-
1
-
-
70350430436
-
A gossip-based distributed social networking system
-
Groningen, Netherlands. IEEE Computer Society, 29 June-1 July 2009
-
Abbas S, Pouwelse J, Epema D, Sips H (2009) A gossip-based distributed social networking system. In: WETICE'09: 18th IEEE international workshops on enabling technologies. Groningen, Netherlands. IEEE Computer Society, 29 June-1 July 2009, pp 93-98.
-
(2009)
WETICE'09: 18th IEEE international workshops on enabling technologies
, pp. 93-98
-
-
Abbas, S.1
Pouwelse, J.2
Epema, D.3
Sips, H.4
-
2
-
-
55149122075
-
Tempering Kademlia with a robust identity based system
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/P2P. 2008. 40
-
Aiello LM, Milanesio M, Ruffo G, Schifanella R (2008) Tempering Kademlia with a robust identity based system. In: P2P '08: Proceedings of the 2008 eighth international conference on peer-to-peer computing. IEEE Computer Society, Washington, DC, USA, pp 30-39. doi: 10. 1109/P2P. 2008. 40.
-
(2008)
P2P '08: Proceedings of the 2008 eighth international conference on peer-to-peer computing
, pp. 30-39
-
-
Aiello, L.M.1
Milanesio, M.2
Ruffo, G.3
Schifanella, R.4
-
3
-
-
77954007675
-
Secure and flexible framework for decentralized social network services
-
IEEE Computer Society
-
Aiello LM, Ruffo G (2010) Secure and flexible framework for decentralized social network services. In: SESOC '10: Security and Social Networking Workshop. IEEE Computer Society, pp 594-599.
-
(2010)
SESOC '10: Security and Social Networking Workshop
, pp. 594-599
-
-
Aiello, L.M.1
Ruffo, G.2
-
5
-
-
48049100352
-
S/Kademlia: a practicable approach towards secure key-based routing
-
Hsinchu, Taiwan, doi: 10. 1109/ICPADS. 2007. 4447808
-
Baumgart I, Mies S (2007) S/Kademlia: a practicable approach towards secure key-based routing. In: Proc. of P2P-NVE 2007 in conjunction with ICPADS 2007, Hsinchu, Taiwan, vol 2. doi: 10. 1109/ICPADS. 2007. 4447808.
-
(2007)
Proc. of P2P-NVE 2007 in conjunction with ICPADS 2007
, vol.2
-
-
Baumgart, I.1
Mies, S.2
-
6
-
-
70349659393
-
Fighting spam with the NeighborhoodWatch DHT
-
Bender A, Sherwood R, Monner D, Goergen N, Spring N, Bhattacharjee B (2009) Fighting spam with the NeighborhoodWatch DHT. In: INFOCOM.
-
(2009)
INFOCOM
-
-
Bender, A.1
Sherwood, R.2
Monner, D.3
Goergen, N.4
Spring, N.5
Bhattacharjee, B.6
-
7
-
-
80051791457
-
-
Tech. rep., IBM Raleigh, Watson and Zurich Laboratories
-
Bird R, Gopal I, Herzberg A, Janson P, Kutten S, Molva R, Yung M (1992) Systematic design of a family of attack-resistant authentication protocols. Tech. rep., IBM Raleigh, Watson and Zurich Laboratories.
-
(1992)
Systematic design of a family of attack-resistant authentication protocols
-
-
Bird, R.1
Gopal, I.2
Herzberg, A.3
Janson, P.4
Kutten, S.5
Molva, R.6
Yung, M.7
-
8
-
-
0037623983
-
Identity-based encryption from the Weil Pairing
-
doi:10.1137/S0097539701398521
-
Boneh D, Franklin M (2003) Identity-based encryption from the Weil Pairing. SIAM J Comput 32(3): 586-615. doi: 10. 1137/S0097539701398521.
-
(2003)
SIAM J Comput
, vol.32
, Issue.3
, pp. 586-615
-
-
Boneh, D.1
Franklin, M.2
-
9
-
-
50049110213
-
A performance evaluation of the kad protocol
-
Master's thesis, Institut Eurecom
-
Brunner R (2006) A performance evaluation of the kad protocol. Master's thesis, Institut Eurecom.
-
(2006)
-
-
Brunner, R.1
-
12
-
-
84978382732
-
Secure routing for structured peer-to-peer overlay networks
-
ACM, New York, NY, USA, doi: 10. 1145/1060289. 1060317
-
Castro M, Druschel P, Ganesh A, Rowstron A, Wallach DS (2002) Secure routing for structured peer-to-peer overlay networks. In: OSDI '02: proceedings of the 5th symposium on operating systems design and implementation. ACM, New York, NY, USA, pp 299-314. doi: 10. 1145/1060289. 1060317.
