A survey of DHT security techniques

G Urdaneta, G Pierre, MV Steen - ACM Computing Surveys (CSUR), 2011 - dl.acm.org
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable
attention ever since their introduction in 2001. Unfortunately, DHT-based systems have been …

Hierarchical architectures in structured peer-to-peer overlay networks

D Korzun, A Gurtov - Peer-to-Peer Networking and Applications, 2014 - Springer
Abstract Distributed Hash Tables (DHT) are presently used in several large-scale systems in
the Internet and envisaged as a key mechanism to provide identifier-locator separation for …

Veracity: Practical Secure Network Coordinates via Vote-based Agreements.

M Sherr, M Blaze, BT Loo - USENIX Annual Technical Conference, 2009 - usenix.org
Decentralized network coordinate systems promise efficient network distance estimates
across Internet end-hosts. These systems support a wide range of network services …

A multipath routing algorithm based on traffic prediction in wireless mesh networks

L Zhi-yuan, W Ru-chuan… - 2009 Fifth International …, 2009 - ieeexplore.ieee.org
The technology of QoS routing has become a great challenge in wireless mesh networks
(WMNs). There exist a lot of literatures on QoS routing in WMNs, but the current algorithms …

The effect of replica placement on routing robustness in distributed hash tables

C Harvesf, DM Blough - … on Peer-to-Peer Computing (P2P'06), 2006 - ieeexplore.ieee.org
To achieve higher efficiency over their unstructured counterparts, structured peer-to-peer
systems hold each node responsible for serving a specified set of keys and correctly routing …

Generating policies for defense in depth

P Rubel, M Ihde, S Harp… - 21st Annual Computer …, 2005 - ieeexplore.ieee.org
Coordinating multiple overlap** defense mechanisms, at differing levels of abstraction, is
fraught with the potential for misconfiguration, so there is strong motivation to generate …

Loquendo-Politecnico di Torino's 2008 NIST speaker recognition evaluation system

E Dalmasso, F Castaldo, P Laface… - … on Acoustics, Speech …, 2009 - ieeexplore.ieee.org
This paper describes the improvements introduced in the Loquendo-Politecnico di Torino
(LPT) speaker recognition system submitted to the NIST SRE08 evaluation campaign. This …

Trade-offs in protecting storage: a meta-data comparison of cryptographic, backup/versioning, immutable/tamper-proof, and redundant storage solutions

J Tucek, P Stanton, E Haubert, R Hasan… - 22nd IEEE/13th …, 2005 - ieeexplore.ieee.org
Modern storage systems are responsible for increasing amounts of data and the value of the
data itself is growing in importance. Several primary storage system solutions have emerged …

Replica placement for route diversity in tree-based routing distributed hash tables

C Harvesf, DM Blough - IEEE Transactions on Dependable and …, 2010 - ieeexplore.ieee.org
Distributed hash tables (DHTs) share storage and routing responsibility among all nodes in
a peer-to-peer network. These networks have bounded path length unlike unstructured …

Efficient secure message routing for structured peer-to-peer systems

X **ang, T ** - 2009 International Conference on Networks …, 2009 - ieeexplore.ieee.org
In structured P2P systems, peers and keys of content objects are identified using a set of
well defined IDs. Queries are routed towards the target with a certain ID. When one ore more …