1![GoalBit: The First Free and Open Source Peer-to-Peer Streaming Network María Elisa Bertinat Daniel De Vera GoalBit: The First Free and Open Source Peer-to-Peer Streaming Network María Elisa Bertinat Daniel De Vera](https://www.pdfsearch.io/img/aa86046ead74f66017b619b91bde6135.jpg) | Add to Reading ListSource URL: goalbit-solutions.comLanguage: English - Date: 2016-02-19 12:51:03
|
---|
2![A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {. A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.](https://www.pdfsearch.io/img/3321dd681a55edb569bf02b89544754e.jpg) | Add to Reading ListSource URL: www.tik.ee.ethz.chLanguage: English - Date: 2015-05-18 12:16:16
|
---|
3![Poisoning the Kad Network Poisoning the Kad Network](https://www.pdfsearch.io/img/84b5365fc435129943ec5bda9c118035.jpg) | Add to Reading ListSource URL: www.tik.ee.ethz.chLanguage: English - Date: 2015-05-18 12:16:31
|
---|
4![SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high](https://www.pdfsearch.io/img/ce53eff882714135fd68431c419fc43d.jpg) | Add to Reading ListSource URL: randombits.ioLanguage: English - Date: 2015-06-29 10:17:00
|
---|
5![SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high](https://www.pdfsearch.io/img/e697586249fad1d25429ef196b184adc.jpg) | Add to Reading ListSource URL: www.cs.okstate.eduLanguage: English - Date: 2011-08-15 19:32:40
|
---|
6![Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz](https://www.pdfsearch.io/img/05c502b6060f8793a3b0c7f02da3776a.jpg) | Add to Reading ListSource URL: disco.ethz.chLanguage: English - Date: 2014-09-26 08:36:29
|
---|
7![A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {. A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.](https://www.pdfsearch.io/img/828ded4c2d3a3dc98b6b8b0498a035b0.jpg) | Add to Reading ListSource URL: disco.ethz.chLanguage: English - Date: 2014-09-26 08:36:30
|
---|
8![Measurement and Analysis of Child Pornography Trafficking on P2P Networks Ryan Hurley, Swagatika Prusty, Hamed Soroush, Robert J. Walls Jeannie Albrecht† , Emmanuel Cecchet, Brian Neil Levine Marc Liberatore, Brian Lyn Measurement and Analysis of Child Pornography Trafficking on P2P Networks Ryan Hurley, Swagatika Prusty, Hamed Soroush, Robert J. Walls Jeannie Albrecht† , Emmanuel Cecchet, Brian Neil Levine Marc Liberatore, Brian Lyn](https://www.pdfsearch.io/img/a52904df25ec957b29b33339a97c374f.jpg) | Add to Reading ListSource URL: www2013.wwwconference.orgLanguage: English - Date: 2014-07-21 08:47:08
|
---|
9![Robust Incentives via Multi-level Tit-for-tat Qiao Lian‡ , Yu Peng§ , Mao Yang§ , Zheng Zhang† , Yafei Dai§ , and Xiaoming Li§ ‡† Microsoft Research Asia, Beijing, P. R. China § Robust Incentives via Multi-level Tit-for-tat Qiao Lian‡ , Yu Peng§ , Mao Yang§ , Zheng Zhang† , Yafei Dai§ , and Xiaoming Li§ ‡† Microsoft Research Asia, Beijing, P. R. China §](https://www.pdfsearch.io/img/31ded78c92287ff968a1f7fd3c77ea2d.jpg) | Add to Reading ListSource URL: iptps06.cs.ucsb.eduLanguage: English - Date: 2006-02-15 01:41:07
|
---|
10![file:///D|/Program%20Files/eMule/Incoming/Tolkien_-_The_History_Of_Middle_Earth_Series_06_-_(txt)/vol06/GL4.TXT file:///D|/Program%20Files/eMule/Incoming/Tolkien_-_The_History_Of_Middle_Earth_Series_06_-_(txt)/vol06/GL4.TXT](https://www.pdfsearch.io/img/9d06db2366040ef5eb12e57dfd621e2b.jpg) | Add to Reading ListSource URL: www.e-reading.clubLanguage: English |
---|