-
2
-
-
67650307031
-
A Survey of Peer-to-Peer Security Issues
-
D. S.Wallach, "A Survey of Peer-to-Peer Security Issues," in ISSS, 2002, pp. 253-258.
-
(2002)
ISSS
, pp. 253-258
-
-
Wallach, D.S.1
-
3
-
-
42149083231
-
Profiling a Million User DHT
-
J. Falkner, M. Piatek, J. P. John, A. Krishnamurthy, and T. Anderson, "Profiling a Million User DHT," in IMC, 2007, pp. 129-134.
-
(2007)
IMC
, pp. 129-134
-
-
Falkner, J.1
Piatek, M.2
John, J.P.3
Krishnamurthy, A.4
Anderson, T.5
-
4
-
-
42149134194
-
A Global View of KAD
-
M. Steiner, T. En-Najjary, and E. W. Biersack, "A Global View of KAD," in IMC, 2007, pp. 117-122.
-
(2007)
IMC
, pp. 117-122
-
-
Steiner, M.1
En-Najjary, T.2
Biersack, E.W.3
-
5
-
-
85018107502
-
Vanish: Increasing Data Privacy with Self-Destructing Data
-
R. Geambasu, T. Kohno, A. A. Levy, and H. M. Levy, "Vanish: Increasing Data Privacy with Self-Destructing Data," in USENIX Security Symp., 2009, pp. 299-315.
-
USENIX Security Symp., 2009
, pp. 299-315
-
-
Geambasu, R.1
Kohno, T.2
Levy, A.A.3
Levy, H.M.4
-
6
-
-
39049150287
-
A Comparative Study of the DNS Design with DHT-Based Alternatives
-
V. Pappas, D. Massey, A. Terzis, and L. Zhang, "A Comparative Study of the DNS Design with DHT-Based Alternatives," in INFOCOM, 2006, pp. 1-13.
-
(2006)
INFOCOM
, pp. 1-13
-
-
Pappas, V.1
Massey, D.2
Terzis, A.3
Zhang, L.4
-
7
-
-
33749571809
-
Towards a Scalable and Robust DHT
-
B. Awerbuch and C. Scheideler, "Towards a Scalable and Robust DHT," in SPAA, 2006, pp. 318-327.
-
(2006)
SPAA
, pp. 318-327
-
-
Awerbuch, B.1
Scheideler, C.2
-
8
-
-
77949599896
-
Towards Scalable and Robust Overlay Networks
-
-, "Towards Scalable and Robust Overlay Networks," in IPTPS, 2007.
-
(2007)
IPTPS
-
-
Awerbuch, B.1
Scheideler, C.2
-
9
-
-
84885718443
-
Robust Random Number Generation for Peer-to-Peer Systems
-
-, "Robust Random Number Generation for Peer-to-Peer Systems," in OPODIS, 2006, pp. 275-289.
-
(2006)
OPODIS
, pp. 275-289
-
-
Awerbuch, B.1
Scheideler, C.2
-
10
-
-
40849100435
-
Reducing Communication Costs in Robust Peer-to-Peer Networks
-
J. Saia and M. Young, "Reducing Communication Costs in Robust Peer-to-Peer Networks," Information Processing Letters, vol. 106(4), pp. 152-158, 2008.
-
(2008)
Information Processing Letters
, vol.106
, Issue.4
, pp. 152-158
-
-
Saia, J.1
Young, M.2
-
11
-
-
27144478012
-
Making Chord Robust to Byzantine Attacks
-
A. Fiat, J. Saia, and M. Young, "Making Chord Robust to Byzantine Attacks," in ESA, 2005, pp. 803-814.
-
(2005)
ESA
, pp. 803-814
-
-
Fiat, A.1
Saia, J.2
Young, M.3
-
12
-
-
34248566417
-
A Simple Fault Tolerant Distributed Hash Table
-
M. Naor and U. Wieder, "A Simple Fault Tolerant Distributed Hash Table," in IPTPS, 2003, pp. 88-97.
-
(2003)
IPTPS
, pp. 88-97
-
-
Naor, M.1
Wieder, U.2
-
13
-
-
35248832638
-
Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-peer Networks
-
K. Hildrum and J. Kubiatowicz, "Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-peer Networks," in DISC, 2004, pp. 321-336.
-
(2004)
DISC
, pp. 321-336
-
-
Hildrum, K.1
Kubiatowicz, J.2
-
14
-
-
34748899427
-
Fireflies: Scalable Support for Intrusion-Tolerant Network Overlays
-
H. Johansen, A. Allavena, and R. van Renesse, "Fireflies: Scalable Support for Intrusion-Tolerant Network Overlays," in OSR, 2006, pp. 3-13.
