Ghodsi, A., Alima, L., El-Ansary, S., Brand, P., and Haridi,
S. (2003). Dks(n,k,f): A family of low communica-
tion, scalable and fault-tolerant infrastructures for p2p
applications. In Proceedings of the 3rd. International
Workshop on Global and P2P Computing on Large
Scale Distributed Systems (CCGRID 2003), Tokyo,
Japan.
Han, J., Liu, Y., Xiao, L., Xiao, R., and Ni, L. M. (2005). A
mutual anonymous peer-to-peer protocol design. In
Proceedings of the 19th International Parallel and
Distributed Processing Symposium (IPDPS’05), Den-
ver, CO, USA.
Levine, B. N. and Shields, C. (2002). Hordes: A multicast-
based protocol for anonymity. Journal of Computer
Security, 10(3):213–240.
Li, J., Stribling, J., Morris, R., and Kaashoek, M. F. (2005).
Bandwidth-efficient management of dht routing ta-
bles. In Proceedings of the 2nd USENIX Sympo-
sium on Networked Systems Design and Implementa-
tion (NSDI’05), Boston, MA, USA.
Lu, T., Fang, B., Sun, Y., and Cheng, X. (2004). Wongoo:
A peer-to-peer protocol for anonymous communica-
tion. In Proceedings of the 2004 International Con-
ference on Parallel and Distributed Processing Tech-
niques and Appliations (PDPTA 2004), Las Vegas,
NE, USA.
Mislove, A., Oberoi, G., A. Post, C. R., and Druschel, P.
(2004). Ap3: Cooperative, decentralized anonymous
communication. In Proceedings of the 11th work-
shop on ACM SIGOPS European workshop: beyond
the PC, New York, NY, USA.
Mu
˜
noz-Gea, J. P., Malgosa-Sanahuja, J., Manzanares-
Lopez, P., Sanchez-Aarnoutse, J. C., and Guirado-
Puerta, A. M. (2006). A hybrid topology architecture
for p2p file sharing systems. In Proceedings of the
First International Conference on Software and Data
Technologies (ICSOFT 2006), Set
´
ubal, Portugal.
Pfitzmann, A. and Hansen, M. (2001). Anonymity, unob-
servability and pseudomyity: a proposal for terminol-
ogy. In Proceedings of the Fourth International Infor-
mation Hiding Workshop, Pittsburgh, PE, USA.
Ratnasamy, S., Francis, P., Handley, M., Karp, R., and
Shenker, S. (2001a). A scalable content-addressable
network. In Proceedings of ACM SIGCOMM, San
Diego, CA, USA.
Ratnasamy, S., Handley, M., Karp, R., and Shenker, S.
(2001b). Application-level multicast using content-
addressable networks. In Proceedings of the 3rd. In-
ternational Workshop of Networked Group Communi-
cation (NGC), London, UK.
Reed, M. G., Syverson, P. F., and Goldshlag, D. M.
(1998). Anonymous connections and onion routing.
IEEE Journal on Selected Areas in Communications,
16(4):482–494.
Reiter, M. K. and Rubin, A. D. (1999). Crowds: Anonymity
for web transactions. Communications of the ACM,
42(2):32–48.
Rowstron, A. and Druschel, P. (2001). Pastry: Scalable,
decentralized object location and routing for large-
scale peer-to-peer systems. In Proceedings of the
IFIP/ACM International Conference on Distributed
Systems Platforms (Middleware), Heidelberg, Ger-
many.
Stoica, I., Morris, R., Liben-Nowell, D., and Karger, D.
(2003). Chord: A scalable peer-to-peer lookup proto-
col for internet applications. IEEE/ACM Transactions
on Networking, 11(1):17–32.
Sui, H., Chen, J., Che, S., and Wang, J. (2003). Pay-
load analysis of anonymous communication system
with host-based rerouting mechanism. In Proceed-
ings of the Eighth IEEE International Symposium on
Computers and Communications (ISCC’03), Kemer-
Antalya, Turkey.
Wright, M., Adler, M., Levine, B. N., and Shields, C.
(2002). An analysis of the degradation of anonymous
protocols. In Proceedings of the Network and Dis-
tributed Security Symposium (NDSS’02), San Diego,
CA, USA.
Xiao, L., Xu, Z., and Shang, X. (2003). Low-cost and reli-
able mutual anonymity protocols in peer-to-peer net-
works. IEEE Transactions on Parallel and Distributed
Systems, 14(9):829–840.
DISTRIBUTED PATH RESTORATION ALGORITHM FOR ANONYMITY IN P2P FILE SHARING SYSTEMS
95