Secure peer sampling
暂无分享,去创建一个
[1] Scott Shenker,et al. Epidemic algorithms for replicated database maintenance , 1988, OPSR.
[2] John R. Douceur,et al. The Sybil Attack , 2002, IPTPS.
[3] Miguel Castro,et al. Controlling the Cost of Reliability in Peer-to-Peer Overlays , 2003, IPTPS.
[4] Newscast Computing , 2003 .
[5] Dan S. Wallach,et al. A Taxonomy of Rational Attacks , 2005, IPTPS.
[6] Márk Jelasity,et al. Gossip-based aggregation in large dynamic networks , 2005, TOCS.
[7] Márk Jelasity,et al. T-Man: Gossip-Based Overlay Topology Management , 2005, Engineering Self-Organising Systems.
[8] Maarten van Steen,et al. CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays , 2005, Journal of Network and Systems Management.
[9] Michael Dahlin,et al. BAR fault tolerance for cooperative services , 2005, SOSP '05.
[10] Indranil Gupta,et al. JetStream: Achieving Predictable Gossip Dissemination by Leveraging Social Network Principles , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).
[11] Robbert van Renesse,et al. Fireflies: scalable support for intrusion-tolerant network overlays , 2006, EuroSys.
[12] Michael Dahlin,et al. BAR gossip , 2006, OSDI '06.
[13] Márk Jelasity,et al. The Bootstrapping Service , 2006, 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06).
[14] Keith W. Ross,et al. Exploiting P2P systems for DDoS attacks , 2006, InfoScale '06.
[15] Keith W. Ross,et al. The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.
[16] Gian Paolo Jesi,et al. Proximity-Aware Superpeer Overlay Topologies , 2006, IEEE Transactions on Network and Service Management.
[17] Stanley Wasserman,et al. Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.
[18] Anne-Marie Kermarrec,et al. Gossip-based peer sampling , 2007, TOCS.
[19] Idit Keidar,et al. Brahms: byzantine resilient random membership sampling , 2008, PODC '08.
[20] Micah Sherr,et al. Veracity: a fully decentralized service for securing network coordinate systems , 2008, IPTPS.
[21] Michael Dahlin,et al. FlightPath: Obedience vs. Choice in Cooperative Services , 2008, OSDI.