-
1
-
-
0003828107
-
-
PhD Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, August
-
R. Perlman. Network layer protocols with Byzantine robustness. PhD Thesis, Department of Electrical Engineering and Computer Science, Massachusetts Institute of Technology, August 1988.
-
(1988)
Network layer protocols with Byzantine robustness
-
-
Perlman, R.1
-
2
-
-
6344258648
-
2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks
-
P. W. Yau and C.J. Mitchell. 2HARP: A secure routing protocol to detect failed and selfish nodes in mobile ad hoc networks. In Proc. 5th World Wireless Congress, San Francisco, CA, USA, pages 1-6, 2004.
-
(2004)
Proc. 5th World Wireless Congress, San Francisco, CA, USA
, pp. 1-6
-
-
Yau, P.W.1
Mitchell, C.J.2
-
3
-
-
33745900598
-
-
D. Quercia, M. Lad, S. Hailes, L. Capra and S. Bhatti. STRUDEL: Supporting trust in the dynamic establishment of peering coalitions. In Proc. 21stAnnual ACM Symposium on Applied Computing (SAC2006), Bourgogne University, Dijon, France, 23-27 April 2006.
-
D. Quercia, M. Lad, S. Hailes, L. Capra and S. Bhatti. STRUDEL: Supporting trust in the dynamic establishment of peering coalitions. In Proc. 21stAnnual ACM Symposium on Applied Computing (SAC2006), Bourgogne University, Dijon, France, 23-27 April 2006.
-
-
-
-
4
-
-
35248864021
-
Enforcing fair sharing of peer-to-peer resources
-
F. Kaashoek and I. Stoica, editors, Proc. 2nd International Workshop on Peer-to-Peer Systems IPTPS '03, Berkeley, CA, USA, February, of, Springer
-
T.W. Ngan, D.S. Wallach, and P. Druschel. Enforcing fair sharing of peer-to-peer resources. In F. Kaashoek and I. Stoica, editors, Proc. 2nd International Workshop on Peer-to-Peer Systems (IPTPS '03), Berkeley, CA, USA, February 2003, volume 2735 of Lecture Notes in Computer Science, pages 149-159. Springer, 2003.
-
(2003)
Lecture Notes in Computer Science
, vol.2735
, pp. 149-159
-
-
Ngan, T.W.1
Wallach, D.S.2
Druschel, P.3
-
6
-
-
36048945948
-
-
S. Buchegger and J.Y. Le Boudec. A robust reputation system for P2P and mobile ad hoc networks. In 2nd Workshop on Economics of Peer-to-Peer Systems, Cambridge, MA, USA, June 2004.
-
S. Buchegger and J.Y. Le Boudec. A robust reputation system for P2P and mobile ad hoc networks. In 2nd Workshop on Economics of Peer-to-Peer Systems, Cambridge, MA, USA, June 2004.
-
-
-
-
7
-
-
1542299118
-
Ad hoc VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents
-
L. Anderegg and S. Eidenbenz. Ad hoc VCG: A truthful and cost-efficient routing protocol for mobile ad hoc networks with selfish agents. In ACM Mobicom, 2003.
-
(2003)
ACM Mobicom
-
-
Anderegg, L.1
Eidenbenz, S.2
-
9
-
-
84978405320
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
December
-
A. Adya, W.J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J.R. Douceur, J. Howell, J.R. Lorch, M. Theimer, and R.P. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proc. 5th USENTX Symposium on Operating Systems Design and Implementation, Boston, MA, USA, pages 1-14, December 2002.
-
(2002)
Proc. 5th USENTX Symposium on Operating Systems Design and Implementation, Boston, MA, USA
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.P.10
-
11
-
-
84947273682
-
The Sybil attack
-
P. Druschel, F. Kaashoek, and A. Rowstron, editors, Proc. 1st International Workshop on Peer-to-Peer Systems IPTPS '02, Cambridge, MA, USA, March, of, Springer
-
J.R. Douceur. The Sybil attack. In P. Druschel, F. Kaashoek, and A. Rowstron, editors, Proc. 1st International Workshop on Peer-to-Peer Systems (IPTPS '02), Cambridge, MA, USA, March 2002, volume 2429 of Lecture Notes in Computer Science, pages 251-260. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
12
-
-
84976845043
-
End-to-end arguments in system design
-
November
-
J.H. Saltzer, D.P. Reed, and D.D. Clark. End-to-end arguments in system design. ACM Transactions on Computer Systems, 2(4):277-288, November 1984.
-
(1984)
ACM Transactions on Computer Systems
, vol.2
, Issue.4
, pp. 277-288
-
-
Saltzer, J.H.1
Reed, D.P.2
Clark, D.D.3
-
13
-
-
36048934262
-
-
X. Wang, D. Feng, X. Lai, and H. Yu. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, 2004. Cryptology ePrint 2004/199, available from http://eprint.iacr.org/2004/199.pdf.
