POPL '87 Proceedings of the 14th ACM SIGACT-SIGPLAN symposium on Principles of programming languages
Introduction to algorithms
Proactive public key and signature systems
Proceedings of the 4th ACM conference on Computer and communications security
Practical Byzantine fault tolerance
OSDI '99 Proceedings of the third symposium on Operating systems design and implementation
Secure communications over insecure channels
Communications of the ACM
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Wide-area cooperative storage with CFS
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Security Considerations for Peer-to-Peer Distributed Hash Tables
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Atomic Data Access in Distributed Hash Tables
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Tapestry: An Infrastructure for Fault-tolerant Wide-area Location and
Using client puzzles to protect TLS
SSYM'01 Proceedings of the 10th conference on USENIX Security Symposium - Volume 10
The exact security of digital signatures-how to sign with RSA and Rabin
EUROCRYPT'96 Proceedings of the 15th annual international conference on Theory and application of cryptographic techniques
Borg: a hybrid protocol for scalable application-level multicast in peer-to-peer networks
NOSSDAV '03 Proceedings of the 13th international workshop on Network and operating systems support for digital audio and video
Pastiche: making backup cheap and easy
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Routing networks for distributed hash tables
Proceedings of the twenty-second annual symposium on Principles of distributed computing
Should we build Gnutella on a structured overlay?
ACM SIGCOMM Computer Communication Review
The design and implementation of a next generation name service for the internet
Proceedings of the 2004 conference on Applications, technologies, architectures, and protocols for computer communications
On the Security of Polling Protocols in Peer-to-Peer Systems
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
Adaptive Peer-to-Peer Topologies
P2P '04 Proceedings of the Fourth International Conference on Peer-to-Peer Computing
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
Kosha: A Peer-to-Peer Enhancement for the Network File System
Proceedings of the 2004 ACM/IEEE conference on Supercomputing
A Peer-to-Peer Replica Location Service Based on a Distributed Hash Table
Proceedings of the 2004 ACM/IEEE conference on Supercomputing
An Efficient Data Location Protocol for Self.organizing Storage Clusters
Proceedings of the 2003 ACM/IEEE conference on Supercomputing
Pastiche: making backup cheap and easy
OSDI '02 Proceedings of the 5th symposium on Operating systems design and implementationCopyright restrictions prevent ACM from being able to make the PDFs for this conference available for downloading
How to spread adversarial nodes?: rotate!
Proceedings of the thirty-seventh annual ACM symposium on Theory of computing
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Denial-of-service resilience in peer-to-peer file sharing systems
SIGMETRICS '05 Proceedings of the 2005 ACM SIGMETRICS international conference on Measurement and modeling of computer systems
A secure P2P architecture for location management
Proceedings of the 6th international conference on Mobile data management
Vigilante: end-to-end containment of internet worms
Proceedings of the twentieth ACM symposium on Operating systems principles
A Novel Methodology for Constructing Secure Multipath Overlays
IEEE Internet Computing
AP3: cooperative, decentralized anonymous communication
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Impeding attrition attacks in P2P systems
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Eluding carnivores: file sharing with strong anonymity
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Defending against eclipse attacks on overlay networks
Proceedings of the 11th workshop on ACM SIGOPS European workshop
Taxonomy of trust: categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
Peer counting and sampling in overlay networks: random walk methods
Proceedings of the twenty-fifth annual ACM symposium on Principles of distributed computing
Towards a scalable and robust DHT
Proceedings of the eighteenth annual ACM symposium on Parallelism in algorithms and architectures
Virtual ring routing: network routing inspired by DHTs
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Proceedings of the 2006 conference on Applications, technologies, architectures, and protocols for computer communications
Measurement based analysis, modeling, and synthesis of the internet delay space
Proceedings of the 6th ACM SIGCOMM conference on Internet measurement
Visualization assisted detection of sybil attacks in wireless networks
Proceedings of the 3rd international workshop on Visualization for computer security
Fireflies: scalable support for intrusion-tolerant network overlays
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
Experiences in building and operating ePOST, a reliable peer-to-peer application
Proceedings of the 1st ACM SIGOPS/EuroSys European Conference on Computer Systems 2006
