abdo
@inproceedings{abdo,
  title = {Modeling the Invisible Internet}, 
  author = {Jacques Bou Abdo and Liaquat Hossain}, 
  booktitle = {Complex Networks and their Applications XII}, 
  year = {2024}, 
  month = {February}, 
  publisher = {Springer}, 
  url = {https://link.springer.com/chapter/10.1007/978-3-031-53472-0_30}, 
  www_section = {Traffic analysis}, 
}

yu2021
@phdthesis{yu2021,
  title = {Research and implementation of bridge technology in I2P anonymous system}, 
  author = {Yu Chih-Wei}, 
  school = {Beijing University of Posts and Telecommunications}, 
  year = {2021}, 
  url = {https://www.zhangqiaokeyan.com/academic-degree-domestic_mphd_thesis/020318030805.html},
  www_section = {Anonymous communication}, 
}

qu2020
@article{qu2020,
  title = {Analysis and Identification of I2P Anonymous Communication Traffic
        Characteristics}, 
  author = {QU Yun-xuan and WANG Yi-jun and XUE Zhi}, 
  journal = {Communications Technology}, 
  volume = {53}, 
  number = {1}, 
  year = {2020}, 
  month = {January}, 
  pages = {161--167}, 
  doi = {10.3969/j.issn.1002-0802.2020.01.028}, 
  url = {http://stats.i2p/docs/AII2PACTC-eng.docx}, 
  www_pdf_url = {http://stats.i2p/docs/I2P%20%E5%8C%BF%E5%90%8D%E9%80%9A%E4%BF%A1%E6%B5%81%E9%87%8F%E7%89%B9%E5%BE%81%E5%88%86%E6%9E%90%E4%B8%8E%E8%AF%86%E5%88%AB-min.pdf},
  keywords = {anonymous communication; I2P; traffic identification; statistical feature
        analysis}, 
  www_section = {Traffic analysis}, 
}

239068
@inproceedings{239068,
  title = {Measuring I2P Censorship at a Global Scale}, 
  author = {Nguyen Phong Hoang and Sadie Doreen and Michalis Polychronakis}, 
  booktitle = {9th USENIX Workshop on Free and Open Communications on the Internet (FOCI
        19)}, 
  year = {2019}, 
  month = {August}, 
  address = {Santa Clara, CA}, 
  publisher = {USENIX Association}, 
  url = {https://www.usenix.org/conference/foci19/presentation/hoang}, 
  www_pdf_url = {https://www.usenix.org/system/files/foci19-paper_hoang.pdf}, 
  www_section = {Traffic analysis}, 
}

orignal2015
@inproceedings{orignal2015,
  title = {A Transparent Implementation Of The Signature In Scheme EdDSA}, 
  author = {Losev, V. I.}, 
  booktitle = {Proceedings of Heuristic Algorithms and Distributed Computing}, 
  year = {2015}, 
  pages = {49--56}, 
  www_section = {Formal methods}, 
  www_pdf_url = {https://archive.org/download/HeuristicAlgorithmsAndDistributedComputing2015/tom2-nom4.pdf},
}

boerbreider
@mastersthesis{boerbreider,
  title = {Invisible Internet Project(Report)}, 
  author = {de Boer, Tim and Breider, Vincent}, 
  school = {University of Amsterdam}, 
  year = {2019}, 
  month = {February}, 
  www_section = {Anonymous communication}, 
  www_pdf_url = {https://delaat.net/rp/2018-2019/p63/report.pdf}, 
}

boerbreider-pres
@mastersthesis{boerbreider-pres,
  title = {Invisible Internet Project(Presentation)}, 
  author = {de Boer, Tim and Breider, Vincent}, 
  school = {University of Amsterdam}, 
  year = {2019}, 
  month = {February}, 
  www_section = {Anonymous communication}, 
  www_pdf_url = {https://delaat.net/rp/2018-2019/p63/presentation.pdf}, 
}

gehl_2018
@misc{gehl_2018,
  title = {Weaving the dark web: Legitimacy on Freenet, Tor, and I2P}, 
  author = {Gehl, Robert W.}, 
  year = {2018}, 
  howpublished = {The MIT Press}, 
  note = {ISBN: 9780262038263}, 
  www_section = {Misc}, 
  place = {Cambridge, MA}, 
  www_html_url = {https://mitpress.mit.edu/books/weaving-dark-web}, 
}

alachkargastra2018-blockchain-based-sybil-mitigation
@mastersthesis{alachkargastra2018-blockchain-based-sybil-mitigation,
  title = {Blockchain-based Sybil Attack Mitigation: A Case Study of the I2P Network}, 
  author = {Alachkar, Kotaiba and Gaastra, Dirk}, 
  school = {University of Amsterdam}, 
  year = {2018}, 
  month = {June}, 
  www_section = {Anonymous communication}, 
  www_pdf_url = {https://docslib.org/doc/12313748/blockchain-based-sybil-attack-mitigation-a-case-study-of-the-i2p},
}

