메뉴 건너뛰기




Volumn 43, Issue 2, 2011, Pages

A survey of DHT security techniques

Author keywords

Distributed hash tables; Eclipse attack; Peer to peer systems; Secure P2P routing and storage; Sybil attack

Indexed keywords

COMPUTER CRIME; DATA STRUCTURES; DISTRIBUTED COMPUTER SYSTEMS; NETWORK SECURITY; PEER TO PEER NETWORKS;

EID: 79551699813     PISSN: 03600300     EISSN: 15577341     Source Type: Journal    
DOI: 10.1145/1883612.1883615     Document Type: Article
Times cited : (151)

References (91)
  • 1
    • 33751077077 scopus 로고    scopus 로고
    • The computational and storage potential of volunteer computing
    • DOI 10.1109/CCGRID.2006.101, 1630798, Sixth IEEE International Symposium on Cluster Computing and the Grid: Spanning the World and Beyond, 2006. CCGRID 06
    • ANDERSON, D. P. AND FEDAK, G. 2006. The computational and storage potential of volunteer computing. In Proceedings ot the 6th International Symposium on Cluster Computing and the Grid. IEEE Computer Society Press, Los Alamitos, CA, 73-80. (Pubitemid 44761684)
    • (2006) Sixth IEEE International Symposium on Cluster Computing and the Grid, 2006. CCGRID 06 , pp. 73-80
    • Anderson, D.P.1    Fedak, G.2
  • 3
  • 7
    • 32344438389 scopus 로고    scopus 로고
    • On the establishment of distinct identifies in overlay networks
    • DOI 10.1145/1073814.1073873, Proceedings of the 24th Annual ACM Symposium on Principles of Distributed Computing, PODC 2005
    • BAZZI, R. A. AND KONJEVOD, G. 2005. On the establishment of distinct identities in overlay networks. In Proceedings of the 24th Symposium on Principles of Distributed Computing. ACM Press, New York, NY, 312-320. (Pubitemid 43218411)
    • (2005) Proceedings of the Annual ACM Symposium on Principles of Distributed Computing , vol.24 , pp. 312-320
    • Bazzi, R.A.1    Konjevod, G.2
  • 8
    • 84885784991 scopus 로고    scopus 로고
    • Hop chains: Secure routing and the establishment of distinct identities
    • Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
    • BAZZI, R. A., RI CHOI, Y., AND GOUDA, M. G. 2006. Hop chains: Secure routing and the establishment of distinct identities. In Proceedings of the 10th International Conference on Principles of Distributed Systems. Lecture Notes on Computer Science, vol. 4305. Springer-Verlag, Berlin, Germany, 365-379.
    • (2006) Proceedings of the 10th International Conference on Principles of Distributed Systems , vol.4305 , pp. 365-379
    • Bazzi, R.A.1    Ri Choi, Y.2    Gouda, M.G.3
  • 11
    • 84934290505 scopus 로고    scopus 로고
    • A peer-to-peer replica location service based on a distributed hash table
    • IEEE Computer Society Press, Los Alamitos, CA
    • CAI, M., CHERVENAK, A., AND FRANK, M. 2004. A peer-to-peer replica location service based on a distributed hash table. In Proceedings of the 18th International Conference on Supercomputing. IEEE Computer Society Press, Los Alamitos, CA, 56.
    • (2004) Proceedings of the 18th International Conference on Supercomputing , vol.56
    • Cai, M.1    Chervenak, A.2    Frank, M.3
  • 14
    • 0036802048 scopus 로고    scopus 로고
    • Scribe: A large-scale and decentralized application-level multicast infrastructure
    • CASTRO, M., DRUSCHEL, P., KERMARREC, A.-M., AND ROWSTRON, A. 2002b. Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE J. Select. Areas Comm. 20, 8, 100-110.