-
(2006)
OSR
, pp. 3-13
-
-
Johansen, H.1
Allavena, A.2
Van Renesse, R.3
-
15
-
-
4544304744
-
The Sybil Attack
-
J. Douceur, "The Sybil Attack," in IPTPS, 2002.
-
(2002)
IPTPS
-
-
Douceur, J.1
-
17
-
-
0034782005
-
Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications
-
I. Stoica, R. Morris, D. Karger, M. F. Kaashoek, and H. Balakrishnan, "Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications," in SIGCOMM, 2001, pp. 149-160.
-
(2001)
SIGCOMM
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
18
-
-
77955941887
-
-
Tech. Rep. CACR 2009-31
-
M. Young, A. Kate, I. Goldberg, and M. Karsten, "Practical Robust Communication in DHTs Tolerating a Byzantine Adversary," Tech. Rep. CACR 2009-31, 2009, http://www.cacr.math.uwaterloo.ca/techreports/2009/cacr2009-31. pdf.
-
(2009)
Practical Robust Communication in DHTs Tolerating a Byzantine Adversary
-
-
Young, M.1
Kate, A.2
Goldberg, I.3
Karsten, M.4
-
19
-
-
0025564050
-
Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial
-
F. B. Schneider, "Implementing Fault-Tolerant Services Using the State Machine Approach: A Tutorial," ACM Computing Surveys, vol. 22(4), pp. 299-319, 1990.
-
(1990)
ACM Computing Surveys
, vol.22
, Issue.4
, pp. 299-319
-
-
Schneider, F.B.1
-
21
-
-
0035789194
-
Byzantine Fault Tolerance Can Be Fast
-
M. Castro and B. Liskov, "Byzantine Fault Tolerance Can Be Fast," in DSN, 2001, pp. 513-518.
-
(2001)
DSN
, pp. 513-518
-
-
Castro, M.1
Liskov, B.2
-
22
-
-
0036921939
-
Secure Intrusion-tolerant Replication on the Internet
-
C. Cachin and J. Poritz, "Secure Intrusion-tolerant Replication on the Internet," in DSN, 2002, pp. 167-176.
-
(2002)
DSN
, pp. 167-176
-
-
Cachin, C.1
Poritz, J.2
-
23
-
-
84978405320
-
FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted environment
-
A. Adya, W. Bolosky, M. Castro, G. Cermak, R. Chaiken, J. Douceur, J. Howell, J. Lorch, M. Theimer, and R. Wattenhofer, "FARSITE: Federated, Available, and Reliable Storage for an Incompletely Trusted environment," in OSDI, 2002, pp. 1-14.
-
(2002)
OSDI
, pp. 1-14
-
-
Adya, A.1
Bolosky, W.2
Castro, M.3
Cermak, G.4
Chaiken, R.5
Douceur, J.6
Howell, J.7
Lorch, J.8
Theimer, M.9
Wattenhofer, R.10
-
24
-
-
33845427383
-
Fault-Scalable Byzantine Fault-Tolerant Services
-
M. Abd-El-Malek, G. R. Ganger, G. R. Goodson, M. K. Reiter, and J. J. Wylie, "Fault-Scalable Byzantine Fault-Tolerant Services," in SOSP, 2005, pp. 59-74.
-
(2005)
SOSP
, pp. 59-74
-
-
Abd-El-Malek, M.1
Ganger, G.R.2
Goodson, G.R.3
Reiter, M.K.4
Wylie, J.J.5
-
25
-
-
85009705400
-
HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance
-
J. Cowling, D. Myers, B. Liskov, R. Rodrigues, and L. Shrira, "HQ Replication: A Hybrid Quorum Protocol for Byzantine Fault Tolerance," in OSDI, 1999, pp. 177-190.
-
(1999)
OSDI
, pp. 177-190
-
-
Cowling, J.1
Myers, D.2
Liskov, B.3
Rodrigues, R.4
Shrira, L.5
-
26
-
-
0034440650
-
OceanStore: An Architecture for Global-Scale Persistent Storage
-
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, W. W. H. Weatherspoon, C. Wells, and B. Zhao, "OceanStore: An Architecture for Global-Scale Persistent Storage," in ASPLOS, 2000, pp. 190-201.
-
(2000)
ASPLOS
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, W.W.H.9
Wells, C.10
Zhao, B.11
-
28
-
-
76949085683
-
Large-Scale Byzantine Fault Tolerance: Safe but Not Always Live
-
R. Rodrigues, P. Kouznetsov, and B. Bhattacharjee, "Large-Scale Byzantine Fault Tolerance: Safe but Not Always Live," in HotDep, 2007.
