共 23 条
[1]
Baumgart I., 2007, P P2P NVE 2007 CONJ, V2
[2]
Boneh D, 2003, LECT NOTES COMPUT SC, V2656, P416
[4]
Secure routing for structured peer-to-peer overlay networks
[J].
USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION,
2002,
:299-314
[5]
Cocks Clifford., 2001, IMA Int. Conf., V2260, P360, DOI DOI 10.1007/3-540-45325-3
[6]
DOUCEUR J, 2002, SYBIL ATTACK
[7]
DUMITRIU D, 2005, SIGMETRICS PERFORM E, V33, P38
[8]
MAYMOUNKOV P, 2002, P 1 INT WORKSH PEER, P53, DOI DOI 10.1007/3-540-45748-8_5
[9]
Rowstron A., 2001, Proceedings of IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), V2218, P329, DOI 10.1007/3-540-45518-3_18
[10]
Shamir A., 1984, LECT NOTES COMPUTER, V196, P47, DOI [DOI 10.1007/3-540-39568-7, 10.1007/3-540-39568-7_5, 10.1007/978-1-4757-0602-4_5, DOI 10.1007/978-1-4757-0602-4_5]