Sciweavers

98 search results - page 6 / 20
» Limiting Sybil Attacks in Structured P2P Networks
Sort
View
IPTPS
2005
Springer
15 years 3 months ago
Clustering in P2P Exchanges and Consequences on Performances
— We propose here an analysis of a rich dataset which gives an exhaustive and dynamic view of the exchanges processed in a running eDonkey system. We focus on correlation in term...
Stevens Le-Blond, Jean-Loup Guillaume, Matthieu La...
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
15 years 2 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
DAIS
2008
14 years 11 months ago
Brokering Planning Metadata in a P2P Environment
In self-adaptive systems, metadata about resources in the system (e.g., services, nodes) must be dynamically published, updated, and discarded. Current adaptive middleware approach...
Johannes Oudenstad, Romain Rouvoy, Frank Eliassen,...
CAISE
2003
Springer
15 years 2 months ago
PIX-Grid: A Platform for P2P Photo Exchange
The proliferation of digital camera devices (stand-alone or combined with cell phones), new protocols such as MMS and the desire of people to communicate and share their experience...
Karl Aberer, Philippe Cudré-Mauroux, Anwita...
91
Voted
SP
2008
IEEE
285views Security Privacy» more  SP 2008»
15 years 3 months ago
SybilLimit: A Near-Optimal Social Network Defense against Sybil Attacks
Decentralized distributed systems such as peer-to-peer systems are particularly vulnerable to sybil attacks, where a malicious user pretends to have multiple identities (called sy...
Haifeng Yu, Phillip B. Gibbons, Michael Kaminsky, ...