-
1
-
-
67649892138
-
Peer-to-Peer Poisoners: A Tour of Media-Defender
-
Sept
-
N. Anderson, "Peer-to-Peer Poisoners: A Tour of Media-Defender," Ars Technica, Sept. 2007.
-
(2007)
Ars Technica
-
-
Anderson, N.1
-
2
-
-
67649888771
-
-
BitTorrent.org, BitTorrent Protocol Specification, http:// www.bittorrent.org/protocol.html, 2006.
-
BitTorrent.org, "BitTorrent Protocol Specification," http:// www.bittorrent.org/protocol.html, 2006.
-
-
-
-
3
-
-
13644274213
-
A Survey of Peer-to-Peer Content Distribution Technologies
-
S. Androutsellis-Theotokis and D. Spinellis, "A Survey of Peer-to-Peer Content Distribution Technologies," ACM Computing Surveys, vol. 36, pp. 335-371, 2004.
-
(2004)
ACM Computing Surveys
, vol.36
, pp. 335-371
-
-
Androutsellis-Theotokis, S.1
Spinellis, D.2
-
5
-
-
33645679814
-
Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-Demand Streaming Media Delivery
-
May
-
S. Chen and X.D. Zhang, "Design and Evaluation of a Scalable and Reliable P2P Assisted Proxy for On-Demand Streaming Media Delivery," IEEE Trans. Knowledge and Data Eng., vol. 18, no. 5, pp. 669-682, May 2006.
-
(2006)
IEEE Trans. Knowledge and Data Eng
, vol.18
, Issue.5
, pp. 669-682
-
-
Chen, S.1
Zhang, X.D.2
-
6
-
-
0029308984
-
Copyright Protection for Electronic Publishing over Computer Networks
-
May/June
-
A.K. Choudhury, N.F. Maxemchuk, S. Paul, and H.G. Schulzrinne, "Copyright Protection for Electronic Publishing over Computer Networks," IEEE Trans. Networking, vol. 9, no. 3, pp. 12-20, May/June 1995.
-
(1995)
IEEE Trans. Networking
, vol.9
, Issue.3
, pp. 12-20
-
-
Choudhury, A.K.1
Maxemchuk, N.F.2
Paul, S.3
Schulzrinne, H.G.4
-
7
-
-
30044436588
-
Content Availability, Pollution and Poisoning in File-Sharing P2P Networks
-
N. Christin, A.S. Weigend, and J. Chuang, "Content Availability, Pollution and Poisoning in File-Sharing P2P Networks," Proc. ACM Conf. e-Commerce, pp. 68-77, 2005.
-
(2005)
Proc. ACM Conf. e-Commerce
, pp. 68-77
-
-
Christin, N.1
Weigend, A.S.2
Chuang, J.3
-
8
-
-
0038011186
-
A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks
-
E. Damiani, D.C. di Vimercati, S. Paraboschi, P. Samarati, and F. Violante, "A Reputation-Based Approach for Choosing Reliable Resources in Peer-to-Peer Networks," Proc. ACM Conf. Computer and Comm. Security (CCS '02), pp. 207-216, 2002.
-
(2002)
Proc. ACM Conf. Computer and Comm. Security (CCS '02)
, pp. 207-216
-
-
Damiani, E.1
di Vimercati, D.C.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
9
-
-
33244496719
-
Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems
-
D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, "Denial-of-Service Resilience in Peer-to-Peer File Sharing Systems," Proc. Int'l Conf. Measurement and Modeling of Computer Systems, pp. 38-49, 2005.
-
(2005)
Proc. Int'l Conf. Measurement and Modeling of Computer Systems
, pp. 38-49
-
-
Dumitriu, D.1
Knightly, E.2
Kuzmanovic, A.3
Stoica, I.4
Zwaenepoel, W.5
-
10
-
-
1142268166
-
Comparing the Usage of Digital Rights Management Systems in the Music, Film, and Print Industry
-
M. Fetscherin and M. Schmid, "Comparing the Usage of Digital Rights Management Systems in the Music, Film, and Print Industry," Proc. Conf. e-Commerce, 2003.
-
(2003)
Proc. Conf. e-Commerce
-
-
Fetscherin, M.1
Schmid, M.2
-
12
-
-
21044436471
-
A Scalable P2P Architecture for Distributed Information Monitoring Applications
-
June
-
B. Gedik and L. Liu, "A Scalable P2P Architecture for Distributed Information Monitoring Applications," IEEE Trans. Computers, vol. 56, no. 6, pp. 767-782, June 2005.
