The recent surge in popularity of on-line social network applications raises serious concerns about the security and privacy of their users. Beyond usual vulnerabilities that threaten any …
Social networking services (SNS), which provide the application with the most probably highest growth rates in the Internet today, raise serious security concerns, especially with …
Blockchains have become the catalyst for a growing movement to create a more decentralized Internet. A fundamental operation of applications in a decentralized Internet is …
D Wu, P Dhungel, X Hei, C Zhang… - 2010 IEEE Tenth …, 2010 - ieeexplore.ieee.org
Peer Exchange (PEX), in which peers directly exchange with each other lists of active peers in the torrent, has been widely implemented in modern BitTorrent clients for decentralized …
Applications such as Second Life require massive deployment of servers worldwide to support a large number of users. We investigate experimentally how Peer-to-Peer (P2P) …
A Distributed Hash Table (DHT) is a structured overlay network service that provides a decentralized lookup for mapping objects to locations. In this paper, we study the lookup …
Z Yao, B Ding, Q Bai, Y Xu - IEEE Transactions on Big Data, 2024 - ieeexplore.ieee.org
Data silos create barriers to accessing and utilizing data dispersed over networks. Directly sharing data easily suffers from the long downloading time, the single point failure and the …
H Salah, T Strufe - 2013 IEEE 33rd International Conference …, 2013 - ieeexplore.ieee.org
Measuring accurate graph snapshots of peer-to-peer (P2P) overlay networks is essential to understand these systems. Furthermore, the captured graph snapshots can be used, among …
In this paper we present the results we obtained by crawling the DHT of the BitTorrent client AZUREUS for several months. Before this study we crawled the DHT KAD that is used by the …