-
5
-
-
33744945767
-
Sos: Secure overlay services
-
August
-
A. D. Keromytis, V. Misra, and D. Rubenstein. Sos: Secure overlay services. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIG-COMM'02), August 2002.
-
(2002)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIG-COMM'02)
-
-
Keromytis, A.D.1
Misra, V.2
Rubenstein, D.3
-
7
-
-
0001983901
-
A scalable content addressable network
-
S. Ratnasamy, P. Francis, M. Haudley, R. Karp, and S. Shenker. A scalable content addressable network. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'01), pages 27-31, 2001.
-
(2001)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'01)
, pp. 27-31
-
-
Ratnasamy, S.1
Francis, P.2
Haudley, M.3
Karp, R.4
Shenker, S.5
-
10
-
-
33744901134
-
Internet indirection infrastructure
-
I. Stoica, D. Adkins, S. Zhuang, S. Shenker, and S. Surana. Internet indirection infrastructure. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'02), 2002.
-
(2002)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer Communications (SIGCOMM'02)
-
-
Stoica, I.1
Adkins, D.2
Zhuang, S.3
Shenker, S.4
Surana, S.5
-
11
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
I. Stoica, R. Morris, D. Karger, F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer communications (SIGCOMM'01), pages 149-160, 2001.
-
(2001)
Proceedings of the Conference on Applications, Technologies, Architectures, and Protocols for Computer communications (SIGCOMM'01)
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, F.4
Balakrishnan, H.5
-
12
-
-
2642565295
-
Using overlay networks to resist denial-of-service attacks
-
Technical report, CSE department, university of california, San Diego
-
J. Wang and A. A. Chien. Using overlay networks to resist denial-of-service attacks. Technical report, CSE department, university of california, San Diego, 2003.
-
(2003)
-
-
Wang, J.1
Chien, A.A.2
-
13
-
-
63249094481
-
Understanding when location-hiding using overlay networks is feasible
-
special issue on overlay distribution structures and their applications
-
J. Wang and A. A. Chien. Understanding when location-hiding using overlay networks is feasible. Elsevier Journal of Computer Networks, special issue on overlay distribution structures and their applications, 2005.
-
(2005)
Elsevier Journal of Computer Networks
-
-
Wang, J.1
Chien, A.A.2
|