-tls-esni-latest (Work in Progress)",
|
||
}
|
||
|
||
@misc{ wing10happy,
|
||
author = {Dan Wing and Andrew Yourtchenko},
|
||
title = "{Happy Eyeballs: Trending Towards Success with Dual-Stack Hosts}",
|
||
month = oct,
|
||
year = 2010,
|
||
note = "Internet-Draft draft-wing-v6ops-happy-eyeballs-ipv6-01 (Work in Progress)",
|
||
}
|
||
|
||
@misc{ ford10tcp,
|
||
author = {Alan Ford and Costin Raiciu and Mark Handley},
|
||
title = "{TCP Extensions for Multipath Operation with Multiple Addresses}",
|
||
month = oct,
|
||
year = 2010,
|
||
note = "Internet-Draft draft-ietf-mptcp-multiaddressed-02 (Work in Progress)",
|
||
}
|
||
|
||
@misc{ manner10generic,
|
||
author = {J. Manner and N. Varis and B. Briscoe},
|
||
title = "{Generic UDP Tunnelling (GUT)}",
|
||
month = jul,
|
||
year = 2010,
|
||
note = "Internet-Draft draft-manner-tsvwg-gut-02 (Work in Progress)",
|
||
}
|
||
|
||
@misc{ tuexen10udp,
|
||
author = {Michael Tuexen and Randall Stewart},
|
||
title = "{UDP Encapsulation of SCTP Packets}",
|
||
month = jan,
|
||
year = 2010,
|
||
note = "Internet-Draft draft-tuexen-sctp-udp-encaps-05 (Work in Progress)",
|
||
}
|
||
|
||
@misc{ phelan10dccp,
|
||
author = {T. Phelan},
|
||
title = "{DCCP Encapsulation in UDP for NAT Traversal (DCCP-UDP)}",
|
||
month = aug,
|
||
year = 2010,
|
||
note = "Internet-Draft draft-ietf-dccp-udpencap-02 (Work in Progress)",
|
||
}
|
||
|
||
@misc{ falk07specification,
|
||
author = {Aaron Falk and Yuri Pryadkin and Dina Katabi},
|
||
title = {Specification for the Explicit Control Protocol (XCP)},
|
||
month = jul,
|
||
year = 2007,
|
||
note = "Internet-Draft draft-falk-xcp-spec-03 (Expired)",
|
||
}
|
||
|
||
@misc{ odell97gse,
|
||
author = {Mike O'Dell},
|
||
title = {{GSE} - An Alternate Addressing Architecture for IPv6},
|
||
month = feb,
|
||
day = 24,
|
||
year = 1997,
|
||
note = "Internet-Draft (Work in Progress)",
|
||
}
|
||
|
||
@misc{ cheshire04dynamic,
|
||
author = "Stuart Cheshire and Bernard Aboba and Erik Guttman",
|
||
title = "Dynamic Configuration of {IPv4} Link-Local Addresses",
|
||
month = jul,
|
||
year = "2004",
|
||
note = "Internet-Draft (Work in Progress)",
|
||
}
|
||
|
||
@misc{ jennings04nat,
|
||
author = {C. Jennings},
|
||
title = {{NAT} Classification Results using {STUN}},
|
||
month = oct,
|
||
year = {2004},
|
||
note = "Internet-Draft (Work in Progress)",
|
||
}
|
||
|
||
@misc{ huitema04teredo,
|
||
author = "C. Huitema",
|
||
title = "Teredo: Tunneling {IPv6} over {UDP} through {NATs}",
|
||
month = mar,
|
||
year = "2004",
|
||
note = "Internet-Draft (Work in Progress)",
|
||
}
|
||
|
||
% obsoleted by rfc4423
|
||
@misc{ moskowitz03hip-arch,
|
||
