@online{hpstrings, author = {Nave, Carl Rod}, title = {{HyperPhysics Concepts: Standing Waves on a String}}, year = {2016}, url = {http://hyperphysics.phy-astr.gsu.edu./hbase/Waves/string.html}, urldate = {2016-11-09} } @online{cohen01, author = {Cohen, Bram}, title = {BitTorrent - a new P2P app}, year = {2001}, url = {http://finance.groups.yahoo.com/group/decentralization/message/3160}, urldate = {2007-04-15}, note = "Internet Archive" } @online{harrison07, author = {Harrison, David}, url = {http://www.bittorrent.org/beps/bep_0000.html}, urldate = {2023-02-28}, year = {2008}, title = {Index of BitTorrent Enhancement Proposals} } @online{norberg08, author = {Loewenstern, Andrew and Norberg, Arvid}, url = {https://www.bittorrent.org/beps/bep_0005.html}, urldate = {2023-02-28}, year = {2020}, title = {DHT Protocol} } @online{jones15, author = {Jones, Ben}, url = {https://torrentfreak.com/bittorrents-dht-turns-10-years-old-150607/}, urldate = {2023-02-28}, year = {2015}, title = {BitTorrent’s DHT Turns 10 Years Old} } @online{muo11, author = {Mukherjee, Abhijeet}, url = {https://www.makeuseof.com/tag/btdigg-trackerless-torrent/}, urldate = {2023-02-28}, year = {2011}, title = {BTDigg: A Trackerless Torrent Search Engine} } @online{evseenko11, author = {Evseenko, Nina}, url = {http://btdig.com}, urldate = {2023-02-28}, year = {2011}, title = {Btdigg BitTorrent DHT search engine} } @online{griffin17, author = {Griffin, Andrew}, url = {https://www.independent.co.uk/tech/torrent-website-download-safe-legal-privacy-i-know-what-you-friends-spying-a7504266.html}, urldate = {2023-02-28}, year = {2017}, title = {'I Know What You Download': Website claims to let people see everything their friends have torrented} } @online{ikwyd, url = {http://iknowwhatyoudownload.com}, urldate = {2023-02-28}, title = {I know what you download} } @online{cohen08, author = {Choen, Bram}, url = {https://www.bittorrent.org/beps/bep_0003.html}, urldate = {2023-02-28}, year = {2017}, title = {The BitTorrent Protocol Specification} } @online{norberg09, author = {Norberg, Arvid}, url = {https://www.bittorrent.org/beps/bep_0029.html}, urldate = {2023-02-28}, year = {2017}, title = {uTorrent transport protocol} } @online{hazel08, author = {Hazel, Greg and Norberg, Arvid}, url = {https://www.bittorrent.org/beps/bep_0009.html}, urldate = {2023-02-28}, year = {2017}, title = {Extension for Peers to Send Metadata Files} } @online{strigeus08, author = {Norberg, Arvid and Strigeus, Ludvig and Hazel, Greg}, url = {https://www.bittorrent.org/beps/bep_0010.html}, urldate = {2023-02-28}, year = {2017}, title = {Extension Protocol} } @online{v2, author = {Cohen, Bram}, url = {https://www.bittorrent.org/beps/bep_0052.html}, urldate = {2023-02-28}, year = {2017}, title = {The BitTorrent Protocol Specification v2} } @incollection{maymounkov2002kademlia, title={Kademlia: A peer-to-peer information system based on the xor metric}, author={Maymounkov, Petar and Mazieres, David}, booktitle={Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, March 7--8, 2002 Revised Papers}, pages={53--65}, year={2002}, publisher={Springer} } @inproceedings{pezoa2016foundations, title={Foundations of JSON schema}, author={Pezoa, Felipe and Reutter, Juan L and Suarez, Fernando and Ugarte, Mart{\'\i}n and Vrgo{\v{c}}, Domagoj}, booktitle={Proceedings of the 25th International Conference on World Wide Web}, pages={263--273}, year={2016}, organization={International World Wide Web Conferences Steering Committee} } @online{harrison08, author = {Harrison, David}, title = {Private Torrents}, year = {2008}, url = {https://www.bittorrent.org/beps/bep_0027.html}, urldate = {2023-02-28}, } @techreport{Eastlake2001, added-at = {2011-05-12T13:55:38.000+0200}, author = {Eastlake, D. and Jones, P.}, biburl = {https://www.bibsonomy.org/bibtex/2d2dcad25e57d68db18495f062e955cae/voj}, interhash = {276256be69453291def2a6fdbed1389d}, intrahash = {d2dcad25e57d68db18495f062e955cae}, keywords = {hash identifier sha1}, month = {9}, number = 3174, organization = {IETF}, publisher = {IETF}, series = {RFC}, timestamp = {2013-01-06T13:13:36.000+0100}, title = {{US Secure Hash Algorithm 1 (SHA1)}}, type = {RFC}, year = 2001 } @online{dis, author = {Gams, Matjaž idr.}, year = {2008}, title = {DIS Slovarček}, url = {https://dis-slovarcek.ijs.si/}, urldate = {2023-02-28} } @online{rhilip20, author = {Rhilip}, year = {2020}, urldate = {2023-02-28}, url = {https://github.com/Rhilip/Bencode}, title = {A pure and simple PHP library for encoding and decoding Bencode data} } @conference{Kluyver2016jupyter, Title = {Jupyter Notebooks -- a publishing format for reproducible computational workflows}, Author = {Thomas Kluyver and Benjamin Ragan-Kelley and Fernando P{\'e}rez and Brian Granger and Matthias Bussonnier and Jonathan Frederic and Kyle Kelley and Jessica Hamrick and Jason Grout and Sylvain Corlay and Paul Ivanov and Dami{\'a}n Avila and Safia Abdalla and Carol Willing}, Booktitle = {Positioning and Power in Academic Publishing: Players, Agents and Agendas}, Editor = {F. Loizides and B. Schmidt}, Organization = {IOS Press}, Pages = {87 - 90}, Year = {2016} } @online{sampleih, author = {The 8472}, url = {https://www.bittorrent.org/beps/bep_0051.html}, title = {DHT Infohash Indexing}, urldate = {2023-02-28}, year = {2017} } @Article{Hunter:2007, Author = {Hunter, J. D.}, Title = {Matplotlib: A 2D graphics environment}, Journal = {Computing in Science \& Engineering}, Volume = {9}, Number = {3}, Pages = {90--95}, abstract = {Matplotlib is a 2D graphics package used for Python for application development, interactive scripting, and publication-quality image generation across user interfaces and operating systems.}, publisher = {IEEE COMPUTER SOC}, doi = {10.1109/MCSE.2007.55}, year = 2007 } @online{norberg14, author = {Norberg, Arvid}, title = {DHT Security extension}, url = {https://www.bittorrent.org/beps/bep_0042.html}, urldate = {2023-02-28}, year = {2016} } @InProceedings{10.1007/3-540-45748-8_24, author="Douceur, John R.", editor="Druschel, Peter and Kaashoek, Frans and Rowstron, Antony", title="The Sybil Attack", booktitle="Peer-to-Peer Systems", year="2002", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="251--260", abstract="Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these ``Sybil attacks'' is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.", isbn="978-3-540-45748-0" } @book{cedilnik12, place={Radovljica}, title={Matematični Priročnik}, publisher={Didakta}, author={Cedilnik, Anton and Razpet, Nada and Razpet, Marko}, year={2012} }