ye2018-deciding-anonymity
@article{ye2018-deciding-anonymity,
  title = {Deciding Your Own Anonymity: User-Oriented Node Selection in I2P}, 
  author = {L. Ye and X. Yu and J. Zhao and D. Zhan and X. Du and M. Guizani}, 
  journal = {IEEE Access}, 
  volume = {6}, 
  number = {}, 
  year = {2018}, 
  month = {November}, 
  pages = {71350--71359}, 
  doi = {10.1109/ACCESS.2018.2881719}, 
  abstract = {With the development of Internet applications, anonymous communication
        technology plays a very significant role in protecting personal privacy. As one
        of the most popular anonymous communication systems, I2P provides strong
        anonymity through its encryption and communication schemes. However, I2P does not
        consider the users' preferences, which is difficult to meet the individual
        demands of specific users and then allows them to decide their anonymity. Thus,
        this paper proposes two novel user-oriented node selection algorithms that can
        effectively enhance the anonymity or reduce the communication delay over the I2P
        network. In order to choose proper nodes, we also investigate key factors to
        evaluate the nodes. Then, the basic node selection algorithm (BNSA) is proposed
        to group routing nodes and provide high-performance node candidates. Based on
        BNSA, the geographic-diversity-oriented node selection algorithm (GDNSA) and the
        communication-delay-oriented node selection algorithm (CDNSA) are proposed. These
        can improve the anonymity or communication performance of the I2P network. The
        GDNSA increases the attack difficulty by establishing tunnels that span multiple
        regions. In the meantime, the CDNSA reduces the communication delay of the tunnel
        by selecting the next hop node with the lowest communication delay. Finally, the
        mathematical analysis and experimental results show that the GDNSA has good
        resistance to collusion attacks, and the CDNSA reduces the communication delay in
        spite of weakening a little anonymity}, 
  www_pdf_url = {https://ieeexplore.ieee.org/stamp/stamp.jsp?tp=&arnumber=8537903}, 
  keywords = {Peer-to-peer computing;Delays;Routing;Relays;Logic gates;Security;Anonymous
        communication;node selection;geographic diversity;communication delay;I2P}, 
  www_section = {Anonymous communication}, 
  issn = {2169-3536}, 
}

interconnection-between-darknets
@article{interconnection-between-darknets,
  title = {Interconnection between darknets}, 
  author = {L. Ye and X. Yu and J. Zhao and D. Zhan and X. Du and M. Guizani}, 
  journal = {EEE INTERNET COMPUTING}, 
  volume = {1}, 
  year = {2020}, 
  month = {December}, 
  doi = {10.1109/MIC.2020.3037723}, 
  www_section = {Anonymous communication}, 
  www_pdf_url = {https://arxiv.org/pdf/2012.05003}, 
  keywords = {Tor, i2p, Darknet, Graph Analysis, Dataset}, 
  abstract = {Tor and i2p networks are two of the most popular darknets. Both darknets have
        become an area of illegal activities highlighting the necessity to study and
        analyze them to identify and report illegal content to Law Enforcement Agencies
        (LEAs). This paper analyzes the connections between the Tor network and the i2p
        network. We created the first dataset that combines information from Tor and i2p
        networks. The dataset contains more than 49k darknet services. The process of
        building and analyzing the dataset shows that it is not possible to explore one
        of the networks without considering the other. Both networks work as an ecosystem
        and there are clear paths between them. Using graph analysis, we also identified
        the most relevant domains, the prominent types of services in each network, and
        their relations. Findings are relevant to LEAs and researchers aiming to crawl
        and investigate i2p and Tor networks.}, 
  issn = {2169-3536}, 
}

smits2018:i2p-enhanced-outproxy
@mastersthesis{smits2018:i2p-enhanced-outproxy,
  title = {Risk Assessment for I2P With an Enhanced Outproxy Design}, 
  author = {Smits, Dolf}, 
  school = {Leiden University}, 
  year = {2018}, 
  month = {January}, 
  url = {https://openaccess.leidenuniv.nl/handle/1887/64566}, 
  www_section = {Traffic analysis}, 
  www_pdf_url = {https://openaccess.leidenuniv.nl/bitstream/handle/1887/64566/Smits_D_2018_CS.pdf?sequence=2},
}

phong2018:i2p-censorship-resistance
@inproceedings{phong2018:i2p-censorship-resistance,
  title = {An Empirical Study of the I2P Anonymity Network and its Censorship Resistance}, 
  author = {Nguyen, Phong Hoang and Kintis, Panagiotis and Antonakakis, Manos and
        Polychronakis, Michalis}, 
  booktitle = {Proceedings of 2018 Internet Measurement Conference (IMC '18)}, 
  year = {2018}, 
  month = {October}, 
  www_pdf_url = {https://www.researchgate.net/profile/Nguyen_Phong_Hoang/publication/327445307},
  www_section = {Traffic analysis}, 
}

