On Wed, Dec 15, 2010 at 1:09 PM, Loic Dachary <[email protected]> wrote: > Hi, > > I would like to assert the security issues associated with the > deployment of a DHT open to the general public. I started to read "A > Survey of DHT Security Techniques" found at > http://www.globule.org/publi/SDST_acmcs2009.pdf and written by GUIDO > URDANETA, GUILLAUME PIERRE and MAARTEN VAN STEEN.
Hi Loïc, For an overall overview of some DHT techniques, there is the following book: P2P Networking and Applications (Morgan Kaufmann Series in Networking) by John Buford ( http://www.librarything.com/work/8357901/book/45781374 ) There are some other references in my public bookmarks: http://www.delicious.com/adulau/dht Regarding DHT security, there is the frequently cited paper from Emil Sit and Robert T. Morris: Security Considerations for Peer-to-Peer Distributed Hash Tables There is also a large academic literature regarding security and routing in DHT. Hope this helps, Kind regards, adulau -- -- Alexandre Dulaunoy (adulau) -- http://www.foo.be/ -- http://www.foo.be/cgi-bin/wiki.pl/Diary -- "Knowledge can create problems, it is not through ignorance -- that we can solve them" Isaac Asimov _______________________________________________ p2p-hackers mailing list [email protected] http://lists.zooko.com/mailman/listinfo/p2p-hackers
