We present a detailed study of the potential impact of BGP peering session attacks and the resulting exploitation of Route Flap Damping (RFD) that cause network-wide routing disrup...
Kotikalapudi Sriram, Doug Montgomery, Oliver Borch...
The k-anonymity technique is widely used to provide location privacy protection for accessing location-based services (LBS), i.e., the exact location of a query initiator is cloak...
The internet causes a continuous emergence of novel forms of scholarly communication and collaboration. Electronic publishing provides a means for representing eventual outcomes o...
Wolfram Horstmann, Peter Reimer, Jochen Schirrwage...
Enforcing DRM in collaborative, Peer-to-Peer (P2P) networks comprising different types of user devices is a challenging task as it is difficult to monitor the network operations i...
A lot of recent work has dealt with improving performance of content searching in peer-to-peer file sharing systems. In this paper we attack this problem by modifying the overlay ...