Censorship Resistant Peer-to-Peer Networks

by Amos Fiat and Jared Saia

Theory of Computing, Volume 3(1), pp. 1-23, 2007

Bibliography with links to cited articles

[1]   Noga Alon, Haim Kaplan, Michael Krivelevich, Dahlia Malkhi, and Julien Stern: Scalable secure storage when half the system is faulty. In Proc. 27th Internat. Colloquium on Automata, Languages and Programming (ICALP’00), pp. 576–587. Springer, 2000. [ICALP:3l87mp6xvnxr0cfg].

[2]   Noga Alon and Joel Spencer: The Probabilistic Method, 2nd Edition. John Wiley & Sons, 2000.

[3]   Yonatan Aumann and Michael Bender: Fault tolerant data structures. In Proc. 37th FOCS, pp. 580–589. IEEE Computer Society, 1996. [FOCS:10.1109/SFCS.1996.548517].

[4]   Baruch Awerbuch and Christian Scheideler: Group spreading: A protocol for provably secure distributed name service. In Proc. 31st Internat. Colloquium on Automata, Languages, and Programming (ICALP’04), pp. 183–195. Springer, 2004. [ICALP:782vxmb2mlxxrmru].

[5]   Baruch Awerbuch and Christian Scheideler: Robust distributed name service. In Proc. 3rd Internat. Workshop on Peer-to-Peer Systems (IPTPS’04), pp. 237–249. Springer, 2004. [Springer:crpp90cx7r3p61t0].

[6]   M. Bellare and P. Rogaway: Random oracles are practical: A paradigm for designing efficient protocols. In Proc. 1st ACM Conf. on Computer and Communications Security, pp. 62–73. ACM Press, 1993. [ACM:168588.168596].

[7]   John Borland: Gnutella girds against spam attacks. CNET News.com, August 2000. http://news.cnet.com/news/0-1005-200-2489605.html.

[8]   Mayur Datar: Butterflies and peer-to-peer networks. In Proc. 10th European Symp. on Algorithms (ESA’02), pp. 310–322. Springer, 2002. [ESA:w83mmlkyt13lx90f].

[9]   Electronic Freedom Foundation — Censorship — Internet censorship legislation & regulation (CDA, etc.) — Archive. http://www.eff.org/pub/Censorship/Internet_censorship_bills.

[10]   Amos Fiat and Jared Saia: Censorship resistant peer-to-peer content addressable networks. In Proc. 13th ACM-SIAM Symp. on Discrete Algorithms (SODA’02), pp. 94–103. ACM Press, 2002. [SODA:545381.545392].

[11]   Amos Fiat, Jared Saia, and Maxwell Young: Making chord robust to byzantine attack. In Proc. 13th European Symposium on Algorithms (ESA’05), pp. 803–814. Springer, 2005. [ESA:422llxn7khwej72n].

[12]   D.K. Gifford: Weighted voting for replicated data. In Proc. 7th ACM Symp. on Operating Systems Principles, pp. 150–159. ACM Press, 1979. [ACM:800215.806583].

[13]   Gnutella: To the bandwidth barrier and beyond. http://dss.clip2.com/gnutella.html.

[14]   Gnutella Website. http://www.gnutella.com.

[15]   J. Håstad and F. Thomson Leighton: Fast computation using faulty hypercubes. In Proc. 21st STOC, pp. 251–263. ACM Press, 1989. [STOC:73007.73031].

[16]   Kristen Hildrum and John Kubiatowicz: Asymptotically efficient approaches to fault-tolerance in peer-to-peer networks. In Proc. 17th Internat. Symposium on Distributed Computing (DISC’03), pp. 321–336. Springer, 2003. [Springer:7emt7u01cvbb6bu6].

[17]   Index On Censorship Homepage. http://www.indexoncensorship.org.

[18]   Anna R. Karlin, Greg Nelson, and Hisao Tamaki: On the fault tolerance of the butterfly. In Proc. 26th STOC, pp. 125–133. ACM Press, 1994. [STOC:195058.195117].

[19]   M. Kashoek and D. Karger: Koorde: A simple degree-optimal distributed hash table. In Proc. 2nd Internat. Workshop on Peer-to-Peer Systems (IPTPS’03), pp. 98–107. Springer, 2003. [Springer:unmqcqy0yxpu32xp].

[20]   F. Thomson Leighton, Bruce Maggs, and Ramesh Sitamaran: On the fault tolerance of some popular bounded-degree networks. SIAM Journal on Computing, 27(5):1303–1333, 1998. [SICOMP:10.1137/S0097539793255163].

