Towards a scalable and robust DHT
暂无分享,去创建一个
[1] John Kubiatowicz,et al. Handling churn in a DHT , 2004 .
[2] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.
[3] Mary Baker,et al. Peer-to-Peer Caching Schemes to Address Flash Crowds , 2002, IPTPS.
[4] Stefan Saroiu,et al. Dynamically Fault-Tolerant Content Addressable Networks , 2002, IPTPS.
[5] Amos Fiat,et al. Making Chord Robust to Byzantine Attacks , 2005, ESA.
[6] Yuval Ishai,et al. The round complexity of verifiable secret sharing and secure multicast , 2001, STOC '01.
[7] Friedhelm Meyer auf der Heide,et al. Simple, efficient shared memory simulations , 1993, SPAA '93.
[8] Christian Scheideler,et al. How to spread adversarial nodes?: rotate! , 2005, STOC '05.
[9] Ben Y. Zhao,et al. Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and , 2001 .
[10] Rajmohan Rajaraman,et al. Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1999, Theory of Computing Systems.
[11] Eli Upfal,et al. How to share memory in a distributed system , 1984, JACM.
[12] Kurt Mehlhorn,et al. Deterministic Simulation of Idealized Parallel Computers on More Realistic Ones , 1987, SIAM J. Comput..
[13] Christian Scheideler,et al. Robust Random Number Generation for Peer-to-Peer Systems , 2006, OPODIS.
[14] Allan Borodin,et al. Routing, Merging, and Sorting on Parallel Models of Computation , 1985, J. Comput. Syst. Sci..
[15] Mudhakar Srivatsa,et al. Vulnerabilities and security threats in structured overlay networks: a quantitative analysis , 2004, 20th Annual Computer Security Applications Conference.
[16] Moni Naor,et al. Novel architectures for P2P applications: the continuous-discrete approach , 2003, SPAA '03.
[17] Miguel Castro,et al. Defending against eclipse attacks on overlay networks , 2004, EW 11.
[18] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[19] Fabrizio Luccio,et al. A new scheme for the deterministic simulation of PRAMs in VLSI , 2005, Algorithmica.
[20] Rajmohan Rajaraman,et al. Accessing Nearby Copies of Replicated Objects in a Distributed Environment , 1997, SPAA '97.
[21] Kurt Mehlhorn,et al. Randomized and deterministic simulations of PRAMs by parallel machines with restricted granularity of parallel memories , 1984, Acta Informatica.
[22] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[23] Christian Scheideler,et al. Group Spreading: A Protocol for Provably Secure Distributed Name Service , 2004, ICALP.
[24] Robert Morris,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.
[25] Miguel Castro,et al. Security for Structured Peer-to-peer Overlay Networks , 2004 .
[26] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[27] Leslie G. Valiant,et al. A Scheme for Fast Parallel Communication , 1982, SIAM J. Comput..
[28] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[29] Dan S. Wallach,et al. Denial of Service via Algorithmic Complexity Attacks , 2003, USENIX Security Symposium.
[30] Miguel Oom Temudo de Castro,et al. Practical Byzantine fault tolerance , 1999, OSDI '99.
[31] Venkata N. Padmanabhan,et al. The Case for Cooperative Networking , 2002, IPTPS.
[32] Stefan Schmid,et al. A Self-repairing Peer-to-Peer System Resilient to Dynamic Adversarial Churn , 2005, IPTPS.
[33] Ben Y. Zhao,et al. An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .
[34] David R. Karger,et al. Consistent hashing and random trees: distributed caching protocols for relieving hot spots on the World Wide Web , 1997, STOC '97.
[35] James Aspnes,et al. Skip graphs , 2003, SODA '03.
[36] Rasmus Pagh,et al. Cuckoo Hashing , 2001, Encyclopedia of Algorithms.
[37] Gianfranco Bilardi,et al. Deterministic Simulations of PRAMs on Bounded Degree Networks , 1994, SIAM J. Comput..
[38] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[39] Dan S. Wallach,et al. A Taxonomy of Rational Attacks , 2005, IPTPS.