-
1
-
-
70249113281
-
-
aMule network. http://www.amule.org.
-
aMule network. http://www.amule.org.
-
-
-
-
2
-
-
70249118444
-
-
Azureus. http://azureus.sourceforge.net.
-
Azureus
-
-
-
3
-
-
70249142756
-
-
BitComet. http://www.bitcomet.com.
-
BitComet
-
-
-
4
-
-
2442603590
-
Secure routing for structured peer-to-peer overlay networks
-
CASTRO, M., DRUSCHEL, P., GANESH, A., ROWSTRON, A., AND WALLACH, D. S. Secure routing for structured peer-to-peer overlay networks. In OSDI (2002).
-
(2002)
OSDI
-
-
CASTRO, M.1
DRUSCHEL, P.2
GANESH, A.3
ROWSTRON, A.4
WALLACH, D.S.5
-
5
-
-
10444287344
-
Planetlab: An overlay testbed for broad-coverage services
-
Commun. Rev
-
CHUN, B., CULLER, D., ROSCOE, T., BAVIER, A., PMETERSON, L., WAWRZONIAK, M., AND BOWMAN, M. Planetlab: an overlay testbed for broad-coverage services. Sigcomm Comput. Commun. Rev. (2003).
-
(2003)
Sigcomm Comput
-
-
CHUN, B.1
CULLER, D.2
ROSCOE, T.3
BAVIER, A.4
PMETERSON, L.5
WAWRZONIAK, M.6
BOWMAN, M.7
-
6
-
-
70949087670
-
Induced churn as shelter from routing table poisoning
-
CONDIE, T., KACHOLIA, V., SANKARARAMAN, S., HELLERSTEIN, J., AND MANIATIS, P. Induced churn as shelter from routing table poisoning. In NDSS (2006).
-
(2006)
NDSS
-
-
CONDIE, T.1
KACHOLIA, V.2
SANKARARAMAN, S.3
HELLERSTEIN, J.4
MANIATIS, P.5
-
7
-
-
33749992316
-
Sybil resistant DHT routing
-
DANEZIS, G., LESNIEWSKI-LAAS, C., KAASHOEK, M. F., AND ANDERSON, R. Sybil resistant DHT routing. In ESORICS (2005).
-
(2005)
ESORICS
-
-
DANEZIS, G.1
LESNIEWSKI-LAAS, C.2
KAASHOEK, M.F.3
ANDERSON, R.4
-
8
-
-
84876215464
-
Bottorrent: Misusing BitTorrent to Launch DDoS Attacks
-
June
-
DEFRAWY, K. E., GJOKA, M., AND MARKOPOULOU, A. Bottorrent: Misusing BitTorrent to Launch DDoS Attacks. In Usenix SRUTI (June 2007).
-
(2007)
Usenix SRUTI
-
-
DEFRAWY, K.E.1
GJOKA, M.2
MARKOPOULOU, A.3
-
10
-
-
70249099469
-
-
eDonkey network. http://www.edonkey2000.com.
-
eDonkey network. http://www.edonkey2000.com.
-
-
-
-
11
-
-
70249132439
-
-
eMule network. http://www.emule-project.net.
-
eMule network. http://www.emule-project.net.
-
-
-
-
12
-
-
84968779644
-
Censorship resistant peer-to-peer content addressable networks
-
FIAT, A., AND SAIA, J. Censorship resistant peer-to-peer content addressable networks. In SODA (2002).
-
(2002)
SODA
-
-
FIAT, A.1
SAIA, J.2
-
13
-
-
70249145709
-
-
FIAT, A., SAIA, J., AND YOUNG, M. Making chord robust to byzantine attacks. In ESA (2005).
-
FIAT, A., SAIA, J., AND YOUNG, M. Making chord robust to byzantine attacks. In ESA (2005).
-
-
-
-
15
-
-
7444263935
-
Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks
-
HILDRUM, K., AND KUBIATOWICZ, J. Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks. In DISC (2003).
-
(2003)
DISC
-
-
HILDRUM, K.1
KUBIATOWICZ, J.2
-
16
-
-
25844529486
-
Pollution in P2P file sharing systems
-
LIANG, J., KUMAR, R., XI, Y., AND ROSS, K. W. Pollution in P2P file sharing systems. In INFOCOM 05 (2005).
-
(2005)
INFOCOM 05
-
-
LIANG, J.1
KUMAR, R.2
XI, Y.3
ROSS, K.W.4
-
17
-
-
84864562776
-
Atomic data access in content addressable networks
-
LYNCH, N., MALKHI, D., AND RATAJCZAK, D. Atomic data access in content addressable networks. In IPTPS (2002).
-
(2002)
IPTPS
-
-
LYNCH, N.1
MALKHI, D.2
RATAJCZAK, D.3
-
18
-
-
70249139027
-
-
Mainline. http://www.bittorrent.com.
