<--- Back to Details
First PageDocument Content
Distributed data storage / Internet privacy / Cross-platform software / I2P / Kademlia / Computer networking / GNUnet / Kad network / Peer-to-peer / Software / Computing / File sharing networks
Date: 2011-07-25 05:22:45
Distributed data storage
Internet privacy
Cross-platform software
I2P
Kademlia
Computer networking
GNUnet
Kad network
Peer-to-peer
Software
Computing
File sharing networks

Add to Reading List

Source URL: www.syssec-project.eu

Download Document from Source Website

File Size: 288,36 KB

Share Document on Facebook

Similar Documents

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim University of Minnesota - Twin Cities 200 Union Street SE Minneapolis, MN 55455

DocID: 1sJoE - View Document

Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

DocID: 1sIQp - View Document

File sharing networks / Computing / Software / File sharing / EDonkey network / Kad network / EMule / Peer-to-peer / Gnutella / Distributed hash table / Kademlia / BitTorrent

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

DocID: 1r92H - View Document

File sharing networks / Software / Computing / File sharing / EDonkey network / Kad network / EMule / Peer-to-peer / Distributed hash table / Kademlia / BitTorrent / Gnutella

Poisoning the Kad Network

DocID: 1r1lv - View Document

Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

DocID: 1qHqY - View Document