Peer-to-peer (P2P) applications are consuming a significant fraction of the total bandwidth of Internet service providers (ISPs). This has become a financial burden to ISPs and if ...
Haiyong Xie 0002, Yang Richard Yang, Avi Silbersch...
The invention of public-key cryptography makes many new network applications, such as electronic commerce (CE), possible. However, the widely used Internet is open and unprotected....
Path probing is essential to maintaining an efficient overlay network topology. However, the cost of a full-scale probing is as high as O(n2 ), which is prohibitive in large-scale...
In recent years, commercial “Multihoming Route Control” devices are used by multihomed stub networks to optimize the routing of their Internet traffic. Previous studies have sh...
Privacy in Electronic Commerce transactions is the subject of ever increasing research. However, many challenges remain to be overcome. For example, let us consider a customer, Si...