-
1
-
-
70350277450
-
Evaluation of sybil attacks protection schemes in KAD
-
Enschede Netherlands, Springer
-
T. Cholez, I. Chrisment, and O. Festor. Evaluation of Sybil Attacks Protection Schemes in KAD. In 3rd International Conference on Autonomous Infrastructure, Management and Security - AIMS 2009, volume 5637, pages 70-82, Enschede Netherlands, 2009. Springer.
-
(2009)
3rd International Conference on Autonomous Infrastructure, Management and Security - AIMS 2009
, vol.5637
, pp. 70-82
-
-
Cholez, T.1
Chrisment, I.2
Festor, O.3
-
3
-
-
33646038920
-
Sybil-resistant dht routing
-
Springer
-
G. Danezis, C. Lesniewski-laas, M. Frans Kaashoek, and R. Anderson. Sybil-resistant dht routing. In In ESORICS, pages 305-318. Springer, 2005.
-
(2005)
ESORICS
, pp. 305-318
-
-
Danezis, G.1
Lesniewski-Laas, C.2
Kaashoek, M.F.3
Anderson, R.4
-
4
-
-
33750953996
-
Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration
-
Washington, DC, USA, IEEE Computer Society
-
J. Dinger and H. Hartenstein. Defending the sybil attack in p2p networks: Taxonomy, challenges, and a proposal for self-registration. In ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security, pages 756-763, Washington, DC, USA, 2006. IEEE Computer Society.
-
(2006)
ARES '06: Proceedings of the First International Conference on Availability, Reliability and Security
, pp. 756-763
-
-
Dinger, J.1
Hartenstein, H.2
-
6
-
-
67650333330
-
Conducting and optimizing eclipse attacks in the kad peer-to-peer network
-
Berlin, Heidelberg, Springer-Verlag
-
M. Kohnen, M. Leske, and E. P. Rathgeb. Conducting and optimizing eclipse attacks in the kad peer-to-peer network. In NETWORKING '09, pages 104-116, Berlin, Heidelberg, 2009. Springer-Verlag.
-
(2009)
NETWORKING '09
, pp. 104-116
-
-
Kohnen, M.1
Leske, M.2
Rathgeb, E.P.3
-
9
-
-
85093817363
-
Large-scale monitoring of dht traffic
-
Boston, MA, April
-
G. Memon, R. Rejaie, Y. Guo, and D. Stutzbach. Large-scale monitoring of dht traffic. In IPTPS '09: 8th International Workshop on Peer-to-Peer Systems, Boston, MA, April 2009.
-
(2009)
IPTPS '09: 8th International Workshop on Peer-to-Peer Systems
-
-
Memon, G.1
Rejaie, R.2
Guo, Y.3
Stutzbach, D.4
-
10
-
-
34548349212
-
Limiting sybil attacks in structured p2p networks
-
IEEE
-
H. Rowaihy, W. Enck, P. Mcdaniel, and T. La-Porta. Limiting sybil attacks in structured p2p networks. In INFOCOM 2007. 26th IEEE International Conference on Computer Communications. IEEE, pages 2596-2600, 2007.
-
(2007)
INFOCOM 2007. 26th IEEE International Conference on Computer Communications
, pp. 2596-2600
-
-
Rowaihy, H.1
Enck, W.2
Mcdaniel, P.3
La-Porta, T.4
-
11
-
-
77951438838
-
Defending against eclipse attacks on overlay networks
-
New York, NY, USA, ACM
-
A. Singh, M. Castro, P. Druschel, and A. Rowstron. Defending against eclipse attacks on overlay networks. In EW11: Proceedings of the 11th workshop on ACM SIGOPS European workshop, page 21, New York, NY, USA, 2004. ACM.
-
(2004)
EW11: Proceedings of the 11th Workshop on ACM SIGOPS European Workshop
, pp. 21
-
-
Singh, A.1
Castro, M.2
Druschel, P.3
Rowstron, A.4
-
13
-
-
42149134194
-
A global view of KAD
-
October 23-26, San Diego, USA, Oct 2007
-
M. Steiner, T. En Najjary, and E. W. Biersack. A global view of KAD. In IMC 2007, Internet Measurement Conference, October 23-26, 2007, San Diego, USA, Oct 2007.
-
(2007)
IMC 2007, Internet Measurement Conference
-
-
Steiner, M.1
Najjary, T.E.2
Biersack, E.W.3
-
15
-
-
70249107546
-
Attacking the kad network
-
Istanbul, Turkey, ACM
-
P. Wang, J. Tyra, E. Chan-Tin, T. Malchow, D. Foo Kune, N. Hopper, and Y. Kim. Attacking the kad network. In SecureComm 2008: the 4th International Confere on Security and Privacy in Communication Networks, Istanbul, Turkey, 2008. ACM.
-
(2008)
SecureComm 2008: The 4th International Confere on Security and Privacy in Communication Networks
-
-
Wang, P.1
Tyra, J.2
Chan-Tin, E.3
Malchow, T.4
Foo Kune, D.5
Hopper, N.6
Kim, Y.7
-
16
-
-
33750285481
-
Sybilguard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: defending against sybil attacks via social networks. SIGCOMM Comput. Com.Rev., 36(4):267-278, 2006.
-
(2006)
SIGCOMM Comput. Com.Rev.
, vol.36
, Issue.4
, pp. 267-278
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|