    • (2002) IEEE J. Select. Areas Comm. , vol.20 , Issue.8 , pp. 100-110
    • Castro, M.1    Druschel, P.2    Kermarrec, A.-M.3    Rowstron, A.4
  • 15
    • 0345757358 scopus 로고    scopus 로고
    • Practical Byzantine Fault Tolerance and Proactive Recovery
    • DOI 10.1145/571637.571640
    • CASTRO, M. AND LISKOV, B. 2002. Practical Byzantine fault tolerance and proactive recovery. ACM Trans. Comput. Syst. 20, 4, 398-461. (Pubitemid 135702591)
    • (2002) ACM Transactions on Computer Systems , vol.20 , Issue.4 , pp. 398-461
    • Castro, M.1    Liskov, B.2
  • 25
    • 33750953996 scopus 로고    scopus 로고
    • Defending the sybil attack in P2P networks: Taxonomy, challenges, and a proposal for self-registration
    • DOI 10.1109/ARES.2006.45, 1625383, Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006
    • DINGER, J. AND HARTENSTEIN, H. 2006. Defending the Sybil attack in P2P networks: Taxonomy, challenges, and a proposal for self-registration. In Proceedings of the 1st International Conference on Availability, Reliability and Security. IEEE Computer Society Press, Los Alamitos, CA, 756-763. (Pubitemid 44732717)
    • (2006) Proceedings - First International Conference on Availability, Reliability and Security, ARES 2006 , vol.2006 , pp. 756-763
    • Dinger, J.1    Hartenstein, H.2
  • 26
  • 27
    • 84968779644 scopus 로고    scopus 로고
    • Censorship resistant peer-to-peer content addressable networks
    • Society for Industrial and Applied Mathematics, Philadelphia, PA
    • FIAT, A. AND SAIA, J. 2002. Censorship resistant peer-to-peer content addressable networks. In Proceedings of the 13th Symposium on Discrete Algorithms. Society for Industrial and Applied Mathematics, Philadelphia, PA, 94-103.
    • (2002) Proceedings of the 13th Symposium on Discrete Algorithms , pp. 94-103
    • Fiat, A.1    Saia, J.2
  • 28
    • 79551693817 scopus 로고    scopus 로고
    • Censorship resistant peer-to-peer networks
    • FIAT, A. AND SAIA, J. 2007. Censorship resistant peer-to-peer networks. Theor. Comput. 3, 1, 1-23.
    • (2007) Theor. Comput. , vol.3 , Issue.1 , pp. 1-23
    • Fiat, A.1    Saia, J.2
  • 29
    • 27144478012 scopus 로고    scopus 로고
    • Making Chord robust to Byzantine attacks
    • Algorithms - ESA 2005: 13th Annual European Symposium. Proceedings
    • FIAT, A., SAIA, J., AND YOUNG, M. 2005. Making Chord robust to Byzantine attack. In Proceedings of the 13th Annual European Symposium on Algorithms. Lecture Notes on Computer Science, vol. 3669. Springer- Verlag, Berlin, Germany, 803-814. (Pubitemid 41491577)
    • (2005) Lecture Notes in Computer Science , vol.3669 , pp. 803-814
    • Fiat, A.1    Saia, J.2    Young, M.3
  • 33
    • 33750291183 scopus 로고    scopus 로고
    • Minimizing churn in distributed systems
    • DOI 10.1145/1151659.1159931
    • GODFREY, P. B., SHENKER, S., AND STOICA, I. 2006. Minimizing churn in distributed systems. In Proceedings of the ACM SIGCOMM Data Communication Festival. ACM Press, New York, NY, 147-158. (Pubitemid 44623723)
    • (2006) Computer Communication Review , vol.36 , Issue.4 , pp. 147-158
    • Godfrey, P.B.1    Shenker, S.2    Stoica, I.3
  • 36
    • 35248864956 scopus 로고    scopus 로고
    • Kelips: Building an efficient and stable P2P DHT through increased memory and background overhead
    • Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
    • GUPTA, I., BIRMAN, K. P., LINGA, P., DEMERS, A. J., AND VAN RENESSE, R. 2003. Kelips: Building an efficient and stable P2P DHT through increased memory and background overhead. In Proceedings of the 2nd InternationalWorkshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2735. Springer- Verlag, Berlin, Germany, 160-169.
