The Benefits and Challenges of Providing Content Protection in Peer-to-Peer Systems
暂无分享,去创建一个
Mark Strembeck | Sandro Etalle | Mostafa Ammar | Gustaf Neumann | Thomas Böhme | Jana Dittmann | Oliver Hummel | Martin Steinebach | Patrick Aichroth | Ricardo Corin | Andreas Lang | Herwig Unger | Stephan Baumann | Jens Hasselbach | Cheun Ngen Chong | Susanne Guth | Stefan Thiemert | Uwe Wessely | Stefan Eichner | Pieter Hartel | N. Y. Lee | J. W. Kim | M. Ammar | M. Steinebach | S. Etalle | P. Hartel | R. Corin | J. Dittmann | S. Baumann | N. Lee | Mark Strembeck | P. Judge | Susanne Guth | P. Aichroth | G. Neumann | Yee Wei | T. Böhme | Oliver Hummel | H. Unger | Dirk Albrecht | Han Ho Lee | J. S. Lee | Yee Wei | Paul Judge | A. Lang | Uwe Wessely | Stefan Thiemert | Stefan Eichner | Dirk Albrecht | Jens Hasselbach | J. S. Lee
[1] Christian F. Tschudin,et al. Protecting Mobile Agents Against Malicious Hosts , 1998, Mobile Agents and Security.
[2] David Chaum,et al. Blind Signatures for Untraceable Payments , 1982, CRYPTO.
[3] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[4] Mostafa H. Ammar,et al. Gothic: a group access control architecture for secure multicast and anycast , 2002, Proceedings.Twenty-First Annual Joint Conference of the IEEE Computer and Communications Societies.
[5] Moni Naor,et al. Issues in Multicast Security: A Taxonomy and E cient Constructions , 1999, IEEE Conference on Computer Communications.
[6] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[7] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[8] Stefan Brands,et al. Off-Line Electronic Cash Based on Secret-Key Certificates , 1995, LATIN.
[9] Brian Neil Levine,et al. A protocol for anonymous communication over the Internet , 2000, CCS.
[10] Brian Neil Levine,et al. Responder anonymity and anonymous peer-to-peer file sharing , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[11] Fritz Hohl. A Model of Attacks of Malicious Hosts Against Mobile Agents , 1998, ECOOP Workshops.
[12] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[13] Joan Feigenbaum,et al. Privacy Engineering for Digital Rights Management Systems , 2001, Digital Rights Management Workshop.
[14] Rüdiger Grimm,et al. A Friendly Peer-to-Peer File Sharing System with Profit but without Copy Protection , 2002, IICS.
[15] Amos Fiat,et al. Untraceable Electronic Cash , 1990, CRYPTO.
[16] Ingemar J. Cox,et al. Copy protection for DVD video , 1999, Proc. IEEE.
[17] Paul F. Syverson,et al. Proxies for anonymous routing , 1996, Proceedings 12th Annual Computer Security Applications Conference.
[18] Fritz Hohl,et al. Time Limited Blackbox Security: Protecting Mobile Agents From Malicious Hosts , 1998, Mobile Agents and Security.