-
1
-
-
84958639277
-
-
Boneh and Franklin. Efficient generation of shared RSA keys. In Proceedings of the 17th Annual International Cryptology Conference (CRYPTO), 1294 of Lecture Notes in Computer Science. Springer-Verlag, 1997.
-
Boneh and Franklin. Efficient generation of shared RSA keys. In Proceedings of the 17th Annual International Cryptology Conference (CRYPTO), volume 1294 of Lecture Notes in Computer Science. Springer-Verlag, 1997.
-
-
-
-
3
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
Proceedings of the 5th ACM Symposium on Operating System Design and Implementation OSDI, ACM Press
-
Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh, Antony I. T. Rowstron, and Dan S. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proceedings of the 5th ACM Symposium on Operating System Design and Implementation (OSDI), Operating Systems Review, pages 299-314. ACM Press, 2002.
-
(2002)
Operating Systems Review
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.J.3
Rowstron, A.I.T.4
Wallach, D.S.5
-
4
-
-
84947273682
-
The sybil attack
-
Peter Dr-uschel, M. Frans Kaashoek, and Antony I. T. Row-stron, editors, Proceedings of the International Workshop on Peer-to-Peer Systems IPTPS, of, Springer-Verlag
-
John R. Douceur. The sybil attack. In Peter Dr-uschel, M. Frans Kaashoek, and Antony I. T. Row-stron, editors, Proceedings of the International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer Science, pages 251-260. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
6
-
-
0034581037
-
Ten risks of PKI: What you're not being told about public-key infrastructure
-
C. Ellison and B. Schneier. Ten risks of PKI: What you're not being told about public-key infrastructure. Computer Security Journal, 16(1):1-7, 2000.
-
(2000)
Computer Security Journal
, vol.16
, Issue.1
, pp. 1-7
-
-
Ellison, C.1
Schneier, B.2
-
8
-
-
49949084638
-
A Distributed certification system for structured P2P networks
-
Proceedings of the 2nd International Conference on Autonomous Infrastructure, Management and Security AIMS, of, Springer-Verlag
-
François Lesueur, Ludovic Mé, and Valérie Viet Triem Tong. A Distributed certification system for structured P2P networks. In Proceedings of the 2nd International Conference on Autonomous Infrastructure, Management and Security (AIMS), volume 5127 of Lecture Notes in Computer Science, pages 40-52. Springer-Verlag, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5127
, pp. 40-52
-
-
Lesueur, F.1
Mé, L.2
Viet, V.3
Tong, T.4
-
11
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
Luigi Rizzo, Tom Anderson, and Nick McKeown, editors, ACM Press
-
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman. Sybilguard: defending against sybil attacks via social networks. In Luigi Rizzo, Tom Anderson, and Nick McKeown, editors, Proceedings of the ACM SIGCOMM Conference (SIG-COMM), pages 267-278. ACM Press, 2006.
-
(2006)
Proceedings of the ACM SIGCOMM Conference (SIG-COMM)
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
-
12
-
-
35548992569
-
Sybilguard: Defending against sybil attacks via social networks
-
Technical Report IRP-TR-06-01, Intel Research Pittsburgh, Also available at
-
Haifeng Yu, Michael Kaminsky, Phillip B. Gibbons, and Abraham Flaxman. Sybilguard: defending against sybil attacks via social networks. Technical Report IRP-TR-06-01, Intel Research Pittsburgh, 2006. Also available at http://www.comp.nus.edu.sg/~yuhf/sybilguard-tr.pdf.
-
(2006)
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|