Secure peer-to-peer networks for trusted collaboration
暂无分享,去创建一个
[1] Minaxi Gupta,et al. A study of malware in peer-to-peer networks , 2006, IMC '06.
[2] Patrick Traynor,et al. Leveraging Identity-Based Cryptography for Node ID Assignment in Structured P2P Systems , 2007, IEEE Transactions on Parallel and Distributed Systems.
[3] Tim Moors,et al. Survey of Research towards Robust Peer-to-Peer Networks: Search Methods , 2007, RFC.
[4] Dan S. Wallach,et al. A Survey of Peer-to-Peer Security Issues , 2002, ISSS.
[5] Bhavani M. Thuraisingham,et al. Centralized Security Labels in Decentralized P2P Networks , 2007, Twenty-Third Annual Computer Security Applications Conference (ACSAC 2007).
[6] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[7] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[8] Hari Balakrishnan,et al. Malware prevalence in the KaZaA file-sharing network , 2006, IMC '06.
[9] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[10] Tuomas Aura,et al. Analysis of the HIP Base Exchange Protocol , 2005, ACISP.
[11] Ben Y. Zhao,et al. Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.
[12] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[13] L.,et al. SECURE COMPUTER SYSTEMS : MATHEMATICAL FOUNDATIONS , 2022 .
[14] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[15] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[16] Bhavani M. Thuraisingham,et al. Database and Applications Security: Integrating Information Security and Data Management , 2005 .
[17] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[18] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[19] Kenneth G. Paterson,et al. Trusted computing: providing security for peer-to-peer networks , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
[20] Mary Baker,et al. Attrition Defenses for a Peer-to-Peer Digital Preservation System , 2004, USENIX Annual Technical Conference, General Track.
[21] Tim Moors,et al. Survey of research towards robust peer-to-peer networks: Search methods , 2006, Comput. Networks.