[HTML][HTML] Survey of research towards robust peer-to-peer networks: Search methods

J Risson, T Moors - 2007 - rfc-editor.org
RFC 4981: Survey of Research towards Robust Peer-to-Peer Networks: Search Methods [RFC
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network Working Group …

[图书][B] Peer-to-peer computing: Principles and applications

QH Vu, M Lupu, BC Ooi - 2010 - Springer
Peer-to-peer (P2P) technology, or peer computing, is a paradigm that is viewed as a
potential technology for redesigning distributed architectures and, consequently, distributed …

Scalable onion routing with torsk

J McLachlan, A Tran, N Hopper, Y Kim - … of the 16th ACM conference on …, 2009 - dl.acm.org
We introduce Torsk, a structured peer-to-peer low-latency anonymity protocol. Torsk is
designed as an interoperable replacement for the relay selection and directory service of the …

Survey of attacks and defenses on P2PSIP communications

DS Touceda, JM Sierra, A Izquierdo… - … Surveys & Tutorials, 2011 - ieeexplore.ieee.org
As with any other emerging system, the analysis of the security of Peer-to-Peer Session
Initiation Protocol systems is of crucial importance for its secure development and future …

[图书][B] Anonymous routing in structured peer-to-peer overlays

N Borissov - 2005 - search.proquest.com
As more of our daily activities are carried out online, it becomes important to develop
technologies to protect our online privacy. Anonymity is a key privacy technology, since it …

Agyaat: Mutual anonymity over structured p2p networks

A Singh, B Gedik, L Liu - Internet Research, 2006 - emerald.com
Purpose–To provide mutual anonymity over traditionally un‐anonymous Distributed Hash
Tables (DHT) based Peer‐to‐Peer overlay networks, while maintaining the desired …

Improving sender anonymity in a structured overlay with imprecise routing

G Ciaccio - International Workshop on Privacy Enhancing …, 2006 - Springer
In the framework of peer to peer distributed systems, the problem of anonymity in structured
overlay networks remains a quite elusive one. It is especially unclear how to evaluate and …

Iris: Dynamic Privacy Preserving Search in Structured Peer-to-Peer Networks

A Aktypi, K Rasmussen - arXiv preprint arXiv:2310.19634, 2023 - arxiv.org
In structured peer-to-peer networks like Chord, the users manage to retrieve the information
they seek by asking other nodes from the network for the information they search. Revealing …

Secure name services for the Internet of Things

B Fabian - 2008 - edoc.hu-berlin.de
The term Internet of Things (IOT) describes an emerging global, Internet-based information
service architecture for RFID-tagged items (Radio-Frequency Identification). In the vision of …

[PDF][PDF] Peer to peer security

J Van Vroonhoven - 4th Twente Student Conference on IT, 2006 - Citeseer
With the increasing popularity of peer-to-peer networks, new problems arise. One of those
problems is the security of such networks. In the area of peer-to-peer security there are five …