    • (2003) Proceedings of the 2nd InternationalWorkshop on Peer-to-Peer Systems , vol.2735 , pp. 160-169
    • Gupta, I.1    Birman, K.P.2    Linga, P.3    Demers, A.J.4    Van Renesse, R.5
  • 37
    • 67549104856 scopus 로고    scopus 로고
    • The effect of replica placement on routing robustness in distributed hash tables
    • IEEE Computer Society Press, Los Alamitos, CA
    • HARVESF, C. AND BLOUGH, D.M. 2006. The effect of replica placement on routing robustness in distributed hash tables. In Proceedings of the 6th International Conference on Peer-to-Peer Computing. IEEE Computer Society Press, Los Alamitos, CA, 57-6.
    • (2006) Proceedings of the 6th International Conference on Peer-to-Peer Computing , pp. 57-56
    • Harvesf, C.1    Blough, D.M.2
  • 38
    • 35248832638 scopus 로고    scopus 로고
    • Asymptotically efficient approaches to fault-tolerance in peer-topeer networks
    • Lecture Notes on Computer Science, Springer-Verlag, Berlin, German
    • HILDRUM, K. AND KUBIATOWICZ, J. 2003. Asymptotically efficient approaches to fault-tolerance in peer-topeer networks. In Proceedings of the 17th International Symposium on Distributed Computing (DISC). Lecture Notes on Computer Science, vol. 2848. Springer-Verlag, Berlin, German, 321-336.
    • (2003) Proceedings of the 17th International Symposium on Distributed Computing (DISC) , vol.2848 , pp. 321-336
    • Hildrum, K.1    Kubiatowicz, J.2
  • 40
    • 33845347872 scopus 로고    scopus 로고
    • Simple efficient load-balancing algorithms for peer-to-peer systems
    • DOI 10.1007/s00224-006-1246-6
    • KARGER, D. R. AND RUHL, M. 2006. Simple efficient load-balancing algorithms for peer-to-peer systems. Theor. Comput. Syst. 39, 6, 787-804. (Pubitemid 44878426)
    • (2006) Theory of Computing Systems , vol.39 , Issue.6 , pp. 787-804
    • Karger, D.R.1    Ruhl, M.2
  • 41
  • 45
    • 85206023214 scopus 로고    scopus 로고
    • LOS ANGELES TIMES.
    • LOS ANGELES TIMES. 2006. EDonkey file-sharing network is shut down. http://articles.latimes.com/2006/sep/13/business/fi-donkey13.
    • (2006) EDonkey File-sharing Network Is Shut Down
  • 46
    • 11244287362 scopus 로고    scopus 로고
    • Experiences applying game theory to system design
    • Proceedings of the ACM SIGCOMM 2004 Workshops
    • MAHAJAN, R., RODRIG, M., WETHERALL, D., AND ZAHORJAN, J. 2004. Experiences applying game theory to system design. In Proceedings of the Workshop on Practice and Theory of Incentives in Networked Systems (PINS). ACM Press, New York, NY, 183-190. (Pubitemid 40062768)
    • (2004) Proceedings of the ACM SIGCOMM 2004 Workshops , pp. 183-190
    • Mahajan, R.1    Rodrig, M.2    Wetherall, D.3    Zahorjan, J.4
  • 48
    • 84947235017 scopus 로고    scopus 로고
    • Kademlia: A peer-to-peer information system based on the XOR metric
    • Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
    • MAYMOUNKOV, P. AND MAZIÉRES, D. 2002. Kademlia: A peer-to-peer information system based on the XOR metric. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 53-65.
    • (2002) Proceedings of the 1st International Workshop on Peer-to-Peer Systems , vol.2429 , pp. 53-65
    • Maymounkov, P.1    Maziéres, D.2
  • 50
    • 50149117080 scopus 로고    scopus 로고
    • SCAR-Scattering, Concealing and Recovering Data within a DHT
    • IEEE Computer Society Press, Los Alamitos, CA
    • MILLS, B. N. AND ZNATI, T. F. 2008. SCAR-Scattering, Concealing and Recovering Data within a DHT. In Proceedings of the 41st Annual Simulation Symposium. IEEE Computer Society Press, Los Alamitos, CA, 35-42.
    • (2008) Proceedings of the 41st Annual Simulation Symposium , pp. 35-42
    • Mills, B.N.1    Znati, T.F.2
  • 51
    • 34248566417 scopus 로고    scopus 로고
    • A simple fault tolerant distributed hash table
    • Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
    • NAOR, M. AND WIEDER, U. 2003. A simple fault tolerant distributed hash table. In Proceedings of the 2nd InternationalWorkshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2735. Springer- Verlag, Berlin, Germany, 88-97.
