-
1
-
-
70449439672
-
-
"Napster," http://www.napster.com/.
-
Napster
-
-
-
2
-
-
70449425690
-
-
"Kazaa," http://www.kazaa.com/.
-
Kazaa
-
-
-
4
-
-
13644274213
-
A survey of peer-to-peer content distribution technologies
-
S. Androutsellis-Theotokis and D. Spinellis, "A survey of peer-to-peer content distribution technologies," ACM Comput. Surv., vol.36, no.4, pp. 335-371, 2004.
-
(2004)
ACM Comput. Surv.
, vol.36
, Issue.4
, pp. 335-371
-
-
Androutsellis-Theotokis, S.1
Spinellis, D.2
-
5
-
-
70449421062
-
-
"Skype," http://www.skype.com/.
-
Skype
-
-
-
7
-
-
70449447356
-
-
"Joost," http://www.joost.com.
-
Joost
-
-
-
8
-
-
50649124978
-
-
"Coolstreaming," http://www.coolstreaming.us.
-
Coolstreaming
-
-
-
9
-
-
33750309882
-
An analysis of the skype peer-to-peer internet telephony protocol
-
April
-
S. Baset and H. Schulzrinne, "An analysis of the skype peer-to-peer internet telephony protocol," Infocom, April 2006.
-
(2006)
Infocom
-
-
Baset, S.1
Schulzrinne, H.2
-
10
-
-
33747801337
-
The bittorent P2P file-sharing system: Measurements and analysis
-
Feb.
-
J. A. Pouwelse, P. Garbacki, D. H. J. Epema, and H. J. Sips, "The bittorent P2P file-sharing system: Measurements and analysis," 4th International Workshop on Peer-to-Peer Systems, Feb. 2005.
-
(2005)
4th International Workshop on Peer-to-Peer Systems
-
-
Pouwelse, J.A.1
Garbacki, P.2
Epema, D.H.J.3
Sips, H.J.4
-
11
-
-
3242703749
-
A survey of peer-to-peer security issues
-
Online
-
D. S. Wallach, "A survey of peer-to-peer security issues," International Symposium on Software Security, pp. 42-57, 2002. [Online]. Available: http://www.cs.rice.edu/dwallach/pub/tokyo-p2p2002.pdf
-
(2002)
International Symposium on Software Security
, pp. 42-57
-
-
Wallach, D.S.1
-
13
-
-
0010390897
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, "Chord: A scalable peer-to-peer lookup service for internet applications," SIGCOMM, 2001.
-
(2001)
SIGCOMM
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
16
-
-
0010300145
-
A scalable content-addressable network
-
S. Ratnasamy, P. Francis, M. Handley, R. Karp, and S. Shenker, "A scalable content-addressable network," SIGCOMM, 2001.
-
(2001)
SIGCOMM
-
-
Ratnasamy, S.1
Francis, P.2
Handley, M.3
Karp, R.4
Shenker, S.5
-
17
-
-
70449444185
-
Bookie reveals 100,000 cost of denial-ofservice extortion attacks
-
Online
-
A. McCue, "Bookie reveals 100,000 cost of denial-ofservice extortion attacks," silicon.com, 2004. [Online]. Available: http://software.silicon. com/security/0,39024655,39121278,00.htm
-
(2004)
Silicon.com
-
-
McCue, A.1
-
19
-
-
25844529486
-
Pollution in p2p file sharing systems
-
Mar
-
J. Liang, R. Kumar, Y. Xi, and K. Ross, "Pollution in p2p file sharing systems," Infocom, Mar 2005.
-
(2005)
Infocom
-
-
Liang, J.1
Kumar, R.2
Xi, Y.3
Ross, K.4
-
20
-
-
84947273682
-
The sybil attack
-
Revised paper, Mar
-
J. R. Douceur, "The sybil attack," Revised paper, 1st International Workshop. Peer-to-Peer Systems, Lecture Notes in Computer Science, vol.2429, Mar 2002.
