共 50 条
- [1] Evaluating Sybil Attacks in P2P Infrastructures for Online Social Networks [J]. 2015 IEEE 17TH INTERNATIONAL CONFERENCE ON HIGH PERFORMANCE COMPUTING AND COMMUNICATIONS, 2015 IEEE 7TH INTERNATIONAL SYMPOSIUM ON CYBERSPACE SAFETY AND SECURITY, AND 2015 IEEE 12TH INTERNATIONAL CONFERENCE ON EMBEDDED SOFTWARE AND SYSTEMS (ICESS), 2015, : 1262 - 1267
- [2] The Impact of Routing Attacks on Pastry-Based P2P Online Social Networks [J]. EURO-PAR 2014: PARALLEL PROCESSING WORKSHOPS, PT I, 2014, 8805 : 347 - 358
- [3] Availability in P2P based Online Social Networks [J]. PROCEEDINGS OF 2017 4TH INTERNATIONAL CONFERENCE ON NETWORKING, SYSTEMS AND SECURITY (NSYSS), 2017, : 29 - 37
- [4] Collaborative Privacy Management in P2P Online Social Networks [J]. 2015 12TH INTERNATIONAL IRANIAN SOCIETY OF CRYPTOLOGY CONFERENCE ON INFORMATION SECURITY AND CRYPTOLOGY (ISCISC), 2015, : 64 - 72
- [5] ID mapping attacks in P2P networks [J]. GLOBECOM '05: IEEE GLOBAL TELECOMMUNICATIONS CONFERENCE, VOLS 1-6: DISCOVERY PAST AND FUTURE, 2005, : 1785 - 1790
- [7] Evaluating P2P Networks against Eclipse Attacks [J]. 2012 IBEROAMERICAN CONFERENCE ON ELECTRONICS ENGINEERING AND COMPUTER SCIENCE, 2012, 3 : 61 - 68
- [8] SPROUT: P2P routing with social networks [J]. CURRENT TRENDS IN DATABASE TECHNOLOGY - EDBT 2004 WORKSHOPS, PROCEEDINGS, 2004, 3268 : 425 - 435
- [9] Pollution Attacks Identification in Structured P2P Overlay Networks [J]. INFORMATION AND COMMUNICATIONS SECURITY, ICICS 2017, 2018, 10631 : 674 - 686
- [10] Ensuring β-Availability in P2P Social Networks [J]. 2013 33RD IEEE INTERNATIONAL CONFERENCE ON DISTRIBUTED COMPUTING SYSTEMS WORKSHOPS (ICDCSW 2013), 2013, : 150 - 155