-
1
-
-
24144496767
-
Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks
-
D. Qiu and R. Srikant, "Modeling and Performance Analysis of BitTorrent-Like Peer-to-Peer Networks," Proc. ACM SIGCOMM, 2004.
-
(2004)
Proc. ACM SIGCOMM
-
-
Qiu, D.1
Srikant, R.2
-
2
-
-
36949037934
-
BubbleStorm: Resilient, Probabilistic, and Exhaustive Peer-to-Peer Search
-
W.W. Terpstra, J. Kangasharju, C. Leng, and A.P. Buchmann, "BubbleStorm: Resilient, Probabilistic, and Exhaustive Peer-to-Peer Search," Proc. ACM SIGCOMM, 2007.
-
(2007)
Proc. ACM SIGCOMM
-
-
Terpstra, W.W.1
Kangasharju, J.2
Leng, C.3
Buchmann, A.P.4
-
3
-
-
34548238659
-
Building a Scalable Bipartite P2P Overlay Network
-
Y. Liu, L. Xiao, and L.M. Ni, "Building a Scalable Bipartite P2P Overlay Network," IEEE Trans. Parallel and Distributed Systems, vol. 18, pp. 1296-1306, 2007.
-
(2007)
IEEE Trans. Parallel and Distributed Systems
, vol.18
, pp. 1296-1306
-
-
Liu, Y.1
Xiao, L.2
Ni, L.M.3
-
6
-
-
33645989774
-
Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups
-
P.P.C. Lee, J.C.S. Lui, and D.K.Y. Yau, "Distributed Collaborative Key Agreement and Authentication Protocols for Dynamic Peer Groups," IEEE/ACM Trans. Networking, vol. 14, pp. 263-276, 2006.
-
(2006)
IEEE/ACM Trans. Networking
, vol.14
, pp. 263-276
-
-
Lee, P.P.C.1
Lui, J.C.S.2
Yau, D.K.Y.3
-
7
-
-
0038011186
-
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks
-
E. Damiani, D.C.D. Vimercati, S. Paraboschi, P. Samarati, and F. Violante, "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," Proc. ACM Conf. Computer and Comm. Security (CCS), 2002.
-
(2002)
Proc. ACM Conf. Computer and Comm. Security (CCS)
-
-
Damiani, E.1
Vimercati, D.C.D.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
11
-
-
84942777041
-
XenoTrust: Event-Based Distributed Trust Management
-
B. Dragovic, E. Kotsovinos, S. Hand, and P. Pietzuch, "XenoTrust: Event-Based Distributed Trust Management," Proc. IEEE Trust and Privacy in Digital Business Workshop (TrustBus), 2003.
-
(2003)
Proc. IEEE Trust and Privacy in Digital Business Workshop (TrustBus)
-
-
Dragovic, B.1
Kotsovinos, E.2
Hand, S.3
Pietzuch, P.4
-
12
-
-
0024611659
-
The Knowledge Complexity of Interactive Proof Systems
-
S. Goldwasser, S. Micali, and C. Rackoff, "The Knowledge Complexity of Interactive Proof Systems," SIAM J. Computing, vol. 18, pp. 186-208, 1989.
-
(1989)
SIAM J. Computing
, vol.18
, pp. 186-208
-
-
Goldwasser, S.1
Micali, S.2
Rackoff, C.3
-
13
-
-
51649091246
-
Zero-Knowledge Authentication Scheme with Secret Key Exchange
-
J. Brandt, I.B. Damgard, P. Landrock, and T. Pedersen, "Zero-Knowledge Authentication Scheme with Secret Key Exchange," Proc. Advances in Cryptology (CRYPTO), 1990.
-
(1990)
Proc. Advances in Cryptology (CRYPTO)
-
-
Brandt, J.1
Damgard, I.B.2
Landrock, P.3
Pedersen, T.4
-
17
-
-
51649095725
-
-
FIPS PUB 186
-
Digital Signature Standard, FIPS PUB 186, http://csrc.nist.gov/ publications/fips/fips186-2/fips186-2-change1.pdf, 2007.
-
(2007)
Digital Signature Standard
-
-
-
19
-
-
34547319583
-
Anonymous Routing in Structured Peer-to-Peer Overlays,
-
PhD dissertation, Univ. of California, Berkeley, CA
-
N. Borisov, "Anonymous Routing in Structured Peer-to-Peer Overlays," PhD dissertation, Univ. of California, Berkeley, CA, 2005.
-
(2005)
-
-
Borisov, N.1
-
21
-
-
0003851399
-
-
in C, second ed. John Wiley & Sons, Inc
-
B. Schneier, Applied Cryptography - Protocols, Algorithms, and Source Coed in C, second ed. John Wiley & Sons, Inc., 1996.
-
(1996)
Applied Cryptography - Protocols, Algorithms, and Source Coed
-
-
Schneier, B.1
-
23
-
-
0000653210
-
Selecting Cryptographic Key Sizes
-
K. Lenstra and E.R. Verheul, "Selecting Cryptographic Key Sizes," J. Cryptology, vol. 14, pp. 255-293, 2001.
-
(2001)
J. Cryptology
, vol.14
, pp. 255-293
-
-
Lenstra, K.1
Verheul, E.R.2
-
25
-
-
51649100341
-
-
NTL
-
NTL, http://shoup.net/ntl/, 2007.
-
(2007)
-
-
-
26
-
-
51649116471
-
Anonymity and Security Analysis of Pseudo Trust
-
technique report
-
L. Lu, L. Hu, J. Li, J. Han, and Y. Liu, "Anonymity and Security Analysis of Pseudo Trust," technique report, http://www.cse.ust. hk/ ~liu/PseudoTrust.htm, 2007.
-
(2007)
-
-
Lu, L.1
Hu, L.2
Li, J.3
Han, J.4
Liu, Y.5
|