Update list of papers
This commit is contained in:
@ -46,6 +46,15 @@
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
@inproceedings{wilson2016,
|
||||
title = {Forensic analysis of I2P activities},
|
||||
author = {Wilson, Maxim and Bazli, Behnam},
|
||||
booktitle = {2016 22nd International Conference on Automation and Computing (ICAC)},
|
||||
year = {2016},
|
||||
month = Sep,
|
||||
www_section = comm,
|
||||
}
|
||||
|
||||
#
|
||||
# Actually a bachelors thesis but there's no @ for that
|
||||
#
|
||||
@ -69,6 +78,7 @@ possibilities on I2P.}},
|
||||
author = {Seong Hoon Jeong et al},
|
||||
booktitle = {SIGCOMM '16 Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference},
|
||||
year = {2016},
|
||||
month = Aug,
|
||||
abstract = {{The Invisible Internet Project (I2P) is an overlay network
|
||||
that provides secure and anonymous communication chan-he
|
||||
nels. EepSites are the anonymous websites hosted in the I2P
|
||||
@ -88,6 +98,113 @@ various potential directions of addressing such leakage.}},
|
||||
pages = {557-558},
|
||||
}
|
||||
|
||||
@article{haughey2016,
|
||||
title = {Anonymity networks and the fragile cyber ecosystem},
|
||||
author = {Haughey, Hamish and Epiphaniou, Gregory and Al-Khateeb, Haider M.},
|
||||
journal = {Network Security},
|
||||
year = {2016},
|
||||
month = Mar,
|
||||
volume = {2016},
|
||||
number = {3},
|
||||
pages = {10--18},
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
@inproceedings{ali2016,
|
||||
title = {TOR vs I2P: A Comparative Study},
|
||||
author = {Ali, Afzaal and Khan, Maria and Saddique, Muhammad and Pirzada, Umar and Zohaib, Muhammad and Ahmad, Imran and Debnath, Narayan},
|
||||
booktitle = {2016 IEEE International Conference on Industrial Technology (ICIT)},
|
||||
year = {2016},
|
||||
month = Mar,
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
@techreport{astolfi2015,
|
||||
title = {I2P - The Invisible Internet Project},
|
||||
author = {Astolfi, Felipe and Kroese, Jelger and {Van Oorschot}, Jeroen},
|
||||
type = {Web Technology Report},
|
||||
institution = {Media Technology, Leiden University},
|
||||
year = {2015},
|
||||
www_pdf_url = {https://staas.home.xs4all.nl/t/swtr/documents/wt2015_i2p.pdf},
|
||||
}
|
||||
|
||||
@article{vashi2015,
|
||||
title = {Performance Improvement in I2P using SSL},
|
||||
author = {Vashi, Dipal and Khilari, Girish},
|
||||
journal = {International Journal of Science, Engineering and Technology Research},
|
||||
year = {2015},
|
||||
month = May,
|
||||
volume = {4},
|
||||
number = {5},
|
||||
pages = {1454--1456},
|
||||
www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1454-1456.pdf},
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
@article{vhora2015,
|
||||
title = {Defending Eclipse Attack in I2P using Structured Overlay Network},
|
||||
author = {Vhora, Hasib and Khilari, Girish},
|
||||
journal = {International Journal of Science, Engineering and Technology Research},
|
||||
year = {2015},
|
||||
month = May,
|
||||
volume = {4},
|
||||
number = {5},
|
||||
pages = {1515--1518},
|
||||
www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1515-1518.pdf},
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
@inproceedings{timpanaro:hal-01238453,
|
||||
title = {{Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security}},
|
||||
author = {Timpanaro, Juan Pablo and Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier},
|
||||
url = {https://hal.inria.fr/hal-01238453},
|
||||
booktitle = {{ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy}},
|
||||
address = {Angers, France},
|
||||
organization = {{SciTePress}},
|
||||
pages = {46-55},
|
||||
year = {2015},
|
||||
month = Feb,
|
||||
doi = {10.5220/0005226600460055},
|
||||
keywords = {I2P ; security ; DHT},
|
||||
www_pdf_url = {https://hal.inria.fr/hal-01238453/file/I2P-design-vs-performance-security.pdf},
|
||||
www_section = traffic,
|
||||
hal_id = {hal-01238453},
|
||||
hal_version = {v1},
|
||||
}
|
||||
|
||||
|
||||
@misc{tchabe2014,
|
||||
title = {Anonymous Communications: A survey on I2P},
|
||||
author = {Tchabe, Gildas Nya and Xu, Yinhua},
|
||||
howpublished = {CDC Publication},
|
||||
year = {2014},
|
||||
www_pdf_url = {https://www.cdc.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Lehre/SS13/Seminar/CPS/cps2014_submission_4.pdf},
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
@article{vashi2014,
|
||||
title = {A Survey on I2P Crypto Mechanism},
|
||||
author = {Vashi, Dipal and Khilari, Girish},
|
||||
journal = {International Journal of Engineering Development and Research},
|
||||
year = {2014},
|
||||
volume = {3},
|
||||
number = {1},
|
||||
pages = {99--102},
|
||||
www_pdf_url = {https://www.ijedr.org/papers/IJEDR1501021.pdf},
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
@article{karthigeyan2014,
|
||||
title = {A Comprehensive Behavior Analysis of TOR versus I2P},
|
||||
author = {Karthigeyan, A. and {Robinson Joel}, M. and Manikandan, S. P. and {Raja Guru}, P. and Raman, Sri},
|
||||
journal = {International Journal of Applied Engineering Research},
|
||||
year = {2014},
|
||||
volume = {9},
|
||||
number = {20},
|
||||
pages = {7333--7345},
|
||||
www_section = traffic,
|
||||
}
|
||||
|
||||
@article{liu2014,
|
||||
title = {Empirical Measurement and Analysis of I2P Routers},
|
||||
author = {Peipeng Liu et al},
|
||||
@ -95,7 +212,7 @@ various potential directions of addressing such leakage.}},
|
||||
year = {2014},
|
||||
month = Sep,
|
||||
volume = {9},
|
||||
issue = {9},
|
||||
number = {9},
|
||||
pages = {2269--2278},
|
||||
www_section = traffic,
|
||||
}
|
||||
@ -209,7 +326,7 @@ networks},
|
||||
year = {2012},
|
||||
month = Sep,
|
||||
volume = {35},
|
||||
issue = {5},
|
||||
number = {5},
|
||||
pages = {1473--1492},
|
||||
www_pdf_url = {http://www.freehaven.net/anonbib/cache/Ruiz-Martinez_2012.pdf},
|
||||
www_section = comm,
|
||||
|
Reference in New Issue
Block a user