shahbar2017-dthesis
@phdthesis{shahbar2017-dthesis,
  title = {Analysis of Multilayer-Encryption Anonymity Networks}, 
  author = {Khalid Shahbar}, 
  institution = {Dalhousie University}, 
  year = {2017}, 
  month = {October}, 
  abstract = {{This thesis studies and analyzes multilayer-encryption anonymity networks.
        Traffic flow analysis is employed to identify multilayer-encryption anonymity
        networks. The analysis includes collecting data from the three most popular
        anonymity networks (namely, Tor, JonDonym and I2P). The collected data (Anon17)
        is made publicly available for researchers on the field. The study also includes
        proposing weighted factors to quantify and measure the level of anonymity these
        networks could provide.}}, 
  www_section = {Traffic analysis}, 
  www_pdf_url = {https://dalspace.library.dal.ca/bitstream/handle/10222/73395/Shahbar-Khalid-PhD-CS-Oct-2017.pdf},
}

shahbar2017-dataset
@techreport{shahbar2017-dataset,
  title = {Anon17: Network Traffic Dataset of Anonymity Services}, 
  author = {Shahbar, Khalid and Zincir-Heywood, A. Nur}, 
  institution = {Dalhousie University}, 
  year = {2017}, 
  month = {March}, 
  abstract = {{One of the difficulties that face researchers on the anonymity networks
        field is the lack of anonymity dataset. Researchers need to collect their data to
        conduct a research or to use a simulated environment to collect the data they
        need. The lack of such a dataset is due to the nature of the anonymity networks.
        These anonymity networks aim to provide certain level of privacy for the users.
        In this paper, we present Anon17, a traffic flow dataset of different anonymity
        services. Anon17 specifically contains data collected from three anonymity
        networks; Tor, JonDonym, and I2P.}}, 
  www_section = {Traffic analysis}, 
  www_pdf_url = {https://www.cs.dal.ca/sites/default/files/technical_reports/cs-2017-03.pdf},
  keywords = {Dataset ; Tor ; I2P ; JonDonym ; Traffic Flow ; Anonymity}, 
}

bazli2017-the-dark-side-of-i2p
@article{bazli2017-the-dark-side-of-i2p,
  title = {The Dark side of I2P, a forensic analysis case study}, 
  author = {Bazli, Wilson and Hurst}, 
  journal = {System Science & Control Engeneering}, 
  volume = {2017}, 
  number = {5}, 
  year = {2017}, 
  month = {June}, 
  pages = {278--286}, 
  doi = {10.1080/21642583.2017.1331770}, 
  url = {https://doi.org/10.1080/21642583.2017.1331770}, 
  www_section = {Traffic analysis}, 
}

shahbar2017-measuring-anonymity-services
@techreport{shahbar2017-measuring-anonymity-services,
  title = {Weighted Factors for Measuring Anonymity Services: A Case Study on Tor,
        JonDonym, and I2P}, 
  author = {Shahbar, Khalid and Zincir-Heywood, A. Nur}, 
  institution = {Dalhousie University}, 
  year = {2017}, 
  month = {January}, 
  abstract = {{There are many systems that provide anonymity service for the users. Most of
        these systems work on the separation between the users' identity and the final
        destination. The level of anonymity these services provide affected by several
        factors. Some of these factors are related to the design of the anonymity service
        itself. Others are related to how the system is used or what is the
        application/purpose the user wants to run over the anonymity service. In this
        paper we: (i) propose five factors that aim to measure the anonymity level from
        the user's perspective; (ii) evaluate these factors on three anonymity services,
        namely Tor, JonDonym, and I2P as case studies; and (iii) present a mechanism to
        evaluate anonymity services based on our factors and measure the level of
        anonymity.}}, 
  www_section = {Anonymous communication}, 
  www_pdf_url = {https://cdn.dal.ca/content/dam/dalhousie/pdf/faculty/computerscience/technical-reports/CS-2017-01.pdf},
  keywords = {Anonymity Factors ; Metrics ; Tor ; I2P ; JonDonym}, 
}

shahbar2017:effects-shared-bandwidth
@inproceedings{shahbar2017:effects-shared-bandwidth,
  title = {Effects of Shared Bandwidth on Anonymity of the I2P Network Users}, 
  author = {Khalid Shahbar and A. Nur Zincir-Heywood}, 
  booktitle = {Proceedings of the 38th IEEE Symposium on Security and Privacy Workshops,
        2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC
        2017)}, 
  year = {2017}, 
  month = {May}, 
  www_pdf_url = {https://www.researchgate.net/publication/321999503_Effects_of_Shared_Bandwidth_on_Anonymity_of_the_I2P_Network_Users},
  www_section = {Traffic analysis}, 
}

wilson2016
@inproceedings{wilson2016,
  title = {Forensic analysis of I2P activities}, 
  author = {Wilson, Maxim and Bazli, Behnam}, 
  booktitle = {Proceedings of the 2016 22nd International Conference on Automation and
        Computing (ICAC)}, 
  year = {2016}, 
  month = {September}, 
  www_section = {Anonymous communication}, 
}