Securing decentralized reputation management using TrustGuard
Journal of Parallel and Distributed Computing - Special issue: Security in grid and distributed systems
Design and implementation of a secure wide-area object middleware
Computer Networks: The International Journal of Computer and Telecommunications Networking
Attrition defenses for a peer-to-peer digital preservation system
ATEC '05 Proceedings of the annual conference on USENIX Annual Technical Conference
POST: a secure, resilient, cooperative messaging system
HOTOS'03 Proceedings of the 9th conference on Hot Topics in Operating Systems - Volume 9
Beehive: O(1)lookup performance for power-law query distributions in peer-to-peer overlays
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Beehive: O(1)lookup performance for power-law query distributions in peer-to-peer overlays
NSDI'04 Proceedings of the 1st conference on Symposium on Networked Systems Design and Implementation - Volume 1
Debunking some myths about structured and unstructured overlays
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Glacier: highly durable, decentralized storage despite massive correlated failures
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
Cashmere: resilient anonymous routing
NSDI'05 Proceedings of the 2nd conference on Symposium on Networked Systems Design & Implementation - Volume 2
SkipNet: a scalable overlay network with practical locality properties
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
pFusion: A P2P Architecture for Internet-Scale Content-Based Search and Retrieval
IEEE Transactions on Parallel and Distributed Systems
WormShield: Fast Worm Signature Generation with Distributed Fingerprint Aggregation
IEEE Transactions on Dependable and Secure Computing
Experience with an object reputation system for peer-to-peer filesharing
NSDI'06 Proceedings of the 3rd conference on Networked Systems Design & Implementation - Volume 3
QUIP: a protocol for securing content in peer-to-peer publish/subscribe overlay networks
ACSC '07 Proceedings of the thirtieth Australasian conference on Computer science - Volume 62
DGRID: a DHT-based resource indexing and discovery scheme for computational grids
ACSW '07 Proceedings of the fifth Australasian symposium on ACSW frontiers - Volume 68
Exploiting KAD: possible uses and misuses
ACM SIGCOMM Computer Communication Review
PeerReview: practical accountability for distributed systems
Proceedings of twenty-first ACM SIGOPS symposium on Operating systems principles
Flexible security in peer-to-peer applications: Enabling new opportunities beyond file sharing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Low-resource routing attacks against tor
Proceedings of the 2007 ACM workshop on Privacy in electronic society
On the accuracy of decentralized virtual coordinate systems in adversarial networks
Proceedings of the 14th ACM conference on Computer and communications security
A distributed content independent method for spam detection
HotBots'07 Proceedings of the first conference on First Workshop on Hot Topics in Understanding Botnets
Large-scale byzantine fault tolerance: safe but not always live
HotDep'07 Proceedings of the 3rd workshop on on Hot Topics in System Dependability
Attribute-based access to distributed data over P2P networks
International Journal of Computational Science and Engineering
Towards application-aware anonymous routing
HOTSEC'07 Proceedings of the 2nd USENIX workshop on Hot topics in security
Towards a declarative language and system for secure networking
NETB'07 Proceedings of the 3rd USENIX international workshop on Networking meets databases
Net-χ: unified data-centric internet services
NETB'07 Proceedings of the 3rd USENIX international workshop on Networking meets databases
Authentication in stealth distributed hash tables
Journal of Systems Architecture: the EUROMICRO Journal
Nysiad: practical protocol transformation to tolerate Byzantine failures
NSDI'08 Proceedings of the 5th USENIX Symposium on Networked Systems Design and Implementation
Securing user-controlled routing infrastructures
IEEE/ACM Transactions on Networking (TON)
Proceedings of the twenty-seventh ACM symposium on Principles of distributed computing
Securing Overlay Activities of Peers in Unstructured P2P Networks
Computational Intelligence and Security
The Exclusion of Malicious Routing Peers in Structured P2P Systems
Agents and Peer-to-Peer Computing
Efficient Content Authentication in Peer-to-Peer Networks
ACNS '07 Proceedings of the 5th international conference on Applied Cryptography and Network Security
Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks
Euro-Par '08 Proceedings of the 14th international Euro-Par conference on Parallel Processing
Proceedings of the 1st Workshop on Social Network Systems
Vigilante: End-to-end containment of Internet worm epidemics
ACM Transactions on Computer Systems (TOCS)
Information leaks in structured peer-to-peer anonymous communication systems
Proceedings of the 15th ACM conference on Computer and communications security
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Reputation and audits for self-organizing storage
