Proposal and Performance Evaluation of Hash-based Authentication for P2P Network
暂无分享,去创建一个
[1] I. Sasase,et al. On demand distributed public key management for wireless ad hoc networks , 2005, PACRIM. 2005 IEEE Pacific Rim Conference on Communications, Computers and signal Processing, 2005..
[2] David Cooper,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2008, RFC.
[3] M. Clement,et al. Improving Routing Security Using a Decentralized Public Key Distribution Algorithm , 2007, Second International Conference on Internet Monitoring and Protection (ICIMP 2007).
[4] David R. Karger,et al. Chord: a scalable peer-to-peer lookup protocol for internet applications , 2003, TNET.
[5] Russ Housley,et al. Internet X.509 Public Key Infrastructure Certificate and Certificate Revocation List (CRL) Profile , 2002, RFC.
[6] Russ Housley,et al. An Internet Attribute Certificate Profile for Authorization , 2010, RFC.
[7] Srdjan Capkun,et al. Self-Organized Public-Key Management for Mobile Ad Hoc Networks , 2003, IEEE Trans. Mob. Comput..
[8] Norio Shiratori,et al. A new scalable distributed authentication for P2P network and its performance evaluation , 2008 .
[9] Yiming Hu,et al. Efficient, proximity-aware load balancing for DHT-based P2P systems , 2005, IEEE Transactions on Parallel and Distributed Systems.
[10] Jin-Soo Kim,et al. Closed P2P system for PVR-based file sharing , 2005, IEEE Transactions on Consumer Electronics.