-
(2002)
OSDI '02: Proceedings of the 5th symposium on operating systems design and implementation
, pp. 299-314
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.S.5
-
13
-
-
73549116337
-
Virtual direction routing for overlay networks
-
Seattle, WA, USA: IEEE Computer Society
-
Cheng BN, Yuksel M, Kalyanaraman S (2009) Virtual direction routing for overlay networks. In: P2P '09: proceedings of the 2009 ninth international conference on peer-to-peer computing. IEEE Computer Society, Seattle, WA, USA.
-
(2009)
P2P '09: Proceedings of the 2009 Ninth International Conference on Peer-to-Peer Computing
-
-
Cheng, B.N.1
Yuksel, M.2
Kalyanaraman, S.3
-
14
-
-
77950151506
-
An identity based encryption scheme based on quadratic residues
-
London, UK: Springer
-
Cocks C (2001) An identity based encryption scheme based on quadratic residues. In: Proc. of the 8th IMA int. conf. on cryptography and coding. Springer, London, UK, pp 360-363.
-
(2001)
Proc. Of the 8th IMA Int. Conf. On Cryptography and Coding
, pp. 360-363
-
-
Cocks, C.1
-
15
-
-
70949087670
-
Induced churn as shelter from routing-table poisoning
-
San Diego, California, USA
-
Condie T, Kacholia V, Sankararaman S, Hellerstein JM, Maniatis P (2006) Induced churn as shelter from routing-table poisoning. In: Proc. of NDSS 2006, San Diego, California, USA.
-
(2006)
Proc. of NDSS 2006
-
-
Condie, T.1
Kacholia, V.2
Sankararaman, S.3
Hellerstein, J.M.4
Maniatis, P.5
-
16
-
-
77953993496
-
Leveraging social links for trust and privacy in networks
-
Open Research Problems in Network Security. Zurich, Switzerland
-
Cutillo LA, Molva R, Strufe T (2009) Leveraging social links for trust and privacy in networks. In: INet Sec 2009. Open Research Problems in Network Security. Zurich, Switzerland.
-
(2009)
INet Sec 2009
-
-
Cutillo, L.A.1
Molva, R.2
Strufe, T.3
-
18
-
-
73549116337
-
Virtual direction routing for overlay networks
-
Seattle, WA, USA: IEEE Computer Society
-
Ennan Z, Ruichuan C, Zhuhua C, Long Z, Huiping S, Eng KL, Sihan Q, Liyong T, Zhong C (2009) Virtual direction routing for overlay networks. In: P2P '09: proceedings of the 2009 ninth international conference on peer-to-peer computing. IEEE Computer Society, Seattle, WA, USA.
-
(2009)
P2P '09: Proceedings of the 2009 Ninth International Conference on Peer-to-Peer Computing
-
-
Ennan, Z.1
Ruichuan, C.2
Zhuhua, C.3
Long, Z.4
Huiping, S.5
Eng, K.L.6
Sihan, Q.7
Liyong, T.8
Zhong, C.9
-
20
-
-
73549114665
-
On tracking freeriders in gossip protocols
-
Seattle, WA, USA: IEEE Computer Society
-
Guerraoui R, Huguenin K, Kermarrec AM, Monod M (2009) On tracking freeriders in gossip protocols. In: P2P '09: proceedings of the 2009 ninth international conference on peer-to-peer computing. IEEE Computer Society, Seattle, WA, USA.
-
(2009)
P2P '09: Proceedings of the 2009 Ninth International Conference on Peer-to-Peer Computing
-
-
Guerraoui, R.1
Huguenin, K.2
Kermarrec, A.M.3
Monod, M.4
-
22
-
-
33846834126
-
A survey of trust and reputation systems for online service provision
-
Josang A, Ismail R, Boyd C (2007) A survey of trust and reputation systems for online service provision. Decis Support Syst 43(2): 618-644.
-
(2007)
Decis Support Syst
, vol.43
, Issue.2
, pp. 618-644
-
-
Josang, A.1
Ismail, R.2
Boyd, C.3
-
23
-
-
84880467894
-
The eigentrust algorithm for reputation management in P2P networks
-
New York, NY, USA: ACM
-
Kamvar SD, Schlosser MT, Garcia-Molina H (2003) The eigentrust algorithm for reputation management in P2P networks. proceedings of the 12th international conference on World Wide Web. ACM, New York, NY, USA, pp 640-651.
-
(2003)
Proceedings of the 12th International Conference on World Wide Web
, pp. 640-651
-
-
Kamvar, S.D.1
Schlosser, M.T.2
Garcia-Molina, H.3
-
24
-
-
0034440650
-
-
Kubiatowicz J, Bindel D, Chen Y, Czerwinski S, Eaton P, Geels D, Gummadi R, Rhea S, Weatherspoon H, Weimer W, Wells C, Zhao B (2000) Oceanstore: an architecture for global-scale persistent storage, pp 190-201.
