1 |
Thomas Wolfl, 'Public-Key-Infrastructure Based on a Peer-to-Peer Network', Proceedings of the 38th Hawaii International Conference on System Sciences, 2005
|
2 |
S.A.Baset and H.Schulzrinne, 'An Analysis of the Skype Peer-to-Peer Internet Telephony Protocol', Computer Science Department, Columbia University, Tech. Rep. CUCS-039-44, 2004
|
3 |
J.Gu, J.Nah, C.Chae, J.Lee and J.Jang, 'Random Visitor: a Defense against Identity Attacks in P2P Overlay Networks', LNCS 4298(WISA2006), 2006
|
4 |
T.Dengler and al, The Project JXTA2.0 Super-Peer Virtual Network, Sun Microsystems, Tech. rep. May, 2003
|
5 |
K. Berket, A. Essiari and A. Muratas , 'PKI-Based Security for Peer-to-Peer Information Sharing', Proceedings of the Fourth IEEE International Conference on Peer-to-Peer Computing, Zurich, Switzerland, Aug. 25-27, 2004
|
6 |
Reidemeister, T., Ward, P.A.S., Bohm, K., Buchmann, E., 'Malicious Behaviour in Content-Addressable Peer-to-Peer Networks', 3rd Annual Conference on Communication Networks and Service Research, pp.319-326, May 2005
|
7 |
'LionShare P2P Profile of SAML', Tech. Report, Pennsylvania State University, 2005
|
8 |
J.Risson and T.Moors, 'Survey of research towards robust peer-to-peer networks: Search method', IRTF Internet Draft, draft-irtf-p2prg-survey-search-00.txt, Mar. 2006
|
9 |
Mudhakar Srivatsa and Ling Liu, 'Vulnerabilities and Security Threats in Structured Overlay', Proceedings of the 20th Annual Computer Security Applications Conference (ACSAC'04), 2004
|