Why Kad's routing table has hundreds of peers
暂无分享,去创建一个
[1] Zhoujun Li,et al. Toward an Accurate Snapshot of DHT Networks , 2011, IEEE Communications Letters.
[2] Taoufik En-Najjary,et al. Long Term Study of Peer Behavior in the kad DHT , 2009, IEEE/ACM Transactions on Networking.
[3] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[4] Zhoujun Li,et al. ID repetition in Kad , 2009, 2009 IEEE Ninth International Conference on Peer-to-Peer Computing.
[5] Taoufik En-Najjary,et al. A global view of kad , 2007, IMC '07.
[6] Zhoujun Li,et al. Monitoring, analyzing and characterizing lookup traffic in a large-scale DHT , 2011, Comput. Commun..
[7] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[8] Daniel Stutzbach,et al. Large-scale monitoring of DHT traffic , 2009, IPTPS.
[9] Olivier Festor,et al. Monitoring and Controlling Content Access in KAD , 2010, 2010 IEEE International Conference on Communications.
[10] Taoufik En-Najjary,et al. Actively Monitoring Peers in KAD , 2007, IPTPS.