Security Considerations for Peer-to-Peer Distributed Hash Tables
暂无分享,去创建一个
[1] Peter Druschel,et al. Pastry: Scalable, distributed object location and routing for large-scale peer-to- , 2001 .
[2] Ben Y. Zhao,et al. An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .
[3] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[4] Miguel Castro,et al. SCRIBE: The Design of a Large-Scale Event Notification Infrastructure , 2001, Networked Group Communication.
[5] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[6] Antony I. T. Rowstron,et al. Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility , 2001, SOSP.
[7] Balachander Krishnamurthy,et al. Early measurements of a cluster-based architecture for P2P systems , 2001, IMW '01.
[8] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[9] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[10] Ben Y. Zhao,et al. Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and , 2001 .
[11] David Mazières,et al. Fast and secure distributed read-only file system , 2000, TOCS.
[12] Robert Tappan Morris,et al. Tarzan: a peer-to-peer anonymizing network layer , 2002, CCS '02.
[13] Michael J. Freedman,et al. A peer-to-peer anonymizing network layer , 2002 .
[14] Robert Tappan Morris,et al. Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer , 2002, IPTPS.