author = "R. Moskowitz and P. Nikander",
|
||
title = "Host Identity Protocol Architecture",
|
||
month = apr,
|
||
year = "2003",
|
||
note = "Internet-Draft (Work in Progress)",
|
||
}
|
||
|
||
@misc{ perkins02adhoc,
|
||
author = "Charles E. Perkins and Elizabeth M. Belding-Royer
|
||
and Samir Das",
|
||
title = "Ad Hoc On-Demand Distance Vector {(AODV)} Routing",
|
||
|
||
note = "Internet-Draft (Work in Progress)",
|
||
month = jan,
|
||
year = "2002",
|
||
}
|
||
|
||
@misc{ ylonen02ssh,
|
||
author = "T. Ylonen and T. Kivinen and M. Saarinen and T. Rinne and S. Lehtinen",
|
||
title = "{SSH} Protocol Architecture",
|
||
month = sep,
|
||
year = "2002",
|
||
note = "Internet-Draft (Work in Progress)",
|
||
}
|
||
|
||
@misc{ rosenberg07ice,
|
||
author = "J. Rosenberg",
|
||
title = "Interactive Connectivity Establishment {(ICE)}",
|
||
month = oct,
|
||
day = 29,
|
||
year = "2007",
|
||
note = "Internet-Draft (Work in Progress)",
|
||
}
|
||
|
||
@misc{ rosenberg03traversal,
|
||
author = "J. Rosenberg and C. Huitema and R. Mahy",
|
||
title = "Traversal Using Relay {NAT} {(TURN)}",
|
||
month = oct,
|
||
year = "2003",
|
||
note = "Internet-Draft (Work in Progress)",
|
||
}
|
||
|
||
@misc{ touch06tcp,
|
||
author = "J. Touch",
|
||
title = "A {TCP} Option for Port Names",
|
||
month = apr,
|
||
year = 2006,
|
||
note = "Internet-Draft (Work in Progress)",
|
||
}
|
||
|
||
@misc{ spencer06iax2,
|
||
author = {M. Spencer and others},
|
||
title = {{IAX2}: {Inter-Asterisk eXchange} Version 2},
|
||
month = oct,
|
||
date = 23,
|
||
year = 2006,
|
||
note = "Internet-Draft (Work in Progress)",
|
||
}
|
||
|
||
% Note: obsoleted by RFC 4787
|
||
@misc{ audet06nat,
|
||
author = "F. {Audet, ed.} and C. Jennings",
|
||
title = "NAT Behavioral Requirements for Unicast UDP",
|
||
month = oct,
|
||
year = 2006,
|
||
note = "Internet-Draft (Work in Progress)",
|
||
}
|
||
|
||
@misc{ ong00tunneling,
|
||
author = {L. Ong and R. Stewart and Q. Xie},
|
||
title = {Tunneling of {SCTP} over Single {UDP} Port},
|
||
month = mar,
|
||
year = 2000,
|
||
note = {Internet-Draft (Work in Progress)},
|
||
}
|
||
|
||
@misc{ guha07nat,
|
||
author = {S. {Guha, Ed.} and K. Biswas and B. Ford
|
||
and S. Sivakumar and P. Srisuresh},
|
||
title = {{NAT} Behavioral Requirements for {TCP}},
|
||
month = apr,
|
||
day = 28,
|
||
year = 2007,
|
||
note = {Internet-Draft (Work in Progress)},
|
||
}
|
||
|
||
@misc{ tuexen07udp,
|
||
author = {M. Tuexen and R. Stewart},
|
||
title = {{UDP} Encapsulation of {SCTP} Packets},
|
||
month = mar,
|
||
day = 19,
|
||
year = 2013,
|
||
note = {Internet-Draft (Work in Progress)},
|
||
}
|
||
|
||
@misc{ woodyatt08application,
|
||
author = {J H. Woodyatt},
