-
1
-
-
84876208801
-
-
A-Mule. http://www.amule.org/.
-
-
-
-
2
-
-
60649112960
-
Misusing unstructured p2p systems to perform dos attacks: The network that never forgets
-
June
-
E. Athanasopoulos, K. G. Anagnostakis, and E. P. Markatos. Misusing unstructured p2p systems to perform dos attacks: The network that never forgets. In Proc. of ACNS 2006, June 2006.
-
(2006)
Proc. of ACNS 2006
-
-
Athanasopoulos, E.1
Anagnostakis, K.G.2
Markatos, E.P.3
-
3
-
-
84876271312
-
-
CAPTCHA. http://en.wikipedia.org/wiki/CAPTCHA.
-
CAPTCHA
-
-
-
4
-
-
56749139608
-
Building a reliable p2p system out of unreliable p2p clients: The case of kad
-
July Submitted to Conext 2007
-
D. Carra and E. Biersack. Building a reliable p2p system out of unreliable p2p clients: The case of kad. Technical report, Institut Eurecom, July 2007. Submitted to Conext 2007.
-
(2007)
Technical Report, Institut Eurecom
-
-
Carra, D.1
Biersack, E.2
-
5
-
-
2442603590
-
Secure routing for structured peer-to-peer overlay networks
-
Boston, USA, Dec.
-
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, and D. Wallach. Secure routing for structured peer-to-peer overlay networks. In Proceedings of OSDI'02, Boston, USA, Dec. 2002.
-
(2002)
Proceedings of OSDI'02
-
-
Castro, M.1
Druschel, P.2
Ganesh, A.3
Rowstron, A.4
Wallach, D.5
-
7
-
-
84876268786
-
-
CoDeeN. http://codeen.cs.princeton.edu/.
-
-
-
-
8
-
-
46449123237
-
Induced churn as shelter from routingtable poisoning
-
T. Condie, V. Kacholia, S. Sankararaman, J. Hellerstein, and P. Maniatis. Induced churn as shelter from routingtable poisoning. In Proc. 13th Annual Network and Distributed System Security Symposium (NDSS), 2006.
-
(2006)
Proc. 13th Annual Network and Distributed System Security Symposium (NDSS)
-
-
Condie, T.1
Kacholia, V.2
Sankararaman, S.3
Hellerstein, J.4
Maniatis, P.5
-
9
-
-
33646038920
-
Sybil-resistant DHT routing
-
Sept.
-
G. Danezis, C. L. Laas, F. M. Kaashoek, and R. Anderson. Sybil-Resistant DHT Routing. In ESORICS, pages 305-318, Sept. 2005.
-
(2005)
ESORICS
, pp. 305-318
-
-
Danezis, G.1
Laas, C.L.2
Kaashoek, F.M.3
Anderson, R.4
-
11
-
-
84876229072
-
-
E-Mule. http://www.emule-project.net/.
-
-
-
-
14
-
-
2442425480
-
The impact of dht routing geometry on resilience and proximity
-
K. Gummadi, R. Gummadi, S. Gribble, S. Ratnasamy, S. Shenker, and I. Stoica. The impact of dht routing geometry on resilience and proximity. In SIGCOMM '03, 2003.
-
(2003)
SIGCOMM '03
-
-
Gummadi, K.1
Gummadi, R.2
Gribble, S.3
Ratnasamy, S.4
Shenker, S.5
Stoica, I.6
-
17
-
-
84876237398
-
-
OpenDHT. http://opendht.org/.
-
-
-
-
18
-
-
84876248739
-
-
Overnet. http://www.overnet.org/.
-
-
-
-
20
-
-
34548349212
-
Limiting sybil attacks in structured p2p networks
-
H. Rowaihy, W. Enck, P. McDaniel, and T. La Porta. Limiting sybil attacks in structured p2p networks. In 26th IEEE International Conference on Computer Communications (INFOCOM), pages 2596-2600, 2007.
-
(2007)
26th IEEE International Conference on Computer Communications (INFOCOM)
, pp. 2596-2600
-
-
Rowaihy, H.1
Enck, W.2
McDaniel, P.3
La Porta, T.4
-
22
-
-
34547492967
-
Eclipse attacks on overlay networks: Threats and defenses
-
Apr.
-
A. Singh et al. Eclipse attacks on overlay networks: Threats and defenses. In Proc. Infocom 06, Apr. 2006.
-
(2006)
Proc. Infocom 06
-
-
Singh, A.1
-
23
-
-
7444246627
-
Security considerations for peer-to-peer distributed hash tables
-
Cambridge, MA, Mar.
-
E. Sit and R. Morris. Security considerations for peer-to-peer distributed hash tables. In Proceedings of IPTPS'02, Cambridge, MA, Mar. 2002.
-
(2002)
Proceedings of IPTPS'02
-
-
Sit, E.1
Morris, R.2
-
25
-
-
77952321257
-
Load reduction in the kad peer-to-peer system
-
M. Steiner, W. Effelsberg, T. En-Najjary, and E. W. Biersack. Load reduction in the kad peer-to-peer system. In Fifth International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P 2007), 2007.
-
(2007)
Fifth International Workshop on Databases, Information Systems and Peer-to-Peer Computing (DBISP2P 2007)
-
-
Steiner, M.1
Effelsberg, W.2
En-Najjary, T.3
Biersack, E.W.4
-
27
-
-
38049024292
-
Improving lookup performance over a widely-deployed DHT
-
Apr.
-
D. Stutzbach and R. Rejaie. Improving lookup performance over a widely-deployed DHT. In Proc. Infocom 06, Apr. 2006.
-
(2006)
Proc. Infocom 06
-
-
Stutzbach, D.1
Rejaie, R.2
-
28
-
-
35548992569
-
Sybilguard: Defending against sybil attacks via social networks
-
H. Yu, M. Kaminsky, P. B. Gibbons, and A. Flaxman. Sybilguard: Defending against sybil attacks via social networks. In SIGCOMM, 2006.
-
(2006)
SIGCOMM
-
-
Yu, H.1
Kaminsky, M.2
Gibbons, P.B.3
Flaxman, A.4
|