    • (2003) Proceedings of the 2nd InternationalWorkshop on Peer-to-Peer Systems , vol.2735 , pp. 88-97
    • Naor, M.1    Wieder, U.2
  • 53
    • 33947179375 scopus 로고    scopus 로고
    • Globule: A collaborative content delivery network
    • DOI 10.1109/MCOM.2006.1678120
    • PIERRE, G. AND VAN STEEN, M. 2006. Globule: A collaborative content delivery network. IEEE Comm. Mag. 44, 8, 127-133. (Pubitemid 46405191)
    • (2006) IEEE Communications Magazine , vol.44 , Issue.8 , pp. 127-133
    • Pierre, G.1    Van Steen, M.2
  • 59
    • 0034775826 scopus 로고    scopus 로고
    • A scalable content-addressable network
    • DOI 10.1145/964723.383072
    • RATNASAMY, S., FRANCIS, P., HANDLEY, M., KARP, R., AND SCHENKER, S. 2001. A scalable content-addressable Network. In Proceedings of the ACM SIGCOMM Data Communications Festival. ACM Press, New York, NY, 161-172. (Pubitemid 32981962)
    • (2001) Computer Communication Review , vol.31 , Issue.4 , pp. 161-172
    • Ratnasamy, S.1    Francis, P.2    Handley, M.3    Karp, R.4    Schenker, S.5
  • 60
  • 62
    • 33748779477 scopus 로고    scopus 로고
    • Ph.D. dissertation, University of California at Berkeley, Berkeley, CA
    • RHEA, S. C. 2005. OpenDHT: A public DHT service. Ph.D. dissertation, University of California at Berkeley, Berkeley, CA.
    • (2005) OpenDHT: A Public DHT Service
    • Rhea, S.C.1
  • 63
    • 33646057696 scopus 로고    scopus 로고
    • High availability in DHTs: Erasure coding vs. replication
    • Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
    • RODRIGUES, R. AND LISKOV, B. 2005. High availability in DHTs: Erasure coding vs. replication. In Proceedings of the 4th International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 3640. Springer-Verlag, Berlin, Germany, 226-239.
    • (2005) Proceedings of the 4th International Workshop on Peer-to-Peer Systems , vol.3640 , pp. 226-239
    • Rodrigues, R.1    Liskov, B.2
  • 64
    • 34548349212 scopus 로고    scopus 로고
    • Limiting sybil attacks in structured P2P networks
    • DOI 10.1109/INFCOM.2007.328, 4215910, Proceedings - IEEE INFOCOM 2007: 26th IEEE International Conference on Computer Communications
    • ROWAIHY, H., ENCK, W., MCDANIEL, P., AND LA PORTA, T. 2007. Limiting Sybil attacks in structured peer-to-peer networks. In Proceedings of the 26th Annual Joint Conference of the IEEE Computer and Communications Societies. IEEE Computer Society Press, Los Alamitos, CA, 2596-2600. (Pubitemid 47334528)
    • (2007) Proceedings - IEEE INFOCOM , pp. 2596-2600
    • Rowaihy, H.1    Enck, W.2    McDaniel, P.3    La Porta, T.4
  • 65
    • 57349142855 scopus 로고    scopus 로고
    • Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
    • Middleware 2001
    • ROWSTRON, A. AND DRUSCHEL, P. 2001a. Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems. In Proceedings of theMiddleware Conference. Lecture Notes on Computer Science, vol. 2218. Springer-Verlag, Berlin, Germany, 329-350. (Pubitemid 33362020)
    • (2001) LECTURE NOTES IN COMPUTER SCIENCE , Issue.2218 , pp. 329-350
    • Rowstron, A.1    Druschel, P.2
  • 66
    • 0036038685 scopus 로고    scopus 로고
    • Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
    • DOI 10.1145/502059.502053
    • ROWSTRON, A. AND DRUSCHEL, P. 2001b. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility. In Proceedings of the 18th Symposium on Operating System Principles. ACM Press, New York, NY, 188-201. (Pubitemid 33612614)
    • (2001) Operating Systems Review (ACM) , vol.35 , Issue.5 , pp. 188-201
    • Rowstron, A.1    Druschel, P.2
  • 68
    • 30144446253 scopus 로고    scopus 로고
    • A novel methodology for constructing secure multipath overlays
    • DOI 10.1109/MIC.2005.117
    • SÁNCHEZ ARTIGAS, M.,GARCÍA LÓPEZ, P., AND GÓMEZ SKARMETA, A. F. 2005. A novel methodology for constructing secure multipath overlays. IEEE Internet Comput. 9, 6, 50-57. (Pubitemid 43051368)
    • (2005) IEEE Internet Computing , vol.9 , Issue.6 , pp. 50-57
    • Sanchez Artigas, M.1    Garcia Lopez, P.2    Gomez Skarmeta, A.F.3
  • 69
    • 27144447960 scopus 로고    scopus 로고
    • How to spread adversarial nodes? Rotate!
    • DOI 10.1145/1060590.1060694, STOC'05: Proceedings of the 37th Annual ACM Symposium on Theory of Computing
    • SCHEIDELER, C. 2005. How to spread adversarial nodes? Rotate! In Proceedings of the 37th Symposium on Theory of Computing. ACM Press, New York, NY, 704-713. (Pubitemid 43098643)
    • (2005) Proceedings of the Annual ACM Symposium on Theory of Computing , pp. 704-713
    • Scheideler, C.1
  • 72
    • 84947265806 scopus 로고    scopus 로고
    • Security considerations for peer-to-peer distributed hash tables
    • Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
    • SIT, E. AND MORRIS, R. 2002. Security considerations for peer-to-peer distributed hash tables. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 261-269.
    • (2002) Proceedings of the 1st International Workshop on Peer-to-Peer Systems , vol.2429 , pp. 261-269
    • Sit, E.1    Morris, R.2
  • 73
    • 85206041623 scopus 로고    scopus 로고
    • SKYPE LIMITED
    • SKYPE LIMITED. 2008. Skype. http://www.skype.com.
    • (2008)
  • 74
    • 21644471550 scopus 로고    scopus 로고
    • Vulnerabilities and security threats in structured overlay networks: A quantitative analysis
    • Proceedings - 20th Annual Computer Security Applications Conference, ACSAC 2004
    • SRIVATSA, M. AND LIU, L. 2004. Vulnerabilities and security threats in structured overlay networks: A quantitative analysis. In Proceedings of the 20th Annual Computer Security Applications Conference. IEEE Computer Society Press, Los Alamitos, CA, 252-261. (Pubitemid 40931080)
    • (2004) Proceedings - Annual Computer Security Applications Conference, ACSAC , pp. 252-261
    • Srivatsa, M.1    Liu, L.2
  • 75
    • 84947238430 scopus 로고    scopus 로고
    • Peer-to-peer caching schemes to address flash crowds
    • Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
    • STADING, T., MANIATIS, P., AND BAKER, M. 2002. Peer-to-peer caching schemes to address flash crowds. In Proceedings of the 1st International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 2429. Springer-Verlag, Berlin, Germany, 203-213.
    • (2002) Proceedings of the 1st International Workshop on Peer-to-Peer Systems , vol.2429 , pp. 203-213
    • Stading, T.1    Maniatis, P.2    Baker, M.3
  • 81
    • 0041992437 scopus 로고    scopus 로고
    • PSearch: Information retrieval in structured overlays
    • TANG, C., XU, Z., AND MAHALINGAM, M. 2003. pSearch: Information retrieval in structured overlays. ACM Comput. Comm. Rev. 33, 1, 89-94.
    • (2003) ACM Comput. Comm. Rev. , vol.33 , Issue.1 , pp. 89-94
    • Tang, C.1    Xu, Z.2    Mahalingam, M.3
  • 82
    • 33845373081 scopus 로고    scopus 로고
    • A survey of peer-to-peer security issues
    • Lecture Notes on Computer Science, Springer-Verlag, Berlin, Germany
    • WALLACH, D. 2002. A survey of peer-to-peer security issues. In Proceedings of the International Symposium on Software Security. Lecture Notes on Computer Science, vol. 2609. Springer-Verlag, Berlin, Germany, 42-57.
