Osebna bibtex knjižnica citatov. Canonical: ~/projects/r/šola/citati.bib od 2024-07-28 Stara različica je v ~/projects/sola-gimb-4/citati.bib @online{hpstrings, author = {Nave, Carl Rod}, title = {{HyperPhysics Concepts: Standing Waves on a String}}, year = {2016}, url = {http://hyperphysics.phy-astr.gsu.edu./hbase/Waves/string.html}, urldate = {2016-11-09} } @online{cohen01, author = {Cohen, Bram}, title = {BitTorrent - a new P2P app}, year = {2001}, url = {http://finance.groups.yahoo.com/group/decentralization/message/3160}, urldate = {2007-04-15}, note = "Internet Archive" } @online{harrison07, author = {Harrison, David}, url = {http://www.bittorrent.org/beps/bep_0000.html}, urldate = {2023-02-28}, year = {2008}, title = {Index of BitTorrent Enhancement Proposals} } @online{norberg08, author = {Loewenstern, Andrew and Norberg, Arvid}, url = {https://www.bittorrent.org/beps/bep_0005.html}, urldate = {2023-02-28}, year = {2020}, title = {DHT Protocol} } @online{jones15, author = {Jones, Ben}, url = {https://torrentfreak.com/bittorrents-dht-turns-10-years-old-150607/}, urldate = {2023-02-28}, year = {2015}, title = {BitTorrent’s DHT Turns 10 Years Old} } @online{muo11, author = {Mukherjee, Abhijeet}, url = {https://www.makeuseof.com/tag/btdigg-trackerless-torrent/}, urldate = {2023-02-28}, year = {2011}, title = {BTDigg: A Trackerless Torrent Search Engine} } @online{evseenko11, author = {Evseenko, Nina}, url = {http://btdig.com}, urldate = {2023-02-28}, year = {2011}, title = {Btdigg BitTorrent DHT search engine} } @online{griffin17, author = {Griffin, Andrew}, url = {https://www.independent.co.uk/tech/torrent-website-download-safe-legal-privacy-i-know-what-you-friends-spying-a7504266.html}, urldate = {2023-02-28}, year = {2017}, title = {'I Know What You Download': Website claims to let people see everything their friends have torrented} } @online{ikwyd, url = {http://iknowwhatyoudownload.com}, urldate = {2023-02-28}, title = {I know what you download} } @online{cohen08, author = {Choen, Bram}, url = {https://www.bittorrent.org/beps/bep_0003.html}, urldate = {2023-02-28}, year = {2017}, title = {The BitTorrent Protocol Specification} } @online{norberg09, author = {Norberg, Arvid}, url = {https://www.bittorrent.org/beps/bep_0029.html}, urldate = {2023-02-28}, year = {2017}, title = {uTorrent transport protocol} } @online{hazel08, author = {Hazel, Greg and Norberg, Arvid}, url = {https://www.bittorrent.org/beps/bep_0009.html}, urldate = {2023-02-28}, year = {2017}, title = {Extension for Peers to Send Metadata Files} } @online{strigeus08, author = {Norberg, Arvid and Strigeus, Ludvig and Hazel, Greg}, url = {https://www.bittorrent.org/beps/bep_0010.html}, urldate = {2023-02-28}, year = {2017}, title = {Extension Protocol} } @online{v2, author = {Cohen, Bram}, url = {https://www.bittorrent.org/beps/bep_0052.html}, urldate = {2023-02-28}, year = {2017}, title = {The BitTorrent Protocol Specification v2} } @incollection{maymounkov2002kademlia, title={Kademlia: A peer-to-peer information system based on the xor metric}, author={Maymounkov, Petar and Mazieres, David}, booktitle={Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, March 7--8, 2002 Revised Papers}, pages={53--65}, year={2002}, publisher={Springer} } @inproceedings{pezoa2016foundations, title={Foundations of JSON schema}, author={Pezoa, Felipe and Reutter, Juan L and Suarez, Fernando and Ugarte, Mart{\'\i}n and Vrgo{\v{c}}, Domagoj}, booktitle={Proceedings of the 25th International Conference on World Wide Web}, pages={263--273}, year={2016}, organization={International World Wide Web Conferences Steering Committee} } @online{harrison08, author = {Harrison, David}, title = {Private Torrents}, year = {2008}, url = {https://www.bittorrent.org/beps/bep_0027.html}, urldate = {2023-02-28}, } @techreport{Eastlake2001, added-at = {2011-05-12T13:55:38.000+0200}, author = {Eastlake, D. and Jones, P.