tahoe and ipfs start
This commit is contained in:
42
Biblio.bib
42
Biblio.bib
@@ -28,6 +28,19 @@
|
||||
doi = {10.5281/zenodo.3673071}
|
||||
}
|
||||
|
||||
@article{ASurveyAndComparisonOfPeer-to-peerOverlayNetworkSchemes,
|
||||
doi = {10.1109/comst.2005.1610546},
|
||||
url = {https://doi.org/10.1109/comst.2005.1610546},
|
||||
year = {2005},
|
||||
publisher = {Institute of Electrical and Electronics Engineers ({IEEE})},
|
||||
volume = {7},
|
||||
number = {2},
|
||||
pages = {72--93},
|
||||
author = {Eng Keong Lua and J. Crowcroft and M. Pias and R. Sharma and S. Lim},
|
||||
title = {A survey and comparison of peer-to-peer overlay network schemes},
|
||||
journal = {{IEEE} Communications Surveys {\&} Tutorials}
|
||||
}
|
||||
|
||||
@article{Budhkar2019,
|
||||
doi = {10.1007/s12083-019-00755-x},
|
||||
url = {https://doi.org/10.1007/s12083-019-00755-x},
|
||||
@@ -103,6 +116,14 @@
|
||||
abstract = {This memo documents the various methods known to be in use by applications to establish direct communication in the presence of Network Address Translators (NATs) at the current time. Although this memo is intended to be mainly descriptive, the Security Considerations section makes some purely advisory recommendations about how to deal with security vulnerabilities the applications could inadvertently create when using the methods described. This memo covers NAT traversal approaches used by both TCP- and UDP-based applications. This memo is not an endorsement of the methods described, but merely an attempt to capture them in a document. This memo provides information for the Internet community.}
|
||||
}
|
||||
|
||||
@misc{tahoelafsAbouttahoerstTrunkdocs,
|
||||
author = {},
|
||||
title = {About-tahoe; {T}ahoe-{L}{A}{F}{S} --- tahoe-lafs.org},
|
||||
howpublished = {\url{https://www.tahoe-lafs.org/trac/tahoe-lafs/browser/trunk/docs/about-tahoe.rst}},
|
||||
year = {},
|
||||
note = {[Accessed 02-Apr-2023]}
|
||||
}
|
||||
|
||||
@inproceedings{theTwitchCase,
|
||||
author = {Deng, Jie and Tyson, Gareth and Cuadrado, Félix and Uhlig, Steve},
|
||||
year = {2017},
|
||||
@@ -113,6 +134,14 @@
|
||||
doi = {10.1007/978-3-319-54328-4_5}
|
||||
}
|
||||
|
||||
@misc{torprojectHeartTahoeLAFS,
|
||||
author = {},
|
||||
title = {{T}or at the {H}eart: {T}ahoe-{L}{A}{F}{S} | {T}or {P}roject --- blog.torproject.org},
|
||||
howpublished = {\url{https://blog.torproject.org/tor-heart-tahoe-lafs/}},
|
||||
year = {},
|
||||
note = {[Accessed 02-Apr-2023]}
|
||||
}
|
||||
|
||||
@book{trentini2020cittadinanza,
|
||||
title = {Cittadinanza digitale e tecnocivismo. In un mondo digitale la cittadinanza inizia dai bit},
|
||||
author = {Trentini, A. and Biscuolo, G. and Rossi, A.},
|
||||
@@ -162,16 +191,3 @@
|
||||
year = {},
|
||||
note = {[Accessed 09-Feb-2023]}
|
||||
}
|
||||
|
||||
@article{ASurveyAndComparisonOfPeer-to-peerOverlayNetworkSchemes,
|
||||
doi = {10.1109/comst.2005.1610546},
|
||||
url = {https://doi.org/10.1109/comst.2005.1610546},
|
||||
year = {2005},
|
||||
publisher = {Institute of Electrical and Electronics Engineers ({IEEE})},
|
||||
volume = {7},
|
||||
number = {2},
|
||||
pages = {72--93},
|
||||
author = {Eng Keong Lua and J. Crowcroft and M. Pias and R. Sharma and S. Lim},
|
||||
title = {A survey and comparison of peer-to-peer overlay network schemes},
|
||||
journal = {{IEEE} Communications Surveys {\&} Tutorials}
|
||||
}
|
||||
|
Reference in New Issue
Block a user