summaryrefslogtreecommitdiffstats
path: root/šola/citati.bib
blob: f553435fa3c6a3619b0b6e4b1f53f6cdf765b121 (plain) (blame)
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
36
37
38
39
40
41
42
43
44
45
46
47
48
49
50
51
52
53
54
55
56
57
58
59
60
61
62
63
64
65
66
67
68
69
70
71
72
73
74
75
76
77
78
79
80
81
82
83
84
85
86
87
88
89
90
91
92
93
94
95
96
97
98
99
100
101
102
103
104
105
106
107
108
109
110
111
112
113
114
115
116
117
118
119
120
121
122
123
124
125
126
127
128
129
130
131
132
133
134
135
136
137
138
139
140
141
142
143
144
145
146
147
148
149
150
151
152
153
154
155
156
157
158
159
160
161
162
163
164
165
166
167
168
169
170
171
172
173
174
175
176
177
178
179
180
181
182
183
184
185
186
187
188
189
190
191
192
193
194
195
196
197
198
199
200
201
202
203
204
205
206
207
208
209
210
211
212
213
214
215
216
217
218
219
220
221
222
223
224
225
226
227
228
229
230
231
232
233
234
235
236
237
238
239
240
241
242
Osebna bibtex knjižnica citatov.
Canonical: ~/projects/r/šola/citati.bib od 2024-07-28
Stara različica je v ~/projects/sola-gimb-4/citati.bib

@online{hpstrings,
	author = {Nave, Carl Rod},
	title = {{HyperPhysics Concepts: Standing Waves on a String}},
	year = {2016},
	url = {http://hyperphysics.phy-astr.gsu.edu./hbase/Waves/string.html},
	urldate = {2016-11-09}
}
@online{cohen01,
	author = {Cohen, Bram},
	title = {BitTorrent - a new P2P app},
	year = {2001},
	url = {http://finance.groups.yahoo.com/group/decentralization/message/3160},
	urldate = {2007-04-15},
	note = "Internet Archive"
}
@online{harrison07,
	author = {Harrison, David},
	url = {http://www.bittorrent.org/beps/bep_0000.html},
	urldate = {2023-02-28},
	year = {2008},
	title = {Index of BitTorrent Enhancement Proposals}
}
@online{norberg08,
	author = {Loewenstern, Andrew and Norberg, Arvid},
	url = {https://www.bittorrent.org/beps/bep_0005.html},
	urldate = {2023-02-28},
	year = {2020},
	title = {DHT Protocol}
}
@online{jones15,
	author = {Jones, Ben},
	url = {https://torrentfreak.com/bittorrents-dht-turns-10-years-old-150607/},
	urldate = {2023-02-28},
	year = {2015},
	title = {BitTorrent’s DHT Turns 10 Years Old}
}
@online{muo11,
	author = {Mukherjee, Abhijeet},
	url = {https://www.makeuseof.com/tag/btdigg-trackerless-torrent/},
	urldate = {2023-02-28},
	year = {2011},
	title = {BTDigg: A Trackerless Torrent Search Engine}
}
@online{evseenko11,
	author = {Evseenko, Nina},
	url = {http://btdig.com},
	urldate = {2023-02-28},
	year = {2011},
	title = {Btdigg BitTorrent DHT search engine}

}
@online{griffin17,
	author = {Griffin, Andrew},
	url = {https://www.independent.co.uk/tech/torrent-website-download-safe-legal-privacy-i-know-what-you-friends-spying-a7504266.html},
	urldate = {2023-02-28},
	year = {2017},
	title = {'I Know What You Download': Website claims to let people see everything their friends have torrented}
}
@online{ikwyd,
	url = {http://iknowwhatyoudownload.com},
	urldate = {2023-02-28},
	title = {I know what you download}
}
@online{cohen08,
	author = {Choen, Bram},
	url = {https://www.bittorrent.org/beps/bep_0003.html},
	urldate = {2023-02-28},
	year = {2017},
	title = {The BitTorrent Protocol Specification}
}
@online{norberg09,
	author = {Norberg, Arvid},
	url = {https://www.bittorrent.org/beps/bep_0029.html},
	urldate = {2023-02-28},
	year = {2017},
	title = {uTorrent transport protocol}
}
@online{hazel08,
	author = {Hazel, Greg and Norberg, Arvid},
	url = {https://www.bittorrent.org/beps/bep_0009.html},
