Sciweavers

11 search results - page 1 / 3
» Recipient Anonymity in a Structured Overlay
Sort
View
AICT
2006
IEEE
13 years 10 months ago
Recipient Anonymity in a Structured Overlay
An open problem in structured overlay networks is related to the anonymity to be provided to recipients, namely, those nodes who respond to request messages. Such a feature is of ...
Giuseppe Ciaccio
CCS
2007
ACM
13 years 10 months ago
A k-anonymous communication protocol for overlay networks
Anonymity is increasingly important for network applications concerning about censorship and privacy. The existing anonymous communication protocols generally stem from mixnet and...
Pan Wang, Peng Ning, Douglas S. Reeves
P2P
2007
IEEE
165views Communications» more  P2P 2007»
13 years 10 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
INTR
2006
87views more  INTR 2006»
13 years 4 months ago
Agyaat: mutual anonymity over structured P2P networks
Purpose
Aameek Singh, Bugra Gedik, Ling Liu
IPPS
2007
IEEE
13 years 10 months ago
A Pretty Flexible API for Generic Peer-to-Peer Programming
NEBLO is a library and runtime system based on a structured overlay network. The API presented by NEBLO offers simple primitives and powerful mechanisms for programming generic p...
Giuseppe Ciaccio