<--- Back to Details
First PageDocument Content
Open standards / Cryptographic software / File sharing / File sharing networks / Windows Server / Pretty Good Privacy / XMPP / Peer-to-peer / Cloud computing / Presence information / Server / Content delivery network
Date: 2015-01-13 06:35:55
Open standards
Cryptographic software
File sharing
File sharing networks
Windows Server
Pretty Good Privacy
XMPP
Peer-to-peer
Cloud computing
Presence information
Server
Content delivery network

ISSN No: International Journal & Magazine of Engineering, Technology, Management and Research A Peer Reviewed Open Access International Journal

Add to Reading List

Source URL: www.ijmetmr.com

Download Document from Source Website

File Size: 963,41 KB

Share Document on Facebook

Similar Documents

How to be an artist | How to be a cut – up artist | How to transform films from file sharing networks into new originals | How to get more out of your P2P downloads | How to take file sharing further | How to make art

How to be an artist | How to be a cut – up artist | How to transform films from file sharing networks into new originals | How to get more out of your P2P downloads | How to take file sharing further | How to make art

DocID: 1uc1b - View Document

Trading in Trust, Tokens, and Stamps Tim Moreton and Andrew Twigg Computer Laboratory, Cambridge University, UK E-mail:  Abstract

Trading in Trust, Tokens, and Stamps Tim Moreton and Andrew Twigg Computer Laboratory, Cambridge University, UK E-mail: Abstract

DocID: 1rmvV - View Document

PAST: A large-scale, persistent peer-to-peer storage utility Peter Druschel Rice University, Houston, TX 77005, USA∗   Abstract

PAST: A large-scale, persistent peer-to-peer storage utility Peter Druschel Rice University, Houston, TX 77005, USA∗ Abstract

DocID: 1rboP - View Document

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

DocID: 1r92H - View Document

Poisoning the Kad Network

Poisoning the Kad Network

DocID: 1r1lv - View Document