메뉴 건너뛰기




Volumn , Issue , 2012, Pages 325-334

Octopus: A secure and anonymous DHT lookup

Author keywords

Anonymity; DHT; Lookup; Security

Indexed keywords

ACTIVE ATTACK; ANONYMITY; ATTACKER IDENTIFICATION; DHT; DISTRIBUTED HASH TABLES; ERROR RATE; EVENT-BASED; LOOKUP LATENCY; LOOKUPS; LOW-BANDWIDTH; MALICIOUS NODES; PLANETLAB; PROBABILISTIC MODELING; SECURITY; SECURITY AND PRIVACY; STRUCTURED PEER-TO-PEER;

EID: 84866914654     PISSN: None     EISSN: None     Source Type: Conference Proceeding    
DOI: 10.1109/ICDCS.2012.78     Document Type: Conference Paper
Times cited : (24)

References (36)
  • 2
    • 2442421260 scopus 로고    scopus 로고
    • Kademlia: A peer-to-peer information system based on the xor metric
    • P. Maymounkov and D. Mazieres, "Kademlia: A peer-to-peer information system based on the xor metric," IPTPS, 2001.
    • (2001) IPTPS
    • Maymounkov, P.1    Mazieres, D.2
  • 4
    • 0002901250 scopus 로고    scopus 로고
    • Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility
    • A. Rowstron and P. Druschel, "Storage management and caching in past, a large-scale, persistent peer-to-peer storage utility," in Proc. SOSP'01, 2001.
    • (2001) Proc. SOSP'01
    • Rowstron, A.1    Druschel, P.2
  • 6
    • 34547281136 scopus 로고    scopus 로고
    • Salsa: A structured approach to large-scale anonymity
    • A. Nambiar and M. Wright, "Salsa: A structured approach to large-scale anonymity," ACM CCS, 2006.
    • (2006) ACM CCS
    • Nambiar, A.1    Wright, M.2
  • 7
    • 74049122426 scopus 로고    scopus 로고
    • Nisan: Network information service for anonymization networks
    • November
    • A. Panchenko, S. Richter, and A. Rache, "Nisan: Network information service for anonymization networks," ACM CCS, November 2009.
    • (2009) ACM CCS
    • Panchenko, A.1    Richter, S.2    Rache, A.3
  • 9
    • 74049096681 scopus 로고    scopus 로고
    • Shadowwalker: Peer-to-peer anonymous communication using redundant structured topologies
    • November
    • P. Mittal and N. Borisov, "Shadowwalker: Peer-to-peer anonymous communication using redundant structured topologies," ACM CCS, November 2009.
    • (2009) ACM CCS
    • Mittal, P.1    Borisov, N.2
  • 10
    • 84995370788 scopus 로고    scopus 로고
    • Privacy, cost, and availability tradeoffs in decentralized osns
    • A. Shakimov, A. Varshavsky, L. P. Cox, and R. Cáceres, "Privacy, cost, and availability tradeoffs in decentralized osns," ser. WOSN '09, 2009, pp. 13-18.
    • (2009) Ser. WOSN '09 , pp. 13-18
    • Shakimov, A.1    Varshavsky, A.2    Cox, L.P.3    Cáceres, R.4
  • 13
    • 70349273917 scopus 로고    scopus 로고
    • Information leaks in structured peer-to-peer anonymous communication systems
    • P. Mittal and N. Borisov, "Information leaks in structured peer-to-peer anonymous communication systems," ACM CCS, 2008.
    • (2008) ACM CCS
    • Mittal, P.1    Borisov, N.2
  • 14
    • 78649990817 scopus 로고    scopus 로고
    • In search of an anonymous and secure lookup: Attacks on structured peer-to-peer anonymous communication systems
    • Q. Wang, P. Mittal, and N. Borisov, "In search of an anonymous and secure lookup: Attacks on structured peer-to-peer anonymous communication systems," ACM CCS, 2010.
    • (2010) ACM CCS
    • Wang, Q.1    Mittal, P.2    Borisov, N.3
  • 15
    • 2442603590 scopus 로고    scopus 로고