Proceedings of the workshop on Security in Opportunistic and SOCial networks
Lawful Interception in P2P-Based VoIP Systems
Principles, Systems and Applications of IP Telecommunications. Services and Security for Next Generation Networks
Our Brothers' Keepers: Secure Routing with High Performance
SSS '08 Proceedings of the 10th International Symposium on Stabilization, Safety, and Security of Distributed Systems
Robust random number generation for peer-to-peer systems
Theoretical Computer Science
IEEE/ACM Transactions on Networking (TON)
Scrivener: providing incentives in cooperative content distribution systems
Proceedings of the ACM/IFIP/USENIX 2005 International Conference on Middleware
P2P Networking and Applications
P2P Networking and Applications
Secure routing in peer-to-peer distributed hash tables
Proceedings of the 2009 ACM symposium on Applied Computing
EGOIST: overlay routing using selfish neighbor selection
CoNEXT '08 Proceedings of the 2008 ACM CoNEXT Conference
Antfarm: efficient content distribution with managed swarms
NSDI'09 Proceedings of the 6th USENIX symposium on Networked systems design and implementation
Brahms: Byzantine resilient random membership sampling
Computer Networks: The International Journal of Computer and Telecommunications Networking
Evaluation of Sybil Attacks Protection Schemes in KAD
AIMS '09 Proceedings of the 3rd International Conference on Autonomous Infrastructure, Management and Security: Scalability of Networks and Services
Peer-to-Peer Architecture for Collaborative Intrusion and Malware Detection on a Large Scale
ISC '09 Proceedings of the 12th International Conference on Information Security
PeerTIS: a peer-to-peer traffic information system
Proceedings of the sixth ACM international workshop on VehiculAr InterNETworking
Taxonomy of trust: Categorizing P2P reputation systems
Computer Networks: The International Journal of Computer and Telecommunications Networking - Management in peer-to-peer systems
NISAN: network information service for anonymization networks
Proceedings of the 16th ACM conference on Computer and communications security
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Proceedings of the 16th ACM conference on Computer and communications security
Scalable onion routing with torsk
Proceedings of the 16th ACM conference on Computer and communications security
Hashing it out in public: common failure modes of DHT-based anonymity schemes
Proceedings of the 8th ACM workshop on Privacy in the electronic society
Anonymity and Censorship Resistance in Unstructured Overlay Networks
OTM '09 Proceedings of the Confederated International Conferences, CoopIS, DOA, IS, and ODBASE 2009 on On the Move to Meaningful Internet Systems: Part I
Secure overlay multicast infrastructure for P2P-based IPTV service
ICACT'09 Proceedings of the 11th international conference on Advanced Communication Technology - Volume 3
A sybil-proof referral system based on multiplicative reputation chains
IEEE Communications Letters
NBean: a heteropastry-based P2P proxy system
WiCOM'09 Proceedings of the 5th International Conference on Wireless communications, networking and mobile computing
A market-based approach to managing the risk of peer-to-peer transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
Enforcing collaboration in peer-to-peer routing services
iTrust'03 Proceedings of the 1st international conference on Trust management
Robust data location infrastructure in distributed collaborative environment
CSCWD'06 Proceedings of the 10th international conference on Computer supported cooperative work in design III
A survey of peer-to-peer security issues
ISSS'02 Proceedings of the 2002 Mext-NSF-JSPS international conference on Software security: theories and systems
A novel overlay network for a secure global home agent dynamic discovery
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems - Volume Part II
Self-stabilizing and Byzantine-tolerant overlay network
OPODIS'07 Proceedings of the 11th international conference on Principles of distributed systems
MIME: a dynamic index scheme for multi-dimensional query in mobile p2p networks
DASFAA'07 Proceedings of the 12th international conference on Database systems for advanced applications
Improving the dependability of prefix-based routing in DHTs
OTM'07 Proceedings of the 2007 OTM Confederated international conference on On the move to meaningful internet systems: CoopIS, DOA, ODBASE, GADA, and IS - Volume Part I
Informant: detecting sybils using incentives
FC'07/USEC'07 Proceedings of the 11th International Conference on Financial cryptography and 1st International conference on Usable Security
Pushback for overlay networks: protecting against malicious insiders
ACNS'08 Proceedings of the 6th international conference on Applied cryptography and network security
Availability for DHT-based overlay networks with unidirectional routing
WISTP'08 Proceedings of the 2nd IFIP WG 11.2 international conference on Information security theory and practices: smart devices, convergence and next generation networks
Topology-aware routing in structured peer-to-peer overlay networks
Future directions in distributed computing
Collaborative anomaly detection for structured P2P networks
