Author:
Narang Pratik,Hota Chittaranjan
Publisher
Springer Science and Business Media LLC
Subject
Computer Networks and Communications,Information Systems,Theoretical Computer Science,Software
Reference28 articles.
1. Anceaume, E., Gradinariu, M., & Ravoaja, A. (2005). Incentives for p2p fair resource sharing. In Peer-to-Peer Computing, 2005. P2P 2005. Fifth IEEE International Conference on IEEE, pp 253–260.
2. Bauer, K., McCoy, D., Grunwald, D., Kohno, T., & Sicker, D. (2007). Low-resource routing attacks against tor. In Proceedings of the 2007 ACM Workshop on Privacy in Electronic Society, ACM, New York, NY, USA, WPES ’07, pp 11–20.
3. Buford, J., Yu, H., & Lua, E.K. (2008). P2P Networking and Applications. Morgan Kaufmann Publishers Inc., San Francisco, CA, USA.
4. Daswani, N., & Garcia-Molina, H. (2002). Query-flood dos attacks in gnutella. In Proceedings of the 9th ACM Conference on Computer and Communications Security, ACM, New York, NY, USA, CCS ’02, pp 181–192.
5. Duma, C., Karresand, M., Shahmehri, N., & Caronni, G. (2006). A trust-aware, p2p-based overlay for intrusion detection. In Database and Expert Systems Applications, 2006. DEXA’06. 17th International Workshop on, IEEE, pp 692–697.
Cited by
7 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献