Sciweavers

CCS
2006
ACM
13 years 8 months ago
Providing witness anonymity in peer-to-peer systems
In this paper, we introduce the concept of witness anonymity for peer-to-peer systems. Witness anonymity combines the seemingly conflicting requirements of anonymity (for honest p...
Bo Zhu, Sanjeev Setia, Sushil Jajodia
ELPUB
2007
ACM
13 years 9 months ago
Peer-to-Peer Networks as a Distribution and Publishing Model
Content publishing and distribution often occurs in a costly and inefficient manner via client/server networks. Client/server models exhibit negative network externalities in that...
De Boever
ATAL
2009
Springer
13 years 9 months ago
Adding incentives to file-sharing systems
Modern peer-to-peer file sharing systems rely heavily on the willingness of users to distribute files to others. A selfish user can choose to download a file and consume resou...
Aviv Zohar, Jeffrey S. Rosenschein
P2P
2002
IEEE
103views Communications» more  P2P 2002»
13 years 10 months ago
Request Algorithms in Freenet-Style Peer-to-Peer Systems
In most peer-to-peer systems, edge resources self-organize into overlay networks. At the core of Freenet-style peer-to-peer systems are insert and request algorithms that dynamica...
Jens Mache, Melanie Gilbert, Jason Guchereau, Jeff...
ICDCSW
2002
IEEE
13 years 10 months ago
Peer-to-Peer for Collaborative Applications
Peer-to-peer systems recently captured the attention of practitioners and researchers as they provide an attractive alternative to client-server architectures. Peerto-peer enables...
Gianpaolo Cugola, Gian Pietro Picco
IPTPS
2003
Springer
13 years 10 months ago
Understanding Availability
This paper addresses a simple, yet fundamental question in the design of peer-to-peer systems: What does it mean when we say “availability” and how does this understanding imp...
Ranjita Bhagwan, Stefan Savage, Geoffrey M. Voelke...
ICNP
2003
IEEE
13 years 10 months ago
A File-Centric Model for Peer-to-Peer File Sharing Systems
Peer-to-peer systems have quickly become a popular way for file sharing and distribution. In this paper, we focus on the subsystem consisting of peers and their actions relative ...
Li Zou, Mostafa H. Ammar
ICNP
2003
IEEE
13 years 10 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
WCW
2004
Springer
13 years 10 months ago
On the Equivalence of Forward and Reverse Query Caching in Peer-to-Peer Overlay Networks
Peer-to-peer systems such as Gnutella and Kazaa are used by millions of people for sharing music and many other files over the Internet, and they account for a significant portio...
Ali Raza Butt, Nipoon Malhotra, Sunil Patro, Y. Ch...
ADVIS
2004
Springer
13 years 10 months ago
Kaliphimos: A Community-Based Peer-to-Peer Group Management Scheme
Emerging peer-to-peer services such as Freenet, Gnutella, Kazaa, and Napster provide an easy and efficient way to share resources and information. However, misuse or unfair exploit...
Hoh Peter In, Konstantinos A. Meintanis, Ming Zhan...