A survey on network coordinates systems, design, and security

B Donnet, B Gueye, MA Kaafar - … Communications Surveys & …, 2010 - ieeexplore.ieee.org
During the last decade, a new class of large-scale globally-distributed network services and
applications have emerged. Those systems are flexible in the sense that they can select …

Scalable link-based relay selection for anonymous routing

M Sherr, M Blaze, BT Loo - … Symposium, PETS 2009, Seattle, WA, USA …, 2009 - Springer
The performance of an anonymous path can be described using many network metrics–eg,
bandwidth, latency, jitter, loss, etc. However, existing relay selection algorithms have …

The frog-boiling attack: Limitations of anomaly detection for secure network coordinate systems

E Chan-Tin, D Feldman, N Hopper, Y Kim - Security and Privacy in …, 2009 - Springer
A network coordinate system assigns Euclidean “virtual” coordinates to every node in a
network to allow easy estimation of network latency between pairs of nodes that have never …

[图书][B] The Future Internet: Future Internet Assembly 2012: From Promises to Reality

F Álvarez, F Cleary, P Daras, J Domingue, A Galis… - 2012 - library.oapen.org
This publication constitutes the 2012 edition of the yearly Future Internet Assembly book,
which has been published since 2009. The Future Internet Assembly (FIA) is a successful …

The frog-boiling attack: Limitations of secure network coordinate systems

E Chan-Tin, V Heorhiadi, N Hopper, Y Kim - ACM Transactions on …, 2011 - dl.acm.org
A network coordinate system assigns Euclidean “virtual” coordinates to every node in a
network to allow easy estimation of network latency between pairs of nodes that have never …

Accurate manipulation of delay-based internet geolocation

AR Abdou, A Matrawy, PC Van Oorschot - … of the 2017 ACM on Asia …, 2017 - dl.acm.org
Delay-based Internet geolocation techniques are repeatedly positioned as well suited for
security-sensitive applications, eg, location-based access control, and credit-card …

Veracity: Practical Secure Network Coordinates via Vote-based Agreements.

M Sherr, M Blaze, BT Loo - USENIX Annual Technical Conference, 2009 - usenix.org
Decentralized network coordinate systems promise efficient network distance estimates
across Internet end-hosts. These systems support a wide range of network services …

[PDF][PDF] A³: An Extensible Platform for Application-Aware Anonymity

M Sherr, A Mao, WR Marczak, W Zhou, BT Loo… - 2010 - core.ac.uk
This paper presents the design and implementation of Application-Aware Anonymity (A³), an
extensible platform for deploying anonymity-based services on the Internet. A³ allows …

Veracity, plausibility, and reputation

D Gollmann - Information Security Theory and Practice. Security …, 2012 - Springer
The canonical IT security properties are geared towards infrastructure security. The task of
an infrastructure security service is completed once data has been delivered to the …

Underlay awareness in P2P systems: Techniques and challenges

O Abboud, A Kovacevic, K Graffi… - … on Parallel & …, 2009 - ieeexplore.ieee.org
Peer-to-peer (P2P) applications have recently attracted a large number of Internet users.
Traditional P2P systems however, suffer from inefficiency due to lack of information from the …