Overlay network

Results: 286



#Item
41Proceedings on Privacy Enhancing Technologies ; ):22–39  Dong Lin, Micah Sherr, and Boon Thau Loo Scalable and Anonymous Group Communication with MTor Abstract: This paper presents MTor, a low-latency anonymous

Proceedings on Privacy Enhancing Technologies ; ):22–39 Dong Lin, Micah Sherr, and Boon Thau Loo Scalable and Anonymous Group Communication with MTor Abstract: This paper presents MTor, a low-latency anonymous

Add to Reading List

Source URL: security.cs.georgetown.edu

Language: English - Date: 2016-07-26 12:57:18
42Secure routing for structured peer-to-peer overlay networks Miguel Castro1 , Peter Druschel2 , Ayalvadi Ganesh1 , Antony Rowstron1 and Dan S. Wallach2 1 Microsoft 2 Rice  Research Ltd., 7 J J Thomson Avenue, Cambridge, C

Secure routing for structured peer-to-peer overlay networks Miguel Castro1 , Peter Druschel2 , Ayalvadi Ganesh1 , Antony Rowstron1 and Dan S. Wallach2 1 Microsoft 2 Rice Research Ltd., 7 J J Thomson Avenue, Cambridge, C

Add to Reading List

Source URL: www.cs.rice.edu

Language: English - Date: 2002-10-11 20:14:20
43FRT-Skip Graph: A Skip Graph-Style Structured Overlay based on Flexible Routing Tables Masashi Hojo†∗ , Ryohei Banno‡† and Kazuyuki Shudo† † Tokyo

FRT-Skip Graph: A Skip Graph-Style Structured Overlay based on Flexible Routing Tables Masashi Hojo†∗ , Ryohei Banno‡† and Kazuyuki Shudo† † Tokyo

Add to Reading List

Source URL: www.shudo.net

Language: English - Date: 2016-06-28 10:59:11
44P3: P2P-based Middleware Enabling Transfer and Aggregation of Computational Resources Kazuyuki Shudo, Yoshio Tanaka, and Satoshi Sekiguchi Grid Technology Research Center National Institute of Advanced Industrial Science

P3: P2P-based Middleware Enabling Transfer and Aggregation of Computational Resources Kazuyuki Shudo, Yoshio Tanaka, and Satoshi Sekiguchi Grid Technology Research Center National Institute of Advanced Industrial Science

Add to Reading List

Source URL: www.shudo.net

Language: English - Date: 2005-06-01 12:49:08
45On Building Onion Routing into Future Internet Architectures⋆ Daniele E. Asoni, Chen Chen, David Barrera, and Adrian Perrig Network Security Group Department of Computer Science ETH Z¨urich

On Building Onion Routing into Future Internet Architectures⋆ Daniele E. Asoni, Chen Chen, David Barrera, and Adrian Perrig Network Security Group Department of Computer Science ETH Z¨urich

Add to Reading List

Source URL: www.netsec.ethz.ch

Language: English - Date: 2016-02-29 10:24:01
46Practical Intrusion-Tolerant Networks Daniel Obenshain∗ , Thomas Tantillo∗ , Amy Babay, John Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, and Cristina Nita-Rotaru Johns Hopkins University — {dano, tantillo

Practical Intrusion-Tolerant Networks Daniel Obenshain∗ , Thomas Tantillo∗ , Amy Babay, John Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, and Cristina Nita-Rotaru Johns Hopkins University — {dano, tantillo

Add to Reading List

Source URL: www.cnds.jhu.edu

Language: English - Date: 2016-04-28 20:17:25
47Noname manuscript No. (will be inserted by the editor) On Performance Evaluation of Swarm-based Live Peer-to-Peer Streaming Applications Reza Rejaie · Nazanin Magharei

Noname manuscript No. (will be inserted by the editor) On Performance Evaluation of Swarm-based Live Peer-to-Peer Streaming Applications Reza Rejaie · Nazanin Magharei

Add to Reading List

Source URL: mirage.cs.uoregon.edu

Language: English - Date: 2014-01-28 14:44:03
481  ISP-friendly Live P2P Streaming Nazanin Magharei, Reza Rejaie, Ivica Rimac, Volker Hilt and Markus Hofmann  Abstract—Swarm-based Peer-to-Peer Streaming (SPS) mechanisms tend to generate a significant amount of costl

1 ISP-friendly Live P2P Streaming Nazanin Magharei, Reza Rejaie, Ivica Rimac, Volker Hilt and Markus Hofmann Abstract—Swarm-based Peer-to-Peer Streaming (SPS) mechanisms tend to generate a significant amount of costl

Add to Reading List

Source URL: mirage.cs.uoregon.edu

Language: English - Date: 2013-08-06 13:20:07
49Practical Intrusion-Tolerant Networks Daniel Obenshain∗ , Thomas Tantillo∗ , Amy Babay, John Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, and Cristina Nita-Rotaru Johns Hopkins University — {dano, tantillo

Practical Intrusion-Tolerant Networks Daniel Obenshain∗ , Thomas Tantillo∗ , Amy Babay, John Schultz, Andrew Newell, Md. Endadul Hoque, Yair Amir, and Cristina Nita-Rotaru Johns Hopkins University — {dano, tantillo

Add to Reading List

Source URL: www.dsn.jhu.edu

Language: English - Date: 2016-04-28 20:17:25
50Concurrent computing / Computing / File sharing networks / Distributed computing / File sharing / Peer-to-peer computing / Network architecture / Digital television / Peer-to-peer / Overlay network / BitTorrent / Streaming media

IEEE COMSOC MMTC E-Letter IEEE COMSOC MMTC E-Letter IEEE COMSOC MMTC E-Letter

Add to Reading List

Source URL: mirage.cs.uoregon.edu

Language: English - Date: 2009-09-30 00:09:07