Eclipse Attacks on Overlay Networks: Threats and Defenses
暂无分享,去创建一个
Atul Singh | Dan S. Wallach | Peter Druschel | Tsuen-Wan Ngan | P. Druschel | Atul Singh | T. Ngan | D. Wallach
[1] Ellen W. Zegura,et al. How to model an internetwork , 1996, Proceedings of IEEE INFOCOM '96. Conference on Computer Communications.
[2] Michael K. Reiter,et al. Byzantine quorum systems , 1998, Distributed Computing.
[3] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[4] Michael K. Reiter,et al. Anonymous Web transactions with Crowds , 1999, CACM.
[5] David Mazières,et al. Separating key management from file system security , 1999, SOSP.
[6] Marvin Theimer,et al. Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs , 2000, SIGMETRICS '00.
[7] Kirk L. Johnson,et al. Overcast: reliable multicasting with on overlay network , 2000, OSDI.
[8] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[9] Ben Y. Zhao,et al. An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .
[10] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[11] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[12] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[13] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[14] John R. Douceur. The Sybil Attack , 2002, IPTPS.
[15] Miguel Castro,et al. Practical byzantine fault tolerance and proactive recovery , 2002, TOCS.
[16] Amos Fiat,et al. Censorship resistant peer-to-peer content addressable networks , 2002, SODA '02.
[17] Stefan Saroiu,et al. Dynamically Fault-Tolerant Content Addressable Networks , 2002, IPTPS.
[18] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[19] Robert Tappan Morris,et al. Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer , 2002, IPTPS.
[20] Krishna P. Gummadi,et al. King: estimating latency between arbitrary internet end hosts , 2002, IMW '02.
[21] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[22] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OPSR.
[23] Stefan Savage,et al. Understanding Availability , 2003, IPTPS.
[24] Moni Naor,et al. A Simple Fault Tolerant Distributed Hash Table , 2003, IPTPS.
[25] Krishna P. Gummadi,et al. The impact of DHT routing geometry on resilience and proximity , 2003, SIGCOMM '03.
[26] John Kubiatowicz,et al. Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-Peer Networks , 2003, DISC.
[27] Peter Druschel,et al. Proximity Neighbor Selection in Tree-Based Structured Peer-to-Peer Overlays , 2003 .
[28] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[29] Jibin Zhan,et al. Early Experience with an Internet Broadcast System Based on Overlay Multicast , 2004, USENIX Annual Technical Conference, General Track.
[30] Larry L. Peterson,et al. Reliability and Security in the CoDeeN Content Distribution Network , 2004, USENIX Annual Technical Conference, General Track.
[31] Robert Tappan Morris,et al. Designing a DHT for Low Latency and High Throughput , 2004, NSDI.
[32] David Mazières,et al. Democratizing Content Publication with Coral , 2004, NSDI.
[33] Dan S. Wallach,et al. AP3: cooperative, decentralized anonymous communication , 2004, EW 11.
[34] Bo Li,et al. DONet: A Data-Driven Overlay Network For Efficient Live Media Streaming , 2004, INFOCOM 2005.
[35] Robert Tappan Morris,et al. Comparing the Performance of Distributed Hash Tables Under Churn , 2004, IPTPS.
[36] Miguel Castro,et al. Performance and dependability of structured peer-to-peer overlays , 2004, International Conference on Dependable Systems and Networks, 2004.
[37] Miguel Castro,et al. Defending against eclipse attacks on overlay networks , 2004, EW 11.
[38] Antony I. T. Rowstron,et al. Cashmere: resilient anonymous routing , 2005, NSDI.
[39] Ben Y. Zhao,et al. Impact of Neighbor Selection on Performance and Resilience of Structured P2P Networks , 2005, IPTPS.
[40] Steve Chien,et al. A First Look at Peer-to-Peer Worms: Threats and Defenses , 2005, IPTPS.
[41] Atul Singh,et al. Implementation and evaluation of secure routing primitives , 2006 .
[42] Aravind Srinivasan,et al. Resilient multicast using overlays , 2003, IEEE/ACM Transactions on Networking.
[43] Joseph M. Hellerstein,et al. Induced Churn as Shelter from Routing-Table Poisoning , 2006, NDSS.