Sciweavers

INFOCOM
2011
IEEE
13 years 2 months ago
Hidden communication in P2P networks Steganographic handshake and broadcast
—We consider the question of how a conspiring subgroup of peers in a p2p network can find each other and communicate without provoking suspicion among regular peers or an author...
Raphael Eidenbenz, Thomas Locher, Roger Wattenhofe...
P2P
2010
IEEE
187views Communications» more  P2P 2010»
13 years 9 months ago
Do BitTorrent-Like VoD Systems Scale under Flash-Crowds?
—The efficiency of BitTorrent for file sharing has inspired a number of BitTorrent-based P2P protocols for Videoon-Demand (VoD). It has been shown that these systems are scalab...
Lucia D'Acunto, Tamas Vinko, Johan A. Pouwelse
CORR
2010
Springer
139views Education» more  CORR 2010»
13 years 11 months ago
Compromising Tor Anonymity Exploiting P2P Information Leakage
Privacy of users in P2P networks goes far beyond their current usage and is a fundamental requirement to the adoption of P2P protocols for legal usage. In a climate of cold war be...
Pere Manils, Chaabane Abdelberri, Stevens Le-Blond...
GI
2004
Springer
14 years 4 months ago
Methodology for Estimating Network Distances of Gnutella Neighbors
Abstract: In this paper we ask the question how much does the neighborhood selection process of a P2P protocol such as Gnutella respect the underlying Internet topology.
Vinay Aggarwal, Stefan Bender, Anja Feldmann, Arne...
ISCIS
2005
Springer
14 years 4 months ago
Characterizing Gnutella Network Properties for Peer-to-Peer Network Simulation
A P2P network that is overlayed over Internet can consist of thousands, or even millions of nodes. To analyze the performance of a P2P network, or an algorithm or protocol designed...
Selim Ciraci, Ibrahim Korpeoglu, Özgür U...