muller-bthesis
@mastersthesis{muller-bthesis,
  title = {Analysis of the I2P Network - Information Gathering and Attack Evaluations}, 
  author = {Jens M{\"u}ller}, 
  school = {Bern University of Applied Sciences}, 
  year = {2016}, 
  month = {June}, 
  type = {Bachelors Thesis}, 
  note = {Title : Analysis of the I2P Network. School: Bern University of Applied Sciences
        - Department of Computer Science}, 
  abstract = {{This thesis consists of three main parts, one giving an introduction to I2P,
        the Invisible Internet Project, one that presents I2P Observer, a software to
        collect information about I2P and one that evaluates different attack
        possibilities on I2P.}}, 
  www_pdf_url = {https://docslib.org/doc/6144412/analysis-of-the-i2p-network-information-gathering-and-attack-evaluations},
  www_section = {Traffic analysis}, 
}

jeong2016
@inproceedings{jeong2016,
  title = {A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure}, 
  author = {Seong Hoon Jeong et al}, 
  booktitle = {Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference}, 
  year = {2016}, 
  month = {August}, 
  pages = {557--558}, 
  www_section = {Traffic analysis}, 
  www_pdf_url = {https://www.cs.ucf.edu/~mohaisen/doc/sigcomm16.pdf}, 
  keywords = {I2P, DNS, privacy, security, network analysis}, 
  abstract = {{The Invisible Internet Project (I2P) is an overlay network that provides
        secure and anonymous communication chan-he nels. EepSites are the anonymous
        websites hosted in the I2P network. To access the eepSites, DNS requests of a
        domainnd name suffixed with the .i2p pseudo top-level domain (TLD)their are
        routed within the I2P network. However, not only thatption of the .i2p queries
        are leaking in the public DNS infrastructure,both but also such leakage has
        various plausible root causes andance implications that are different from other
        related leakage. Ine this paper, we analyze the leaked .i2p requests captured iny
        the A and J root name servers of the public DNS, showingas its that a large
        number of queries are observed and outlining various potential directions of
        addressing such leakage.}}, 
}

haughey2016
@article{haughey2016,
  title = {Anonymity networks and the fragile cyber ecosystem}, 
  author = {Haughey, Hamish and Epiphaniou, Gregory and Al-Khateeb, Haider M.}, 
  journal = {Network Security}, 
  volume = {2016}, 
  number = {3}, 
  year = {2016}, 
  month = {March}, 
  pages = {10--18}, 
  www_section = {Traffic analysis}, 
}

ali2016
@inproceedings{ali2016,
  title = {TOR vs I2P: A Comparative Study}, 
  author = {Ali, Afzaal and Khan, Maria and Saddique, Muhammad and Pirzada, Umar and
        Zohaib, Muhammad and Ahmad, Imran and Debnath, Narayan}, 
  booktitle = {Proceedings of the 2016 IEEE International Conference on Industrial
        Technology (ICIT)}, 
  year = {2016}, 
  month = {March}, 
  www_section = {Traffic analysis}, 
}

astolfi2015
@techreport{astolfi2015,
  title = {I2P - The Invisible Internet Project}, 
  author = {Astolfi, Felipe and Kroese, Jelger and {Van Oorschot}, Jeroen}, 
  institution = {Media Technology, Leiden University}, 
  year = {2015}, 
  type = {Web Technology Report}, 
  www_section = {Anonymous communication}, 
  www_pdf_url = {https://staas.home.xs4all.nl/t/swtr/documents/wt2015_i2p.pdf}, 
}

vashi2015
@article{vashi2015,
  title = {Performance Improvement in I2P using SSL}, 
  author = {Vashi, Dipal and Khilari, Girish}, 
  journal = {International Journal of Science, Engineering and Technology Research}, 
  volume = {4}, 
  number = {5}, 
  year = {2015}, 
  month = {May}, 
  pages = {1454--1456}, 
  www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1454-1456.pdf},
  www_section = {Traffic analysis}, 
}

vhora2015
@article{vhora2015,
  title = {Defending Eclipse Attack in I2P using Structured Overlay Network}, 
  author = {Vhora, Hasib and Khilari, Girish}, 
  journal = {International Journal of Science, Engineering and Technology Research}, 
  volume = {4}, 
  number = {5}, 
  year = {2015}, 
  month = {May}, 
  pages = {1515--1518}, 
  www_pdf_url = {http://ijsetr.org/wp-content/uploads/2015/05/IJSETR-VOL-4-ISSUE-5-1515-1518.pdf},
  www_section = {Traffic analysis}, 
}

