-
1
-
-
0038416064
-
-
J. Aspnes, G. Shah, Skip graphs, in: Proc. of the 14th ACM Symp. on Discrete Algorithms, SODA, 2003, pp. 384-393
-
J. Aspnes, G. Shah, Skip graphs, in: Proc. of the 14th ACM Symp. on Discrete Algorithms, SODA, 2003, pp. 384-393
-
-
-
-
2
-
-
58549103068
-
-
B. Awerbuch, C. Scheideler, Group Spreading: A protocol for provably secure distributed name service, in: Proc. of the 31st International Colloquium on Automata, Languages and Programming, ICALP, 2004
-
B. Awerbuch, C. Scheideler, Group Spreading: A protocol for provably secure distributed name service, in: Proc. of the 31st International Colloquium on Automata, Languages and Programming, ICALP, 2004
-
-
-
-
3
-
-
58549085931
-
-
B. Awerbuch, C. Scheideler, Robust distributed name service, in: Proc. of the 3rd International Workshop on Peer-to-Peer Systems, IPTPS, 2004
-
B. Awerbuch, C. Scheideler, Robust distributed name service, in: Proc. of the 3rd International Workshop on Peer-to-Peer Systems, IPTPS, 2004
-
-
-
-
4
-
-
33749571809
-
-
B. Awerbuch, C. Scheideler, Towards a scalable and robust DHT, in: Proc. of the 18th ACM Symp. on Parallel Algorithms and Architectures, SPAA, 2006. See also http://www14.in.tum.de/personen/scheideler
-
B. Awerbuch, C. Scheideler, Towards a scalable and robust DHT, in: Proc. of the 18th ACM Symp. on Parallel Algorithms and Architectures, SPAA, 2006. See also http://www14.in.tum.de/personen/scheideler
-
-
-
-
5
-
-
85008184918
-
-
M. Ben-Or, B. Kelmer, T. Rabin, Asynchronous secure computations with optimal resilience, in: Proc. of the 13th ACM Symp. on Principles of Distributed Computing, PODC, 1994, pp. 183-192
-
M. Ben-Or, B. Kelmer, T. Rabin, Asynchronous secure computations with optimal resilience, in: Proc. of the 13th ACM Symp. on Principles of Distributed Computing, PODC, 1994, pp. 183-192
-
-
-
-
6
-
-
58549113328
-
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, D. Wallach, Security for structured peer-to-peer overlay networks, in: Proc. of the 5th Usenix Symp. on Operating Systems Design and Implementation, OSDI, 2002
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, D. Wallach, Security for structured peer-to-peer overlay networks, in: Proc. of the 5th Usenix Symp. on Operating Systems Design and Implementation, OSDI, 2002
-
-
-
-
7
-
-
58549110406
-
-
M. Castro, B. Liskov, Practical Byzantine fault tolerance, in: Proc. of the 2nd Usenix Symp. on Operating Systems Design and Implementation, OSDI, 1999
-
M. Castro, B. Liskov, Practical Byzantine fault tolerance, in: Proc. of the 2nd Usenix Symp. on Operating Systems Design and Implementation, OSDI, 1999
-
-
-
-
8
-
-
85010849899
-
Denial of service via algorithmic complexity attacks
-
Crosby S., and Wallach D. Denial of service via algorithmic complexity attacks. Usenix Security (2003)
-
(2003)
Usenix Security
-
-
Crosby, S.1
Wallach, D.2
-
9
-
-
58549116668
-
-
J.R. Douceur, The sybil attack, in: Proc. of the 1st International Workshop on Peer-to-Peer Systems, IPTPS, 2002
-
J.R. Douceur, The sybil attack, in: Proc. of the 1st International Workshop on Peer-to-Peer Systems, IPTPS, 2002
-
-
-
-
10
-
-
58549115025
-
-
D. Dubhashi, A. Panconesi, Concentration of measure for the analysis of randomized algorithms, Unpublished manuscript. Accessible via http://www.cs.unibo.it/~pancones/papers.html, October 20, 1998
-
D. Dubhashi, A. Panconesi, Concentration of measure for the analysis of randomized algorithms, Unpublished manuscript. Accessible via http://www.cs.unibo.it/~pancones/papers.html, October 20, 1998
-
-
-
-
11
-
-
58549099438
-
-
A. Fiat, J. Saia, M. Young, Making chord robust to Byzantine attacks, in: Proc. of the European Symposium on Algorithms, ESA, 2005
-
A. Fiat, J. Saia, M. Young, Making chord robust to Byzantine attacks, in: Proc. of the European Symposium on Algorithms, ESA, 2005
-
-
-
-
12
-
-
0003649439
-
-
Springer-Verlag
-
