Publications by date
2009
L'émergence au sein d'internet de communautés virtuelles et anonymes, Freenet et i2p
by Laurie Delmer.
Masters's thesis, Université catholique de Louvain - Département des sciences politiques et sociales, 2009. (BibTeX entry)·Anonymity Techniques - Usability Tests of Major Anonymity Networks (PDF)
by Jens Schomburg.
In the Proceedings of PET-CON 2009.1, Dresden, Germany, March 2009, pages 49-58. (BibTeX entry)·Peer Profiling and Selection in the I2P Anonymous Network (PDF)
by zzz (Pseudonym) and Lars Schimmer.
In the Proceedings of PET-CON 2009.1, Dresden, Germany, March 2009, pages 59-70. (BibTeX entry)·Usability Inspection of Anonymity Networks (PDF)
by D.e.I. Abou-Tair, L. Pimenidis, J. Schomburg, and B. Westermann.
In the Proceedings of the World Congress on Privacy, Security, Trust and the Management of e-Business (CONGRESS '09), August 2009, pages 100-109. (BibTeX entry)·
2011
I2P Data Communication System
by Bassam Zantout and Ramzi Haraty.
In the Proceedings of ICN 2011, The Tenth International Conference on Networks, St. Maarten, The Netherlands Antilles, January 2011. (BibTeX entry)·Darknets and hidden servers: Identifying the true IP/network identity of I2P service hosts (PDF)
by Adrian Crenshaw.
In the Proceedings of Black Hat 2011, Washington, DC, January 2011. (BibTeX entry)·Privacy-Implications of Performance-Based Peer Selection by Onion-Routers: A Real-World Case Study using I2P (PDF)
by Michael Hermann.
Masters's thesis, TU-Munich, March 2011. (BibTeX entry)·Privacy Implications of Performance-Based Peer Selection by Onion Routers: A Real-World Case Study using I2P (PDF)
by Michael Herrmann and Christian Grothoff.
In the Proceedings of the 11th Privacy Enhancing Technologies Symposium (PETS 2011), Waterloo, Canada, July 2011. (BibTeX entry)·Monitoring the I2P network (PDF)
by Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor.
Preprint, October 2011. (BibTeX entry)·I2P Usability vs. Tor Usability A Bandwidth and Latency Comparison (PDF)
by Mathias Ehlert.
Seminar, Humboldt University of Berlin, November 2011. (BibTeX entry)·
2012
I2P's Usage Characterization (PDF)
by Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor.
In the Proceedings of the 4th International Workshop on Traffic Monitoring and Analysis (TMA 2012), Vienne, Austria, March 2012. (BibTeX entry)·A survey on solutions and main free tools for privacy enhancing Web communications (PDF)
by A Ruiz-Martínez.
In Journal of Network and Computer Applications 35(5), September 2012, pages 1473-1492. (BibTeX entry)·A Bird's Eye View on the I2P Anonymous File-sharing Environment (PDF)
by Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor.
In the Proceedings of the 6th International Conference on Network and System Security, Wu Yi Shan, China, November 2012. (BibTeX entry)·Improving Content Availability in the I2P Anonymous File-Sharing Environment (PDF)
by Juan Pablo Timpanaro, Isabelle Chrisment, and Olivier Festor.
In the Proceedings of the 4th International Symposium on Cyberspace Safety and Security, Melbourne, Australia, December 2012, pages 77-92. (BibTeX entry)·
2013
Towards Measurement on the I2P Network
by Xue Bin Wang, Pei Peng Liu, Cheng Long Li, and Qing Feng Tan.
In Applied Mechanics and Materials 427-429, September 2013, pages 2223-2228. (BibTeX entry)·Practical Attacks Against the I2P Network (PDF)
by Christoph Egger, Johannes Schlumberger, Christopher Kruegel, and Giovanni Vigna.
In the Proceedings of the 16th International Symposium on Research in Attacks, Intrusions and Defenses (RAID 2013), October 2013. (BibTeX entry)·
2014
Anonymous Communications: A survey on I2P (PDF)
by Gildas Nya Tchabe and Yinhua Xu.
