Anonymous P2P

Results: 58



#Item
1File sharing / Intellectual property law / Computing / Law / Peer-to-peer / Peer-to-peer file sharing / Copyright infringement / Social peer-to-peer processes / Share / Torrent poisoning / Anonymous P2P

INFORMATION TECHNOLOGY STANDARD ADMINISTRATIVE PROCEDURES SAP NoW1.17 Information Resources – Use Peer-to-Peer File Sharing Software Approved: April 15, 2005 Last Revised: August 31, 2011

Add to Reading List

Source URL: wtamu.edu

Language: English - Date: 2016-03-29 12:10:49
2Computing / Cryptography / Internet / Internet privacy / Secure communication / Anonymous remailer / Crypto-anarchism / Pseudonymity / Anonymity / Mix network / Traffic analysis / Tor

Reputation in P2P Anonymity Systems Roger Dingledine The Free Haven Project Nick Mathewson

Add to Reading List

Source URL: netecon.seas.harvard.edu

Language: English - Date: 2009-11-30 14:32:00
3File sharing networks / Computing / File sharing / Concurrent computing / Peer-to-peer / Gnutella / BitTorrent / Freenet / EigenTrust / Anonymous P2P

Reputation Management in P2P Systems Pradipta Mitra Nov 18, 2003

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2006-01-05 22:30:19
4Software / Computing / Intellectual property law / File sharing / Peer-to-peer / Peer-to-peer file sharing / LimeWire / Social peer-to-peer processes / P2P caching / Anonymous P2P

Peer to Peer (P2P) and File Sharing Applications Policy The University allows the use of peer-to-peer (P2P) and file sharing applications when properly requested and for legitimate business and academic use. For that rea

Add to Reading List

Source URL: dos.mst.edu

Language: English - Date: 2015-06-04 06:31:09
5File sharing / Reputation management / Distributed data storage / Peer-to-peer computing / Peer-to-peer / EigenTrust / Sybil attack / Social peer-to-peer processes / Distributed hash table / Reputation system / Distributed computing / Anonymous P2P

Taxonomy of Trust: Categorizing P2P Reputation Systems ! Sergio Marti and Hector Garcia-Molina Stanford University {smarti, hector}cs.stanford.edu

Add to Reading List

Source URL: zoo.cs.yale.edu

Language: English - Date: 2013-11-08 11:13:55
6File sharing / Peer-to-peer computing / Telecommunications engineering / Wireless networking / Peer-to-peer / Node / Network architecture / Wireless ad hoc network / Bootstrapping node / Anonymous P2P

Serverless and Peer-to-peer distributed interfaces for musical control ∗ Andrés Cabrera

Add to Reading List

Source URL: mat.ucsb.edu

Language: English - Date: 2015-06-20 13:40:19
7Crypto-anarchism / Internet privacy / Cryptography / Mixminion / Digital rights / Mix network / Secure communication / Anonymous remailer / Distributed data storage / Crowds / Anonymous P2P

Compulsion Resistant Anonymous Communications George Danezis and Jolyon Clulow University of Cambridge, Computer Laboratory, William Gates Building, 15 JJ Thomson Avenue, Cambridge CB3 0FD, United Kingdom.

Add to Reading List

Source URL: www0.cs.ucl.ac.uk

Language: English - Date: 2013-10-10 06:48:54
8File sharing networks / File sharing / Onion routing / Routing / Tor / Peer-to-peer / Gnutella / Anonymous P2P / Freenet

Improving Anonymity using Social Links Krishna P. N. Puttaswamy, Alessandra Sala and Ben Y. Zhao Computer Science Department, U. C. Santa Barbara {krishnap, alessandra, ravenben}@cs.ucsb.edu Abstract—Protecting user pr

Add to Reading List

Source URL: www.cs.ucsb.edu

Language: English - Date: 2008-09-05 20:22:44
9Distributed data storage / Computing / Concurrent computing / Distributed computing / Distributed hash table / Chord / Pastry / Peer-to-peer / Routing / Hash table / Anonymous P2P / Peer-to-Peer Protocol

Hashing it out in public Common failure modes of DHT-based anonymity schemes Andrew Tran Nicholas Hopper

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2009-09-02 23:56:34
10Internet / Tor / Onion routing / Network topology / Routing / ANts P2P / Telecommunications network / Communications protocol / Internet privacy / Computing / Software

Poster: Blindspot: Indistinguishable Anonymous Communications Joseph Gardiner, Shishir Nagaraja Security Lancaster Research Centre Lancaster University United Kingdom, LA1 4WA

Add to Reading List

Source URL: www.ieee-security.org

Language: English - Date: 2015-05-11 16:42:33
UPDATE