Sciweavers

CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 11 months ago
Compromising Tor Anonymity Exploiting P2P Information Leakage
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war be...
Pere Manils, Chaabane Abdelberri, Stevens Le-Blond...
CORR
2010
Springer
82views Education» more  CORR 2010»
13 years 11 months ago
Spying the World from your Laptop -- Identifying and Profiling Content Providers and Big Downloaders in BitTorrent
This paper presents a set of exploits an adversary can use to continuously spy on most BitTorrent users of the Internet from a single machine and for a long period of time. Using ...
Stevens Le-Blond, Arnaud Legout, Fabrice Le Fessan...
BROADNETS
2007
IEEE
14 years 6 months ago
Assessing the impact of BitTorrent on DOCSIS networks
Abstract— BitTorrent is a widely deployed peer-to-peer protocol that provides scalable file sharing capabilities. While BitTorrent applications contribute to the demand for high...
James J. Martin, James Westall