Darknet

Results: 45



#Item
41Computing / File sharing / Internet privacy / Darknet / WASTE / Public-key cryptography / Peer-to-peer / Public key fingerprint / Usability / Software / Cryptography / File sharing networks

Establishing Darknet Connections: An Evaluation of Usability and Security John Bethencourt Wai Yong Low

Add to Reading List

Source URL: cups.cs.cmu.edu

Language: English - Date: 2007-06-22 15:47:38
42Computer network security / Internet protocols / Cyberwarfare / Denial-of-service attack / Denial-of-service attacks / Internet Relay Chat / Router / Tcpdump / Black hole / Software / Computing / Network architecture

Darknet and Black Hole Monitoring a Journey into Typographic Errors Alexandre Dulaunoy CIRCL TLP:WHITE Team CIRCL - Team Restena

Add to Reading List

Source URL: www.circl.lu

Language: English - Date: 2014-05-19 04:13:02
43Concurrent computing / File sharing / Virtual private networks / Darknet / Freenet / Copyright law / Peer-to-peer / WASTE / Digital rights management / Computing / File sharing networks / Software

The Darknet and the Future of Content Distribution Peter Biddle, Paul England, Marcus Peinado, and Bryan Willman

Add to Reading List

Source URL: crypto.stanford.edu

Language: English - Date: 2002-10-17 15:49:49
44File sharing / Peer-to-peer computing / Distributed data storage / Intellectual property law / Peer-to-peer / Darknet / Social peer-to-peer processes / Client–server model / HTTP / Computing / Concurrent computing / Distributed computing

Richmond Journal of Law & Technology Volume XVI, Issue 4

Add to Reading List

Source URL: jolt.richmond.edu

Language: English - Date: 2010-11-23 11:14:29
45File sharing / Distributed computing / Intellectual property law / Cross-platform software / Darknet / Freenet / Peer-to-peer / Gnutella / Social peer-to-peer processes / Computing / File sharing networks / Concurrent computing

PDF Document

Add to Reading List

Source URL: msl1.mit.edu

Language: English - Date: 2002-11-21 08:49:49
UPDATE