—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
In this paper we present new topology management algorithms used to self-organize the overlay of a peer-topeer network. The algorithms are Node Selection, Node Removal, Overload E...
Annemari Auvinen, Mikko Vapa, Matthieu Weber, Niko...
The interesting properties of P2P systems (high availability despite peer volatility, support for heterogeneous architectures, high scalability, etc.) make them attractive for dist...
Selecting a random peer with uniform probability across a peer-to-peer (P2P) network is a fundamental function for unstructured search, data replication, and monitoring algorithms....
The impact of the peer-to-peer paradigm increases both in research and in industry. Still, serious applications for P2P-based systems are rare. On the other hand, Emergency Call H...
Kalman Graffi, Aleksandra Kovacevic, Kyra Wulffert...