ANts P2P

Results: 204



#Item
1Appears in Proc. of ACM/IFIP/USENIX Intl. Middleware Conf. (MiddlewareApproximate Object Location and Spam Filtering on Peer-to-peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, and J

Appears in Proc. of ACM/IFIP/USENIX Intl. Middleware Conf. (MiddlewareApproximate Object Location and Spam Filtering on Peer-to-peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, and J

Add to Reading List

Source URL: oceanstore.cs.berkeley.edu

Language: English - Date: 2003-03-14 22:52:22
2Poster: Blindspot: Indistinguishable Anonymous Communications Joseph Gardiner, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA

Poster: Blindspot: Indistinguishable Anonymous Communications Joseph Gardiner, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:33
32014 IEEE Security and Privacy Workshops  iCOP: Automatically Identifying New Child Abuse Media in P2P Networks Claudia Peersman∗ , Christian Schulze† , Awais Rashid∗ , Margaret Brennan‡ and Carl Fischer∗ ∗ S

2014 IEEE Security and Privacy Workshops iCOP: Automatically Identifying New Child Abuse Media in P2P Networks Claudia Peersman∗ , Christian Schulze† , Awais Rashid∗ , Margaret Brennan‡ and Carl Fischer∗ ∗ S

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-30 03:11:09
4Distributed Middleware Architectures for Scalable Media Services V. Kalogeraki, D. Zeinalipour-Yazti ∗, D. Gunopulos Department of Computer Science and Engineering University of California - Riverside Riverside, CA 925

Distributed Middleware Architectures for Scalable Media Services V. Kalogeraki, D. Zeinalipour-Yazti ∗, D. Gunopulos Department of Computer Science and Engineering University of California - Riverside Riverside, CA 925

Add to Reading List

Source URL: www.cs.ucy.ac.cy

Language: English - Date: 2012-06-20 14:59:28
52014 IEEE Security and Privacy Workshops  PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations Pratik Narang, Subhajit Ray, Chittaranjan Hota

2014 IEEE Security and Privacy Workshops PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations Pratik Narang, Subhajit Ray, Chittaranjan Hota

Add to Reading List

Source URL: ieee-security.org

Language: English - Date: 2014-04-30 03:11:19
61  A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks Bridge Qiao Zhao, John C.S. Lui, Fellow, ACM/IEEE, Dah-Ming Chiu, Fellow, IEEE

1 A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks Bridge Qiao Zhao, John C.S. Lui, Fellow, ACM/IEEE, Dah-Ming Chiu, Fellow, IEEE

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-07-14 20:48:38
7INADVERTENT FILE SHARING OVER PEER-TO-PEER NETWORKS HEARING BEFORE THE

INADVERTENT FILE SHARING OVER PEER-TO-PEER NETWORKS HEARING BEFORE THE

Add to Reading List

Source URL: house.resource.org

Language: English - Date: 2011-02-09 15:30:04
8On Detecting Malicious Behaviors in Interactive Networks: Algorithms and Analysis Yongkun Li, John C.S. Lui

On Detecting Malicious Behaviors in Interactive Networks: Algorithms and Analysis Yongkun Li, John C.S. Lui

Add to Reading List

Source URL: www.cs.cuhk.hk

Language: English - Date: 2011-12-10 04:32:26
9Usable Secure Private Search Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin and Salvatore J. Stolfo Department of Computer Science Columbia University New York NY, 10027, USA

Usable Secure Private Search Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin and Salvatore J. Stolfo Department of Computer Science Columbia University New York NY, 10027, USA

Add to Reading List

Source URL: www.redballoonsecurity.com

Language: English - Date: 2014-02-27 21:40:34
10Combining the use of clustering and scale-free nature of user exchanges into a simple and efficient P2P system⋆ Pierre Fraigniaud 1 , Philippe Gauron 2 , and Matthieu Latapy 3 1

Combining the use of clustering and scale-free nature of user exchanges into a simple and efficient P2P system⋆ Pierre Fraigniaud 1 , Philippe Gauron 2 , and Matthieu Latapy 3 1

Add to Reading List

Source URL: www.liafa.jussieu.fr

Language: English - Date: 2007-01-17 10:04:36