Papers: I2P pros/cons summary and a survey of tools

This commit is contained in:
str4d
2014-03-26 04:36:20 +00:00
parent e4baeefcd1
commit 4dd6637d85

View File

@ -29,28 +29,28 @@
@string{lncs = "Lecture Notes in Computer Science"}
@article{wang2013,
title = {Towards Measurement on the I2P Network},
author = {Xue Bin Wang and Pei Peng Liu and Cheng Long Li and Qing Feng Tan},
journal = {Applied Mechanics and Materials},
year = {2013},
month = {September},
volume = {427--429},
pages = {2223--2228},
www_section = traffic,
}
@inproceedings{egger2013:practical-attacks,
title = {Practical Attacks Against the I2P Network},
author = {Christoph Egger and Johannes Schlumberger and Christopher Kruegel and Giovanni Vigna},
booktitle = {Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2013)},
year = {2013},
month = {October},
month = Oct,
www_tags = {selected},
www_pdf_url = {http://wwwcip.informatik.uni-erlangen.de/~spjsschl/i2p.pdf},
www_section = traffic,
}
@article{wang2013,
title = {Towards Measurement on the I2P Network},
author = {Xue Bin Wang and Pei Peng Liu and Cheng Long Li and Qing Feng Tan},
journal = {Applied Mechanics and Materials},
year = {2013},
month = Sep,
volume = {427--429},
pages = {2223--2228},
www_section = traffic,
}
%% hal-00744922, version 1
%% http://hal.inria.fr/hal-00744922
@inproceedings{timpanaro:hal-00744922,
@ -94,6 +94,19 @@
www_section = traffic,
}
@article{ruiz2012,
title = {A survey on solutions and main free tools for privacy enhancing Web communications},
author = {A Ruiz-Mart{\'i}nez},
journal = {Journal of Network and Computer Applications},
year = {2012},
month = Sep,
volume = {35},
issue = {5},
pages = {1473--1492},
www_pdf_url = {http://www.freehaven.net/anonbib/cache/Ruiz-Martinez_2012.pdf},
www_section = comm,
}
%% hal-00744902, version 1
%% http://hal.inria.fr/hal-00744902
@inproceedings{timpanaro:hal-00744902,
@ -161,6 +174,16 @@
www_section = traffic,
}
@inproceedings{zantout2011,
title = {I2P Data Communication System},
author = {Bassam Zantout and Ramzi Haraty},
booktitle = {Proceedings of ICN 2011, The Tenth International Conference on Networks},
year = {2011},
month = Jan,
location = {St. Maarten, The Netherlands Antilles},
www_section = traffic,
}
@inproceedings{BlackHat2011-crenshaw,
url = {http://www.irongeek.com/i.php?page=security/darknets-i2p-identifying-hidden-servers},
title = {Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts},