메뉴 건너뛰기




Volumn 4, Issue 4, 2011, Pages 420-438

An identity-based approach to secure P2P applications with Likir

Author keywords

DHT; Distributed social networking systems; Routing poisoning; Storage attacks; Sybil attack

Indexed keywords

DHT; DISTRIBUTED FRAMEWORK; DISTRIBUTED HASH TABLE; DISTRIBUTED SOCIAL NETWORKING SYSTEMS; EFFICIENT IMPLEMENTATION; IDENTITY-BASED; NETWORK-BASED; P2P APPLICATIONS; P2P SYSTEM; PEER TO PEER; PERFORMANCE EVALUATION; ROUTING POISONING; SECURE OVERLAY; SECURITY ANALYSIS; SECURITY SERVICES; SECURITY THREATS; STRUCTURED OVERLAY NETWORK; SYBIL ATTACK; USER IDENTITY;

EID: 80051789956     PISSN: 19366442     EISSN: 19366450     Source Type: Journal    
DOI: 10.1007/s12083-010-0099-6     Document Type: Article
Times cited : (9)

References (50)
  • 3
    • 77954007675 scopus 로고    scopus 로고
    • Secure and flexible framework for decentralized social network services
    • IEEE Computer Society
    • Aiello LM, Ruffo G (2010) Secure and flexible framework for decentralized social network services. In: SESOC '10: Security and Social Networking Workshop. IEEE Computer Society, pp 594-599.
    • (2010) SESOC '10: Security and Social Networking Workshop , pp. 594-599
    • Aiello, L.M.1    Ruffo, G.2
  • 5
    • 48049100352 scopus 로고    scopus 로고
    • S/Kademlia: a practicable approach towards secure key-based routing
    • Hsinchu, Taiwan, doi: 10. 1109/ICPADS. 2007. 4447808
    • Baumgart I, Mies S (2007) S/Kademlia: a practicable approach towards secure key-based routing. In: Proc. of P2P-NVE 2007 in conjunction with ICPADS 2007, Hsinchu, Taiwan, vol 2. doi: 10. 1109/ICPADS. 2007. 4447808.
    • (2007) Proc. of P2P-NVE 2007 in conjunction with ICPADS 2007 , vol.2
    • Baumgart, I.1    Mies, S.2
  • 8
    • 0037623983 scopus 로고    scopus 로고
    • Identity-based encryption from the Weil Pairing
    • doi:10.1137/S0097539701398521
    • Boneh D, Franklin M (2003) Identity-based encryption from the Weil Pairing. SIAM J Comput 32(3): 586-615. doi: 10. 1137/S0097539701398521.
    • (2003) SIAM J Comput , vol.32 , Issue.3 , pp. 586-615
    • Boneh, D.1    Franklin, M.2
  • 9
    • 50049110213 scopus 로고    scopus 로고
    • A performance evaluation of the kad protocol
    • Master's thesis, Institut Eurecom
    • Brunner R (2006) A performance evaluation of the kad protocol. Master's thesis, Institut Eurecom.
    • (2006)
    • Brunner, R.1
  • 14
    • 77950151506 scopus 로고    scopus 로고
    • An identity based encryption scheme based on quadratic residues
    • London, UK: Springer
    • Cocks C (2001) An identity based encryption scheme based on quadratic residues. In: Proc. of the 8th IMA int. conf. on cryptography and coding. Springer, London, UK, pp 360-363.
    • (2001) Proc. Of the 8th IMA Int. Conf. On Cryptography and Coding , pp. 360-363
    • Cocks, C.1
  • 16
    • 77953993496 scopus 로고    scopus 로고
    • Leveraging social links for trust and privacy in networks
    • Open Research Problems in Network Security. Zurich, Switzerland
    • Cutillo LA, Molva R, Strufe T (2009) Leveraging social links for trust and privacy in networks. In: INet Sec 2009. Open Research Problems in Network Security. Zurich, Switzerland.
    • (2009) INet Sec 2009
    • Cutillo, L.A.1    Molva, R.2    Strufe, T.3
  • 22
    • 33846834126 scopus 로고    scopus 로고
    • A survey of trust and reputation systems for online service provision
    • Josang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2): 618-644.
    • (2007) Decis Support Syst , vol.43 , Issue.2 , pp. 618-644
    • Josang, A.1    Ismail, R.2    Boyd, C.3
  • 27
    • 34547421426 scopus 로고    scopus 로고
    • The index poisoning attack in P2P file sharing systems
    • Liang J, Naoumov N, Ross KW (2006) The index poisoning attack in P2P file sharing systems. In: INFOCOM.
    • (2006) INFOCOM
    • Liang, J.1    Naoumov, N.2    Ross, K.W.3
  • 28
    • 78249234070 scopus 로고    scopus 로고
    • Prevention of index-poisoning DDoS attacks in peer-to-peer file-sharing networks
    • (submitted to IEEE Trans. on Multimedia, Special Issue on Content Storage and Delivery in P2P Networks)
    • Lou X, Hwang K (2006) Prevention of index-poisoning DDoS attacks in peer-to-peer file-sharing networks (submitted to IEEE Trans. on Multimedia, Special Issue on Content Storage and Delivery in P2P Networks).
    • (2006)
    • Lou, X.1    Hwang, K.2
  • 36
    • 35248871185 scopus 로고    scopus 로고
    • Tech. Rep. NAS-TR-0017-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA
    • Rowaihy H, Enck W, McDaniel P, Porta TL (2005) Limiting sybil attacks in structured peer-to-peer networks. Tech. Rep. NAS-TR-0017-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA.
    • (2005) Limiting sybil attacks in structured peer-to-peer networks
    • Rowaihy, H.1    Enck, W.2    McDaniel, P.3    Porta, T.L.4
  • 40
    • 85020598353 scopus 로고
    • Identity based cryptosystems and signature schemes
    • New York, NY, USA: Springer
    • Shamir A (1985) Identity based cryptosystems and signature schemes. In: CRYPTO 84: proceedings of advances in cryptology. Springer, New York, NY, USA, pp 47-53.
    • (1985) CRYPTO 84: Proceedings of Advances in Cryptology , pp. 47-53
    • Shamir, A.1
  • 43
    • 33646831908 scopus 로고    scopus 로고
    • TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
    • doi: 10. 1145/1060745. 1060808
    • Srivatsa M, Xiong L, Liu L (2005) TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. 14th international conference on World Wide Web, pp 422-431. doi: 10. 1145/1060745. 1060808.
    • (2005) 14th international conference on World Wide Web , pp. 422-431
    • Srivatsa, M.1    Xiong, L.2    Liu, L.3
  • 48
    • 33751438006 scopus 로고    scopus 로고
    • An efficient and secure peer-to-peer overlay network
    • IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/LCN. 2005. 27
    • Wang H, Zhu Y, Hu Y (2005) An efficient and secure peer-to-peer overlay network. In: LCN '05: proceedings of the the IEEE conference on local computer networks. IEEE Computer Society, Washington, DC, USA, pp 764-771. doi: 10. 1109/LCN. 2005. 27.
    • (2005) LCN '05: Proceedings of the the IEEE conference on local computer networks , pp. 764-771
    • Wang, H.1    Zhu, Y.2    Hu, Y.3


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.