1 |
E. Sit, R. Morris, 'Security Considerations for Peer-to-Peer Distributed Hash Tables', Proc. Int'l Workshop on Peer-to-Peer Systems, March 2002
|
2 |
J. Douceur, 'The Sybil Attack', Proc. lnt'l Workshop on Peer-to-Peer Systems, March 2002
|
3 |
S. Marti, H. Garcia-Molina, 'Taxonomy of Trust: Categorizing P2P Reputation Systems', COMNET Special Issue on Trust and Reputation in Peer-to-Peer Systems, 2005
|
4 |
P. Dewan, P. Dasgupta, 'Securing P2P Networks Using Peer Reputations: Is there a silver bullet?', Proc. IEEE Consumer Communications and Networking Conf.(CCNC2005), USA, 2005
|
5 |
A. Blanc, Y. Liu, A. Vahdat, 'Designing Incentives for Peer-to-Peer Routing', Proc. IEEE INFOCOM, March 2005
|
6 |
M. Rabin, 'Efficient Dispersal of Information for Security, Load Balancing and Fault Tolerance', Journal of the ACM, 36(2), April 1989
|
7 |
A. Shamir, 'How to Share a Secret', Communications of the ACM, 22, 1979
|
8 |
J. Risson, T. Moors, 'Survey of Research Towards Robust Peer-to-Peer Networks: Search Methods', TR UNSW-EE-P2P-l-l, Univ. of New South Wales, Australia, September 2004
|
9 |
J. Liang, R. Kumar, Y. Xi, K. Ross, 'Pollution in P2P File Sharing Systems', Proc. IEEE INFOCOM, March 2005
|
10 |
S. Androutsellis-Theotokis, D. Spinellis, 'A Survey of Peer-to-Peer Content Distribution Technologies', ACM Computing Surveys, 36(4), December 2004
|
11 |
P. Dewan, 'Countering Identity Farms in Reputation Systems for P2P Networks', Arizona State University, Technical Report, 2004
|
12 |
D. Wallach, 'A Survey of Peer-to-Peer Security Issues', Proc. Int'l Symp. on Software Security, November 2002
|
13 |
M. Parameswaran, A. Susarla, A.B. Whinston, 'P2P Networking: An Information-Sharing Alternative', IEEE Computer, 34(7), July 2001
|
14 |
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, D. Wallach, 'Secure Routing for Structured Peer-to-Peer Overlay Networks', Proc. Usenix Symp. on Operating Systems, December 2002
|