ID mapping attacks in P2P networks
暂无分享,去创建一个
[1] Ernesto Damiani,et al. Choosing reputable servents in a P2P network , 2002, WWW.
[2] Ben Y. Zhao,et al. An Infrastructure for Fault-tolerant Wide-area Location and Routing , 2001 .
[3] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[4] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[5] Ling Liu,et al. Vulnerabilities and Security Threats in Structured Peer-to-Peer Systems : A Quantitative Analysis , 2004 .
[6] David R. Karger,et al. Kademlia: A peer-to-peer information system based on the xor metric , 2003 .
[7] Mark Handley,et al. A scalable content-addressable network , 2001, SIGCOMM '01.
[8] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[9] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[10] Mudhakar Srivatsa,et al. Vulnerabilities and security threats in structured overlay networks: a quantitative analysis , 2004, 20th Annual Computer Security Applications Conference.
[11] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.