Sciweavers

14 search results - page 2 / 3
» Mutual Anonymity for Mobile P2P Systems
Sort
View
IPPS
2005
IEEE
13 years 11 months ago
A Mutual Anonymous Peer-to-Peer Protocol Design
Peer-to-Peer (P2P) computing has become a popular application model because of its easy resource sharing pattern and powerful query search scheme. However, decentralized P2P archi...
Jinsong Han, Yunhao Liu, Li Xiao, Renyi Xiao, Lion...
ICNP
2005
IEEE
13 years 11 months ago
MuON: Epidemic Based Mutual Anonymity
A mutually anonymous service hides the identity of a client from the service provider and vice-versa. Providing mutual anonymity usually requires a large number of participants. W...
Neelesh Bansod, Ashish Malgi, Byung Kyu Choi, Jean...
SASN
2003
ACM
13 years 10 months ago
Admission control in Peer-to-Peer: design and performance evaluation
Peer-to-Peer (P2P) applications and services are very common in today’s computing. The popularity of the P2P paradigm prompts the need for specialized security services which ma...
Nitesh Saxena, Gene Tsudik, Jeong Hyun Yi

Publication
715views
15 years 5 months ago
A Peer-to-Peer Spatial Cloaking Algorithm for Anonymous Location-based Services
This paper tackles a major privacy threat in current location-based services where users have to report their exact locations to the database server in order to obtain their desire...
Chi-Yin Chow, Mohamed F. Mokbel, Xuan Liu
IPPS
2007
IEEE
13 years 11 months ago
Pseudo Trust: Zero-Knowledge Based Authentication in Anonymous Peer-to-Peer Protocols
Most of the current trust models in peer-to-peer (P2P) systems are identity based, which means that in order for one peer to trust another, it needs to know the other peer’s ide...
Li Lu, Jinsong Han, Lei Hu, Jinpeng Huai, Yunhao L...