Towards Secure and Scalable Computation in Peer-to-Peer Networks
暂无分享,去创建一个
Erik Vee | Jared Saia | Valerie King | Vishal Sanwalani | V. King | J. Saia | Erik Vee | Vishal Sanwalani
[1] Nancy A. Lynch,et al. An Efficient Algorithm for Byzantine Agreement without Authentication , 1982, Inf. Control..
[2] Andrew Chi-Chih Yao,et al. Protocols for secure computations , 1982, FOCS 1982.
[3] Hector Garcia-Molina,et al. Is byzantine agreement useful in a distributed database? , 1984, PODS '84.
[4] D. Dolev,et al. Bounds on information exchange for Byzantine agreement , 1985, JACM.
[5] Hector Garcia-Molina,et al. Applications of Byzantine agreement in database systems , 1986, TODS.
[6] Eli Upfal,et al. Fault Tolerance in Networks of Bounded Degree , 1988, SIAM J. Comput..
[7] Piotr Berman,et al. Asymptotically Optimal Distributed Consensus (Extended Abstract) , 1989, ICALP.
[8] Eli Upfal. Tolerating linear number of faults in networks of bounded degree , 1992, PODC '92.
[9] Nathan Linial,et al. Fast perfect-information leader-election protocols with linear immunity , 1993, Comb..
[10] Ran Canetti,et al. Asynchronous secure computation , 1993, STOC.
[11] Tal Rabin,et al. Asynchronous secure computations with optimal resilience (extended abstract) , 1994, PODC '94.
[12] N. Linial,et al. Fast perfect-information leader-election protocols with linear immunity , 1995, Comb..
[13] Dana Ron,et al. Agreement in the Presence of Faults, on Networks of Bounded Degree , 1996, Inf. Process. Lett..
[14] Uriel Feige,et al. Noncryptographic selection protocols , 1999, 40th Annual Symposium on Foundations of Computer Science (Cat. No.99CB37039).
[15] John F. Canny,et al. Collaborative filtering with privacy , 2002, Proceedings 2002 IEEE Symposium on Security and Privacy.
[16] Amos Fiat,et al. Censorship resistant peer-to-peer content addressable networks , 2002, SODA '02.
[17] Hector Garcia-Molina,et al. The Eigentrust algorithm for reputation management in P2P networks , 2003, WWW '03.
[18] Moni Naor,et al. A Simple Fault Tolerant Distributed Hash Table , 2003, IPTPS.
[19] John Kubiatowicz,et al. Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-Peer Networks , 2003, DISC.
[20] Christian Scheideler,et al. Group Spreading: A Protocol for Provably Secure Distributed Name Service , 2004, ICALP.
[21] Diomidis Spinellis,et al. Security applications of peer-to-peer networks , 2004, Comput. Networks.
[22] Serge A. Plotkin,et al. Keeping Peers Honest In EigenTrust , 2004 .
[23] Christian Scheideler,et al. How to spread adversarial nodes?: rotate! , 2005, STOC '05.
[24] Michael D. Smith,et al. Host-based detection of worms through peer-to-peer cooperation , 2005, WORM '05.
[25] Piotr Berman,et al. Fast consensus in networks of bounded degree , 2005, Distributed Computing.
[26] Ran Wolff,et al. Distributed Data Mining in Peer-to-Peer Networks , 2006, IEEE Internet Computing.
[27] Vinod Vaikuntanathan,et al. Byzantine agreement in the full-information model in O(log n) rounds , 2006, STOC '06.
[28] Erik Vee,et al. Scalable leader election , 2006, SODA '06.