Update anonbib.bib
This commit is contained in:
@ -108,7 +108,7 @@
|
||||
school = {University of Amsterdam},
|
||||
year = {2018},
|
||||
month = {June},
|
||||
www_pdf_url = {https://delaat.net/rp/2017-2018/p97/report.pdf},
|
||||
www_pdf_url = {https://docslib.org/doc/12313748/blockchain-based-sybil-attack-mitigation-a-case-study-of-the-i2p},
|
||||
www_section = comm,
|
||||
}
|
||||
|
||||
@ -239,7 +239,7 @@ services, namely Tor, JonDonym, and I2P as case studies; and
|
||||
(iii) present a mechanism to evaluate anonymity services based
|
||||
on our factors and measure the level of anonymity.}},
|
||||
keywords = {Anonymity Factors ; Metrics ; Tor ; I2P ; JonDonym},
|
||||
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/CS-2017-01.pdf},
|
||||
www_pdf_url = {https://cdn.dal.ca/content/dam/dalhousie/pdf/faculty/computerscience/technical-reports/CS-2017-01.pdf},
|
||||
www_section = comm,
|
||||
}
|
||||
|
||||
@ -249,7 +249,7 @@ on our factors and measure the level of anonymity.}},
|
||||
booktitle = {Proceedings of the 38th IEEE Symposium on Security and Privacy Workshops, 2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC 2017)},
|
||||
year = {2017},
|
||||
month = {May},
|
||||
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/cs-2017-04.pdf},
|
||||
www_pdf_url = {https://www.researchgate.net/publication/321999503_Effects_of_Shared_Bandwidth_on_Anonymity_of_the_I2P_Network_Users},
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
@ -277,7 +277,7 @@ that presents I2P Observer, a software to collect information about I2P and one
|
||||
possibilities on I2P.}},
|
||||
note = {Title : Analysis of the I2P Network. School: Bern University of Applied Sciences - Department of Computer Science},
|
||||
www_section = traffic,
|
||||
www_pdf_url = {https://jenix.net/i2p-observer/Analysis_of_the_I2P_Network-Bachelor_Thesis.pdf},
|
||||
www_pdf_url = {https://docslib.org/doc/6144412/analysis-of-the-i2p-network-information-gathering-and-attack-evaluations},
|
||||
}
|
||||
|
||||
@inproceedings{jeong2016,
|
||||
@ -301,7 +301,7 @@ that a large number of queries are observed and outlining
|
||||
various potential directions of addressing such leakage.}},
|
||||
keywords = {I2P, DNS, privacy, security, network analysis},
|
||||
www_section = traffic,
|
||||
www_pdf_url = {https://www.cse.buffalo.edu/~mohaisen/doc/16-sigcomm.pdf},
|
||||
www_pdf_url = {https://www.cs.ucf.edu/~mohaisen/doc/sigcomm16.pdf},
|
||||
pages = {557--558},
|
||||
}
|
||||
|
||||
@ -567,7 +567,7 @@ networks},
|
||||
howpublished = {Seminar, Humboldt University of Berlin},
|
||||
year = {2011},
|
||||
month = {November},
|
||||
www_pdf_url = {http://userpage.fu-berlin.de/~semu/docs/2011_seminar_ehlert_i2p.pdf},
|
||||
www_pdf_url = {https://www.freehaven.net/anonbib/cache/ehlert2011:usability-comparison-i2p-tor.pdf},
|
||||
www_section = comm,
|
||||
}
|
||||
|
||||
@ -651,7 +651,7 @@ networks},
|
||||
abstract={{Today, to be monitored while surfing the web seems to be a natural act and thus tools and applications to achieve online anonymity are more important than ever. The usability of such a tool plays not only a prominent role for each single user; in the area of anonymization networks it usually holds that the protection for every single user is higher, the more users participate. Hence, usability is of great importance, since bad usability decreases the number of potential users. In this paper we examine the usability of four software implementations for anonymous communication techniques especially with regards to the installation procedure. The usability is evaluated with the help of cognitive walk-throughs. We also inspect the quality of service of these implementations by means of a performance test.}},
|
||||
keywords={Internet;security of data;anonymity networks;anonymization networks;anonymous communication techniques;cognitive walk-throughs;installation;quality of service;software implementations;usability inspection;Communication system security;Inspection;Monitoring;Operating systems;Privacy;Quality management;Quality of service;System testing;Technology management;Usability;AN.ON;Anonymity;HCI;JAP;JonDo;JondoNym;Tor;Usability},
|
||||
doi={10.1109/CONGRESS.2009.38},
|
||||
www_pdf_url = {http://pimenidis.org/research/papers/usability-inspection.pdf},
|
||||
www_pdf_url = {https://www.researchgate.net/publication/224084986_Usability_Inspection_of_Anonymity_Networks},
|
||||
www_section = comm,
|
||||
}
|
||||
|
||||
|
Reference in New Issue
Block a user