-
1
-
-
30144446253
-
A novel methodology for constructing secure multipath overlays
-
Nov
-
M.S. Artigas, P.G. Lopez, A.F. Gomez Skarmeta, “A Novel Methodology for Constructing Secure Multipath Overlays,” IEEE Internet Computing, vol. 9, no. 6, pp. 50-7, Nov. 2005.
-
(2005)
IEEE Internet Computing
, vol.9
, Issue.6
, pp. 50-57
-
-
Artigas, M.S.1
Lopez, P.G.2
Gomez Skarmeta, A.F.3
-
2
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
Boston, Massachusetts,. Dec
-
M. Castro, P. Druschel, A. Ganesh, A. Rowston, D. Wallach, “Secure Routing for Structured Peer-to-Peer Overlay Networks,” In Proc. OSDI 02, Boston, Massachusetts, pp. 299-314, Dec. 2002.
-
(2002)
Proc. OSDI 02
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowston, A.4
Wallach, D.5
-
3
-
-
84947242606
-
Dynamic replica placement for scalable content delivery
-
Cambridge, Massachusetts,. Mar
-
Y. Chen, R. Katz, J. Kubiatowicz, “Dynamic Replica Placement for Scalable Content Delivery,” In Proc. IPTPS 02, Cambridge, Massachusetts, pp. 306-318, Mar. 2002.
-
(2002)
Proc. IPTPS 02
, pp. 306-318
-
-
Chen, Y.1
Katz, R.2
Kubiatowicz, J.3
-
4
-
-
0036041927
-
Wide-area cooperative storage with CFS
-
Banff, Canada,. Oct
-
F. Dabek, M.F. Kaashoek, D. Karger, R. Morris, I. Stoica, “Wide-area cooperative storage with CFS,” In Proc. ACM SOSP 01, Banff, Canada, pp. 202-215, Oct. 2001.
-
(2001)
Proc. ACM SOSP 01
, pp. 202-215
-
-
Dabek, F.1
Kaashoek, M.F.2
Karger, D.3
Morris, R.4
Stoica, I.5
-
5
-
-
84947273682
-
The sybil attack
-
Cambridge, Massachusetts,. Mar
-
J. Douceur, “The Sybil Attack,” In Proc. IPTPS 02, Cambridge, Massachusetts, pp. 251-260, Mar. 2002.
-
(2002)
Proc. IPTPS 02
, pp. 251-260
-
-
Douceur, J.1
-
6
-
-
0034823063
-
Large-scale simualtion of replica placement algorithms for a serverless distributed file System
-
Cincinnati, Ohio,. Aug
-
J. Douceur, R. Wattenhofer, “Large-scale Simualtion of Replica Placement Algorithms for a Serverless Distributed File System,” In Proc. MASCOTS 01, Cincinnati, Ohio, pp. 311-319, Aug. 2001.
-
(2001)
Proc. MASCOTS 01
, pp. 311-319
-
-
Douceur, J.1
Wattenhofer, R.2
-
7
-
-
33244496719
-
Denial-of-service resilience in peer-to-peer file sharing systems
-
Banff, Canada,. June
-
D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, E. Zwaenepoel, “Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems,” In Proc. ACM SIGMETRICS 05, Banff, Canada, pp. 38-49, June 2005.
-
(2005)
Proc. ACM SIGMETRICS 05
, pp. 38-49
-
-
Dumitriu, D.1
Knightly, E.2
Kuzmanovic, A.3
Stoica, I.4
Zwaenepoel, E.5
-
8
-
-
27944435841
-
On the impact of replica placement to the reliability of distributed block storage systems
-
Columbus, Ohio,. June
-
Q. Lian, W. Chen, Z. Zhang, “On the Impact of Replica Placement to the Reliability of Distributed Block Storage Systems,” In Proc. IEEE ICDCS 05, Columbus, Ohio, pp. 187-196, June 2005.
