-
1
-
-
84864159532
-
-
Napster
-
Napster (2008) Napster homepage. http://www.napster.com
-
(2008)
Napster Homepage
-
-
-
2
-
-
84864159980
-
-
Gnutella
-
Gnutella (2008) Gnutella homepage. http://www.gnutella.com
-
(2008)
Gnutella Homepage
-
-
-
3
-
-
84864158153
-
-
Kazaa
-
Kazaa (2008) Kazaa homepage. http://www.kazaa.com
-
(2008)
Kazaa Homepage
-
-
-
5
-
-
33744479345
-
Freenet: A distributed anonymous information storage and retrieval system
-
Springer Heidelberg
-
Clarke I, Sandberg O, Wiley B, Hong TW (2000) Freenet: a distributed anonymous information storage and retrieval system. In: Proc. of the ICSI workshop on design issues in anonymity and unobservability. Springer, Heidelberg, pp 46-66
-
(2000)
Proc. of the ICSI Workshop on Design Issues in Anonymity and Unobservability
, pp. 46-66
-
-
Clarke, I.1
Sandberg, O.2
Wiley, B.3
Hong, T.W.4
-
6
-
-
33645418463
-
Safe and private data sharing with turtle: Friends team-up and beat the system
-
Cambridge, 26-28 April 2004
-
Popescu BC, Crispo B, Tanenbaum AS (2004) Safe and private data sharing with turtle: friends team-up and beat the system. In: Proc of the 12th Cambridge international workshop on security protocols, Cambridge, 26-28 April 2004, pp 213-220
-
(2004)
Proc of the 12th Cambridge International Workshop on Security Protocols
, pp. 213-220
-
-
Popescu, B.C.1
Crispo, B.2
Tanenbaum, A.S.3
-
9
-
-
0036499242
-
Sabotage-tolerance mechanisms for volunteer computing systems
-
4
-
LFG Sarmenta 2002 Sabotage-tolerance mechanisms for volunteer computing systems Future Gener Comput Syst 18 4 561 572
-
(2002)
Future Gener Comput Syst
, vol.18
, pp. 561-572
-
-
Sarmenta, L.F.G.1
-
10
-
-
0028741835
-
Voting algorithms
-
4
-
B Parhami 1994 Voting algorithms IEEE Trans Reliab 43 4 617 629
-
(1994)
IEEE Trans Reliab
, vol.43
, pp. 617-629
-
-
Parhami, B.1
-
15
-
-
84947273682
-
The sybil attack
-
Springer Heidelberg
-
Douceur JR (2002) The sybil attack. In: Druschel P, Kaashoek MF, Rowstron AIT (eds) Proc of the international workshop on peer-to-peer systems (IPTPS02), Lecture Notes in Computer Science, vol 2429. Springer, Heidelberg, pp 251-260
-
(2002)
Proc of the International Workshop on Peer-to-peer Systems (IPTPS02), Lecture Notes in Computer Science, Vol 2429
, pp. 251-260
-
-
Douceur, J.R.1
Druschel, P.2
Kaashoek, M.F.3
Rowstron, A.I.T.4
-
16
-
-
33750953996
-
Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration.
-
Vienna, 20-22 April 2006
-
Dinger J, Hartenstein H (2006) Defending the sybil attack in p2p networks: taxonomy, challenges, and a proposal for self-registration. In: ARES, Vienna, 20-22 April 2006, pp 756-763
-
(2006)
ARES
, pp. 756-763
-
-
Dinger, J.1
Hartenstein, H.2
-
18
-
-
84871044906
-
Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior
-
ACM New York
-
Dellarocas C (2000) Immunizing online reputation reporting systems against unfair ratings and discriminatory behavior. In: Proc of the 2nd ACM conference on electronic commerce. ACM, New York, pp 150-157
-
(2000)
Proc of the 2nd ACM Conference on Electronic Commerce
, pp. 150-157
-
-
Dellarocas, C.1
-
19
-
-
19944368437
-
Shilling recommender systems for fun and profit
-
New York, 17-20 May 2004
-
Lam SK, Riedl J (2004) Shilling recommender systems for fun and profit. In: WWW, New York, 17-20 May 2004, pp 393-402
-
(2004)
WWW
, pp. 393-402
-
-
Lam, S.K.1
Riedl, J.2
-
20
-
-
3042744692
-
File distribution using a peer-to-peer network-a simulation study
-
1
-
K Zerfiridis H Karatza 2004 File distribution using a peer-to-peer network-a simulation study J Syst Softw 73 1 31 44
-
(2004)
J Syst Softw
, vol.73
, pp. 31-44
-
-
Zerfiridis, K.1
Karatza, H.2
-
22
-
-
84864155698
-
-
Verizon Business
-
Verizon Business (2008) Virus infected file sharing at kazaa. https://www.trusecure.com/cgi-bin/download.cgi?ESCD=W0152&file=wp-2004Virus. pdf. Acessed 29 December 2003
-
(2008)
Virus Infected File Sharing at Kazaa
-
-
|