[21]   Michael G. Luby, Michael Mitzenmacher, M. Amin Shokrollahi, Daniel A. Spielman, and Volker Stemann: Practical loss-resilient codes. In Proc. 29th STOC, pp. 150–159. ACM Press, 1997. [STOC:258533.258573].

[22]   Dahlia Malkhi, Michael Reiter, and Avishai Wool: The load and availability of byzantine quorum systems. SIAM Journal on Computing, 29(6):1889–1906, 2000. [SICOMP:10.1137/S0097539797325235].

[23]   Dahlia Malkhi, Michael Reiter, Avishai Wool, and Rebecca N. Wright: Probabilistic byzantine quorum systems. In Proc. 17th Ann. ACM Symp. on Principles of Distributed Computing (PODC’98), p. 321. ACM Press, 1998. [ACM:277697.277781].

[24]   G. Manku, M. Bawa, and P. Raghavan: Symphony: Distributed hashing in a small world. In Proc. 4th USENIX Symp. on Internet Technologies and Systems (USITS’03), pp. 127–140, 2003.

[25]   P. Maymounkov and D. Mazieres: Kademlia: A peer-to-peer information system based on the XOR metric. In Proc. 1st Internat. Workshop on Peer-to-Peer Systems (IPTPS’02), pp. 53–65. Springer, 2002. [Springer:2ekx2a76ptwd24qt].

[26]   Rajeev Motwani and Prabhakar Raghavan: Randomized Algorithms. Cambridge University Press, 1995.

[27]   Moni Naor and Udi Wieder: A simple fault tolerant distributed hash table. In Proc. 2nd Internat. Workshop on Peer-to-Peer Systems (IPTPS’03), pp. 88–97. Springer, 2003. [Springer:4e756fgyq4ff4kay].

[28]   Napster Website. http://www.napster.com.

[29]   Andy Oram, editor. Peer-to-Peer: Harnessing the Power of Disruptive Technologies. O’Reilly & Associates, July 2001.

[30]   M. Pinsker: On the complexity of a concentrator. In Proc. 7th Internat. Teletraffic Conference, pp. 318/1–318/4, 1973.

[31]   C.G. Plaxton, R. Rajaraman, and A.W. Richa: Accessing nearby copies of replicated objects in a distributed environment. In Proc. 9th Ann. ACM Symp. on Parallel Algorithms and Architectures (SPAA’97), pp. 311–320. ACM Press, 1997. [SPAA:258492.258523].

[32]   Sylvia Ratnasamy, Paul Francis, Mark Handley, Richard Karp, and Scott Shenker: A scalable content-addressable network. In Proc. ACM SIGCOMM 2001 Technical Conference, pp. 161–172. ACM Press, 2001. [ACM:964723.383072].

[33]   Antony I. T. Rowstron and Peter Druschel: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In Proc. of the IFIP/ACM Internat. Conf. on Distributed Systems Platforms, pp. 329–350. Springer, 2001. [Springer:7y5mjjep0hqlctv6].

[34]   Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble: A measurement study of peer-to-peer file sharing systems. In Proc. 9th Ann. Symp. on Multimedia Computing and Networking (MMNC’02). SPIE Press, 2002.

[35]   Stefan Saroiu, P. Krishna Gummadi, and Steven D. Gribble: Measuring and analyzing the characteristics of napster and gnutella hosts. Multimedia Systems, 9(2):170–184, 2003.

[36]   Christian Scheideler: How to spread adversarial nodes? Rotate! In Proc. 37th STOC, pp. 704–713. ACM Press, 2005. [STOC:1060590.1060694].

[37]   Adi Shamir: How to share a secret. Communications of the ACM, 22(11):612–613, 1979. [ACM:359168.359176].

[38]   Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashoek, Frank Dabek, and Hari Balakrishnan: Chord: A scalable peer-to-peer lookup protocol for internet applications. IEEE/ACM Transactions on Networking, 11(1):17–32, 2003. [doi:10.1109/TNET.2002.808407].

[39]   Marc Waldman, Aviel D. Rubin, and Lorrie Faith Cranor: Publius: A robust, tamper-evident, censorship-resistant, web publishing system. In Proc. 9th USENIX Security Symposium, pp. 59–72, August 2000.

[40]   Erping Zhang: Googling the great firewall: Google kowtowed to communist censorship. The New York Sun, 31 January 2006. http://www.nysun.com/article/26791.

[41]   B.Y. Zhao, K.D. Kubiatowicz, and A.D. Joseph: Tapestry: An infrastructure for fault-resilient wide-area location and routing. Technical Report UCB//CSD-01-1141, University of California at Berkeley Technical Report, April 2001.