-
(2000)
Oceanstore: An architecture for global-scale persistent storage
, pp. 190-201
-
-
Kubiatowicz, J.1
Bindel, D.2
Chen, Y.3
Czerwinski, S.4
Eaton, P.5
Geels, D.6
Gummadi, R.7
Rhea, S.8
Weatherspoon, H.9
Weimer, W.10
Wells, C.11
Zhao, B.12
-
27
-
-
34547421426
-
The index poisoning attack in P2P file sharing systems
-
Liang J, Naoumov N, Ross KW (2006) The index poisoning attack in P2P file sharing systems. In: INFOCOM.
-
(2006)
INFOCOM
-
-
Liang, J.1
Naoumov, N.2
Ross, K.W.3
-
28
-
-
78249234070
-
Prevention of index-poisoning DDoS attacks in peer-to-peer file-sharing networks
-
(submitted to IEEE Trans. on Multimedia, Special Issue on Content Storage and Delivery in P2P Networks)
-
Lou X, Hwang K (2006) Prevention of index-poisoning DDoS attacks in peer-to-peer file-sharing networks (submitted to IEEE Trans. on Multimedia, Special Issue on Content Storage and Delivery in P2P Networks).
-
(2006)
-
-
Lou, X.1
Hwang, K.2
-
30
-
-
70449485828
-
Avoiding eclipse attacks on Kad/Kademlia: an identity based approach
-
Germany: Dresden
-
Maccari L, Rosi M, Fantacci R, Chisci L, Milanesio M, Aiello LM (2009) Avoiding eclipse attacks on Kad/Kademlia: an identity based approach. In: ICC 2009 communication and information systems security symposium. Dresden, Germany.
-
(2009)
ICC 2009 Communication and Information Systems Security Symposium
-
-
Maccari, L.1
Rosi, M.2
Fantacci, R.3
Chisci, L.4
Milanesio, M.5
Aiello, L.M.6
-
32
-
-
85092909445
-
POST: a secure, resilient, cooperative messaging system
-
USENIX Association, Berkeley, CA, USA
-
Mislove A, Post A, Reis C, Willmann P, Druschel P, Wallach DS, Bonnaire X, Sens P, Busca JM, Arantes-Bezerra L (2003) POST: a secure, resilient, cooperative messaging system. In: HOTOS'03: proceedings of the 9th conference on Hot Topics in Operating Systems. USENIX Association, Berkeley, CA, USA, pp 11-11.
-
(2003)
HOTOS'03: Proceedings of the 9th conference on Hot Topics in Operating Systems
, pp. 11
-
-
Mislove, A.1
Post, A.2
Reis, C.3
Willmann, P.4
Druschel, P.5
Wallach, D.S.6
Bonnaire, X.7
Sens, P.8
Busca, J.M.9
Arantes-Bezerra, L.10
-
33
-
-
36248934944
-
Exploiting P2P systems for DDoS attacks
-
New York, NY, USA: ACM
-
Naoumov N, Ross K (2006) Exploiting P2P systems for DDoS attacks. In: InfoScale '06: Proceedings of the 1st international conference on scalable information systems. ACM, New York, NY, USA, p 47.
-
(2006)
InfoScale '06: Proceedings of the 1st International Conference on Scalable Information Systems
, pp. 47
-
-
Naoumov, N.1
Ross, K.2
-
34
-
-
34547448344
-
Openid 2.0: a platform for user-centric identity management
-
ACM, New York, NY, USA, doi: 10. 1145/1179529. 1179532
-
Recordon D, Reed D (2006) Openid 2. 0: a platform for user-centric identity management. In: DIM '06: proceedings of the second ACM workshop on Digital identity management. ACM, New York, NY, USA, pp 11-16. doi: 10. 1145/1179529. 1179532.
-
(2006)
DIM '06: Proceedings of the second ACM workshop on Digital identity management
, pp. 11-16
-
-
Recordon, D.1
Reed, D.2
-
36
-
-
35248871185
-
-
Tech. Rep. NAS-TR-0017-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA
-
Rowaihy H, Enck W, McDaniel P, Porta TL (2005) Limiting sybil attacks in structured peer-to-peer networks. Tech. Rep. NAS-TR-0017-2005, Network and Security Research Center, Department of Computer Science and Engineering, Pennsylvania State University, University Park, PA, USA.
-
(2005)
Limiting sybil attacks in structured peer-to-peer networks
-
-
Rowaihy, H.1
Enck, W.2
McDaniel, P.3
Porta, T.L.4
-
37
-
-
57349142855
-
Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems
-
London, UK: Springer-Verlag
-
Rowstron A, Druschel P (2001) Pastry: scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Middleware'01: proceedings of the IFIP/ACM international conference on distributed systems platforms. Springer-Verlag, London, UK, pp 329-350.
