Sciweavers

46 search results - page 1 / 10
» Content Access Control Scheme for P2P Networks Using a Reput...
Sort
View
EURONGI
2006
Springer
14 years 2 months ago
Self-protection in P2P Networks: Choosing the Right Neighbourhood
Abstract. In unstructured peer-to-peer networks, as in real life, a good neighbourhood is not only crucial for a peaceful sleep, but also for an exchange of important gossips and f...
Ivan Martinovic, Christof Leng, Frank A. Zdarsky, ...
ICC
2007
IEEE
14 years 5 months ago
Design and Evaluation of IP Header Compression for Cellular-Controlled P2P Networks
Abstract— In this paper we advocate to exploit terminal cooperation to stabilize IP communication using header compression. The terminal cooperation is based on direct communicat...
Tatiana K. Madsen, Qi Zhang, Frank H. P. Fitzek, M...
ICNP
2003
IEEE
14 years 4 months ago
On the Utility of Distributed Cryptography in P2P and MANETs: The Case of Membership Control
Peer-to-peer systems enable efficient resource aggregation and are inherently scalable since they do not depend on any centralized authority. However, lack of a centralized autho...
Maithili Narasimha, Gene Tsudik, Jeong Hyun Yi
OTM
2007
Springer
14 years 5 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
LISA
2008
14 years 1 months ago
Portable Desktop Applications Based on P2P Transportation and Virtualization
Play-on-demand is usually regarded as a feasible access mode for web content (including streaming video, web pages and so on), web services and some Software-As-A-Service (SaaS) a...
Youhui Zhang, Xiaoling Wang, Liang Hong