Secure, Peer-To-Peer, lossless configurations
نویسندگان
چکیده
منابع مشابه
A Secure Peer-to-Peer Application Framework
Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Joakim Koskela Name of the doctoral dissertation A Secure Peer-to-Peer Application Framework Publisher School of Science Unit Department of Computer Science Series Aalto University publication series DOCTORAL DISSERTATIONS 14/2015 Field of research Network architectures and security Manuscript submitted 25 February 2011 Date o...
متن کاملEigenSpeed: secure peer-to-peer bandwidth evaluation
Many peer-to-peer systems require a way of accurately assessing the bandwidth of their constituent peers. However, nodes cannot be trusted to accurately report their own capacity in the presence of incentives to the contrary and thus self-reporting can lead to poor network performance and security flaws. We present EigenSpeed, a secure and accurate peer-to-peer bandwidth evaluation system based...
متن کاملSufficiently Secure Peer-to-Peer Networks
Threat models in computer security often consider a very powerful adversary. A more useful model may be to consider conflict in which both sides have economic considerations that limit the resources they are willing to devote to the conflict. This paper examines censorship resistance in a peer-to-peer network. A simple game theoretic model is examined and then elaborated to include multiple pub...
متن کاملA Peer-to-peer Secure VoIP Architecture
Voice over IP (VoIP) and multimedia real-time communications between two ore more parties are widely used over the Internet. The Session Initiation Protocol (SIP) is the current signaling standard for such applications and allows users to establish and negotiate any end-to-end multimedia session. Unfortunately current SIP-based platforms use a centralized architecture where calls between User A...
متن کاملOptimal configurations for peer-to-peer user-private information retrieval
User-private information retrieval systems should protect the user’s anonymity when performing queries against a database, or they should limit the servers capacity of profiling users. Peer-to-peer user-private information retrieval (P2P UPIR) supplies a practical solution: the users in a group help each other in doing their queries, thereby preserving their privacy without any need of the data...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Engineering & Technology
سال: 2018
ISSN: 2227-524X
DOI: 10.14419/ijet.v7i1.7.10674