Information Technology Reference
In-Depth Information
[Dinger and Hartenstein, 2006] Dinger, J. and Hartenstein, H. (2006). De-
fending the Sybil Attack in P2P Networks: Taxonomy, Challenges, and a
Proposal for Self-Registration. In Proceedings of the First International
Conference on Availability, Reliability and Security (ARES 2006).
[Douceur, 2002] Douceur, J. (2002). The Sybil Attack. In Proceedings of the
1st International Workshop on Peer-to-Peer Systems (IPTPS 2002).
[Du et al., 2004] Du, W., Deng, J., Han, Y. S., Chen, S., and Varshney, P. K.
(2004). A Key Management Scheme for Wireless Sensor Networks Using
Deployment Knowledge. In INFOCOM 2004, volume 1, pages 586-597.
[Du et al., 2005] Du, W., Deng, J., Han, Y. S., Varshney, P. K., Katz, J., and
Khalili, A. (2005). A Pairwise Key Predistribution Scheme for Wireless
Sensor Networks. ACM Transactions on Information and System Security,
8(2):228-258.
[eDonkey, 2009] eDonkey
(2009).
http://www.brothersoft.com/
downloads/edonkey.html .
[Efstathiou and Polyzos, 2003] Efstathiou, E. C. and Polyzos, G. C. (2003).
A Peer-to-Peer Approach to Wireless LAN Roaming.
In Proceedings of
WMASH, pages 10-18.
[Einstein@Home, 2009] Einstein@Home
(2009).
http://einstein.phys.
uwm.edu .
[Eltoweissy et al., 2006] Eltoweissy, M., Moharrum, M., and Mukkamala, R.
(2006). Dynamic Key Management in Sensor Networks. IEEE Communi-
cations Magazine, 44(4):122-130.
[eMule, 2009] eMule (2009). http://www.emule-project.net .
[Erdos and Renyi, 1960] Erdos, P. and Renyi, A. (1960). On the Evolution of
Random Graph. Publ. Math. Inst. Hung. Acad. Sci., 5:17-61.
[Eschenauer and Gligor, 2002] Eschenauer, L. and Gligor, V. D. (2002). A
Key-Management Scheme for Distributed Sensor Networks. In The 9th
ACM Conference on Computer and Communications Security, pages 41-
47.
[Feldman and Chuang, 2005] Feldman, M. and Chuang, J. (2005). Overcom-
ing Free-Riding Behavior in Peer-to-Peer Systems.
ACM SIGccom Ex-
changes, 5(4):41-50.
[Feldman et al., 2004a] Feldman, M., Lai, K., Stoica, I., and Chuang, J.
(2004a). Robust Incentive Techniques for Peer-to-Peer Networks. In Pro-
ceedings of the 5th ACM conference on Electronic Commerce, pages 102-
111.
Search WWH ::




Custom Search