메뉴 건너뛰기




Volumn 5019 LNCS, Issue , 2008, Pages 78-91

Availability for DHT-based overlay networks with unidirectional routing

Author keywords

[No Author keywords available]

Indexed keywords

COMPUTER CRIME; COMPUTER SIMULATION; INFORMATION RETRIEVAL; PROBLEM SOLVING; ROUTING ALGORITHMS; ALGORITHMS; OVERLAY NETWORKS; SECURITY OF DATA;

EID: 44649087187     PISSN: 03029743     EISSN: 16113349     Source Type: Book Series    
DOI: 10.1007/978-3-540-79966-5_6     Document Type: Conference Paper
Times cited : (2)

References (20)
  • 3
    • 44649193118 scopus 로고    scopus 로고
    • Condie, T., Kacholia, V., Sankararaman, S., Maniatis, P., Hellerstein, J.M.: Maelstrom: Churn as Shelter, University of California at Berkeley Technical Report No. UCB/EECS-2005-11 (November 2005)
    • Condie, T., Kacholia, V., Sankararaman, S., Maniatis, P., Hellerstein, J.M.: Maelstrom: Churn as Shelter, University of California at Berkeley Technical Report No. UCB/EECS-2005-11 (November 2005)
  • 4
    • 84947229868 scopus 로고    scopus 로고
    • Serving DNS Using a Peer-to-Peer Lookup Service
    • Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
    • Cox, R., Muthitacharoen, A., Morris, R.: Serving DNS Using a Peer-to-Peer Lookup Service. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2429
    • Cox, R.1    Muthitacharoen, A.2    Morris, R.3
  • 6
    • 33646038920 scopus 로고    scopus 로고
    • Sybil-Resistant DHT Routing
    • de Vimercati, S, Syverson, P.F, Gollmann, D, eds, ESORICS 2005, Springer, Heidelberg
    • Danezis, G., Lesniewski-Laas, C., Kaashoek, M.F., Anderson, R.: Sybil-Resistant DHT Routing. In: de Vimercati, S., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol. 3679, pp. 305-318. Springer, Heidelberg (2005)
    • (2005) LNCS , vol.3679 , pp. 305-318
    • Danezis, G.1    Lesniewski-Laas, C.2    Kaashoek, M.F.3    Anderson, R.4
  • 7
    • 84947273682 scopus 로고    scopus 로고
    • The Sybil Attack
    • Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
    • Douceur, J.R.: The Sybil Attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, Springer, Heidelberg (2002)
    • (2002) LNCS , vol.2429
    • Douceur, J.R.1
  • 8
    • 27144478012 scopus 로고    scopus 로고
    • Fiat, A., Saia, J., Young, M.: Making Chord Robust to Byzantine Attacks. In: Brodal, G.S., Leonardi, S. (eds.) ESA 2005. LNCS, 3669, pp. 803-814. Springer, Heidelberg (2005)
    • Fiat, A., Saia, J., Young, M.: Making Chord Robust to Byzantine Attacks. In: Brodal, G.S., Leonardi, S. (eds.) ESA 2005. LNCS, vol. 3669, pp. 803-814. Springer, Heidelberg (2005)
  • 15
    • 79961032785 scopus 로고    scopus 로고
    • Availability for Structured Overlay Networks: Considerations for Simulation and a new Bound on Lookup Success
    • Reykjavik, Iceland October
    • Seedorf, J., Muus, C.: Availability for Structured Overlay Networks: Considerations for Simulation and a new Bound on Lookup Success. In: 12th Nordic Workshop on Secure IT-Systems - NordSec 2007, Reykjavik, Iceland (October 2007)
    • (2007) 12th Nordic Workshop on Secure IT-Systems - NordSec
    • Seedorf, J.1    Muus, C.2
  • 16
    • 77951438838 scopus 로고    scopus 로고
    • Singh, A., Castro, M., Druschel, P., Rowstron, A.: Defending against eclipse attacks on overlay networks. In: Proc. of the ACM SIGOPS European Workshop (September 2004)
    • Singh, A., Castro, M., Druschel, P., Rowstron, A.: Defending against eclipse attacks on overlay networks. In: Proc. of the ACM SIGOPS European Workshop (September 2004)
  • 18
    • 21644471550 scopus 로고    scopus 로고
    • Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
    • Tucson, Arizona, December 6-10, IEEE CS Press, Los Alamitos
    • Srivatsa, M., Liu, L.: Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis. In: Proc. of the 20th Annual Computer Security Applications Conference (ACSAC), Tucson, Arizona, December 6-10, 2004, pp. 251-261. IEEE CS Press, Los Alamitos (2004)
    • (2004) Proc. of the 20th Annual Computer Security Applications Conference (ACSAC) , pp. 251-261
    • Srivatsa, M.1    Liu, L.2
  • 19
    • 0037298256 scopus 로고    scopus 로고
    • Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. In: IEEE/ACM Transactions on Networking, February 2003, 11(1), IEEE Press, Los Alamitos (2003)
    • Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. In: IEEE/ACM Transactions on Networking, February 2003, vol. 11(1), IEEE Press, Los Alamitos (2003)
  • 20
    • 0742267177 scopus 로고    scopus 로고
    • Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.: Tapestry: A Resilient Global-Scale Overlay for Service Deployment. IEEE Journal on Selected Areas in Communications 22(1) (January 2004)
    • Zhao, B.Y., Huang, L., Stribling, J., Rhea, S.C., Joseph, A.D., Kubiatowicz, J.: Tapestry: A Resilient Global-Scale Overlay for Service Deployment. IEEE Journal on Selected Areas in Communications 22(1) (January 2004)


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.