You are here

Bibliography

Export 6 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is KAD  [Clear All Filters]
2010
Cholez T, Chrisment I, Festor O. Efficient DHT attack mitigation through peers’ ID distribution . In: HOTP2P'10 - International Workshop on Hot Topics in Peer-to-Peer Systems. HOTP2P'10 - International Workshop on Hot Topics in Peer-to-Peer Systems. Atlanta, Georgia, USA; 2010.
Locher T, Mysicka D, Schmid S, Wattenhofer RP. Poisoning the Kad network. In: ICDCN'10 - Proceedings of the 11th International Conference on Distributed Computing and Networking. ICDCN'10 - Proceedings of the 11th International Conference on Distributed Computing and Networking. Kolkata, India: Springer-Verlag; 2010. pp. 195–206. Available from: http://dl.acm.org/citation.cfm?id=2018057.2018085
2009
Cholez T, Chrisment I, Festor O. Evaluation of Sybil Attacks Protection Schemes in KAD. In: AIMS'09 - Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services. Vol. 5637. AIMS'09 - Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services. Enschede, The Netherlands: Springer-Verlag; 2009. pp. 70–82. Available from: http://dx.doi.org/10.1007/978-3-642-02627-0_6
Steiner M, En-Najjary T, Biersack EW. Long term study of peer behavior in the KAD DHT. IEEE/ACM Transactions on Networking. 2009 ;17(5).
2006
Stutzbach D, Rejaie R. Understanding churn in peer-to-peer networks. In: IMC'06. Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement. IMC'06. Proceedings of the 6th ACM SIGCOMM Conference on Internet Measurement. Rio de Janeriro, Brazil: ACM; 2006. pp. 189–202. Available from: http://doi.acm.org/10.1145/1177080.1177105