-
(2005)
Proc. IEEE ICDCS 05
, pp. 187-196
-
-
Lian, Q.1
Chen, W.2
Zhang, Z.3
-
9
-
-
51049096980
-
The effectiveness of realistic replication strategies on quality of availability for peer-to-peer systems
-
Linkoping, Sweden,. Sep
-
G. On, J. Schmitt, R. Steinmetz, “The Effectiveness of Realistic Replication Strategies on Quality of Availability for Peer-to-Peer Systems,” In Proc. IEEE P2P 03, Linkoping, Sweden, pp. 57-64, Sep. 2003.
-
(2003)
Proc. IEEE P2P 03
, pp. 57-64
-
-
On, G.1
Schmitt, J.2
Steinmetz, R.3
-
10
-
-
0030652065
-
Accessing nearby copies of replicated objects in a distributed environment
-
Rhode Island,. June
-
C.G. Plaxton, R. Rajaraman, A. Richa, “Accessing Nearby Copies of Replicated Objects in a Distributed Environment,” In Proc. ACM SPAA, Newport, Rhode Island, pp. 311-320, June 1997.
-
(1997)
Proc. ACM SPAA, Newport
, pp. 311-320
-
-
Plaxton, C.G.1
Rajaraman, R.2
Richa, A.3
-
11
-
-
2642519858
-
Mitigating routing misbehaviour of rational nodes in chord
-
Tokyo, Japan,. Jan
-
M. Portmann, S. Ardon, A. Seneviratne, “Mitigating Routing Misbehaviour of Rational Nodes in CHORD,” Symposium on Applications and the Internet 04, Tokyo, Japan, pp. 541-545, Jan. 2004.
-
(2004)
Symposium on Applications and the Internet 04
, pp. 541-545
-
-
Portmann, M.1
Ardon, S.2
Seneviratne, A.3
-
12
-
-
77951438838
-
Defending against eclipse attacks on overlay networks
-
Leuven, Belgium,. Sep
-
A. Singh, M. Castro, P. Druschel, A. Rowstron, “Defending Against Eclipse Attacks on Overlay Networks,” In Proc. ACM SIGOPS 04, Leuven, Belgium, pp. 115-120, Sep. 2004.
-
(2004)
Proc. ACM SIGOPS 04
, pp. 115-120
-
-
Singh, A.1
Castro, M.2
Druschel, P.3
Rowstron, A.4
-
13
-
-
84947265806
-
Security considerations for peer-to-peer distributed hash tables
-
Cambridge, Massachusetts,. Mar
-
E. Sit, R. Morris, “Security Considerations for Peer-to-Peer Distributed Hash Tables,” In Proc. IPTPS 02, Cambridge, Massachusetts, pp. 261-9, Mar. 2002.
-
(2002)
Proc. IPTPS 02
, pp. 261-269
-
-
Sit, E.1
Morris, R.2
-
14
-
-
21644471550
-
Vulnerabilities and security threats in structured peer-to-peer systems: A quantitative analysis
-
Tuscon, Arizona,. Dec
-
M. Srivatsa, L. Liu, “Vulnerabilities and Security Threats in Structured Peer-to-Peer Systems: A Quantitative Analysis,” In Proc. IEEE ACSAC 04, Tuscon, Arizona, pp.252-261, Dec. 2004.
-
(2004)
Proc. IEEE ACSAC 04
, pp. 252-261
-
-
Srivatsa, M.1
Liu, L.2
-
16
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
San Diego, California,. Aug
-
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, “Chord: A Scalable Peer-to-Peer Lookup Service for Internet Applications,” In Proc. ACM SIGCOMM 01, San Diego, California, pp. 149-160, Aug. 2001.
-
(2001)
Proc. ACM SIGCOMM 01
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
17
-
-
3242703749
-
A survey of peer-to-peer security issues
-
Tokyo, Japan,. Nov
-
D. Wallach, “A Survey of Peer-to-Peer Security Issues,” International Symposium on Software Security 02, Tokyo, Japan, pp. 42-57, Nov. 2002.
-
(2002)
International Symposium on Software Security 02
, pp. 42-57
-
-
Wallach, D.1
|