OceanStore: an architecture for global-scale persistent storage
ASPLOS IX Proceedings of the ninth international conference on Architectural support for programming languages and operating systems
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Incentives for sharing in peer-to-peer networks
Proceedings of the 3rd ACM conference on Electronic Commerce
Can Heterogeneity Make Gnutella Scalable?
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Experiences Deploying a Large-Scale Emergent Network
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
The Rise and Fall of Napster - An Evolutionary Approach
AMT '01 Proceedings of the 6th International Computer Science Conference on Active Media Technology
Peer-to-peer information retrieval using self-organizing semantic overlay networks
Proceedings of the 2003 conference on Applications, technologies, architectures, and protocols for computer communications
Secure or insure?: a game-theoretic analysis of information security games
Proceedings of the 17th international conference on World Wide Web
Security and insurance management in networks with heterogeneous agents
Proceedings of the 9th ACM conference on Electronic commerce
Information security economics - and beyond
CRYPTO'07 Proceedings of the 27th annual international cryptology conference on Advances in cryptology
New strategies for revocation in ad-hoc networks
ESAS'07 Proceedings of the 4th European conference on Security and privacy in ad-hoc and sensor networks
Security of economics information
AIKED'10 Proceedings of the 9th WSEAS international conference on Artificial intelligence, knowledge engineering and data bases
Private yet abuse resistant open publishing
Proceedings of the 15th international conference on Security protocols
SP'04 Proceedings of the 12th international conference on Security Protocols
Pools, clubs and security: designing for a party not a person
Proceedings of the 2012 workshop on New security paradigms
Hi-index | 0.00 |
Early peer-to-peer systems sought to resist censorship by distributing content randomly over the entire Internet. The most popular ones simply let nodes serve the resources they were most interested in. The authors offer the first model inspired by economics and conflict theory to analyze such systems' security.