    • Secure routing for structured peer-to-peer overlay networks
    • December
    • M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. S. Wallach, "Secure routing for structured peer-to-peer overlay networks," in OSDI, December 2002.
    • (2002) OSDI
    • Castro, M.1    Druschel, P.2    Ganesh, A.3    Rowstron, A.4    Wallach, D.S.5
  • 16
    • 85180784621 scopus 로고    scopus 로고
    • Halo: High-assurance locate for distributed hash tables
    • February
    • A. Kapadia and N. Triandopoulos, "Halo: High-assurance locate for distributed hash tables," in NDSS, February 2008.
    • (2008) NDSS
    • Kapadia, A.1    Triandopoulos, N.2
  • 17
    • 77955963220 scopus 로고    scopus 로고
    • Practical robust communication in dhts tolerating a byzantine adversary
    • M. Young, A. Kate, I. Goldberg, and M. Karsten, "Practical robust communication in dhts tolerating a byzantine adversary," Proc. ICDCS'10, pp. 263-272, 2010.
    • (2010) Proc. ICDCS'10 , pp. 263-272
    • Young, M.1    Kate, A.2    Goldberg, I.3    Karsten, M.4
  • 19
    • 84947273682 scopus 로고    scopus 로고
    • The sybil attack
    • J. Douceur, "The sybil attack," in Peer-to-Peer Systems, 2002, vol. 2429, pp. 251-260.
    • (2002) Peer-to-peer Systems , vol.2429 , pp. 251-260
    • Douceur, J.1
  • 20
    • 85027289714 scopus 로고    scopus 로고
    • Computational puzzles as sybil defenses
    • N. Borisov, "Computational puzzles as sybil defenses," in Peer-to-Peer Computing, 2006.
    • (2006) Peer-to-peer Computing
    • Borisov, N.1
  • 21
    • 85180633166 scopus 로고    scopus 로고
    • Sybilinfer: Detecting sybil nodes using social networks
    • G. Danezis and P. Mittal, "Sybilinfer: Detecting sybil nodes using social networks," in NDSS, 2009.
    • (2009) NDSS
    • Danezis, G.1    Mittal, P.2
  • 26
    • 26844513223 scopus 로고    scopus 로고
    • Certificate revocation system implementation based on the merkle hash tree
    • J. L. Muoz, J. Forne, O. Esparza, and M. Soriano, "Certificate revocation system implementation based on the merkle hash tree," Inte. Journ. of Inf. Sec., vol. 2, no. 2, 2003.
    • (2003) Inte. Journ. of Inf. Sec. , vol.2 , Issue.2
    • Muoz, J.L.1    Forne, J.2    Esparza, O.3    Soriano, M.4
  • 27
    • 50249179543 scopus 로고    scopus 로고
    • Certificate revocation system based on peer-to-peer crl distribution
    • M. C. Morogan and S. Muftic, "Certificate revocation system based on peer-to-peer crl distribution," in Proc. of the DMS'03 Conference, 2003.
    • (2003) Proc. of the DMS'03 Conference
    • Morogan, M.C.1    Muftic, S.2
  • 30
    • 84866938061 scopus 로고    scopus 로고
    • Octopus: A secure and anonymous dht lookup
    • Q. Wang and N. Borisov, "Octopus: A secure and anonymous dht lookup," technical report, arXiv cs.CR, 2012. http://arxiv. org/abs/1203.2668.
    • (2012) Technical Report, ArXiv Cs.CR
    • Wang, Q.1    Borisov, N.2
  • 32
    • 33845351408 scopus 로고    scopus 로고
    • Cyclone: A novel design schema for hierarchical dhts
    • M. S. Artigas, P. G. Lopez, J. P. Ahullo, and A. F. G. Skarmeta, "Cyclone: A novel design schema for hierarchical dhts," In P2P 05, pp. 49-56, 2005.
    • (2005) P2P 05 , pp. 49-56
    • Artigas, M.S.1    Lopez, P.G.2    Ahullo, J.P.3    Skarmeta, A.F.G.4
  • 36
    • 84866938064 scopus 로고    scopus 로고
    • WASTE. http://waste.sourceforge.net/.


* 이 정보는 Elsevier사의 SCOPUS DB에서 KISTI가 분석하여 추출한 것입니다.