summaryrefslogblamecommitdiffstats
path: root/citati.bib
blob: a9e2bc131af21e3a8ec2591ac6e07ccfe432366f (plain) (tree)
1
2
3
4
5
6
7






                                                                              









































































































































                                                                                                                                            

























































                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                                    






                                                                    
@online{hpstrings,
	author = {Nave, Carl Rod},
	title = {{HyperPhysics Concepts: Standing Waves on a String}},
	year = {2016},
	url = {http://hyperphysics.phy-astr.gsu.edu./hbase/Waves/string.html},
	urldate = {2016-11-09}
}
@online{cohen01,
	author = {Cohen, Bram},
	title = {BitTorrent - a new P2P app},
	year = {2001},
	url = {http://finance.groups.yahoo.com/group/decentralization/message/3160},
	urldate = {2007-04-15},
	note = "Internet Archive"
}
@online{harrison07,
	author = {Harrison, David},
	url = {http://www.bittorrent.org/beps/bep_0000.html},
	urldate = {2023-02-28},
	year = {2008},
	title = {Index of BitTorrent Enhancement Proposals}
}
@online{norberg08,
	author = {Loewenstern, Andrew and Norberg, Arvid},
	url = {https://www.bittorrent.org/beps/bep_0005.html},
	urldate = {2023-02-28},
	year = {2020},
	title = {DHT Protocol}
}
@online{jones15,
	author = {Jones, Ben},
	url = {https://torrentfreak.com/bittorrents-dht-turns-10-years-old-150607/},
	urldate = {2023-02-28},
	year = {2015},
	title = {BitTorrent’s DHT Turns 10 Years Old}
}
@online{muo11,
	author = {Mukherjee, Abhijeet},
	url = {https://www.makeuseof.com/tag/btdigg-trackerless-torrent/},
	urldate = {2023-02-28},
	year = {2011},
	title = {BTDigg: A Trackerless Torrent Search Engine}
}
@online{evseenko11,
	author = {Evseenko, Nina},
	url = {http://btdig.com},
	urldate = {2023-02-28},
	year = {2011},
	title = {Btdigg BitTorrent DHT search engine}