-
(2007)
HotDep
-
-
Rodrigues, R.1
Kouznetsov, P.2
Bhattacharjee, B.3
-
29
-
-
77954473678
-
The Design of a Robust Peer-to-Peer System
-
R. Rodrigues, B. Liskov, and L. Shrira, "The Design of a Robust Peer-to-Peer System," in 10th ACM SIGOPS European Workshop, 117-124, p. 2002.
-
10th ACM SIGOPS European Workshop
, vol.117-124
, pp. 2002
-
-
Rodrigues, R.1
Liskov, B.2
Shrira, L.3
-
30
-
-
77955973071
-
-
University of Minnesota, Tech. Rep. 2006/20
-
P. Weng, N. Hopper, I. Osipkov, and Y. Kim, "Myrmic: Secure and Robust DHT Routing," University of Minnesota, Tech. Rep. 2006/20, 2006.
-
(2006)
Myrmic: Secure and Robust DHT Routing
-
-
Weng, P.1
Hopper, N.2
Osipkov, I.3
Kim, Y.4
-
31
-
-
84978382732
-
Secure Routing for Structured Peer-to-Peer Overlay Networks
-
M. Castro, P.Druschel, A.Ganesh, A. Rowstron, and D.Wallach, "Secure Routing for Structured Peer-to-Peer Overlay Networks," in OSDI, 2002, pp. 299-314.
-
(2002)
OSDI
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
32
-
-
85180784621
-
Halo: High-Assurance Locate for Distributed Hash Tables
-
A. Kapadia and N. Triandopoulos, "Halo: High-Assurance Locate for Distributed Hash Tables," in NDSS, 2008.
-
(2008)
NDSS
-
-
Kapadia, A.1
Triandopoulos, N.2
-
33
-
-
34547281136
-
Salsa: A Structured Approach to Large-Scale Anonymity
-
A. Nambiar and M. Wright, "Salsa: A Structured Approach to Large-Scale Anonymity," in CCS, 2006, pp. 17-26.
-
(2006)
CCS
, pp. 17-26
-
-
Nambiar, A.1
Wright, M.2
-
34
-
-
74049096681
-
Shadow Walker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies
-
P. Mittal and N. Borisov, "Shadow Walker: Peer-to-peer Anonymous Communication using Redundant Structured Topologies," in CCS, 2009.
-
(2009)
CCS
-
-
Mittal, P.1
Borisov, N.2
-
35
-
-
0345757358
-
Practical Byzantine Fault Tolerance and Proactive Recovery
-
M. Castro and B. Liskov, "Practical Byzantine Fault Tolerance and Proactive Recovery," ACM Transactions on Computer Systems, vol. 20(4), pp. 398-461, 2002.
-
(2002)
ACM Transactions on Computer Systems
, vol.20
, Issue.4
, pp. 398-461
-
-
Castro, M.1
Liskov, B.2
-
36
-
-
84946840347
-
Short Signatures from the Weil Pairing
-
D. Boneh, B. Lynn, and H. Shacham, "Short Signatures from the Weil Pairing," in ASIACRYPT, 2001, pp. 514-532.
-
(2001)
ASIACRYPT
, pp. 514-532
-
-
Boneh, D.1
Lynn, B.2
Shacham, H.3
-
37
-
-
0023538330
-
A Practical Scheme for Non-Interactive Verifiable Secret Sharing
-
P. Feldman, "A Practical Scheme for Non-Interactive Verifiable Secret Sharing," in FOCS, 1987, pp. 427-437.
-
(1987)
FOCS
, pp. 427-437
-
-
Feldman, P.1
-
38
-
-
84982943258
-
Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing
-
T. P. Pedersen, "Non-Interactive and Information-Theoretic Secure Verifiable Secret Sharing," in CRYPTO, 1991, pp. 129-140.
-
(1991)
CRYPTO
, pp. 129-140
-
-
Pedersen, T.P.1
-
39
-
-
35248880074
-
Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme
-
A. Boldyreva, "Threshold Signatures, Multisignatures and Blind Signatures Based on the Gap-Diffie-Hellman-Group Signature Scheme," in PKC, 2003, pp. 31-46.