Goldreich O. Modern Cryptography, Probabilistic Proofs and Pseudorandomness. Algorithms and Combinatorics vol. 17 (1998), Springer-Verlag
-
(1998)
Algorithms and Combinatorics
, vol.17
-
-
Goldreich, O.1
-
13
-
-
58549098214
-
-
S. Halevi, S. Micali, Practical and provably-secure commitment schemes from collision-free hashing, in: CRYPTO 96, 1996, pp. 201-215
-
S. Halevi, S. Micali, Practical and provably-secure commitment schemes from collision-free hashing, in: CRYPTO 96, 1996, pp. 201-215
-
-
-
-
14
-
-
0030704545
-
-
D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, R. Panigrahi, Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web, in: 29th ACM Symp. on Theory of Computing, STOC, 1997, pp. 654-663
-
D. Karger, E. Lehman, T. Leighton, M. Levine, D. Lewin, R. Panigrahi, Consistent hashing and random trees: Distributed caching protocols for relieving hot spots on the World Wide Web, in: 29th ACM Symp. on Theory of Computing, STOC, 1997, pp. 654-663
-
-
-
-
15
-
-
38049008242
-
-
V. King, J. Saia, V. Sanwalani, E. Vee, Towards a secure and scalable computation in peer-to-peer networks, in: Proc. of the 47th IEEE Symp. on Foundations of Computer Science, FOCS, 2006
-
V. King, J. Saia, V. Sanwalani, E. Vee, Towards a secure and scalable computation in peer-to-peer networks, in: Proc. of the 47th IEEE Symp. on Foundations of Computer Science, FOCS, 2006
-
-
-
-
16
-
-
58549095212
-
-
F. Kuhn, S. Schmid, R. Wattenhofer, A self-repairing peer-to-peer system resilient to dynamic adversarial churn, in: Proc. of the 4th International Workshop on Peer-to-Peer Systems, IPTPS, 2005
-
F. Kuhn, S. Schmid, R. Wattenhofer, A self-repairing peer-to-peer system resilient to dynamic adversarial churn, in: Proc. of the 4th International Workshop on Peer-to-Peer Systems, IPTPS, 2005
-
-
-
-
18
-
-
0000672724
-
Concentration
-
Habib M., McDiarmid C., Ramirez-Alfonsin J., and Reed B. (Eds), Springer Verlag, Berlin
-
McDiarmid. Concentration. In: Habib M., McDiarmid C., Ramirez-Alfonsin J., and Reed B. (Eds). Probabilistic Methods for Algorithmic Discrete Mathematics (1998), Springer Verlag, Berlin 195-247
-
(1998)
Probabilistic Methods for Algorithmic Discrete Mathematics
, pp. 195-247
-
-
McDiarmid1
-
19
-
-
0001448484
-
Bit commitment using pseudorandomness
-
Naor M. Bit commitment using pseudorandomness. Journal of Cryptology 4 2 (1991) 151-158
-
(1991)
Journal of Cryptology
, vol.4
, Issue.2
, pp. 151-158
-
-
Naor, M.1
-
20
-
-
0037703386
-
-
M. Naor, U. Wieder, Novel architectures for P2P applications: The continuous-discrete approach, in: Proc. of the 15th ACM Symp. on Parallel Algorithms and Architectures, SPAA, 2003
-
M. Naor, U. Wieder, Novel architectures for P2P applications: The continuous-discrete approach, in: Proc. of the 15th ACM Symp. on Parallel Algorithms and Architectures, SPAA, 2003
-
-
-
-
21
-
-
58549106531
-
-
S. Nielson, S. Crosby, D. Wallach, Kill the messenger: A taxonomy of rational attacks, in: Proc. of the 4th International Workshop on Peer-to-Peer Systems, IPTPS, 2005
-
S. Nielson, S. Crosby, D. Wallach, Kill the messenger: A taxonomy of rational attacks, in: Proc. of the 4th International Workshop on Peer-to-Peer Systems, IPTPS, 2005
-
-
-
-
22
-
-
0030652065
-
-
G. Plaxton, R. Rajaraman, A.W. Richa, Accessing nearby copies of replicated objects in a distributed environment, in: Proc. of the 9th ACM Symp. on Parallel Algorithms and Architectures, SPAA, 1997, pp. 311-320
-
G. Plaxton, R. Rajaraman, A.W. Richa, Accessing nearby copies of replicated objects in a distributed environment, in: Proc. of the 9th ACM Symp. on Parallel Algorithms and Architectures, SPAA, 1997, pp. 311-320
-
-
-
-
23
-
-
58549094876
-
-
H.V. Ramasamy, C. Cachin, Parsimonious asynchronous Byzantine-fault-tolerant atomic broadcast, in: 9th Conference on Principles of Distributed Systems, OPODIS, 2005, pp. 88-102
-
