Using Cryptographically Generated SIP-URIs to Protect the Integrity of Content in P2P-SIP
暂无分享,去创建一个
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[3] Cullen Jennings,et al. SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System , 2005, First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA'05).
[4] Henning Schulzrinne,et al. Peer-to-peer internet telephony using SIP , 2005, NOSSDAV '05.
[5] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[6] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[7] Klaus Wehrle,et al. Distributed Hash Tables , 2005, Peer-to-Peer Systems and Applications.
[8] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[9] Dave Crocker,et al. Augmented BNF for Syntax Specifications: ABNF , 1997, RFC.
[10] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[11] Tuomas Aura,et al. Cryptographically Generated Addresses (CGA) , 2005, ISC.
[12] Ben Y. Zhao,et al. Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.
[13] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[14] David Bryan. Use Cases for Peer-to-Peer Session Initiation Protocol (P2P SIP) , 2007 .
[15] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM 2001.