GLOBECOM'09 Proceedings of the 28th IEEE conference on Global telecommunications
Measurement-based analysis, modeling, and synthesis of the internet delay space
IEEE/ACM Transactions on Networking (TON)
A survey on the design, applications, and enhancements of application-layer overlay networks
ACM Computing Surveys (CSUR)
Communications of the ACM
Towards securing data delivery in peer-to-peer streaming
COMSNETS'10 Proceedings of the 2nd international conference on COMmunication systems and NETworks
The brighter side of risks in peer-to-peer barter relationships
Future Generation Computer Systems
Crowdsourcing service-level network event monitoring
Proceedings of the ACM SIGCOMM 2010 conference
Veracity: a fully decentralized service for securing network coordinate systems
IPTPS'08 Proceedings of the 7th international conference on Peer-to-peer systems
Whanau: a sybil-proof distributed hash table
NSDI'10 Proceedings of the 7th USENIX conference on Networked systems design and implementation
Vanish: increasing data privacy with self-destructing data
SSYM'09 Proceedings of the 18th conference on USENIX security symposium
Census: location-aware membership management for large-scale distributed systems
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Veracity: practical secure network coordinates via vote-based agreements
USENIX'09 Proceedings of the 2009 conference on USENIX Annual technical conference
Preventing DDoS attacks on internet servers exploiting P2P systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Extending P2PSIP VoIP communication for ad hoc networks
Proceedings of the 6th ACM workshop on QoS and security for wireless and mobile networks
A free-rider aware reputation system for peer-to-peer file-sharing networks
Expert Systems with Applications: An International Journal
Robust Decentralized Virtual Coordinate Systems in Adversarial Environments
ACM Transactions on Information and System Security (TISSEC)
How to share your favourite search results while preserving privacy and quality
PETS'10 Proceedings of the 10th international conference on Privacy enhancing technologies
A survey of DHT security techniques
ACM Computing Surveys (CSUR)
Secure routing strategies in DHT-based systems
Globe'10 Proceedings of the Third international conference on Data management in grid and peer-to-peer systems
Phyllo: a peer-to-peer overlay security framework
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Identity theft protection in structured overlays
NPSEC'05 Proceedings of the First international conference on Secure network protocols
Fault injection in distributed java applications
IPDPS'06 Proceedings of the 20th international conference on Parallel and distributed processing
Evading cellular data monitoring with human movement networks
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
Scalable anonymous communication with provable security
HotSec'10 Proceedings of the 5th USENIX conference on Hot topics in security
HyPeer: Structured overlay with flexible-choice routing
Computer Networks: The International Journal of Computer and Telecommunications Networking
Uniform and ergodic sampling in unstructured peer-to-peer systems with malicious nodes
OPODIS'10 Proceedings of the 14th international conference on Principles of distributed systems
SybilLimit: a near-optimal social network defense against sybil attacks
IEEE/ACM Transactions on Networking (TON)
Securing P2P storage with a self-organizing payment scheme
DPM'10/SETOP'10 Proceedings of the 5th international Workshop on data privacy management, and 3rd international conference on Autonomous spontaneous security
A design for securing data delivery in mesh-based peer-to-peer streaming
Computer Networks: The International Journal of Computer and Telecommunications Networking
CR-Chord: Improving lookup availability in the presence of malicious DHT nodes
Computer Networks: The International Journal of Computer and Telecommunications Networking
ICDCN'10 Proceedings of the 11th international conference on Distributed computing and networking
Anonygator: privacy and integrity preserving data aggregation
Proceedings of the ACM/IFIP/USENIX 11th International Conference on Middleware
A Read-Only Distributed Hash Table
Journal of Grid Computing
Robust random number generation for peer-to-peer systems
OPODIS'06 Proceedings of the 10th international conference on Principles of Distributed Systems
Making chord robust to byzantine attacks
ESA'05 Proceedings of the 13th annual European conference on Algorithms
A multi-agent approach to resource sharing optimization in user networks
ICCS'06 Proceedings of the 6th international conference on Computational Science - Volume Part III
Safe and private data sharing with turtle: friends team-up and beat the system
SP'04 Proceedings of the 12th international conference on Security Protocols
A peer-to-peer mechanism for resource location and allocation over the grid
ISPA'04 Proceedings of the Second international conference on Parallel and Distributed Processing and Applications
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
Off-Line karma: a decentralized currency for peer-to-peer and grid applications