    • (2002) Proceedings of the International Symposium on Software Security , vol.2609 , pp. 42-57
    • Wallach, D.1
  • 83
    • 33751438006 scopus 로고    scopus 로고
    • An efficient and secure peer-to-peer overlay network
    • DOI 10.1109/LCN.2005.27, 1550961, Proceedings - The IEEE Conference on Local Computer Networks - 30th Anniversary, LCN 2005
    • WANG, H., ZHU, Y., AND HU, Y. 2005. An efficient and secure peer-to-peer overlay network. In Proceedings of the 30th Local Computer Networks. IEEE Computer Society Press, Los Alamitos, CA, 764-771. (Pubitemid 44815680)
    • (2005) Proceedings - Conference on Local Computer Networks, LCN , vol.2005 , pp. 764-771
    • Wang, H.1    Zhu, Y.2    Hu, Y.3
  • 84
    • 77955973071 scopus 로고    scopus 로고
    • Tech. rep. Digital Technology Center, University of Minnesota at Twin Cities, Minneapolis/St. Paul, MN
    • WANG, P.,OSIPKOV, I.,HOPPER, N., AND KIM, Y. 2007. Myrmic: Secure and robust DHT routing. Tech. rep. Digital Technology Center, University of Minnesota at Twin Cities, Minneapolis/St. Paul, MN.
    • (2007) Myrmic: Secure and Robust DHT Routing
    • Wang, P.1    Osipkov, I.2    Hopper, N.3    Kim, Y.4
  • 87
    • 33750285481 scopus 로고    scopus 로고
    • SybilGuard: Defending against sybil attacks via social networks
    • DOI 10.1145/1151659.1159945
    • YU, H., KAMINSKY, M., GIBBONS, P. B., AND FLAXMAN, A. 2006. SybilGuard: Defending against Sybil attacks via social networks. In Proceedings of the ACM SIGCOMMN Data Communications Festival. ACM Press, New York, NY, 267-278. (Pubitemid 44623733)
    • (2006) Computer Communication Review , vol.36 , Issue.4 , pp. 267-278
    • Yu, H.1    Kaminsky, M.2    Gibbons, P.B.3    Flaxman, A.4
  • 88
    • 24944569301 scopus 로고    scopus 로고
    • Leopard: A locality aware Peer-to-peer system with no hot spot
    • NETWORKING 2005 - Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Commun. Syst.: 4th Int. IFIP-TC6 Networking Conf., Proc.
    • YU, Y., LEE, S., AND ZHANG, Z.-L. 2005. Leopard: A locality aware peer-to-peer system with no hot spot. In Proceedings of the 4th International Networking Conference (NETWORKING). Lecture Notes on Computer Science, vol. 3462. Springer-Verlag, Berlin, Germany, 27-39. (Pubitemid 41312782)
    • (2005) Lecture Notes in Computer Science , vol.3462 , pp. 27-39
    • Yu, Y.1    Lee, S.2    Zhang, Z.-L.3
  • 90
    • 23944477365 scopus 로고    scopus 로고
    • P6P: A peer-to-peer approach to internet infrastructure
    • Peer-to-Peer Systems III - Third International Workshop, IPTPS 2004
    • ZHOU, L. AND VAN RENESSE, R. 2004. P6P: A peer-to-peer approach to Internet infrastructure. In Proceedings of the 3rd International Workshop on Peer-to-Peer Systems. Lecture Notes on Computer Science, vol. 3279. Springer-Verlag, Berlin, Germany, 75-86. (Pubitemid 41190540)
    • (2004) Lecture Notes in Computer Science , vol.3279 , pp. 75-86
    • Zhou, L.1    Van Renesse, R.2
  • 91
    • 17844398227 scopus 로고    scopus 로고
    • Efficient, proximity-aware load balancing for DHT-based P2P systems
    • DOI 10.1109/TPDS.2005.46
    • ZHU, Y. AND HU, Y. 2005. Efficient, proximity-aware load balancing for DHT-based P2P systems. IEEE Trans. Parallel Distrib. Syst. 16, 4, 349-361. (Pubitemid 40589983)
    • (2005) IEEE Transactions on Parallel and Distributed Systems , vol.16 , Issue.4 , pp. 349-361
    • Zhu, Y.1    Hu, Y.2


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.