Protecting Insecure Communications with Topology-aware Network Tunnels

G Kontaxis, AD Keromytis - Proceedings of the 2016 ACM SIGSAC …, 2016 - dl.acm.org
Unencrypted and unauthenticated protocols present security and privacy risks to end-to-end
communications. At the same time we observe that only 30% of popular web servers offer …

Towards end-to-end connectivity for overlays across heterogeneous networks

S Mies, OP Waldhorst, H Wippel - 2009 IEEE International …, 2009 - ieeexplore.ieee.org
The incremental adoption of IPv6, middle boxes (eg, NATs, Firewalls) as well as completely
new network types and protocols paint a picture of a future Internet that consists of extremely …

Resilient routing overlay network construction with super-relay nodes

S Tian, J Liao, T Li, J Wang, G Cui - KSII Transactions on Internet …, 2017 - koreascience.kr
Overlay routing has emerged as a promising approach to improve reliability and efficiency of
the Internet. The key to overlay routing is the placement and maintenance of the overlay …

Fault-tolerant overlay protocol network

Shelly, Jensen, Baird - 2006 IEEE Information Assurance …, 2006 - ieeexplore.ieee.org
Voice over Internet Protocol (VoIP) and other time critical communications require a level of
availability much higher than the typical transport network supporting traditional data …

Embedded DHT overlays in virtual computing environments

YM Zhang, X Lu, DS Li - Science China Information Sciences, 2010 - Springer
With the rapid development of computing and networking technologies, people propose to
build harmonious, trusted and transparent Internet-based virtual computing environments …

[PDF][PDF] Network overlay construction under limited end-to-end addressability

W Wang, C Jin, S Jamin - Proc. of IEEE INFOCOM, 2004 - cse.umich.edu
Network overlay construction has found many applications in today's Internet, such as P2P
networks [1][2], end-host multicast [3][4], and network security [5]. Many researchers have …

Structured overlay networks for a new generation of internet services

A Babay, C Danilov, J Lane… - 2017 IEEE 37th …, 2017 - ieeexplore.ieee.org
The dramatic success and scaling of the Internet was made possible by the core principle of
keeping it simple in the middle and smart at the edge (or the end-to-end principle). However …

Exploiting semi-structured overlay networks in blockchain systems

R Banno, Y Kitagawa, K Shudo - IEICE Communications Express, 2021 - jstage.jst.go.jp
Blockchain systems are built on top of overlay networks. While typical blockchains are based
on unstructured overlays, some other blockchains utilizes structured overlays to improve the …

Phyllo: a peer-to-peer overlay security framework

W Heinbockel, M Kwon - 1st IEEE ICNP Workshop on Secure …, 2005 - ieeexplore.ieee.org
Despite the success of peer-to-peer systems, a majority of their overlay architectures are
vulnerable to exploitation. Some of the features for improved performance have created …

SocialVPN: Enabling wide-area collaboration with integrated social and overlay networks

PS Juste, D Wolinsky, PO Boykin, MJ Covington… - Computer Networks, 2010 - Elsevier
Trusted collaborative systems require peers to be able to communicate over private,
authenticated end-to-end channels. Network-layer approaches such as Virtual Private …