Extensible security architectures for Java
Proceedings of the sixteenth ACM symposium on Operating systems principles
PLAN: a packet language for active networks
ICFP '98 Proceedings of the third ACM SIGPLAN international conference on Functional programming
Anonymous Web transactions with Crowds
Communications of the ACM
Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Active network vision and reality: lessions from a capsule-based system
Proceedings of the seventeenth ACM symposium on Operating systems principles
Separating key management from file system security
Proceedings of the seventeenth ACM symposium on Operating systems principles
Feasibility of a serverless distributed file system deployed on an existing set of desktop PCs
Proceedings of the 2000 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
Secure communications over insecure channels
Communications of the ACM
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Tangler: a censorship-resistant publishing system based on document entanglements
CCS '01 Proceedings of the 8th ACM conference on Computer and Communications Security
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Wide-area cooperative storage with CFS
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Distributed algorithmic mechanism design: recent results and future directions
DIALM '02 Proceedings of the 6th international workshop on Discrete algorithms and methods for mobile computing and communications
Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Anonymizing Censorship Resistant Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Security Considerations for Peer-to-Peer Distributed Hash Tables
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
SCRIBE: The Design of a Large-Scale Event Notification Infrastructure
NGC '01 Proceedings of the Third International COST264 Workshop on Networked Group Communication
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Secure routing for structured peer-to-peer overlay networks
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
An analysis of internet content delivery systems
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Anonymous connections and onion routing
IEEE Journal on Selected Areas in Communications
Scribe: a large-scale and decentralized application-level multicast infrastructure
IEEE Journal on Selected Areas in Communications
Comparing economic incentives in peer-to-peer networks
Computer Networks: The International Journal of Computer and Telecommunications Networking - Special issue: Internet economics: Pricing and policies
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
Enhancing Data Authenticity and Integrity in P2P Systems
IEEE Internet Computing
Impeding attrition attacks in P2P systems
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Semantic remote attestation: a virtual machine directed approach to trusted computing
VM'04 Proceedings of the 3rd conference on Virtual Machine Research And Technology Symposium - Volume 3
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing
Computer Networks: The International Journal of Computer and Telecommunications Networking
A distributed content independent method for spam detection
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
Distributed databases and peer-to-peer databases: past and present
ACM SIGMOD Record
An access control mechanism for P2P collaborations
DaMaP '08 Proceedings of the 2008 international workshop on Data management in peer-to-peer systems
Efficient Content Authentication in Peer-to-Peer Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Information leaks in structured peer-to-peer anonymous communication systems
Proceedings of the 15th ACM conference on Computer and communications security
Our Brothers' Keepers: Secure Routing with High Performance
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
A Framework for Secure End-to-End Delivery of Messages in Publish/Subscribe Systems
GRID '06 Proceedings of the 7th IEEE/ACM International Conference on Grid Computing
P2P Networking and Applications
P2P Networking and Applications
Secure routing in peer-to-peer distributed hash tables
Proceedings of the 2009 ACM symposium on Applied Computing
Agent Computing and Multi-Agent Systems
Hashing it out in public: common failure modes of DHT-based anonymity schemes
Proceedings of the 8th ACM workshop on Privacy in the electronic society
A scheme for P2P optimization in access network
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A novel overlay network for a secure global home agent dynamic discovery
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Accountable file indexing against DDoS attacks in peer-to-peer networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Preventing DDoS attacks on internet servers exploiting P2P systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Extending P2PSIP VoIP communication for ad hoc networks
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
Pricing digital content distribution over heterogeneous channels
Decision Support Systems
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
Secure multi-agent system for multi-hop environments
MMM-ACNS'10 Proceedings of the 5th international conference on Mathematical methods, models and architectures for computer network security
Phyllo: a peer-to-peer overlay security framework
NPSEC'05 Proceedings of the First international conference on Secure network protocols
ICDCN'10 Proceedings of the 11th international conference on Distributed computing and networking
TRAP: open decentralized distributed spam filtering
TrustBus'11 Proceedings of the 8th international conference on Trust, privacy and security in digital business
Review: A survey on content-centric technologies for the current Internet: CDN and P2P solutions
Computer Communications
Cooperating with free riders in unstructured P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
Chord-PKI: A distributed trust infrastructure based on P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
An abstract model for incentive-enhanced trust in p2p networks
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
Conservation vs. consensus in peer-to-peer preservation systems
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Orchestrating access control in peer data management systems
EDBT'06 Proceedings of the 2006 international conference on Current Trends in Database Technology
Extending trust in peer-to-peer networks
ADBIS'09 Proceedings of the 13th East European conference on Advances in Databases and Information Systems
Trust in peer-to-peer content distribution protocols
WISTP'10 Proceedings of the 4th IFIP WG 11.2 international conference on Information Security Theory and Practices: security and Privacy of Pervasive Systems and Smart Devices
SSO password-based multi-server authentication protocol
International Journal of Communication Networks and Distributed Systems
GAUR: a method to detect Sybil groups in peer-to-peer overlays
International Journal of Grid and Utility Computing
Sybil resilient identity distribution in P2P networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
eDonkey & eMule's Kad: Measurements & Attacks
Fundamenta Informaticae
Chord-PKI: embedding a public key infrastructure into the chord overlay network
EuroPKI'07 Proceedings of the 4th European conference on Public Key Infrastructure: theory and practice
Towards practical communication in Byzantine-resistant DHTs
IEEE/ACM Transactions on Networking (TON)
Self-Organized Formation and Evolution of Peer-to-Peer Networks
INFORMS Journal on Computing
An authentication framework for peer-to-peer cloud
Proceedings of the 6th International Conference on Security of Information and Networks
An extensible pattern-based library and taxonomy of security threats for distributed systems
Computer Standards & Interfaces
Hi-index | 0.00 |
Peer-to-peer (p2p) networking technologies have gained popularity as a mechanism for users to share files without the need for centralized servers. A p2p network provides a scalable and fault-tolerant mechanism to locate nodes anywhere on a network without maintaining a large amount of routing state. This allows for a variety of applications beyond simple file sharing. Examples include multicast systems, anonymous communications systems, and web caches. We survey security issues that occur in the underlying p2p routing protocols, as well as fairness and trust issues that occur in file sharing and other p2p applications.We discuss how techniques, ranging from cryptography, to random network probing, to economic incentives, can be used to address these problems.