类 型
4 篇文献
 
A survey of DHT security techniques  
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been shown to be notorio......
ACM Computing Surveys  2011
16次引用 0 0
Securing Structured Overlays against Identity Attacks  
Structured overlay networks can greatly simplify data storage and management for a variety of distributed applications. Despite their attractive features, these overlays remain vulnerable to the Ident......
IEEE Transactions on Parallel and Distributed Systems  2009
4次引用 0 0
Decentralized Trust in Distributed Networks: a Delegate -based Security Hardening Approach  
Summary Current peer-to-peer (P2P) networks are well defined in their communicating and collaborating mechanisms - search, share, and retrieve information - especially when there is a centralized mana......
1次引用 0 0
Sphinx: Locating Malicious Nodes in Corporate Distributed Hash Tables  
Abstract Nowadays,structured overlay networks are used in controlled environments,like company,wide area networks. Even though these structured overlay networks are usually closed, there is still the ......
0次引用 0 0

Feedback
Feedback
Feedback
我想反馈:
排行榜