REFER
ˆ
ENCIAS BIBLIOGR
´
AFICAS 126
[CacheLogic Reseach, 2006] , http://www.cachelogic.com/research., 2006.
[Cheng and Friedman, 2005] , Cheng, A. and Friedman, E. (2005). Sybilproof repu-
tation mechanisms. In P2PECON ’05: Proceeding of the 2005 ACM SIGCOMM
workshop on Economics of peer-to-peer systems, pages 128-132, New York, NY,
USA. ACM Press.
[Costa et al., 2005] , Costa, Cristiano., Soares, Vanessa., Benevenuto, Fabricio.,
Vasconcelos, Marisa., Almeida, Jussara., Almeida, Virgilio., Mowbray, Miranda.
Dissemina¸c˜ao de Conte´udo Polu´ıdo em redes P2P, UFMG, 2005.
[Chiozzotto and Silva, 1999] , Chiozzotto, Mauro., Silva, Lu´ıs Antonio Pinto da.
TCP/IP: tecnologia e implementa¸c˜ao, Ed.
´
Erica, S˜ao Paulo, 1999.
[Da Silva, 2007] , Da Silva, Juliano Freitas., M´etodos para Conten¸c˜ao de Polui¸c˜ao
em Redes P2P, UNISINOS, 2007.
[Damiani et al., 2002] , Damiani, E., Vimercati, S. C., Paraboschi, S., Samarati,
P. and Violante, F. (2002). A Reputation-Based Approach for Choosing Reliable
Resources in Peer-to-Peer Networks. In: Computer and Communications Security
(CCS’02), November 18-22, Washington DC, USA.
[Do Carmo et al., 2006] , Do Carmo, S. B., Barbar, G. S., Coelho, Barbosa, J. F.,
A New Classification for Peer-to-peer Networks Architectures. IEEE, 2006.
[Douceur, 2002] , Douceur, J. R. (2002). The sybil attack. In 1st International Work-
shop on Peer-to-Peer Systems.
[Dumitriu et al., 2005] , Dumitriu, D., Knightly, E., Kuzmanovic, A., Stoica, I., and
Zwaenepoel, W. (2005). Denial-of-service resilience in peer-to-peer file sharing
systems. In ACM SIGMETRICS, 2005.
[eBay, 2008] , eBay (2008). Ebay website. http://www.ebay.com/.
[eDonkey, 2008] , eDonkey Overnet(2008). http://edonkey2000.com/.
[ESM, 2008] , ESM (2008), End System Multicast. http://esm.cs.cmu.edu/.