Sciweavers

4438 search results - page 42 / 888
» On the Distribution of Keys by Hashing
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
15 years 6 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
CONEXT
2006
ACM
15 years 5 months ago
Stealth distributed hash table: a robust and flexible super-peered DHT
Andrew Brampton, Andrew MacQuire, Idris A. Rai, Ni...
P2P
2005
IEEE
101views Communications» more  P2P 2005»
15 years 5 months ago
T-DHT: Topology-based Distributed Hash Tables
Olaf Landsiedel, Katharina Anna Lehmann, Klaus Weh...