ANts P2P

Results: 204



#Item
41Cyberwarfare / Homomorphic encryption / Electronic commerce / Applied mathematics / Security / RSA / ANts P2P / Public-key cryptography / Cryptography / Paillier cryptosystem

Sorting and Searching Behind the Curtain Private Outsourced Sort and Frequency-Based Ranking of Search Results Over Encrypted Data* Foteini Baldimtsi1 and Olga Ohrimenko2 1

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2014-12-27 11:25:46
42System software / Computer security / Intrusion detection system / Snort / Node / Peer-to-peer / ANts P2P / Blacklist / Microsoft SQL Server / Computing / Software / Computer network security

Global Intrusion Detection in the DOMINO Overlay System Vinod Yegneswaran Paul Barford ∗

Add to Reading List

Source URL: www.isoc.org

Language: English - Date: 2004-11-17 13:32:19
43Internet / Tor / Email / Anonymity / ANts P2P / Traffic analysis / Anonymous web browsing / Onion routing / I2P / Internet privacy / Software / Computing

Tor: Anonymous Internet communication Steven J. Murdoch Computer Laboratory Security Group

Add to Reading List

Source URL: www.cl.cam.ac.uk

Language: English - Date: 2013-09-24 13:58:53
44Data management / Distributed data storage / File sharing networks / Database management systems / Data modeling / Peer-to-peer / Federated database system / Data integration / ANts P2P / Computing / Concurrent computing / Distributed computing

iXPeer: Implementing layers of abstraction in P2P Schema Mapping using AutoMed Zohra Bellahsene ` Charalambos Lazanitis

Add to Reading List

Source URL: www.doc.ic.ac.uk

Language: English - Date: 2006-04-24 09:02:08
45Peer-to-peer / Grid computing / Tuple space / Chord / ANts P2P / Resource / Computing / Concurrent computing / Distributed data storage

Peer-to-Peer Tuple Space: A Novel Protocol for Coordinated Resource Provisioning Rajiv Ranjan, Aaron Harwood, Rajkumar Buyya GRIDS Lab and P2P Group Computer Science and Software Engineering Department The University of

Add to Reading List

Source URL: www.cloudbus.org

Language: English - Date: 2007-08-13 06:58:45
46Internet privacy / Distributed data storage / Cross-platform software / File sharing networks / Freenet / Peer-to-peer / ANts P2P / Tor / Pastry / Software / Computing / System software

Eluding Carnivores: File Sharing with Strong Anonymity Emin G¨un Sirer, Sharad Goel, Mark Robson, Doˇgan Engin Dept. of Computer Science, Cornell University August 1, 2004 Abstract

Add to Reading List

Source URL: www.cs.cornell.edu

Language: English - Date: 2004-09-17 01:06:27
47File sharing networks / Intellectual property law / BitTorrent / Distributed data storage / Peer-to-peer computing / File sharing / Peer-to-peer / HTTP / ANts P2P / Computing / Concurrent computing / Distributed computing

Citation: Global Networks 13, [removed]–329. ISSN 1470–2266. The definitive version is available at www.blackwell-synergy.com Published version: http://onlinelibrary.wiley.com/doi[removed]glob[removed]issue-3/issu

Add to Reading List

Source URL: gashgirl.sysx.org

Language: English - Date: 2015-03-30 07:39:17
48Routing protocols / Computer networking / Internet protocols / Ant colony optimization algorithms / Stochastic optimization / Router / Routing / ANts P2P / Computer network / Computing / Network architecture / Internet

Realization of a Distributed Route Management System on Software Routers Anders Mykkeltveit1,2 Poul E. Heegaard1, ∗ Otto Wittner2 1 Deptartment of Telematics,

Add to Reading List

Source URL: www.nik.no

Language: English - Date: 2004-12-12 14:24:45
49File sharing networks / Distributed data storage / Intellectual property law / File sharing / Peer-to-peer / ANts P2P / JXTA / Freenet / Ant / Computing / Concurrent computing / Distributed computing

Anthill: A Framework for the Development of Agent-Based Peer-to-Peer Systems ¨ Ozalp Babao˘glu ∗ Hein Meling ‡

Add to Reading List

Source URL: www.ux.uis.no

Language: English - Date: 2014-11-29 05:01:27
50Computer security / Middlebox / Snort / Deep packet inspection / ANts P2P / Intrusion detection system / HTTP Secure / Computer network security / Computing / Software

BlindBox: Deep Packet Inspection over Encrypted Traffic Justine Sherry Chang Lan Raluca Ada Popa Sylvia Ratnasamy

Add to Reading List

Source URL: eprint.iacr.org

Language: English - Date: 2015-03-23 09:24:18
UPDATE