summaryrefslogtreecommitdiffstats
path: root/citati.bib
diff options
context:
space:
mode:
Diffstat (limited to '')
-rw-r--r--citati.bib59
1 files changed, 59 insertions, 0 deletions
diff --git a/citati.bib b/citati.bib
index a036396..37d9097 100644
--- a/citati.bib
+++ b/citati.bib
@@ -143,3 +143,62 @@
url = {https://dis-slovarcek.ijs.si/},
urldate = {2023-02-28}
}
+@online{rhilip20,
+ author = {Rhilip},
+ year = {2020},
+ urldate = {2023-02-28},
+ url = {https://github.com/Rhilip/Bencode},
+ title = {A pure and simple PHP library for encoding and decoding Bencode data}
+}
+@conference{Kluyver2016jupyter,
+ Title = {Jupyter Notebooks -- a publishing format for reproducible computational workflows},
+ Author = {Thomas Kluyver and Benjamin Ragan-Kelley and Fernando P{\'e}rez and Brian Granger and Matthias Bussonnier and Jonathan Frederic and Kyle Kelley and Jessica Hamrick and Jason Grout and Sylvain Corlay and Paul Ivanov and Dami{\'a}n Avila and Safia Abdalla and Carol Willing},
+ Booktitle = {Positioning and Power in Academic Publishing: Players, Agents and Agendas},
+ Editor = {F. Loizides and B. Schmidt},
+ Organization = {IOS Press},
+ Pages = {87 - 90},
+ Year = {2016}
+}
+@online{sampleih,
+ author = {The 8472},
+ url = {https://www.bittorrent.org/beps/bep_0051.html},
+ title = {DHT Infohash Indexing},
+ urldate = {2023-02-28},
+ year = {2017}
+}
+@Article{Hunter:2007,
+ Author = {Hunter, J. D.},
+ Title = {Matplotlib: A 2D graphics environment},
+ Journal = {Computing in Science \& Engineering},
+ Volume = {9},
+ Number = {3},
+ Pages = {90--95},
+ abstract = {Matplotlib is a 2D graphics package used for Python for
+ application development, interactive scripting, and publication-quality
+ image generation across user interfaces and operating systems.},
+ publisher = {IEEE COMPUTER SOC},
+ doi = {10.1109/MCSE.2007.55},
+ year = 2007
+}
+@online{norberg14,
+ author = {Norberg, Arvid},
+ title = {DHT Security extension},
+ url = {https://www.bittorrent.org/beps/bep_0042.html},
+ urldate = {2023-02-28},
+ year = {2016}
+}
+@InProceedings{10.1007/3-540-45748-8_24,
+ author="Douceur, John R.",
+ editor="Druschel, Peter
+ and Kaashoek, Frans
+ and Rowstron, Antony",
+ title="The Sybil Attack",
+ booktitle="Peer-to-Peer Systems",
+ year="2002",
+ publisher="Springer Berlin Heidelberg",
+ address="Berlin, Heidelberg",
+ pages="251--260",
+ abstract="Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these ``Sybil attacks'' is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.",
+ isbn="978-3-540-45748-0"
+}
+