Fighting Cheating in P2P-based MMVEs with Disjoint Path Routing
暂无分享,去创建一个
[1] Jim Davies,et al. Replication strategies for reliable decentralised storage , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[2] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[3] Ben Y. Zhao,et al. Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.
[4] Miguel Castro,et al. Defending against eclipse attacks on overlay networks , 2004, EW 11.
[5] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[6] Aleksandar Kuzmanovic,et al. Denial-of-service resilience in peer-to-peer file sharing systems , 2005, SIGMETRICS '05.
[7] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[8] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[9] Douglas M. Blough,et al. The Effect of Replica Placement on Routing Robustness in Distributed Hash Tables , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).
[10] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[11] Seif Haridi,et al. Symmetric Replication for Structured Peer-to-Peer Systems , 2005, DBISP2P.
[12] Sebastian Schuster,et al. Fighting Cheating in P2P-based MMVEs with Disjoint Path Routing , 2009 .
[13] Antonio F. Gómez-Skarmeta,et al. A novel methodology for constructing secure multipath overlays , 2005, IEEE Internet Computing.
[14] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.