ITU-T Recommendation X.509, Information Technology Open Systems Interconnection - The Directory: Authentication Framework (August 1997).
Aberer K., Datta A., and Hauswirth M. A decentralized public key infrastructure for customer-to-customer e-commerce. International Journal of Business Process Integration and Management 1 1 (2005) 26-33
A. Brampton, A. MacQuire, I.A. Rai, N.J.P. Race, L. Mathy, Stealth distributed hash table: a robust and flexible super-peered DHT, in: Proceedings of the 2nd Conference on Future Networking Technologies (CoNEXT), Lisbon, Portugal, 2006.
Calvert K.L., Doar M.B., and Zegura E.W. Modeling Internet topology. IEEE Communications Magazine 35 6 (1997) 160-163
M. Castro, P. Druschel, A. Ganesh, A. Rowstron, D.S. Wallach, Secure routing for structured peer-to-peer overlay networks, in: Proceedings of the 5th Symposium on Operating Systems Design and Implementation (OSDI), 2002.
M. Castro, P. Druschel, A.-M. Kermarrec, A. Rowstron, Scribe: a large-scale and decentralized application-level multicast infrastructure, IEEE Journal on Selected Areas in Communication (JSAC) 20 (8).
M. Castro, B. Liskov, Practical byzantine fault-tolerance, in: Proceedings of the 3rd Symposium on Operating Systems Design and Implementation (OSDI), 1999.
F. Dabek, M.F. Kaashoek, D. Karger, R. Morris, I. Stoica, Wide-area cooperative storage with CFS, in: Proceedings of the 18th ACM Symposium on Operating Systems Principles (SOSP), 2001.
D. Davis, Defective sign & encrypt in s/mime, pkcs#7, moss, pem, pgp, and xml, in: Proceedings of the General Track: 2002 USENIX Annual Technical Conference, USENIX Association, Berkeley, CA, USA, 2001.
J.R. Douceur, The Sybil attack, in: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), 2002.
P. Druschel, A. Rowstron, PAST: A large-scale, persistent peer-to-peer storage utility, in: Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS), 2001.
, OpenSSL: The open source toolkit for SSL/TLS.
, Supreme Court of the United States, no. 04.480. Argued March 29, 2005. Decided June 27, 2005.
J. Kubiatowicz, D. Bindel, Y. Chen, S. Czerwinski, P. Eaton, D. Geels, R. Gummadi, S. Rhea, H. Weatherspoon, W. Weimer, C. Wells, B. Zhao, OceanStore: an architecture for global-scale persistent storage, in: Proceedings of ACM ASPLOS, 2000.
J. Li, J. Stribling, T.M. Gil, R. Morris, M.F. Kaashoek, Comparing the performance of distributed hash tables under churn, in: Proceedings of the 3rd International Workshop on Peer-to-Peer Systems (IPTPS), 2004.
J. Liang, N. Naoumov, K.W. Ross, The index poisoning attack in P2P file sharing systems, in: Proceedings of IEEE INFOCOM, 2006.
N. Liebau, V. Darlagiannis, A. Mauthe, R. Steinmetz, A token-based accounting scheme for p2p-systems, Tech. Rep. TR-2004-05, Technische UniversitSt Darmstadt (January 2004).
P. Maymounkov, D. Mazières, Kademlia: A peer-to-peer information system based on the XOR metric, in: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), 2002.
A.T. Mizrak, Y. Cheng, V. Kumar, S. Savage, Structured superpeers: Leveraging heterogeneity to provide constant-time lookup, in: Proceedings of the 3rd IEEE Workshop on Internet Applications (WIAPP), 2003.
Neuman B.C., and Ts'o T. Kerberos: an authentication service for computer networks. IEEE Communications 32 9 (1994) 33-38
L. Peterson, D. Culler, T. Anderson, T. Roscoe, A blueprint for introducing disruptive technology into the Internet, in: Proceedings of the 1st Workshop on Hot Topics in Networks (HotNets-I), 2002.
C.G. Plaxton, R. Rajaraman, A.W. Richa, Accessing nearby copies of replicated objects in a distributed environment, in: Proceedings of the 9th Annual ACM Symposium on Parallel Algorithms and Architectures, 1997.
S. Ratnasamy, P. Francis, M. Handley, R. Karp, S. Shenker, A scalable content-addressable network, in: Proceedings of ACM SIGCOMM, 2001.
S. Rhea, D. Geels, T. Roscoe, J. Kubiatowicz, Handling churn in a DHT, in: Proceedings of the USENIX Annual Technical Conference, 2004.
Rivest R., Shamir A., and Adleman L. A method for obtaining digital signatures and public-key cryptosystems. Communications of the ACM 21 2 (1978) 120-126
R.L. Rivest, A. Shamir, PayWord and MicroMint: Two simple micropayment schemes, in: Security Protocols Workshop, 1996.
A. Rowstron, P. Druschel, Pastry: Scalable, distributed object location and routing for large-scale peer-to-peer systems, in: Proceedings of the 18th IFIP/ACM International Conference on Distributed Systems Platforms (Middleware), 2001.
A. Rowstron, A.-M. Kermarrec, M. Castro, P. Druschel, SCRIBE: The design of a large-scale event notification infrastructure, in: Proceedings of the 3rd International Workshop on Networked Group Communication (NGC), 2001.
S. Saroiu, P.K. Gummadi, S.D. Gribble, A measurement study of peer-to-peer file sharing systems, in: Proceedings of Multimedia Computing and Networking, 2002.
A. Singh, T. Ngan, P. Druschel, D. Wallach, Eclipse attacks on overlay networks: threats and defenses, in: Proceedings of IEEE INFOCOM, 2006.
E. Sit, R. Morris, Security considerations for peer-to-peer distributed hash tables, in: Proceedings of the 1st International Workshop on Peer-to-Peer Systems (IPTPS), 2002.
K. Sripanidkulchai, The popularity of gnutella queries and its implications on scalability, in: OReillys, 2001. .
M. Srivatsa, L. Liu, Countering targeted file attacks using location keys, in: Proceedings of the 14th USENIX Security Symposium, 2005.
I. Stoica, R. Morris, D. Karger, M.F. Kaashoek, H. Balakrishnan, Chord: A scalable peer-to-peer lookup service for Internet applications, in: Proceedings of ACM SIGCOMM, 2001.
W. Thigpen, T.J. Hacker, L.F. McGinnis, B.D. Athey, Distributed accounting on the grid, in: Proceedings of the 6th Joint Conference on Information Sciences, 2002.
B.Y. Zhao, J.D. Kubiatowicz, A.D. Joseph, Tapestry: An infrastructure for fault-tolerant wide-area location and routing, Tech. Rep. UCB/CSD-01-1141, University of California, Berkeley, USA (April 2001).
Zheng P. Tradeoffs in certificate revocation schemes. ACM SIGCOMM Computer Communication Review 33 2 (2003) 103-112
Y. Zhu, H. Wang, Y. Hu, A super-peer based lookup in structured peer-to-peer systems, in: Proceedings of the 16th International Conference on Parallel and Distributed Computing Systems (PDCS), 2003.
S.Q. Zhuang, B.Y. Zhao, A.D. Joseph, R.H. Katz, J. Kubiatowicz, Bayeux: an architecture for scalable and fault-tolerant wide-area data ddissemination, in: Proceedings of the 11th International Workshop on Network and Operating Systems Support for Digital Audio and Video (NOSSDAV), 2001.