|
||
title = {Application Listener Discovery {(ALD)} for {IPv6}},
|
||
month = dec,
|
||
day = 21,
|
||
year = 2007,
|
||
note = {Internet-Draft (Work in Progress)},
|
||
}
|
||
|
||
@misc{ phelan08datagram,
|
||
author = {T. Phelan},
|
||
title = {Datagram Congestion Control Protocol {(DCCP)}
|
||
Encapsulation for {NAT} Traversal {(DCCP-NAT)}},
|
||
month = feb,
|
||
year = 2008,
|
||
note = {Internet-Draft (Work in Progress)},
|
||
}
|
||
|
||
@misc{ cotton08iana,
|
||
author = {M. Cotton and others},
|
||
title = {{IANA} Allocation Guidelines for {TCP} and {UDP} Port Numbers},
|
||
month = feb,
|
||
year = 2008,
|
||
note = {Internet-Draft (Work in Progress)},
|
||
}
|
||
|
||
@misc{ rosenberg08udp,
|
||
author = {J. Rosenberg},
|
||
title = {{UDP} and {TCP} as the New Waist of the {Internet} Hourglass},
|
||
month = feb,
|
||
year = 2008,
|
||
note = {Internet-Draft (Work in Progress)},
|
||
}
|
||
|
||
@misc{ stiemerling08nat,
|
||
author = {M. Stiemerling and H. Tschofenig and C. Aoun and E. Davies},
|
||
title = {{NAT}/Firewall {NSIS} Signaling Layer Protocol {(NSLP)}},
|
||
month = nov,
|
||
year = 2008,
|
||
note = {Internet-Draft (Work in Progress)},
|
||
}
|
||
|
||
@misc{ denis08udp,
|
||
author = {R. Denis-Courmont},
|
||
title = {{UDP}-Encapsulated Transport Protocols},
|
||
month = jul,
|
||
year = 2008,
|
||
note = {Internet-Draft (Work in Progress)},
|
||
}
|
||
|
||
@misc{ larsen09port,
|
||
author = {M. Larsen and F. Gont},
|
||
title = {Port Randomization},
|
||
month = nov,
|
||
year = 2009,
|
||
note = {Internet-Draft (Work in Progress)},
|
||
}
|
||
|
||
@misc{ ford09architectural,
|
||
author = {A. {Ford, Ed.} and others},
|
||
title = {Architectural Guidelines for Multipath {TCP} Development},
|
||
month = oct,
|
||
year = 2009,
|
||
note = {Internet-Draft (Work in Progress)},
|
||
}
|
||
|
||
@misc{ ford11architectural,
|
||
author = {A. {Ford, Ed.} and C. Raiciu and M. Handley and S. Barre and J. Iyengar},
|
||
title = {Architectural Guidelines for Multipath {TCP} Development},
|
||
month = jan,
|
||
year = 2011,
|
||
note = {Internet-Draft (Work in Progress)},
|
||
}
|
||
|
||
|
||
%%%%% Misc
|
||
|
||
@misc{ tng,
|
||
author = {Bryan Ford and Janardhan Iyengar},
|
||
title = {{Tng}: Transport Next-Generation --
|
||
Refactoring the {Internet}'s Transport Architecture},
|
||
year = 2009,
|
||
note = {\url{http://dedis.cs.yale.edu/2009/tng/}},
|
||
}
|
||
|
||
@misc{ nsf0916413,
|
||
author = {Bryan Ford and Janardhan Iyengar},
|
||
title = {{Tng}, a Next Generation Transport Services Architecture},
|
||
note = {NSF collaborative grants CNS-0916413 and CNS-0916678,
|
||
awarded for August 1, 2009--July 31, 2011.
