Secure model for distributed data structures on distributed hash tables
暂无分享,去创建一个
Kalman Graffi | Read Al-Aaridhi | Ahmet Yüksektepe | Kalman Graffi | Read Al-Aaridhi | Ahmet Yüksektepe
[1] Ralf Steinmetz,et al. Overlay Bandwidth Management: Scheduling and Active Queue Management of Overlay Flows , 2007 .
[2] Ralf Steinmetz,et al. A Distributed Platform for Multimedia Communities , 2008, 2008 Tenth IEEE International Symposium on Multimedia.
[3] Kalman Graffi,et al. Distributed data structures improvement for collective retrieval time , 2016, 2016 19th International Symposium on Wireless Personal Multimedia Communications (WPMC).
[4] Robert W. Shirey,et al. Internet Security Glossary, Version 2 , 2007, RFC.
[5] Karl J. O'Dwyer,et al. Bitcoin mining and its energy footprint , 2014 .
[6] Kalman Graffi,et al. Secure distributed data structures for peer-to-peer-based social networks , 2014, 2014 International Conference on Collaboration Technologies and Systems (CTS).
[7] Taoufik En-Najjary,et al. Long Term Study of Peer Behavior in the kad DHT , 2009, IEEE/ACM Transactions on Networking.
[8] J. V. Vroonhoven. Peer to Peer Security , 2006 .
[9] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[10] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[11] Mary Subaja Christo,et al. Enhancing security properties of Rumor Riding protocol under various attacks scenario in P2P network , 2016, 2016 International Conference on Communication and Signal Processing (ICCSP).
[12] Ralf Steinmetz,et al. LifeSocial.KOM: A secure and P2P-based solution for online social networks , 2011, 2011 IEEE Consumer Communications and Networking Conference (CCNC).
[13] Ralf Steinmetz,et al. LifeSocial.KOM: A P2P-Based Platform for Secure Online Social Networks , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).
[14] Laura Ricci,et al. DiDuSoNet: A P2P architecture for distributed Dunbar-based social networks , 2016, Peer-to-Peer Netw. Appl..
[15] Refik Molva,et al. Safebook: A distributed privacy preserving Online Social Network , 2011, 2011 IEEE International Symposium on a World of Wireless, Mobile and Multimedia Networks.
[16] Kalman Graffi,et al. Sets, lists and trees: Distributed data structures on distributed hash tables , 2016, 2016 IEEE 35th International Performance Computing and Communications Conference (IPCCC).
[17] Hui Zhang,et al. Global network positioning: a new approach to network distance prediction , 2002, CCRV.
[18] Kálmán György Graffi,et al. Monitoring and management of peer-to-peer systems , 2010, ACMMR.
[19] Yi Ma,et al. A novel trust model for P2P networks , 2016, 2016 12th International Conference on Natural Computation, Fuzzy Systems and Knowledge Discovery (ICNC-FSKD).
[20] Werner Vogels,et al. Eventually consistent , 2008, CACM.
[21] Diego Suarez Touceda,et al. Privacy in Peer-to-Peer Networks , 2015 .
[22] Mika Suvanto,et al. Privacy In Peer-to-Peer Networks , .
[23] Kalman Graffi,et al. Comparative evaluation of peer-to-peer systems using PeerfactSim.KOM , 2013, 2013 International Conference on High Performance Computing & Simulation (HPCS).