Back to Results
First PageMeta Content
Network architecture / Tapestry / Chord / Pastry / Routing / Peer-to-peer / Bootstrapping node / Overlay network / Network topology / Distributed data storage / Computing / Concurrent computing


Secure routing for structured peer-to-peer overlay networks∗ Miguel Castro1 , Peter Druschel2 , Ayalvadi Ganesh1 , Antony Rowstron1 and Dan S. Wallach2 1 Microsoft Research Ltd., 7 J J Thomson Avenue, Cambridge, CB3 0F
Add to Reading List

Document Date: 2002-11-14 12:38:20


Open Document

File Size: 264,89 KB

Share Result on Facebook

City

Boston / Cambridge / /

Company

Dan S. Wallach2 1 Microsoft Research Ltd. / /

Country

United Kingdom / /

Currency

USD / /

/

Event

Product Issues / /

Facility

Rice University / /

IndustryTerm

it hard to exploit network / p2p protocols / open peer-to-peer systems / normal Internet connections / overlay networks / overlay protocols / decentralized services / possible solution / public key infrastructure / large-scale peer-to-peer applications / open Internet deployment / Web browsers / secure services / replication algorithm / given p2p network / p2p networks / node software / particular protocol / secure applications / overlay network / p2p systems / /

Organization

Rice University / /

Person

Figure / /

Product

nodeIds / nodes / entries / node / adversary / members / /

ProvinceOrState

Massachusetts / /

Technology

alpha / p2p protocols / cryptography / IPv6 / public key infrastructure / public key / load balancing / peer-to-peer / particular protocol / network address translation / p2p / ISP / simulation / Operating Systems / Byzantine-fault-tolerant replication algorithm / overlay protocols / /

SocialTag