A secure platform for peer-to-peer computing in the Internet
暂无分享,去创建一个
[1] Butler W. Lampson,et al. SPKI Certificate Theory , 1999, RFC.
[2] Mark Weiser,et al. Some computer science issues in ubiquitous computing , 1993, CACM.
[3] Nicholas Carriero,et al. Linda in context , 1989, CACM.
[4] David R. Karger,et al. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.
[5] Michael F. Schwartz,et al. Locating nearby copies of replicated Internet servers , 1995, SIGCOMM '95.
[6] F SchwartzMichael,et al. Locating nearby copies of replicated Internet servers , 1995 .
[7] Rajmohan Rajaraman,et al. Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1997, SPAA '97.
[8] Ian F. Blake,et al. Elliptic curves in cryptography , 1999 .
[9] P. Hoffman. Internet Draft , 1998 .
[10] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[11] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[12] Samuel P. Midkiff,et al. The NINJA project , 2001, CACM.
[13] Akhil Sahai,et al. E-Speak - an Enabling Infrastructure for Web-based E-Services , 2000 .
[14] Tim Howes,et al. Lightweight Directory Access Protocol , 1995, RFC.
[15] Philip R. Zimmermann,et al. The official PGP user's guide , 1996 .
[16] Charles E. Perkins,et al. Service Location Protocol, Version 2 , 1999, RFC.
[17] Nigel P. Smart,et al. Elliptic Curves in Cryptography: Preface , 1999 .
[18] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[19] M. Lynn. Hawaii International Conference on System Sciences , 1996 .
[20] Gul A. Agha,et al. Abstraction and modularity mechanisms for concurrent computing , 1993, IEEE Parallel & Distributed Technology: Systems & Applications.
[21] Ben Y. Zhao,et al. An architecture for a secure service discovery service , 1999, MobiCom.