P2P

Results: 881



#Item
471Free software / GNUnet / Peer-to-peer / Gnutella / Node / Peer-to-Peer Protocol / Host / Freenet / Anonymous P2P / Software / Computing / File sharing networks

An Excess-Based Economic Model for Resource Allocation in Peer-to-Peer Networks Christian Grothoff Department of Computer Sciences, Purdue University [removed] http://www.gnu.org/software/GNUnet/

Add to Reading List

Source URL: grothoff.org

Language: English - Date: 2014-10-15 14:08:35
472Banking / Credit / Digital technology / Person-to-person lending / Microcredit / Bank / Biometric passport / Internet / Financial economics / Economics / Security

What is … Person-to-person lending Unlike traditional credit that is granted by a bank, P2P lending puts a creditor in direct contact with a debtor, there is no middleman. The Internet

Add to Reading List

Source URL: activeidentity.naehrstoff.ch

Language: English - Date: 2010-06-04 07:00:39
473Law / File sharing / BitTorrent / Peer-to-peer / Copyright infringement / Grokster / Social peer-to-peer processes / ANts P2P / Legal aspects of file sharing / Computing / Intellectual property law / File sharing networks

Microsoft Word - Feasibility-Study-p2p-acs_Nantes.doc

Add to Reading List

Source URL: www.privatkopie.net

Language: English - Date: 2006-04-19 17:43:52
474Computer security / Denial-of-service attack / Transmission Control Protocol / SYN flood / Spoofing attack / Firewall / Transport Layer Security / Man-in-the-middle attack / IP address spoofing / Computer network security / Cyberwarfare / Computing

EE122 Section 12 – Security Question 1 – Crackdown on P2P In 2007, a large broadband provider in the US disrupted end users’ BitTorrent connections with a layer-4 Denial-of-Service (DoS) attack. The provider identi

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2013-12-10 23:49:52
475Virtual communities / Internet / File sharing / Online music stores / Intellectual property law / Napster / Kazaa / Gnutella / Justin Frankel / Computing / File sharing networks / Software

Information = Politics[removed]P2P: Power to the People J A N KO R Ö T T G E R S ooner or later the Napster story will hit the big screen. Copyright-Catfight, orchestrated by Hollywood. It will be the story of Shawn Fan

Add to Reading List

Source URL: archive.sarai.net

Language: English - Date: 2014-03-16 01:14:18
476Computer network security / Denial-of-service attacks / Cryptographic protocols / Secure communication / BitTorrent / Denial-of-service attack / Transmission Control Protocol / Man-in-the-middle attack / HTTP Secure / Computing / Software / Cryptography

EE122 Section 12 – Security Question 1 – Crackdown on P2P In 2007, a large broadband provider in the US disrupted end users’ BitTorrent connections with a layer-4 Denial-of-Service (DoS) attack. The provider identi

Add to Reading List

Source URL: www-inst.eecs.berkeley.edu

Language: English - Date: 2013-12-10 23:49:52
477Intellectual property law / File sharing / Web 2.0 / Peer-to-peer file sharing / Peer-to-peer / LimeWire / Copyright infringement / Social peer-to-peer processes / Kazaa / Software / Computing / Law

[removed]PEER-TO-PEER FILE SHARING—PROCEDURE 1. PURPOSE The use of Peer-to-Peer (“P2P”) file sharing applications may have significant legal implications concerning the violation of copyright laws. Additionally P2P

Add to Reading List

Source URL: www.coconino.edu

Language: English - Date: 2014-02-25 11:29:28
478Videotelephony / Skype / Internet standards / Cross-platform software / Portable software / Voice over IP / IP address / BitTorrent / Communications protocol / Software / Computing / Network architecture

I Know Where You are and What You are Sharing: Exploiting P2P Communications to Invade Users’ Privacy Stevens Le Blond∗ Chao Zhang† Arnaud Legout‡ Keith Ross† Walid Dabbous‡ arXiv:1109.4039v3 [cs.NI] 16 Oct 2

Add to Reading List

Source URL: arxiv.org

Language: English - Date: 2011-10-17 23:19:56
479Internet Protocol / Tunneling protocols / Internet protocols / Cryptographic protocols / Teredo tunneling / IPsec / User Datagram Protocol / Internet Key Exchange / Network architecture / Internet / IPv6

Xbox One Technical information on P2P Networking Behavior Version 1.0 Last updated: October 6, 2013 Many gaming and app scenarios on Xbox® One rely on low-latency peer-to-peer (P2P) networking capabilities. The platfor

Add to Reading List

Source URL: download.microsoft.com

Language: English - Date: 2013-10-07 13:27:07
480File sharing / BitTorrent / Intellectual property law / Distributed data storage / Peer-to-peer / Gnutella / Phex / Ares Galaxy / ANts P2P / Software / Computing / File sharing networks

d i g i t a l i n v e s t i g a t i o n[removed]S 9 5 eS[removed]available at www.sciencedirect.com journal homepage: www.elsevier.com/locate/diin

Add to Reading List

Source URL: www.dfrws.org

Language: English - Date: 2010-07-28 09:43:15
UPDATE