Filters
Show more
Show more
Show more
Show more
Show more
Show more
Show more
Show more
More filters
Results
Peer-to-peer Networks: Security Analysis
, specifically peer-to-peer networks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them with real world data. This could be useful for creating models of
JC - Počítačový hardware a software
- 2009 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Malware Spreading Models in Peer-to-peer Networks
In this article we are dealing with security problems of peer-to-peer networks, with malware propagation model, establishing empirical model of file propagation in peer-to-peer networks and we are...
JC - Počítačový hardware a software
- 2008 •
- D
Rok uplatnění
D - Stať ve sborníku
Peer-to-peer networks security
in peer-to-peer etworks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them against real world data. This should leadto creation of models for peer-to-p...
JC - Počítačový hardware a software
- 2008 •
- D
Rok uplatnění
D - Stať ve sborníku
Anonymous P2P networks - users strike back
The article describes the anonymisation methods in peer-to-peer networks.
JC - Počítačový hardware a software
- 2006 •
- Jx
Rok uplatnění
Jx - Nezařazeno - Článek v odborném periodiku (Jimp, Jsc a Jost)
Similarity Searching: Towards Bulk-loading Peer-to-Peer Networks
is based on the peer-to-peer (P2P) network paradigm and the metric-space model of similarity. When a large volume of data is being inserted, the P2P network must expand to new peers in order to maintain i...
IN - Informatika
- 2008 •
- D
Rok uplatnění
D - Stať ve sborníku
Implementation of P2P Reflector Network in JXTA Environment
This paper decribes implementation of UDP packet reflector networks based on peer-to-peer networking paradigms to retain user-empowered principle of standalone reflector. Implementation is based on JXTA....
JC - Počítačový hardware a software
- 2005 •
- D
Rok uplatnění
D - Stať ve sborníku
Security in Peer-to-Peer Networks: Empiric model of file diffusion in BitTorrent
In this work we analyze propagation of files in the BitTorrent network. The paper covers security problems in peer-to-peer networks and establishes a malware propagation model. We give overview of existing models a...
JC - Počítačový hardware a software
- 2009 •
- D
Rok uplatnění
D - Stať ve sborníku
BubbleTrust: A Reliable Trust Management for Large P2P Networks
The open and anonymous nature of peer-to-peer (P2P) networks creates almost separately as a participant in network services and as a participant in the TM. The peer to establish trust relationships between...
IN - Informatika
- 2010 •
- O
Rok uplatnění
O - Ostatní výsledky
Load Balancing in Peer-to-Peer Data Networks
One of the issues considered in all Peer-to-Peer Data Networks, or Structured in the network. Whilst this issue is well defined and basically solved for systems applicable for similarity search networks. W...
IN - Informatika
- 2006 •
- D
Rok uplatnění
D - Stať ve sborníku
ELISA: Extensible Layer for Internet Services and Applications
Peer-to-peer systems gain on popularity due to the benefits of decentralization streaming, while providing self.scalability and resilience towards network changes. In this paper we introduce a peer-to-peer...
IN - Informatika
- 2013 •
- D
Rok uplatnění
D - Stať ve sborníku
- 1 - 10 out of 39 703