CDC Publication, 2014. (BibTeX entry)·A Survey on I2P Crypto Mechanism (PDF)
by Dipal Vashi and Girish Khilari.
In International Journal of Engineering Development and Research 3(1), 2014, pages 99-102. (BibTeX entry)·A Comprehensive Behavior Analysis of TOR versus I2P
by A. Karthigeyan, M. Robinson Joel, S. P. Manikandan, P. Raja Guru, and Sri Raman.
In International Journal of Applied Engineering Research 9(20), 2014, pages 7333-7345. (BibTeX entry)·A Survey on Tor and I2P (PDF)
by Bernd Conrad and Fatemeh Shirazi.
In the Proceedings of the 9th International Conference on Internet Monitoring and Protection (ICIMP 2014), 2014. (BibTeX entry)·Group-Based Characterization for the I2P Anonymous File-Sharing Environment (PDF)
by J.P. Timpanaro, I Chrisment, and O. Festor.
In the Proceedings of the 6th International Conference on New Technologies, Mobility and Security (NTMS), March 2014, pages 1-5. (BibTeX entry)·Empirical Measurement and Analysis of I2P Routers (PDF)
by Peipeng Liu et al.
In Journal of Networks 9(9), September 2014, pages 2269-2278. (BibTeX entry)·
2015
A Transparent Implementation Of The Signature In Scheme EdDSA (PDF)
by V. I. Losev.
In the Proceedings of Heuristic Algorithms and Distributed Computing, 2015, pages 49-56. (BibTeX entry)·I2P - The Invisible Internet Project (PDF)
by Felipe Astolfi, Jelger Kroese, and Jeroen Van Oorschot.
Media Technology, Leiden University Web Technology Report , 2015. (BibTeX entry)·Evaluation of the Anonymous I2P Network's Design Choices Against Performance and Security (PDF)
by Juan Pablo Timpanaro, Thibault Cholez, Isabelle Chrisment, and Olivier Festor.
In the Proceedings of the 1st International Conference on Information Systems Security and Privacy (ICISSP 2015), Angers, France, February 2015, pages 46-55. (BibTeX entry)·Performance Improvement in I2P using SSL (PDF)
by Dipal Vashi and Girish Khilari.
In International Journal of Science, Engineering and Technology Research 4(5), May 2015, pages 1454-1456. (BibTeX entry)·Defending Eclipse Attack in I2P using Structured Overlay Network (PDF)
by Hasib Vhora and Girish Khilari.
In International Journal of Science, Engineering and Technology Research 4(5), May 2015, pages 1515-1518. (BibTeX entry)·
2016
Anonymity networks and the fragile cyber ecosystem
by Hamish Haughey, Gregory Epiphaniou, and Haider M. Al-Khateeb.
In Network Security 2016(3), March 2016, pages 10-18. (BibTeX entry)·TOR vs I2P: A Comparative Study
by Afzaal Ali, Maria Khan, Muhammad Saddique, Umar Pirzada, Muhammad Zohaib, Imran Ahmad, and Narayan Debnath.
In the Proceedings of the 2016 IEEE International Conference on Industrial Technology (ICIT), March 2016. (BibTeX entry)·Analysis of the I2P Network - Information Gathering and Attack Evaluations (PDF)
by Jens Müller.
Bachelors Thesis, Bern University of Applied Sciences, June 2016. (BibTeX entry)·A Longitudinal Analysis of .i2p Leakage in the Public DNS Infrastructure (PDF)
by Seong Hoon Jeong et al.
In the Proceedings of the 2016 conference on ACM SIGCOMM 2016 Conference, August 2016, pages 557-558. (BibTeX entry)·Forensic analysis of I2P activities
by Maxim Wilson and Behnam Bazli.
In the Proceedings of the 2016 22nd International Conference on Automation and Computing (ICAC), September 2016. (BibTeX entry)·
2017
Weighted Factors for Measuring Anonymity Services: A Case Study on Tor, JonDonym, and I2P (PDF)
by Khalid Shahbar and A. Nur Zincir-Heywood.
