共 50 条
- [1] Malicious Peers Eviction for P2P Overlays 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 216 - 224
- [2] An improved P2P lookup protocol model CLUSTER COMPUTING-THE JOURNAL OF NETWORKS SOFTWARE TOOLS AND APPLICATIONS, 2010, 13 (02): : 199 - 211
- [4] An Improved P2P Lookup Protocol Model 2008 3RD INTERNATIONAL CONFERENCE ON PERVASIVE COMPUTING AND APPLICATIONS, VOLS 1 AND 2, 2008, : 1009 - +
- [6] Robustness of a P2P Community Management System based on Two-level Hierarchical DHT Overlays 2011 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS (ISCC), 2011,
- [7] An identity-based approach to secure P2P applications with Likir Peer-to-Peer Networking and Applications, 2011, 4 : 420 - 438
- [8] A Sybilproof Distributed Identity Management for P2P Networks 2008 IEEE SYMPOSIUM ON COMPUTERS AND COMMUNICATIONS, VOLS 1-3, 2008, : 684 - 691
- [9] Sybil Resilient Identity Distribution in P2P Networks PROCEEDINGS OF THE 2012 INTERNATIONAL CONFERENCE ON ADVANCES IN COMPUTING, COMMUNICATIONS AND INFORMATICS (ICACCI'12), 2012, : 433 - 439
- [10] AS-aware Relay Selection using DHT Service Discovery in P2P overlays 2009 WRI INTERNATIONAL CONFERENCE ON COMMUNICATIONS AND MOBILE COMPUTING: CMC 2009, VOL 3, 2009, : 206 - +