DHT

Results: 84



#Item
31

1 Data Indexing in Peer-to-Peer DHT Networks L. Garc“es-Erice, P.A. Felber, E.W. Biersack, G. Urvoy-Keller Institut EURECOM, 06904 Sophia Antipolis, France {garces|felber|erbi|urvoy}@eurecom.fr

Add to Reading List

Source URL: www.e-biersack.eu

Language: English - Date: 2012-10-03 06:39:10
    32

    Hashing it out in public Common failure modes of DHT-based anonymity schemes Andrew Tran Nicholas Hopper

    Add to Reading List

    Source URL: syssec.kaist.ac.kr

    Language: English - Date: 2012-09-03 21:42:59
      33Distributed data storage / Computing / Concurrent computing / Distributed computing / Distributed hash table / Chord / Pastry / Peer-to-peer / Routing / Hash table / Anonymous P2P / Peer-to-Peer Protocol

      Hashing it out in public Common failure modes of DHT-based anonymity schemes Andrew Tran Nicholas Hopper

      Add to Reading List

      Source URL: www-users.cs.umn.edu

      Language: English - Date: 2009-09-02 23:56:34
      34

      Myrmic: Secure and Robust DHT Routing Peng Wang, Nicholas Hopper, Ivan Osipkov and Yongdae Kim ABSTRACT implications, it is natural to expect that if they become popular, they will be targeted by adversaries who can cont

      Add to Reading List

      Source URL: syssec.kaist.ac.kr

      Language: English - Date: 2012-09-03 21:43:01
        35

        IEEE/ACM TRANSACTIONS ON NETWORKING, VOL. 17, NO. 5, OCTOBERLong Term Study of Peer Behavior in the KAD DHT Moritz Steiner, Member, IEEE, Taoufik En-Najjary, and Ernst W. Biersack, Member, IEEE

        Add to Reading List

        Source URL: www.e-biersack.eu

        Language: English - Date: 2012-10-03 06:41:05
          36Computing / Cryptography / Distributed data storage / File sharing / Software / Secure communication / University of Michigan / Vanish / Distributed hash table / Mainline DHT / BitTorrent / Gmail

          Vanish: Increasing Data Privacy with Self-Destructing Data Roxana Geambasu Tadayoshi Kohno Amit A. Levy

          Add to Reading List

          Source URL: amitlevy.com

          Language: English - Date: 2012-07-22 12:12:57
          37

          CONE-DHT: A distributed self-stabilizing algorithm for a heterogeneous storage system arXiv:1307.6747v1 [cs.DC] 25 JulSebastian Kniesburges

          Add to Reading List

          Source URL: www.cs.uni-paderborn.de

          Language: English
            38

            Connectivity Properties of Mainline BitTorrent DHT Nodes

            Add to Reading List

            Source URL: people.kth.se

            Language: English - Date: 2011-06-30 05:23:56
              39Distributed computing / Distributed hash table / Kademlia / Pastry / Chord / Peer-to-peer / Routing / Overlay network / Tapestry / Distributed data storage / Concurrent computing / Computing

              Handling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz University of California, Berkeley and Intel Research, Berkeley {srhea,geels,kubitron}@cs.berkeley.edu,

              Add to Reading List

              Source URL: oceanstore.cs.berkeley.edu

              Language: English - Date: 2003-12-22 17:29:23
              40Pastry / Kademlia / Tapestry / Chord / Peer-to-peer / Routing / Network topology / Tulip Overlay / Distributed data storage / Computing / Distributed hash table

              Appears in Proceedings of the USENIX Annual Technical Conference, JuneHandling Churn in a DHT Sean Rhea, Dennis Geels, Timothy Roscoe, and John Kubiatowicz University of California, Berkeley and Intel Research, B

              Add to Reading List

              Source URL: oceanstore.cs.berkeley.edu

              Language: English - Date: 2004-05-05 14:04:24
              UPDATE