ALERT: an anonymous location-based efficient routing protocol in MANETs

H Shen, L Zhao - IEEE transactions on mobile computing, 2012 - ieeexplore.ieee.org
Mobile Ad Hoc Networks (MANETs) use anonymous routing protocols that hide node
identities and/or routes from outside observers in order to provide anonymity protection …

Exploring extant and emerging issues in anonymous networks: A taxonomy and survey of protocols and metrics

D Kelly, R Raines, R Baldwin… - … Surveys & Tutorials, 2011 - ieeexplore.ieee.org
The desire to preserve privacy in cyberspace drives research in the area of anonymous
networks. Any entity operating in cyberspace is susceptible to debilitating cyber attacks. As …

Revisiting of peer-to-peer traffic: taxonomy, applications, identification techniques, new trends and challenges

MSA Ansari, K Pal, MC Govil - Knowledge and Information Systems, 2023 - Springer
The services provided through peer-to-peer (P2P) architecture involve the transmission of
text, images, documents, and multimedia. Especially the distribution of multimedia content …

Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network

LA Cutillo, R Molva, T Strufe - … on a World of Wireless, Mobile …, 2009 - ieeexplore.ieee.org
Social networking services (SNS), which provide the application with the most probably
highest growth rates in the Internet today, raise serious security concerns, especially with …

Anonymous asynchronous systems: the case of failure detectors

F Bonnet, M Raynal - Distributed computing, 2013 - Springer
Due to the multiplicity of loci of control, a main issue distributed systems have to cope with
lies in the uncertainty on the system state created by the adversaries that are asynchrony …

Management of streaming multimedia content using mobile agent technology on pure P2P-based distributed e-learning system

M Higashino, T Hayakawa, K Takahashi… - 2013 IEEE 27th …, 2013 - ieeexplore.ieee.org
Nowadays, a lot of e-Learning systems are widely deployed in educational schools. Typical
e-Learning systems are implemented as client-server model. In the client-server model, the …

The price of anonymity: Optimal consensus despite asynchrony, crash, and anonymity

F Bonnet, M Raynal - ACM Transactions on Autonomous and Adaptive …, 2011 - dl.acm.org
This article addresses the consensus problem in asynchronous systems prone to process
crashes, where additionally the processes are anonymous (they cannot be distinguished …

Analysing the MUTE anonymous file-sharing system using the pi-calculus

T Chothia - International Conference on Formal Techniques for …, 2006 - Springer
This paper gives details of a formal analysis of the MUTE system for anonymous file-sharing.
We build pi-calculus models of a node that is innocent of sharing files, a node that is guilty of …

Survey on anonymity in unstructured peer-to-peer systems

RY Xiao - Journal of computer science and technology, 2008 - Springer
Abstract Although anonymizing Peer-to-Peer (P2P) networks often means extra cost in terms
of transfer efficiency, many systems try to mask the identities of their users for privacy …

The first fully polynomial stabilizing algorithm for BFS tree construction

A Cournier, S Rovedakis, V Villain - Principles of Distributed Systems: 15th …, 2011 - Springer
The construction of a spanning tree is a fundamental task in distributed systems which
allows to resolve other tasks (ie, routing, mutual exclusion, network reset). In this paper, we …