메뉴 건너뛰기




Volumn 9, Issue 6, 2005, Pages 50-57

A novel methodology for constructing secure multipath overlays

Author keywords

[No Author keywords available]

Indexed keywords

ALGORITHMS; COMPUTER NETWORKS; COMPUTER SIMULATION; DATA COMMUNICATION SYSTEMS; EQUIVALENCE CLASSES; NETWORK PROTOCOLS; ROUTERS; STATISTICAL METHODS;

EID: 30144446253     PISSN: 10897801     EISSN: None     Source Type: Journal    
DOI: 10.1109/MIC.2005.117     Document Type: Article
Times cited : (29)

References (6)
  • 2
    • 21644471550 scopus 로고    scopus 로고
    • "Vulnerabilities and Security Threats in Structured Peer-to-Peer Systems: A Quantitative Analysis"
    • IEEE CS Press
    • M. Srivatsa and L. Liu, "Vulnerabilities and Security Threats in Structured Peer-to-Peer Systems: A Quantitative Analysis," Proc. Ann. Computer Security Applications Conf. (ACSAC), IEEE CS Press, 2004, pp. 252-261.
    • (2004) Proc. Ann. Computer Security Applications Conf. (ACSAC) , pp. 252-261
    • Srivatsa, M.1    Liu, L.2
  • 3
    • 0034782005 scopus 로고    scopus 로고
    • "Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications"
    • ACM Press
    • I. Stoica et al., "Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications," Proc. ACM SIGComm, ACM Press, 2001, pp. 149-160.
    • (2001) Proc. ACM SIGComm , pp. 149-160
    • Stoica, I.1
  • 5
    • 57349142855 scopus 로고    scopus 로고
    • "Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems"
    • LNCS 2218, Springer-Verlag
    • A. Rowstron and P. Druschel. "Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems," Proc. IFIP/ACM Middleware Conf., LNCS 2218, Springer-Verlag, 2001, pp. 329-350.
    • (2001) Proc. IFIP/ACM Middleware Conf. , pp. 329-350
    • Rowstron, A.1    Druschel, P.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.