-
1
-
-
0003293531
-
Free riding on Gnutella
-
September
-
Eytan Adar and Bernardo A. Huberman. Free riding on Gnutella. First Monday, September 2000.
-
(2000)
First Monday
-
-
Adar, E.1
Huberman, B.A.2
-
4
-
-
85084163931
-
Publius: A robust, tamper-evident, censorship-resistant, web publishing system
-
August
-
Marc Waldman, Aviel D. Rubin, and Lorrie Faith Cranor. Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proc. 9th USENIX Security Symposium, pages 59-72, August 2000.
-
(2000)
Proc. 9th USENIX Security Symposium
, pp. 59-72
-
-
Waldman, M.1
Rubin, A.D.2
Cranor, L.F.3
-
5
-
-
84946109737
-
A scalable content-addressable network
-
Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Shenker. A scalable content-addressable network. In Proceedings of ACM SIGCOMM, September 2001.
-
Proceedings of ACM SIGCOMM, September 2001
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
6
-
-
57349142855
-
Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems
-
Heidelberg, Germany, November
-
Anthony Rowstron and Peter Druschel. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), pages 329-350, Heidelberg, Germany, November 2001.
-
(2001)
IFIP/ACM International Conference on Distributed Systems Platforms (Middleware)
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
7
-
-
0003858844
-
-
Technical Report University of California, Berkeley, April
-
Ben Y. Zhao, John Kubiatowicz, and Anthony Joseph. Tapestry: An infrastructure for fault-tolerant wide-area location and routing. Technical Report UCB/CSD-01-1141, University of California, Berkeley, April 2001.
-
(2001)
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and Routing
-
-
Zhao, B.Y.1
Kubiatowicz, J.2
Joseph, A.3
-
8
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Diego, CA, USA, August
-
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of ACM SIGCOMM 2001, pages 149-160, San Diego, CA, USA, August 2001.
-
(2001)
Proceedings of ACM SIGCOMM 2001
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
9
-
-
11344290532
-
Efficient topology-aware overlay network
-
January Proceedings of ACM HotNets-I (October 2002)
-
Marcel Waldvogel and Roberto Rinaldi. Efficient topology-aware overlay network. ACM Computer Communications Review, 33(1):101-106, January 2003. Proceedings of ACM HotNets-I (October 2002).
-
(2003)
ACM Computer Communications Review
, vol.33
, Issue.1
, pp. 101-106
-
-
Waldvogel, M.1
Rinaldi, R.2
-
13
-
-
0347506735
-
Message authentication with one-way hash functions
-
Gene Tsudik. Message authentication with one-way hash functions. ACM Computer Communication Review, 22(5):29-38, 1992.
-
(1992)
ACM Computer Communication Review
, vol.22
, Issue.5
, pp. 29-38
-
-
Tsudik, G.1
-
14
-
-
0037656537
-
-
PhD thesis, University of Michigan, Ann Arbor, Also available as technical report
-
Gregory Robert Ganger. System-Oriented Evaluation of I/O Subsystem Performance. PhD thesis, University of Michigan, Ann Arbor, 1995. Also available as technical report CSE-TR-243-95.
-
(1995)
System-Oriented Evaluation of I/O Subsystem Performance
-
-
Ganger, G.R.1
-
17
-
-
0026405370
-
Checking the correctness of memories
-
Manuel Blum, William S. Evans, Peter Gemmell, Sampath Kannan, and Moni Naor. Checking the correctness of memories. In IEEE Symposium on Foundations of Computer Science, pages 90-99, 1991.
-
(1991)
IEEE Symposium on Foundations of Computer Science
, pp. 90-99
-
-
Blum, M.1
Evans, W.S.2
Gemmell, P.3
Kannan, S.4
Naor, M.5
-
19
-
-
84982899264
-
The role of trust management in distributed systems security
-
Springer Verlag
-
Matt Blaze, Joan Feigenbaum, John Ionnidis, and Angelos D. Keromytis. The role of trust management in distributed systems security. In Secure Internet Programming: Security Issues for Mobile and Distributed Objects, pages 185-210. Springer Verlag, 1999.
-
(1999)
Secure Internet Programming: Security Issues for Mobile and Distributed Objects
, pp. 185-210
-
-
Blaze, M.1
Feigenbaum, J.2
Ionnidis, J.3
Keromytis, A.D.4
-
20
-
-
84976699318
-
The byzantine generals problem
-
July
-
L. Lamport, R. Shostak, and M. Pease. The byzantine generals problem. ACM Transactions on Programming Languages and Systems, 4(3):382-401, July 1982.
-
(1982)
ACM Transactions on Programming Languages and Systems
, vol.4
, Issue.3
, pp. 382-401
-
-
Lamport, L.1
Shostak, R.2
Pease, M.3
-
21
-
-
84947294004
-
Modelling a public-key infrastructure
-
ESORICS: European Symposium on Research in Computer Security. Springer-Verlag
-
Ueli Maurer. Modelling a public-key infrastructure. In ESORICS: European Symposium on Research in Computer Security. LNCS, Springer-Verlag, 1996.
-
(1996)
LNCS
-
-
Maurer, U.1
-
22
-
-
0002101577
-
Reputation systems
-
Paul Resnick, Richard Zeckhauser, Eric Friedman, and Ko Kuwabara. Reputation systems. Communications of the ACM, 43(12):45-48, 2000.
-
(2000)
Communications of the ACM
, vol.43
, Issue.12
, pp. 45-48
-
-
Resnick, P.1
Zeckhauser, R.2
Friedman, E.3
Kuwabara, K.4
-
23
-
-
0012662357
-
-
February
-
Advogato's trust metric. http://www.advogato.org/trust-metric.html, February 2000.
-
(2000)
Advogato's Trust Metric
-
-
-
24
-
-
85113133621
-
CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks
-
Pietro Michiardi and Refik Molva. CORE: A collaborative reputation mechanism to enforce node cooperation in mobile ad hoc networks. In Sixth IFIP Conference on Security Communications, and Multimedia (CMS 2002), Portoroz, Slovenia, 2002.
-
Sixth IFIP Conference on Security Communications, and Multimedia (CMS 2002), Portoroz, Slovenia, 2002
-
-
Michiardi, P.1
Molva, R.2
|