-
(2003)
PKC
, pp. 31-46
-
-
Boldyreva, A.1
-
40
-
-
70350216066
-
Distributed Key Generation for the Internet
-
A. Kate and I. Goldberg, "Distributed Key Generation for the Internet," in ICDCS, 2009, pp. 119-128.
-
(2009)
ICDCS
, pp. 119-128
-
-
Kate, A.1
Goldberg, I.2
-
41
-
-
35248835575
-
Aggregate and Verifiably Encrypted Signatures from Bilinear Maps
-
D. Boneh, C. Gentry, B. Lynn, and H. Shacham, "Aggregate and Verifiably Encrypted Signatures from Bilinear Maps," in EUROCRYPT, 2003, pp. 416-432.
-
(2003)
EUROCRYPT
, pp. 416-432
-
-
Boneh, D.1
Gentry, C.2
Lynn, B.3
Shacham, H.4
-
42
-
-
0037717696
-
Passive Estimation of TCP Round-Trip Times
-
H. Jiang and C. Dovrolis, "Passive Estimation of TCP Round-Trip Times," CCR, vol. 32, pp. 75-88, 2002.
-
(2002)
CCR
, vol.32
, pp. 75-88
-
-
Jiang, H.1
Dovrolis, C.2
-
43
-
-
33645759275
-
A Blueprint for Introducing Disruptive Technology into the Internet
-
L. Peterson, T. Anderson, D. Culler, and T. Roscoe, "A Blueprint for Introducing Disruptive Technology into the Internet," CCR, vol. 33, no. 1, pp. 59-64, 2003.
-
(2003)
CCR
, vol.33
, Issue.1
, pp. 59-64
-
-
Peterson, L.1
Anderson, T.2
Culler, D.3
Roscoe, T.4
-
44
-
-
77955972226
-
Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography
-
Report 355
-
A. Kate and I. Goldberg, "Asynchronous Distributed Private-Key Generators for Identity-Based Cryptography," Cryptology ePrint Archive, Report 355, 2009.
-
(2009)
Cryptology ePrint Archive
-
-
Kate, A.1
Goldberg, I.2
-
45
-
-
84875702502
-
Designing a DHT for Low Latency and High Throughput
-
F. Dabek, J. Li, E. Sit, J. Robertson, M. F. Kaashoek, and R. Morris, "Designing a DHT for Low Latency and High Throughput," in NSDI, 2004, pp. 85-98.
-
(2004)
NSDI
, pp. 85-98
-
-
Dabek, F.1
Li, J.2
Sit, E.3
Robertson, J.4
Kaashoek, M.F.5
Morris, R.6
-
46
-
-
85091111009
-
Handling Churn in a DHT
-
S. Rhea, D. Geels, T. Roscoe, and J. Kubiatowicz, "Handling Churn in a DHT," in USENIX Annual Technical Conf., 2004, pp. 127-140.
-
USENIX Annual Technical Conf., 2004
, pp. 127-140
-
-
Rhea, S.1
Geels, D.2
Roscoe, T.3
Kubiatowicz, J.4
-
47
-
-
21644443485
-
Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload
-
P. K. Gummadi, R. J. Dunn, S. Saroiu, S. D. Gribble, H. M. Levy, and J. Zahorjan, "Measurement, Modeling, and Analysis of a Peer-to-Peer File-Sharing Workload," in SOSP, 2003, pp. 314-329.
-
(2003)
SOSP
, pp. 314-329
-
-
Gummadi, P.K.1
Dunn, R.J.2
Saroiu, S.3
Gribble, S.D.4
Levy, H.M.5
Zahorjan, J.6
-
48
-
-
0037880330
-
A Measurement Study of Peer-to-Peer File Sharing Systems
-
S. Saroiu, P. K. Gummadi, and S. D. Gribble, "A Measurement Study of Peer-to-Peer File Sharing Systems," in MMCN, 2002, pp. 314-329.
-
(2002)
MMCN
, pp. 314-329
-
-
Saroiu, S.1
Gummadi, P.K.2
Gribble, S.D.3
-
49
-
-
34748819854
-
An Experimental Study of the Skype Peer-to-Peer VoIP System
-
S.Guha, N.Daswani, and R. Jain, "An Experimental Study of the Skype Peer-to-Peer VoIP System," in IPTPS, 2006.
-
(2006)
IPTPS
-
-
Guha, S.1
Daswani, N.2
Jain, R.3
-
50
-
-
0036957999
-
Analysis of the Evolution of Peer-to-Peer Systems
-
D. Liben-Nowell, H. Balakrishnan, and D. Karger, "Analysis of the Evolution of Peer-to-Peer Systems," in PODC, 2002, pp. 233-242.
-
(2002)
PODC
, pp. 233-242
-
-
Liben-Nowell, D.1
Balakrishnan, H.2
Karger, D.3
|