Information Technology Reference
In-Depth Information
[Milgram, 1967] Milgram, S. (1967). The Small World Problem. Psychology
Today, (1):60-67.
[Miller, 1985] Miller, V. S. (1985). Use of Elliptic Curves in Cryptography.
Lecture Notes in Computer Science: Advances in Cryptology, 218:417-426.
[Milojicic et al., 2002] Milojicic, D. S., Kalogeraki, V., Lukose, R., Nagaraja,
K., Pruyne, J., Richard, B., Rollins, S., and Xu, Z. (2002).
Peer-to-Peer
Computing. http://www.hpl.hp.com/techreports/2002/ .
[Minar and Hedlund, 2001] Minar, N. and Hedlund, M. (2001). A Network of
Peers: Peer-to-Peer Models Through the History of the Internet. In Peer-
to-Peer: Harnessing the Benefits of a Disruptive Technology, pages 9-20.
[Mondal and Kitsuregawa, 2006] Mondal, A. and Kitsuregawa, M. (2006).
Privacy, Security and Trust in P2P Environments: A Perspective. In Pro-
ceedings 17th International Conference Database and Expert Systems Ap-
plications (DEXA 2006).
[Amps Project, 2008] Amps
Project
(2008).
http://www-
mtl.mit.edu/researchgroups/icsystems/uamps/.
[Nakajima et al., 2007] Nakajima, Y., Watanabe, K., and Nemati, A. G.
(2007). Trustworthiness of Acquaintance Peers on Access Control Mod-
els. In Proceedings 18th International Workshop on Database and Expert
Systems Applications (DEXA).
[Naoumov and Ross, 2006] Naoumov, N. and Ross, K. (2006). Exploiting P2P
Systems for DDoS Attacks. In Proceedings of the First International Con-
ference on Scalable Information Systems.
[Napster, 2009] Napster (2009). http://free.napster.com .
[Newsome et al., 2004] Newsome, J., Shi, E., Song, D., and Perrig, A. (2004).
The Sybil Attack in Sensor Networks: Analysis & Defenses. In The 3rd
International Symposium on Information Processing in Sensor Networks,
pages 259-268.
[Ohnishi et al., 2007] Ohnishi, K., Nagamatsu, S., Okamura, T., and Oie, Y.
(2007). Autonomously Reconstructable Semi-Structured P2P Networks for
File Sharing. In Proceedings of the Third International Conference on Au-
tonomic and Autonomous Systems (ICAS 2007).
[Oram, 2001] Oram, A. (2001). Peer-to-Peer: Harnessing the Benefits of a
Disruptive Technology. Sebastopol.
[Osborne, 2004] Osborne, M. J. (2004).
An Introduction to Game Theory.
Oxford University Press.
Search WWH ::




Custom Search