-
1
-
-
3142707519
-
Efficient, self-contained handling of identity in peer-to-peer systems
-
K. Aberer, A. Datta, and M. Hauswirth. Efficient, self-contained handling of identity in Peer-to-Peer systems. IEEE Trans. on Knowledge and Data Engineering, 16(7), 2004.
-
(2004)
IEEE Trans. on Knowledge and Data Engineering
, vol.16
, Issue.7
-
-
Aberer, K.1
Datta, A.2
Hauswirth, M.3
-
2
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
Boston, MA, USA
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proc. of the 5th USENIX Symposium on Operating Systems Design and Impl., Boston, MA, USA, 2002.
-
(2002)
Proc. of the 5th USENIX Symposium on Operating Systems Design and Impl.
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
6
-
-
11244327782
-
Free-riding and whitewashing in peer-to-peer systems
-
New York, NY, USA. ACM Press
-
M. Feldman, C. Papadimitriou, J. Chuang, and I. Stoica. Free-riding and whitewashing in peer-to-peer systems. In PINS '04: Proceedings of the ACM SIGCOMM workshop on Practice and theory of incentives in networked systems, pages 228-236, New York, NY, USA, 2004. ACM Press.
-
(2004)
PINS '04: Proceedings of the ACM SIGCOMM Workshop on Practice and Theory of Incentives in Networked Systems
, pp. 228-236
-
-
Feldman, M.1
Papadimitriou, C.2
Chuang, J.3
Stoica, I.4
-
8
-
-
84976699318
-
The byzantine generals problem
-
L. Lamport, R. Shostak, and M. Pease. The Byzantine Generals Problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
9
-
-
0017959977
-
Secure communications over insecure channels
-
R. C. Merkle. Secure communications over insecure channels. Commun. ACM, 21(4):294-299, 1978.
-
(1978)
Commun. ACM
, vol.21
, Issue.4
, pp. 294-299
-
-
Merkle, R.C.1
-
10
-
-
2942713633
-
Privacy extensions for stateless address autoconfiguration in IPv6
-
Jan.
-
T. Narten and R. Draves. Privacy Extensions for Stateless Address Autoconfiguration in IPv6. RFC 3041, Jan. 2001.
-
(2001)
RFC
, vol.3041
-
-
Narten, T.1
Draves, R.2
-
11
-
-
3042785862
-
The sybil attack in sensor networks: Analysis & defenses
-
New York, NY, USA
-
J. Newsome, E. Shi, D. Song, and A. Perrig. The sybil attack in sensor networks: analysis & defenses. In Proc. of the third int. symposium on Information processing in sensor networks, pages 259-268, New York, NY, USA, 2004.
-
(2004)
Proc. of the Third Int. Symposium on Information Processing in Sensor Networks
, pp. 259-268
-
-
Newsome, J.1
Shi, E.2
Song, D.3
Perrig, A.4
-
12
-
-
57349142855
-
Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
-
Heidelberg, Germany
-
A. Rowstron and P. Druschel. Pastry: Scalable, Distributed Object Location and Routing for Large-Scale Peer-to-Peer Systems. In Proc. of Int. Conf. on Distributed Systems Platforms (Middleware), pages 329-350, Heidelberg, Germany, 2001.
-
(2001)
Proc. of Int. Conf. on Distributed Systems Platforms (Middleware)
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
15
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for Internet applications
-
ACM Press
-
I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A Scalable Peer-To-Peer Lookup Service for Internet Applications. In Proceedings of the 2001 ACM SIGCOMM Conference, pages 149-160. ACM Press, 2001.
-
(2001)
Proceedings of the 2001 ACM SIGCOMM Conference
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, F.4
Balakrishnan, H.5
-
16
-
-
33750964721
-
-
DRCL, The Ohio State University
-
H. Tyan. J-Sim. http://www.j-sim.org/, DRCL, The Ohio State University, 2005.
-
(2005)
-
-
Tyan, H.1
|