Securing Network Content
暂无分享,去创建一个
[1] Michael Walfish,et al. Semantic-Free Referencing in Linked Distributed Systems , 2003, IPTPS.
[2] Kostas Pentikousis,et al. Scenarios and Research Issues for a Network of Information , 2008, MobiMedia.
[3] Christopher Allen,et al. The TLS Protocol Version 1.0 , 1999, RFC.
[4] A Logic for SDSI's Linked Local Name Spaces , 2000, J. Comput. Secur..
[5] Ronald L. Rivest,et al. SDSI - A Simple Distributed Security Infrastructure , 1996 .
[6] David Mazières,et al. Fast and secure distributed read-only file system , 2000, TOCS.
[7] Ben Y. Zhao,et al. An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .
[8] Daniel Massey,et al. Security Through Publicity , 2006, HotSec.
[9] Robert Tappan Morris,et al. Persistent personal names for globally connected mobile devices , 2006, OSDI '06.
[10] David R. Cheriton,et al. An Architecture for Content Routing Support in the Internet , 2001, USITS.
[11] Ralph C. Merkle,et al. Secrecy, authentication, and public key systems , 1979 .
[12] Michael Walfish,et al. A layered naming architecture for the internet , 2004, SIGCOMM '04.
[13] Martín Abadi,et al. On SDSI's linked local name spaces , 1997, Proceedings 10th Computer Security Foundations Workshop.
[14] Robert Tappan Morris,et al. User-Relative Names for Globally Connected Personal Devices , 2006, IPTPS.
[15] Mark Allman. Personal Namespaces , 2007, HotNets.
[16] Michael Walfish,et al. Untangling the Web from DNS , 2004, NSDI.
[17] Ben Y. Zhao,et al. OceanStore: an architecture for global-scale persistent storage , 2000, SIGP.
[18] Donald E. Eastlake,et al. Domain Name System Security Extensions , 1997, RFC.
[19] Luigi Iannone,et al. LISP-DHT: towards a DHT to map identifiers onto locators , 2008, CoNEXT '08.
[20] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[21] Kostas Pentikousis,et al. Design considerations for a network of information , 2008, CoNEXT '08.
[22] Christian Esteve Rothenberg,et al. Towards a new generation of information-oriented internetworking architectures , 2008, CoNEXT '08.
[23] David Mazières,et al. Separating key management from file system security , 1999, SOSP.
[24] I. Stoica,et al. ROFL: routing on flat labels , 2006, SIGCOMM.
[25] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[26] Andrew S. Tanenbaum,et al. Securely replicated Web documents , 2005, 19th IEEE International Parallel and Distributed Processing Symposium.
[27] William Adjie-Winoto,et al. The design and implementation of an intentional naming system , 2000, OPSR.