A survey of DHT security techniques

G Urdaneta, G Pierre, MV Steen - ACM Computing Surveys (CSUR), 2011 - dl.acm.org
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …

[BUCH][B] Principles of distributed database systems

MT Özsu, P Valduriez - 1999 - Springer
The first edition of this book appeared in 1991 when the technology was new and there were
not too many products. In the Preface to the first edition, we had quoted Michael Stonebraker …

[BUCH][B] Distributed and cloud computing: from parallel processing to the internet of things

K Hwang, J Dongarra, GC Fox - 2013 - books.google.com
Distributed and Cloud Computing: From Parallel Processing to the Internet of Things offers
complete coverage of modern distributed computing technology including clusters, the grid …

[HTML][HTML] Handling churn in a DHT

S Rhea, D Geels, T Roscoe, J Kubiatowicz - Proceedings of the USENIX …, 2004 - usenix.org
This paper addresses the problem of churn--the continuous process of node arrival and
departure--in distributed hash tables (DHTs). We argue that DHTs should perform lookups …

Mercury: supporting scalable multi-attribute range queries

AR Bharambe, M Agrawal, S Seshan - Proceedings of the 2004 …, 2004 - dl.acm.org
This paper presents the design of Mercury, a scalable protocol for supporting multi-attribute
range-based searches. Mercury differs from previous range-based query systems in that it …

Taxonomy of trust: Categorizing P2P reputation systems

S Marti, H Garcia-Molina - Computer Networks, 2006 - Elsevier
The field of peer-to-peer reputation systems has exploded in the last few years. Our goal is
to organize existing ideas and work to facilitate system design. We present a taxonomy of …

Eclipse attacks on overlay networks: Threats and defenses

A Singh, TW Ngan, P Druschel, DS Wallach - 2006 - pure.mpg.de
Overlay networks are widely used to deploy functionality at edge nodes without changing
network routers. Each node in an overlay network maintains connections with a number of …

Survey on agile and lean usage in finnish software industry

P Rodríguez, J Markkula, M Oivo, K Turula - Proceedings of the ACM …, 2012 - dl.acm.org
Earlier empirical studies have demonstrated the interest that agile methods have generated
in the software industry. Currently, lean approaches are increasingly adopted for …

[PDF][PDF] {BotGrep}: Finding {P2P} Bots with Structured Graph Analysis

S Nagaraja, P Mittal, CY Hong, M Caesar… - 19th USENIX Security …, 2010 - usenix.org
A key feature that distinguishes modern botnets from earlier counterparts is their increasing
use of structured overlay topologies. This lets them carry out sophisticated coordinated …

A survey on DHT-based routing for large-scale mobile ad hoc networks

SA Abid, M Othman, N Shah - ACM Computing Surveys (CSUR), 2014 - dl.acm.org
Mobile ad hoc networks (MANETs) are infrastructureless and distributed communication
systems that require sophisticated approaches to routing to cope with node mobility and …