메뉴 건너뛰기




Volumn , Issue , 2008, Pages 934-941

Bypass: Providing secure DHT routing through bypassing malicious peers

Author keywords

[No Author keywords available]

Indexed keywords

DISTRIBUTED COMPUTER SYSTEMS; ROUTING PROTOCOLS;

EID: 55849135611     PISSN: 15301346     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ISCC.2008.4625618     Document Type: Conference Paper
Times cited : (6)

References (7)
  • 1
    • 30144446253 scopus 로고    scopus 로고
    • A novel methodology for constructing secure multipath overlays
    • M. Artigas et. al. A novel methodology for constructing secure multipath overlays. IEEE Internet Computing, 9(6):50-57, 2005.
    • (2005) IEEE Internet Computing , vol.9 , Issue.6 , pp. 50-57
    • Artigas, M.1    et., al.2
  • 2
    • 84978382732 scopus 로고    scopus 로고
    • Secure routing for structured peer-to-peer overlay networks
    • M. Castro et. al. Secure routing for structured peer-to-peer overlay networks. SIGOPS Oper. Syst. Rev., 36(SI):299-314, 2002.
    • (2002) SIGOPS Oper. Syst. Rev , vol.36 , Issue.SI , pp. 299-314
    • Castro, M.1    et., al.2
  • 3
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
    • A. Rowstron and P. Druschel. Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Middleware'01, pages 329-350, 2001.
    • (2001) Middleware'01 , pp. 329-350
    • Rowstron, A.1    Druschel, P.2
  • 4
    • 55849110725 scopus 로고    scopus 로고
    • Defending against eclipse attacks on overlay networks
    • A. Singh et. al. Defending against eclipse attacks on overlay networks. In ACM EW11, page 21, 2004.
    • (2004) ACM , vol.EW11 , pp. 21
    • Singh, A.1    et., al.2
  • 5
    • 21644471550 scopus 로고    scopus 로고
    • Vulnerabilities and security threats in structured overlay networks: A quantitative analysis
    • M. Srivatsa and L. Liu. Vulnerabilities and security threats in structured overlay networks: A quantitative analysis. In ACSAC'04, pages 252-261, 2004.
    • (2004) ACSAC'04 , pp. 252-261
    • Srivatsa, M.1    Liu, L.2
  • 6
    • 33646831908 scopus 로고    scopus 로고
    • Trustguard: Countering vulnerabilities in reputation management for decentralized overlay networks
    • M. Srivatsa et. al. Trustguard: countering vulnerabilities in reputation management for decentralized overlay networks. In WWW'05, pages 422-431, 2005.
    • (2005) WWW'05 , pp. 422-431
    • Srivatsa, M.1    et., al.2
  • 7
    • 0037298256 scopus 로고    scopus 로고
    • Chord: A scalable peer-to-peer lookup protocol for internet applications
    • I. Stoica et. al. Chord: a scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Trans. Netw., 11(1):17-32, 2003.
    • (2003) IEEE/ACM Trans. Netw , vol.11 , Issue.1 , pp. 17-32
    • Stoica, I.1    et., al.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.