You are here

Bibliography

Export 135 results:
Author Title Type [ Year(Asc)]
Filters: Keyword is P2P  [Clear All Filters]
2010
Müller A, Evans NS, Grothoff C, Kamkar S. Autonomous NAT Traversal. In: 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). 10th IEEE International Conference on Peer-to-Peer Computing (IEEE P2P'10). Delft, The Netherlands: IEEE; 2010. Available from: http://grothoff.org/christian/pwnat.pdf
Ruottu T. Developing Peer-to-Peer Web Applications. Computer Science. 2010 ;M.S.:66.
Perälä PHJ, Paananen JP, Mukhopadhyay M, Laulajainen J-P. A Novel Testbed for P2P Networks. In: TRIDENTCOM. TRIDENTCOM. ; 2010. pp. 69-83.
Tariq MA, Koldehofe B, Altaweel A, Rothermel K. Providing basic security mechanisms in broker-less publish/subscribe systems. In: DEBS '10: Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems. DEBS '10: Proceedings of the Fourth ACM International Conference on Distributed Event-Based Systems. New York, NY, USA: ACM; 2010. pp. 38–49. Available from: http://portal.acm.org/citation.cfm?id=1827418.1827425&coll=portal&dl=GUIDE#
Hübsch C, Mayer CP, Mies S, Bless R, Waldhorst OP, Zitterbart M. Reconnecting the internet with ariba: self-organizing provisioning of end-to-end connectivity in heterogeneous networks. SIGCOMM Comput. Commun. Rev. [Internet]. 2010 ;40:131–132. Available from: http://portal.acm.org/citation.cfm?doid=1672308.1672334#
2009
Knoll M, Helling M, Wacker A, Holzapfel S, Weis T. Bootstrapping Peer-to-Peer Systems Using IRC. In: WETICE'09 - Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises. WETICE'09 - Proceedings of the 18th IEEE International Workshops on Enabling Technologies: Infrastructures for Collaborative Enterprises. Groningen, The Netherlands: IEEE Computer Society; 2009. pp. 122–127. Available from: http://dx.doi.org/10.1109/WETICE.2009.40
Tran A, Hopper NJ, Kim Y. Hashing it out in public: Common failure modes of DHT-based anonymity schemes. In: Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). Proceedings of the Workshop on Privacy in the Electronic Society (WPES 2009). ACM; 2009. Available from: http://portal.acm.org/citation.cfm?id=1655188.1655199
Vasserman EY, Jansen R, Tyra J, Hopper NJ, Kim Y. Membership-concealing overlay networks. In: Al-Shaer E, Jha S, Keromytis AD Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. Proceedings of the 2009 ACM Conference on Computer and Communications Security, CCS 2009, Chicago, Illinois, USA, November 9-13, 2009. ACM; 2009. pp. 390–399. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653709
Anon. Optimization of distributed services with UNISONO. In: GI/ITG KuVS Fachgespräch NGN Service Delivery Platforms & Service Overlay Networks. GI/ITG KuVS Fachgespräch NGN Service Delivery Platforms & Service Overlay Networks. ; 2009. Available from: http://www.net.in.tum.de/de/mitarbeiter/holz/
Montresor A, Jelasity M, Jesi GP, Voulgaris S. PeerSim: A Scalable P2P Simulator. In: P2P'09 - Proceedings of the 9th International Conference on Peer-to-Peer. P2P'09 - Proceedings of the 9th International Conference on Peer-to-Peer. Seattle, WA; 2009. pp. 99-100. Available from: http://peersim.sourceforge.net/
McLachlan J, Tran A, Hopper NJ, Kim Y. Scalable onion routing with Torsk. In: Proceedings of CCS 2009. Proceedings of CCS 2009. ACM New York, NY, USA; 2009. Available from: http://portal.acm.org/citation.cfm?id=1653662.1653733
