The Dynamics of Salsa: A Robust Structured P2P System
暂无分享,去创建一个
Matthew K. Wright | Nayantara Mallesh | Safwan Mahmud Khan | Arjun Nambiar | Arjun Nambiar | M. Wright | S. Khan | Nayantara Mallesh
[1] Giuseppe Ciaccio,et al. Improving Sender Anonymity in a Structured Overlay with Imprecise Routing , 2006, Privacy Enhancing Technologies.
[2] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[3] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[4] Michael Kaminsky,et al. SybilGuard: Defending Against Sybil Attacks via Social Networks , 2008, IEEE/ACM Transactions on Networking.
[5] A. Rowstron,et al. Scalable, decentralized object location and routing for large-scale peer-to-peer systems , 2001 .
[6] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[7] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[8] Matthew K. Wright,et al. Salsa: a structured approach to large-scale anonymity , 2006, CCS '06.
[9] John Langford,et al. CAPTCHA: Using Hard AI Problems for Security , 2003, EUROCRYPT.
[10] Leslie Lamport,et al. The Byzantine Generals Problem , 1982, TOPL.
[11] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[12] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[13] Feng Xiao,et al. SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks , 2008, 2008 IEEE Symposium on Security and Privacy (sp 2008).
[14] Eric Brewer,et al. Anonymous routing in structured peer-to-peer overlays , 2005 .
[15] Ben Y. Zhao,et al. An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .