메뉴 건너뛰기




Volumn 2005, Issue , 2005, Pages 117-124

Trusted computing: Providing security for peer-to-peer networks

Author keywords

[No Author keywords available]

Indexed keywords

CHANNEL CAPACITY; COMPUTER NETWORKS; DATA PRIVACY; SECURITY OF DATA; SPECIFICATIONS;

EID: 33749405352     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/P2P.2005.40     Document Type: Conference Paper
Times cited : (74)

References (15)
  • 1
    • 35248839965 scopus 로고    scopus 로고
    • A signature scheme with efficient protocols
    • Security in Communication Networks, Third International Conference, SCN 2002. Springer Verlag
    • J. Camenisch and A. Lysyanskaya. A signature scheme with efficient protocols. In Security in Communication Networks, Third International Conference, SCN 2002, volume 2576 of LNCS, pages 268-289. Springer Verlag, 2003.
    • (2003) LNCS , vol.2576 , pp. 268-289
    • Camenisch, J.1    Lysyanskaya, A.2
  • 4
    • 35248845972 scopus 로고    scopus 로고
    • Open problems in data-sharing peer-to-peer systems
    • D. Calvanese, M. Lenzerini, and R. Motwani, editors, Proceedings of 9th International Conference on Database Theory (ICDT'03). Springer
    • N. Daswani, H. Garcia-Molina, and B. Yang. Open problems in data-sharing peer-to-peer systems. In D. Calvanese, M. Lenzerini, and R. Motwani, editors, Proceedings of 9th International Conference on Database Theory (ICDT'03), volume 2572 of LNCS, pages 1-15. Springer, 2003.
    • (2003) LNCS , vol.2572 , pp. 1-15
    • Daswani, N.1    Garcia-Molina, H.2    Yang, B.3
  • 5
    • 33845373082 scopus 로고
    • The snakes of medusa - Internet identity subversion
    • L. Detweiler. The snakes of medusa - internet identity subversion, 1993. Cypherpunks mailing lists.
    • (1993) Cypherpunks Mailing Lists
    • Detweiler, L.1
  • 6
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, Peer-to-Peer systems, First International Workshop, IPTPS 2002. Springer
    • J.R. Douceur. The sybil attack. In P. Druschel, M. F. Kaashoek, and A. I. T. Rowstron, editors, Peer-to-Peer systems, First International Workshop, IPTPS 2002, volume 2429 of LNCS, pages 251-256. Springer, 2002.
    • (2002) LNCS , vol.2429 , pp. 251-256
    • Douceur, J.R.1
  • 11
    • 33845360717 scopus 로고    scopus 로고
    • Trusted Computing Group. TPM Main: Part 3 Commands, 1.2 edition, 2005. https: //www.trustedcomputinggroup.org/downloads/specifications.
    • (2005) TPM Main: Part 3 Commands, 1.2 Edition
  • 13
    • 0012408597 scopus 로고    scopus 로고
    • SDSI: A simple distributed security infrastructure
    • presented at
    • R. Rivest and B. Lampson. SDSI: a simple distributed security infrastructure, 1996. presented at CRYPTO'96 Rumpsession.
    • (1996) CRYPTO'96 Rumpsession
    • Rivest, R.1    Lampson, B.2
  • 15
    • 33845373081 scopus 로고    scopus 로고
    • A survey of peer-to-peer security issues
    • M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, Software Security - Theories and Systems, International Symposium, ISSS 2002. Springer. ISBN 3-540-00708-3
    • D. S. Wallach. A survey of peer-to-peer security issues. In M. Okada, B. C. Pierce, A. Scedrov, H. Tokuda, and A. Yonezawa, editors, Software Security - Theories and Systems, International Symposium, ISSS 2002, volume 2609 of LNCS, pages 42-57. Springer, 2003. ISBN 3-540-00708-3.
    • (2003) LNCS , vol.2609 , pp. 42-57
    • Wallach, D.S.1


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.