Detecting Opportunistic Cheaters in Volunteer Computing
暂无分享,去创建一个
[1] David P. Anderson,et al. BOINC: a system for public-resource computing and storage , 2004, Fifth IEEE/ACM International Workshop on Grid Computing.
[2] Wenliang Du,et al. Uncheatable grid computing , 2004, 24th International Conference on Distributed Computing Systems, 2004. Proceedings..
[3] Doug Szajda,et al. Hardening functions for large scale distributed computations , 2003, 2003 Symposium on Security and Privacy, 2003..
[4] Philippe Golle,et al. Secure Distributed Computing in a Commercial Environment , 2002, Financial Cryptography.
[5] Wenliang Du,et al. Searching for High-Value Rare Events with Uncheatable Grid Computing , 2005, ACNS.
[6] Cécile Germain,et al. Result checking in global computing systems , 2003, ICS '03.
[7] Luis F. G. Sarmenta,et al. Sabotage-tolerance mechanisms for volunteer computing systems , 2001, Proceedings First IEEE/ACM International Symposium on Cluster Computing and the Grid.
[8] Arno Wacker,et al. Towards peer-to-peer-based cryptanalysis , 2010, IEEE Local Computer Network Conference.
[9] Bruno Sousa,et al. Sabotage-tolerance and trust management in desktop grid computing , 2007, Future Gener. Comput. Syst..
[10] Fabian Monrose,et al. Distributed Execution with Remote Audit , 1999, NDSS.
[11] Chris GauthierDickey,et al. Result verification and trust-based scheduling in peer-to-peer grids , 2005, Fifth IEEE International Conference on Peer-to-Peer Computing (P2P'05).
[12] Philippe Golle,et al. Uncheatable Distributed Computations , 2001, CT-RSA.