Vulnerabilities and security threats in structured overlay networks: a quantitative analysis
暂无分享,去创建一个
[1] Ronald L. Rivest,et al. The MD5 Message-Digest Algorithm , 1992, RFC.
[2] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[3] Ben Y. Zhao,et al. An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .
[4] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[5] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[6] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[7] Robert Morris,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.
[8] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[9] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[10] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[11] Miguel Castro,et al. Farsite: federated, available, and reliable storage for an incompletely trusted environment , 2002, OPSR.
[12] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.