-
1
-
-
4944245567
-
Discouraging free riding in a peer-to-peer cpu-sharing grid
-
June
-
N. Andrade, F. Vilar Brasileiro, W. Cirne, and M. Mowbray, "Discouraging Free Riding in a Peer-to-Peer CPU-Sharing Grid," Proc. 13th Int'l Symp. High-Performance Distributed Computing, June 2004.
-
(2004)
Proc. 13th Int'l Symp. High-Performance Distributed Computing
-
-
Andrade, N.1
Vilar Brasileiro, F.2
Cirne, W.3
Mowbray, M.4
-
2
-
-
3142676730
-
Trust-X: A peer-to-peer framework for trust establishment
-
July
-
E. Bertino, E. Ferrari, and A.C. Squicciarini, "Trust-X: A Peer-to-Peer Framework for Trust Establishment," IEEE Trans. Knowledge Data Eng., vol. 16, no. 7, pp. 827-842, July 2004.
-
(2004)
IEEE Trans. Knowledge Data Eng.
, vol.16
, Issue.7
, pp. 827-842
-
-
Bertino, E.1
Ferrari, E.2
Squicciarini, A.C.3
-
7
-
-
21644455728
-
Samsara: Honor among thieves in peer-to-peer storage
-
L.P. Cox and B.D. Noble, "Samsara: Honor among Thieves in Peer-to-Peer Storage," ACM SIGOPS Operating Systems Rev., vol. 37, pp. 120-132, 2003.
-
(2003)
ACM SIGOPS Operating Systems Rev
, vol.37
, pp. 120-132
-
-
Cox, L.P.1
Noble, B.D.2
-
8
-
-
3242802867
-
Robust incentive techniques for peer-to-peer networks
-
M. Feldman, K. Lai, I. Stoica, and J. Chuang, "Robust Incentive Techniques for Peer-to-Peer Networks," Proc. Fifth ACM Conf. Electronic Commerce (EC '04), pp. 102-111, 2004.
-
(2004)
Proc. Fifth ACM Conf. Electronic Commerce (EC '04)
, pp. 102-111
-
-
Feldman, M.1
Lai, K.2
Stoica, I.3
Chuang, J.4
-
10
-
-
34948884092
-
Optimal leader election scheme for peer-to-peer applications
-
S. Han and H. Xia, "Optimal Leader Election Scheme for Peer-to-Peer Applications," Proc. Int'l Conf. Networking (ICN), p. 29, 2007.
-
(2007)
Proc. Int'l Conf. Networking (ICN)
, pp. 29
-
-
Han, S.1
Xia, H.2
-
11
-
-
1642394295
-
Hidden credentials
-
J.E. Holt, R.W. Bradshaw, K.E. Seamons, and H. Orman, "Hidden Credentials," Proc. 2003 ACM Workshop Privacy in the Electronic Soc. (WPES '03), pp. 1-8, 2003.
-
(2003)
Proc. 2003 ACM Workshop Privacy in the Electronic Soc. (WPES '03)
, pp. 1-8
-
-
Holt, J.E.1
Bradshaw, R.W.2
Seamons, K.E.3
Orman, H.4
-
12
-
-
27544435130
-
Ixchange-A self-organising super peer network model
-
S. Johnstone, P. Sage, and P. Milligan, "iXChange-A Self-Organising Super Peer Network Model," Proc. IEEE Symp. Computers and Comm. (ISCC), pp. 164-169, 2005.
-
(2005)
Proc. IEEE Symp. Computers and Comm. (ISCC)
, pp. 164-169
-
-
Johnstone, S.1
Sage, P.2
Milligan, P.3
-
13
-
-
77956179286
-
-
JXTA Documentation, https://jxta-docs.dev.java.net/, 2010.
-
(2010)
-
-
-
16
-
-
33751513006
-
OAcerts: Oblivious attribute certificates
-
Oct.-Dec.
-
J. Li and N. Li, "OAcerts: Oblivious Attribute Certificates," IEEE Trans. Dependable and Secure Computing, vol. 3, no. 4, pp. 340-352, Oct.-Dec. 2006.
-
(2006)
IEEE Trans. Dependable and Secure Computing
, vol.3
, Issue.4
, pp. 340-352
-
-
Li, J.1
Li, N.2
-
17
-
-
2442572177
-
An incentive mechanism for P2P networks
-
R.T.B. Ma Sam, C.M. Lee John, C.S. Lui David, and K.Y. Yau, "An Incentive Mechanism for P2P Networks," Proc. 24th IEEE Int'l Conf. Distributed Computing Systems, 2004.
