References

Alan Dearle, Graham NC Kirby, and Stuart J Norcross, Hosting Byzantine Fault Tolerant Services on a Chord Ring, University of St Andrews 2007, Abstract, PDF.

Amos Fiat, Jared Saia, and Maxwell Young, Making Chord Robust to Byzantine Attacks, In European Symposium on Algorithms (ESA), 2005. PDF.

Antony Chazapis and Nectarios Koziris, Storing and locating mutable data in structured peer-to-peer overlay networks, Proceedings of the Panhellenic Conference on Informatics 2005. PDF

Apu Kapadia and Nikos Triandopoulos, Halo: High-Assurance Locate for Distributed Hash Tables, Proceedings of the 15th Annual Network & Distributed System Security Symposium (NDSS ’08), February 2008. PDF.

Frank Dabek, Emma Brunskill, M. Frans Kaashoek, David Karger, Robert Morris, Ion Stoica, and Hari Balakrishnan, Building Peer-to-Peer Systems With Chord, a Distributed Lookup Service, Proceedings of the 8th Workshop on Hot Topics in Operating Systems (HotOS-VIII), May 2001. Abstract, PDF.

Ion Stoica, Robert Morris, David Karger, M. Frans Kaashoek, and Hari Balakrishnan, Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications, ACM SIGCOMM 2001, San Deigo, CA, August 2001, pp. 149-160. Abstract, PDF.

Ion Stoica, Robert Morris, David Liben-Nowell, David R. Karger, M. Frans Kaashoek, Frank Dabek, Hari Balakrishnan, Chord: A Scalable Peer-to-peer Lookup Protocol for Internet Applications, IEEE Transactions on Networking, February 2003. Abstract, PDF.

Ying Chen and Kai Hwang, Byzantine Fault Tolerance of Inverse de Bruijn Overlay Networks for Secure P2P Routing, Technical Report, USC Internet and Grid Computing Lab (TR-2006-4), October, 2006. PDF.