Sciweavers

548 search results - page 63 / 110
» Secure peer sampling
Sort
View
P2P
2007
IEEE
14 years 4 months ago
The Effect of Viral Media on Business Usage of P2P
P2P file-sharing poses a number of serious problems for business network administrators including: unpredictable network usage, increased vulnerability to security threats and the...
Danny Hughes, James Walkerdine, Kevin Lee
FC
2007
Springer
128views Cryptology» more  FC 2007»
14 years 4 months ago
Informant: Detecting Sybils Using Incentives
We propose an economic approach to Sybil attack detection. In our Informant protocol, a detective offers a reward for Sybils to reveal themselves. The detective accepts from one i...
N. Boris Margolin, Brian Neil Levine
SIGECOM
2004
ACM
115views ECommerce» more  SIGECOM 2004»
14 years 3 months ago
Limited reputation sharing in P2P systems
The increasing popularity of resource exchange through peerto-peer networks has encouraged the development of ways to support more complex commercial transactions over these netwo...
Sergio Marti, Hector Garcia-Molina
SIGOPSE
2004
ACM
14 years 3 months ago
AP3: cooperative, decentralized anonymous communication
This paper describes a cooperative overlay network that provides anonymous communication services for participating users. The Anonymizing Peer-to-Peer Proxy (AP3) system provides...
Alan Mislove, Gaurav Oberoi, Ansley Post, Charles ...
GCC
2003
Springer
14 years 3 months ago
Grid Computing for the Masses: An Overview
Abstract. The common goals of the Grid and peer-to-peer communities have brought them in close proximity. Both the technologies overlay a collaborative resource-sharing infrastruct...
Kaizar Amin, Gregor von Laszewski, Armin R. Mikler