-
1
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
ACM, New York
-
Castro, M., Druschel, P., Ganesh, A., Rowstron, A., Wallach, D.S.: Secure routing for structured peer-to-peer overlay networks. In: OSDI 2002: Proceedings of the 5th symposium on Operating systems design and implementation, pp. 299-314. ACM, New York (2002)
-
(2002)
OSDI 2002: Proceedings of the 5th symposium on Operating systems design and implementation
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
2
-
-
33750953996
-
Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration
-
Washington, DC, USA, pp, IEEE Computer Society, Los Alamitos
-
Dinger, J., Hartenstein, H.: Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration. In: ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security, Washington, DC, USA, pp. 756-763. IEEE Computer Society, Los Alamitos (2006)
-
(2006)
ARES 2006: Proceedings of the First International Conference on Availability, Reliability and Security
, pp. 756-763
-
-
Dinger, J.1
Hartenstein, H.2
-
3
-
-
84947273682
-
The sybil attack
-
Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
-
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 251-260. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 251-260
-
-
Douceur, J.R.1
-
5
-
-
84947235017
-
Kademlia: A peer-to-peer information system based on the xor metric
-
Druschel, P, Kaashoek, M.F, Rowstron, A, eds, IPTPS 2002, Springer, Heidelberg
-
Maymounkov, P., Mazieres, D.: Kademlia: A peer-to-peer information system based on the xor metric. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol. 2429, pp. 53-65. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 53-65
-
-
Maymounkov, P.1
Mazieres, D.2
-
6
-
-
84929888492
-
Attacking the kad network
-
Istanbul, Turkey. ACM, New York
-
Chan-Tin, E., Malchow, T., Kune, D.F., Hopper, N., Kim, Y., Wang, P., Tyra, J.: Attacking the kad network. In: SecureComm 2008: the 4th International Conference on Security and Privacy in Communication Networks, Istanbul, Turkey. ACM, New York (2008)
-
(2008)
SecureComm 2008: The 4th International Conference on Security and Privacy in Communication Networks
-
-
Chan-Tin, E.1
Malchow, T.2
Kune, D.F.3
Hopper, N.4
Kim, Y.5
Wang, P.6
Tyra, J.7
-
7
-
-
34548349212
-
Limiting sybil attacks in structured p2p networks
-
IEEE, Los Alamitos
-
Rowaihy, H., Enck, W., McDaniel, P., La Porta, T.: Limiting sybil attacks in structured p2p networks. In: 26th IEEE International Conference on Computer Communications, INFOCOM 2007, pp. 2596-2600. IEEE, Los Alamitos (2007)
-
(2007)
26th IEEE International Conference on Computer Communications, INFOCOM
, pp. 2596-2600
-
-
Rowaihy, H.1
Enck, W.2
McDaniel, P.3
La Porta, T.4
-
8
-
-
77951438838
-
Defending against eclipse attacks on overlay networks
-
ACM, New York
-
Singh, A., Castro, M., Druschel, P., Rowstron, A.: Defending against eclipse attacks on overlay networks. In: EW11: Proceedings of the 11th workshop on ACM SIGOPS European workshop, p. 21. ACM, New York (2004)
-
(2004)
EW11: Proceedings of the 11th workshop on ACM SIGOPS European workshop
, pp. 21
-
-
Singh, A.1
Castro, M.2
Druschel, P.3
Rowstron, A.4
-
9
-
-
84876244094
-
Exploiting KAD: Possible uses and misuses
-
October
-
Steiner, M., Najjary, T.E., Biersack, E.W.: Exploiting KAD: possible uses and misuses. Computer communications review 37(5) (October 2007)
-
(2007)
Computer communications review
, vol.37
, Issue.5
-
-
Steiner, M.1
Najjary, T.E.2
Biersack, E.W.3
-
10
-
-
33750285481
-
-
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. SIGCOMM Comput. Com. Rev. 36(4), 267-278 (2006)
-
Yu, H., Kaminsky, M., Gibbons, P.B., Flaxman, A.: Sybilguard: defending against sybil attacks via social networks. SIGCOMM Comput. Com. Rev. 36(4), 267-278 (2006)
-
-
-
|