Persistent personal names for globally connected mobile devices
暂无分享,去创建一个
Robert Tappan Morris | M. Frans Kaashoek | Bryan Ford | Jacob Strauss | Sean C. Rhea | Chris Lesniewski-Laas
[1] John S. Heidemann,et al. Implementation of the Ficus Replicated File System , 1990, USENIX Summer.
[2] Mary Baker,et al. The Roma personal metadata service , 2000, Proceedings Third IEEE Workshop on Mobile Computing Systems and Applications.
[3] Andrew W. Appel,et al. Proof-carrying authentication , 1999, CCS '99.
[4] Yakov Rekhter,et al. Address Allocation for Private Internets , 1994, RFC.
[5] David Saff,et al. Footloose: a case for physical eventual consistency and selective conflict resolution , 2003, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[6] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[7] Stephen Dohrmann,et al. Public-key Support for Collaborative Groups , 2002 .
[8] Peter L. Reiher,et al. Rumor: Mobile Data Access Through Optimistic Peer-to-Peer Replication , 1998, ER Workshops.
[9] Bryan Ford,et al. Scalable Internet Routing on Topology-Independent Node Identities , 2003 .
[10] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[11] Doug Terry,et al. Epidemic algorithms for replicated database maintenance , 1988, OPSR.
[12] Cyril Gavoille,et al. Space-Efficiency for Routing Schemes of Stretch Factor Three , 2001, J. Parallel Distributed Comput..
[13] Butler W. Lampson,et al. SPKI Certificate Theory , 1999, RFC.
[14] Bryan Ford,et al. State of Peer-to-Peer (P2P) Communication across Network Address Translators (NATs) , 2008, RFC.
[15] Scott Shenker,et al. Making gnutella-like P2P systems scalable , 2003, SIGCOMM '03.
[16] Bryan Ford,et al. Unmanaged Internet Protocol , 2004, Comput. Commun. Rev..
[17] Scott Shenker,et al. Internet indirection infrastructure , 2004, IEEE/ACM Transactions on Networking.
[18] Mahadev Satyanarayanan,et al. Disconnected Operation in the Coda File System , 1999, Mobidata.
[19] Emin Gün Sirer,et al. The design and implementation of a next generation name service for the internet , 2004, SIGCOMM '04.
[20] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[21] Karl Aberer,et al. Updates in highly unreliable, replicated peer-to-peer systems , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[22] Matt Holdrege,et al. Protocol Complications with the IP Network Address Translator , 2001, RFC.
[23] Paul V. Mockapetris,et al. Domain names: Concepts and facilities , 1983, RFC.
[24] Yakov Rekhter,et al. Dynamic Updates in the Domain Name System (DNS UPDATE) , 1997, RFC.
[25] Jun Wang,et al. TRIBLER: a social‐based peer‐to‐peer system , 2008, IPTPS.
[26] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[27] Mary Baker,et al. A historic name-trail service , 2002, 2003 Proceedings Fifth IEEE Workshop on Mobile Computing Systems and Applications.
[28] environmet.,et al. JXTA : A Network Programming Environment , 2022 .
[29] Ion Stoica,et al. Non-Transitive Connectivity and DHTs , 2005, WORLDS.
[30] Bryan Ford,et al. Peer-to-Peer Communication Across Network Address Translators , 2005, USENIX Annual Technical Conference, General Track.
[31] Andrew S. Tanenbaum,et al. Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System , 2004, Security Protocols Workshop.
[32] Charles E. Perkins,et al. IP Mobility Support for IPv4 , 2002, RFC.
[33] Andrew G. Malis,et al. A Framework for IP Based Virtual Private Networks , 2000, RFC.
[34] David R. Karger,et al. Looking up data in P2P systems , 2003, CACM.
[35] Bogdan C. Popescu,et al. Safe and Private Data Sharing with Turtle: Friends Team-Up and Beat the System (Transcript of Discussion) , 2004, Security Protocols Workshop.
[36] Forum UPnP,et al. Internet Gateway Device (IGD) Standardized Device Control Protocol V1.0 , 2001 .
[37] Jinyang Li,et al. F2F: Reliable Storage in Open Networks , 2006, IPTPS.
[38] Hector Garcia-Molina,et al. SPROUT: P2P Routing with Social Networks , 2004, EDBT Workshops.
[39] Scott Shenker,et al. Epidemic algorithms for replicated database maintenance , 1988, OPSR.
[40] Scott Rose,et al. DNS Security Introduction and Requirements , 2005, RFC.
[41] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[42] Marvin Theimer,et al. Managing update conflicts in Bayou, a weakly connected replicated storage system , 1995, SOSP.
[43] Robert Tappan Morris,et al. User-Relative Names for Globally Connected Personal Devices , 2006, IPTPS.
[44] Gerald J. Popek,et al. Consistency algorithms for optimistic replication , 1993, 1993 International Conference on Network Protocols.
[45] David Mazières,et al. Separating key management from file system security , 1999, SOSP.
[46] Robert Tappan Morris,et al. Ivy: a read/write peer-to-peer file system , 2002, OSDI '02.
[47] David R. Cheriton,et al. Leases: an efficient fault-tolerant mechanism for distributed file cache consistency , 1989, SOSP '89.