Peer-to-Peer Protocol

Results: 361



#Item
91Distributed hash table / Tapestry / Kademlia / Peer-to-peer / Pastry / Kad network / PKI Resource Query Protocol / Trie / Gnutella / Distributed data storage / Computing / Chord

PEACHES and Peers Massimiliano Pala and Sean W. Smith Computer Science Department, Dartmouth College 6211 Sudikoff Laboratory, Hanover, NH 03755, US {pala,sws}@cs.dartmouth.edu

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-28 10:16:14
92Computer architecture / OverSim / Overlay network / Peer-to-peer / Kademlia / Peer-to-Peer Protocol / Pastry / Network simulation / Chord / Distributed data storage / Computing / Concurrent computing

OverSim: A scalable and flexible overlay framework for simulation and real network applications (Invited Talk) Ingmar Baumgart, Bernhard Heep, Stephan Krause Institute of Telematics, Universit¨at Karlsruhe (TH) Zirkel 2

Add to Reading List

Source URL: doc.tm.uka.de

Language: English - Date: 2009-09-30 08:27:23
93Teleconferencing / Web conferencing / JXTA / Scalable Vector Graphics / Peer-to-peer / Internet / Streaming media / GridFTP / Extensible Messaging and Presence Protocol / Computing / File sharing networks / Internet culture

NaradaBrokering and its Applications Community Grids Laboratory (CGL) Indiana University http://grids.ucs.indiana.edu/ptliupages/ 1. NaradaBrokering NaradaBrokering is an open source technology supporting a suite of capa

Add to Reading List

Source URL: grids.ucs.indiana.edu

Language: English - Date: 2009-10-26 20:48:40
94Network architecture / Tor / Traffic analysis / Proxy server / Onion routing / .onion / Internet Relay Chat / Peer-to-peer / Transmission Control Protocol / Internet privacy / Computing / Internet

TOP SECRET//COMINTU//FOUO) Tor 2006 CES Summer Program Abstract (U) Tor is an open-source anonymization program created by Roger Dingledine, Nick Mathewson, and Paul Syverson. Originally sponsored by the US N

Add to Reading List

Source URL: www.queen.clara.net

Language: English - Date: 2013-12-23 19:26:24
95Information / Password authentication protocol / Peer-to-peer / Cryptographic protocols / Client–server model / Password / Digital credential / Security Support Provider Interface / Internet protocols / Computing / Data

PPAA: Peer-to-Peer Anonymous Authentication Patrick P. Tsang and Sean W. Smith Department of Computer Science Dartmouth College Hanover, NH 03755, USA

Add to Reading List

Source URL: www.cs.dartmouth.edu

Language: English - Date: 2008-08-27 18:53:42
96Streaming / Traffic flow / Transmission Control Protocol / Software / Internet / Peer-to-peer / Domain / Tor / Computing / Digital media / Inter-process communication

Research Roadmap on Security Measurements Xenofontas Dimitropoulos Eduard Glatz, Elias Raftopoulos, Martin Burkhart

Add to Reading List

Source URL: www.syssec-project.eu

Language: English - Date: 2011-07-25 05:24:39
97Cloud infrastructure / Network architecture / File sharing networks / Peer-to-peer / Overlay network / Cloud API / Node / Gossip protocol / Scalability / Cloud computing / Computing / Centralized computing

Design and Implementation of a P2P Cloud System Ozalp Babaoglu Moreno Marzolla

Add to Reading List

Source URL: www.informatica.unibo.it

Language: English
98Data / Tunneling protocols / Internet protocols / Virtual Telecommunications Access Method / IBM Advanced Peer-to-Peer Networking / Internet protocol suite / Data-Link Switching / IBM / Z/OS / Computing / Network architecture / Network protocols

SPECIALIST PROFILE Personal Details Reference: KA001

Add to Reading List

Source URL: www.bmeurope.com

Language: English - Date: 2013-04-26 11:31:28
99Routing / Multihoming / IPv6 / Site Multihoming by IPv6 Intermediation / Internet Protocol / Peer-to-peer / Transmission Control Protocol / HTML / Universal quantification / Network architecture / Internet / Computing

FORMALIZING SHIM6 AN IETF PROPOSED INTERNET STANDARD IN UPPAAL Matthijs Mekking1,2, Wouter Wijngaards1, Frits Vaandrager2, Theo Schouten2 1 Foundation NLnet Labs 2 Institute for Computing and Information Sciences, Radbou

Add to Reading List

Source URL: nlnetlabs.nl

Language: English - Date: 2009-06-27 06:06:49
100File sharing networks / Cryptographic protocols / Secure communication / Cross-platform software / Kademlia / Peer-to-peer / Distributed hash table / Kad network / Transport Layer Security / Software / Computing / Distributed data storage

UNIVERSITY OF MANNHEIM Blacklisting Malicious Web Sites using a Secure Version of the DHT Protocol Kademlia

Add to Reading List

Source URL: www.philippheckel.com

Language: English - Date: 2009-11-25 08:49:15
UPDATE