Sciweavers

13 search results - page 2 / 3
» Incentive-Driven P2P Anonymity System: A Game-Theoretic Appr...
Sort
View
INFOCOM
2009
IEEE
13 years 11 months ago
Protecting Against Network Infections: A Game Theoretic Perspective
— Security breaches and attacks are critical problems in today’s networking. A key-point is that the security of each host depends not only on the protection strategies it choo...
Jasmina Omic, Ariel Orda, Piet Van Mieghem
JASIS
2006
108views more  JASIS 2006»
13 years 4 months ago
Fuzzy techniques for trust and reputation management in anonymous peer-to-peer systems
P2P applications are rapidly gaining acceptance among users of Internet-based services, especially because of their capability of exchanging resources while preserving the anonymi...
Roberto Aringhieri, Ernesto Damiani, Sabrina De Ca...
ICNP
2005
IEEE
13 years 10 months ago
Incentives to Promote Availability in Peer-to-Peer Anonymity Systems
Peer-to-peer (P2P) anonymous communication systems are vulnerable to free-riders, peers that use the system while providing little or no service to others and whose presence limit...
Daniel R. Figueiredo, Jonathan K. Shapiro, Donald ...
MASCOTS
2004
13 years 6 months ago
Reliable Response Delivery in Peer-to-Peer Systems
Unstructured peer-to-peer (P2P) system is the prevalent model in today's P2P system. In such systems, a response is sent along the same path that carried the incoming query m...
Xiaomei Liu, Yunhao Liu, Li Xiao
CCS
2009
ACM
13 years 11 months ago
ShadowWalker: peer-to-peer anonymous communication using redundant structured topologies
Peer-to-peer approaches to anonymous communication promise to eliminate the scalability concerns and central vulnerability points of current networks such as Tor. However, the P2P...
Prateek Mittal, Nikita Borisov