P2P 보안 기술

  • Published : 2006.09.01

Abstract

Keywords

References

  1. M.Bawa, B.F.Cooper, A.Crespo, N.Das wani, 'Peer-to-Peer Research at Stanford'
  2. P-Grid, http://www.p-grid.org/
  3. JXTA projects, http://www.jxta.org/
  4. 와이즈피어, http://www.wisepeer.com/
  5. Vatary, P2p live streaming: where from and where to http://www.p2p-zone.com/underground/showthread.php?t=22572
  6. K. Singh, and H. Schulzrinne, Data format and interface to an external peer-to-peer network for SIP location service, draft-singh-p2p-sip-00, IETF, March, 2006
  7. T. Aura, Cryptographically Generated Addresses (CGA), IETF, RFC 3972, March, 2005
  8. http://www.cs.umd.edu/projects/p2prg/
  9. http://www.samrg.org/index.html
  10. http://www.3gpp.org/About/3GPP.ppt
  11. T. Aura, 'Cryptographically Generated Addresses (CGA),' RFC 3972, IETF, 2005
  12. S. Capkun, J.-P. Hubaux, and L. Buttyan, 'Mobility Helps Peer-to-Peer Security,' IEEE Transactions on Mobile Computing, vol. 5, pp. 43-51, 2006 https://doi.org/10.1109/TMC.2006.12
  13. A. Shamir, 'Identity-based cryptosystems and signature schemes,' presented at Proceedings of CRYPTO 84 on Advances in cryptology, Santa Barbara, California, United States, 1985
  14. A. Shamir, 'How to share a secret,' Commun. ACM, vol. 22, pp, 612-613, 1979 https://doi.org/10.1145/359168.359176
  15. G. O' Shea and M. Roe, 'Child-proof authentication for MIPv6 (CAM),' SIGCOMM Comput. Commun. Rev., vol. 31, pp, 4-8, 2001