1![Appears in Proc. of ACM/IFIP/USENIX Intl. Middleware Conf. (MiddlewareApproximate Object Location and Spam Filtering on Peer-to-peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, and J Appears in Proc. of ACM/IFIP/USENIX Intl. Middleware Conf. (MiddlewareApproximate Object Location and Spam Filtering on Peer-to-peer Systems Feng Zhou, Li Zhuang, Ben Y. Zhao, Ling Huang, Anthony D. Joseph, and J](https://www.pdfsearch.io/img/0adb2cfe2fb2107d25e418fd25568abb.jpg) | Add to Reading ListSource URL: oceanstore.cs.berkeley.eduLanguage: English - Date: 2003-03-14 22:52:22
|
---|
2![Poster: Blindspot: Indistinguishable Anonymous Communications Joseph Gardiner, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA Poster: Blindspot: Indistinguishable Anonymous Communications Joseph Gardiner, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA](https://www.pdfsearch.io/img/b09f424bd49de311a08713e6e4a72b10.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2015-05-11 16:42:33
|
---|
3![2014 IEEE Security and Privacy Workshops iCOP: Automatically Identifying New Child Abuse Media in P2P Networks Claudia Peersman∗ , Christian Schulze† , Awais Rashid∗ , Margaret Brennan‡ and Carl Fischer∗ ∗ S 2014 IEEE Security and Privacy Workshops iCOP: Automatically Identifying New Child Abuse Media in P2P Networks Claudia Peersman∗ , Christian Schulze† , Awais Rashid∗ , Margaret Brennan‡ and Carl Fischer∗ ∗ S](https://www.pdfsearch.io/img/da29edfdaa4f270ddea24763bd32f77d.jpg) | Add to Reading ListSource URL: www.ieee-security.orgLanguage: English - Date: 2014-04-30 03:11:09
|
---|
4![Distributed Middleware Architectures for Scalable Media Services V. Kalogeraki, D. Zeinalipour-Yazti ∗, D. Gunopulos Department of Computer Science and Engineering University of California - Riverside Riverside, CA 925 Distributed Middleware Architectures for Scalable Media Services V. Kalogeraki, D. Zeinalipour-Yazti ∗, D. Gunopulos Department of Computer Science and Engineering University of California - Riverside Riverside, CA 925](https://www.pdfsearch.io/img/97356d8a6acd1353acfbdee771f886b9.jpg) | Add to Reading ListSource URL: www.cs.ucy.ac.cyLanguage: English - Date: 2012-06-20 14:59:28
|
---|
5![2014 IEEE Security and Privacy Workshops PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations Pratik Narang, Subhajit Ray, Chittaranjan Hota 2014 IEEE Security and Privacy Workshops PeerShark: Detecting Peer-to-Peer Botnets by Tracking Conversations Pratik Narang, Subhajit Ray, Chittaranjan Hota](https://www.pdfsearch.io/img/36f781c463b9494840dbbee3d60c74b5.jpg) | Add to Reading ListSource URL: ieee-security.orgLanguage: English - Date: 2014-04-30 03:11:19
|
---|
6![1 A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks Bridge Qiao Zhao, John C.S. Lui, Fellow, ACM/IEEE, Dah-Ming Chiu, Fellow, IEEE 1 A Mathematical Framework for Analyzing Adaptive Incentive Protocols in P2P Networks Bridge Qiao Zhao, John C.S. Lui, Fellow, ACM/IEEE, Dah-Ming Chiu, Fellow, IEEE](https://www.pdfsearch.io/img/2f269a63b98a66d30273295fd718cc0a.jpg) | Add to Reading ListSource URL: www.cs.cuhk.hkLanguage: English - Date: 2011-07-14 20:48:38
|
---|
7![INADVERTENT FILE SHARING OVER PEER-TO-PEER NETWORKS HEARING BEFORE THE INADVERTENT FILE SHARING OVER PEER-TO-PEER NETWORKS HEARING BEFORE THE](https://www.pdfsearch.io/img/a139d2da3875434f067e3a9d63825c69.jpg) | Add to Reading ListSource URL: house.resource.orgLanguage: English - Date: 2011-02-09 15:30:04
|
---|
8![On Detecting Malicious Behaviors in Interactive Networks: Algorithms and Analysis Yongkun Li, John C.S. Lui On Detecting Malicious Behaviors in Interactive Networks: Algorithms and Analysis Yongkun Li, John C.S. Lui](https://www.pdfsearch.io/img/3a02fb0233891e1a421a1c6b5b96b088.jpg) | Add to Reading ListSource URL: www.cs.cuhk.hkLanguage: English - Date: 2011-12-10 04:32:26
|
---|
9![Usable Secure Private Search Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin and Salvatore J. Stolfo Department of Computer Science Columbia University New York NY, 10027, USA Usable Secure Private Search Mariana Raykova, Ang Cui, Binh Vo, Bin Liu, Tal Malkin, Steven M. Bellovin and Salvatore J. Stolfo Department of Computer Science Columbia University New York NY, 10027, USA](https://www.pdfsearch.io/img/eece7086f8e845c290b4a2b0126faafb.jpg) | Add to Reading ListSource URL: www.redballoonsecurity.comLanguage: English - Date: 2014-02-27 21:40:34
|
---|
10![Combining the use of clustering and scale-free nature of user exchanges into a simple and efficient P2P system⋆ Pierre Fraigniaud 1 , Philippe Gauron 2 , and Matthieu Latapy 3 1 Combining the use of clustering and scale-free nature of user exchanges into a simple and efficient P2P system⋆ Pierre Fraigniaud 1 , Philippe Gauron 2 , and Matthieu Latapy 3 1](https://www.pdfsearch.io/img/b79ed233c5ff8e2c5ea20f7c2828f013.jpg) | Add to Reading ListSource URL: www.liafa.jussieu.frLanguage: English - Date: 2007-01-17 10:04:36
|
---|