A Censorship-Resistant, Privacy-Enhancing and Fully Decentralized Name System

作者: Matthias Wachs , Martin Schanzenbach , Christian Grothoff

DOI: 10.1007/978-3-319-12280-9_9

关键词:

摘要: … may freely and securely map names to values. In a petname system, each user chooses a nickname as his … In both systems, name resolution starts with a lookup in the local namespace. …

参考文章(19)
Alexander Ulrich, Ralph Holz, Peter Hauck, Georg Carle, Investigating the OpenPGP Web of Trust Computer Security – ESORICS 2011. pp. 489- 507 ,(2011) , 10.1007/978-3-642-23822-2_27
Bryan Alexander Ford, M. Frans Kaashoek, Uia: a global connectivity architecture for mobile personal devices Massachusetts Institute of Technology. ,(2008)
Joseph Bonneau, Mike Just, Greg Matthews, What's in a name? Evaluating statistical attacks on personal knowledge questions financial cryptography. pp. 98- 113 ,(2010) , 10.1007/978-3-642-14577-3_10
Christopher Soghoian, Sid Stamm, Certified Lies: Detecting and Defeating Government Interception Attacks Against SSL Social Science Research Network. ,(2010) , 10.2139/SSRN.1591033
Roger Dingledine, Nick Mathewson, Paul Syverson, Tor: the second-generation onion router usenix security symposium. pp. 21- 21 ,(2004) , 10.21236/ADA465464
Ronald L. Rivest, Butler Lampson, SDSI - A Simple Distributed Security Infrastructure ,(1996)
Daniel J. Bernstein, Curve25519: New Diffie-Hellman Speed Records Public Key Cryptography - PKC 2006. pp. 207- 228 ,(2006) , 10.1007/11745853_14
Roy Arends, Scott Rose, Dan Massey, Matt Larson, Rob Austein, DNS Security Introduction and Requirements RFC. ,vol. 4033, pp. 1- 21 ,(2005)
V. Ksinant, M. Souissi, C. Huitema, S. Thomson, DNS Extensions to support IP version 6 RFC. ,vol. 1886, pp. 1- 5 ,(1995)