Limiting Sybil Attacks in Structured P2P Networks
暂无分享,去创建一个
Thomas F. La Porta | Patrick D. McDaniel | William Enck | Hosam Rowaihy | H. Rowaihy | P. Mcdaniel | T. L. Porta | W. Enck
[1] Mudhakar Srivatsa,et al. Vulnerabilities and security threats in structured overlay networks: a quantitative analysis , 2004, 20th Annual Computer Security Applications Conference.
[2] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[3] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[4] Ralph C. Merkle,et al. Secure communications over insecure channels , 1978, CACM.
[5] Ted Wobber,et al. Moderately hard, memory-bound functions , 2005, TOIT.
[6] Stefan Saroiu,et al. A Measurement Study of Peer-to-Peer File Sharing Systems , 2001 .
[7] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[8] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[9] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[10] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.