Sciweavers

CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 5 months ago
Compromising Tor Anonymity Exploiting P2P Information Leakage
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war be...
Pere Manils, Chaabane Abdelberri, Stevens Le-Blond...
GLOBECOM
2008
IEEE
13 years 6 months ago
Evaluating P2PSIP under Attack: An Emulative Study
— Recently, establishing a VoIP call using a P2P network instead of regular SIP-servers has been proposed; this novel approach to SIP-signaling is commonly referred to as P2PSIP ...
Jan Seedorf, Frank Ruwolt, Martin Stiemerling, Sav...
OPODIS
2004
13 years 6 months ago
Self-optimizing DHTs Using Request Profiling
S (in alphabetic order by speaker surname) Speaker: Uri Abraham (Ben-Gurion University) Title: Self-Stabilizing TimeStamps : Speaker: Anish Arora (Ohio State) Title: Self-Stabilizi...
Alina Bejan, Sukumar Ghosh
ICWN
2004
13 years 6 months ago
Searching in Variably Connected P2P Networks
Peer-to-Peer networks are gaining popularity through file-sharing communities. Most P2P networks demand a certain stability from it's nodes in order to function satisfactory. ...
Njål T. Borch, Lars Kristian Vognild
DELOS
2004
13 years 6 months ago
Peer-to-Peer Overlays and Data Integration in a Life Science Grid
Databases and Grid computing are a good match. With the service orientation of Grid computing, the complexity of maintaining and integrating databases can be kept away from the act...
Curt Cramer, Andrea Schafferhans, Thomas Fuhrmann
ACMICEC
2008
ACM
191views ECommerce» more  ACMICEC 2008»
13 years 7 months ago
Why share in peer-to-peer networks?
Prior theory and empirical work emphasize the enormous free-riding problem facing peer-to-peer (P2P) sharing networks. Nonetheless, many P2P networks thrive. We explore two possib...
Lian Jian, Jeffrey K. MacKie-Mason
EUC
2006
Springer
13 years 8 months ago
Security in P2P Networks: Survey and Research Directions
A fundamental feature of Peer-to-Peer (P2P) networks is the honest collaboration among an heterogeneous community of participants. After Napster success
Esther Palomar, Juan M. Estévez-Tapiador, J...
DEXAW
2006
IEEE
123views Database» more  DEXAW 2006»
13 years 8 months ago
Privacy, Security and Trust in P2P environments: A Perspective
The Peer-to-Peer (P2P) paradigm of computing has been growing dramatically in popularity over the last decade. Consequently, large amounts of data are being shared among P2P users...
Anirban Mondal, Masaru Kitsuregawa
DEXAW
2004
IEEE
136views Database» more  DEXAW 2004»
13 years 8 months ago
A Protocol for Reputation Management in Super-Peer Networks
Peer-to-Peer (P2P) applications have recently seen an enormous success and have reached millions of users. The main reason of this success is the anonymity the users enjoy. Howeve...
Shalendra Chhabra, Ernesto Damiani, Sabrina De Cap...
BIOADIT
2006
Springer
13 years 8 months ago
Proposal and Evaluation of a Cooperative Mechanism for Pure P2P File Sharing Networks
To provide application-oriented network services, a variety of overlay networks are deployed over physical IP networks. Since they share and compete for the same physical network r...
Junjiro Konishi, Naoki Wakamiya, Masayuki Murata