|
||
\url{http://dedis.cs.yale.edu/2009/tng/}},
|
||
}
|
||
|
||
@misc{ flash10security,
|
||
author = {{Adobe Systems, Inc.}},
|
||
title = {{Adobe Flash Player 10} Security},
|
||
month = nov,
|
||
year = 2008,
|
||
note = {\url{http://www.adobe.com/devnet/flashplayer/articles/flash_player10_security_wp.html}},
|
||
}
|
||
|
||
@misc{ flashplayer,
|
||
author = {{Adobe Systems, Inc.}},
|
||
title = {Adobe Flash Player},
|
||
month = jul,
|
||
year = 2010,
|
||
note = {\url{http://www.adobe.com/products/flashplayer/}},
|
||
}
|
||
|
||
@misc{ acrobat,
|
||
author = {{Adobe Systems, Inc.}},
|
||
title = {Adobe Acrobat Reader},
|
||
month = jul,
|
||
year = 2010,
|
||
note = {\url{http://get.adobe.com/reader/}},
|
||
}
|
||
|
||
@misc{ IIS-0534198,
|
||
author = {Vitaly Shmatikov and Joan Feigenbaum},
|
||
title = {New Privacy Frameworks for Collaborative Information Sharing},
|
||
note = {NSF grants IIS-0534198 and IIS-0534052,
|
||
awarded Jan 1, 2006--Dec 31, 2009.
|
||
\url{http://userweb.cs.utexas.edu/~shmat/privacyframeworks/}}
|
||
}
|
||
|
||
@misc{ CNS-0716158,
|
||
author = {Vitaly Shmatikov and Joan Feigenbaum and Sampath Kannan},
|
||
title = {Massive-Dataset Algorithmics for Network Security},
|
||
note = {NSF grants CNS-0716158, CNS-0716172, and CNS-0716223,
|
||
awarded Oct 1, 2007 - Sep 30, 2010.
|
||
\url{http://userweb.cs.utexas.edu/~shmat/mds-security/}}
|
||
}
|
||
|
||
@misc{ wsdef,
|
||
author = {W3C},
|
||
title = {Web Services},
|
||
year = 2002,
|
||
note = {\url{http://www.w3.org/2002/ws/desc/}},
|
||
}
|
||
|
||
@misc{ websocket,
|
||
author = {W3C},
|
||
title = {The {WebSocket} {API} (draft)},
|
||
year = 2011,
|
||
note = {\url{http://dev.w3.org/html5/websockets/}},
|
||
}
|
||
|
||
@misc{ cisco-rbscp,
|
||
author = {Cisco},
|
||
title = "{Rate-Based Satellite Control Protocol}",
|
||
year = 2006,
|
||
}
|
||
|
||
@misc{ cloc,
|
||
author = "Al Danial",
|
||
title = "{Counting Lines of Code}",
|
||
note = {\url{http://cloc.sourceforge.net/}}
|
||
}
|
||
|
||
@misc{ NoQ,
|
||
author = {Marc Herbert},
|
||
title = {NoQ: back-pressured/blocking IP networks},
|
||
month = jan,
|
||
year = 2005,
|
||
note = {\url{http://marc.herbert.free.fr/noq/}},
|
||
}
|
||
|
||
@misc{ speex,
|
||
author = {Jean-Marc Valin},
|
||
title = {The Speex Codec Manual Version 1.2 Beta 3},
|
||
month = dec,
|
||
year = 2007,
|
||
note = {\url{http://www.speex.org/}},
|
||
}
|
||
|
||
@misc{ internet-speed,
|
||
author = {www.speedmatters.org},
|
||
title = {2010 Report on Internet Speeds in All 50 States},
|
||
month = Nov,
|
||
year = 2010,
|
||
note = {\url{http://www.speedmatters.org/content/internet-speed-report}},
|
||
}
|
||
|
||
|
||
@misc{UTXO,
|
||
author = {Satoshi.info},
|
||
title = {\href{https://statoshi.info/dashboard/db/unspent-transaction-output-set}{Unspent Transaction Output Set}},
|
||
month = Feb,
|
||
year = 2017,
|
||
}
|
||
|
||
|
||
|
||
@misc{blockchain_size,
|
||
author = {Blockchain.info},
|
||
title = {\href{https://blockchain.info/charts/blocks-size}{Blockchain Size}},
|
||
month = Feb,
|
||
year = 2017,
|
||
}
|
||
|
||
|
||
@misc{ zeromq,
|
||
title = {{\O{}MQ}: The Intelligent Transport Layer},
|
||
note = {\url{http://www.zeromq.org}},
|
||
}
|
||
|
||
@inproceedings{ yang03superpeer,
|
||
author = {Beverly Yang, B. and Garcia-Molina, H.},
|
||
booktitle = {\bibbrev{ICDE} International Conference on Data Engineering},
|
||
title= {Designing a super-peer network},
|
||
year= {2003},
|
||
month= {march},
|
||
pages= {49 - 60},
|
||
}
|
||
|
||
@inproceedings{ stjuste11litter,
|
||
author={Pierre St Juste and David Isaac Wolinsky and P. Oscar Boykin, Renato J. Figueiredo},
|
||
booktitle={Social Computing (SocialCom), 2011 IEEE Third International Conference on},
|
||
title={Litter: A Lightweight Peer-to-Peer Microblogging Service},
|
||
year={2011},
|
||
month={oct.},
|
||
}
|
||
|
||
@conference { bennet03gap,
|
||
title = {gap - Practical Anonymous Networking},
|
||
booktitle = {Designing Privacy Enhancing Technologies},
|
||
year = {2003},
|
||
pages = {141{\textendash}160},
|
||
author = {Krista Bennett and Christian Grothoff}
|
||
}
|
||
|
||
@misc{ oikarinen93irc,
|
||
author = {J. Oikarinen and D. Reed},
|
||
title = {{RFC} 1459 Internet Relay Chat Protocol},
|
||
year = {1993},
|
||
month = {May}
|
||
}
|
||
|
||
@inproceedings{raymond00,
|
||
title = {{Traffic Analysis: Protocols, Attacks, Design Issues, and Open Problems}},
|
||
author = {Jean-Fran\c{c}ois Raymond},
|
||
booktitle = {Design Issues in Anonymity and Unobservability},
|
||
year = {2000},
|
||
month = {July},
|
||
}
|
||
|
||
@inproceedings{wright02,
|
||
title = {An Analysis of the Degradation of Anonymous Protocols},
|
||
author = {Matthew Wright and Micah Adler and Brian Neil Levine and Clay Shields},
|
||
booktitle = {Proceedings of NDSS '02},
|
||
year = {2002},
|
||
month = {February},
|
||
}
|
||
|
||
@inproceedings{onion-routing:ih96,
|
||
title = {{Hiding Routing Information}},
|
||
author = {Goldschlag, David M. and Reed, Michael G. and Syverson, Paul F.},
|
||
booktitle = {1st International Workshop on Information Hiding},
|
||
year = {1996},
|
||
month = {May},
|
||
}
|
||
|
||
@inproceedings{onion-routing:pet2000,
|
||
title = {{Towards an Analysis of Onion Routing Security}},
|
||
author = {Paul Syverson and Gene Tsudik and Michael Reed and Carl Landwehr},
|
||
booktitle = {Design Issues in Anonymity and Unobservability},
|
||
year = {2000},
|
||
month = {July}
|
||
}
|
||
|
||
@misc{anonymizer,
|
||
key = {Anonymizer},
|
||
title = {Anonymizer},
|
||
note = {\url{http://anonymizer.com/}},
|
||
year = {2012},
|
||
month = {September}
|
||
}
|
||
|
||
@inproceedings{rhea05planetlab,
|
||
author = {Rhea, Sean and Chun, Byung-Gon and Kubiatowicz, John and Shenker, Scott},
|
||
title = {Fixing the embarrassing slowness of {OpenDHT} on {PlanetLab}},
|
||
booktitle = {\bibconf{WORLDS}{Conference on Real, Large Distributed Systems}},
|
||
year = {2005},
|
||
}
|
||
|
||
@inproceedings{ franklin06fingerprinting,
|
||
