Autonomic Peer-to-Peer Systems: Incentive and Security Issues
暂无分享,去创建一个
[1] Mary Baker,et al. 2 P2P or Not 2 P2P? , 2003, IPTPS.
[2] Xun Wang,et al. On defending peer-to-peer system-based active worm attacks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[3] Kostas G. Anagnostakis,et al. Exchange-based incentive mechanisms for peer-to-peer file sharing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[4] Christos H. Papadimitriou,et al. Free-riding and whitewashing in peer-to-peer systems , 2004, IEEE Journal on Selected Areas in Communications.
[5] David Mazières,et al. Kademlia: A Peer-to-Peer Information System Based on the XOR Metric , 2002, IPTPS.
[6] Diomidis Spinellis,et al. A survey of peer-to-peer content distribution technologies , 2004, CSUR.
[7] Jan U. Becker,et al. The economic rationale of offering media files in peer-to-peer networks , 2004, 37th Annual Hawaii International Conference on System Sciences, 2004. Proceedings of the.
[8] David Hausheer,et al. Token-based accounting and distributed pricing to introduce market mechanisms in a peer-to-peer file sharing scenario , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).
[9] Bruce E. Hajek,et al. A New Mechanism for the Free-Rider Problem , 2008, IEEE Trans. Autom. Control..
[10] Alejandro P. Buchmann,et al. Design of a cheat-resistant P2P online gaming system , 2007, DIMEA.
[11] David Hausheer,et al. Decentralized auction-based pricing with PeerMart , 2005, 2005 9th IFIP/IEEE International Symposium on Integrated Network Management, 2005. IM 2005..
[12] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[13] Srdjan Capkun,et al. Mobility helps peer-to-peer security , 2006, IEEE Transactions on Mobile Computing.
[14] George Lawton. Is peer-to-peer secure enough for corporate use? , 2004, Computer.
[15] Marinho P. Barcellos,et al. Attacking a Swarm with a Band of Liars: evaluating the impact of attacks on BitTorrent , 2007, Seventh IEEE International Conference on Peer-to-Peer Computing (P2P 2007).
[16] Bo Li,et al. CoolStreaming/DONet: a data-driven overlay network for peer-to-peer live media streaming , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[17] George Danezis,et al. Economics of Information Security , 2005 .
[18] Yiqi Dai,et al. A new micro-payment protocol based on P2P networks , 2005, IEEE International Conference on e-Business Engineering (ICEBE'05).
[19] Daniel Zappala,et al. Low latency and cheat-proof event ordering for peer-to-peer games , 2004, NOSSDAV '04.
[20] Vinay S. Pai,et al. Chainsaw: Eliminating Trees from Overlay Multicast , 2005, IPTPS.
[21] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[22] Minaxi Gupta,et al. A study of malware in peer-to-peer networks , 2006, IMC '06.
[23] Arun K. Somani,et al. Pricing strategy for incentivizing selfish nodes to share resources in peer-to-peer (P2P) networks , 2004, Proceedings. 2004 12th IEEE International Conference on Networks (ICON 2004) (IEEE Cat. No.04EX955).
[24] Ion Stoica,et al. Robust incentive techniques for peer-to-peer networks , 2004, EC '04.
[25] Hector Garcia-Molina,et al. SLIC: a selfish link-based incentive mechanism for unstructured peer-to-peer networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[26] Rahul Telang,et al. The Economics of Peer-to-Peer Networks , 2003 .
[27] David K. Y. Yau,et al. An incentive mechanism for P2P networks , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[28] Hector Garcia-Molina,et al. Pong-cache poisoning in GUESS , 2004, CCS '04.
[29] Robert E. Kraut,et al. Watching together: integrating text chat with video , 2007, CHI.
[30] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[31] Johann van der Merwe,et al. A survey on peer-to-peer key management for mobile ad hoc networks , 2007, CSUR.
[32] Rayadurgam Srikant,et al. Modeling and performance analysis of BitTorrent-like peer-to-peer networks , 2004, SIGCOMM 2004.
[33] Meng Zhang,et al. Large-scale live media streaming over peer-to-peer networks through global internet , 2005, P2PMMS'05.
[34] Bruce M. Maggs,et al. The feasibility of supporting large-scale live streaming applications with dynamic application end-points , 2004, SIGCOMM.
[35] Hector Garcia-Molina,et al. PPay: micropayments for peer-to-peer systems , 2003, CCS '03.
[36] Indranil Gupta,et al. A churn-resistant peer-to-peer web caching system , 2003, SSRS '03.
[37] Aruna Seneviratne,et al. Monetary incentive with reputation for virtual market-place based P2P , 2005, CoNEXT '05.
[38] Vanessa Teague,et al. A Secure Event Agreement (SEA) protocol for peer-to-peer games , 2006, First International Conference on Availability, Reliability and Security (ARES'06).
[39] Sieteng Soh,et al. Cheating in networked computer games: a review , 2007, DIMEA.
[40] Qian Zhang,et al. Optimizing the Throughput of Data-Driven Based Streaming in Heterogeneous Overlay Network , 2007, MMM.
[41] Indranil Gupta,et al. Kelips: Building an Efficient and Stable P2P DHT through Increased Memory and Background Overhead , 2003, IPTPS.
[42] Hari Balakrishnan,et al. Malware prevalence in the KaZaA file-sharing network , 2006, IMC '06.
[43] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[44] W. Wang,et al. Market-driven bandwidth allocation in selfish overlay networks , 2005, Proceedings IEEE 24th Annual Joint Conference of the IEEE Computer and Communications Societies..
[45] Nicolas Christin,et al. Content availability, pollution and poisoning in file sharing peer-to-peer networks , 2005, EC '05.
[46] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[47] Guanling Chen,et al. Simulating non-scanning worms on peer-to-peer networks , 2006, InfoScale '06.
[48] I. Foster,et al. ‘To Share or not to Share’ An Analysis of Incentives to Contribute in Collaborative File Sharing Environments , 2003 .
[49] Michal Feldman,et al. Overcoming free-riding behavior in peer-to-peer systems , 2005, SECO.
[50] B. Cohen,et al. Incentives Build Robustness in Bit-Torrent , 2003 .
[51] Robert Morris,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.
[52] Paul Francis,et al. Chunkyspread: Heterogeneous Unstructured Tree-Based Peer-to-Peer Multicast , 2006, Proceedings of the 2006 IEEE International Conference on Network Protocols.
[53] Stefano Paraboschi,et al. ID mapping attacks in P2P networks , 2005, GLOBECOM '05. IEEE Global Telecommunications Conference, 2005..
[54] Rakesh Kumar,et al. Fluid modeling of pollution proliferation in P2P networks , 2006, SIGMETRICS '06/Performance '06.
[55] Allan Friedman,et al. Good neighbors can make good fences: a peer-to-peer user security system , 2007, IEEE Technology and Society Magazine.
[56] David K. Y. Yau,et al. A game theoretic approach to provide incentive and service differentiation in P2P networks , 2004, SIGMETRICS '04/Performance '04.
[57] T B MaRichard,et al. A game theoretic approach to provide incentive and service differentiation in P2P networks , 2004 .
[58] Paul Francis,et al. Chunkyspread: Multi-tree Unstructured Peer-to-Peer Multicast , 2006, IPTPS.
[59] Martin J. Osborne,et al. An Introduction to Game Theory , 2003 .
[60] Feng Wang,et al. mTreebone: A Hybrid Tree/Mesh Overlay for Application-Layer Live Video Multicast , 2007, 27th International Conference on Distributed Computing Systems (ICDCS '07).