Update list of papers

This commit is contained in:
str4d
2017-07-10 05:55:08 +00:00
parent ac42fa497a
commit 971b3133f2

View File

@ -46,6 +46,15 @@
www_section = traffic,
}
@inproceedings{wilson2016,
title = {Forensic analysis of I2P activities},
author = {Wilson, Maxim and Bazli, Behnam},
booktitle = {2016 22nd International Conference on Automation and Computing (ICAC)},
year = {2016},
month = Sep,
www_section = comm,
}
#
# Actually a bachelors thesis but there's no @ for that
#
@ -69,6 +78,7 @@ possibilities on I2P.}},
author = {Seong Hoon Jeong et al},
booktitle = {SIGCOMM '16 Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference},
year = {2016},
month = Aug,
abstract = {{The Invisible Internet Project (I2P) is an overlay network
that provides secure and anonymous communication chan-he
nels. EepSites are the anonymous websites hosted in the I2P
@ -88,6 +98,113 @@ various potential directions of addressing such leakage.}},
pages = {557-558},
}
@article{haughey2016,
title = {Anonymity networks and the fragile cyber ecosystem},
author = {Haughey, Hamish and Epiphaniou, Gregory and Al-Khateeb, Haider M.},
journal = {Network Security},
year = {2016},
month = Mar,
volume = {2016},
number = {3},
pages = {10--18},
www_section = traffic,
}
@inproceedings{ali2016,
title = {TOR vs I2P: A Comparative Study},
author = {Ali, Afzaal and Khan, Maria and Saddique, Muhammad and Pirzada, Umar and Zohaib, Muhammad and Ahmad, Imran and Debnath, Narayan},
booktitle = {2016 IEEE International Conference on Industrial Technology (ICIT)},
year = {2016},
month = Mar,
www_section = traffic,
}
@techreport{astolfi2015,
title = {I2P - The Invisible Internet Project},
author = {Astolfi, Felipe and Kroese, Jelger and {Van Oorschot}, Jeroen},
type = {Web Technology Report},
institution = {Media Technology, Leiden University},
year = {2015},
www_pdf_url = {https://staas.home.xs4all.nl/t/swtr/documents/wt2015_i2p.pdf},
}
@article{vashi2015,
title = {Performance Improvement in I2P using SSL},
author = {Vashi, Dipal and Khilari, Girish},
journal = {International Journal of Science, Engineering and Technology Research},
year = {2015},
month = May,
volume = {4},
number = {5},
pages = {1454--1456},
www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1454-1456.pdf},
www_section = traffic,
}
@article{vhora2015,
title = {Defending Eclipse Attack in I2P using Structured Overlay Network},
author = {Vhora, Hasib and Khilari, Girish},
journal = {International Journal of Science, Engineering and Technology Research},
year = {2015},
month = May,
volume = {4},
number = {5},
pages = {1515--1518},
www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1515-1518.pdf},
www_section = traffic,
}
@inproceedings{timpanaro:hal-01238453,
title = {{Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security}},
author = {Timpanaro, Juan Pablo and Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier},
url = {https://hal.inria.fr/hal-01238453},
booktitle = {{ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy}},
address = {Angers, France},
organization = {{SciTePress}},
pages = {46-55},
year = {2015},
month = Feb,
doi = {10.5220/0005226600460055},
keywords = {I2P ; security ; DHT},
www_pdf_url = {https://hal.inria.fr/hal-01238453/file/I2P-design-vs-performance-security.pdf},
www_section = traffic,
hal_id = {hal-01238453},
hal_version = {v1},
}
@misc{tchabe2014,
title = {Anonymous Communications: A survey on I2P},
author = {Tchabe, Gildas Nya and Xu, Yinhua},
howpublished = {CDC Publication},
year = {2014},
www_pdf_url = {https://www.cdc.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Lehre/SS13/Seminar/CPS/cps2014_submission_4.pdf},
www_section = traffic,
}
@article{vashi2014,
title = {A Survey on I2P Crypto Mechanism},
author = {Vashi, Dipal and Khilari, Girish},
journal = {International Journal of Engineering Development and Research},
year = {2014},
volume = {3},
number = {1},
pages = {99--102},
www_pdf_url = {https://www.ijedr.org/papers/IJEDR1501021.pdf},
www_section = traffic,
}
@article{karthigeyan2014,
title = {A Comprehensive Behavior Analysis of TOR versus I2P},
author = {Karthigeyan, A. and {Robinson Joel}, M. and Manikandan, S. P. and {Raja Guru}, P. and Raman, Sri},
journal = {International Journal of Applied Engineering Research},
year = {2014},
volume = {9},
number = {20},
pages = {7333--7345},
www_section = traffic,
}
@article{liu2014,
title = {Empirical Measurement and Analysis of I2P Routers},
author = {Peipeng Liu et al},
@ -95,7 +212,7 @@ various potential directions of addressing such leakage.}},
year = {2014},
month = Sep,
volume = {9},
issue = {9},
number = {9},
pages = {2269--2278},
www_section = traffic,
}
@ -209,7 +326,7 @@ networks},
year = {2012},
month = Sep,
volume = {35},
issue = {5},
number = {5},
pages = {1473--1492},
www_pdf_url = {http://www.freehaven.net/anonbib/cache/Ruiz-Martinez_2012.pdf},
www_section = comm,