author = {Franklin, Jason and McCoy, Damon and Tabriz, Parisa and Neagoe, Vicentiu and Van Randwyk, Jamie and Sicker, Douglas},
|
||
title = {Passive data link layer 802.11 wireless device driver fingerprinting},
|
||
booktitle = {USENIX Security Symposium},
|
||
year = {2006},
|
||
}
|
||
|
||
@inproceedings{ brik08fingerprinting,
|
||
author = {Brik, Vladimir and Banerjee, Suman and Gruteser, Marco and Oh, Sangho},
|
||
title = {Wireless device identification with radiometric signatures},
|
||
booktitle = {ACM International Conference on Mobile Computing and Networking (MobiCom)},
|
||
year = {2008},
|
||
}
|
||
|
||
@misc{ panopticlick,
|
||
author = {Electronic Frontier Foundation},
|
||
year = {2013},
|
||
month = {Oct},
|
||
howpublished = {\url{https://panopticlick.eff.org/}},
|
||
}
|
||
|
||
@misc{ mullenize,
|
||
author = {Washington Post},
|
||
howpublished = {\url{http://apps.washingtonpost.com/g/page/world/gchq-report-on-mullenize-program-to-stain-anonymous-electronic-traffic/502/}},
|
||
year = {2013},
|
||
month = {oct},
|
||
title = {{GCHQ} report on {`MULLENIZE'} program to `stain' anonymous electronic traffic},
|
||
}
|
||
|
||
@misc{ torpluggable,
|
||
author = {{Tor}},
|
||
year = {2013},
|
||
month = {oct},
|
||
title = {PluggableTransports},
|
||
howpublished = {\url{https://trac.torproject.org/projects/tor/wiki/doc/PluggableTransports}},
|
||
}
|
||
|
||
@misc{iPlane,
|
||
title = {{iPlane Datasets}},
|
||
note = {\url{http://iplane.cs.washington.edu/data/data.html}}
|
||
}
|
||
|
||
@misc{IXP,
|
||
title = {{IXPs Datasets}},
|
||
note = {\url{http://www-rp.lip6.fr/~augustin/ixp/}}
|
||
}
|
||
|
||
@misc{nsdminer,
|
||
title = {{NSDMiner}},
|
||
note = {\url{http://sourceforge.net/projects/nsdminer}}
|
||
}
|
||
|
||
@book{gano03apollo,
|
||
author = {Dean L Gano},
|
||
title = {Apollo root cause analysis: {A} new way of thinking},
|
||
publisher = {Apollonian Publications},
|
||
year = 2003
|
||
}
|
||
|
||
@misc{hidemyass,
|
||
note = {\url{http://blog.hidemyass.com/2011/09/23/lulzsec-fiasco/}},
|
||
title = {Lulzsec fiasco},
|
||
author = {Hide My Ass!},
|
||
}
|
||
|
||
@misc{ geodns,
|
||
title = "Geo{DNS}",
|
||
key = "GeoDNS",
|
||
note = {\url{http://www.caraytech.com/geodns/}},
|
||
}
|
||
|
||
@misc{ ghedini18you,
|
||
title = {You get {TLS} 1.3! You get {TLS} 1.3! Everyone gets {TLS} 1.3!},
|
||
author = {Alessandro Ghedini},
|
||
month = may,
|
||
year = 2018,
|
||
howpublished =
|
||
{\url{https://blog.cloudflare.com/you-get-tls-1-3-you-get-tls-1-3-everyone-gets-tls-1-3/}}
|
||
}
|
||
|
||
@inproceedings{recordon06openid,
|
||
title={{OpenID 2.0: A platform for user-centric identity management}},
|
||
author={Recordon, David and Reed, Drummond},
|
||
booktitle={Proceedings of the second ACM workshop on Digital identity management},
|
||
year={2006},
|
||
organization={ACM}
|
||
}
|
||
|
||
|
||
@misc{paypalapi,
|
||
title = {{Paypal Developer API}},
|
||
key = {Paypal Developer API},
|
||
note = {\url{https://developers.paypal.com/}},
|
||
