共 16 条
[1]
BRAMPTON A, 2005, CONEXT05 P 2005 ACM, P230, DOI DOI 10.1145/10959321.1095955
[2]
Secure routing for structured peer-to-peer overlay networks
[J].
USENIX ASSOCIATION PROCEEDINGS OF THE FIFTH SYMPOSIUM ON OPERATING SYSTEMS DESIGN AND IMPLEMENTATION,
2002,
:299-314
[3]
Beyond "web of trust": Enabling P2P e-commerce*
[J].
IEEE INTERNATIONAL CONFERENCE ON E-COMMERCE,
2003,
:303-312
[4]
Desmedt Y, 1997, Tech Rep. ISSE-TR-97-01
[5]
DESMEDT Y, 1993, CRYPTO 1989 LNCS, V435
[6]
Heinbockel W, 2005, 2005 FIRST WORKSHOP ON SECURE NETWORK PROTOCOLS (NPSEC), P43
[7]
Herzberg A., 1997, P 4 ACM C COMPUTER C, P100
[8]
KAMVAR SD, 2003, WWW 03, P640, DOI DOI 10.1145/775152.775242
[9]
RATNASAMY S, 2001, ACM SIGCOMM, P161
[10]
RISSON J, 2006, ELSEVIER COMPUTER NE, V50, P3495