-
(2002)
1st International Workshop. Peer-to-Peer Systems, Lecture Notes in Computer Science
, vol.2429
-
-
Douceur, J.R.1
-
22
-
-
35248871185
-
Limiting sybil attacks in structured peer-to-peer networks
-
Jul
-
H. Rowaihy, W. Enck, P. McDaniel, and T. L. Porta, "Limiting sybil attacks in structured peer-to-peer networks," Technical Report NASTR-0017-2005, Network and Security Research Center, Department of Computer Science and Engineering, Jul 2005.
-
(2005)
Technical Report NASTR-0017-2005, Network and Security Research Center, Department of Computer Science and Engineering
-
-
Rowaihy, H.1
Enck, W.2
McDaniel, P.3
Porta, T.L.4
-
24
-
-
0035704362
-
Providing robust and ubiquitous security support for MANET
-
Nov
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang, "Providing robust and ubiquitous security support for MANET," International Conference on Network Protocols, Nov 2001.
-
(2001)
International Conference on Network Protocols
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
26
-
-
2942728016
-
Telling humans and computers apart automatically
-
L. von Ahn, M. Blum, and J. Langford, "Telling humans and computers apart automatically," Commun. ACM, vol.47, no.2, pp. 56-60, 2004.
-
(2004)
Commun. ACM
, vol.47
, Issue.2
, pp. 56-60
-
-
Von Ahn, L.1
Blum, M.2
Langford, J.3
-
27
-
-
33749983891
-
Maelstorm: Churn as shelter
-
Nov
-
T. Condie, V. Kacholia, S. Sankararaman, J. M. Hellerstein, and P. Maniatis, "Maelstorm: Churn as shelter," University of California Berkeley, Technical report UCB/EECS-2005-11, Nov 2005.
-
(2005)
University of California Berkeley, Technical Report UCB/EECS-2005-11
-
-
Condie, T.1
Kacholia, V.2
Sankararaman, S.3
Hellerstein, J.M.4
Maniatis, P.5
-
29
-
-
33646038920
-
Sybil-resistant DHT routing
-
Sep
-
G. Danezis, C. Lesniewski-Laas, M. F. Kaashoek, and R. Anderson, "Sybil-resistant DHT routing," Tenth European Symposium on Research in Computer Security, vol.3679, Sep 2005.
-
(2005)
Tenth European Symposium on Research in Computer Security
, vol.3679
-
-
Danezis, G.1
Lesniewski-Laas, C.2
Kaashoek, M.F.3
Anderson, R.4
-
30
-
-
33750285481
-
SybilGuard: Defending against sybil attacks via social networks
-
Sep
-
H. Yu, M. Kaminsky, P. Gibbons, and A. Flaxman, "SybilGuard: Defending against sybil attacks via social networks," Proceedings of the ACM SIGCOMM Conference on Computer Communications (SIGCOMM 2006), Sep 2006.
-
(2006)
Proceedings of the ACM SIGCOMM Conference on Computer Communications (SIGCOMM 2006)
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.3
Flaxman, A.4
-
31
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
Dec
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, "Secure routing for structured peer-to-peer overlay networks," 5th Usenix Symposium on Operating Systems Design and Implementation, Dec 2002.
-
(2002)
5th Usenix Symposium on Operating Systems Design and Implementation
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
32
-
-
70449401012
-
Robust forwarding in structured peerto-peer overlay networks
-
August
-
W.-K. Poon and R. K. C. Chang, "Robust forwarding in structured peerto-peer overlay networks," SIGCOMM, August 2004.
-
(2004)
SIGCOMM
-
-
Poon, W.-K.1
Chang, R.K.C.2
-
34
-
-
0038011186
-
A reputation-based approach for choosing reliable resources in peer-topeer networks
-
Nov
-
E. Damiani, D. C. Vimercati, S. Paraboschi, P. Samarati, and F. Violante, "A reputation-based approach for choosing reliable resources in peer-topeer networks," Conference on Computer and Communications Security, Nov 2002.