}
|
||
|
||
|
||
@misc{facebookgraph,
|
||
title = {{Facebook Graph API}},
|
||
key = {Facebook Graph API},
|
||
note = {\url{https://developers.facebook.com/}},
|
||
}
|
||
|
||
@misc{yalecas,
|
||
title = {Using {CAS} at Yale: A Quick Introduction},
|
||
key = {Using CAS at Yale: A Quick Introduction},
|
||
note = {\url{http://www.yale.edu/tp/auth/usingcasatyale.html}},
|
||
year = 2015,
|
||
month = jan,
|
||
}
|
||
|
||
@misc{github,
|
||
title = {{GitHub}},
|
||
key = {GitHub},
|
||
note = {\url{https://www.github.com}},
|
||
year = {2015},
|
||
month = jan,
|
||
}
|
||
|
||
@misc{cothority,
|
||
title = {{DeDiS cothority}},
|
||
key = {DeDiS Cothority},
|
||
note = {\url{https://www.github.com/dedis/cothority}},
|
||
year = {2016},
|
||
month = sep,
|
||
}
|
||
|
||
@misc{crypto,
|
||
title = {{Yale crypto library}},
|
||
key = {Crypto Library},
|
||
note = {\url{https://www.github.com/dedis/crypto}},
|
||
year = {2016},
|
||
month = sep,
|
||
}
|
||
|
||
@misc{golang,
|
||
title = {\href{http://golang.org/}{The {Go} Programming Language}},
|
||
key = {golang},
|
||
year = {2018},
|
||
month = feb,
|
||
}
|
||
% note = {\url{http://golang.org/}},
|
||
|
||
@misc{golang-tls,
|
||
title={Package tls},
|
||
key = {golang-tls},
|
||
note = {\url{https://golang.org/pkg/crypto/tls/}}
|
||
}
|
||
|
||
@article{evans11certificate,
|
||
title={Certificate pinning extension for {HSTS}},
|
||
author={Evans, Chris and Palmer, Chris},
|
||
year={2011}
|
||
}
|
||
|
||
@misc{privacyIdea,
|
||
title = {\href{https://www.privacyidea.org}{Authentication System privacyIDEA}},
|
||
year={2016},
|
||
month=may
|
||
}
|
||
|
||
@misc{mininet,
|
||
key = {mininet},
|
||
title = {\href{http://mininet.org/}{Mininet -- An Instant Virtual Network on your Laptop (or other PC)}},
|
||
year={2018},
|
||
month=feb
|
||
}
|
||
|
||
|
||
@misc{wikipedia16sharding,
|
||
title = {\href{https://en.wikipedia.org/wiki/Shard_(database_architecture)
|
||
}{Shard (database architecture)}},
|
||
author = {Wikipedia},
|
||
year={2017},
|
||
month=feb
|
||
}
|
||
|
||
@misc{wiki-atomicity,
|
||
title = {\href{https://en.wikipedia.org/wiki/Atomicity_(database_systems)
|
||
}{Atomicity (database systems)}},
|
||
author = {Wikipedia},
|
||
year={2017},
|
||
month=feb
|
||
}
|
||
|
||
@misc{wiki-AC,
|
||
title = {\href{https://en.wikipedia.org/wiki/Atomic_commit
|
||
}{Atomic commit}},
|
||
author = {Wikipedia},
|
||
year={2017},
|
||
month=feb
|
||
}
|
||
|
||
@misc{bitcoin-waste,
|
||
title = {\href{https://motherboard.vice.com/en_us/article/bitcoin-could-consume-as-much-electricity-as-denmark-by-2020
|
||
}{Bitcoin Could Consume as Much Electricity as Denmark by 2020}},
|
||
author = {Sebastiaan Deetman},
|
||
year={2016},
|
||
month=may
|
||
}
|
||
|
||
@misc{bitcoin-centralized,
|
||
title = {\href{http://hackingdistributed.com/2014/06/13/time-for-a-hard-bitcoin-fork/
|
||
}{It's Time For a Hard Bitcoin Fork}},
|
||
author = {Ittay Eyal,Emin Gün Sirer},
|
||
year={2014},
|
||
month=jun
|
||
}
|
||
|
||
|