Author:
Li Yunzhao,Liu Hong,Guenbacher Don,Scoglio Caterina
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Hardware and Architecture,Information Systems,Software
Reference32 articles.
1. Brunner R (2006) A performance evaluation of the KAD-protocol. Master’s thesis, Institute Eurecom
2. Douceur J, Donath JS (2002) The sybil attack. USENIX IPTPS
3. eMule Officical Website Retrieved Mar 3, 2013, from. http://sourceforge.net/projects/amule/
4. eMule Officical Website Retrieved Mar 3, 2013, from. http://www.emule.com/
5. Feldman M, Papadimitriou C, Chuang J, Stoica I (2006) Free-riding and whitewashing in peer-to-peer systems. IEEE J Sel Areas Commun 24(5):1010–1019