Sciweavers

1250 search results - page 10 / 250
» Membership-concealing overlay networks
Sort
View
FGCS
2008
95views more  FGCS 2008»
14 years 8 months ago
SemreX: Efficient search in a semantic overlay for literature retrieval
The World Wide Web is growing at such a pace that even the biggest centralized search engines are able to index only a small part of the available documents on the Internet. The d...
Hai Jin, Hanhua Chen
USITS
2003
14 years 11 months ago
Mayday: Distributed Filtering for Internet Services
Mayday is an architecture that combines overlay networks with lightweight packet filtering to defend against denial of service attacks. The overlay nodes perform client authentic...
David G. Andersen
IM
2003
14 years 11 months ago
Peer-to-Peer Overlay Network Management through AGILE
: Currently, state of the art peer-to-peer (P2P) lookup mechanisms actively create and manage a peer application layer overlay network to achieve scalability and efficiency. The pr...
Jan Mischke, Burkhard Stiller
ACNS
2007
Springer
91views Cryptology» more  ACNS 2007»
15 years 1 months ago
Efficient Content Authentication in Peer-to-Peer Networks
ed Abstract
Roberto Tamassia, Nikos Triandopoulos
INTR
2006
87views more  INTR 2006»
14 years 9 months ago
Agyaat: mutual anonymity over structured P2P networks
Purpose
Aameek Singh, Bugra Gedik, Ling Liu