@online{hpstrings,
author = {Nave, Carl Rod},
title = {{HyperPhysics Concepts: Standing Waves on a String}},
year = {2016},
url = {http://hyperphysics.phy-astr.gsu.edu./hbase/Waves/string.html},
urldate = {2016-11-09}
}
@online{cohen01,
author = {Cohen, Bram},
title = {BitTorrent - a new P2P app},
year = {2001},
url = {http://finance.groups.yahoo.com/group/decentralization/message/3160},
urldate = {2007-04-15},
note = "Internet Archive"
}
@online{harrison07,
author = {Harrison, David},
url = {http://www.bittorrent.org/beps/bep_0000.html},
urldate = {2023-02-28},
year = {2008},
title = {Index of BitTorrent Enhancement Proposals}
}
@online{norberg08,
author = {Loewenstern, Andrew and Norberg, Arvid},
url = {https://www.bittorrent.org/beps/bep_0005.html},
urldate = {2023-02-28},
year = {2020},
title = {DHT Protocol}
}
@online{jones15,
author = {Jones, Ben},
url = {https://torrentfreak.com/bittorrents-dht-turns-10-years-old-150607/},
urldate = {2023-02-28},
year = {2015},
title = {BitTorrent’s DHT Turns 10 Years Old}
}
@online{muo11,
author = {Mukherjee, Abhijeet},
url = {https://www.makeuseof.com/tag/btdigg-trackerless-torrent/},
urldate = {2023-02-28},
year = {2011},
title = {BTDigg: A Trackerless Torrent Search Engine}
}
@online{evseenko11,
author = {Evseenko, Nina},
url = {http://btdig.com},
urldate = {2023-02-28},
year = {2011},
title = {Btdigg BitTorrent DHT search engine}
}
@online{griffin17,
author = {Griffin, Andrew},
url = {https://www.independent.co.uk/tech/torrent-website-download-safe-legal-privacy-i-know-what-you-friends-spying-a7504266.html},
urldate = {2023-02-28},
year = {2017},
title = {'I Know What You Download': Website claims to let people see everything their friends have torrented}
}
@online{ikwyd,
url = {http://iknowwhatyoudownload.com},
urldate = {2023-02-28},
title = {I know what you download}
}
@online{cohen08,
author = {Choen, Bram},
url = {https://www.bittorrent.org/beps/bep_0003.html},
urldate = {2023-02-28},
year = {2017},
title = {The BitTorrent Protocol Specification}
}
@online{norberg09,
author = {Norberg, Arvid},
url = {https://www.bittorrent.org/beps/bep_0029.html},
urldate = {2023-02-28},
year = {2017},
title = {uTorrent transport protocol}
}
@online{hazel08,
author = {Hazel, Greg and Norberg, Arvid},
url = {https://www.bittorrent.org/beps/bep_0009.html},
urldate = {2023-02-28},
year = {2017},
title = {Extension for Peers to Send Metadata Files}
}
@online{strigeus08,
author = {Norberg, Arvid and Strigeus, Ludvig and Hazel, Greg},
url = {https://www.bittorrent.org/beps/bep_0010.html},
urldate = {2023-02-28},
year = {2017},
title = {Extension Protocol}
}
@online{v2,
author = {Cohen, Bram},
url = {https://www.bittorrent.org/beps/bep_0052.html},
urldate = {2023-02-28},
year = {2017},
title = {The BitTorrent Protocol Specification v2}
}
@incollection{maymounkov2002kademlia,
title={Kademlia: A peer-to-peer information system based on the xor metric},
author={Maymounkov, Petar and Mazieres, David},
booktitle={Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, March 7--8, 2002 Revised Papers},
pages={53--65},
year={2002},
publisher={Springer}
}
@inproceedings{pezoa2016foundations,
title={Foundations of JSON schema},
author={Pezoa, Felipe and Reutter, Juan L and Suarez, Fernando and Ugarte, Mart{\'\i}n and Vrgo{\v{c}}, Domagoj},
booktitle={Proceedings of the 25th International Conference on World Wide Web},
pages={263--273},
year={2016},
organization={International World Wide Web Conferences Steering Committee}
}
@online{harrison08,
author = {Harrison, David},
title = {Private Torrents},
year = {2008},
url = {https://www.bittorrent.org/beps/bep_0027.html},
urldate = {2023-02-28},
}
@techreport{Eastlake2001,
added-at = {2011-05-12T13:55:38.000+0200},
author = {Eastlake, D. and Jones, P.},
biburl = {https://www.bibsonomy.org/bibtex/2d2dcad25e57d68db18495f062e955cae/voj},
interhash = {276256be69453291def2a6fdbed1389d},
intrahash = {d2dcad25e57d68db18495f062e955cae},
keywords = {hash identifier sha1},
month = {9},
number = 3174,
organization = {IETF},
publisher = {IETF},
series = {RFC},
timestamp = {2013-01-06T13:13:36.000+0100},
title = {{US Secure Hash Algorithm 1 (SHA1)}},
type = {RFC},
year = 2001
}
@online{dis,
author = {Gams, Matjaž idr.},
year = {2008},
title = {DIS Slovarček},
url = {https://dis-slovarcek.ijs.si/},
urldate = {2023-02-28}
}
@online{rhilip20,
author = {Rhilip},
year = {2020},
urldate = {2023-02-28},
url = {https://github.com/Rhilip/Bencode},
title = {A pure and simple PHP library for encoding and decoding Bencode data}
}
@conference{Kluyver2016jupyter,
Title = {Jupyter Notebooks -- a publishing format for reproducible computational workflows},
Author = {Thomas Kluyver and Benjamin Ragan-Kelley and Fernando P{\'e}rez and Brian Granger and Matthias Bussonnier and Jonathan Frederic and Kyle Kelley and Jessica Hamrick and Jason Grout and Sylvain Corlay and Paul Ivanov and Dami{\'a}n Avila and Safia Abdalla and Carol Willing},
Booktitle = {Positioning and Power in Academic Publishing: Players, Agents and Agendas},
Editor = {F. Loizides and B. Schmidt},
Organization = {IOS Press},
Pages = {87 - 90},
Year = {2016}
}
@online{sampleih,
author = {The 8472},
url = {https://www.bittorrent.org/beps/bep_0051.html},
title = {DHT Infohash Indexing},
urldate = {2023-02-28},
year = {2017}
}
@Article{Hunter:2007,
Author = {Hunter, J. D.},
Title = {Matplotlib: A 2D graphics environment},
Journal = {Computing in Science \& Engineering},
Volume = {9},
Number = {3},
Pages = {90--95},
abstract = {Matplotlib is a 2D graphics package used for Python for
application development, interactive scripting, and publication-quality
image generation across user interfaces and operating systems.},
publisher = {IEEE COMPUTER SOC},
doi = {10.1109/MCSE.2007.55},
year = 2007
}
@online{norberg14,
author = {Norberg, Arvid},
title = {DHT Security extension},
url = {https://www.bittorrent.org/beps/bep_0042.html},
urldate = {2023-02-28},
year = {2016}
}
@InProceedings{10.1007/3-540-45748-8_24,
author="Douceur, John R.",
editor="Druschel, Peter
and Kaashoek, Frans
and Rowstron, Antony",
title="The Sybil Attack",
booktitle="Peer-to-Peer Systems",
year="2002",
publisher="Springer Berlin Heidelberg",
address="Berlin, Heidelberg",
pages="251--260",
abstract="Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these ``Sybil attacks'' is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.",
isbn="978-3-540-45748-0"
}