Back to Results
First PageMeta Content
Bootstrapping node / Distributed hash table / Chord / Pastry / Peer-to-peer / Sybil attack / B-tree / GiFT / Node / Distributed data storage / Computing / Software


Limiting Sybil Attacks in Structured P2P Networks Hosam Rowaihy, William Enck, Patrick McDaniel, and Thomas La Porta Department of Computer Science and Engineering Pennsylvania State University University Park, PA 16802
Add to Reading List

Open Document

File Size: 219,64 KB

Share Result on Facebook

City

Heidelberg / Cambridge / /

Country

Germany / /

/

Facility

In University of Washington Department / /

IndustryTerm

cryptographic solutions / search times / internet applications / basic protocol / Secure communications / contentaddressable network / Internet Technology / structured overlay networks / large and long-standing networks / node network / puzzle solution / peerto-peer file sharing systems / large-scale peer-to-peer systems / alternate solution / steady network / straight forward solution / /

OperatingSystem

DoS / /

Organization

Thomas La Porta Department of Computer Science and Engineering Pennsylvania State University University Park / University of Washington Department of Computer Science / /

Person

Note / Xn A Fig / Thomas La Porta / Once Xi / Patrick McDaniel / William Enck / /

Position

Private / /

ProgrammingLanguage

Java / BASIC / K / /

ProvinceOrState

Massachusetts / /

PublishedMedium

Communications of the ACM / /

Technology

cryptography / public key / load balancing / DNS / Java / peer-to-peer / basic protocol / P2P / file sharing / Internet Technology / private key / Secret key / Simulation / /

SocialTag