A survey on network coordinates systems, design, and security
During the last decade, a new class of large-scale globally-distributed network services and
applications have emerged. Those systems are flexible in the sense that they can select …
applications have emerged. Those systems are flexible in the sense that they can select …
Scalable link-based relay selection for anonymous routing
The performance of an anonymous path can be described using many network metrics–eg,
bandwidth, latency, jitter, loss, etc. However, existing relay selection algorithms have …
bandwidth, latency, jitter, loss, etc. However, existing relay selection algorithms have …
The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems
A network coordinate system assigns Euclidean “virtual” coordinates to every node in a
network to allow easy estimation of network latency between pairs of nodes that have never …
network to allow easy estimation of network latency between pairs of nodes that have never …
[图书][B] The Future Internet: Future Internet Assembly 2012: From Promises to Reality
This publication constitutes the 2012 edition of the yearly Future Internet Assembly book,
which has been published since 2009. The Future Internet Assembly (FIA) is a successful …
which has been published since 2009. The Future Internet Assembly (FIA) is a successful …
The frog-boiling attack: Limitations of secure network coordinate systems
A network coordinate system assigns Euclidean “virtual” coordinates to every node in a
network to allow easy estimation of network latency between pairs of nodes that have never …
network to allow easy estimation of network latency between pairs of nodes that have never …
Accurate manipulation of delay-based internet geolocation
Delay-based Internet geolocation techniques are repeatedly positioned as well suited for
security-sensitive applications, eg, location-based access control, and credit-card …
security-sensitive applications, eg, location-based access control, and credit-card …
Veracity: Practical Secure Network Coordinates via Vote-based Agreements.
Decentralized network coordinate systems promise efficient network distance estimates
across Internet end-hosts. These systems support a wide range of network services …
across Internet end-hosts. These systems support a wide range of network services …
[PDF][PDF] A³: An Extensible Platform for Application-Aware Anonymity
This paper presents the design and implementation of Application-Aware Anonymity (A³), an
extensible platform for deploying anonymity-based services on the Internet. A³ allows …
extensible platform for deploying anonymity-based services on the Internet. A³ allows …
Veracity, plausibility, and reputation
D Gollmann - Information Security Theory and Practice. Security …, 2012 - Springer
The canonical IT security properties are geared towards infrastructure security. The task of
an infrastructure security service is completed once data has been delivered to the …
an infrastructure security service is completed once data has been delivered to the …
Underlay awareness in P2P systems: Techniques and challenges
Peer-to-peer (P2P) applications have recently attracted a large number of Internet users.
Traditional P2P systems however, suffer from inefficiency due to lack of information from the …
Traditional P2P systems however, suffer from inefficiency due to lack of information from the …