Using Cryptographically Generated SIP-URIs to Protect the Integrity of Content in P2P-SIP

[1]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[2]  Antony I. T. Rowstron,et al.  Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.

[3]  Cullen Jennings,et al.  SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System , 2005, First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA'05).

[4]  Henning Schulzrinne,et al.  Peer-to-peer internet telephony using SIP , 2005, NOSSDAV '05.

[5]  David R. Karger,et al.  Wide-area cooperative storage with CFS , 2001, SOSP.

[6]  David R. Karger,et al.  Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.

[7]  Klaus Wehrle,et al.  Distributed Hash Tables , 2005, Peer-to-Peer Systems and Applications.

[8]  Robert Tappan Morris,et al.  Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.

[9]  Dave Crocker,et al.  Augmented BNF for Syntax Specifications: ABNF , 1997, RFC.

[10]  George Danezis,et al.  Sybil-Resistant DHT Routing , 2005, ESORICS.

[11]  Tuomas Aura,et al.  Cryptographically Generated Addresses (CGA) , 2005, ISC.

[12]  Ben Y. Zhao,et al.  Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.

[13]  Miguel Castro,et al.  Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.

[14]  David Bryan Use Cases for Peer-to-Peer Session Initiation Protocol (P2P SIP) , 2007 .

[15]  Mark Handley,et al.  A scalable content-addressable network , 2001, SIGCOMM 2001.