-
Mainline
-
-
-
19
-
-
70249115968
-
-
MARTI, S., GANESAN, P., AND GARCIA-MOLINA, H. DHT Routing Using Social Links. In P2PDB (2004).
-
MARTI, S., GANESAN, P., AND GARCIA-MOLINA, H. DHT Routing Using Social Links. In P2PDB (2004).
-
-
-
-
20
-
-
2442421260
-
Kademlia: A peer-to-peer information system based on the xor metric
-
MAYMOUNKOV, P., AND MAZÍERES, D. Kademlia: A peer-to-peer information system based on the xor metric. In IPTPS (2001).
-
(2001)
IPTPS
-
-
MAYMOUNKOV, P.1
MAZÍERES, D.2
-
22
-
-
70249092441
-
-
Protocol Obfuscation. http://www.emule-project.net/home/perl/help.cgi?l= 1&rm=show-topic&topic-id=848.
-
Protocol Obfuscation
-
-
-
23
-
-
0012575754
-
Dynamically fault-tolerant content addressable networks
-
SAIA, J., FIAT, A., GRIBBLE, S., KARLIN, A., AND SAROIU, S. Dynamically fault-tolerant content addressable networks. In IPTPS (2002).
-
(2002)
IPTPS
-
-
SAIA, J.1
FIAT, A.2
GRIBBLE, S.3
KARLIN, A.4
SAROIU, S.5
-
24
-
-
77951438838
-
Defending against eclipse attacks on overlay networks
-
SINGH, A., CASTRO, M., DRUSCHEL, P., AND ROWSTRON, A. Defending against eclipse attacks on overlay networks. In EW11 (2004).
-
(2004)
EW11
-
-
SINGH, A.1
CASTRO, M.2
DRUSCHEL, P.3
ROWSTRON, A.4
-
25
-
-
34547492967
-
Eclipse attacks on overlay networks: Threats and defenses
-
SINGH, A., NGAN, T.-W. J., DRUSCHEL, P., AND WALLACH, D. S. Eclipse attacks on overlay networks: Threats and defenses. In Infocom (2006).
-
(2006)
Infocom
-
-
SINGH, A.1
NGAN, T.-W.J.2
DRUSCHEL, P.3
WALLACH, D.S.4
-
26
-
-
7444246627
-
Security Considerations for Peer-to-Peer Distributed Hash Tables
-
SIT, E., AND MORRIS, R. Security Considerations for Peer-to-Peer Distributed Hash Tables. In IPTPS (2002).
-
(2002)
IPTPS
-
-
SIT, E.1
MORRIS, R.2
-
28
-
-
77952321257
-
Load reduction in the KAD peer-to-peer system
-
Vienna, Austria Sep
-
STEINER, M., EFFELSBERG, W., EN NAJJARY, T., AND BIERSACK, E. W. Load reduction in the KAD peer-to-peer system. In DBISP2P 2007, 5th International Workshop on Databases, Information Systems and Peer-to-Peer Computing, September, 24, 2007, Vienna, Austria (Sep 2007).
-
(2007)
DBISP2P 2007, 5th International Workshop on Databases, Information Systems and Peer-to-Peer Computing, September, 24, 2007
-
-
STEINER, M.1
EFFELSBERG, W.2
EN NAJJARY, T.3
BIERSACK, E.W.4
-
29
-
-
64249116949
-
EURECOM+2358, Institut Eurecom
-
Analyzing peer behavior in KAD. Tech. Rep, France, Oct
-
STEINER, M., EN NAJJARY, T., AND BIERSACK, E. W. Analyzing peer behavior in KAD. Tech. Rep. EURECOM+2358, Institut Eurecom, France, Oct 2007.
-
(2007)
-
-
STEINER, M.1
EN NAJJARY, T.2
BIERSACK, E.W.3
-
30
-
-
42149134194
-
A global view of kad
-
New York, NY, USA, ACM, pp
-
STEINER, M., EN-NAJJARY, T., AND BIERSACK, E. W. A global view of kad. In IMC '07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement (New York, NY, USA, 2007), ACM, pp. 117-122.
-
(2007)
IMC '07: Proceedings of the 7th ACM SIGCOMM conference on Internet measurement
, pp. 117-122
-
-
STEINER, M.1
EN-NAJJARY, T.2
BIERSACK, E.W.3
-
31
-
-
38049024292
-
Improving lookup performance over a widely-deployed DHT
-
STUTZBACH, D., AND RVEJAIE, R. Improving lookup performance over a widely-deployed DHT. In Infocom 06 (2006).
-
(2006)
Infocom 06
-
-
STUTZBACH, D.1
RVEJAIE, R.2
|