Cloud-based adaptive compression and secure management services for 3D healthcare data

A Castiglione, R Pizzolante, A De Santis… - Future Generation …, 2015 - Elsevier
Several studies show that the lack of access to resources and shared data is one of the main
causes of errors in the healthcare sector. In particular, 3D medical images play a …

Privacy preserving social networking through decentralization

LA Cutillo, R Molva, T Strufe - 2009 Sixth International …, 2009 - ieeexplore.ieee.org
The recent surge in popularity of on-line social network applications raises serious concerns
about the security and privacy of their users. Beyond usual vulnerabilities that threaten any …

Safebook: Feasibility of transitive cooperation for privacy on a decentralized social network

LA Cutillo, R Molva, T Strufe - … on a World of Wireless, Mobile …, 2009 - ieeexplore.ieee.org
Social networking services (SNS), which provide the application with the most probably
highest growth rates in the Internet today, raise serious security concerns, especially with …

Kadabra: adapting Kademlia for the decentralized web

Y Zhang, S Bojja Venkatakrishnan - International Conference on Financial …, 2023 - Springer
Blockchains have become the catalyst for a growing movement to create a more
decentralized Internet. A fundamental operation of applications in a decentralized Internet is …

Understanding peer exchange in bittorrent systems

D Wu, P Dhungel, X Hei, C Zhang… - 2010 IEEE Tenth …, 2010 - ieeexplore.ieee.org
Peer Exchange (PEX), in which peers directly exchange with each other lists of active peers
in the torrent, has been widely implemented in modern BitTorrent clients for decentralized …

P2P Second Life: experimental validation using Kad

M Varvello, C Diot, E Biersack - IEEE INFOCOM 2009, 2009 - ieeexplore.ieee.org
Applications such as Second Life require massive deployment of servers worldwide to
support a large number of users. We investigate experimentally how Peer-to-Peer (P2P) …

Why Kad lookup fails

HJ Kang, E Chan-Tin, NJ Hopper… - 2009 IEEE Ninth …, 2009 - ieeexplore.ieee.org
A Distributed Hash Table (DHT) is a structured overlay network service that provides a
decentralized lookup for mapping objects to locations. In this paper, we study the lookup …

Minerva: Decentralized collaborative query processing over interplanetary file system

Z Yao, B Ding, Q Bai, Y Xu - IEEE Transactions on Big Data, 2024 - ieeexplore.ieee.org
Data silos create barriers to accessing and utilizing data dispersed over networks. Directly
sharing data easily suffers from the long downloading time, the single point failure and the …

Capturing connectivity graphs of a large-scale p2p overlay network

H Salah, T Strufe - 2013 IEEE 33rd International Conference …, 2013 - ieeexplore.ieee.org
Measuring accurate graph snapshots of peer-to-peer (P2P) overlay networks is essential to
understand these systems. Furthermore, the captured graph snapshots can be used, among …

[PDF][PDF] Crawling azureus

M Steiner, EW Biersack - 2008 - eurecom.fr
In this paper we present the results we obtained by crawling the DHT of the BitTorrent client
AZUREUS for several months. Before this study we crawled the DHT KAD that is used by the …