Mitigation of the Eclipse Attack in Chord Overlays
暂无分享,去创建一个
[1] Christian Scheideler,et al. Towards a Scalable and Robust DHT , 2006, SPAA '06.
[2] Rida A. Bazzi,et al. Hop Chains: Secure Routing and the Establishment of Distinct Identities , 2006, OPODIS.
[3] Robert Tappan Morris,et al. Security Considerations for Peer-to-Peer Distributed Hash Tables , 2002, IPTPS.
[4] Gade Krishna,et al. A scalable peer-to-peer lookup protocol for Internet applications , 2012 .
[5] Atul Singh,et al. Eclipse Attacks on Overlay Networks: Threats and Defenses , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[6] Michael Kaminsky,et al. SybilGuard: defending against sybil attacks via social networks , 2006, SIGCOMM.
[7] Miguel Castro,et al. Secure routing for structured peer-to-peer overlay networks , 2002, OSDI '02.
[8] Guillaume Pierre,et al. A survey of DHT security techniques , 2011, CSUR.
[9] S. Krause,et al. OverSim: A Flexible Overlay Network Simulation Framework , 2007, 2007 IEEE Global Internet Symposium.
[10] Nikita Borisov,et al. Computational Puzzles as Sybil Defenses , 2006, Sixth IEEE International Conference on Peer-to-Peer Computing (P2P'06).
[11] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[12] Rudolf Hornig,et al. An overview of the OMNeT++ simulation environment , 2008, Simutools 2008.
[13] George Danezis,et al. Sybil-Resistant DHT Routing , 2005, ESORICS.
[14] Thomas F. La Porta,et al. Limiting Sybil Attacks in Structured P2P Networks , 2007, IEEE INFOCOM 2007 - 26th IEEE International Conference on Computer Communications.
[15] John Kubiatowicz,et al. Asymptotically Efficient Approaches to Fault-Tolerance in Peer-to-Peer Networks , 2003, DISC.
[16] Hannes Hartenstein,et al. Defending the Sybil attack in P2P networks: taxonomy, challenges, and a proposal for self-registration , 2006, First International Conference on Availability, Reliability and Security (ARES'06).