A verifiable hierarchical circular shift cipher scheme for P2P chunk exchanges
暂无分享,去创建一个
[1] Kyuyong Shin. Preventing misbehavior in cooperative distributed systems , 2009 .
[2] Jian Wang,et al. Resisting free-riding behavior in BitTorrent , 2010, Future Gener. Comput. Syst..
[3] Injong Rhee,et al. Treat-before-trick : Free-riding prevention for BitTorrent-like peer-to-peer networks , 2009, 2009 IEEE International Symposium on Parallel & Distributed Processing.
[4] Craig Gentry,et al. Fully homomorphic encryption using ideal lattices , 2009, STOC '09.
[5] Johan A. Pouwelse,et al. Verifiable Encryption for P2P Block Exchange , 2010, 2010 IEEE Tenth International Conference on Peer-to-Peer Computing (P2P).
[6] Johan A. Pouwelse,et al. Fast download but eternal seeding: The reward and punishment of Sharing Ratio Enforcement , 2011, 2011 IEEE International Conference on Peer-to-Peer Computing.
[7] Maghsoud Abbaspour,et al. Securing BitTorrent using a new reputation-based trust management system , 2012, Peer-to-Peer Networking and Applications.
[8] Ion Stoica,et al. Robust incentive techniques for peer-to-peer networks , 2004, EC '04.
[9] Jeffrey S. Rosenschein,et al. Adding incentives to file-sharing systems , 2009, AAMAS.
[10] David Choffnes,et al. On blind mice and the elephant , 2011, SIGCOMM 2011.
[11] Miguel Rio,et al. A Sybilproof Indirect Reciprocity Mechanism for Peer-to-Peer Networks , 2009, IEEE INFOCOM 2009.
[12] Michael Sirivianos,et al. Dandelion: Cooperative Content Distribution with Robust Incentives , 2007, USENIX Annual Technical Conference.
[13] Bobby Bhattacharjee,et al. Bittorrent is an auction: analyzing and improving bittorrent's incentives , 2008, SIGCOMM '08.