Dalhousie University technical report , January 2017. (BibTeX entry)·Anon17: Network Traffic Dataset of Anonymity Services (PDF)
by Khalid Shahbar and A. Nur Zincir-Heywood.
Dalhousie University technical report , March 2017. (BibTeX entry)·Effects of Shared Bandwidth on Anonymity of the I2P Network Users (PDF)
by Khalid Shahbar and A. Nur Zincir-Heywood.
In the Proceedings of the 38th IEEE Symposium on Security and Privacy Workshops, 2nd International Workshop on Traffic Measurements for Cybersecurity (WTMC 2017), May 2017. (BibTeX entry)·The Dark side of I2P, a forensic analysis case study
by Wilson Bazli and Hurst.
In System Science & Control Engeneering 2017(5), June 2017, pages 278-286. (BibTeX entry)·Analysis of Multilayer-Encryption Anonymity Networks (PDF)
by Khalid Shahbar.
Ph.D. thesis, October 2017. (BibTeX entry)·
2018
Weaving the dark web: Legitimacy on Freenet, Tor, and I2P (HTML)
by Robert W. Gehl.
The MIT Press, 2018. (BibTeX entry)·Risk Assessment for I2P With an Enhanced Outproxy Design (PDF)
by Dolf Smits.
Masters's thesis, Leiden University, January 2018. (BibTeX entry)·Blockchain-based Sybil Attack Mitigation: A Case Study of the I2P Network (PDF)
by Kotaiba Alachkar and Dirk Gaastra.
Masters's thesis, University of Amsterdam, June 2018. (BibTeX entry)·An Empirical Study of the I2P Anonymity Network and its Censorship Resistance (PDF)
by Phong Hoang Nguyen, Panagiotis Kintis, Manos Antonakakis, and Michalis Polychronakis.
In the Proceedings of 2018 Internet Measurement Conference (IMC '18), October 2018. (BibTeX entry)·Deciding Your Own Anonymity: User-Oriented Node Selection in I2P (PDF)
by L. Ye, X. Yu, J. Zhao, D. Zhan, X. Du, and M. Guizani.
In IEEE Access 6, November 2018, pages 71350-71359. (BibTeX entry)·
2019
Invisible Internet Project(Report) (PDF)
by Tim de Boer and Vincent Breider.
Masters's thesis, University of Amsterdam, February 2019. (BibTeX entry)·Invisible Internet Project(Presentation) (PDF)
by Tim de Boer and Vincent Breider.
Masters's thesis, University of Amsterdam, February 2019. (BibTeX entry)·Measuring I2P Censorship at a Global Scale (PDF)
by Nguyen Phong Hoang, Sadie Doreen, and Michalis Polychronakis.
In the 9th USENIX Workshop on Free and Open Communications on the Internet (FOCI 19), Santa Clara, CA, August 2019. (BibTeX entry)·
2020
Analysis and Identification of I2P Anonymous Communication Traffic Characteristics (PDF)
by QU Yun-xuan, WANG Yi-jun, and XUE Zhi.
In Communications Technology 53(1), January 2020, pages 161-167. (BibTeX entry)·Interconnection between darknets (PDF)
by L. Ye, X. Yu, J. Zhao, D. Zhan, X. Du, and M. Guizani.
In EEE INTERNET COMPUTING 1, December 2020. (BibTeX entry)·
2021
Research and implementation of bridge technology in I2P anonymous system
by Yu Chih-Wei.
Ph.D. thesis, Beijing University of Posts and Telecommunications, 2021. (BibTeX entry)·
2024
Modeling the Invisible Internet
by Jacques Bou Abdo and Liaquat Hossain.
In the Complex Networks and their Applications XII, February 2024. (BibTeX entry)·
Please send new or corrected entries to
press@i2p2.de.
If you can, please format them as BibTeX; see our
BibTeX source page for examples.
Remember to include URLs if possible:
offline papers are less useful.
The source code for this page was adapted from Free Haven's anonymity bibliography.