Sciweavers

548 search results - page 23 / 110
» Secure peer sampling
Sort
View
ISCAPDCS
2004
13 years 11 months ago
A Reputation-based Trust Management in Peer-to-Peer Network Systems
Peer-to-peer networks have gained a lot of attention over the last couple of years, mainly due to the popularity of the free multimedia file-sharing program Napster and a legal ba...
Natalia Stakhanova, Sergio Ferrero, Johnny S. Wong...
CIG
2005
IEEE
14 years 3 months ago
How to Protect Peer-to-Peer Online Games from Cheats
Abstract- Recently, P2P (peer-to-peer) online game systems have attracted a great deal of public attention. They work without central servers, thus, the maintenance and organizatio...
Haruhiro Yoshimoto, Rie Shigetomi, Hideki Imai
ICN
2005
Springer
14 years 3 months ago
Discovery and Routing in the HEN Heterogeneous Peer-to-Peer Network
Network infrastructures are nowadays getting more and more complex as security considerations and technical needs like network address translation are blocking traffic and protocol...
Tim Schattkowsky
ESORICS
2006
Springer
14 years 1 months ago
Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors
A user who wants to use a service forbidden by their site's usage policy can masquerade their packets in order to evade detection. One masquerade technique sends prohibited tr...
Michael P. Collins, Michael K. Reiter
IMC
2010
ACM
13 years 7 months ago
Temporally oblivious anomaly detection on large networks using functional peers
Previous methods of network anomaly detection have focused on defining a temporal model of what is "normal," and flagging the "abnormal" activity that does not...
Kevin M. Carter, Richard Lippmann, Stephen W. Boye...