Blockchain based Security Framework for P2P Filesharing system
暂无分享,去创建一个
[1] Alex Borges Vieira,et al. Pollution and whitewashing attacks in a P2P live streaming system: Analysis and counter-attack , 2013, 2013 IEEE International Conference on Communications (ICC).
[2] Haiman Lin,et al. Conducting routing table poisoning attack in DHT networks , 2010, 2010 International Conference on Communications, Circuits and Systems (ICCCAS).
[3] Dongxu Liu,et al. GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks , 2018, IEEE Transactions on Dependable and Secure Computing.
[4] Quan Z. Sheng,et al. P2P Object Tracking in the Internet of Things , 2011, 2011 International Conference on Parallel Processing.
[5] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] Zhenhai Duan,et al. A Routing Table Insertion (RTI) Attack on Freenet , 2012, 2012 International Conference on Cyber Security.
[7] Zhenhai Duan,et al. Using randomized routing to counter routing table insertion attack on Freenet , 2013, 2013 IEEE Global Communications Conference (GLOBECOM).
[8] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[9] Salil S. Kanhere,et al. BlockChain: A Distributed Solution to Automotive Security and Privacy , 2017, IEEE Communications Magazine.
[10] Giacomo Verticale,et al. Mitigation of the Eclipse Attack in Chord Overlays , 2014, ANT/SEIT.
[11] Neeraj Suri,et al. Mitigating Eclipse attacks in Peer-To-Peer networks , 2014, 2014 IEEE Conference on Communications and Network Security.
[12] Somanath Tripathy,et al. CAP: collaborative attack on pastry , 2017, SIN.
[13] Bogdan V. Ghita,et al. P2p-based community concept for M2M applications , 2013, Second International Conference on Future Generation Communication Technologies (FGCT 2013).
[14] H. Rowaihy,et al. Limiting Sybil Attacks in Structured Peer-to-Peer Networks , 2005 .
[15] Mebratu Tsehayu. Simulating Secure Routing on Chord DHT , 2015 .
[16] Olivier Festor,et al. Detection and mitigation of localized attacks in a widely deployed P2P network , 2013, Peer Peer Netw. Appl..
[17] Nick Mathewson,et al. Tor: The Second-Generation Onion Router , 2004, USENIX Security Symposium.
[18] Hong Wang,et al. Securing network coding against pollution attacks in P2P converged ubiquitous networks , 2015, Peer Peer Netw. Appl..
[19] Wei Wang,et al. Model the P2P Attack in Computer Networks , 2015 .
[20] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[21] Zhoujun Li,et al. Misusing Kademlia Protocol to Perform DDoS Attacks , 2008, 2008 IEEE International Symposium on Parallel and Distributed Processing with Applications.
[22] Maha Abdelhaq,et al. Intrusion Detection System to Detect DDoS Attack in Gnutella Hybrid P2P Network , 2013 .