Secure, Peer-To-Peer, lossless configurations

نویسندگان
چکیده

برای دانلود رایگان متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

A Secure Peer-to-Peer Application Framework

Aalto University, P.O. Box 11000, FI-00076 Aalto www.aalto.fi Author Joakim Koskela Name of the doctoral dissertation A Secure Peer-to-Peer Application Framework Publisher School of Science Unit Department of Computer Science Series Aalto University publication series DOCTORAL DISSERTATIONS 14/2015 Field of research Network architectures and security Manuscript submitted 25 February 2011 Date o...

متن کامل

EigenSpeed: secure peer-to-peer bandwidth evaluation

Many peer-to-peer systems require a way of accurately assessing the bandwidth of their constituent peers. However, nodes cannot be trusted to accurately report their own capacity in the presence of incentives to the contrary and thus self-reporting can lead to poor network performance and security flaws. We present EigenSpeed, a secure and accurate peer-to-peer bandwidth evaluation system based...

متن کامل

Sufficiently Secure Peer-to-Peer Networks

Threat models in computer security often consider a very powerful adversary. A more useful model may be to consider conflict in which both sides have economic considerations that limit the resources they are willing to devote to the conflict. This paper examines censorship resistance in a peer-to-peer network. A simple game theoretic model is examined and then elaborated to include multiple pub...

متن کامل

A Peer-to-peer Secure VoIP Architecture

Voice over IP (VoIP) and multimedia real-time communications between two ore more parties are widely used over the Internet. The Session Initiation Protocol (SIP) is the current signaling standard for such applications and allows users to establish and negotiate any end-to-end multimedia session. Unfortunately current SIP-based platforms use a centralized architecture where calls between User A...

متن کامل

Optimal configurations for peer-to-peer user-private information retrieval

User-private information retrieval systems should protect the user’s anonymity when performing queries against a database, or they should limit the servers capacity of profiling users. Peer-to-peer user-private information retrieval (P2P UPIR) supplies a practical solution: the users in a group help each other in doing their queries, thereby preserving their privacy without any need of the data...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: International Journal of Engineering & Technology

سال: 2018

ISSN: 2227-524X

DOI: 10.14419/ijet.v7i1.7.10674