Author:
Fedotova Natalya,Veltri Luca
Subject
Computer Networks and Communications
Reference21 articles.
1. Looking up data in P2P systems;Balakrishnan;Communications of the ACM,2003
2. E. Sit, R. Morris, Security considerations for peer-to-peer distributed hash tables, in: Proceedings of the First International Workshop on Peer-to-Peer Systems (IPTPS’02), Cambridge, Massachusetts, March 2002.
3. M. Srivatsa, L. Liu, Vulnerabilities and security threats in structured overlay networks: a quantitative analysis, in: Proceedings of IEEE ACSAC’04, Tucson, AZ, USA, December 2004.
4. N. Fedotova, M. Bertucci, L. Veltri, Reputation management techniques in DHT-based peer-to-peer networks, in: Proceedings of ICIW’07, Mauritius, May 2007.
5. S. Lee, R. Sherwood et al., Cooperative peer groups in NICE, in: Proceedings of IEEE Infocom’03, San Francisco, USA, April 2003.
Cited by
9 articles.
订阅此论文施引文献
订阅此论文施引文献,注册后可以免费订阅5篇论文的施引文献,订阅后可以查看论文全部施引文献