Decentralized file-sharing systems like Napster [11] and Gnutella [23] have popularized the peer-to-peer approach [18,20,22], which emphasizes the use of distributed resources in ...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
P2P network is now widely pervasive and increase usability of Internet. However, with the difficulty of tracing flow of P2P traffic, security incident of P2P network is now ser...
In this paper we discuss requirements for peer-to-peer (P2P) benchmarking, and we present two exemplary approaches to benchmarks for Distributed Hashtables (DHT) and P2P gaming ove...
Max Lehn, Tonio Triebel, Christian Gross, Dominik ...
Are P2P systems and applications here to stay? Or are they a bright meteor whose destiny is to disappear soon? In this paper we try to give a positive answer to the first questio...
Renato Lo Cigno, Tommaso Pecorella, Matteo Sereno,...