-
1
-
-
61649109436
-
-
A. Bakker and M. van Steen. Security Aspects of the P2P-TV Client: A Secure Peer Sampling Service. D1.14Deliverable, Freehand I-Share project, Enschede, The Netherlands, Feb. 2008.
-
A. Bakker and M. van Steen. Security Aspects of the P2P-TV Client: A Secure Peer Sampling Service. D1.14Deliverable, Freehand I-Share project, Enschede, The Netherlands, Feb. 2008.
-
-
-
-
2
-
-
33748084385
-
-
Z. Bar-Yossef, R. Friedman, and A. Kama. RaWMS - Random Walk based Lightweight Membership Service for Wireless Ad Hoc Networks. In Proc. 7th ACM Int'l Symp. on Mobile AdHoc Networking and Computing (MobiHoc'06), Florence, Italy, May 2006.
-
Z. Bar-Yossef, R. Friedman, and A. Kama. RaWMS - Random Walk based Lightweight Membership Service for Wireless Ad Hoc Networks. In Proc. 7th ACM Int'l Symp. on Mobile AdHoc Networking and Computing (MobiHoc'06), Florence, Italy, May 2006.
-
-
-
-
3
-
-
57549096534
-
Brahms: Byzantine Resilient Random Membership Sampling
-
July
-
E. Bortnikov, M. Gurevich, I. Keidar, G. Kliot, and A. Shraer. Brahms: Byzantine Resilient Random Membership Sampling. In Proceedings 27th ACM Symp. on Principles of Distributed Computing (PODC'08), July 2008.
-
(2008)
Proceedings 27th ACM Symp. on Principles of Distributed Computing (PODC'08)
-
-
Bortnikov, E.1
Gurevich, M.2
Keidar, I.3
Kliot, G.4
Shraer, A.5
-
4
-
-
2442603590
-
Secure Routing for Structured Peer-to-peer Overlay Networks
-
Boston, MA, USA, Dec
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach. Secure Routing for Structured Peer-to-peer Overlay Networks. In Proc. 5th Symp. on Operating System Design and Implementation (OSDI'02), page 2990314, Boston, MA, USA, Dec. 2002.
-
(2002)
Proc. 5th Symp. on Operating System Design and Implementation (OSDI'02)
, pp. 2990314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
5
-
-
85030178366
-
Epidemic algorithms for replicated database maintenance
-
Vancouver, British Columbia, Canada, Aug
-
A. Demers, D. Greene, C. Hauser, W Irish, J. Larson, S. Shenker, H. Sturgis, D. Swinehart, and D. Terry. Epidemic algorithms for replicated database maintenance. In Proc. 6th annual ACM Symp. on Principles of Distributed Computing (PODC '87), pages 1-12, Vancouver, British Columbia, Canada, Aug. 1987.
-
(1987)
Proc. 6th annual ACM Symp. on Principles of Distributed Computing (PODC '87)
, pp. 1-12
-
-
Demers, A.1
Greene, D.2
Hauser, C.3
Irish, W.4
Larson, J.5
Shenker, S.6
Sturgis, H.7
Swinehart, D.8
Terry, D.9
-
7
-
-
84893488252
-
A modular paradigm, for building self-organizing peer-to-peer applications
-
Melbourne, Australia, Apr
-
M. Jelasity, A. Montresor, and O. Babaoglu. A modular paradigm, for building self-organizing peer-to-peer applications. In Proc. 1st Int'l Workshop on Engineering Self-Organizing Applications (ESOA'03), Melbourne, Australia, Apr. 2003.
-
(2003)
Proc. 1st Int'l Workshop on Engineering Self-Organizing Applications (ESOA'03)
-
-
Jelasity, M.1
Montresor, A.2
Babaoglu, O.3
-
8
-
-
84861256450
-
Detection and Removal of Malicious Peers in Gossip-Based Protocols
-
Bertinoro, Italy, June
-
M. Jelasity, A. Montresor, and O. Babaoglu. Detection and Removal of Malicious Peers in Gossip-Based Protocols. In Proc. 2nd Bertinoro Workshop on Future Directions in Distributed Computing, Bertinoro, Italy, June 2004.
-
(2004)
Proc. 2nd Bertinoro Workshop on Future Directions in Distributed Computing
-
-
Jelasity, M.1
Montresor, A.2
Babaoglu, O.3
-
10
-
-
34548273006
-
Gossip-based Peer Sampling
-
Aug
-
M. Jelasity, S. Voulgaris, R. Guerraoui, A.-M. Kermarrec, and M. van Steen. Gossip-based Peer Sampling. ACM Trans. on Comp. Sys., 25(3), Aug. 2007.
-
(2007)
ACM Trans. on Comp. Sys
, Issue.3
, pp. 25
-
-
Jelasity, M.1
Voulgaris, S.2
Guerraoui, R.3
Kermarrec, A.-M.4
van Steen, M.5
-
11
-
-
61649088771
-
A Secure Peer Sampling Service as "Hub Attack" countermeasure
-
Technical Report UBLCS-2006-17, Dept. of Computer Science, University of Bologna, Italy, May
-
G.-P. Jesi, D. Gavida, C. Gamage, and M. van Steen. A Secure Peer Sampling Service as "Hub Attack" countermeasure. Technical Report UBLCS-2006-17, Dept. of Computer Science, University of Bologna, Italy, May 2006.
-
(2006)
-
-
Jesi, G.-P.1
Gavida, D.2
Gamage, C.3
van Steen, M.4
-
12
-
-
37049022604
-
Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service
-
Boston, MA, USA, June
-
G.-P. Jesi, D. Hales, and M. van Steen. Identifying Malicious Peers Before It's Too Late: A Decentralized Secure Peer Sampling Service. In Proc. 1st IEEE Int'l Conf. on Self-Adaptive and Self-Organizing Systems (SASO'07), Boston, MA, USA, June 2007.
-
(2007)
Proc. 1st IEEE Int'l Conf. on Self-Adaptive and Self-Organizing Systems (SASO'07)
-
-
Jesi, G.-P.1
Hales, D.2
van Steen, M.3
-
13
-
-
34748899427
-
Fireflies: Scalable Support for Intrusion-Tolerant Network Overlays
-
Leuven, Belgium, Apr
-
H. Johansen, A. Allavena, and R. van Renesse. Fireflies: Scalable Support for Intrusion-Tolerant Network Overlays. In Proc. Eurosys'06, Leuven, Belgium, Apr. 2006.
-
(2006)
Proc. Eurosys'06
-
-
Johansen, H.1
Allavena, A.2
van Renesse, R.3
-
14
-
-
84944878354
-
-
CRC Press, Boca Raton, FL, USA
-
A. Menezes, P. van Oorschot, and S. Vanstone. Handbook of Applied Cryptography. CRC Press, Boca Raton, FL, USA, 2001.
-
(2001)
Handbook of Applied Cryptography
-
-
Menezes, A.1
van Oorschot, P.2
Vanstone, S.3
-
15
-
-
34147099073
-
Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems
-
T. Peng, C. Leckie, and K. Ramamohanarao. Survey of Network-Based Defense Mechanisms Countering the DoS and DDoS Problems. ACM Comput. Surv., 39(1):3, 2007.
-
(2007)
ACM Comput. Surv
, vol.39
, Issue.1
, pp. 3
-
-
Peng, T.1
Leckie, C.2
Ramamohanarao, K.3
|