timpanaro:hal-01238453
@inproceedings{timpanaro:hal-01238453,
  title = {{Evaluation of the Anonymous I2P Network's Design Choices Against Performance
        and Security}}, 
  author = {Timpanaro, Juan Pablo and Cholez, Thibault and Chrisment, Isabelle and Festor,
        Olivier}, 
  booktitle = {{Proceedings of the 1st International Conference on Information Systems
        Security and Privacy (ICISSP 2015)}}, 
  organization = {{SciTePress}}, 
  year = {2015}, 
  month = {February}, 
  address = {Angers, France}, 
  pages = {46--55}, 
  hal_id = {hal-01238453}, 
  doi = {10.5220/0005226600460055}, 
  url = {https://hal.inria.fr/hal-01238453}, 
  www_section = {Traffic analysis}, 
  www_pdf_url = {https://hal.inria.fr/hal-01238453/file/I2P-design-vs-performance-security.pdf},
  keywords = {I2P ; security ; DHT}, 
  hal_version = {v1}, 
}

tchabe2014
@misc{tchabe2014,
  title = {Anonymous Communications: A survey on I2P}, 
  author = {Tchabe, Gildas Nya and Xu, Yinhua}, 
  year = {2014}, 
  howpublished = {CDC Publication}, 
  www_section = {Traffic analysis}, 
  www_pdf_url = {https://www.cdc.informatik.tu-darmstadt.de/fileadmin/user_upload/Group_CDC/Documents/Lehre/SS13/Seminar/CPS/cps2014_submission_4.pdf},
}

vashi2014
@article{vashi2014,
  title = {A Survey on I2P Crypto Mechanism}, 
  author = {Vashi, Dipal and Khilari, Girish}, 
  journal = {International Journal of Engineering Development and Research}, 
  volume = {3}, 
  number = {1}, 
  year = {2014}, 
  pages = {99--102}, 
  www_pdf_url = {https://www.ijedr.org/papers/IJEDR1501021.pdf}, 
  www_section = {Traffic analysis}, 
}

karthigeyan2014
@article{karthigeyan2014,
  title = {A Comprehensive Behavior Analysis of TOR versus I2P}, 
  author = {Karthigeyan, A. and {Robinson Joel}, M. and Manikandan, S. P. and {Raja Guru},
        P. and Raman, Sri}, 
  journal = {International Journal of Applied Engineering Research}, 
  volume = {9}, 
  number = {20}, 
  year = {2014}, 
  pages = {7333--7345}, 
  www_section = {Traffic analysis}, 
}

liu2014
@article{liu2014,
  title = {Empirical Measurement and Analysis of I2P Routers}, 
  author = {Peipeng Liu et al}, 
  journal = {Journal of Networks}, 
  volume = {9}, 
  number = {9}, 
  year = {2014}, 
  month = {September}, 
  pages = {2269--2278}, 
  www_pdf_url = {https://pdfs.semanticscholar.org/3e5f/2b136df32beef1281b6b2f206093806c57f6.pdf},
  www_section = {Traffic analysis}, 
}

conrad2014
@inproceedings{conrad2014,
  title = {A Survey on Tor and I2P}, 
  author = {Bernd Conrad and Fatemeh Shirazi}, 
  booktitle = {Proceedings of the 9th International Conference on Internet Monitoring and
        Protection (ICIMP 2014)}, 
  year = {2014}, 
  www_section = {Anonymous communication}, 
  www_pdf_url = {/_static/pdf/icimp_2014_1_40_30015.pdf}, 
  keywords = {Tor; I2P; low latency anonymous communication networks}, 
  abstract = {{This paper gives a short introduction and a comparison on two low-latency
        anonymous communication networks. The main part features a review of the low
        latency anonymous communication networks, namely, The Onion Routing (Tor) and the
        Invisible Internet Project (I2P). An introduction to their overall structure is
        given, followed by a detailed description of the core parts of both networks.
        Furthermore, a comparison of both will feature important aspects like node
        selection, performance and scalability. The detailed description and comparison
        of the two systems show that determining which system to use highly depends on
        the field of application, since each system has its strength and weaknesses in
        specific areas.}}, 
}

timpanaro2014
@inproceedings{timpanaro2014,
  title = {Group-Based Characterization for the I2P Anonymous File-Sharing Environment}, 
  author = {Timpanaro, J.P. and Chrisment, I and Festor, O.}, 
  booktitle = {Proceedings of the 6th International Conference on New Technologies,
        Mobility and Security (NTMS)}, 
  year = {2014}, 
  month = {March}, 
  pages = {1--5}, 
  doi = {10.1109/NTMS.2014.6814020}, 
  www_section = {Traffic analysis}, 
  abstract = {{The I2P network provides an abstraction layer allowing two parties to
        communicate in an anonymous manner. This network is optimised for anonymous web
        hosting and anonymous file-sharing. I2P's file- sharing community is highly
        active where users deploy their file-sharing applications on top of the network.
        I2P uses a variation of Onion routing, thus assuring the unlinkability between a
        user and its file-sharing application. In this paper, we take the first step
        towards the linkability of users and applications in the I2P network. We conduct
        a group-based characterisation, where we determine to what extent a group of
        users is responsible for the overall I2P's file-sharing activity. We used
        Pearson's coefficient to correlate users from two cities and the most used
        anonymous file-sharing application. We determine that two cities explain more
        than a third of all file-sharing activity within the I2P network.}}, 
  www_pdf_url = {https://hal.inria.fr/hal-00986228/file/NTMS_Paper.pdf}, 
  keywords = {Internet;data privacy;groupware;peer-to-peer computing;I2P anonymous
        file-sharing environment;I2P network;Invisible Internet Project;Onion
        routing;Pearsons coefficient;abstraction layer;anonymous Web hosting;anonymous
        file-sharing application;file-sharing activity;group-based
        characterisation;user-application linkability;Cities and
        towns;Correlation;Distributed databases;IP networks;Internet;Monitoring;Privacy}, 
}

