Sciweavers

548 search results - page 13 / 110
» Secure peer sampling
Sort
View
103
Voted
OSDI
2002
ACM
16 years 23 days ago
Secure Routing for Structured Peer-to-Peer Overlay Networks
Structured peer-to-peer overlay networks provide a substrate for the construction of large-scale, decentralized applications, including distributed storage, group communication, a...
Miguel Castro, Peter Druschel, Ayalvadi J. Ganesh,...
87
Voted
ISM
2006
IEEE
76views Multimedia» more  ISM 2006»
15 years 6 months ago
Peer-to-Peer Secure and Private Community Based Multimedia Communications
We have designed and implemented P2PWNC, a fully distributed, open to all, autonomous WLAN roaming scheme that can be used in a community to provide various multimedia communicati...
Pantelis A. Frangoudis, George C. Polyzos
101
Voted
JCIT
2010
131views more  JCIT 2010»
14 years 7 months ago
A Secure Routing Protocol for Peer-to-Peer Network
In peer-to-peer networks, it is very difficult to route query successfully, since nodes in the routing path do not always behave according to pre-established routing protocols. To...
Xu Xiang, Jianguo Chen
49
Voted
HICSS
2008
IEEE
104views Biometrics» more  HICSS 2008»
15 years 7 months ago
The Evolution of the Peer-to-Peer File Sharing Industry and the Security Risks for Users
M. Eric Johnson, Dan McGuire, Nicholas D. Willey
FOCS
2006
IEEE
15 years 6 months ago
Towards Secure and Scalable Computation in Peer-to-Peer Networks
We consider the problems of Byzantine Agreement and Leader Election, where a constant fraction b < 1/3 of processors are controlled by a malicious adversary. The first problem...
Valerie King, Jared Saia, Vishal Sanwalani, Erik V...