%% This BibTeX bibliography file was created using BibDesk.
%% http://bibdesk.sourceforge.net/


%% Created for Mikkel Gravgaard at 2008-01-01 21:41:03 +0100 


%% Saved with string encoding Western (ASCII) 



@proceedings{freepastry,
	Date-Added = {2007-12-30 00:26:02 +0100},
	Date-Modified = {2008-01-01 21:41:03 +0100},
	Lastchecked = {dec 2007},
	Title = {The FreePastry Tutorial, http://freepastry.rice.edu/FreePastry/tutorial},
	Url = {http://freepastry.rice.edu/FreePastry/tutorial},
	Year = {2007}}

@book{Awerbuch,
	Author = {Baruch Awerbuch and Christian Scheideler},
	Date-Added = {2007-12-29 20:39:04 +0100},
	Date-Modified = {2007-12-30 00:21:32 +0100},
	Journal = {Principles of Distributed Systems},
	Publisher = {Springer Berlin / Heidelberg},
	Title = {Robust Random Number Generation for Peer-to-Peer Systems},
	Year = {2006}}

@book{Sit,
	Author = {Emil Sit and Robert Morris},
	Date-Added = {2007-12-29 20:18:05 +0100},
	Date-Modified = {2007-12-30 00:21:22 +0100},
	Journal = {Lecture Notes in Computer Science},
	Pages = {261-269},
	Publisher = {Springer Berlin / Heidelberg},
	Title = {Security Considerations for Peer-to-Peer Distributed Hash Tables},
	Year = {2002}}

@article{Xiong,
	Address = {Los Alamitos, CA, USA},
	Author = {Li Xiong and Ling Liu},
	Date-Added = {2007-12-29 20:09:12 +0100},
	Date-Modified = {2007-12-30 00:21:42 +0100},
	Doi = {http://doi.ieeecomputersociety.org/10.1109/TKDE.2004.1318566},
	Issn = {1041-4347},
	Journal = {IEEE Transactions on Knowledge and Data Engineering},
	Number = {7},
	Pages = {843-857},
	Publisher = {IEEE Computer Society},
	Title = {PeerTrust: Supporting Reputation-Based Trust for Peer-to-Peer Electronic Communities},
	Volume = {16},
	Year = {2004}}

@article{Woelfl,
	Address = {Los Alamitos, CA, USA},
	Author = {Thomas W{\"o}lfl},
	Date-Added = {2007-12-29 19:58:03 +0100},
	Date-Modified = {2007-12-30 00:21:50 +0100},
	Doi = {http://doi.ieeecomputersociety.org/10.1109/HICSS.2005.514},
	Issn = {1530-1605},
	Journal = {hicss},
	Pages = {200a},
	Publisher = {IEEE Computer Society},
	Title = {Public-Key-Infrastructure Based on a Peer-to-Peer Network},
	Volume = {7},
	Year = {2005}}

@inproceedings{Wierzbicki,
	Abstract = {The article considers the design of P2P games without trusted,
       centralized resources. The main difficulty is how to prevent
       the possibility of cheating. The article considers scrabble as
       a case study and attempts to solve issues such as maintenance
       of public, private, and concealed public state, as well as
       secret drawing from a finite set of objects. The issues of
       state replication are considered to allow node leaves. The
       article presents a fair protocol for secret drawing from a
       finite state that is resistant to node leaves.},
	Author = {Wierzbicki, A. and Kucharski, T.},
	Booktitle = {Peer-to-Peer Computing, 2004. Proceedings. Proceedings. Fourth International Conference on},
	Date-Added = {2007-12-29 19:53:48 +0100},
	Date-Modified = {2007-12-30 00:21:28 +0100},
	Doi = {10.1109/PTP.2004.1334936},
	Month = aug,
	Pages = {100--107},
	Title = {"P2P scrabble. Can P2P games commence?"},
	Year = {2004}}

@inproceedings{Ham,
	Abstract = {A number of solutions have been proposed to address the free-riding
       problem in peer-to-peer file sharing systems. The solutions are
       either imperfect-they allow some users to cheat the system with
       malicious behavior, or expensive-they require human
       intervention, require servers, or incur high mental transaction
       costs. The authors proposed a method to address these
       weaknesses. Specifically, a utility function was introduced to
       capture contributions made by a user and an auditing scheme to
       ensure the integrity of a utility function's values. The method
       enabled to reduce cheating by a malicious peer: it is shown
       that this approach can efficiently detect malicious peers with
       a probability over 98\%.},
	Author = {MyungJoo Ham and Gul Agha},
	Booktitle = {Peer-to-Peer Computing, 2005. P2P 2005. Fifth {IEEE} International Conference on},
	Date-Added = {2007-12-29 19:52:52 +0100},
	Date-Modified = {2007-12-30 00:21:11 +0100},
	Doi = {10.1109/P2P.2005.2},
	Month = aug # {/} # sep,
	Pages = {125--132},
	Title = {{ARA}: a robust audit to prevent free-riding in P2P networks},
	Year = {2005}}

@article{Baughman,
	Address = {Piscataway, NJ, USA},
	Author = {Nathaniel E. Baughman and Marc Liberatore and Brian Neil Levine},
	Date-Added = {2007-12-29 19:47:15 +0100},
	Date-Modified = {2007-12-30 00:21:36 +0100},
	Doi = {http://dx.doi.org/10.1109/TNET.2006.886289},
	Issn = {1063-6692},
	Journal = {IEEE/ACM Trans. Netw.},
	Number = {1},
	Pages = {1--13},
	Publisher = {IEEE Press},
	Title = {Cheat-proof playout for centralized and peer-to-peer gaming},
	Url = {http://portal.acm.org/ft_gateway.cfm?id=1241833&type=pdf&coll=GUIDE&dl=GUIDE&CFID=48102699&CFTOKEN=66727219},
	Volume = {15},
	Year = {2007}}

@inproceedings{Kabus,
	Address = {New York, NY, USA},
	Author = {Patric Kabus and Alejandro P. Buchmann},
	Booktitle = {DIMEA '07: Proceedings of the 2nd international conference on Digital interactive media in entertainment and arts},
	Date-Added = {2007-12-29 19:46:07 +0100},
	Date-Modified = {2007-12-30 00:21:05 +0100},
	Doi = {http://doi.acm.org/10.1145/1306813.1306840},
	Isbn = {978-1-59593-708-7},
	Location = {Perth, Australia},
	Pages = {113--120},
	Publisher = {ACM},
	Title = {Design of a cheat-resistant P2P online gaming system},
	Url = {http://portal.acm.org/ft_gateway.cfm?id=1306840&type=pdf&coll=GUIDE&dl=GUIDE&CFID=48102653&CFTOKEN=76786795},
	Year = {2007}}

@comment{BibDesk Static Groups{
<?xml version="1.0" encoding="UTF-8"?>
<!DOCTYPE plist PUBLIC "-//Apple//DTD PLIST 1.0//EN" "http://www.apple.com/DTDs/PropertyList-1.0.dtd">
<plist version="1.0">
<array>
	<dict>
		<key>group name</key>
		<string>P2P Project report</string>
		<key>keys</key>
		<string>Baughman,Wierzbicki,Xiong,Woelfl,Awerbuch,Sit,Ham,Kabus</string>
	</dict>
</array>
</plist>
}}
