Voir la notice de l'article provenant de la source Library of Science
@article{IJAMCS_2016_26_2_a16, author = {Kobusi\'nska, A. and Brzezi\'nski, J. and Boro\'n, M. and Inatlewski, {\L}. and Jabczy\'nski, M. and Maciejewski, M.}, title = {A branch hash function as a method of message synchronization in anonymous {P2P} conversations}, journal = {International Journal of Applied Mathematics and Computer Science}, pages = {479--493}, publisher = {mathdoc}, volume = {26}, number = {2}, year = {2016}, language = {en}, url = {http://geodesic.mathdoc.fr/item/IJAMCS_2016_26_2_a16/} }
TY - JOUR AU - Kobusińska, A. AU - Brzeziński, J. AU - Boroń, M. AU - Inatlewski, Ł. AU - Jabczyński, M. AU - Maciejewski, M. TI - A branch hash function as a method of message synchronization in anonymous P2P conversations JO - International Journal of Applied Mathematics and Computer Science PY - 2016 SP - 479 EP - 493 VL - 26 IS - 2 PB - mathdoc UR - http://geodesic.mathdoc.fr/item/IJAMCS_2016_26_2_a16/ LA - en ID - IJAMCS_2016_26_2_a16 ER -
%0 Journal Article %A Kobusińska, A. %A Brzeziński, J. %A Boroń, M. %A Inatlewski, Ł. %A Jabczyński, M. %A Maciejewski, M. %T A branch hash function as a method of message synchronization in anonymous P2P conversations %J International Journal of Applied Mathematics and Computer Science %D 2016 %P 479-493 %V 26 %N 2 %I mathdoc %U http://geodesic.mathdoc.fr/item/IJAMCS_2016_26_2_a16/ %G en %F IJAMCS_2016_26_2_a16
Kobusińska, A.; Brzeziński, J.; Boroń, M.; Inatlewski, Ł.; Jabczyński, M.; Maciejewski, M. A branch hash function as a method of message synchronization in anonymous P2P conversations. International Journal of Applied Mathematics and Computer Science, Tome 26 (2016) no. 2, pp. 479-493. http://geodesic.mathdoc.fr/item/IJAMCS_2016_26_2_a16/
[1] Aditya, P., Erd´elyi, V., Lentz, M., Shi, E., Bhattacharjee, B. and Druschel, P. (2014). Encore: Private, context-based communication for mobile social apps, Proceedings of the 12th Annual International Conference on Mobile Systems, Applications, and Services, Bretton Woods, NH, USA, pp. 135–148.
[2] Baruah, T. (2012). Effectiveness of social media as a tool of communication and its potential for technology enabled connections: A micro-level study, International Journal of Scientific and Research Publications 2(5): 1–10.
[3] Berthold, O., Federrath, H. and Kpsell, S. (2001). Web mixes: A system for anonymous and unobservable internet access, International Workshop on Designing Privacy Enhancing Technologies: Design Issues in Anonymity and Unobservability, Berkeley, CA, USA, pp. 115–129.
[4] Boyd, C., Mao, W. and Paterson, K.G. (2005). Deniable authenticated key establishment for internet protocols, in B. Christianson et al. (Eds.), Security Protocols, Springer, Berlin/Heidelberg, pp. 255–271.
[5] Dabek, F., Li, J., Sit, E., Robertson, J., Kaashoek, M. and Morris, R. (2004). Designing a DHT for low latency and high throughput, Proceedings of the 1st USENIX Symposium on Networked Systems Design and Implementation (NSDI’04), San Francisco, CA, USA, p. 7.
[6] Damiani, E., De Capitani di Vimercati, S., Paraboschi, S. and Samarati, P. (2004). P2P-based collaborative spam detection and filtering, 4th International Conference on Peer-to-Peer Computing (P2P 2004), Zurich, Switzerland, pp. 176–183.
[7] Dikranjan, D. (1998). Recent advances in minimal topological groups, Topology and its Applications 85(1): 53–91.
[8] ENISA (2012). Algorithms, key sizes and parameters report—2013 recommendations, Technical report, European Union Agency for Network and Information Security Agency, Heraklion.
[9] Frankel, S., Glenn, R. and Kelly, S. (2003). The AES-CBC cipher algorithm and its use with IPSEC, RFC 3602, Network Working Group, https://tools.ietf.org/html/rfc3602.
[10] Gilbert, S. and Lynch, N. (2002). Brewer’s conjecture and the feasibility of consistent, available, partition-tolerant web services, SIGACT News 33(2): 51–59.
[11] Laprie, J.C., Avizienis, A. and Kopetz, H. (Eds.) (1992). Dependability: Basic Concepts and Terminology, Springer-Verlag New York, Secaucus, NJ.
