From 971b3133f2d5fb0d407477f4a8efd0a2f68b1eb3 Mon Sep 17 00:00:00 2001 From: str4d <str4d@mail.i2p> Date: Mon, 10 Jul 2017 05:55:08 +0000 Subject: [PATCH] Update list of papers --- i2p2www/pages/papers/anonbib.bib | 121 ++++++++++++++++++++++++++++++- 1 file changed, 119 insertions(+), 2 deletions(-) diff --git a/i2p2www/pages/papers/anonbib.bib b/i2p2www/pages/papers/anonbib.bib index 2dad2b24f..8b65199b1 100644 --- a/i2p2www/pages/papers/anonbib.bib +++ b/i2p2www/pages/papers/anonbib.bib @@ -46,6 +46,15 @@ www_section = traffic, } +@inproceedings{wilson2016, + title = {Forensic analysis of I2P activities}, + author = {Wilson, Maxim and Bazli, Behnam}, + booktitle = {2016 22nd International Conference on Automation and Computing (ICAC)}, + year = {2016}, + month = Sep, + www_section = comm, +} + # # Actually a bachelors thesis but there's no @ for that # @@ -69,6 +78,7 @@ possibilities on I2P.}}, author = {Seong Hoon Jeong et al}, booktitle = {SIGCOMM '16 Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference}, year = {2016}, + month = Aug, abstract = {{The Invisible Internet Project (I2P) is an overlay network that provides secure and anonymous communication chan-he nels. EepSites are the anonymous websites hosted in the I2P @@ -88,6 +98,113 @@ various potential directions of addressing such leakage.}}, pages = {557-558}, } +@article{haughey2016, + title = {Anonymity networks and the fragile cyber ecosystem}, + author = {Haughey, Hamish and Epiphaniou, Gregory and Al-Khateeb, Haider M.}, + journal = {Network Security}, + year = {2016}, + month = Mar, + volume = {2016}, + number = {3}, + pages = {10--18}, + www_section = traffic, +} + +@inproceedings{ali2016, + title = {TOR vs I2P: A Comparative Study}, + author = {Ali, Afzaal and Khan, Maria and Saddique, Muhammad and Pirzada, Umar and Zohaib, Muhammad and Ahmad, Imran and Debnath, Narayan}, + booktitle = {2016 IEEE International Conference on Industrial Technology (ICIT)}, + year = {2016}, + month = Mar, + www_section = traffic, +} + +@techreport{astolfi2015, + title = {I2P - The Invisible Internet Project}, + author = {Astolfi, Felipe and Kroese, Jelger and {Van Oorschot}, Jeroen}, + type = {Web Technology Report}, + institution = {Media Technology, Leiden University}, + year = {2015}, + www_pdf_url = {https://staas.home.xs4all.nl/t/swtr/documents/wt2015_i2p.pdf}, +} + +@article{vashi2015, + title = {Performance Improvement in I2P using SSL}, + author = {Vashi, Dipal and Khilari, Girish}, + journal = {International Journal of Science, Engineering and Technology Research}, + year = {2015}, + month = May, + volume = {4}, + number = {5}, + pages = {1454--1456}, + www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1454-1456.pdf}, + www_section = traffic, +} + +@article{vhora2015, + title = {Defending Eclipse Attack in I2P using Structured Overlay Network}, + author = {Vhora, Hasib and Khilari, Girish}, + journal = {International Journal of Science, Engineering and Technology Research}, + year = {2015}, + month = May, + volume = {4}, + number = {5}, + pages = {1515--1518}, + www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1515-1518.pdf}, + www_section = traffic, +} + +@inproceedings{timpanaro:hal-01238453, + title = {{Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security}}, + author = {Timpanaro, Juan Pablo and Cholez, Thibault and Chrisment, Isabelle and Festor, Olivier}, + url = {https://hal.inria.fr/hal-01238453}, + booktitle = {{ICISSP 2015 - Proceedings of the 1st International Conference on Information Systems Security and Privacy}}, + address = {Angers, France}, + organization = {{SciTePress}}, + pages = {46-55}, + year = {2015}, + month = Feb, + doi = {10.5220/0005226600460055}, + keywords = {I2P ; security ; DHT}, + www_pdf_url = {https://hal.inria.fr/hal-01238453/file/I2P-design-vs-performance-security.pdf}, + www_section = traffic, + hal_id = {hal-01238453}, + hal_version = {v1}, +} + + +@misc{tchabe2014, + title = {Anonymous Communications: A survey on I2P}, + author = {Tchabe, Gildas Nya and Xu, Yinhua}, + howpublished = {CDC Publication}, + year = {2014}, + www_pdf_url = {https://www.cdc.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Lehre/SS13/Seminar/CPS/cps2014_submission_4.pdf}, + www_section = traffic, +} + +@article{vashi2014, + title = {A Survey on I2P Crypto Mechanism}, + author = {Vashi, Dipal and Khilari, Girish}, + journal = {International Journal of Engineering Development and Research}, + year = {2014}, + volume = {3}, + number = {1}, + pages = {99--102}, + www_pdf_url = {https://www.ijedr.org/papers/IJEDR1501021.pdf}, + www_section = traffic, +} + +@article{karthigeyan2014, + title = {A Comprehensive Behavior Analysis of TOR versus I2P}, + author = {Karthigeyan, A. and {Robinson Joel}, M. and Manikandan, S. P. and {Raja Guru}, P. and Raman, Sri}, + journal = {International Journal of Applied Engineering Research}, + year = {2014}, + volume = {9}, + number = {20}, + pages = {7333--7345}, + www_section = traffic, +} + @article{liu2014, title = {Empirical Measurement and Analysis of I2P Routers}, author = {Peipeng Liu et al}, @@ -95,7 +212,7 @@ various potential directions of addressing such leakage.}}, year = {2014}, month = Sep, volume = {9}, - issue = {9}, + number = {9}, pages = {2269--2278}, www_section = traffic, } @@ -209,7 +326,7 @@ networks}, year = {2012}, month = Sep, volume = {35}, - issue = {5}, + number = {5}, pages = {1473--1492}, www_pdf_url = {http://www.freehaven.net/anonbib/cache/Ruiz-Martinez_2012.pdf}, www_section = comm, -- GitLab