Support for resilient Peer-to-Peer gaming
暂无分享,去创建一个
[1] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[2] Michael K. Reiter,et al. Crowds: anonymity for Web transactions , 1998, TSEC.
[3] Brian Neil Levine,et al. Supporting P2P gaming when players have heterogeneous resources , 2005, NOSSDAV '05.
[4] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM '02.
[5] Daniel Zappala,et al. Low latency and cheat-proof event ordering for peer-to-peer games , 2004, NOSSDAV '04.
[6] Brian Neil Levine,et al. Responder anonymity and anonymous peer-to-peer file sharing , 2001, Proceedings Ninth International Conference on Network Protocols. ICNP 2001.
[7] David R. Karger,et al. Chord: A scalable peer-to-peer lookup service for internet applications , 2001, SIGCOMM '01.
[8] Paul Ferguson,et al. Network Ingress Filtering: Defeating Denial of Service Attacks which employ IP Source Address Spoofing , 1998, RFC.
[9] Li Xiao,et al. Mutual anonymity protocols for hybrid peer-to-peer systems , 2003, 23rd International Conference on Distributed Computing Systems, 2003. Proceedings..
[10] Yang Zongkai,et al. A new fair micropayment system based on hash chain , 2004, IEEE International Conference on e-Technology, e-Commerce and e-Service, 2004. EEE '04. 2004.
[11] Brian Neil Levine,et al. A protocol for anonymous communication over the Internet , 2000, CCS.
[12] Stefan Saroiu,et al. Measurement and Analysis of Spyware in a University Environment , 2004, NSDI.
[13] Nick G. Duffield,et al. Simple network performance tomography , 2003, IMC '03.
[14] Angelos D. Keromytis,et al. SOS: secure overlay services , 2002, SIGCOMM 2002.
[15] Antony I. T. Rowstron,et al. Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems , 2001, Middleware.
[16] Ben Y. Zhao,et al. Tapestry: a resilient global-scale overlay for service deployment , 2004, IEEE Journal on Selected Areas in Communications.
[17] Brian Neil Levine,et al. Cheat-proof playout for centralized and distributed online games , 2001, Proceedings IEEE INFOCOM 2001. Conference on Computer Communications. Twentieth Annual Joint Conference of the IEEE Computer and Communications Society (Cat. No.01CH37213).
[18] Paul F. Syverson,et al. Proxies for anonymous routing , 1996, Proceedings 12th Annual Computer Security Applications Conference.
[19] Stefan Saroiu,et al. Measurement and analysis of spywave in a university environment , 2004 .
[20] Philip K. McKinley,et al. On the cost-quality tradeoff in topology-aware overlay path probing , 2003, 11th IEEE International Conference on Network Protocols, 2003. Proceedings..
[21] Mark Claypool,et al. The effect of latency on user performance in Warcraft III , 2003, NetGames '03.
[22] Honghui Lu,et al. Peer-to-peer support for massively multiplayer games , 2004, IEEE INFOCOM 2004.
[23] Helen J. Wang,et al. An evaluation of scalable application-level multicast built using peer-to-peer overlays , 2003, IEEE INFOCOM 2003. Twenty-second Annual Joint Conference of the IEEE Computer and Communications Societies (IEEE Cat. No.03CH37428).
[24] Insup Lee,et al. Is runtime verification applicable to cheat detection? , 2004, NetGames '04.