1 |
Chen HW, Ye ZW, "BChord: Bi-directional routing DHT based on chord," in Proc. of the 12th International Conference on Computer Supported Cooperative Work in Design, pp.410-415, April 16-18, 2008. Article (CrossRef Link)
|
2 |
Brite Network topology generator [EB/OL]. http://www.csbu.edu/brite/.
|
3 |
Xu X., "Providing Efficient Secure DHTs Routing," in Proc. of Computational Intelligence and Security, pp. 510-514, December 11-14, 2009. Article (CrossRef Link)
|
4 |
Bender A, Sherwood R, Monner D, "Fighting Spam with the Neighborhood Watch DHT," in Proc. of INFOCOM, pp. 1755-1763, April 19-25, 2009. Article (CrossRef Link)
|
5 |
Xu J, Yan J, He L, "CloudSEC: A Cloud Architecture for Composing Collaborative Security Services," in Proc. of IEEE Second International Conference on Cloud Computing Technology and Science (CloudCom), pp. 703-711, November 30-December 3, 2010. Article (CrossRef Link)
|
6 |
Mishra M, Tripathy S, Peri S., “SEPastry: Security Enhanced Pastry,” Advances in Computing and Information Technology, vol.176, pp. 789-795, July 13-15, 2012. Article (CrossRef Link)
|
7 |
Ganguly. A, Boykin. Po, Wolinsky. Di, “Improving peer connectivity in wide-area overlays of virtual workstations,” Cluster computing-the journal of networks software tools and applications, vol. 12, no.2, pp.239-256, June, 2009. Article (CrossRef Link)
|
8 |
Zhao B Y, Kubiatowicz J D, Joseph A D., "Tapestry:An infrastructure for fault-tolerant wide-area location and routing," Technical Report ,UCB/CSD-01-1141, 2001.
|
9 |
Shen H Y, Xu C Z, “Elastic Routing Table with Provable Performance for Congestion Control in DHT Networks,” IEEE Transactions on Parallel and Distributed Systems, vol.21, no.2, pp.242-256, April, 2010. Article (CrossRef Link)
DOI
|
10 |
Sheng W Y, Ranasinghe Q Z., "P2P object tracking in the internet of things," in Proc. of Parallel Processing (ICPP), pp. 502-511, September 13-16, 2011. Article (CrossRef Link)
|
11 |
Rowstron A, Druschel P, "Pastry: Scalable, decentraized object location and routing for large-scale peer-to-peer systems," in Proc. of the 18th IFIP/ACM International Conference, pp. 329-350, November 13-18, 2001. Article (CrossRef Link)
|
12 |
Stoica I, Morris R., Karger D, “Chord: A scalable peer-to-peer lookup service for internet applications,” ACM SIGCOMM Computer Communication Review, vol.31, no.4, pp.149–160, Octorber, 2001. Article (CrossRef Link)
DOI
|
13 |
Ratnasamy S, Francis P, Handley M., “A Scalable Content Addressable Network,” ACM SIGCOMM Computer Communication Review, vol.31, no.4, pp.161-172, Octorber, 2001. Article (CrossRef Link)
DOI
|
14 |
Liu Y T, Qiu X F, Ji Y, "A Novel Security Mechanism to Defend Cross-Layer Security Threats in P2P Network," in Proc. of Internet Technology and Applications (iTAP) , pp. 1-4, August 16-18, 2011. Article (CrossRef Link)
|
15 |
Zheng L, Zhang H, Han W, et al., “Technologies, applications, and governance in the Internet of Things,” Internet of things-Global technological and societal trends, Vermesan, Ovidiu and Friess, Peter, pp:141-175, 2011.
|
16 |
Villanueva. R, Villamil. MD, Arnedo M, “Secure Routing Strategies in DHT-Based Systems,” Data management in grid and peer-to-peer systems, vol.6265, pp. 62-74, 2010. Article (CrossRef Link)
|