Unstructured Peer-to-Peer 네트워크에서의 파일공유

  • Published : 2004.03.01

Abstract

Keywords

References

  1. 2001 P2P Networking Overview -The Emergent P2P Platform of Presence, Identity and Edge Resources C. Shirky;K. Trueloy;R. Dornfest;L. Gonze
  2. P2P workshop keyboard search
  3. E-Donkey
  4. Kazaa
  5. Groove
  6. JXTA
  7. Entropia
  8. 8th International Conference on Data Engineering (ICDE) Peer-to-Peer Information Systems: Concepts and Models, State-of-the-Art. and Future Systems K. Aberer;M. Hauswirth
  9. ARPANET
  10. Peer-to-Peer Harnessing the Power of Disruptive Technologies A. Oram
  11. Napster
  12. Gnutella
  13. Gnutella
  14. Freenet.
  15. Chord
  16. ACM SIGCOMM. A Scalable Content-Addressable Network S. Ratnasamy;P. Francis;M. Handley;R. Karp;S. Shenker
  17. Tapestry
  18. ACM SIGCOMM Chord: A scalable peer-to-peer lookup service for Internet applications I. Stoica;R. Morris;D. Karger;M. F. Kaashoek;H. Balakrishman
  19. ACM SIGCOMM. Making Gnutella-like P2P systems Scalable Y. Chawathe;S. Ratnasamy;L. Breslau;N. Lanham;S. Shenker
  20. IEEE Internet Computing v.7 no.3 Overlay Networks-A Scalable Alternative for P2P D. Diego;O'Mahony Donal
  21. Gnutella Protocol draft v0.6
  22. International Conference on Peer-to-peer Computing Peer-to-Peer Architecture Case Study: Gnutella M. Ripeanu
  23. Limewire
  24. Technical report Free riding on gnutella E. Adar;B. Huberman
  25. Phys. Rev. v.E64 Search in power law networks L. A. Adamic;R. M. Lukose;A. R. Puniyani;B. A. Huberman
  26. 3rd International Conference on Peer-to-Peer Computing (P2P 2003) A daptive Probabilistic Search(APS) for Peer-to-Peer Networks D. Tsoumakos;N. Roussopoulos
  27. Proceedings of the 16th annual ACM International Conference on super-computing Search and Replication in Unstructrued Peer-to-Peer Networks Q. Lv;P. Cao;E. Cohen;K. Li;S. Shenker
  28. Multimedia Computing and Networks 2002 (MMCN'02) A Measurement Study of Peer-to-Peer File Sharing Systems S. Saroiu;P. K. Gummadi;S. D. Gribble
  29. American National Standard X9.30.2 (ANSI-X9) 1997 : Public Key Cryptography for the Financial Services Industry -Part 2: The Secure Hash Algorithm (SHA-1)
  30. IEEE Internet Computing v.6 no.1 Protecting Free Expression Online with Freenet I. Clarke;S. G. Miller;T. W. Hong;O. Sandberg;B. Wiley