Di P, Fuhrmann T. Using link-layer broadcast to improve scalable source routing. In: IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing. IWCMC '09: Proceedings of the 2009 International Conference on Wireless Communications and Mobile Computing. New York, NY, USA: ACM; 2009. pp. 466–471. Available from: http://portal.acm.org/citation.cfm?id=1582481#
2008
Bauer K, McCoy D, Grunwald D, Sicker D. BitBlender: Light-Weight Anonymity for BitTorrent. In: Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008). Proceedings of the Workshop on Applications of Private and Anonymous Communications (AlPACa 2008). Istanbul, Turkey: ACM; 2008. Available from: http://portal.acm.org/citation.cfm?id=1461465
GauthierDickey C, Grothoff C. Bootstrapping of Peer-to-Peer Networks. In: Proceedings of DAS-P2P. Proceedings of DAS-P2P. Turku, Finland: IEEE; 2008. Available from: http://grothoff.org/christian/bootstrap.pdf
Danezis G, Syverson P. Bridging and Fingerprinting: Epistemic Attacks on Route Selection. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 133–150. Available from: http://www.springerlink.com/content/q2r7g81286026576/
Stutzbach D, Rejaie R, Sen S. Characterizing unstructured overlay topologies in modern P2P file-sharing systems. IEEE/ACM Trans. Netw. [Internet]. 2008 ;16:267–280. Available from: http://portal.acm.org/citation.cfm?id=1373992#
McLachlan J, Hopper NJ. Don't Clog the Queue: Circuit Clogging and Mitigation in P2P anonymity schemes. In: Proceedings of Financial Cryptography (FC '08). Proceedings of Financial Cryptography (FC '08). Springer-Verlag Berlin, Heidelberg; 2008. Available from: http://portal.acm.org/citation.cfm?id=1428551
Amann B, Elser B, Houri Y, Fuhrmann T. IgorFs: A Distributed P2P File System. In: Peer-to-Peer Computing. Peer-to-Peer Computing. ; 2008. pp. 77-78. Available from: http://www.pubzone.org/dblp/conf/p2p/AmannEHF08
Aggarwal V, Akonjang O, Feldmann A. Improving User and ISP Experience through ISP-aided P2P Locality. In: GI'08. Proceedings of 11th IEEE Global Internet Symposium 2008. GI'08. Proceedings of 11th IEEE Global Internet Symposium 2008. Phoenix, AZ: IEEE Computer Society; 2008.
Mittal P, Borisov N. Information Leaks in Structured Peer-to-peer Anonymous Communication Systems. In: Syverson P, Jha S, Zhang X Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Proceedings of the 15th ACM Conference on Computer and Communications Security (CCS 2008). Alexandria, Virginia, USA: ACM Press; 2008. pp. 267–278. Available from: http://portal.acm.org/citation.cfm?id=1455805
Xie H, Yang RY, Krishnamurthy A, Liu YG, Silberschatz A. P4P: Provider Portal for Applications. SIGCOMM Computer Communication Review [Internet]. 2008 ;38(4):351–362. Available from: http://doi.acm.org/10.1145/1402946.1402999
Di P, Kutzner K, Fuhrmann T. Providing KBR Service for Multiple Applications. In: The 7th International Workshop on Peer-to-Peer Systems (IPTPS '08). The 7th International Workshop on Peer-to-Peer Systems (IPTPS '08). St. Petersburg, U.S.; 2008. Available from: http://i30www.ira.uka.de/research/publications/p2p/
Androulaki E, Choi SG, Bellovin SM, Malkin T. Reputation Systems for Anonymous Networks. In: Borisov N, Goldberg I Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Proceedings of the Eighth International Symposium on Privacy Enhancing Technologies (PETS 2008). Leuven, Belgium: Springer; 2008. pp. 202–218. Available from: http://portal.acm.org/citation.cfm?id=1428259.1428272
Wang C-C, Harfoush K. Shortest-path routing in randomized DHT-based Peer-to-Peer systems. Comput. Netw. [Internet]. 2008 ;52:3307–3317. Available from: http://portal.acm.org/citation.cfm?id=1461118#

Pages