-
(2001)
Middleware'01: Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms
, pp. 329-350
-
-
Rowstron, A.1
Druschel, P.2
-
39
-
-
35248850713
-
-
In: Proc. of AINAW '07. IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/AINAW. 2007. 221
-
Ryu S, Butler K, Traynor P, McDaniel P (2007) Leveraging identity-based cryptography for node id assignment in structured P2P systems. In: Proc. of AINAW '07. IEEE Computer Society, Washington, DC, USA, pp 519-524. doi: 10. 1109/AINAW. 2007. 221.
-
(2007)
Leveraging identity-based cryptography for node id assignment in structured P2P systems
, pp. 519-524
-
-
Ryu, S.1
Butler, K.2
Traynor, P.3
McDaniel, P.4
-
40
-
-
85020598353
-
Identity based cryptosystems and signature schemes
-
New York, NY, USA: Springer
-
Shamir A (1985) Identity based cryptosystems and signature schemes. In: CRYPTO 84: proceedings of advances in cryptology. Springer, New York, NY, USA, pp 47-53.
-
(1985)
CRYPTO 84: Proceedings of Advances in Cryptology
, pp. 47-53
-
-
Shamir, A.1
-
41
-
-
34547492967
-
Eclipse attacks on overlays: threats and defenses
-
Barcelona, Spanien: IEEE Computer Society
-
Singh A, Ngan TW, Druschel P, Wallach D (2006) Eclipse attacks on overlays: threats and defenses. In: Proc. of the 25th IEEE InfoCom 2006. IEEE Computer Society, Barcelona, Spanien.
-
(2006)
Proc. Of the 25th IEEE InfoCom 2006
-
-
Singh, A.1
Ngan, T.W.2
Druschel, P.3
Wallach, D.4
-
43
-
-
33646831908
-
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
-
doi: 10. 1145/1060745. 1060808
-
Srivatsa M, Xiong L, Liu L (2005) TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks. 14th international conference on World Wide Web, pp 422-431. doi: 10. 1145/1060745. 1060808.
-
(2005)
14th international conference on World Wide Web
, pp. 422-431
-
-
Srivatsa, M.1
Xiong, L.2
Liu, L.3
-
45
-
-
42149134194
-
A global view of KAD
-
ACM, New York, NY, USA, doi: 10. 1145/1298306. 1298323
-
Steiner M, En-Najjary T, Biersack EW (2007) A global view of KAD. In: IMC '07: proc. of the 7th ACM SIGCOMM. ACM, New York, NY, USA, pp 117-122. doi: 10. 1145/1298306. 1298323.
-
(2007)
IMC '07: Proc. of the 7th ACM SIGCOMM
, pp. 117-122
-
-
Steiner, M.1
En-Najjary, T.2
Biersack, E.W.3
-
46
-
-
0034782005
-
Chord: a scalable peer-to-peer lookup service for internet applications
-
ACM, New York, NY, USA, doi: 10. 1145/383059. 383071
-
Stoica I, Morris R, Karger D, Kaashoek MF, Balakrishnan H (2001) Chord: a scalable peer-to-peer lookup service for internet applications. In: SIGCOMM '01: proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications. ACM, New York, NY, USA, pp 149-160. doi: 10. 1145/383059. 383071.
-
(2001)
SIGCOMM '01: Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
, pp. 149-160
-
-
Stoica, I.1
Morris, R.2
Karger, D.3
Kaashoek, M.F.4
Balakrishnan, H.5
-
48
-
-
33751438006
-
An efficient and secure peer-to-peer overlay network
-
IEEE Computer Society, Washington, DC, USA, doi: 10. 1109/LCN. 2005. 27
-
Wang H, Zhu Y, Hu Y (2005) An efficient and secure peer-to-peer overlay network. In: LCN '05: proceedings of the the IEEE conference on local computer networks. IEEE Computer Society, Washington, DC, USA, pp 764-771. doi: 10. 1109/LCN. 2005. 27.
-
(2005)
LCN '05: Proceedings of the the IEEE conference on local computer networks
, pp. 764-771
-
-
Wang, H.1
Zhu, Y.2
Hu, Y.3
-
50
-
-
45749116664
-
Sybillimit: a near-optimal social network defense against sybil attacks
-
SP 2008
-
Yu H, Gibbons PB, Kaminsky M, Xiao F (2008) Sybillimit: a near-optimal social network defense against sybil attacks. In: IEEE symposium on security and privacy, 2008. SP 2008, pp 3-17.
-
(2008)
IEEE symposium on security and privacy, 2008
, pp. 3-17
-
-
Yu, H.1
Gibbons, P.B.2
Kaminsky, M.3
Xiao, F.4
|