Privacy in file sharing networks

Results: 39



#Item
1File sharing networks / File sharing / Distributed data storage / Computing / Peer-to-peer / Gnutella / Chord / Digital audio / Digital rights / Privacy in file sharing networks / Distributed hash table

Answering Similarity Queries in Peer-to-Peer Networks ? Panos Kalnis ∗ Wee Siong Ng Beng Chin Ooi Kian-Lee Tan Department of Computer Science National University of Singapore 3 Science Drive 2, Singapore

Add to Reading List

Source URL: www.comp.nus.edu.sg

Language: English - Date: 2004-11-23 03:44:44
2File sharing networks / Computing / File sharing / Concurrent computing / Distributed data storage / Intellectual property law / Gnutella / Privacy in file sharing networks / Peer-to-peer / GiFT / Chord / Scalability

Intelligent Club Management in Peer-to-Peer Networks Atip Asvanund*, Sarvesh Bagla**, Munjal H. Kapadia**, Ramayya Krishnan*, Michael D. Smith*, Rahul Telang* *Heinz School of Public Policy and Management, CMU

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-11-30 14:31:59
3File sharing / Computing / Intellectual property law / Concurrent computing / Gnutella / Peer-to-peer / BitTorrent / EDonkey2000 / Social peer-to-peer processes / Privacy in file sharing networks / Proactive network provider participation for P2P

../fig/ton-2006-sampling/empirical.tex

Add to Reading List

Source URL: mirage.cs.uoregon.edu

Language: English - Date: 2008-11-30 14:08:38
4Software / File sharing networks / Computing / Globally unique identifier / Gnutella / EMule / File sharing / Peer-to-peer / Ares Galaxy / Privacy in file sharing networks

Measurement and Analysis of Child Pornography Trafficking on P2P Networks Ryan Hurley, Swagatika Prusty, Hamed Soroush, Robert J. Walls Jeannie Albrecht† , Emmanuel Cecchet, Brian Neil Levine Marc Liberatore, Brian Lyn

Add to Reading List

Source URL: www2013.wwwconference.org

Language: English - Date: 2014-07-21 08:47:08
5File sharing networks / Internet privacy / Peer-to-peer / Client–server model / Computer network / Port / Tor / Host / Content delivery network / Computing / Software / Concurrent computing

Microsoft PowerPoint - mnet_02_Application_Layer_2010_11_05_v6

Add to Reading List

Source URL: www.net.in.tum.de

Language: English - Date: 2010-11-05 06:10:42
6File sharing networks / Sexual abuse / Peer-to-peer / Child pornography / ANts P2P / HTTP / Child sexual abuse / Social peer-to-peer processes / Concurrent computing / Distributed computing / Computing

2014 IEEE Security and Privacy Workshops iCOP: Automatically Identifying New Child Abuse Media in P2P Networks Claudia Peersman∗ , Christian Schulze† , Awais Rashid∗ , Margaret Brennan‡ and Carl Fischer∗ ∗ S

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2014-04-30 03:11:09
7Internet privacy / Cross-platform software / Online chat / File sharing networks / Distributed computing architecture / Freenet / I2P / Peer-to-peer / Internet Relay Chat / Computing / Software / Internet

Scalable Anonymous Group Communication in the Anytrust Model David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University {david.wolinsky, henry.corrigan-gibbs, bryan.ford}@yale.edu Aaron Johnson

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2012-05-12 17:14:46
8Cross-platform software / Internet privacy / File sharing networks / Distributed data storage / Proxy server / ASP.NET / Apache HTTP Server / World Wide Web / HTTP cookie / Computing / Software / Scripting languages

Na Kika: Secure Service Execution and Composition in an Open Edge-Side Computing Network Robert Grimm, Guy Lichtman, Nikolaos Michalakis, Amos Elliston, Adam Kravetz, Jonathan Miller, and Sajid Raza New York University A

Add to Reading List

Source URL: www.cs.nyu.edu

Language: English - Date: 2006-03-28 16:27:15
9Software / File sharing networks / Internet Relay Chat / Online chat / Peer-to-peer / Tor / Email / Client–server model / Anonymizer / Computing / Internet / Internet privacy

Dissent in Numbers: Making Strong Anonymity Scale David Isaac Wolinsky, Henry Corrigan-Gibbs, and Bryan Ford Yale University Aaron Johnson U.S. Naval Research Laboratory

Add to Reading List

Source URL: www.ohmygodel.com

Language: English - Date: 2012-10-05 11:56:17
10Network architecture / Whois / Domain Name System / JSON / Hypertext Transfer Protocol / Representational state transfer / Domain name / Privacy in file sharing networks / Fragment identifier / Computing / Internet protocols / Internet

draft-ietf-weirds-using-http-08 - HTTP usage in the Registration Data Access Protocol RDAP‚

Add to Reading List

Source URL: www.sidn.nl

Language: English - Date: 2014-06-13 09:42:53
UPDATE