[12] Lv, X., Li, H. and Wang, B. (2012). Group key agreement for secure group communication in dynamic peer systems, Journal of Parallel and Distributed Computing 72(10): 1195–1200.
[13] Mannan, M. and van Oorschot, P. (2006). A protocol for secure public instant messaging, 10th International Conference on Financial Cryptography and Data Security, Anguilla, British West Indies, pp. 20–35.
[14] Miller, K. (2014). Organizational Communication: Approaches and Processes, Cengage Learning, Boston, MA.
[15] Montresor, A. and Jelasity, M. (2009). PeerSim: A scalable P2P simulator, IEEE 9th International Conference on Peer-to-Peer Computing, P2P’09, Seattle, WA, USA, pp. 99–100.
[16] Moore, A. and Zuev, D. (2005). Internet traffic classification using Bayesian analysis techniques, Proceedings of the International Conference on Measurements and Modeling of Computer Systems, SIGMETRICS 2005, Banff, Alberta, Canada, pp. 50–60.
[17] Mooser, M., Boohme, R. and Breuker, D. (2014). Towards risk scoring of Bitcoin transactions, Financial Cryptography and Data Security FC 2014 Workshops, Bridgetown, Barbados, pp. 16–32.
[18] Nakamoto, S. (2008). Bitcoin: A peer-to-peer electronic cash system, www.bitcoin.org.
[19] Payne, B. and Edwards,W. (2008). A brief introduction to usable security, IEEE Internet Computing 12(3): 13–21.
[20] Rivest, R. L., Shamir, A. and Adleman, L. (1978). A method for obtaining digital signatures and public-key cryptosystems, Communications of the ACM 21(2): 120–126.
[21] Rowstron, A., Kermarrec, A., Castro, M. and Druschel, P. (2001). SCRIBE: The design of a large-scale event notification infrastructure, Proceedings of the 3rd International COST264 Workshop on Networked Group Communication, NGC’01, London, UK, pp. 30–43.
[22] Sakarindr, P. and Ansari, N. (2010). Survey of security services on group communications, IET Information Security 4(4): 258–272.
[23] Saxena, A., Misra, J. and Dhar, A. (2014). Increasing anonymity in Bitcoin, in N. Christin and R. Safav-Naini (Eds.), Financial Cryptography and Data Security, Springer, Berlin/Heidelberg, pp. 122–139.
[24] Schoder, D. and Fischbach, K. (2003). Peer-to-peer prospects, Communications of the ACM 46(2): 27–29.
[25] Schollmeier, R. (2001). A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications, Proceedings of the 1st International Conference on Peer-to-Peer Computing, P2P’01, Linköping, Sweden, pp. 101–102.
[26] SDCDev (2014). Shadowcoin secure messaging: A P2P encrypted instant messaging system, www.shadowcoin.co.
[27] Serjantov, A. (2002). Anonymizing censorship resistant systems, in P. Druschel et al. (Eds.), Peer-to-Peer Systems, Lecture Notes in Computer Science, Vol. 2429, Springer, Berlin/Heidelberg, pp. 111–120.
[28] Sit, E. and Morris, R. (2002). Security considerations for peer-to-peer distributed hash tables, Revised Papers from the 1st International Workshop on Peer-to-Peer Systems, IPTPS’01, Cambridge, MA, USA, pp. 261–269.
[29] Sompolinsky, Y. and Zohar, A. (2013). Accelerating Bitcoin’s transaction processing. Fast money grows on trees, not chains, IACR Cryptology ePrint Archive 2013: 881.
[30] Völker, L., Noe, M., Waldhorst, O.P., Werle, C. and Sorge, C. (2011). Can internet users protect themselves? Challenges and techniques of automated protection of http communication, Computer Communications 34(3): 457–467.
[31] Warren, J. (2012). Bitmessage: A peer-to-peer message authentication and delivery system, www.bitmessage.org.
[32] Weninger, T. (2014). An exploration of submissions and discussions in social news: Mining collective intelligence of Reddit, Social Network Analysis and Mining 4(1): 1–19.
[33] Xiao, Z., Guo, L. and Tracey, J. M. (2007). Understanding instant messaging traffic characteristics, 27th IEEE International Conference on Distributed Computing Systems (ICDCS 2007), Toronto, Ontario, Canada, p. 51.
[34] Xie, M. and Wang, H. (2012). Secure instant messaging in enterprise-like networks, Computer Networks 56(1): 448–461.
[35] Zhang, Q., Cheng, L. and Boutaba, R. (2010). Cloud computing: State-of-the-art and research challenges, Journal of Internet Services and Applications 1(1): 7–18.