[HTML][HTML] Survey of research towards robust peer-to-peer networks: Search methods
J Risson, T Moors - 2007 - rfc-editor.org
RFC 4981: Survey of Research towards Robust Peer-to-Peer Networks: Search Methods [RFC
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network Working Group …
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network Working Group …
[图书][B] Peer-to-peer computing: Principles and applications
Peer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a
potential technology for redesigning distributed architectures and, consequently, distributed …
potential technology for redesigning distributed architectures and, consequently, distributed …
Scalable onion routing with torsk
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is
designed as an interoperable replacement for the relay selection and directory service of the …
designed as an interoperable replacement for the relay selection and directory service of the …
Survey of attacks and defenses on P2PSIP communications
DS Touceda, JM Sierra, A Izquierdo… - … Surveys & Tutorials, 2011 - ieeexplore.ieee.org
As with any other emerging system, the analysis of the security of Peer-to-Peer Session
Initiation Protocol systems is of crucial importance for its secure development and future …
Initiation Protocol systems is of crucial importance for its secure development and future …
[图书][B] Anonymous routing in structured peer-to-peer overlays
N Borissov - 2005 - search.proquest.com
As more of our daily activities are carried out online, it becomes important to develop
technologies to protect our online privacy. Anonymity is a key privacy technology, since it …
technologies to protect our online privacy. Anonymity is a key privacy technology, since it …
Agyaat: Mutual anonymity over structured p2p networks
Purpose–To provide mutual anonymity over traditionally un‐anonymous Distributed Hash
Tables (DHT) based Peer‐to‐Peer overlay networks, while maintaining the desired …
Tables (DHT) based Peer‐to‐Peer overlay networks, while maintaining the desired …
Improving sender anonymity in a structured overlay with imprecise routing
G Ciaccio - International Workshop on Privacy Enhancing …, 2006 - Springer
In the framework of peer to peer distributed systems, the problem of anonymity in structured
overlay networks remains a quite elusive one. It is especially unclear how to evaluate and …
overlay networks remains a quite elusive one. It is especially unclear how to evaluate and …
Iris: Dynamic Privacy Preserving Search in Structured Peer-to-Peer Networks
A Aktypi, K Rasmussen - arXiv preprint arXiv:2310.19634, 2023 - arxiv.org
In structured peer-to-peer networks like Chord, the users manage to retrieve the information
they seek by asking other nodes from the network for the information they search. Revealing …
they seek by asking other nodes from the network for the information they search. Revealing …
Secure name services for the Internet of Things
B Fabian - 2008 - edoc.hu-berlin.de
The term Internet of Things (IOT) describes an emerging global, Internet-based information
service architecture for RFID-tagged items (Radio-Frequency Identification). In the vision of …
service architecture for RFID-tagged items (Radio-Frequency Identification). In the vision of …
[PDF][PDF] Peer to peer security
J Van Vroonhoven - 4th Twente Student Conference on IT, 2006 - Citeseer
With the increasing popularity of peer-to-peer networks, new problems arise. One of those
problems is the security of such networks. In the area of peer-to-peer security there are five …
problems is the security of such networks. In the area of peer-to-peer security there are five …