egger2013:practical-attacks
@inproceedings{egger2013:practical-attacks,
  title = {Practical Attacks Against the I2P Network}, 
  author = {Christoph Egger and Johannes Schlumberger and Christopher Kruegel and Giovanni
        Vigna}, 
  booktitle = {Proceedings of the 16th International Symposium on Research in Attacks,
        Intrusions and Defenses (RAID 2013)}, 
  year = {2013}, 
  month = {October}, 
  www_pdf_url = {http://wwwcip.informatik.uni-erlangen.de/~spjsschl/i2p.pdf}, 
  www_tags = {selected}, 
  www_section = {Traffic analysis}, 
}

wang2013
@article{wang2013,
  title = {Towards Measurement on the I2P Network}, 
  author = {Xue Bin Wang and Pei Peng Liu and Cheng Long Li and Qing Feng Tan}, 
  journal = {Applied Mechanics and Materials}, 
  volume = {427--429}, 
  year = {2013}, 
  month = {September}, 
  pages = {2223--2228}, 
  www_section = {Traffic analysis}, 
}

timpanaro:hal-00744922
@inproceedings{timpanaro:hal-00744922,
  title = {{Improving Content Availability in the I2P Anonymous File-Sharing Environment}}, 
  author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier}, 
  booktitle = {{Proceedings of the 4th International Symposium on Cyberspace Safety and
        Security}}, 
  volume = {4}, 
  year = {2012}, 
  month = {December}, 
  address = {Melbourne, Australia}, 
  pages = {77--92}, 
  publisher = {Springer}, 
  hal_id = {hal-00744922}, 
  doi = {10.1007/978-3-642-35362-8}, 
  language = {English}, 
  url = {http://hal.inria.fr/hal-00744922}, 
  abstract = {{Anonymous communication has gained more and more interest from Internet
        users as privacy and anonymity problems have emerged. Dedicated anonymous
        networks such as Freenet and I2P allow anonymous file-sharing among users.
        However, one major problem with anonymous file-sharing networks is that the
        available content is highly reduced, mostly with outdated files, and
        non-anonymous networks, such as the BitTorrent network, are still the major
        source of content: we show that in a 30-days period, 21648 new torrents were
        introduced in the BitTorrent community, whilst only 236 were introduced in the
        anonymous I2P network, for four different categories of content. Therefore, how
        can a user of these anonymous networks access this varied and non-anonymous
        content without compromising its anonymity? In this paper, we improve content
        availability in an anonymous environment by proposing the first internetwork
        model allowing anonymous users to access and share content in large public
        communities while remaining anonymous. We show that our approach can efficiently
        interconnect I2P users and public BitTorrent swarms without affecting their
        anonymity nor their performance. Our model is fully implemented and freely
        usable.}}, 
  www_section = {Anonymous communication}, 
  affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA}, 
  audience = {international}, 
  www_pdf_url = {http://hal.inria.fr/hal-00744922/PDF/Improving\_Content\_Availability\_in\_the\_I2P\_0AAnonymous\_File-Sharing\_Environment\_0A.pdf},
}

timpanaro:hal-00744919
@inproceedings{timpanaro:hal-00744919,
  title = {{A Bird's Eye View on the I2P Anonymous File-sharing Environment}}, 
  author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier}, 
  booktitle = {{Proceedings of the 6th International Conference on Network and System
        Security}}, 
  year = {2012}, 
  month = {November}, 
  address = {Wu Yi Shan, China}, 
  hal_id = {hal-00744919}, 
  language = {English}, 
  url = {http://hal.inria.fr/hal-00744919}, 
  abstract = {{Anonymous communications have been gaining more and more interest from
        Internet users as privacy and anonymity problems have emerged. Among anonymous
        enabled services, anonymous file-sharing is one of the most active one and is
        increasingly growing. Large scale monitoring on these systems allows us to grasp
        how they behave, which type of data is shared among users, the overall behaviour
        in the system. But does large scale monitoring jeopardize the system anonymity?
        In this work we present the first large scale monitoring architecture and
        experiments on the I2P network, a low-latency message-oriented anonymous network.
        We characterize the file-sharing environment within I2P, and evaluate if this
        monitoring affects the anonymity provided by the network. We show that most
        activities within the network are file-sharing oriented, along with anonymous
        web-hosting. We assess the wide geographical location of nodes and network
        popularity. We also demonstrate that group-based profiling is feasible on this
        particular network.}}, 
  www_section = {Traffic analysis}, 
  affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA}, 
  audience = {international}, 
  www_pdf_url = {http://hal.inria.fr/hal-00744919/PDF/A\_Birda\_s\_Eye\_View\_on\_the\_I2P\_Anonymous\_0AFile-sharing\_Environment\_0A.pdf},
  keywords = {Large scale monitoring, I2P, Security risks, Anonymous file-sharing}, 
}

