Update anonbib.bib

This commit is contained in:
Sadie Mascis
2023-04-20 15:31:43 -04:00
committed by GitHub
parent 4579c6deed
commit 592c7ae638

View File

@ -108,7 +108,7 @@
school = {University of Amsterdam},
year = {2018},
month = {June},
www_pdf_url = {https://delaat.net/rp/2017-2018/p97/report.pdf},
www_pdf_url = {https://docslib.org/doc/12313748/blockchain-based-sybil-attack-mitigation-a-case-study-of-the-i2p},
www_section = comm,
}
@ -239,7 +239,7 @@ services, namely Tor, JonDonym, and I2P as case studies; and
(iii) present a mechanism to evaluate anonymity services based
on our factors and measure the level of anonymity.}},
keywords = {Anonymity Factors ; Metrics ; Tor ; I2P ; JonDonym},
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/CS-2017-01.pdf},
www_pdf_url = {https://cdn.dal.ca/content/dam/dalhousie/pdf/faculty/computerscience/technical-reports/CS-2017-01.pdf},
www_section = comm,
}
@ -249,7 +249,7 @@ on our factors and measure the level of anonymity.}},
booktitle = {Proceedings of the 38th IEEE Symposium on Security and Privacy Workshops, 2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC 2017)},
year = {2017},
month = {May},
www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/cs-2017-04.pdf},
www_pdf_url = {https://www.researchgate.net/publication/321999503_Effects_of_Shared_Bandwidth_on_Anonymity_of_the_I2P_Network_Users},
www_section = traffic,
}
@ -277,7 +277,7 @@ that presents I2P Observer, a software to collect information about I2P and one
possibilities on I2P.}},
note = {Title : Analysis of the I2P Network. School: Bern University of Applied Sciences - Department of Computer Science},
www_section = traffic,
www_pdf_url = {https://jenix.net/i2p-observer/Analysis_of_the_I2P_Network-Bachelor_Thesis.pdf},
www_pdf_url = {https://docslib.org/doc/6144412/analysis-of-the-i2p-network-information-gathering-and-attack-evaluations},
}
@inproceedings{jeong2016,
@ -301,7 +301,7 @@ that a large number of queries are observed and outlining
various potential directions of addressing such leakage.}},
keywords = {I2P, DNS, privacy, security, network analysis},
www_section = traffic,
www_pdf_url = {https://www.cse.buffalo.edu/~mohaisen/doc/16-sigcomm.pdf},
www_pdf_url = {https://www.cs.ucf.edu/~mohaisen/doc/sigcomm16.pdf},
pages = {557--558},
}
@ -567,7 +567,7 @@ networks},
howpublished = {Seminar, Humboldt University of Berlin},
year = {2011},
month = {November},
www_pdf_url = {http://userpage.fu-berlin.de/~semu/docs/2011_seminar_ehlert_i2p.pdf},
www_pdf_url = {https://www.freehaven.net/anonbib/cache/ehlert2011:usability-comparison-i2p-tor.pdf},
www_section = comm,
}
@ -651,7 +651,7 @@ networks},
abstract={{Today, to be monitored while surfing the web seems to be a natural act and thus tools and applications to achieve online anonymity are more important than ever. The usability of such a tool plays not only a prominent role for each single user; in the area of anonymization networks it usually holds that the protection for every single user is higher, the more users participate. Hence, usability is of great importance, since bad usability decreases the number of potential users. In this paper we examine the usability of four software implementations for anonymous communication techniques especially with regards to the installation procedure. The usability is evaluated with the help of cognitive walk-throughs. We also inspect the quality of service of these implementations by means of a performance test.}},
keywords={Internet;security of data;anonymity networks;anonymization networks;anonymous communication techniques;cognitive walk-throughs;installation;quality of service;software implementations;usability inspection;Communication system security;Inspection;Monitoring;Operating systems;Privacy;Quality management;Quality of service;System testing;Technology management;Usability;AN.ON;Anonymity;HCI;JAP;JonDo;JondoNym;Tor;Usability},
doi={10.1109/CONGRESS.2009.38},
www_pdf_url = {http://pimenidis.org/research/papers/usability-inspection.pdf},
www_pdf_url = {https://www.researchgate.net/publication/224084986_Usability_Inspection_of_Anonymity_Networks},
www_section = comm,
}