As always, I'd recommend this fellow check out Anonbib - [1]http://freehaven.net/anonbib/ On Tue, Aug 27, 2013 at 2:23 AM, Eugen Leitl <[2]eugen@leitl.org> wrote: ----- Forwarded message from Peter Gutmann <[3]pgut001@cs.auckland.ac.nz> ----- Date: Tue, 27 Aug 2013 00:28:54 +0000 From: Peter Gutmann <[4]pgut001@cs.auckland.ac.nz> To: "[5]cryptography@metzdowd.com" <[6]cryptography@metzdowd.com> Subject: Re: [Cryptography] Implementations, attacks on DHTs, Mix Nets? Ralph Holz <[7]ralph-cryptometzger@ralphholz.de> writes: >There is a host of older literature, too - P2P research, however, has become >a cold topic. Although I expect that it will see a revival in the face of >surveillance. For people who are interested, the list I have (for a year or two back) is: "Security Considerations for Peer-to-Peer Distributed Hash Tables", Emil Sit and Robert Morris, Proceedings of the 1st International Workshop on Peer-to- Peer Systems (IPTPS'01), Springer-Verlag LNCS No.2429, March 2002, p.261. "A Survey of Peer-to-Peer Security Issues", Dan Wallach, Proceedings of the 2002 International Symposium on Software Security (ISSS'02), Springer-Verlag LNCS No.2609, November 2002, p.42. "Eclipse Attacks on Overlay Networks: Threats and Defenses", Atul Singh, Tsuen-Wan Ngan, Peter Druschel and Dan Wallach, Proceedings of the 25th International Conference on Computer Communications (INFOCOM'06), April 2006, "The Index Poisoning Attack in P2P File Sharing Systems", Jian Liang, Naoum Naoumov and Keith Ross, Proceedings of the 25th Conference on Computer Communications (INFOCOM'06), April 2006, "Conducting and Optimizing Eclipse Attacks in the Kad Peer-to-Peer Network", Michael Kohnen, Mike Leske and Erwin Rathgeb, Proceedings of the 8th IFIP-TC 6 Networking Conference (Networking'09), Springer-Verlag LNCS No.5550, May 2009, p.104. "Combating Index Poisoning in P2P File Sharing", Lingli Deng, Yeping He and Ziyao Xu, Proceedings of the 3rd Conference and Workshops on Advances in Information Security and Assurance (ISA'09), Springer-Verlag LNCS No.5576, June 2009, p.358. "Hashing it out in public: Common failure modes of DHT-based anonymity schemes", Andrew Tran, Nicholas Hopper and Yongdae Kim, Proceedings of the 8th Workshop on Privacy in the Electronic Society (WPES'09), November 2009, p.71. "Poisoning the Kad Network", Thomas Locher, David Mysicka, Stefan Schmid and Roger Wattenhofer, Proceedings of the 11th International Conference on Distributed Computing and Networking (ICDCN'10), Springer-Verlag LNCS No.5935, January 2010, p.195. If there's anything significant I've missed, feel free to fill in the gaps. Peter. _______________________________________________ The cryptography mailing list [8]cryptography@metzdowd.com [9]http://www.metzdowd.com/mailman/listinfo/cryptography ----- End forwarded message ----- -- Eugen* Leitl leitl [11]http://leitl.org ______________________________________________________________ ICBM: 48.07100, 11.36820 [12]http://ativel.com [13]http://postbiota.org AC894EC5: 38A5 5F46 A4FF 59B8 336B 47EE F46E 3489 AC89 4EC5 -- Rich Jones OpenWatch is a global investigative network using mobile technology to build a more transparent world. Download OpenWatch [14]for iOS and [15]for Android! References 1. http://freehaven.net/anonbib/ 2. mailto:eugen@leitl.org 3. mailto:pgut001@cs.auckland.ac.nz 4. mailto:pgut001@cs.auckland.ac.nz 5. mailto:cryptography@metzdowd.com 6. mailto:cryptography@metzdowd.com 7. mailto:ralph-cryptometzger@ralphholz.de 8. mailto:cryptography@metzdowd.com 9. http://www.metzdowd.com/mailman/listinfo/cryptography 10. http://leitl.org/ 11. http://leitl.org/ 12. http://ativel.com/ 13. http://postbiota.org/ 14. https://itunes.apple.com/us/app/openwatch-social-muckraking/id642680756?ls=1&mt=8 15. https://play.google.com/store/apps/details?id=org.ale.openwatch&hl=en