	urldate = {2023-02-28},
	year = {2017},
	title = {Extension for Peers to Send Metadata Files}
}
@online{strigeus08,
	author = {Norberg, Arvid and Strigeus, Ludvig and Hazel, Greg},
	url = {https://www.bittorrent.org/beps/bep_0010.html},
	urldate = {2023-02-28},
	year = {2017},
	title = {Extension Protocol}
}
@online{v2,
	author = {Cohen, Bram},
	url = {https://www.bittorrent.org/beps/bep_0052.html},
	urldate = {2023-02-28},
	year = {2017},
	title = {The BitTorrent Protocol Specification v2}
}
@incollection{maymounkov2002kademlia,
	title={Kademlia: A peer-to-peer information system based on the xor metric},
	author={Maymounkov, Petar and Mazieres, David},
	booktitle={Peer-to-Peer Systems: First InternationalWorkshop, IPTPS 2002 Cambridge, MA, USA, March 7--8, 2002 Revised Papers},
	pages={53--65},
	year={2002},
	publisher={Springer}
}
@inproceedings{pezoa2016foundations,
	title={Foundations of JSON schema},
	author={Pezoa, Felipe and Reutter, Juan L and Suarez, Fernando and Ugarte, Mart{\'\i}n and Vrgo{\v{c}}, Domagoj},
	booktitle={Proceedings of the 25th International Conference on World Wide Web},
	pages={263--273},
	year={2016},
	organization={International World Wide Web Conferences Steering Committee}
}
@online{harrison08,
	author = {Harrison, David},
	title = {Private Torrents},
	year = {2008},
	url = {https://www.bittorrent.org/beps/bep_0027.html},
	urldate = {2023-02-28},
}
@techreport{Eastlake2001,
	added-at = {2011-05-12T13:55:38.000+0200},
	author = {Eastlake, D. and Jones, P.},
	biburl = {https://www.bibsonomy.org/bibtex/2d2dcad25e57d68db18495f062e955cae/voj},
	interhash = {276256be69453291def2a6fdbed1389d},
	intrahash = {d2dcad25e57d68db18495f062e955cae},
	keywords = {hash identifier sha1},
	month = {9},
	number = 3174,
	organization = {IETF},
	publisher = {IETF},
	series = {RFC},
	timestamp = {2013-01-06T13:13:36.000+0100},
	title = {{US Secure Hash Algorithm 1 (SHA1)}},
	type = {RFC},
	year = 2001
}
@online{dis,
	author = {Gams, Matjaž and others},
	year = {2008},
	title = {DIS Slovarček},
	url = {https://dis-slovarcek.ijs.si/},
	urldate = {2023-02-28}
}
@online{rhilip20,
	author = {Rhilip},
	year = {2020},
	urldate = {2023-02-28},
	url = {https://github.com/Rhilip/Bencode},
	title = {A pure and simple PHP library for encoding and decoding Bencode data}
}
@conference{Kluyver2016jupyter,
	Title = {Jupyter Notebooks -- a publishing format for reproducible computational workflows},
	Author = {Thomas Kluyver and Benjamin Ragan-Kelley and Fernando P{\'e}rez and Brian Granger and Matthias Bussonnier and Jonathan Frederic and Kyle Kelley and Jessica Hamrick and Jason Grout and Sylvain Corlay and Paul Ivanov and Dami{\'a}n Avila and Safia Abdalla and Carol Willing},
	Booktitle = {Positioning and Power in Academic Publishing: Players, Agents and Agendas},
	Editor = {F. Loizides and B. Schmidt},
	Organization = {IOS Press},
	Pages = {87 - 90},
	Year = {2016}
}
@online{sampleih,
	author = {The 8472},
	url = {https://www.bittorrent.org/beps/bep_0051.html},
	title = {DHT Infohash Indexing},
	urldate = {2023-02-28},
	year = {2017}
}
@Article{Hunter:2007,
	Author    = {Hunter, J. D.},
	Title     = {Matplotlib: A 2D graphics environment},
	Journal   = {Computing in Science \& Engineering},
	Volume    = {9},
	Number    = {3},
	Pages     = {90--95},
	abstract  = {Matplotlib is a 2D graphics package used for Python for
	application development, interactive scripting, and publication-quality
	image generation across user interfaces and operating systems.},
