-
1
-
-
35948940715
-
-
chord-0.1-20060908.tar.bz2, utils/id_utils.C, line 358.
-
chord-0.1-20060908.tar.bz2, utils/id_utils.C, line 358.
-
-
-
-
2
-
-
35948986235
-
-
The Chord/DHash project
-
The Chord/DHash project, http://pdos.csail.mit.edu/chord/.
-
-
-
-
3
-
-
35948947718
-
-
email
-
Digital ids for secure email, http://www.verisign.com/products-services/ security-services/pki/pki-application/email-digital-id/index.html.
-
Digital ids for secure
-
-
-
4
-
-
35948951027
-
-
Pastry - a scalable, decentralized, self-organizing and fault-tolerant substrate for peer-to-peer applications, http://freepastry.org/.
-
Pastry - a scalable, decentralized, self-organizing and fault-tolerant substrate for peer-to-peer applications, http://freepastry.org/.
-
-
-
-
5
-
-
33746494013
-
Advanced peer-to-peer networking: The P-Grid system and its applications
-
K. Aberer, P. Cudré-Mauroux, A. Datta, Z. Despotovic, M. Hauswirth, M. Punceva, R. Schmidt, and J. Wu. Advanced peer-to-peer networking: The P-Grid system and its applications. Praxis der Informationsverarbeitung und Kommunikation, 26(3), 2003.
-
(2003)
Praxis der Informationsverarbeitung und Kommunikation
, vol.26
, Issue.3
-
-
Aberer, K.1
Cudré-Mauroux, P.2
Datta, A.3
Despotovic, Z.4
Hauswirth, M.5
Punceva, M.6
Schmidt, R.7
Wu, J.8
-
6
-
-
35948978001
-
P2P reputation management: Probabilistic estimation vs. social networks
-
K. Aberer and Z. Despotovic. P2P reputation management: Probabilistic estimation vs. social networks. Journal of Computer Networks, 2005.
-
(2005)
Journal of Computer Networks
-
-
Aberer, K.1
Despotovic, Z.2
-
7
-
-
0035747559
-
Managing trust in a peer-2-peer information system
-
Atlanta, Georgia, USA, ACM press
-
Karl Aberer and Zoran Despotovic. Managing trust in a peer-2-peer information system. In Conference on Information and Knowledge Management, pages 310-317, Atlanta, Georgia, USA, 2001. ACM press.
-
(2001)
Conference on Information and Knowledge Management
, pp. 310-317
-
-
Aberer, K.1
Despotovic, Z.2
-
8
-
-
0003605208
-
Security Engineering, a guide to building dependable distribut ed systems
-
chapter 4, Wiley
-
Ross Anderson. Security Engineering, a guide to building dependable distribut ed systems, chapter 4, Access Control. Wiley, 2000.
-
(2000)
Access Control
-
-
Anderson, R.1
-
11
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
th symposium on Operating systems design and implementation, volume 36, pages 299-314, 2002.
-
(2002)
th symposium on Operating systems design and implementation
, vol.36
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
12
-
-
35948956192
-
-
daemon9, route, and infinity. IP-spoofing demystified (trust-relationshipexploitation). PhrackMagazine, 1996.
-
daemon9, route, and infinity. IP-spoofing demystified (trust-relationshipexploitation). PhrackMagazine, 1996.
-
-
-
-
13
-
-
19944368546
-
Countering identity farms in reputation systems for P2P networks
-
Technical report, Arizona State University
-
Prashant Dewan. Countering identity farms in reputation systems for P2P networks. Technical report, Arizona State University, 2004.
-
(2004)
-
-
Dewan, P.1
-
18
-
-
35948958483
-
Calif, man pleads guilty to felony hacking
-
Jan. 23
-
Dan Goodin. Calif, man pleads guilty to felony hacking. Breitbart.com, Jan. 23 2006.
-
(2006)
Breitbart.com
-
-
Goodin, D.1
-
19
-
-
35948981063
-
-
Kai Hwang and Runfang Zhou. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. Manuscript submitted to IEEE Transactions on Parallel and Distributed Systems.
-
Kai Hwang and Runfang Zhou. PowerTrust: a robust and scalable reputation system for trusted peer-to-peer computing. Manuscript submitted to IEEE Transactions on Parallel and Distributed Systems.
-
-
-
-
20
-
-
33751098596
-
Dutch botnet bigger than expected
-
Oct 21
-
Gregg Keizer. Dutch botnet bigger than expected. InformationWeek, Oct 21 2005. http://www.informationweek.com/story/showArticle.jhtml?articleID= 172303265.
-
(2005)
InformationWeek
-
-
Keizer, G.1
-
21
-
-
35948946008
-
Dutch botnet susptects ran 1.5 milion machines
-
Oct 21
-
Gregg Keizer. Dutch botnet susptects ran 1.5 milion machines. TechWeb, Oct 21 2005. http://www.techweb.com/wire/security/172303160.
-
(2005)
TechWeb
-
-
Keizer, G.1
-
22
-
-
77951157906
-
A survey and comparison of peer-to-peer over-lay network schemes
-
Keong Lua, J. Crowcroft, M. Pias, R. Sharma, and S. Lim. A survey and comparison of peer-to-peer over-lay network schemes. Communications Surveys & Tutorials, IEEE, pages 72-93, 2005.
-
(2005)
Communications Surveys & Tutorials, IEEE
, pp. 72-93
-
-
Lua, K.1
Crowcroft, J.2
Pias, M.3
Sharma, R.4
Lim, S.5
-
23
-
-
35948992902
-
Attack of the zombie computers is growing threat
-
7 Jan
-
John Markoff. Attack of the zombie computers is growing threat. The New York Times, 7 Jan. 2007.
-
(2007)
The New York Times
-
-
Markoff, J.1
-
27
-
-
84947265806
-
-
Emil Sit and Robert Morris. Security considerations for peer-to-peer distributed hash tables. In Lecture Notes in Computer Science, Revised Papers form the First International Workshop on Peer-to-Peer Systems, pages 261-269, 2002.
-
Emil Sit and Robert Morris. Security considerations for peer-to-peer distributed hash tables. In Lecture Notes in Computer Science, Revised Papers form the First International Workshop on Peer-to-Peer Systems, pages 261-269, 2002.
-
-
-
-
30
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Deigo, CA
-
Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In ACM SIGCOMM 2001, pages 149-160, San Deigo, CA, 2001.
-
(2001)
ACM SIGCOMM 2001
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Frans Kaashoek, M.4
Balakrishnan, H.5
|