Sciweavers

CCGRID
2004
IEEE
13 years 8 months ago
A reputation-based trust management system for P2P networks
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
Ali Aydin Selçuk, Ersin Uzun, Mark Resat Pa...
AIMS
2009
Springer
13 years 9 months ago
Evaluation of Sybil Attacks Protection Schemes in KAD
In this paper, we assess the protection mechanisms entered into recent clients to fight against the Sybil attack in KAD, a widely deployed Distributed Hash Table. We study three m...
Thibault Cholez, Isabelle Chrisment, Olivier Festo...
HICSS
2003
IEEE
97views Biometrics» more  HICSS 2003»
13 years 9 months ago
Java Mobile Agents on Project JXTA Peer-to-Peer Platform
Over the last year Peer-to-Peer (p2p) implementations have evolved from experimental to sophisticated systems. Mobile agents have a long e-Commerce history dating back to the midd...
Rita Yu Chen, Bill Yeager
ISMIR
2004
Springer
145views Music» more  ISMIR 2004»
13 years 9 months ago
Audio Fingerprinting In Peer-to-peer Networks
Despite the immense potential of Peer-to-Peer (P2P) networks in facilitating collaborative applications, they have become largely known as a free haven for pirated music swapping....
Prarthana Shrestha, Ton Kalker
IPTPS
2004
Springer
13 years 9 months ago
DHT Routing Using Social Links
— The equality and anonymity of peer-to-peer networks makes them vulnerable to routing denial of service attacks from misbehaving nodes. In this paper, we investigate how existin...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...
IPTPS
2004
Springer
13 years 9 months ago
The Case for a Hybrid P2P Search Infrastructure
Popular P2P file-sharing systems like Gnutella and Kazaa use unstructured network designs. These networks typically adopt flooding-based search techniques to locate files. Whil...
Boon Thau Loo, Ryan Huebsch, Ion Stoica, Joseph M....
GCC
2004
Springer
13 years 9 months ago
Efficient Search Using Adaptive Metadata Spreading in Peer-to-Peer Networks
Abstract. Search is until now a difficult problem in peer-to-peer (P2P) filesharing systems. In this paper, we propose to use adaptive metadata spreading to make search in P2P netw...
Xuezheng Liu, Guangwen Yang, Ming Chen, Yongwei Wu
WIDM
2004
ACM
13 years 9 months ago
XPath lookup queries in P2P networks
We address the problem of querying XML data over a P2P network. In P2P networks, the allowed kinds of queries are usually exact-match queries over file names. We discuss the exte...
Angela Bonifati, Ugo Matrangolo, Alfredo Cuzzocrea...
SAC
2004
ACM
13 years 9 months ago
An architecture for information retrieval over semi-collaborating Peer-to-Peer networks
Peer-to-Peer (P2P) networking is aimed at exploiting the potential of widely distributed information pools and its effortless access and retrieval irrespectively of underlying net...
Iraklis A. Klampanos, Joemon M. Jose
KIVS
2005
Springer
13 years 9 months ago
P2P Replication Revisited: Mobile Infrastructures
Abstract: Traffic engineering in P2P networks deals with organizing overlay networks. The challenge of unavailability has not been mastered yet. Considering the resource allocatio...
Jens O. Oberender, Hermann de Meer