-
X. Wang, D. Feng, X. Lai, and H. Yu. Collisions for hash functions MD4, MD5, HAVAL-128 and RIPEMD, 2004. Cryptology ePrint 2004/199, available from http://eprint.iacr.org/2004/199.pdf.
-
-
-
-
14
-
-
33646754186
-
Finding collisions in the full SHA-1
-
August
-
X. Wang, Y.L. Yin, and H. Yu. Finding collisions in the full SHA-1. In 25th Annual International Cryptology Conference, Santa Barbara, CA, USA, August 2005.
-
(2005)
25th Annual International Cryptology Conference, Santa Barbara, CA, USA
-
-
Wang, X.1
Yin, Y.L.2
Yu, H.3
-
15
-
-
24644452689
-
An excess-based economic model for resource allocation in peer-to-peer networks
-
June
-
C. Grothoff. An excess-based economic model for resource allocation in peer-to-peer networks. Wirtschaftsinformatik, 45(3):285-292, June 2003.
-
(2003)
Wirtschaftsinformatik
, vol.45
, Issue.3
, pp. 285-292
-
-
Grothoff, C.1
-
17
-
-
33746629171
-
The eMule protocol specification
-
Technical report, School of Computer Science and Engineering, Hebrew University of Jerusalem, January
-
Y. Kulbak and D. Bickson. The eMule protocol specification. Technical report, School of Computer Science and Engineering, Hebrew University of Jerusalem, January 2005.
-
(2005)
-
-
Kulbak, Y.1
Bickson, D.2
-
18
-
-
34047196633
-
Dealing with cheaters in anonymous peer-to-peer networks
-
Technical Report 04-01-03, University of Washington, January
-
P. Gauthier, B. Bershad, and S.D. Gribble. Dealing with cheaters in anonymous peer-to-peer networks. Technical Report 04-01-03, University of Washington, January 2004.
-
(2004)
-
-
Gauthier, P.1
Bershad, B.2
Gribble, S.D.3
-
19
-
-
0005063385
-
Onion routing for anonymous and private internet connections
-
February
-
D. Goldschlag, M. Reed, and P. Syverson. Onion routing for anonymous and private internet connections. Communications of the ACM, 42(2):39-41, February 1999.
-
(1999)
Communications of the ACM
, vol.42
, Issue.2
, pp. 39-41
-
-
Goldschlag, D.1
Reed, M.2
Syverson, P.3
-
20
-
-
36048940975
-
-
The IETF Reliable Multicast Transport (RMT) Working Group
-
The IETF Reliable Multicast Transport (RMT) Working Group. http://www.ietf.org/html.charters/rmt - charter.html
-
-
-
-
21
-
-
0001818392
-
Bimodal multicast
-
May
-
K. Birman, M. Hayden, O. Ozkasap, Z. Xiao, M. Budiu, and Y. Minsky. Bimodal multicast. ACM Transactions on Computer Systems, 17(2):41-88, May 1999.
-
(1999)
ACM Transactions on Computer Systems
, vol.17
, Issue.2
, pp. 41-88
-
-
Birman, K.1
Hayden, M.2
Ozkasap, O.3
Xiao, Z.4
Budiu, M.5
Minsky, Y.6
-
22
-
-
36049000462
-
Quick-Silver scalable multicast
-
Technical Report TR2006-2063, Cornell University, April
-
K. Ostrowski, K. Birman, and A. Phanishayee. Quick-Silver scalable multicast. Technical Report TR2006-2063, Cornell University, April 2006.
-
(2006)
-
-
Ostrowski, K.1
Birman, K.2
Phanishayee, A.3
-
23
-
-
0345565893
-
A survey of key management for secure group communication
-
September
-
S. Rafaeli and D. Hutchison. A survey of key management for secure group communication. ACM Computing Surveys, 35(3):309-329, September 2003.
-
(2003)
ACM Computing Surveys
, vol.35
, Issue.3
, pp. 309-329
-
-
Rafaeli, S.1
Hutchison, D.2
-
26
-
-
21644483415
-
SHARP: An architecture for secure resource peering
-
October
-
Y. Fu, J. Chase, B. Chun, S. Schwab, and A. Vahdat. SHARP: An architecture for secure resource peering. In 19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, USA, October 2003.
-
(2003)
19th ACM Symposium on Operating Systems Principles, Bolton Landing, NY, USA
-
-
Fu, Y.1
Chase, J.2
Chun, B.3
Schwab, S.4
Vahdat, A.5
-
29
-
-
0036986441
-
An on-demand secure routing protocol resilient to Byzantine failures
-
September
-
B. Awerbuch, D. Holmer, C. Nita-Rotaru, and H. Rubens. An on-demand secure routing protocol resilient to Byzantine failures. In Proc. ACM Workshop on Wireless Security (WiSe'02), Atlanta, GA, USA, pages 21-30, September 2002.
