Sciweavers

98 search results - page 12 / 20
» Limiting Sybil Attacks in Structured P2P Networks
Sort
View
INFOCOM
2003
IEEE
14 years 19 days ago
Associative Search in Peer to Peer Networks: Harnessing Latent Semantics
— The success of a P2P file-sharing network highly depends on the scalability and versatility of its search mechanism. Two particularly desirable search features are scope (abil...
Edith Cohen, Amos Fiat, Haim Kaplan
JNCA
2007
125views more  JNCA 2007»
13 years 7 months ago
Distributed middleware architectures for scalable media services
The fusion of Multimedia and Internet technology has introduced an ever-increasing demand for large-scale reliable media services. This exposes the scalability limitations of curr...
Vana Kalogeraki, Demetrios Zeinalipour-Yazti, Dimi...
WOWMOM
2005
ACM
240views Multimedia» more  WOWMOM 2005»
14 years 28 days ago
An Adaptive Routing Protocol for Ad Hoc Peer-to-Peer Networks
Ad hoc networks represent a key factor in the evolution of wireless communications. These networks typically consist of equal nodes that communicate without central control, inter...
Luca Gatani, Giuseppe Lo Re, Salvatore Gaglio
KIVS
2005
Springer
14 years 26 days ago
Making Chord go mobile
: The Chord protocol is a structured Peer-to-Peer (P2P) protocol based on distributed hash tables (DHT). By using hash keys to identify the nodes in the network and also the shared...
Stefan Zöls, Rüdiger Schollmeier, Wolfga...
P2P
2007
IEEE
165views Communications» more  P2P 2007»
14 years 1 months ago
An Information-Theoretic Framework for Analyzing Leak of Privacy in Distributed Hash Tables
An important security issue in DHT-based structured overlay networks is to provide anonymity to the storage nodes. Compromised routing tables in those DHTs leak information about ...
Souvik Ray, Zhao Zhang