[1]
i2p website, http: /www. i2p2. de.
Google Scholar
[2]
i2p statistic website, http: /stats. i2p. in.
Google Scholar
[3]
L. Schimmer, Peer profiling and selection in the i2p anonymous network, in PET-CON 2009. 1., TU Dresden, Germany, 03/2009 (2009).
Google Scholar
[4]
A. Crenshaw, Darknets and hidden servers: Identifying the true ip/network identity of i2p service hosts, Black Hat, (2011).
Google Scholar
[5]
M. Herrmann and C. Grothoff, Privacy-implications of performance- based peer selection by onion-routers: a real-world case study using i2p, in Privacy Enhancing Technologies. Springer, 2011, p.155– 174.
DOI: 10.1007/978-3-642-22263-4_9
Google Scholar
[6]
J. P. Timpanaro, I. Chrisment, and O. Festor, Improving content avail- ability in the i2p anonymous file-sharing environment, in Cyberspace Safety and Security. Springer, 2012, p.77–92.
DOI: 10.1007/978-3-642-35362-8_8
Google Scholar
[7]
J. P. Timpanaro, C. Isabelle, F. Olivier et al., Monitoring the i2p network, (2011).
Google Scholar
[8]
J. Timpanaro, I. Chrisment, and O. Festor, A birds eye view on the i2p anonymous file-sharing environment, in Network and System Security, ser. Lecture Notes in Computer Science, L. Xu, E. Bertino, and Y. Mu, Eds. Springer Berlin Heidelberg, 2012, vol. 7645, p.135.
DOI: 10.1007/978-3-642-34601-9_11
Google Scholar
[9]
J. P. Timpanaro, I. Chrisment, and O. Festor, I2p's usage characteriza- tion, in Traffic Monitoring and Analysis. Springer, 2012, p.48–51.
Google Scholar
[10]
J. Douceur, The sybil attack, in Peer-to-Peer Systems, ser. Lecture Notes in Computer Science, P. Druschel, F. Kaashoek, and A. Rowstron, Eds. Springer Berlin Heidelberg, 2002, vol. 2429, p.251–260.
DOI: 10.1007/3-540-45748-8_24
Google Scholar
[11]
D. Stutzbach and R. Rejaie, Understanding churn in peer-to-peer networks, " in Proceedings of the 6th ACM SIGCOMM conference on Internet measurement, ser. IMC , 06. New York, NY, USA: ACM, 2006, p.189–202.
DOI: 10.1145/1177080.1177105
Google Scholar
[12]
D. Mccoy, T. Kohno, and D. Sicker, Shining light in dark places: Understanding the tor network, in In Proceedings of the 8th Privacy Enhancing Technologies Symposium, (2008).
DOI: 10.1007/978-3-540-70630-4_5
Google Scholar
[13]
K. Loesing, S. Murdoch, and R. Dingledine, A case study on measuring statistical data in the tor anonymity network, in Financial Cryptogra- phy and Data Security, ser. Lecture Notes in Computer Science, R. Sion,R. Curtmola, S. Dietrich, A. Kiayias, J. Miret, K. Sako, and F. Seb, Eds. Springer Berlin Heidelberg, 2010, vol. 6054, p.203.
DOI: 10.1007/978-3-642-14992-4_19
Google Scholar