Detection and removal of malicious peers in gossip-based protocols (2004)

Cached

Download Links

by Márk Jelasity , Alberto Montresor , Ozalp Babaoglu
Venue:In Proceedings of FuDiCo
Citations:6 - 1 self

Documents Related by Co-Citation

78 Epidemic Information Dissemination in Distributed Systems – P T Eugster, R Guerraoui, A-M Kermarrec, L Massouli - 2004
362 Secure routing for structured peer-to-peer overlay networks – Miguel Castro, Peter Druschel, Ayalvadi Ganesh, Antony Rowstron, Dan S. Wallach - 2002
1131 The Sybil Attack – John Douceur, Judith S. Donath - 2002
527 Reaching Agreement in the Presence of Faults – M. Pease, R. Shostak, L. Lamport - 1980
15 The effect of heterogeneous link capacities in BitTorrent-like file sharing systems – F Lo Piccolo, G Neglia, G Bianchi - 2004
10 Exploiting epidemic data dissemination for consistent lookup operations in mobile applications – Christoph Lindemann, Oliver P. Waldhorst - 2004
3 M.: Control of epidemics by vaccination – Erik Verriest, Florent Delmotte, Magnus Egerstedt - 2005
2 H.D.: Optimized dissemination of highly anticipated content over an itinerary based P2P network – K G Zerfiridis, Karatza - 2004
40 A measurement-based traffic profile of the edonkey filesharing service – K Tutschku - 2004
278 Epidemic Spreading in Scale-Free Networks – Romualdo Pastor-satorras, Alessandro Vespignani - 2000
90 A definition of peer-to-peer networking for the classification of peer-to-peer architectures and applications – R Schollmeier - 2002
399 Modeling and performance analysis of bittorrentlike peer-to-peer networks – Dongyu Qiu, R. Srikant - 2004
119 The effect of network topology on the spread of epidemics – A. Ganesh, L. Massoulié, D. Towsley - 2005
281 Gossip-based ad hoc routing – Zygmunt J. Haas, Joseph Y. Halpern, Li Li - 2002
4 Efficient immunization algorithm for peer-to-peer networks – H Chen, H Jin, J Sun, Z Han
43 A Modular Paradigm for Building Self-Organizing Peer-to-Peer Applications – Mark Jelasity, Alberto Montresor, Ozalp Babaoglu - 2003
701 Epidemic algorithms for replicated database maintenance – A Demers, D Greene, C Hauser, W Irish, J Larson, S Shenkcr, H Sturgis, D Swinehart, D Terry - 1987
4 A parsimonious approach for obtaining resource-efficient and trustworthy execution – Harigovind V. Ramasamy, Adnan Agbaria, William H. S - 2007
8 Trust but verify: Accountability for Internet services – A R Yumerefendi, J S Chase - 2004