1 |
M. Steiner, T. En-Najjary, and E. W. Biersack, "Exploiting kad: Possible uses and misuses," in ACM SIGCOMM Computer Communication Review 37, 65-70, 2007
|
2 |
P. Dhungel, X. Hei, K. W. Ross, and N. Saxena, "The pollution attack in p2p live video streaming: measurement results and defenses," in the workshop on Peer-to-Peer streaming and IP-TV, Japan, 2007.
|
3 |
U. Lee, M. Choi, J. Cho, M. Y. Sanadidi, and M. Gerla, "Understanding pollution dynamics in p2p file sharing," in IPTPS'06, Santa Babara, USA, 2006.
|
4 |
MD4, http://en.wikipedia.org/wiki/MD4.
|
5 |
Top 10 songs, http://top10songs.com/ (June 2008).
|
6 |
K. Shin, D. S. Reeves, I. Rhee, and Y. Song, "Winnowing : Protecting p2p systems against pollution by cooperative index filtering," Tech. Rep. TR-2009-2, North Carolina State University, 2009.
|
7 |
C. Costa, V. Soares, J. Almeida, and V. Almeida, "Fighting pollution dissemination in peer-to-peer networks," in ACM SAC''07, Seoul, Korea, pp. 1586-1590, 2007.
|
8 |
J. R. Douceur, "The sybil attack," in IPTPS'02, Cambridge, MA, 2002.
|
9 |
D. Dumitriu, E. Knightly, A. Kuzmanovic, I. Stoica, and W. Zwaenepoel, "Denial-of-service resilience in peer-to-peer file sharing systems," in ACM SIGMETRICS''05, Ban, Alberta, Canada, pp. 38-49, 2005.
|
10 |
R. Kumar, D. D. Yao, A. Bagchi, K. W. Ross, and D. Rubenstein, "Fluid modeling of pollution proliferation in p2p networks," ACM SIGMETRICS Performance Evaluation Review, 335-346, 2006.
|
11 |
S. D. Kamvar, M. T. Schlosser, and H. Garcia-molina, "The eigentrust algorithm for reputation management in p2p networks", in the Twelfth International World Wide Web Conference, pp. 640-651, 2003.
|
12 |
K. Walsh, and E. G. Sirer, "Experience with an object reputation system for peer-to-peer file sharing," in USENIX NSDI''06, San Jose, CA, 2006.
|
13 |
N. Christin, A. S.Weigend, and J. Chuang, "Content vailability, pollution and poisoning in file sharing peer-to-peer networks," in ACM EC'05, pp. 68-77, 2005.
|
14 |
J. Liang, R. Kumar, Y. Xi, and K. W. Ross, "Pollution in p2p file sharing systems," in IEEE INFOCOM'05, Miami, FL, 2005.
|
15 |
eMule Project, http://www.emule-project.net.
|
16 |
J. Liang, N. Naoumov, and K.W. Ross, "The index poisoning attack in p2p file sharing systems," in IEEE INFOCOM'06, 2006.
|
17 |
emule morph, http://emulemorph.sourceforge.net
|
18 |
R. Brunner, "A performance evaluation of the kad-protocol," Master's thesis, University of Mannheim, Sophia-Antipolis, France, 2006.
|
19 |
aMule Forum, http://forum.amule.org/.
|
20 |
P. Maymounkov, and D. MaziItes, "Kademlia: A peer-to-peer information system based on the xor metric", in IPTPS'02, pp. 53-65, 2002
|
21 |
D. Stutzbach, and R. Rejaie, "Improving lookup performance over a widely deployed dht," in IEEE INFOCOM''06, pp. 1-12, 2006.
|
22 |
N. Curtis, R. Safavi-Naini, and W. Susilo, "X2rep : Enhanced trust semantics for the xrep protocol", in ACNS''04, 2004.
|
23 |
C. Costa, and J. Almeida, "Reputation systems for fighting pollution in peer-to-peer file sharing systems," in IEEE P2P'07, 2007.
|
24 |
E. Zhai, R. Chen, Z. Cai, L. Zhang, E. K. Lua, H. Sun, S. Qing, L. Tang, and Z. Chen, "Sorcery: Could we make p2p content sharing systems robust to deceivers?", in the 9th International Conference on Peer-to-Peer Computing, 2009.
|