Usurp: Distributed nat traversal for overlay networks

S Niazi, J Dowling - … on Distributed Applications and Interoperable Systems, 2011 - Springer
Many existing overlay networks are not practical on the open Internet because of the
presence of Network Address Translation (NAT) devices and firewalls. In this paper, we …

Chord-PKI: Embedding a public key infrastructure into the chord overlay network

A Avramidis, P Kotzanikolaou, C Douligeris - Public Key Infrastructure: 4th …, 2007 - Springer
Our goal in this paper is to provide authentication, encryption and non-repudiation services
for nodes within Peer-to-Peer networks, in an efficient and scalable way. To accomplish this …

Advancing Trust in the Internet: Blockchain-driven Decentralized VPNs Leveraging Smart Contracts and PoS as Trust Factor Calculators

A Ghosh, S Srivastava, P Supraja - … International Conference on …, 2024 - ieeexplore.ieee.org
The imperative need for a secure and privacy-focused virtual private network (VPN) solution
arises amidst growing concerns about centralized VPN architectures. The limitations of …

[引用][C] Secure proximity aware routing

A Singh - 1st IRIS Workshop, 2003

Blockchain-based public key infrastructure for inter-domain secure routing

ALR Gómez-Arevalillo… - International workshop on …, 2017 - inria.hal.science
A gamut of secure inter-domain routing protocols has been proposed in the literature. They
use traditional PGP-like and centralized Public Key Infrastructures for trust management. In …

[PDF][PDF] FONet: a federated overlay network for DoS defense in the Internet (a position paper)

J Kurian, K Sarac - Proceedings of Global Internet Symposium, 2006 - utdallas.edu
DoS resistant communication services in the Internet. The architecture consists of a large
scale federated overlay network with DoS protected tunnels established between overlay …

Building and managing policy-based secure overlay networks

GM Perez, FJG Clemente… - … Conference on Parallel …, 2008 - ieeexplore.ieee.org
Overlay networks represent a flexible approach for distributed services deployed across
different administrative domains to group according to a given criteria without modification of …

Technology challenges for virtual overlay networks

KP Birman - IEEE Transactions on Systems, Man, and …, 2001 - ieeexplore.ieee.org
An emerging generation of mission-critical networked applications is placing demands on
the Internet protocol suite that go well beyond the properties they were designed to …

R2Trust, a reputation and risk based trust management framework for large-scale, fully decentralized overlay networks

C Tian, B Yang - Future Generation Computer Systems, 2011 - Elsevier
Peer-to-peer (P2P) networking is widely used to exchange, contribute, or obtain files from
any participating user. Building trust relationships between peers in a large-scale distributed …

On the design of resilient IP overlays

M Nagy, J Tapolcai, G Rétvári - 2014 10th International …, 2014 - ieeexplore.ieee.org
For IP to evolve into a true carrier-grade transport facility, it needs to support fast resilience
out-of-the-box. Unfortunately the de facto IP protection mechanism, Loop-Free Alternates …