Information Technology Reference
In-Depth Information
P2P Networks. In Proceedings of the 2nd International Conference on In-
ternet and Web Applications and Services (ICIW).
[Azzedin and Maheswaran, 2003] Azzedin, F. and Maheswaran, M. (2003).
Trust Modeling for Peer-to-Peer Based Computing Systems. In Proceed-
ings 17th International Parallel and Distributed Symposium (IPDPS).
[Azzedin and Maheswaran, 2004] Azzedin, F. and Maheswaran, M. (2004). A
Trust Brokering System and Its Application to Resource Management in
Public-Resource Grids. In Proceedings 18th International Parallel and Dis-
tributed Symposium (IPDPS).
[Balakrishnan et al., 2003] Balakrishnan, H., Kaashoek, M. F., Karger, D.,
Morris, R., and Stoica, I. (2003). Looking Up Data in P2P Systems. Com-
munications of the ACM, (2):43-48.
[Barabasi and Albert, 1999] Barabasi, A.-L. and Albert, R. (1999).
Emer-
gence of Scaling in Random Networks. Science, (5439):509-512.
[Baset and Schulzrinne, 2006] Baset, S. A. and Schulzrinne, H. G. (2006). An
Analysis of the Skype Peer-to-Peer Internet Telephony Protoco.
In Pro-
ceedings of INFOCOM 2006.
[Bazzi and Konjevod, 2005] Bazzi, R. and Konjevod, G. (2005). On the Es-
tablishment of Distinct Identities in Overlay Networks. In Proceedings of
the 24th ACM Symposium on Principles of Distributed Computing (PODC
2005), pages 312-320.
[Becker and Clement, 2004] Becker, J. U. and Clement, M. (2004). The Eco-
nomic Rationale of Offering Media Files in Peer-to-Peer Networks. In Pro-
ceedings of the 37th Hawaii International Conference on System Sciences.
[Bertino et al., 2004] Bertino, E., Ferrari, E., and Squicciarini, A. C. (2004).
Trust-χ: A Peer-to-Peer Framework for Trust Establishment. IEEE Trans-
actions on Knowledge and Data Engineering, (7):827-842.
[Bharghavan et al., 1994] Bharghavan, V., Demers, A., Shenker, S., and
Zhang, L. (1994). MACAW: A Media Access Protocol for Wireless LAN's.
In ACM SIGCOMM Computer Communication Review, pages 212-225.
[BitComet, 2009] BitComet (2009). http://www.bitcomet.com .
[BitTorrent, 2009] BitTorrent (2009). http://www.bittorrent.com .
[Blom, 1984] Blom, R. (1984). An Optimal Class of Symmetric Key Gen-
eration Systems. In EUROCRYPT Workshop on Advances in Cryptology,
pages 335-338.
[Blundo et al., 1992] Blundo, C., Santis, A. D., Herzberg, A., Kutten, S., Vac-
caro, U., and Yung, M. (1992). Perfectly Secure Key Distribution for Dy-
namic Conferences. In CRYPTO 1992, volume 740, pages 471-486.
Search WWH ::




Custom Search