All
All

What are you looking for?

All
Projects
Organizations

Quick search

  • Projects supported by TA ČR
  • Excellent projects
  • Projects with the highest public support
  • Current projects

Smart search

  • That is how I find a specific +word
  • That is how I leave the -word out of the results
  • “That is how I can find the whole phrase”

Filters

-
19912024

Join usingOrAnd

Join usingOrAnd

SelectAll/None
  • Show more

SelectAll/None
  • Show more

      • Show more

      • Show more

      • Show more

      • Show more

    • Show more

SelectAll/None
  • Show more

More filters

Results

39 703 results (1,675s)

Result

Peer-to-peer Networks: Security Analysis

, specifically peer-to-peer networks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them with real world data. This could be useful for creating models of

JC - Počítačový hardware a software

  • 2009
  • Jx
Result

Malware Spreading Models in Peer-to-peer Networks

In this article we are dealing with security problems of peer-to-peer networks, with malware propagation model, establishing empirical model of file propagation in peer-to-peer networks and we are...

JC - Počítačový hardware a software

  • 2008
  • D
Result

Peer-to-peer networks security

in peer-to-peer etworks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them against real world data. This should leadto creation of models for peer-to-p...

JC - Počítačový hardware a software

  • 2008
  • D
Result

Anonymous P2P networks - users strike back

The article describes the anonymisation methods in peer-to-peer networks.

JC - Počítačový hardware a software

  • 2006
  • Jx
Result

Similarity Searching: Towards Bulk-loading Peer-to-Peer Networks

is based on the peer-to-peer (P2P) network paradigm and the metric-space model of similarity. When a large volume of data is being inserted, the P2P network must expand to new peers in order to maintain i...

IN - Informatika

  • 2008
  • D
Result

Implementation of P2P Reflector Network in JXTA Environment

This paper decribes implementation of UDP packet reflector networks based on peer-to-peer networking paradigms to retain user-empowered principle of standalone reflector. Implementation is based on JXTA....

JC - Počítačový hardware a software

  • 2005
  • D
Result

Security in Peer-to-Peer Networks: Empiric model of file diffusion in BitTorrent

In this work we analyze propagation of files in the BitTorrent network. The paper covers security problems in peer-to-peer networks and establishes a malware propagation model. We give overview of existing models a...

JC - Počítačový hardware a software

  • 2009
  • D
Result

BubbleTrust: A Reliable Trust Management for Large P2P Networks

The open and anonymous nature of peer-to-peer (P2P) networks creates almost separately as a participant in network services and as a participant in the TM. The peer to establish trust relationships between...

IN - Informatika

  • 2010
  • O
Result

Load Balancing in Peer-to-Peer Data Networks

One of the issues considered in all Peer-to-Peer Data Networks, or Structured in the network. Whilst this issue is well defined and basically solved for systems applicable for similarity search networks. W...

IN - Informatika

  • 2006
  • D
Result

ELISA: Extensible Layer for Internet Services and Applications

Peer-to-peer systems gain on popularity due to the benefits of decentralization streaming, while providing self.scalability and resilience towards network changes. In this paper we introduce a peer-to-peer...

IN - Informatika

  • 2013
  • D
  • 1 - 10 out of 39 703