메뉴 건너뛰기




Volumn , Issue , 2007, Pages 430-439

A lightweight mechanism for dependable communication in untrusted networks

Author keywords

[No Author keywords available]

Indexed keywords

COMMUNICATION SYSTEMS; MESSAGE PASSING; NETWORK PROTOCOLS; WEB SERVICES;

EID: 36049016485     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/DSN.2007.9     Document Type: Conference Paper
Times cited : (2)

References (40)
  • 1
    • 0003828107 scopus 로고
    • PhD Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, August
    • R. Perlman. Network layer protocols with Byzantine robustness. PhD Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, August 1988.
    • (1988) Network layer protocols with Byzantine robustness
    • Perlman, R.1
  • 2
    • 6344258648 scopus 로고    scopus 로고
    • 2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks
    • P. W. Yau and C.J. Mitchell. 2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks. In Proc. 5th World Wireless Congress, San Francisco, CA, USA, pages 1-6, 2004.
    • (2004) Proc. 5th World Wireless Congress, San Francisco, CA, USA , pp. 1-6
    • Yau, P.W.1    Mitchell, C.J.2
  • 3
    • 33745900598 scopus 로고    scopus 로고
    • D. Quercia, M. Lad, S. Hailes, L. Capra and S. Bhatti. STRUDEL: Supporting trust in the dynamic establishment of peering coalitions. In Proc. 21stAnnual ACM Symposium on Applied Computing (SAC2006), Bourgogne University, Dijon, France, 23-27 April 2006.
    • D. Quercia, M. Lad, S. Hailes, L. Capra and S. Bhatti. STRUDEL: Supporting trust in the dynamic establishment of peering coalitions. In Proc. 21stAnnual ACM Symposium on Applied Computing (SAC2006), Bourgogne University, Dijon, France, 23-27 April 2006.
  • 4
    • 35248864021 scopus 로고    scopus 로고
    • Enforcing fair sharing of peer-to-peer resources
    • F. Kaashoek and I. Stoica, editors, Proc. 2nd International Workshop on Peer-to-Peer Systems IPTPS '03, Berkeley, CA, USA, February, of, Springer
    • T.W. Ngan, D.S. Wallach, and P. Druschel. Enforcing fair sharing of peer-to-peer resources. In F. Kaashoek and I. Stoica, editors, Proc. 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, CA, USA, February 2003, volume 2735 of Lecture Notes in Computer Science, pages 149-159. Springer, 2003.
    • (2003) Lecture Notes in Computer Science , vol.2735 , pp. 149-159
    • Ngan, T.W.1    Wallach, D.S.2    Druschel, P.3
  • 6
    • 36048945948 scopus 로고    scopus 로고
    • S. Buchegger and J.Y. Le Boudec. A robust reputation system for P2P and mobile ad hoc networks. In 2nd Workshop on Economics of Peer-to-Peer Systems, Cambridge, MA, USA, June 2004.
    • S. Buchegger and J.Y. Le Boudec. A robust reputation system for P2P and mobile ad hoc networks. In 2nd Workshop on Economics of Peer-to-Peer Systems, Cambridge, MA, USA, June 2004.
  • 7
    • 1542299118 scopus 로고    scopus 로고
    • Ad hoc VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents
    • L. Anderegg and S. Eidenbenz. Ad hoc VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In ACM Mobicom, 2003.
    • (2003) ACM Mobicom
    • Anderegg, L.1    Eidenbenz, S.2
  • 11
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil attack
    • P. Druschel, F. Kaashoek, and A. Rowstron, editors, Proc. 1st International Workshop on Peer-to-Peer Systems IPTPS '02, Cambridge, MA, USA, March, of, Springer
    • J.R. Douceur. The Sybil attack. In P. Druschel, F. Kaashoek, and A. Rowstron, editors, Proc. 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, USA, March 2002, volume 2429 of Lecture Notes in Computer Science, pages 251-260. Springer, 2002.
    • (2002) Lecture Notes in Computer Science , vol.2429 , pp. 251-260
    • Douceur, J.R.1
  • 13
    • 36048934262 scopus 로고    scopus 로고
    • X. Wang, D. Feng, X. Lai, and H. Yu. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, 2004. Cryptology ePrint 2004/199, available from http://eprint.iacr.org/2004/199.pdf.
    • X. Wang, D. Feng, X. Lai, and H. Yu. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, 2004. Cryptology ePrint 2004/199, available from http://eprint.iacr.org/2004/199.pdf.
  • 15
    • 24644452689 scopus 로고    scopus 로고
    • An excess-based economic model for resource allocation in peer-to-peer networks
    • June