ruiz2012
@article{ruiz2012,
  title = {A survey on solutions and main free tools for privacy enhancing Web
        communications}, 
  author = {A Ruiz-Mart{\'i}nez}, 
  journal = {Journal of Network and Computer Applications}, 
  volume = {35}, 
  number = {5}, 
  year = {2012}, 
  month = {September}, 
  pages = {1473--1492}, 
  www_pdf_url = {http://www.freehaven.net/anonbib/cache/Ruiz-Martinez_2012.pdf}, 
  www_section = {Anonymous communication}, 
}

timpanaro:hal-00744902
@inproceedings{timpanaro:hal-00744902,
  title = {{I2P's Usage Characterization}}, 
  author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier}, 
  booktitle = {{Proceedings of the 4th International Workshop on Traffic Monitoring and
        Analysis (TMA 2012)}}, 
  year = {2012}, 
  month = {March}, 
  address = {Vienne, Austria}, 
  hal_id = {hal-00744902}, 
  language = {English}, 
  url = {http://hal.inria.fr/hal-00744902}, 
  abstract = {{We present the first monitoring study aiming to characterize the usage of
        the I2P network, a low-latency anonymous network based on garlic routing. We
        design a distributed monitoring architecture for the I2P network and show through
        three one-week measurement experiments the ability of the system to identify a
        significant number of all running applications, among web servers and
        file-sharing clients. Additionally, we identify 37\% of published I2P
        applications, which turn out to be unreachable after their publication on the I2P
        distributed database.}}, 
  www_section = {Traffic analysis}, 
  affiliation = {MADYNES - INRIA Nancy - Grand Est / LORIA}, 
  audience = {international}, 
  www_pdf_url = {http://hal.inria.fr/hal-00744902/PDF/TMA2012-LNCS.pdf}, 
}

ehlert2011:usability-comparison-i2p-tor
@misc{ehlert2011:usability-comparison-i2p-tor,
  title = {I2P Usability vs. Tor Usability A Bandwidth and Latency Comparison}, 
  author = {Mathias Ehlert}, 
  year = {2011}, 
  month = {November}, 
  howpublished = {Seminar, Humboldt University of Berlin}, 
  www_section = {Anonymous communication}, 
  www_pdf_url = {https://www.freehaven.net/anonbib/cache/ehlert2011:usability-comparison-i2p-tor.pdf},
}

timpanaro:inria-00632259
@misc{timpanaro:inria-00632259,
  title = {{Monitoring the I2P network}}, 
  author = {Timpanaro, Juan Pablo and Chrisment, Isabelle and Festor, Olivier}, 
  year = {2011}, 
  month = {October}, 
  howpublished = {Preprint}, 
  hal_id = {inria-00632259}, 
  language = {English}, 
  url = {http://hal.inria.fr/inria-00632259}, 
  abstract = {{We present the first monitoring study aiming to characterize the usage of
        the I2P network, a low-latency anonymous network based on garlic routing. We
        design a distributed monitoring architecture for the I2P network and we show
        through a one week long experiment that we are able to identify 32\% of all
        running applications, among web servers and file- sharing clients. Additionally,
        we identify 37\% of published I2P applications, which turn out to be unreachable
        after its publication on the I2P distributed database.}}, 
  affiliation = {MADYNES - INRIA Lorraine - LORIA}, 
  www_pdf_url = {http://hal.inria.fr/inria-00632259/PDF/TMA2012-LNCS.pdf}, 
  www_section = {Traffic analysis}, 
}

pets2011-i2p
@inproceedings{pets2011-i2p,
  title = {Privacy Implications of Performance-Based Peer Selection by Onion Routers: A
        Real-World Case Study using I2P}, 
  author = {Michael Herrmann and Christian Grothoff}, 
  booktitle = {Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS
        2011)}, 
  year = {2011}, 
  month = {July}, 
  location = {Waterloo, Canada}, 
  www_tags = {selected}, 
  www_pdf_url = {http://freehaven.net/anonbib/papers/pets2011/p9-herrmann.pdf}, 
  www_section = {Traffic analysis}, 
}

hermann2011-mthesis
@mastersthesis{hermann2011-mthesis,
  title = {Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A
        Real-World Case Study using I2P}, 
  author = {Michael Hermann}, 
  school = {TU-Munich}, 
  year = {2011}, 
  month = {March}, 
  www_section = {Traffic analysis}, 
  www_pdf_url = {https://gnunet.org/sites/default/files/herrmann2011mt.pdf}, 
}

zantout2011
@inproceedings{zantout2011,
  title = {I2P Data Communication System}, 
  author = {Bassam Zantout and Ramzi Haraty}, 
  booktitle = {Proceedings of ICN 2011, The Tenth International Conference on Networks}, 
  year = {2011}, 
  month = {January}, 
  location = {St. Maarten, The Netherlands Antilles}, 
  www_section = {Traffic analysis}, 
}

