Freenet

Results: 194



#Item
41Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2012-05-12 17:14:46
42SpringConnections www.nebcommfound.org

SpringConnections www.nebcommfound.org

Add to Reading List

Source URL: www.nebcommfound.org

Language: English - Date: 2015-04-01 10:57:42
43Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems

Securing Anonymous Communication Channels under the Selective DoS Attack Anupam Das and Nikita Borisov University of Illinois at Urbana Champaign, USA {das17,nikita}@illinois.edu Abstract. Anonymous communication systems

Add to Reading List

Source URL: web.engr.illinois.edu

Language: English - Date: 2013-03-07 16:53:15
44Hackers and philosophers building an utopia together participatory and altruistic network of the future by Vesna Manojlovic, 01 December 2012, http://becha.home.xs4all.nl/ Just like 1988, when the International Telecommu

Hackers and philosophers building an utopia together participatory and altruistic network of the future by Vesna Manojlovic, 01 December 2012, http://becha.home.xs4all.nl/ Just like 1988, when the International Telecommu

Add to Reading List

Source URL: becha.home.xs4all.nl

Language: English - Date: 2013-01-18 11:17:00
45Can Heterogeneity Make Gnutella Scalable? Qin Lv () Sylvia Ratnasamy ()

Can Heterogeneity Make Gnutella Scalable? Qin Lv () Sylvia Ratnasamy ()

Add to Reading List

Source URL: www.eecs.berkeley.edu

Language: English - Date: 2004-08-20 15:05:48
46Evaluating Sender and Recipient Anonymity in a Structured Overlay  ∗ Giuseppe Ciaccio DISI, Universit`a di Genova

Evaluating Sender and Recipient Anonymity in a Structured Overlay ∗ Giuseppe Ciaccio DISI, Universit`a di Genova

Add to Reading List

Source URL: www.disi.unige.it

Language: English - Date: 2005-10-03 10:37:24
47NEBLO: Anonymity in a Structured Overlay Giuseppe Ciaccio DISI, Universit`a di Genova via DodecanesoGenova, Italy

NEBLO: Anonymity in a Structured Overlay Giuseppe Ciaccio DISI, Universit`a di Genova via DodecanesoGenova, Italy

Add to Reading List

Source URL: www.disi.unige.it

Language: English - Date: 2005-05-18 07:19:02
48Valet Services: Improving Hidden Servers with a Personal Touch Lasse Øverlier1,2 and Paul Syverson3 1

Valet Services: Improving Hidden Servers with a Personal Touch Lasse Øverlier1,2 and Paul Syverson3 1

Add to Reading List

Source URL: freehaven.net

Language: English - Date: 2006-10-20 01:26:00
49Lecture 26: Small-World Peer-to-Peer Networks and Their Security Issues Lecture Notes on “Computer and Network Security” by Avi Kak () April 16, 2015

Lecture 26: Small-World Peer-to-Peer Networks and Their Security Issues Lecture Notes on “Computer and Network Security” by Avi Kak () April 16, 2015

Add to Reading List

Source URL: engineering.purdue.edu

Language: English - Date: 2015-04-16 15:23:41
50Stellungnahme der ARGE DATEN zu Elektrizitätswirtschafts- und -organisationsgesetz 2010 Die ARGE DATEN verkennt nicht die volkswirtschaftliche Notwendigkeit einer gesamtstaatlichen Energiepolitik und insbesondere des Se

Stellungnahme der ARGE DATEN zu Elektrizitätswirtschafts- und -organisationsgesetz 2010 Die ARGE DATEN verkennt nicht die volkswirtschaftliche Notwendigkeit einer gesamtstaatlichen Energiepolitik und insbesondere des Se

Add to Reading List

Source URL: ftp.freenet.at

Language: German - Date: 2010-11-09 05:47:52