-
1
-
-
84978405320
-
FARSITE: Federated, available, and reliable storage for an incompletely trusted environment
-
A. Adya, W. J. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. R. Douceur, J. Howell, J. R. Lorch, M. Theimer, and R. Wattenhofer. FARSITE: Federated, available, and reliable storage for an incompletely trusted environment. In Proceedings of the 5th ACM Symposium on Operating System Design and Implementation (OSDI), 2002.
-
(2002)
Proceedings of the 5th ACM Symposium on Operating System Design and Implementation (OSDI)
-
-
Adya, A.1
Bolosky, W.J.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.R.6
Howell, J.7
Lorch, J.R.8
Theimer, M.9
Wattenhofer, R.10
-
2
-
-
55149122075
-
Tempering kademlia with a robust identity based system
-
IEEE Computer Society
-
L. M. Aiello, M. Milanesio, G. Ruffo, and R. Schifanella. Tempering kademlia with a robust identity based system. In Proceedings of the 8th International Conference on Peer-toPeer Computing (P2P), pages 30-39. IEEE Computer Society, 2008.
-
(2008)
Proceedings of the 8th International Conference on Peer-toPeer Computing (P2P)
, pp. 30-39
-
-
Aiello, L.M.1
Milanesio, M.2
Ruffo, G.3
Schifanella, R.4
-
3
-
-
84958639277
-
Efficient generation of shared RSA keys
-
Proceedings of the 17th Annual International Cryptology Conference (CRYPTO), Springer-Verlag
-
D. Boneh and M. Franklin. Efficient generation of shared RSA keys. In Proceedings of the 17th Annual International Cryptology Conference (CRYPTO), volume 1294 of Lecture Notes in Computer Science. Springer-Verlag, 1997.
-
(1997)
Lecture Notes in Computer Science.
, vol.1294
-
-
Boneh, D.1
Franklin, M.2
-
4
-
-
33749072478
-
Providing secure services in peer-to-peer communications networks with central security servers
-
IEEE Computer Society
-
F. Cao, D. A. Bryan, and B. Lowekamp. Providing secure services in peer-to-peer communications networks with central security servers. In AICT/ICIW, page 105. IEEE Computer Society, 2006.
-
(2006)
AICT/ICIW
, pp. 105
-
-
Cao, F.1
Bryan, D.A.2
Lowekamp, B.3
-
5
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
ACM Press
-
M. Castro, P. Druschel, A. J. Ganesh, A. I. T. Rowstron, and D. S. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proceedings of the 5th ACM Symposium on Operating System Design and Implementation (OSDI), pages 299-314. ACM Press, 2002.
-
(2002)
Proceedings of the 5th ACM Symposium on Operating System Design and Implementation (OSDI)
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.J.3
Rowstron, A.I.T.4
Wallach, D.S.5
-
6
-
-
73549100353
-
-
Clip2. The gnutella protocol specification v0.4.
-
Clip2. The gnutella protocol specification v0.4. http://www9.limewire. com/developer/ gnutella-protocol-0.4.pdf, 2000.
-
(2000)
-
-
-
7
-
-
84947931331
-
Some recent research aspects of threshold cryptography
-
Proceedings of the 1st International Workshop on Information Security (ISW), SpringerVerlag
-
Y. Desmedt. Some recent research aspects of threshold cryptography. In Proceedings of the 1st International Workshop on Information Security (ISW), volume 1396 of Lecture Notes in Computer Science, pages 158-173. SpringerVerlag, 1997.
-
(1997)
Lecture Notes in Computer Science
, vol.1396
, pp. 158-173
-
-
Desmedt, Y.1
-
8
-
-
0031375570
-
Optimal-resilience proactive public-key cryptosystems
-
IEEE Computer Society
-
Y. Frankel, P. Gemmell, P. D. MacKenzie, and M. Yung. Optimal-resilience proactive public-key cryptosystems. In Proceedings of the 38th Annual IEEE Symposium on Foundations of Computer Science (FOCS), pages 384-393. IEEE Computer Society, 1997.
-
(1997)
Proceedings of the 38th Annual IEEE Symposium on Foundations of Computer Science (FOCS)
, pp. 384-393
-
-
Frankel, Y.1
Gemmell, P.2
MacKenzie, P.D.3
Yung, M.4
-
9
-
-
0035704362
-
Providing robust and ubiquitous security support for mobile ad hoc networks
-
IEEE Computer Society
-
J. Kong, P. Zerfos, H. Luo, S. Lu, and L. Zhang. Providing robust and ubiquitous security support for mobile ad hoc networks. In Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP), pages 251-260. IEEE Computer Society, 2001.
