A free-rider aware reputation system for peer-to-peer file-sharing networks
暂无分享,去创建一个
[1] Hahnsang Kim,et al. Efficient Authentication and Authorization of Mobile Users Based on Peer-to-Peer Network Mechanisms , 2005, Proceedings of the 38th Annual Hawaii International Conference on System Sciences.
[2] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[3] Robert Morris,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM 2001.
[4] Ling Liu,et al. PeerTrust: supporting reputation-based trust for peer-to-peer electronic communities , 2004, IEEE Transactions on Knowledge and Data Engineering.
[5] Min-Jen Tsai,et al. Distributed computing power service coordination based on peer-to-peer grids architecture , 2009, Expert Syst. Appl..
[6] Li Xiao,et al. hiREP: Hierarchical Reputation Management for Peer-to-Peer Systems , 2006, 2006 International Conference on Parallel Processing (ICPP'06).
[7] Karl Aberer,et al. P-Grid: A Self-Organizing Access Structure for P2P Information Systems , 2001, CoopIS.
[8] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[9] Karl Aberer,et al. Managing trust in a peer-2-peer information system , 2001, CIKM '01.
[10] Mudhakar Srivatsa,et al. TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks , 2005, WWW '05.
[11] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[12] Hector Garcia-Molina,et al. Query-flood DoS attacks in gnutella , 2002, CCS '02.
[13] Jong Kim,et al. A reputation management system in structured peer-to-peer networks , 2005, 14th IEEE International Workshops on Enabling Technologies: Infrastructure for Collaborative Enterprise (WETICE'05).
[14] Ernesto Damiani,et al. Choosing reputable servents in a P2P network , 2002, WWW.
[15] Akhil Sahai,et al. A secure platform for peer-to-peer computing in the Internet , 2002, Proceedings of the 35th Annual Hawaii International Conference on System Sciences.
[16] Eytan Adar,et al. Free Riding on Gnutella , 2000, First Monday.
[17] Geoff Coulson,et al. Free Riding on Gnutella Revisited: The Bell Tolls? , 2005, IEEE Distributed Syst. Online.
[18] Ajay D. Kshemkalyani,et al. On the security of polling protocols in peer-to-peer systems , 2004 .
[19] S. Buchegger,et al. A Robust Reputation System for P2P and Mobile Ad-hoc Networks , 2004 .
[20] R. K. Shyamasundar,et al. PGSP: a protocol for secure communication in peer-to-peer system , 2005, IEEE Wireless Communications and Networking Conference, 2005.
[21] Ernesto Damiani,et al. Managing and Sharing Servents' Reputations in P2P Systems , 2003, IEEE Trans. Knowl. Data Eng..
[22] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[23] Partha Dasgupta,et al. SECURING REPUTATION DATA IN PEER-TO-PEER NETWORKS , 2004 .
[24] Akbar Ghaffarpour Rahbar,et al. PowerTrust: A Robust and Scalable Reputation System for Trusted Peer-to-Peer Computing , 2007, IEEE Transactions on Parallel and Distributed Systems.
[25] Ian Clarke,et al. Freenet: A Distributed Anonymous Information Storage and Retrieval System , 2000, Workshop on Design Issues in Anonymity and Unobservability.
[26] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[27] Yi-Ting Chen,et al. Cooperative learning in E-learning: A peer assessment of student-centered using consistent fuzzy preference , 2009, Expert Syst. Appl..
[28] Ling Liu,et al. TrustMe: anonymous management of trust relationships in decentralized P2P systems , 2003, Proceedings Third International Conference on Peer-to-Peer Computing (P2P2003).