Detecting and Excluding Misbehaving Nodes in a P2P Network
暂无分享,去创建一个
[1] Robert Morris,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.
[2] Valérie Viet Triem Tong,et al. A Distributed Certification System for Structured P2P Networks , 2008, AIMS.
[3] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[4] Divyakant Agrawal,et al. Meghdoot: Content-Based Publish/Subscribe over P2P Networks , 2004, Middleware.
[5] Valérie Viet Triem Tong,et al. A sybilproof distributed identity management for P2P networks , 2008, 2008 IEEE Symposium on Computers and Communications.
[6] Gene Tsudik,et al. Admission control in peer groups , 2003, Second IEEE International Symposium on Network Computing and Applications, 2003. NCA 2003..
[7] Valérie Viet Triem Tong,et al. A Sybil-Resistant Admission Control Coupling SybilGuard with Distributed Certification , 2008, 2008 IEEE 17th Workshop on Enabling Technologies: Infrastructure for Collaborative Enterprises.
[8] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[9] Cullen Jennings,et al. SOSIMPLE: A Serverless, Standards-based, P2P SIP Communication System , 2005, First International Workshop on Advanced Architectures and Algorithms for Internet Delivery and Applications (AAA-IDEA'05).
[10] David R. Karger,et al. Wide-area cooperative storage with CFS , 2001, SOSP.
[11] Miguel Castro,et al. SplitStream: high-bandwidth multicast in cooperative environments , 2003, SOSP '03.
[12] Audun Jøsang,et al. A survey of trust and reputation systems for online service provision , 2007, Decis. Support Syst..
[13] Matthew K. Franklin,et al. Efficient generation of shared RSA keys , 2001, JACM.