-
(2001)
Proceedings of the 9th IEEE International Conference on Network Protocols (ICNP)
, pp. 251-260
-
-
Kong, J.1
Zerfos, P.2
Luo, H.3
Lu, S.4
Zhang, L.5
-
11
-
-
49949084638
-
Distributed certification system for structured P2P networks
-
Proceedings of the 2nd International Conference on Autonomous Infrastructure, Management and Security (AIMS), Springer
-
F. Lesueur, L. Mé, "and V. Viet Triem Tong. A Distributed certification system for structured P2P networks. In Proceedings of the 2nd International Conference on Autonomous Infrastructure, Management and Security (AIMS), volume 5127 of Lecture Notes in Computer Science, pages 40-52. Springer, 2008.
-
(2008)
Lecture Notes in Computer Science
, vol.5127
, pp. 40-52
-
-
Lesueur, F.1
Mé, L.2
Viet Triem Tong A, V.3
-
13
-
-
84947235017
-
Kademlia: A peer-topeer information system based on the XOR metric
-
First International Workshop on Peer-to-Peer Systems (IPTPS), Springer
-
P. Maymounkov and D. Mazières. Kademlia: A peer-topeer information system based on the XOR metric. In First International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer Science, pages 53-65. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2429
, pp. 53-65
-
-
Maymounkov, P.1
Mazières, D.2
-
14
-
-
57349142855
-
Pastry: Scalable, decentralized object location and routing for large-scale peer-topeer systems
-
Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), Springer-Verlag
-
A. I. T. Rowstron and P. Druschel. Pastry: scalable, decentralized object location and routing for large-scale peer-topeer systems. In Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), volume 2218 of Lecture Notes in Computer Science, pages 329-350. Springer-Verlag, 2001.
-
(2001)
Lecture Notes in Computer Science
, vol.2218
, pp. 329-350
-
-
Rowstron, A.I.T.1
Druschel, P.2
-
15
-
-
7244220983
-
-
RSA Laboratories. RSA Data Security, Inc., June
-
RSA Laboratories. PKCS #1 v2.1: RSA Cryptography Standard. RSA Data Security, Inc., June 2002.
-
(2002)
PKCS #1 V2.1: RSA Cryptography Standard.
-
-
-
18
-
-
84947265806
-
Security considerations for peer-topeer distributed hash tables
-
First International Workshop on Peer-to-Peer Systems (IPTPS), Springer
-
E. Sit and R. Morris. Security considerations for peer-topeer distributed hash tables. In First International Workshop on Peer-to-Peer Systems (IPTPS), volume 2429 of Lecture Notes in Computer Science, pages 261-269. Springer, 2002.
-
(2002)
Lecture Notes in Computer Science, Pages
, vol.2429
, pp. 261-269
-
-
Sit, E.1
Morris, R.2
-
19
-
-
0034782005
-
Chord: A scalable peer-to-peer lookup service for internet applications
-
ACM Press
-
I. Stoica, R. Morris, D. R. Karger, M. F. Kaashoek, and H. Balakrishnan. Chord: A scalable peer-to-peer lookup service for internet applications. In Proceedings of the ACM SIGCOMM Conference (SIGCOMM), Computer Communication Review, pages 149-160. ACM Press, 2001.
-
(2001)
Proceedings of the ACM SIGCOMM Conference (SIGCOMM), Computer Communication Review
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.R.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
20
-
-
33845373081
-
A survey of peer-to-peer security issues
-
Proceedings of the International Symposium on Software Security (ISSS), Springer-Verlag
-
D. S.Wallach. A survey of peer-to-peer security issues. In Proceedings of the International Symposium on Software Security (ISSS), volume 2609 of Lecture Notes in Computer Science, pages 42-57. Springer-Verlag, 2002.
-
(2002)
Lecture Notes in Computer Science
, vol.2609
, pp. 42-57
-
-
Wallach, D.S.1
-
21
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
ACM Press
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: defending against sybil attacks via social networks. In Proceedings of the ACM SIGCOMM Conference (SIGCOMM), pages 267-278. ACM Press, 2006.
-
(2006)
Proceedings of the ACM SIGCOMM Conference (SIGCOMM)
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|