}, biburl = {https://www.bibsonomy.org/bibtex/2d2dcad25e57d68db18495f062e955cae/voj}, interhash = {276256be69453291def2a6fdbed1389d}, intrahash = {d2dcad25e57d68db18495f062e955cae}, keywords = {hash identifier sha1}, month = {9}, number = 3174, organization = {IETF}, publisher = {IETF}, series = {RFC}, timestamp = {2013-01-06T13:13:36.000+0100}, title = {{US Secure Hash Algorithm 1 (SHA1)}}, type = {RFC}, year = 2001 } @online{dis, author = {Gams, Matjaž and others}, year = {2008}, title = {DIS Slovarček}, url = {https://dis-slovarcek.ijs.si/}, urldate = {2023-02-28} } @online{rhilip20, author = {Rhilip}, year = {2020}, urldate = {2023-02-28}, url = {https://github.com/Rhilip/Bencode}, title = {A pure and simple PHP library for encoding and decoding Bencode data} } @conference{Kluyver2016jupyter, Title = {Jupyter Notebooks -- a publishing format for reproducible computational workflows}, Author = {Thomas Kluyver and Benjamin Ragan-Kelley and Fernando P{\'e}rez and Brian Granger and Matthias Bussonnier and Jonathan Frederic and Kyle Kelley and Jessica Hamrick and Jason Grout and Sylvain Corlay and Paul Ivanov and Dami{\'a}n Avila and Safia Abdalla and Carol Willing}, Booktitle = {Positioning and Power in Academic Publishing: Players, Agents and Agendas}, Editor = {F. Loizides and B. Schmidt}, Organization = {IOS Press}, Pages = {87 - 90}, Year = {2016} } @online{sampleih, author = {The 8472}, url = {https://www.bittorrent.org/beps/bep_0051.html}, title = {DHT Infohash Indexing}, urldate = {2023-02-28}, year = {2017} } @Article{Hunter:2007, Author = {Hunter, J. D.}, Title = {Matplotlib: A 2D graphics environment}, Journal = {Computing in Science \& Engineering}, Volume = {9}, Number = {3}, Pages = {90--95}, abstract = {Matplotlib is a 2D graphics package used for Python for application development, interactive scripting, and publication-quality image generation across user interfaces and operating systems.}, publisher = {IEEE COMPUTER SOC}, doi = {10.1109/MCSE.2007.55}, year = 2007 } @online{norberg14, author = {Norberg, Arvid}, title = {DHT Security extension}, url = {https://www.bittorrent.org/beps/bep_0042.html}, urldate = {2023-02-28}, year = {2016} } @InProceedings{10.1007/3-540-45748-8_24, author="Douceur, John R.", editor="Druschel, Peter and Kaashoek, Frans and Rowstron, Antony", title="The Sybil Attack", booktitle="Peer-to-Peer Systems", year="2002", publisher="Springer Berlin Heidelberg", address="Berlin, Heidelberg", pages="251--260", abstract="Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these ``Sybil attacks'' is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.", isbn="978-3-540-45748-0" } @book{cedilnik12, place={Radovljica}, title={Matematični Priročnik}, publisher={Didakta}, author={Cedilnik, Anton and Razpet, Nada and Razpet, Marko}, year={2012} } @online{wikihashuniformity, author="{Wikipedia contributors}", title={Hash function}, url={https://w.wiki/An3L}, urldate={2024-07-29}, year={2024} } @online{maxmindgeoip2, author={MaxMind}, title={GeoLite2 Free Geolocation Data}, url={https://dev.maxmind.com/geoip/geolite2-free-geolocation-data}, urldate={2024-07-31}, year={2024} } @misc{rfc4086, series = {Request for Comments}, number = 4086, howpublished = {RFC 4086}, publisher = {RFC Editor}, doi = {10.17487/RFC4086}, url = {https://www.rfc-editor.org/info/rfc4086}, author = {Donald E. Eastlake 3rd and Steve Crocker and Jeffrey I. Schiller}, title = {{Randomness Requirements for Security}}, pagetotal = 48, year = 2005, month = jun, abstract = {Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space. Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.}, }