ACNS'05 Proceedings of the Third international conference on Applied Cryptography and Network Security
A first look at peer-to-peer worms: threats and defenses
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
A taxonomy of rational attacks
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Impact of neighbor selection on performance and resilience of structured p2p networks
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
Secure identity and location decoupling using peer-to-peer networks
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Commensal cuckoo: secure group partitioning for large-scale services
ACM SIGOPS Operating Systems Review
SPROUT: P2P routing with social networks
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
PeerMint: decentralized and secure accounting for peer-to-peer applications
NETWORKING'05 Proceedings of the 4th IFIP-TC6 international conference on Networking Technologies, Services, and Protocols; Performance of Computer and Communication Networks; Mobile and Wireless Communication Systems
iTrust'05 Proceedings of the Third international conference on Trust Management
Robustness challenges in peer-to-peer agent systems
AP2PC'03 Proceedings of the Second international conference on Agents and Peer-to-Peer Computing
ESORICS'05 Proceedings of the 10th European conference on Research in Computer Security
P6P: a peer-to-peer approach to internet infrastructure
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
DHT routing using social links
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Providing administrative control and autonomy in structured peer-to-peer overlays
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Robust distributed name service
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Scrivener: providing incentives in cooperative content distribution systems
Middleware'05 Proceedings of the ACM/IFIP/USENIX 6th international conference on Middleware
Performance evaluation of large-scale dynamic systems
ACM SIGMETRICS Performance Evaluation Review
Identity management based on adaptive puzzles to protect P2P systems from Sybil attacks
Computer Networks: The International Journal of Computer and Telecommunications Networking
NCShield: securing decentralized, matrix factorization-based network coordinate systems
Proceedings of the 2012 IEEE 20th International Workshop on Quality of Service
Resource-competitive analysis: a new perspective on attack-resistant distributed computing
FOMC '12 Proceedings of the 8th International Workshop on Foundations of Mobile Computing
Sybil attack detection through global topology pattern visualization
Information Visualization
GAUR: a method to detect Sybil groups in peer-to-peer overlays
International Journal of Grid and Utility Computing
Sybil resilient identity distribution in P2P networks
Proceedings of the International Conference on Advances in Computing, Communications and Informatics
Veracity, plausibility, and reputation
WISTP'12 Proceedings of the 6th IFIP WG 11.2 international conference on Information Security Theory and Practice: security, privacy and trust in computing systems and ambient intelligent ecosystems
eDonkey & eMule's Kad: Measurements & Attacks
Fundamenta Informaticae
SybilControl: practical sybil defense with computational puzzles
Proceedings of the seventh ACM workshop on Scalable trusted computing
An efficient incentive scheme with a distributed authority infrastructure in peer-to-peer networks
Journal of Parallel and Distributed Computing
Cachet: a decentralized architecture for privacy preserving social networking with caching
Proceedings of the 8th international conference on Emerging networking experiments and technologies
Declarative secure distributed information systems
Computer Languages, Systems and Structures
Iolaus: securing online content rating systems
Proceedings of the 22nd international conference on World Wide Web
Towards practical communication in Byzantine-resistant DHTs
IEEE/ACM Transactions on Networking (TON)
An authentication framework for peer-to-peer cloud
Proceedings of the 6th International Conference on Security of Information and Networks
Hi-index | 0.02 |
Structured peer-to-peer overlay networks provide a substrate for the construction of large-scale, decentralized applications, including distributed storage, group communication, and content distribution. These overlays are highly resilient; they can route messages correctly even when a large fraction of the nodes crash or the network partitions. But current overlays are not secure; even a small fraction of malicious nodes can prevent correct message delivery throughout the overlay. This problem is particularly serious in open peer-to-peer systems, where many diverse, autonomous parties without preexisting trust relationships wish to pool their resources. This paper studies attacks aimed at preventing correct message delivery in structured peer-to-peer overlays and presents defenses to these attacks. We describe and evaluate techniques that allow nodes to join the overlay, to maintain routing state, and to forward messages securely in the presence of malicious nodes.