References
- K. Bennett and C. Grothoff, "GAP - Practical anonymous networking," in Proc. of Privacy Enhancing Technologies workshop, 2003. http://dx.doi.org/10.1007/978-3-540-40956-4_10
- I. Clarke, O. Sandberg, B. Wiley, and T. W. Hong, "Freenet: A Distributed Anonymous Information Storage and Retrieval System," in Proc. of Workshop on Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, 2000.
- R. Dingledine, M. J. Freedman, and D. Molnar, "The Free Haven Project: Distributed Anonymous Storage Service," in Proc. of Workshop on Design Issues in Anonymity and Unobservability, 2000. PMid:10736377.
- D. Kugler, "An Analysis of GNUnet and the Implications for Anonymous, Censorship-Resistant Networks," in Proc. of Privacy Enhancing Technologies workshop, 2003. http://dx.doi.org/10.1007/978-3-540-40956-4_11
- A. Serjantov, "Anonymizing Censorship Resistant Systems," in Proc. of the First International Workshop on Peer-to-peer Systems, 2002. http://dx.doi.org/10.1007/3-540-45748-8_11
- M. Waldman, A. D. Rubin, and L. F. Cranor, "Publius: A Robust, Tamper-evident, Censorship-resistant Web Publishing System," in Proc. of the 9th USENIX Security Symposium, 2000. PMCid:2560618.
- S. Sherwood, B. Bhattacharjee, and A. SrinivasanM, " 5 P : A Protocol for Scalable Anonymous Communication," in Proc. IEEE Symp. Security and Privacy, May 2002. http://dx.doi.org/10.1109/SECPRI.2002.1004362
- J. Han, Y. Liu, L. Xiao, R. Xiao and L. M. Ni "A Mutual Anonymous Peer-to-peer Protocol Design," in Proc. of the 19th IEEE International Parallel and Distributed Processing Symposium, 2005. http://dx.doi.org/10.1109/IPDPS.2005.49
- L. Xiao, Z. Xu, and X. Shang, "Low-cost and Reliable Mutual Anonymity Protocols in Peer-to-Peer Networks," IEEE Transactions on Parallel and Distributed Systems, 2003. http://dx.doi.org/10.1109/TPDS.2003.1233706
- V. Scarlata, B. N. Levine, and C. Shields, " Responder Anonymity and Anonymous Peer-to-Peer File Sharing," in Proc. of the 9th International Conference of Network Protocol(ICNP), 2001. PMCid:1301537. http://dx.doi.org/10.1109/ICNP.2001.992907
- X. Liu, L. Xiao, A. Kreling, and Y. Liu, "Optimizing Overlay Topology by Reducing Cut Vertices," in Proc. of ACM NOSSDAV, 2006. http://dx.doi.org/10.1145/1378191.1378213
- X. Wang, S. Chellappan, P. Boyer, and D. Xuan, "On the Effectiveness of Secure Overlay Forwarding Systems under Intelligent Distributed DoS Attacks," IEEE TRANSACTIONS ON PARALLEL AND DISTRIBUTED SYSTEMS, 2005. http://dx.doi.org/10.1109/TPDS.2006.93
- Y. Liu, A. -H. Esfahanian, L. Xiao, and L. M. Ni, "Approaching Optimal Peer-to-Peer Overlays," in Proc. of the 13th Annual Meeting of the IEEE International Symposium on Modeling, Analysis, and Simulation of Computer and Telecommunication Systems(MASCOTS), 2005. http://dx.doi.org/10.1109/MASCOTS.2005.15
- X. Y. Zhang, Q. Zhang, Z. Zhang, G. Song, and W. Zhu, "A Construction of Locality-Aware Overlay Network:mOverlay and Its Performance," IEEE JOURNAL ON SELECTED AREAS IN COMMUNICATIONS, 2004. http://dx.doi.org/10.1109/JSAC.2003.818780
- D. Qiu and R. Srikant, "Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks," in Proc. of ACM SIGCOMM, 2004.
- Y. Liu, Z. Zhuang, L. Xiao, and L. M. Ni, "A Distributed Approach to Solving Overlay Mismatch Problem," in Proc. of the 24th International Conference on Distributred Computing Systems(ICDCS), 2004. http://dx.doi.org/10.1109/ICDCS.2004.1281576
- X. Liu, Y. Liu, and L. Xiao, "Reliable Response Delivery in Peer-to-Peer System," in Proc. of the 12th Annual Meeting of the IEEE International Symposium on Modeling Analysis, and Simulation of Computer and Telecommunication Systems(MASCOTS), 2004. http://dx.doi.org/10.1109/MASCOT.2004.1348298
- K. V. Nguyen, "Simplifying Peer-to-Peer Device Authentication Using Identity-Based Cryptography," in Proc. of International conference on Networking and Services(ICNS06), 2006. http://dx.doi.org/10.1109/ICNS.2006.101
- SafeNet, "SafeNet Authentication Manager," SafeNet, Inc., 2013.