-
(2005)
IEEE Trans. Computers
, vol.56
, Issue.6
, pp. 767-782
-
-
Gedik, B.1
Liu, L.2
-
13
-
-
34147104638
-
-
S.F. Kaufmann, ed
-
M. Hofmann and I. Beaumont, Content Networking, Architecture, Protocols, and Practice, S.F. Kaufmann, ed. 2005.
-
(2005)
Content Networking, Architecture, Protocols, and Practice
-
-
Hofmann, M.1
Beaumont, I.2
-
14
-
-
2642567074
-
Model Analysis of Digital Copyright Piracy on P2P Networks
-
Jan
-
Y. Itakura, M. Yokozawa, and T. Shinohara, "Model Analysis of Digital Copyright Piracy on P2P Networks," Proc. Int'l Symp. Applications and the Internet Workshops (SAINT), pp. 84-89, Jan. 2004.
-
(2004)
Proc. Int'l Symp. Applications and the Internet Workshops (SAINT)
, pp. 84-89
-
-
Itakura, Y.1
Yokozawa, M.2
Shinohara, T.3
-
15
-
-
84947305017
-
A DRM System Suitable for P2P Content Delivery and the Study on Its Implementation
-
Sept
-
T. Iwata, T. Abe, K. Ueda, and H. Sunaga, "A DRM System Suitable for P2P Content Delivery and the Study on Its Implementation," Proc. Asia-Pacific Conf. Comm. (APCC), vol. 2, pp. 806-811, Sept. 2003.
-
(2003)
Proc. Asia-Pacific Conf. Comm. (APCC)
, vol.2
, pp. 806-811
-
-
Iwata, T.1
Abe, T.2
Ueda, K.3
Sunaga, H.4
-
16
-
-
21244477834
-
Music2share - Copyright-Compliant Music Sharing in P2P Systems
-
June
-
T. Kalker, D.H.J. Epema, P.H. Hartel, R.L. Lagendijk, and M. Van Steen, "Music2share - Copyright-Compliant Music Sharing in P2P Systems," Proc. IEEE, vol. 92, no. 6, pp. 961-970, June 2004.
-
(2004)
Proc. IEEE
, vol.92
, Issue.6
, pp. 961-970
-
-
Kalker, T.1
Epema, D.H.J.2
Hartel, P.H.3
Lagendijk, R.L.4
Van Steen, M.5
-
18
-
-
33746629171
-
The eMule Protocol Specification,
-
Technical Report TR-2005-03, Hebrew Univ, Jan
-
Y. Kulbak and D. Bickson, "The eMule Protocol Specification," Technical Report TR-2005-03, Hebrew Univ., Jan. 2005.
-
(2005)
-
-
Kulbak, Y.1
Bickson, D.2
-
19
-
-
1342306801
-
Watermark-Based Copyright Protection System Security
-
Oct
-
S.H. Kwok, "Watermark-Based Copyright Protection System Security," Comm. ACM, pp. 98-101, Oct. 2003.
-
(2003)
Comm. ACM
, pp. 98-101
-
-
Kwok, S.H.1
-
20
-
-
34547468805
-
Rarest First and Choke Algorithms Are Enough
-
A. Legout, G. Urvoy-Keller, and P. Michiardi, "Rarest First and Choke Algorithms Are Enough," Proc. ACM Special Interest Group on Data Comm. on Internet Measure (SIGCOMM), pp. 203-216, 2006.
-
(2006)
Proc. ACM Special Interest Group on Data Comm. on Internet Measure (SIGCOMM)
, pp. 203-216
-
-
Legout, A.1
Urvoy-Keller, G.2
Michiardi, P.3
-
21
-
-
12344321434
-
Current and Emerging Requirements for Digital Rights Management Systems Through Examination of Business Networks
-
E. Luoma and H. Vahtera, "Current and Emerging Requirements for Digital Rights Management Systems Through Examination of Business Networks," Proc. 37th Ann. Hawai Int'l Conf. System Sciences, 2004.
-
(2004)
Proc. 37th Ann. Hawai Int'l Conf. System Sciences
-
-
Luoma, E.1
Vahtera, H.2
-
22
-
-
34548685468
-
-
Federal Trade Commission Report, June
-
D.P. Majoras, O. Swindle, T.B. Leary, and J. Harbour, "Peer-to-Peer File-Sharing Technology: Consumer Protection and Competition Issues," Federal Trade Commission Report, June 2005.
-
(2005)
Peer-to-Peer File-Sharing Technology: Consumer Protection and Competition Issues
-
-
Majoras, D.P.1
Swindle, O.2
Leary, T.B.3
Harbour, J.4
-
23
-
-
84904669909
-
P2P Flooder Overpeer Cease Operation,
-
Dec
-
N. Mook, "P2P Flooder Overpeer Cease Operation," Beta News, http://www.betanews.com/article/ P2P_Flooder_Overpeer_Ceases_Operation/1134249644, Dec. 2005.