}
@online{griffin17,
	author = {Griffin, Andrew},
	url = {https://www.independent.co.uk/tech/torrent-website-download-safe-legal-privacy-i-know-what-you-friends-spying-a7504266.html},
	urldate = {2023-02-28},
	year = {2017},
	title = {'I Know What You Download': Website claims to let people see everything their friends have torrented}
}
@online{ikwyd,
	url = {http://iknowwhatyoudownload.com},
	urldate = {2023-02-28},
	title = {I know what you download}
}
@online{cohen08,
	author = {Choen, Bram},
	url = {https://www.bittorrent.org/beps/bep_0003.html},
	urldate = {2023-02-28},
	year = {2017},
	title = {The BitTorrent Protocol Specification}
}
@online{norberg09,
	author = {Norberg, Arvid},
	url = {https://www.bittorrent.org/beps/bep_0029.html},
	urldate = {2023-02-28},
	year = {2017},
	title = {uTorrent transport protocol}
}
@online{hazel08,
	author = {Hazel, Greg and Norberg, Arvid},
	url = {https://www.bittorrent.org/beps/bep_0009.html},
	urldate = {2023-02-28},
	year = {2017},
	title = {Extension for Peers to Send Metadata Files}
}
@online{strigeus08,
	author = {Norberg, Arvid and Strigeus, Ludvig and Hazel, Greg},
	url = {https://www.bittorrent.org/beps/bep_0010.html},
	urldate = {2023-02-28},
	year = {2017},
	title = {Extension Protocol}
}
@online{v2,
	author = {Cohen, Bram},
	url = {https://www.bittorrent.org/beps/bep_0052.html},
	urldate = {2023-02-28},
	year = {2017},
	title = {The BitTorrent Protocol Specification v2}
}
@incollection{maymounkov2002kademlia,
	title={Kademlia: A peer-to-peer information system based on the xor metric},
	author={Maymounkov, Petar and Mazieres, David},
	booktitle={Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, March 7--8, 2002 Revised Papers},
	pages={53--65},
	year={2002},
	publisher={Springer}
}
@inproceedings{pezoa2016foundations,
	title={Foundations of JSON schema},
	author={Pezoa, Felipe and Reutter, Juan L and Suarez, Fernando and Ugarte, Mart{\'\i}n and Vrgo{\v{c}}, Domagoj},
	booktitle={Proceedings of the 25th International Conference on World Wide Web},
	pages={263--273},
	year={2016},
	organization={International World Wide Web Conferences Steering Committee}
}
@online{harrison08,
	author = {Harrison, David},
	title = {Private Torrents},
	year = {2008},
	url = {https://www.bittorrent.org/beps/bep_0027.html},
	urldate = {2023-02-28},
}
@techreport{Eastlake2001,
	added-at = {2011-05-12T13:55:38.000+0200},
	author = {Eastlake, D. and Jones, P.},
	biburl = {https://www.bibsonomy.org/bibtex/2d2dcad25e57d68db18495f062e955cae/voj},
	interhash = {276256be69453291def2a6fdbed1389d},
	intrahash = {d2dcad25e57d68db18495f062e955cae},
	keywords = {hash identifier sha1},
	month = {9},
	number = 3174,
	organization = {IETF},
	publisher = {IETF},
	series = {RFC},
	timestamp = {2013-01-06T13:13:36.000+0100},
	title = {{US Secure Hash Algorithm 1 (SHA1)}},
	type = {RFC},
	year = 2001
}
@online{dis,
	author = {Gams, Matjaž idr.},
	year = {2008},
	title = {DIS Slovarček},
	url = {https://dis-slovarcek.ijs.si/},
	urldate = {2023-02-28}
}
@online{rhilip20,
	author = {Rhilip},
	year = {2020},
	urldate = {2023-02-28},
	url = {https://github.com/Rhilip/Bencode},
	title = {A pure and simple PHP library for encoding and decoding Bencode data}
}
@conference{Kluyver2016jupyter,
	Title = {Jupyter Notebooks -- a publishing format for reproducible computational workflows},
	Author = {Thomas Kluyver and Benjamin Ragan-Kelley and Fernando P{\'e}rez and Brian Granger and Matthias Bussonnier and Jonathan Frederic and Kyle Kelley and Jessica Hamrick and Jason Grout and Sylvain Corlay and Paul Ivanov and Dami{\'a}n Avila and Safia Abdalla and Carol Willing},
	Booktitle = {Positioning and Power in Academic Publishing: Players, Agents and Agendas},
	Editor = {F. Loizides and B. Schmidt},
	Organization = {IOS Press},
	Pages = {87 - 90},
	Year = {2016}
}
@online{sampleih,
	author = {The 8472},
	url = {https://www.bittorrent.org/beps/bep_0051.html},
	title = {DHT Infohash Indexing},
	urldate = {2023-02-28},
	year = {2017}
}
@Article{Hunter:2007,
	Author    = {Hunter, J. D.},
	Title     = {Matplotlib: A 2D graphics environment},
	Journal   = {Computing in Science \& Engineering},
	Volume    = {9},
	Number    = {3},
	Pages     = {90--95},
	abstract  = {Matplotlib is a 2D graphics package used for Python for
	application development, interactive scripting, and publication-quality
	image generation across user interfaces and operating systems.},
	publisher = {IEEE COMPUTER SOC},
	doi       = {10.1109/MCSE.2007.55},
	year      = 2007
}
@online{norberg14,
	author = {Norberg, Arvid},
	title = {DHT Security extension},
	url = {https://www.bittorrent.org/beps/bep_0042.html},
	urldate = {2023-02-28},
	year = {2016}
}
@InProceedings{10.1007/3-540-45748-8_24,
	author="Douceur, John R.",
	editor="Druschel, Peter
		and Kaashoek, Frans
		and Rowstron, Antony",
	title="The Sybil Attack",
	booktitle="Peer-to-Peer Systems",
	year="2002",
	publisher="Springer Berlin Heidelberg",
	address="Berlin, Heidelberg",
	pages="251--260",
	abstract="Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these ``Sybil attacks'' is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.",
	isbn="978-3-540-45748-0"
}
@book{cedilnik12,
	place={Radovljica},
	title={Matematični Priročnik},
	publisher={Didakta},
	author={Cedilnik, Anton and Razpet, Nada and Razpet, Marko},
	year={2012}
}