Back to Results
First PageMeta Content
Sybil attack / Denial-of-service attack / Adversary model / Adversary / Scalability / Electronic voting / System software / Distributed computing / Computing / LOCKSS / Peer-to-peer


1 Impeding Attrition Attacks in P2P Systems Petros Maniatis TJ Giuli
Add to Reading List

Document Date: 2011-01-02 18:55:49


Open Document

File Size: 135,59 KB

Share Result on Facebook

City

San Francisco / Santa Barbara / Boston / Palo Alto / New York / Tokyo / Las Vegas / Leuven / New Orleans / Heidelberg / Phoenix / Cambridge / San Diego / /

Company

Internet Content Delivery Systems / Permanent Web Publishing / Spam Arrest LLC / ACM Press / CA HP Labs / Needham / Peak Load Management / Intel / Overlay Networks / /

Country

Germany / Belgium / Japan / United States / /

Event

Natural Disaster / /

Facility

Stanford University / CA Harvard University / CA Stanford University / /

IndustryTerm

compliance enforcement tools / restricted system services / on-line journals / long-running web service sessions / Internet Services / opinion poll protocol / larg-scale peer-to-peer systems / web-published documents / target protocol / multi-step protocol / peer communication protocol / concrete tool / e - commerce / on-line document / unstructured file-sharing networks / bottleneck routers / slowest effort producer / /

OperatingSystem

Petros / DoS / /

Organization

Harvard University / National Science Foundation / USENIX Association / Computer Science Department / Stanford University / Internet Society / /

Person

A. D. Keromytis / V / Athena Markopoulou / Kevin Lai / David S. H. Rosenthal Mary Baker / Yanto Muliadi / /

Position

editor / effort producer / player / protocol player / /

ProvinceOrState

Nevada / New York / Pennsylvania / /

PublishedMedium

IEEE Transactions on Computers / Lecture Notes in Computer Science / /

SportsLeague

Stanford University / /

Technology

peer communication protocol / multi-step protocol / Peer-to-peer / P2P / target protocol / Peer-to-Peer System / Operating Systems / resulting protocol / encryption / application algorithms / LOCKSS protocol / LOCKSS opinion poll protocol / http / Data Mining / dom / bottleneck routers / P2P system / /

URL

http /

SocialTag