-
(2002)
Conference on Computer and Communications Security
-
-
Damiani, E.1
Vimercati, D.C.2
Paraboschi, S.3
Samarati, P.4
Violante, F.5
-
35
-
-
33846262184
-
A reputation management system in structured peer-to-peer networks
-
S. Y. Lee, O.-H. Kwon, J. Kim, and S. J. Hong, "A reputation management system in structured peer-to-peer networks," Proc. 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise, 2005.
-
(2005)
Proc. 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise
-
-
Lee, S.Y.1
Kwon, O.-H.2
Kim, J.3
Hong, S.J.4
-
38
-
-
30144435965
-
Enhancing data authenticity and integrity in P2P systems
-
Sep.
-
X. Zhang, S. Chen, and R. Sandhu, "Enhancing data authenticity and integrity in P2P systems," Internet Computing, Sep. 2005.
-
(2005)
Internet Computing
-
-
Zhang, X.1
Chen, S.2
Sandhu, R.3
-
42
-
-
70449384061
-
XPP extensions for implementing a passive P2PSIP overlay network based on the CAN distributed hash table
-
Jun. Online
-
E. Marocco and E. Ivov, "XPP extensions for implementing a passive P2PSIP overlay network based on the CAN distributed hash table," Internet-Draft draft-marocco-p2psip-xpp-pcan-00 (Work in Progress), Jun. 2007. [Online]. Available: http://tools.ietf.org/html/draft-maroccop2psip-xpp-pcan-00
-
(2007)
Internet-Draft Draft-marocco-p2psip-xpp-pcan-00 (Work in Progress)
-
-
Marocco, E.1
Ivov, E.2
-
46
-
-
33749995300
-
Security challenges for peer-to-peer SIP
-
J. Seedorf, "Security challenges for peer-to-peer SIP," IEEE Network, vol.20, 2006.
-
(2006)
IEEE Network
, vol.20
-
-
Seedorf, J.1
-
48
-
-
0003240332
-
SIP: Session initiation protocol
-
(Draft Standard), Jun. Online
-
J. Rosenberg, H. Schulzrinne, G. Camarillo, A. Johnston, J. Peterson, R. Sparks, M. Handley, and E. Schooler, "SIP: Session initiation protocol," RFC 3261 (Draft Standard), Jun. 2002. [Online], Available: http://www.ietf.org/rfc/rfc3261.txt
-
(2002)
RFC
, vol.3261
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
50
-
-
0003821858
-
HTTP over TLS
-
(Informational), May [Online]
-
E. Rescorla, "HTTP over TLS," RFC 2818 (Informational), May 2000. [Online], Available: http://www.ietf.org/rfc/rfc2818.txt
-
(2000)
RFC
, vol.2818
-
-
Rescorla, E.1
-
51
-
-
57349182190
-
Using cryptographically generated SIP-URIs to protect the integrity of content in P2P-SIP
-
June
-
J. Seedorf, "Using cryptographically generated SIP-URIs to protect the integrity of content in P2P-SIP," VoIP Security Workshop, June 2006.
-
(2006)
VoIP Security Workshop
-
-
Seedorf, J.1
-
52
-
-
26844503631
-
The secure real-time transport protocol (SRTP)
-
(Draft Standard), Mar. [Online]
-
M. Baugher, D. McGrew, M. Naslund, , E. Carrara, and K. Norrman, "The secure real-time transport protocol (SRTP)," RFC 3711 (Draft Standard), Mar. 2004. [Online], Available: http://www.ietf.org/rfc/rfc3711.txt
-
(2004)
RFC
, vol.3711
-
-
Baugher, M.1
McGrew, D.2
Naslund, M.3
Carrara, E.4
Norrman, K.5
-
53
-
-
84916196966
-
Voice over IP - Security and SPIT
-
Sept
-
R. Baumann, S. Cavin, and S. Schmid, "Voice over IP - security and SPIT," Swiss Army, FU Br 41, KryptDet Report, University of Berne, Sept 2006.
-
(2006)
Swiss Army, FU Br 41, KryptDet Report, University of Berne
-
-
Baumann, R.1
Cavin, S.2
Schmid, S.3
|