BlackHat2011-crenshaw
@inproceedings{BlackHat2011-crenshaw,
  title = {Darknets and hidden servers: Identifying the true IP/network identity of I2P
        service hosts}, 
  author = {Adrian Crenshaw}, 
  booktitle = {Proceedings of Black Hat 2011}, 
  year = {2011}, 
  month = {January}, 
  location = {Washington, DC}, 
  url = {http://www.irongeek.com/i.php?page=security/darknets-i2p-identifying-hidden-servers},
  www_pdf_url = {http://www.irongeek.com/downloads/Identifying%20the%20true%20IP%20of%20I2P%20service%20hosts.pdf},
  www_section = {Traffic analysis}, 
}

delmer-mthesis
@mastersthesis{delmer-mthesis,
  title = {L'{\'e}mergence au sein d'internet de communaut{\'e}s virtuelles et anonymes,
        Freenet et i2p}, 
  author = {Laurie Delmer}, 
  school = {Universit{\'e} catholique de Louvain - D{\'e}partement des sciences politiques
        et sociales}, 
  year = {2009}, 
  note = {Title : The rise in internet virtual and anonymous communities, Freenet and I2P.
        School: Catholic University of Leuven - Department of Political and Social
        Science}, 
  www_section = {Anonymous communication}, 
}

abou-tair2009
@inproceedings{abou-tair2009,
  title = {Usability Inspection of Anonymity Networks}, 
  author = {Abou-Tair, D.e.I. and Pimenidis, L. and Schomburg, J. and Westermann, B.}, 
  booktitle = {Proceedings of the World Congress on Privacy, Security, Trust and the
        Management of e-Business (CONGRESS '09)}, 
  year = {2009}, 
  month = {August}, 
  pages = {100--109}, 
  doi = {10.1109/CONGRESS.2009.38}, 
  www_section = {Anonymous communication}, 
  abstract = {{Today, to be monitored while surfing the web seems to be a natural act and
        thus tools and applications to achieve online anonymity are more important than
        ever. The usability of such a tool plays not only a prominent role for each
        single user; in the area of anonymization networks it usually holds that the
        protection for every single user is higher, the more users participate. Hence,
        usability is of great importance, since bad usability decreases the number of
        potential users. In this paper we examine the usability of four software
        implementations for anonymous communication techniques especially with regards to
        the installation procedure. The usability is evaluated with the help of cognitive
        walk-throughs. We also inspect the quality of service of these implementations by
        means of a performance test.}}, 
  www_pdf_url = {https://www.researchgate.net/publication/224084986_Usability_Inspection_of_Anonymity_Networks},
  keywords = {Internet;security of data;anonymity networks;anonymization networks;anonymous
        communication techniques;cognitive walk-throughs;installation;quality of
        service;software implementations;usability inspection;Communication system
        security;Inspection;Monitoring;Operating systems;Privacy;Quality
        management;Quality of service;System testing;Technology
        management;Usability;AN.ON;Anonymity;HCI;JAP;JonDo;JondoNym;Tor;Usability}, 
}

petcon2009-schomburg
@inproceedings{petcon2009-schomburg,
  title = {Anonymity Techniques - Usability Tests of Major Anonymity Networks}, 
  author = {Jens Schomburg}, 
  booktitle = {Proceedings of PET-CON 2009.1}, 
  year = {2009}, 
  month = {March}, 
  location = {Dresden, Germany}, 
  pages = {49--58}, 
  www_section = {Anonymous communication}, 
  www_pdf_url = {https://people.torproject.org/~karsten/petcon-proceedings-2009.1.pdf}, 
}

petcon2009-zzz
@inproceedings{petcon2009-zzz,
  title = {Peer Profiling and Selection in the I2P Anonymous Network}, 
  author = {zzz (Pseudonym) and Lars Schimmer}, 
  booktitle = {Proceedings of PET-CON 2009.1}, 
  year = {2009}, 
  month = {March}, 
  location = {Dresden, Germany}, 
  pages = {59--70}, 
  www_section = {Anonymous communication}, 
  www_pdf_url = {/_static/pdf/I2P-PET-CON-2009.1.pdf}, 
}

jrandom2003
@misc{jrandom2003,
  title = {Invisible Internet Project (I2P) Project Overview}, 
  author = {jrandom (Pseudonym)}, 
  year = {2003}, 
  month = {August}, 
  howpublished = {Design document}, 
  www_tags = {tech-report}, 
  www_section = {Anonymous communication}, 
  www_pdf_url = {/_static/pdf/i2p_philosophy.pdf}, 
}