H.V. Ramasamy, C. Cachin, Parsimonious asynchronous Byzantine-fault-tolerant atomic broadcast, in: 9th Conference on Principles of Distributed Systems, OPODIS, 2005, pp. 88-102
-
-
-
-
24
-
-
85091111009
-
-
S. Rhea, D. Geels, T. Roscoe, J. Kubiatowicz, Handling churn in a DHT, in: USENIX Annual Technical Conference, 2004
-
S. Rhea, D. Geels, T. Roscoe, J. Kubiatowicz, Handling churn in a DHT, in: USENIX Annual Technical Conference, 2004
-
-
-
-
25
-
-
58549095616
-
-
T. Ritter, RNG implementations: A literature survey. http://www.ciphersbyritter.com/RES/RNGENS.HTM
-
T. Ritter, RNG implementations: A literature survey. http://www.ciphersbyritter.com/RES/RNGENS.HTM
-
-
-
-
26
-
-
58549090083
-
-
J. Saia, A. Fiat, S. Gribble, A. Karlin, S. Saroiu, Dynamically fault-tolerant content addressable networks, in: Proc. of the 1st International Workshop on Peer-to-Peer Systems, IPTPS, 2002
-
J. Saia, A. Fiat, S. Gribble, A. Karlin, S. Saroiu, Dynamically fault-tolerant content addressable networks, in: Proc. of the 1st International Workshop on Peer-to-Peer Systems, IPTPS, 2002
-
-
-
-
27
-
-
58549096470
-
-
C. Scheideler, Probabilistic methods for coordination problems, HNI-Verlagsschriftenreihe 78, University of Paderborn, 2000. See also http://www14.in.tum.de/personen/scheideler
-
C. Scheideler, Probabilistic methods for coordination problems, HNI-Verlagsschriftenreihe 78, University of Paderborn, 2000. See also http://www14.in.tum.de/personen/scheideler
-
-
-
-
28
-
-
27144447960
-
-
C. Scheideler, How to spread adversarial nodes? Rotate! in: Proc. of the 37th ACM Symp. on Theory of Computing, STOC, 2005, pp. 704-713
-
C. Scheideler, How to spread adversarial nodes? Rotate! in: Proc. of the 37th ACM Symp. on Theory of Computing, STOC, 2005, pp. 704-713
-
-
-
-
29
-
-
77951438838
-
-
A. Singh, M. Castro, A. Rowstron, P. Druschel, Defending against eclipse attacks on overlay networks, in: Proc. of the 11th ACM SIGOPS European Workshop, 2004
-
A. Singh, M. Castro, A. Rowstron, P. Druschel, Defending against eclipse attacks on overlay networks, in: Proc. of the 11th ACM SIGOPS European Workshop, 2004
-
-
-
-
30
-
-
58549090679
-
-
E. Sit, R. Morris, Security considerations for peer-to-peer distributed hash tables, in: Proc. of 1st International Workshop on Peer-to-Peer Systems, IPTPS, 2002
-
E. Sit, R. Morris, Security considerations for peer-to-peer distributed hash tables, in: Proc. of 1st International Workshop on Peer-to-Peer Systems, IPTPS, 2002
-
-
-
-
31
-
-
84947784853
-
-
K. Srinathan, C.P. Rangan, Efficient asynchronous secure multiparty distributed computation, in: Proc. of the 1st Int. Conference on Progress in Cryptology, 2000, pp. 117-129
-
K. Srinathan, C.P. Rangan, Efficient asynchronous secure multiparty distributed computation, in: Proc. of the 1st Int. Conference on Progress in Cryptology, 2000, pp. 117-129
-
-
-
-
32
-
-
21644471550
-
-
M. Srivatsa, L. Liu, Vulnerabilities and security threats in structured overlay networks: A quantitative analysis, in: Proc. of the 20th IEEE Computer Security Applications Conference, ACSAC, 2004
-
M. Srivatsa, L. Liu, Vulnerabilities and security threats in structured overlay networks: A quantitative analysis, in: Proc. of the 20th IEEE Computer Security Applications Conference, ACSAC, 2004
-
-
-
-
33
-
-
58549091825
-
-
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for Internet applications, in: Proc. of the ACM SIGCOMM'01, 2001. See also http://www.pdos.lcs.mit.edu/chord/
-
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for Internet applications, in: Proc. of the ACM SIGCOMM'01, 2001. See also http://www.pdos.lcs.mit.edu/chord/
-
-
-
-
34
-
-
84944715747
-
-
J. Viega, Practical random number generation in software, in: Proc. of the 19th Annual Computer Security Applications Conference, 2003
-
J. Viega, Practical random number generation in software, in: Proc. of the 19th Annual Computer Security Applications Conference, 2003
-
-
-
|