Free riding on Gnutella, First Monday, vol.5, issue.10, 2000. ,
DOI : 10.5210/fm.v5i10.792
A performance evaluation of the Kad-protocol, 2006. ,
Debunking some myths about structured and unstructured overlays, NSDI '05: Proceedings of the 2nd USENIX Symposium on Networked Systems Design and Implementation, 2005. ,
Secure routing for structured peer-to-peer overlay networks, ACM SIGOPS Operating Systems Review, vol.36, issue.SI, pp.299-314, 2002. ,
DOI : 10.1145/844128.844156
Suicide for the common good, ACM SIGOPS Operating Systems Review, vol.40, issue.3, pp.18-21, 2006. ,
DOI : 10.1145/1151374.1151381
State of the art review of the existing bayesian-network based approaches to trust and reputation computation, ICIMP 2007: The Second International Conference on Internet Monitoring and Protection, 2007. ,
PeerMint: Decentralized and Secure Accounting for Peer-to-Peer Applications, Lecture Notes in Computer Science, vol.3462, pp.40-52, 2005. ,
DOI : 10.1007/11422778_4
Free riding on gnutella revisited: The bell tolls? IEEE Distributed Systems Online, 2005. ,
A distributed and measurement-based framework against free riding in peer-to-peer networks, Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings., pp.276-277, 2004. ,
DOI : 10.1109/PTP.2004.1334963
A rolebased trust model for peer-to-peer communities and dynamic coalitions, IWIA '04: Proceedings of the Second IEEE International Information Assurance Workshop, p.141, 2004. ,
Admission control in peer groups, NCA '03: Proceedings of the Second IEEE International Symposium on Network Computing and Applications, p.131, 2003. ,
Pollution in peer-to-peer file sharing systems, IEEE Infocom, pp.1174-1185, 2005. ,
Kademlia: A Peer-to-Peer Information System Based on the XOR Metric, IPTPS '01: Revised Papers from the First International Workshop on Peer-to-Peer Systems, pp.53-65, 2002. ,
DOI : 10.1007/3-540-45748-8_5
Admission control in Peer-to-Peer, Proceedings of the 1st ACM workshop on Security of ad hoc and sensor networks , SASN '03, pp.104-113, 2003. ,
DOI : 10.1145/986858.986873
Defending against eclipse attacks on overlay networks, Proceedings of the 11th workshop on ACM SIGOPS European workshop: beyond the PC , EW11, p.21, 2004. ,
DOI : 10.1145/1133572.1133613
URL : http://citeseerx.ist.psu.edu/viewdoc/summary?doi=10.1.1.61.5727
Eclipse Attacks on Overlay Networks: Threats and Defenses, Proceedings IEEE INFOCOM 2006. 25TH IEEE International Conference on Computer Communications, 2006. ,
DOI : 10.1109/INFOCOM.2006.231
Exploiting KAD, ACM SIGCOMM Computer Communication Review, vol.37, issue.5, p.5, 2007. ,
DOI : 10.1145/1290168.1290176
Keypeer: A scalable, resilient distributed public-key using chord. columbia university, 2005. ,