- L.E. Holmquist, F. Mattern, B. Schiele, P. Alahuhta , M. Beigl and H. W. Gellersen, "Smart-Its Friends: A Technique for Users to Easily Establish Connections between Smart Artefacts," in Proc. Of UBICOMP 2001, Atlanta, GA, USA, Sept. 2001.
- T. Kindberg and K. Zhang, "Context authentication using constrained channels," HP Labs Tech. report HPL-2001-84, 2001. http://dx.doi.org/10.1109/MCSA.2002.1017481
- Y. Liu, X. Liu, L. Xiao, L. M. Ni, and X. Zhang, "Location-aware topology matching in P2P Systems," in Proc. of IEEE INFOCOM, 2004. http://dx.doi.org/10.1109/INFCOM.2004.1354645
- W. Jia, D. Xuan, W. Tu, L. Lin, and W. Zhao, "Distributed admission control for anycast flows," IEEE Transactions on Parallel and Distributed Systems(TPDS), 2004. http://dx.doi.org/10.1109/TPDS.2004.34
- K. P. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, and J. Zahorjan, "Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload," in Proc. of the 19th ACM Symposium on Operating Systems Principles(SOSP), 2003.
- Y. Chawathe, S. Ratnasamy, L. Breslau, N. Lanham, and S. Shenker, "Making Gnutella-like P2P Systems Scalable," in Proc. of ACM SIGCOMM, 2003.
- The Gnutella Protocol Specification v0.4, "http://www.clip2.com/GnutellaProtocol04.pdf".
- S. Zhu, S. Setia, S. Jajodia, "LEAP: Efficient Security Mechanisms for Large-Scale Distributed Sensor Networks," in Proc. of the Seventh IEEE International Symposium on Multimedia, 0-7695-2489-3/05 (2005). http://dx.doi.org/10.1145/948109.948120
- N. Saxena, G. Tsudik, J. H. Yi, "Admission Control in Peer-to-Peer: Design and Performance Evaluation," in Proc. of the first ACM Workshop Security of Ad Hoc and Sensor Networks Fairfax, 2003. http://dx.doi.org/10.1145/986858.986873
- J. Han, Y. Liu, L. Xiao, R. Xiao, and L. M. Ni, "A mutual anonymous peer-to-peer protocol design," in Proc. of 19th IEEE International Parallel and Distributed Processing Symposium, Denver, CO, United states, 2005. http://dx.doi.org/10.1109/IPDPS.2005.49
- B. Schneier, "Applied Cryptography-Protocols, Algorithms, and Source Code in C," second ed. John Wiley & Sons, Inc., 1996.
- J. Liao, J. Xiao, Y. Qi, P. Huang, and M. Rong, "ID-based signature scheme without trusted PKG," in Proc. of 1st Conference on Information Security and Cryptology, Beijing, China, 2005. http://dx.doi.org/10.1007/11599548_5
- Li Lu, Jinsong Han, Yunhao Liu, Lei Hu, Jinpeng Huai, Lionel M. Ni, Jian Ma, "Pseudo Trust: Zero-knowledge Authentication in Anonymous P2Ps", IEEE Transactions on Parallel and Distributed Systems, Vol. 19, No. 10, October, 2008. http://dx.doi.org/10.1109/TPDS.2008.15
- J. S. Han and Y. H. Liu, "Mutual Anonymity for Mobile P2P Systems," IEEE Transactions on Parallel and Distributed System, Vol. 19, No. 8, pp. 1009-1019, August, 2008. http://dx.doi.org/10.1109/TPDS.2007.70805
- Z. Y. Li, L. M. Wang and S. G. Chen, "Network Coding-Based Mutual Anonymity Communication Protocol for Mobile P2P Networks," in Proc. of 2012 IEEE 11th International Conference on Communications(TrustCom), pp. 986-991, June, 2012. http://dx.doi.org/10.1109/TrustCom.2012.211
- Y. H. Liu, J. S. Han and J. L. Wang, "Rumor Riding: Anonymizing Unstructured Peer-to-Peer Systems," IEEE Transactions on Parallel and Distributed Systems, Vol. 22, Issue 3, pp. 464-475, Feb. 2011. http://dx.doi.org/10.1109/TPDS.2010.98