[PDF][PDF] Development of Management Cloud Software for Overlay Network

K Naito, K Tanaka, N Yamamoto, R Murate, H Mori… - researchmap.jp
Cyber-Physical Systems (CPS) are the new trend to collaborate service among the Internet
of Thing (IoT) devices. The principal mechanism is controlling or monitoring by computer …

[PDF][PDF] Intrusion-tolerant membership management for peer-to-peer overlay networks

HD Johansen - 2007 - cs.uit.no
Abstract Peer-to-Peer (P2P) computing has emerged as a cost-effective approach for
constructing large-scale wide-area Internet services. Many generic P2P middleware …

[PDF][PDF] Evaluating Secure Overlay Services Through OPNET Simulation

HW Fletcher, K Richardson, MC Carlisle… - SCS Spring …, 2005 - researchgate.net
EVALUATING SECURE OVERLAY SERVICES THROUGH OPNET SIMULATION Page 1
EVALUATING SECURE OVERLAY SERVICES THROUGH OPNET SIMULATION Harold W …

Blockchain-based public key infrastructure for inter-domain secure routing

ALR Gómez-Arevalillo… - International workshop on …, 2017 - inria.hal.science
A gamut of secure inter-domain routing protocols has been proposed in the literature. They
use traditional PGP-like and centralized Public Key Infrastructures for trust management. In …

N2n: A layer two peer-to-peer vpn

L Deri, R Andrews - Resilient Networks and Services: Second International …, 2008 - Springer
The Internet was originally designed as a flat data network delivering a multitude of
protocols and services between equal peers. Currently, after an explosive growth fostered …

Design and implementation of inblock—a distributed ip address registration system

A García-Martínez, S Angieri, B Liu, F Yang… - IEEE Systems …, 2020 - ieeexplore.ieee.org
The current mechanism to secure Border Gateway Protocol relies on the resource public key
infrastructure (RPKI) for route origin authorization. The RPKI implements a hierarchical …

Security in Mobile Peer-to-Peer Architectures–Introducing Mechanisms to Increase the Robustness of Overlay Routing Algorithms of Mobile Peer-to-Peer Architectures

C Gottron - 2013 - tuprints.ulb.tu-darmstadt.de
A reliable communication platform is essential in disaster relief scenarios. Otherwise, an
efficient coordination of the participating first response units cannot be ensured. However …

Chord-PKI: Embedding a public key infrastructure into the chord overlay network

A Avramidis, P Kotzanikolaou, C Douligeris - Public Key Infrastructure: 4th …, 2007 - Springer
Our goal in this paper is to provide authentication, encryption and non-repudiation services
for nodes within Peer-to-Peer networks, in an efficient and scalable way. To accomplish this …

[PDF][PDF] Introducing Virtual Private Overlay Network Services in Large Scale Grid Infrastructures.

F Palmieri - J. Comput., 2007 - jcomputers.us
The computational Grid concept is gaining great popularity as the best way to deliver access
to a wide range of distributed computing and data resources. But, as Grids move from an …

Secure routing for structured peer-to-peer overlay networks

M Castro, P Druschel, A Ganesh, A Rowstron… - ACM SIGOPS …, 2002 - dl.acm.org
Structured peer-to-peer overlay networks provide a substrate for the construction of large-
scale, decentralized applications, including distributed storage, group communication, and …