Scalable and secure p2p overlay networks

H Shen, AS Brodie, CZ Xu, W Shi - … , Ad Hoc Wireless, and Peer-to …, 2005 - taylorfrancis.com
Since the inception of Napster in the late 1990s, the peer-to-peer (P2P) computing model
has grown dramatically. In the literature, however, there is little consensus about its …

New security layer for overlay networks

H Imai, SH Shin, K Kobara - Journal of Communications and …, 2009 - ieeexplore.ieee.org
After clarifying the underlying problems in a secure network storage, we introduce two
important requirements, leakage-resilience and availability in higher levels respectively, for …

Blockchain Nodes are Heterogeneous and Your P2P Overlay Should be Too: PODS

N Zarin, I Sheff, S Roos - arXiv preprint arXiv:2306.16153, 2023 - arxiv.org
At the core of each blockchain system, parties communicate through a peer-to-peer (P2P)
overlay. Unfortunately, recent evidence suggests these P2P overlays represent a significant …

[PDF][PDF] DDoS Avoidance by Securely Hiding Web Servers

H Aida - 2010 - repository.dl.itc.u-tokyo.ac.jp
Today, life cannot be imagined without many Internet-based services. One major threat to
such services is Distributed Denial of Service (DDoS) attacks. This research is one step …

[PDF][PDF] 'INSPIRE: increasing security and protection through infrastructure resilience

S D'Antonio - ESCoRTS workshop, Ispra, Italy, April, 2010 - critis08.dia.uniroma3.it
∎ This can be preventively achieved through selection of closed P2P systems that enable
attack detection and recovery. A closed P2P overlay is characterized by the fact that peers …

Towards sovereign domains P2P overlays in blockchain systems

N Zarin - 2023 - repository.tudelft.nl
Blockchain technology has proven to be a promising solution for decentralized systems in
various industries. At the core of a blockchain system is the peer-to-peer (P2P) overlay …

[引用][C] Towards robust overlay networks: Enhancing adaptivity mechanisms with Byzantine-resilience

A Walters, K Bauer, C Nita-Rotaru

Sophia: A local trust system to secure key-based routing in non-deterministic DHTs

R Gracia-Tinedo, P García-López… - Journal of Parallel and …, 2012 - Elsevier
Today, many distributed applications are typically deployed at a large scale, including Grid,
web search engines and content distribution networks, and it is expected for their scale to …

[PDF][PDF] Security considerations in Docker Swarm networking

M Brouwers - System and Network Engineering, University of …, 2017 - os3.nl
When using overlay networks it can get complicated to keep track of the structure of the
networks as well as keeping track of what gets exposed on these networks. This master …

A study of blockchain systems exploiting semi-structured overlay networks with FRT

R Banno, Y Kitagawa, K Shudo - IEICE Proceedings Series, 2020 - ieice.org
Blockchain systems built on top of structured overlay networks are capable of efficient
information propagation. However, using structured overlays have security risks such as …