P2P

Results: 881



#Item
361Peer-to-peer / Distributed hash table / Computer cluster / Chord / Pastry / Scalability / Gossip protocol / Resource reservation protocol / Freenet / Computing / Concurrent computing / Distributed data storage

CycloidGrid: A proximity-aware P2P-based resource discovery architecture in volunteer computing systems

Add to Reading List

Source URL: www.cloudbus.org

Language: English - Date: 2013-05-06 05:37:36
362Internet / Telecommunications / Telecommunications data retention / Computers /  Freedom and Privacy Conference / Brewster Kahle / File sharing / ANts P2P / Peer-to-peer / Internet privacy / Computing / Intellectual property law / Technology

The Future of File Sharing: Panel Discusses Artists’ Compensation for Peer-to-Peer By Aaron Perzanowski Facing the Music, a Thursday concurrent session moderated by Wayne State University Law School’s Professor Jessi

Add to Reading List

Source URL: cfp2004.org

Language: English - Date: 2004-04-26 11:52:52
363International relations / Political philosophy / Politics of Europe / European Union / Federalism / European External Action Service

Announcement on 2013 People to People (P2P) Programme (The role of civil society in the promotion of social rights, 24-27 January 2012, Brussels) Within the framework of Turkey’s negotiation process for full membership

Add to Reading List

Source URL: avrupa.info.tr

Language: English - Date: 2014-03-07 16:30:34
364Computing / Onion routing / Tor / Bitcoin / Public-key cryptography / ANts P2P / Traffic analysis / Cryptography / Software / Internet privacy

PoSA v3.0 A trustless, anonymous transaction system for CloakCoin. 27th AprilAbstract CloakCoin is a cryptocurrency designed to facilitate trustless and anonymous, decentralized

Add to Reading List

Source URL: www.cloakcoin.com

Language: English - Date: 2015-04-26 21:05:00
365Concurrent computing / Freenet / Distributed hash table / Peer-to-peer / Routing / Network topology / ANts P2P / Chord / Small world routing / Distributed data storage / Computing / Software

Private Communication Through a Network of Trusted Connections: The Dark Freenet Ian Clarke ⋆ , Oskar Sandberg ⋆⋆

Add to Reading List

Source URL: freenetproject.org

Language: English - Date: 2010-03-09 08:45:21
366File sharing networks / Computer law / Gowers Review of Intellectual Property / Copyright infringement / Peer-to-peer / Copyright / Legal aspects of file sharing / Graduated response / Law / Intellectual property law / United Kingdom copyright law

CONSULTATION ON LEGISLATIVE OPTIONS TO ADDRESS ILLICIT PEER-TO-PEER (P2P) FILESHARING JULY 2008 2

Add to Reading List

Source URL: www.allianceforip.co.uk

Language: English - Date: 2014-10-30 12:46:18
367Computing / Onion routing / Tor / Bitcoin / Public-key cryptography / ANts P2P / Traffic analysis / Cryptography / Software / Internet privacy

PoSA v3.0 A trustless, anonymous transaction system for CloakCoin. 27th AprilAbstract CloakCoin is a cryptocurrency designed to facilitate trustless and anonymous, decentralized

Add to Reading List

Source URL: cloakcoin.com

Language: English - Date: 2015-04-26 21:05:00
368Cyberwarfare / Homomorphic encryption / Electronic commerce / Applied mathematics / Security / RSA / ANts P2P / Public-key cryptography / Cryptography / Paillier cryptosystem

Sorting and Searching Behind the Curtain Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data* Foteini Baldimtsi1 and Olga Ohrimenko2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-27 11:25:46
369File sharing / Cross-platform software / Freenet / Concurrent computing / Distributed hash table / Peer-to-peer / Darknet / Routing / Anonymous P2P / Software / Computing / Distributed data storage

PDF Document

Add to Reading List

Source URL: freenetproject.org

Language: English - Date: 2014-07-05 21:42:09
370Security / Computing / Cryptographic protocols / Direct Anonymous Attestation / Bitcoin / Credential / Proof of knowledge / Anonymous P2P / Authentication / Cryptography / Internet privacy / Identity management

Decentralized Anonymous Credentials Christina Garman, Matthew Green, Ian Miers The Johns Hopkins University Department of Computer Science, Baltimore, USA {cgarman, mgreen, imiers}@cs.jhu.edu October 15, 2013 Abstract

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2013-10-15 14:07:46
UPDATE