-
(2004)
Proc. 24th IEEE Int'l Conf. Distributed Computing Systems
-
-
Ma Sam, R.T.B.1
Lee John, C.M.2
Lui David, C.S.3
Yau, K.Y.4
-
23
-
-
33746619579
-
Using aggregation for adaptive super-peer discovery on the gradient topology
-
J. Sacha, J. Downling, R. Cunningham, and R. Meier, "Using Aggregation for Adaptive Super-Peer Discovery on the Gradient Topology," Proc. Int'l Conf. Self-Managed Networks, Systems, and Services (Selfman), pp. 73-86, 2006.
-
(2006)
Proc. Int'l Conf. Self-Managed Networks, Systems, and Services (Selfman)
, pp. 73-86
-
-
Sacha, J.1
Downling, J.2
Cunningham, R.3
Meier, R.4
-
24
-
-
84893105662
-
Requirements for policy languages for trust negotiation
-
June
-
K. Seamons, M. Winslett, T. Yu, B. Smith, E. Child, J. Jacobson, H. Mills, and L. Yu, "Requirements for Policy Languages for Trust Negotiation," Proc. Third Int'l Workshop Policies for Distributed Systems and Networks (Policy '02), pp. 92-103, June 2002.
-
(2002)
Proc. Third Int'l Workshop Policies for Distributed Systems and Networks (Policy '02)
, pp. 92-103
-
-
Seamons, K.1
Winslett, M.2
Yu, T.3
Smith, B.4
Child, E.5
Jacobson, J.6
Mills, H.7
Yu, L.8
-
25
-
-
0018545449
-
How to share a secret
-
A. Shamir, "How to Share a Secret," Comm. ACM, vol. 22, no. 11, pp. 612-613, 1979.
-
(1979)
Comm. ACM
, vol.22
, Issue.11
, pp. 612-613
-
-
Shamir, A.1
-
26
-
-
34547505017
-
PP-Trust-X: A system for privacy preserving trust negotiations
-
A. Squicciarini, E. Bertino, E. Ferrari, F. Paci, and B. Thuraisingham, "PP-Trust-X: A System for Privacy Preserving Trust Negotiations," ACM Trans. Information and System Security, vol. 10, no. 3, 2007.
-
(2007)
ACM Trans. Information and System Security
, vol.10
, Issue.3
-
-
Squicciarini, A.1
Bertino, E.2
Ferrari, E.3
Paci, F.4
Thuraisingham, B.5
-
27
-
-
77956170529
-
-
Sun Microsystems
-
Sun Microsystems, JXTA Programmer Guide 2.5, https://jxta. dev.java.net/, 2007.
-
(2007)
JXTA Programmer Guide 2.5
-
-
-
29
-
-
35048879747
-
Crown: An efficient and stable distributed resource lookup protocol
-
T. Wang, K. Tsai, and Y. Lee, "Crown: An Efficient and Stable Distributed Resource Lookup Protocol," Proc. Int'l Conf. Embedded and Ubiquitous Computing (EUC), pp. 1075-1084, 2004.
-
(2004)
Proc. Int'l Conf. Embedded and Ubiquitous Computing (EUC)
, pp. 1075-1084
-
-
Wang, T.1
Tsai, K.2
Lee, Y.3
-
32
-
-
3142738238
-
Peertrust: Supporting reputation-based trust in peer-to-peer communities
-
July
-
L. Xiong and L. Liu, "Peertrust: Supporting Reputation-Based Trust in Peer-to-Peer Communities," IEEE Trans. Knowledge and Data Eng., Special Issue on Peer-to-Peer Based Data Management, vol. 16, no. 7, pp. 843-857, July 2004.
-
(2004)
IEEE Trans. Knowledge and Data Eng., Special Issue on Peer-to-Peer Based Data Management
, vol.16
, Issue.7
, pp. 843-857
-
-
Xiong, L.1
Liu, L.2
-
33
-
-
0036493429
-
Secure peer-to-peer networking: The JXTA example
-
W. Yeager and J. Williams, "Secure Peer-to-Peer Networking: The JXTA Example," IT Professional, vol. 4, no. 2, pp. 53-57, 2002.
-
(2002)
IT Professional
, vol.4
, Issue.2
, pp. 53-57
-
-
Yeager, W.1
Williams, J.2
-
34
-
-
0038148412
-
A unified scheme for resource protection in automated trust negotiation
-
T. Yu and M. Winslett, "A Unified Scheme for Resource Protection in Automated Trust Negotiation," Proc. IEEE Symp. Security and Privacy, 2003.
-
(2003)
Proc. IEEE Symp. Security and Privacy
-
-
Yu, T.1
Winslett, M.2
-
36
-
-
35048859485
-
A model for multi-party negotiations with majority rule
-
S. Zhang, F. Makedon, J. Ford, and L. Ai, "A Model for Multi-Party Negotiations with Majority Rule," Proc. Int'l Conf. ECommerce and Web Technologies, vol. 3182, 2004.
-
(2004)
Proc. Int'l Conf. ECommerce and Web Technologies
, vol.3182
-
-
Zhang, S.1
Makedon, F.2
Ford, J.3
Ai, L.4
|