    • C. Grothoff. An excess-based economic model for resource allocation in peer-to-peer networks. Wirtschaftsinformatik, 45(3):285-292, June 2003.
    • (2003) Wirtschaftsinformatik , vol.45 , Issue.3 , pp. 285-292
    • Grothoff, C.1
  • 17
    • 33746629171 scopus 로고    scopus 로고
    • The eMule protocol specification
    • Technical report, School of Computer Science and Engineering, Hebrew University of Jerusalem, January
    • Y. Kulbak and D. Bickson. The eMule protocol specification. Technical report, School of Computer Science and Engineering, Hebrew University of Jerusalem, January 2005.
    • (2005)
    • Kulbak, Y.1    Bickson, D.2
  • 18
    • 34047196633 scopus 로고    scopus 로고
    • Dealing with cheaters in anonymous peer-to-peer networks
    • Technical Report 04-01-03, University of Washington, January
    • P. Gauthier, B. Bershad, and S.D. Gribble. Dealing with cheaters in anonymous peer-to-peer networks. Technical Report 04-01-03, University of Washington, January 2004.
    • (2004)
    • Gauthier, P.1    Bershad, B.2    Gribble, S.D.3
  • 19
    • 0005063385 scopus 로고    scopus 로고
    • Onion routing for anonymous and private internet connections
    • February
    • D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM, 42(2):39-41, February 1999.
    • (1999) Communications of the ACM , vol.42 , Issue.2 , pp. 39-41
    • Goldschlag, D.1    Reed, M.2    Syverson, P.3
  • 20
    • 36048940975 scopus 로고    scopus 로고
    • The IETF Reliable Multicast Transport (RMT) Working Group
    • The IETF Reliable Multicast Transport (RMT) Working Group. http://www.ietf.org/html.charters/rmt - charter.html
  • 22
    • 36049000462 scopus 로고    scopus 로고
    • Quick-Silver scalable multicast
    • Technical Report TR2006-2063, Cornell University, April
    • K. Ostrowski, K. Birman, and A. Phanishayee. Quick-Silver scalable multicast. Technical Report TR2006-2063, Cornell University, April 2006.
    • (2006)
    • Ostrowski, K.1    Birman, K.2    Phanishayee, A.3
  • 23
    • 0345565893 scopus 로고    scopus 로고
    • A survey of key management for secure group communication
    • September
    • S. Rafaeli and D. Hutchison. A survey of key management for secure group communication. ACM Computing Surveys, 35(3):309-329, September 2003.
    • (2003) ACM Computing Surveys , vol.35 , Issue.3 , pp. 309-329
    • Rafaeli, S.1    Hutchison, D.2
  • 31
    • 84889351757 scopus 로고    scopus 로고
    • How to sign digital streams
    • B.S.J. Kaliski, editor, Proc. 17th Annual Cryptology Conference CRYPTO '97, Santa Barbara, CA, USA, August, of, Springer
    • R. Gennaro and P. Rohatgi. How to sign digital streams. In B.S.J. Kaliski, editor, Proc. 17th Annual Cryptology Conference (CRYPTO '97), Santa Barbara, CA, USA, August 1997, volume 1294 of Lecture Notes in Computer Science, pages 180-197. Springer, 1997.
    • (1997) Lecture Notes in Computer Science , vol.1294 , pp. 180-197
    • Gennaro, R.1    Rohatgi, P.2
  • 32
    • 0003605145 scopus 로고
    • Constructing digital signatures from a one-way function
    • Technical Report CSL-98, SRI International, Palo Alto, CA, USA
    • L. Lamport. Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International, Palo Alto, CA, USA, 1979.
    • (1979)
    • Lamport, L.1
  • 33
    • 84958802026 scopus 로고
    • A digital signature based on a conventional encryption function
    • C. Pomerance, editor, Proc. Conference on the Theory and Applications of Cryptographic Techniques CRYPTO '87, Santa Barbara, CA, USA, August, of, Springer
    • R. Merkle. A digital signature based on a conventional encryption function. In C. Pomerance, editor, Proc. Conference on the Theory and Applications of Cryptographic Techniques (CRYPTO '87), Santa Barbara, CA, USA, August 1987, volume 293 of Lecture Notes in Computer Science. Springer, 1988.
    • (1987) Lecture Notes in Computer Science , vol.293
    • Merkle, R.1
  • 39
    • 0242426103 scopus 로고    scopus 로고
    • The TESLA broadcast authentication protocol
    • A. Perrig, R. Canneti, J.D. Tygar, and D. Song. The TESLA broadcast authentication protocol. CryptoBytes, 5(2):2-13, 2002.
    • (2002) CryptoBytes , vol.5 , Issue.2 , pp. 2-13
    • Perrig, A.1    Canneti, R.2    Tygar, J.D.3    Song, D.4


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.