Sciweavers

480 search results - page 43 / 96
» Anonymous Transactions in Computer Networks
Sort
View
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 3 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang
AIRWEB
2007
Springer
14 years 2 months ago
Computing Trusted Authority Scores in Peer-to-Peer Web Search Networks
Peer-to-peer (P2P) networks have received great attention for sharing and searching information in large user communities. The open and anonymous nature of P2P networks is one of ...
Josiane Xavier Parreira, Debora Donato, Carlos Cas...
PAM
2012
Springer
12 years 4 months ago
Detecting Pedophile Activity in BitTorrent Networks
Abstract. The wide spread of Peer-to-Peer networks makes multimedia files available to users all around the world. However, Peer-to-Peer networks are often used to spread illegal ...
Moshe Rutgaizer, Yuval Shavitt, Omer Vertman, Noa ...
IPTPS
2004
Springer
14 years 2 months ago
DHT Routing Using Social Links
— The equality and anonymity of peer-to-peer networks makes them vulnerable to routing denial of service attacks from misbehaving nodes. In this paper, we investigate how existin...
Sergio Marti, Prasanna Ganesan, Hector Garcia-Moli...
MOBICOM
1999
ACM
14 years 1 months ago
Next Century Challenges: Data-Centric Networking for Invisible Computing
Computing and telecommunications are maturing, and the next century promises a shift away from technology-driven general-purpose devices. Instead, we will focus on the needs of co...
Mike Esler, Jeffrey Hightower, Thomas E. Anderson,...