Kad network

Results: 43



#Item
1

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim University of Minnesota - Twin Cities 200 Union Street SE Minneapolis, MN 55455

Add to Reading List

Source URL: randombits.io

- Date: 2015-06-29 10:17:02
    2

    Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

    Add to Reading List

    Source URL: www.tik.ee.ethz.ch

    - Date: 2015-05-18 12:16:38
      3File sharing networks / Computing / Software / File sharing / EDonkey network / Kad network / EMule / Peer-to-peer / Gnutella / Distributed hash table / Kademlia / BitTorrent

      A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

      Add to Reading List

      Source URL: www.tik.ee.ethz.ch

      Language: English - Date: 2015-05-18 12:16:16
      4File sharing networks / Software / Computing / File sharing / EDonkey network / Kad network / EMule / Peer-to-peer / Distributed hash table / Kademlia / BitTorrent / Gnutella

      Poisoning the Kad Network

      Add to Reading List

      Source URL: www.tik.ee.ethz.ch

      Language: English - Date: 2015-05-18 12:16:31
      5Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule

      SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

      Add to Reading List

      Source URL: randombits.io

      Language: English - Date: 2015-06-29 10:17:00
      6Distributed data storage / Computing / Concurrent computing / File sharing networks / Distributed computing / File sharing / Kademlia / Kad network / Distributed computing architecture / Peer-to-peer / Overlay network / EMule

      SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

      Add to Reading List

      Source URL: www.cs.okstate.edu

      Language: English - Date: 2011-08-15 19:32:40
      7Distributed data storage / Computing / Computer programming / Concurrent computing / Kademlia / Distributed hash table / Chord / Pastry / Kad network / Trie / Hash table / Peer-to-peer

      Why Kad Lookup Fails Hun J. Kang, Eric Chan-Tin, Nicholas J. Hopper, Yongdae Kim University of Minnesota - Twin Cities {hkang,dchantin,hopper,kyd}@cs.umn.edu Abstract

      Add to Reading List

      Source URL: www.cs.okstate.edu

      Language: English - Date: 2011-08-15 19:32:40
      8Distributed data storage / Computing / Concurrent computing / Distributed computing / Kademlia / Distributed hash table / Kad network / Pastry / Tapestry / Chord / Peer-to-peer / Routing

      Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim University of Minnesota - Twin Cities 200 Union Street SE Minneapolis, MN 55455

      Add to Reading List

      Source URL: www.cs.okstate.edu

      Language: English - Date: 2011-08-15 19:32:40
      9File sharing networks / Distributed data storage / File sharing / Denial-of-service attacks / BitTorrent / Kad network / EMule / Peer-to-peer / Kademlia / Distributed hash table / EDonkey network / Denial-of-service attack

      Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

      Add to Reading List

      Source URL: disco.ethz.ch

      Language: English - Date: 2014-09-26 08:36:29
      10File sharing networks / EDonkey network / Kad network / EMule / Peer-to-peer / Gnutella / Distributed hash table / File sharing / Kademlia / BitTorrent / Server / EDonkey2000

      A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

      Add to Reading List

      Source URL: disco.ethz.ch

      Language: English - Date: 2014-09-26 08:36:30
      UPDATE