From 971b3133f2d5fb0d407477f4a8efd0a2f68b1eb3 Mon Sep 17 00:00:00 2001
From: str4d <str4d@mail.i2p>
Date: Mon, 10 Jul 2017 05:55:08 +0000
Subject: [PATCH] Update list of papers

---
 i2p2www/pages/papers/anonbib.bib | 121 ++++++++++++++++++++++++++++++-
 1 file changed, 119 insertions(+), 2 deletions(-)

diff --git a/i2p2www/pages/papers/anonbib.bib b/i2p2www/pages/papers/anonbib.bib
index 2dad2b24f..8b65199b1 100644
--- a/i2p2www/pages/papers/anonbib.bib
+++ b/i2p2www/pages/papers/anonbib.bib
@@ -46,6 +46,15 @@
   www_section = traffic,
 }
 
+@inproceedings{wilson2016,
+  title = {Forensic analysis of I2P activities},
+  author = {Wilson, Maxim and Bazli, Behnam},
+  booktitle = {2016 22nd International Conference on Automation and Computing (ICAC)},
+  year = {2016},
+  month = Sep,
+  www_section = comm,
+}
+
 #
 # Actually a bachelors thesis but there's no @ for that
 #
@@ -69,6 +78,7 @@ possibilities on I2P.}},
   author = {Seong Hoon Jeong et al},
   booktitle = {SIGCOMM '16 Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference},
   year = {2016},
+  month = Aug,
   abstract = {{The Invisible Internet Project (I2P) is an overlay network
 that provides secure and anonymous communication chan-he
 nels. EepSites are the anonymous websites hosted in the I2P
@@ -88,6 +98,113 @@ various potential directions of addressing such leakage.}},
   pages = {557-558},
 }
 
+@article{haughey2016,
+  title = {Anonymity networks and the fragile cyber ecosystem},
+  author = {Haughey, Hamish and Epiphaniou, Gregory and Al-Khateeb, Haider M.},
+  journal = {Network Security},
+  year = {2016},
+  month = Mar,
+  volume = {2016},
+  number = {3},
+  pages = {10--18},
+  www_section = traffic,
+}
+
+@inproceedings{ali2016,
+  title = {TOR vs I2P: A Comparative Study},
+  author = {Ali, Afzaal and Khan, Maria and Saddique, Muhammad and Pirzada, Umar and Zohaib, Muhammad and Ahmad, Imran and Debnath, Narayan},
+  booktitle = {2016 IEEE International Conference on Industrial Technology (ICIT)},
+  year = {2016},
+  month = Mar,
+  www_section = traffic,
+}
+
+@techreport{astolfi2015,
+  title = {I2P - The Invisible Internet Project},
+  author = {Astolfi, Felipe and Kroese, Jelger and {Van Oorschot}, Jeroen},
+  type = {Web Technology Report},
+  institution = {Media Technology, Leiden University},
+  year = {2015},
+  www_pdf_url = {https://staas.home.xs4all.nl/t/swtr/documents/wt2015_i2p.pdf},
+}
+
+@article{vashi2015,
+  title = {Performance Improvement in I2P using SSL},
+  author = {Vashi, Dipal and Khilari, Girish},
+  journal = {International Journal of Science, Engineering and Technology Research},
+  year = {2015},
+  month = May,
+  volume = {4},
+  number = {5},
+  pages = {1454--1456},
+  www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1454-1456.pdf},
+  www_section = traffic,
+}
+
+@article{vhora2015,
+  title = {Defending Eclipse Attack in I2P using Structured Overlay Network},
+  author = {Vhora, Hasib and Khilari, Girish},
+  journal = {International Journal of Science, Engineering and Technology Research},
+  year = {2015},
+  month = May,
+  volume = {4},
+  number = {5},
+  pages = {1515--1518},
+  www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1515-1518.pdf},
+  www_section = traffic,
+}
+
+@inproceedings{timpanaro:hal-01238453,
+  title = {{Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security}},
+  author = {Timpanaro, Juan Pablo and Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier},
+  url = {https://hal.inria.fr/hal-01238453},
+  booktitle = {{ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy}},
+  address = {Angers, France},
+  organization = {{SciTePress}},
+  pages = {46-55},
+  year = {2015},
+  month = Feb,
+  doi = {10.5220/0005226600460055},
+  keywords = {I2P ;  security ;  DHT},
+  www_pdf_url = {https://hal.inria.fr/hal-01238453/file/I2P-design-vs-performance-security.pdf},
+  www_section = traffic,
+  hal_id = {hal-01238453},
+  hal_version = {v1},
+}
+
+
+@misc{tchabe2014,
+  title = {Anonymous Communications: A survey on I2P},
+  author = {Tchabe, Gildas Nya and Xu, Yinhua},
+  howpublished = {CDC Publication},
+  year = {2014},
+  www_pdf_url = {https://www.cdc.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Lehre/SS13/Seminar/CPS/cps2014_submission_4.pdf},
+  www_section = traffic,
+}
+
+@article{vashi2014,
+  title = {A Survey on I2P Crypto Mechanism},
+  author = {Vashi, Dipal and Khilari, Girish},
+  journal = {International Journal of Engineering Development and Research},
+  year = {2014},
+  volume = {3},
+  number = {1},
+  pages = {99--102},
+  www_pdf_url = {https://www.ijedr.org/papers/IJEDR1501021.pdf},
+  www_section = traffic,
+}
+
+@article{karthigeyan2014,
+  title = {A Comprehensive Behavior Analysis of TOR versus I2P},
+  author = {Karthigeyan, A. and {Robinson Joel}, M. and Manikandan, S. P. and {Raja Guru}, P. and Raman, Sri},
+  journal = {International Journal of Applied Engineering Research},
+  year = {2014},
+  volume = {9},
+  number = {20},
+  pages = {7333--7345},
+  www_section = traffic,
+}
+
 @article{liu2014,
   title = {Empirical Measurement and Analysis of I2P Routers},
   author = {Peipeng Liu et al},
@@ -95,7 +212,7 @@ various potential directions of addressing such leakage.}},
   year = {2014},
   month = Sep,
   volume = {9},
-  issue = {9},
+  number = {9},
   pages = {2269--2278},
   www_section = traffic,
 }
@@ -209,7 +326,7 @@ networks},
   year = {2012},
   month = Sep,
   volume = {35},
-  issue = {5},
+  number = {5},
   pages = {1473--1492},
   www_pdf_url = {http://www.freehaven.net/anonbib/cache/Ruiz-Martinez_2012.pdf},
   www_section = comm,
-- 
GitLab