Proceedings of the 28th ACM Symposium on Parallelism in Algorithms and Architectures 2016
DOI: 10.1145/2935764.2935783
|View full text |Cite
|
Sign up to set email alerts
|

Churn- and DoS-resistant Overlay Networks Based on Network Reconfiguration

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1
1

Citation Types

0
22
0

Year Published

2016
2016
2022
2022

Publication Types

Select...
4
1

Relationship

1
4

Authors

Journals

citations
Cited by 11 publications
(22 citation statements)
references
References 30 publications
0
22
0
Order By: Relevance
“…In fact, variations of our notion of committees have been employed in building overlays for over 15 years (for example, see Fiat and Saia [16]). Over the years, we have seen quite a few variations spanning both deterministic [26] and randomized overlay networks [4,13]. However, our design allows us to provide a DHT solution that can be constructed quickly.…”
Section: Our Results and Technical Contributionsmentioning
confidence: 99%
See 3 more Smart Citations
“…In fact, variations of our notion of committees have been employed in building overlays for over 15 years (for example, see Fiat and Saia [16]). Over the years, we have seen quite a few variations spanning both deterministic [26] and randomized overlay networks [4,13]. However, our design allows us to provide a DHT solution that can be constructed quickly.…”
Section: Our Results and Technical Contributionsmentioning
confidence: 99%
“…Adversary's characteristics. Our protocols operate against an almost adaptive adversary that subsumes the power of adversaries employed in both [7] and [13]. We say that an adversary is t-late omniscient if, at each round r, it is aware of all the algorithmic activities (including the random bits employed by the algorithm) from round 1 up to round r − t, but is oblivious to the execution and random bits employed by the algorithm from round r − t + 1 onward.…”
Section: Network Model and Problem Statementmentioning
confidence: 99%
See 2 more Smart Citations
“…Peer-to-peer overlay networks are often designed to have redundant links so that they can withstand limited churn [5][6][7]19]. Many papers address repairing the topology after determining a process unexpectedly left the overlay network [1,4,15,21,33,34]. Others limit churn to maintain overlay services while adjusting the network [2,26].…”
Section: Introductionmentioning
confidence: 99%