Secure P2P topology based on a multidimensional DHT space mapping
暂无分享,去创建一个
[1] YU Zhi-hua. Analysis of malicious behaviors in peer-to-peer trust model , 2007 .
[2] Jeong Hyun Yi,et al. On the utility of distributed cryptography in P2P and MANETs: the case of membership control , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[3] Partha Dasgupta,et al. Distributed authentication for peer-to-peer networks , 2003, 2003 Symposium on Applications and the Internet Workshops, 2003. Proceedings..
[4] Peter Druschel,et al. Peer-to-peer systems , 2010, Commun. ACM.
[5] Karl Aberer,et al. A Probabilistic Approach to Predict Peers? Performance in P2P Networks , 2004, CIA.
[6] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[7] Jan Camenisch,et al. Dynamic Accumulators and Application to Efficient Revocation of Anonymous Credentials , 2002, CRYPTO.
[8] Akinori Yonezawa,et al. Software Security — Theories and Systems , 2003, Lecture Notes in Computer Science.
[9] Josh Benaloh,et al. One-Way Accumulators: A Decentralized Alternative to Digital Sinatures (Extended Abstract) , 1994, EUROCRYPT.
[10] Haiyun Luo,et al. Ubiquitous and Robust Authentication Services for Ad Hoc Wireless Networks , 2000 .
[11] Dan S. Wallach,et al. A Survey of Peer-to-Peer Security Issues , 2002, ISSS.
[12] Antonio F. Gómez-Skarmeta,et al. A novel methodology for constructing secure multipath overlays , 2005, IEEE Internet Computing.
[13] Jaehoon Nah,et al. The Secure Routing Mechanism for DHT-based Overlay Network , 2008, 2008 10th International Conference on Advanced Communication Technology.
[14] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[15] Hector Garcia-Molina,et al. DHT Routing Using Social Links , 2004, IPTPS.
[16] John Kubiatowicz,et al. Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-Peer Networks , 2003, DISC.
[17] Jia Wang,et al. Analyzing peer-to-peer traffic across large networks , 2004, IEEE/ACM Trans. Netw..
[18] Ilyoung Chong,et al. A Self-organized Authentication Architecture in Mobile Ad-Hoc Networks , 2005, ICOIN.
[19] Michael Schukat,et al. Authentication Using Virtual Certificate Authorities: A New Security Paradigm for Wireless Sensor Networks , 2010, 2010 Ninth IEEE International Symposium on Network Computing and Applications.