Seminar on Internet Technologies (Winter 2010/2011): Difference between revisions

Line 79: Line 79:
| Security Design in Network Coordinate Systems
| Security Design in Network Coordinate Systems
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net.informatik.uni-goettingen.de/people/yang_chen Yang Chen]
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]
|-
| Economics in Peer-to-Peer Systems
| [http://cs.nju.edu.cn/dislab/xuty/xuty.html Tianyin Xu]
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]
| [http://www.net-glyph.org/~chenyang/NC/reputation_vivaldi.pdf] [http://www.net-glyph.org/~chenyang/NC/secure_nc_sigcomm07.pdf] [http://www.net-glyph.org/~chenyang/NC/veracity_usenix09.pdf]


19

edits