	publisher = {IEEE COMPUTER SOC},
	doi       = {10.1109/MCSE.2007.55},
	year      = 2007
}
@online{norberg14,
	author = {Norberg, Arvid},
	title = {DHT Security extension},
	url = {https://www.bittorrent.org/beps/bep_0042.html},
	urldate = {2023-02-28},
	year = {2016}
}
@InProceedings{10.1007/3-540-45748-8_24,
	author="Douceur, John R.",
	editor="Druschel, Peter
		and Kaashoek, Frans
		and Rowstron, Antony",
	title="The Sybil Attack",
	booktitle="Peer-to-Peer Systems",
	year="2002",
	publisher="Springer Berlin Heidelberg",
	address="Berlin, Heidelberg",
	pages="251--260",
	abstract="Large-scale peer-to-peer systems face security threats from faulty or hostile remote computing elements. To resist these threats, many such systems employ redundancy. However, if a single faulty entity can present multiple identities, it can control a substantial fraction of the system, thereby undermining this redundancy. One approach to preventing these ``Sybil attacks'' is to have a trusted agency certify identities. This paper shows that, without a logically centralized authority, Sybil attacks are always possible except under extreme and unrealistic assumptions of resource parity and coordination among entities.",
	isbn="978-3-540-45748-0"
}
@book{cedilnik12,
	place={Radovljica},
	title={Matematični Priročnik},
	publisher={Didakta},
	author={Cedilnik, Anton and Razpet, Nada and Razpet, Marko},
	year={2012}
}
@online{wikihashuniformity,
	author="{Wikipedia contributors}",
	title={Hash function},
	url={https://w.wiki/An3L},
	urldate={2024-07-29},
	year={2024}
}
@online{maxmindgeoip2,
	author={MaxMind},
	title={GeoLite2 Free Geolocation Data},
	url={https://dev.maxmind.com/geoip/geolite2-free-geolocation-data},
	urldate={2024-07-31},
	year={2024}
}
@misc{rfc4086,
	series = {Request for Comments},
	number = 4086,
	howpublished = {RFC 4086},
	publisher = {RFC Editor},
	doi = {10.17487/RFC4086},
	url = {https://www.rfc-editor.org/info/rfc4086},
	author = {Donald E. Eastlake 3rd and Steve Crocker and Jeffrey I. Schiller},
	title = {{Randomness Requirements for Security}},
	pagetotal = 48,
	year = 2005,
	month = jun,
	abstract = {Security systems are built on strong cryptographic algorithms that foil pattern analysis attempts. However, the security of these systems is dependent on generating secret quantities for passwords, cryptographic keys, and similar quantities. The use of pseudo-random processes to generate secret quantities can result in pseudo-security. A sophisticated attacker may find it easier to reproduce the environment that produced the secret quantities and to search the resulting small set of possibilities than to locate the quantities in the whole of the potential number space. Choosing random quantities to foil a resourceful and motivated adversary is surprisingly difficult. This document points out many pitfalls in using poor entropy sources or traditional pseudo-random number generation techniques for generating such quantities. It recommends the use of truly random hardware techniques and shows that the existing hardware on many systems can be used for this purpose. It provides suggestions to ameliorate the problem when a hardware solution is not available, and it gives examples of how large such quantities need to be for some applications. This document specifies an Internet Best Current Practices for the Internet Community, and requests discussion and suggestions for improvements.},
}