-
(2002)
Proc. ACM Workshop on Wireless Security (WiSe'02), Atlanta, GA, USA
, pp. 21-30
-
-
Awerbuch, B.1
Holmer, D.2
Nita-Rotaru, C.3
Rubens, H.4
-
30
-
-
8344236729
-
Highly secure and efficient routing
-
March
-
I. Avramopoulos, H. Kobayashi, R. Wang, and A. Krishnamurthy. Highly secure and efficient routing. In IEEE Infocom, Hong Kong, March 2004.
-
(2004)
IEEE Infocom, Hong Kong
-
-
Avramopoulos, I.1
Kobayashi, H.2
Wang, R.3
Krishnamurthy, A.4
-
31
-
-
84889351757
-
How to sign digital streams
-
B.S.J. Kaliski, editor, Proc. 17th Annual Cryptology Conference CRYPTO '97, Santa Barbara, CA, USA, August, of, Springer
-
R. Gennaro and P. Rohatgi. How to sign digital streams. In B.S.J. Kaliski, editor, Proc. 17th Annual Cryptology Conference (CRYPTO '97), Santa Barbara, CA, USA, August 1997, volume 1294 of Lecture Notes in Computer Science, pages 180-197. Springer, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1294
, pp. 180-197
-
-
Gennaro, R.1
Rohatgi, P.2
-
32
-
-
0003605145
-
Constructing digital signatures from a one-way function
-
Technical Report CSL-98, SRI International, Palo Alto, CA, USA
-
L. Lamport. Constructing digital signatures from a one-way function. Technical Report CSL-98, SRI International, Palo Alto, CA, USA, 1979.
-
(1979)
-
-
Lamport, L.1
-
33
-
-
84958802026
-
A digital signature based on a conventional encryption function
-
C. Pomerance, editor, Proc. Conference on the Theory and Applications of Cryptographic Techniques CRYPTO '87, Santa Barbara, CA, USA, August, of, Springer
-
R. Merkle. A digital signature based on a conventional encryption function. In C. Pomerance, editor, Proc. Conference on the Theory and Applications of Cryptographic Techniques (CRYPTO '87), Santa Barbara, CA, USA, August 1987, volume 293 of Lecture Notes in Computer Science. Springer, 1988.
-
(1987)
Lecture Notes in Computer Science
, vol.293
-
-
Merkle, R.1
-
34
-
-
0001989185
-
A new family of authentication protocols
-
October
-
R.J. Anderson, F. Bergadano, B. Crispo, J.H. Lee, C. Manifavas, and R.M. Needham. A new family of authentication protocols. Operating Systems Review, 32(4):9-20, October 1998.
-
(1998)
Operating Systems Review
, vol.32
, Issue.4
, pp. 9-20
-
-
Anderson, R.J.1
Bergadano, F.2
Crispo, B.3
Lee, J.H.4
Manifavas, C.5
Needham, R.M.6
-
35
-
-
0030645662
-
Reducing the cost of security in link-state routing
-
February
-
R. Häuser, T. Przygienda, and G. Tsudik. Reducing the cost of security in link-state routing. In ISOC Symposium on Network and Distributed System Security, San Diego, CA, USA, February 1997.
-
(1997)
ISOC Symposium on Network and Distributed System Security, San Diego, CA, USA
-
-
Häuser, R.1
Przygienda, T.2
Tsudik, G.3
-
36
-
-
0031383687
-
An efficient message authentication scheme for link state routing
-
December
-
S. Cheung. An efficient message authentication scheme for link state routing. In Proc. 13th Annual Computer Security Applications Conference (ACSAC '97), San Diego, CA, USA, pages 90-98, December 1997.
-
(1997)
Proc. 13th Annual Computer Security Applications Conference (ACSAC '97), San Diego, CA, USA
, pp. 90-98
-
-
Cheung, S.1
-
37
-
-
0036980294
-
Securing ad hoc routing protocols
-
September
-
M.G. Zapata and N. Asokan. Securing ad hoc routing protocols. In Proc. ACM Workshop on Wireless Security (WiSe'02), Atlanta, GA, USA, pages 1-10, September 2002.
-
(2002)
Proc. ACM Workshop on Wireless Security (WiSe'02), Atlanta, GA, USA
, pp. 1-10
-
-
Zapata, M.G.1
Asokan, N.2
-
39
-
-
0242426103
-
The TESLA broadcast authentication protocol
-
A. Perrig, R. Canneti, J.D. Tygar, and D. Song. The TESLA broadcast authentication protocol. CryptoBytes, 5(2):2-13, 2002.
-
(2002)
CryptoBytes
, vol.5
, Issue.2
, pp. 2-13
-
-
Perrig, A.1
Canneti, R.2
Tygar, J.D.3
Song, D.4
|