—P2P systems are exposed to an unusually broad range of attacks. These include a spectrum of denial-of-service, or attrition, attacks from low-level packet flooding to high-leve...
Petros Maniatis, Thomas J. Giuli, Mema Roussopoulo...
Since there is no method to verify the trustworthiness of shared files in P2P file sharing systems, malicious peers can spread untrustworthy files to the system. In order to pre...
We evaluate and compare the performance of three P2P streaming systems that are capable of streaming live video on the Internet by testing them on a carefully controlled, traffic...
Sachin Agarwal, Jatinder Pal Singh, Aditya Mavlank...
Internet Connectivity Establishment (ICE) is becoming increasingly important for P2P systems on the open Internet, as it enables NAT-bound peers to provide accessible services. A ...
Sharing huge databases in distributed systems is inherently difficult. As the amount of stored data increases, data localization techniques become no longer sufficient. A more ef...
Rabab Hayek, Guillaume Raschia, Patrick Valduriez,...