Secure peer sampling

[1]  Scott Shenker,et al.  Epidemic algorithms for replicated database maintenance , 1988, OPSR.

[2]  John R. Douceur,et al.  The Sybil Attack , 2002, IPTPS.

[3]  Miguel Castro,et al.  Controlling the Cost of Reliability in Peer-to-Peer Overlays , 2003, IPTPS.

[4]  Newscast Computing , 2003 .

[5]  Dan S. Wallach,et al.  A Taxonomy of Rational Attacks , 2005, IPTPS.

[6]  Márk Jelasity,et al.  Gossip-based aggregation in large dynamic networks , 2005, TOCS.

[7]  Márk Jelasity,et al.  T-Man: Gossip-Based Overlay Topology Management , 2005, Engineering Self-Organising Systems.

[8]  Maarten van Steen,et al.  CYCLON: Inexpensive Membership Management for Unstructured P2P Overlays , 2005, Journal of Network and Systems Management.

[9]  Michael Dahlin,et al.  BAR fault tolerance for cooperative services , 2005, SOSP '05.

[10]  Indranil Gupta,et al.  JetStream: Achieving Predictable Gossip Dissemination by Leveraging Social Network Principles , 2006, Fifth IEEE International Symposium on Network Computing and Applications (NCA'06).

[11]  Robbert van Renesse,et al.  Fireflies: scalable support for intrusion-tolerant network overlays , 2006, EuroSys.

[12]  Michael Dahlin,et al.  BAR gossip , 2006, OSDI '06.

[13]  Márk Jelasity,et al.  The Bootstrapping Service , 2006, 26th IEEE International Conference on Distributed Computing Systems Workshops (ICDCSW'06).

[14]  Keith W. Ross,et al.  Exploiting P2P systems for DDoS attacks , 2006, InfoScale '06.

[15]  Keith W. Ross,et al.  The Index Poisoning Attack in P2P File Sharing Systems , 2006, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications.

[16]  Gian Paolo Jesi,et al.  Proximity-Aware Superpeer Overlay Topologies , 2006, IEEE Transactions on Network and Service Management.

[17]  Stanley Wasserman,et al.  Social Network Analysis: Methods and Applications , 1994, Structural analysis in the social sciences.

[18]  Anne-Marie Kermarrec,et al.  Gossip-based peer sampling , 2007, TOCS.

[19]  Idit Keidar,et al.  Brahms: byzantine resilient random membership sampling , 2008, PODC '08.

[20]  Micah Sherr,et al.  Veracity: a fully decentralized service for securing network coordinate systems , 2008, IPTPS.

[21]  Michael Dahlin,et al.  FlightPath: Obedience vs. Choice in Cooperative Services , 2008, OSDI.