Information Technology Reference
In-Depth Information
[Chopra et al., 2009] Chopra, D., Schulzrinne, H., Marocco, E., and Ivov, E.
(2009). Peer-to-Peer Overlays for Real-Time Communication: Security Is-
sues and Solutions. IEEE Communications Survey and Tutorials, (1):4-12.
[Cisco, 2009] Cisco (2009).
Technical Specification of Cisco AIR-CB21AG.
http://www.cisco.com .
[Clarke et al., 2000] Clarke, I., Sandberg, O., Wiley, B., and Hong, T. (2000).
Freenet: A Distributed Anonymous Information Storage and Retrieval Sys-
tem. In Proceedings of the Workshop on Design Issues in Anonymous and
Unobservability.
[Cohen, 2003] Cohen, B. (2003). Incentives Build Robustness in BitTorrent.
In Proceedings of the Workshop on Economics of Peer-to-Peer Systems.
[CoolStreaming, 2009] CoolStreaming
(2009).
http://webtv.
coolstreaming.us .
[Costa and Almeida, 2007] Costa, C. and Almeida, J. (2007). Reputation
Systems for Fighting Pollution in Peer-to-Peer File Sharing Systems. In
Proceedings of the Seventh IEEE International Conference on Peer-to-Peer
Computing.
[Courcoubetis and Weber, 2006] Courcoubetis, C. and Weber, R. (2006). In-
centives for Large Peer-to-Peer Systems. IEEE Journal on Selected Areas
in Communications, 24(5):1034-1050.
[Crossbox Technology, 2008] Crossbox
Technology
(2008).
http://www.xbow.com/.
[Cui and Nahrstedt, 2003] Cui, Y. and Nahrstedt, K. (2003). Layered Peer-
to-Peer Streaming. In Proceedings of NOSSDAV'03, pages 162-171.
[Dabek et al., 2004] Dabek, F., Cox, R., Kaashoek, F., and Morris, R. (2004).
Vivaldi: A Decentralized Network Coordinate System.
In Proceedings of
ACM SIGCOMM.
[Dale et al., 2008] Dale, C., Liu, J., Peters, J., and Li, B. (2008). Evolution
and Enhancement of BitTorrent Network Topologies.
In Proceedings of
IWQoS 2008.
[Di e and Hellman, 1976] Di e, W. and Hellman, M. (1976). New Directions
in Cryptography. IEEE Transactions on Information Theory, 22:644-654.
[Dimitriou et al., 2007] Dimitriou, T., Karame, G., and Christou, I. (2007).
SuperTrust—A Secure and E cient Framework for Handling Trust in
Super-Peer Networks. In Proceedings PODC 2007.
Search WWH ::




Custom Search