On Wed, Dec 15, 2010 at 1:09 PM, Loic Dachary <[email protected]> wrote:
> Hi,
>
> I would like to assert the security issues associated with the
> deployment of a DHT open to the general public. I started to read "A
> Survey of DHT Security Techniques" found at
> http://www.globule.org/publi/SDST_acmcs2009.pdf and written by GUIDO
> URDANETA, GUILLAUME PIERRE and MAARTEN VAN STEEN.

Hi Loïc,

For an overall overview of some DHT techniques, there
is the following book:

P2P Networking and Applications (Morgan Kaufmann Series in Networking)
by John Buford
( http://www.librarything.com/work/8357901/book/45781374 )

There are some other references in my public bookmarks:

http://www.delicious.com/adulau/dht

Regarding DHT security, there is the frequently cited paper from Emil Sit and
Robert T. Morris:

Security Considerations for Peer-to-Peer Distributed Hash Tables

There is also a large academic literature regarding security and routing in DHT.

Hope this helps,

Kind regards,

adulau

-- 
--                   Alexandre Dulaunoy (adulau) -- http://www.foo.be/
--                             http://www.foo.be/cgi-bin/wiki.pl/Diary
--         "Knowledge can create problems, it is not through ignorance
--                                that we can solve them" Isaac Asimov
_______________________________________________
p2p-hackers mailing list
[email protected]
http://lists.zooko.com/mailman/listinfo/p2p-hackers

Reply via email to