-
(2005)
Beta News
-
-
Mook, N.1
-
24
-
-
67649870521
-
-
N. Mook, P2P Future Darkens as eDonkey Closes, http:// www.betanews.com/article/P2P_Future_Darkens_as_eDonkey_Closes/ 1127953242, Sept. 2005.
-
N. Mook, "P2P Future Darkens as eDonkey Closes," http:// www.betanews.com/article/P2P_Future_Darkens_as_eDonkey_Closes/ 1127953242, Sept. 2005.
-
-
-
-
25
-
-
33745196858
-
Insight and Perspectives for Content Delivery Networks
-
Jan
-
G. Pallis and A. Vakali, "Insight and Perspectives for Content Delivery Networks," Comm. ACM, pp. 101-106, Jan. 2006.
-
(2006)
Comm. ACM
, pp. 101-106
-
-
Pallis, G.1
Vakali, A.2
-
26
-
-
33847272260
-
On the Feasibility of Commercial Legal P2P Content Distribution
-
Jan
-
P. Rodriguez et al., "On the Feasibility of Commercial Legal P2P Content Distribution," SIGCOMM Computer Comm. Rev., vol. 36, no. 1, pp. 75-78, Jan. 2006.
-
(2006)
SIGCOMM Computer Comm. Rev
, vol.36
, Issue.1
, pp. 75-78
-
-
Rodriguez, P.1
-
27
-
-
84978370407
-
An Analysis of Internet Content Delivery Systems
-
S. Saroiu et al., "An Analysis of Internet Content Delivery Systems," SIGOPS Operating System Rev., pp. 315-327, 2002.
-
(2002)
SIGOPS Operating System Rev
, pp. 315-327
-
-
Saroiu, S.1
-
28
-
-
21644471550
-
Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis
-
M. Srivatsa and L. Liu, "Vulnerabilities and Security Threats in Structured Overlay Networks: A Quantitative Analysis," Proc. 20th Ann. Computer Security Applications Conf., 2004.
-
(2004)
Proc. 20th Ann. Computer Security Applications Conf
-
-
Srivatsa, M.1
Liu, L.2
-
29
-
-
33750947659
-
DRM Enabled P2P Architecture
-
Jan
-
J. Sung, J. Jeong, and K. Yoon, "DRM Enabled P2P Architecture," Proc. Eighth Int'l Conf. Advanced Comm. Technology (ICACT), vol. 1, pp. 487-490, Jan. 2006.
-
(2006)
Proc. Eighth Int'l Conf. Advanced Comm. Technology (ICACT)
, vol.1
, pp. 487-490
-
-
Sung, J.1
Jeong, J.2
Yoon, K.3
-
31
-
-
38149020006
-
Self-Organizing Content Distribution in a Data Indexed DHT Network
-
C. Wang, B.A. Alqaralleh, B.B. Zhou, F. Brites, and A.Y. Zomaya, "Self-Organizing Content Distribution in a Data Indexed DHT Network," Proc. Sixth IEEE Int'l Conf. P2P Computing, pp. 241-248, 2006.
-
(2006)
Proc. Sixth IEEE Int'l Conf. P2P Computing
, pp. 241-248
-
-
Wang, C.1
Alqaralleh, B.A.2
Zhou, B.B.3
Brites, F.4
Zomaya, A.Y.5
-
32
-
-
25844509360
-
Improving Unstructured P2P Systems by Adaptive Connection Establishment
-
Sept
-
L. Xiao, Y. Liu, and L.M. Ni, "Improving Unstructured P2P Systems by Adaptive Connection Establishment," IEEE Trans. Computers, vol. 54, no. 9, pp. 1091-1103, Sept. 2005.
-
(2005)
IEEE Trans. Computers
, vol.54
, Issue.9
, pp. 1091-1103
-
-
Xiao, L.1
Liu, Y.2
Ni, L.M.3
-
34
-
-
50649113248
-
GossipTrust for Fast Reputation Aggregation in P2P Networks
-
Sept
-
R. Zhou and K. Hwang, "GossipTrust for Fast Reputation Aggregation in P2P Networks," IEEE Trans. Knowledge and Data Eng., vol. 20, no. 9, pp. 1282-1295, Sept. 2008.
-
(2008)
IEEE Trans. Knowledge and Data Eng
, vol.20
, Issue.9
, pp. 1282-1295
-
-
Zhou, R.1
Hwang, K.2
|