-
3
-
-
2442603590
-
Security for peer-to-peer routing overlays
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach. Security for peer-to-peer routing overlays. In Fifth Symposium on Operating Systems Design and Implementation (OSDI '02) (Boston, Massachusetts), 2002.
-
(2002)
Fifth Symposium on Operating Systems Design and Implementation (OSDI '02) (Boston, Massachusetts)
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
4
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
I. Clarke, O. Sandberg, B. Wiley, and T. Hong. Freenet: A distributed anonymous information storage and retrieval system. In Workshop on Design Issues in Anonymity and Unobservability, pages 46-66, 2000.
-
(2000)
Workshop on Design Issues in Anonymity and Unobservability
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.4
-
5
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-to-peer networks
-
Washington, DC, USA, November
-
E. Damiani, S. De Capitani di Vimercati, S. Paraboschi, P. Samarati, and F. Violante. A reputation-based approach for choosing reliable resources in peer-to-peer networks. In Proc. of the 9th ACM Conference on Computer and Communications Security, Washington, DC, USA, November 2002.
-
(2002)
Proc. of the 9th ACM Conference on Computer and Communications Security
-
-
Damiani, E.1
De Capitani Di Vimercati, S.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
9
-
-
4544304744
-
The sybil attack
-
J. Douceur. The sybil attack. IPTPS, 2002.
-
(2002)
IPTPS
-
-
Douceur, J.1
-
12
-
-
0011352799
-
Sos: Secure overlay services
-
Pittsburgh, PA, August
-
A. Keromytis, V. Misra, and D. Rubenstein. Sos: Secure overlay services. In Proceedings of ACM SIGCOMM'02, Pittsburgh, PA, August 2002.
-
(2002)
Proceedings of ACM SIGCOMM'02
-
-
Keromytis, A.1
Misra, V.2
Rubenstein, D.3
-
13
-
-
0036374187
-
Search and replication in unstructured peer-to-peer networks
-
ACM Press
-
C. Lv, P. Cao, E. Cohen, K. Li, and S. Shenker. Search and replication in unstructured peer-to-peer networks. In Proceedings of the 16th International Conference on Supercomputing, pages 84-95. ACM Press, 2002.
-
(2002)
Proceedings of the 16th International Conference on Supercomputing
, pp. 84-95
-
-
Lv, C.1
Cao, P.2
Cohen, E.3
Li, K.4
Shenker, S.5
-
15
-
-
0001983901
-
A scalable content-addressable network
-
San Diego, CA, August
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker. A scalable content-addressable network. In Proceedings of ACM SIGCOMM, San Diego, CA, August 2001.
-
(2001)
Proceedings of ACM SIGCOMM
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
17
-
-
7444246627
-
Security considerations for peer-to-peer distributed hash tables
-
Cambridge, MA, USA, March
-
E. Sit and R. Morris. Security considerations for peer-to-peer distributed hash tables. In IPTPS, Cambridge, MA, USA, March 2002.
-
(2002)
IPTPS
-
-
Sit, E.1
Morris, R.2
-
18
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Diego, CA, August
-
I. Stoica, R. Morris, D. Karger, M. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In ACM SIGCOMM, pages 149-160, San Diego, CA, August 2001.
-
(2001)
ACM SIGCOMM
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.4
Balakrishnan, H.5
|