Peer-to-peer-based social networks: A comprehensive survey

N Masinde, K Graffi - SN Computer Science, 2020 - Springer
The use of online social networks, such as Facebook and Twitter, has grown at a
phenomenal rate. These platforms offer services that support interactions via messaging …

Cachet: a decentralized architecture for privacy preserving social networking with caching

S Nilizadeh, S Jahid, P Mittal, N Borisov… - Proceedings of the 8th …, 2012 - dl.acm.org
Online social networks (OSNs) such as Facebook and Google+ have transformed the way
our society communicates. However, this success has come at the cost of user privacy; in …

Peer-to-peer networking and applications: synopsis and research directions

JF Buford, H Yu - Handbook of peer-to-peer networking, 2009 - Springer
Peer-to-peer computing and networking are important developments for large-scale
distributed systems design and the evolution of Internet architecture. Widely used …

MDHT: A hierarchical name resolution service for information-centric networks

M D'Ambrosio, C Dannewitz, H Karl… - Proceedings of the ACM …, 2011 - dl.acm.org
Information-centric network architectures are an increasingly important approach for future
Internet architectures. Several approaches are based on a non-hierarchical identifier (ID) …

Peer-to-Peer resource discovery in Grids: Models and systems

P Trunfio, D Talia, H Papadakis, P Fragopoulou… - Future generation …, 2007 - Elsevier
Resource location or discovery is a key issue for Grid systems in which applications are
composed of hardware and software resources that need to be located. Classical …

Hierarchical DHT-based name resolution for information-centric networks

C Dannewitz, M D'Ambrosio, V Vercellone - Computer Communications, 2013 - Elsevier
Information-centric network (ICN) architectures are an increasingly important approach for
the future Internet. Several ICN approaches are based on a flat object ID namespace and …

Octopus: A secure and anonymous DHT lookup

Q Wang, N Borisov - 2012 IEEE 32nd International Conference …, 2012 - ieeexplore.ieee.org
Distributed Hash Table (DHT) lookup is a core technique in structured peer-to-peer (P2P)
networks. Its decentralized nature introduces security and privacy vulnerabilities for …

Hierarchical architectures in structured peer-to-peer overlay networks

D Korzun, A Gurtov - Peer-to-Peer Networking and Applications, 2014 - Springer
Abstract Distributed Hash Tables (DHT) are presently used in several large-scale systems in
the Internet and envisaged as a key mechanism to provide identifier-locator separation for …

[PDF][PDF] Halo: High-Assurance Locate for Distributed Hash Tables.

A Kapadia, N Triandopoulos - NDSS, 2008 - Citeseer
We study the problem of reliably searching for resources in untrusted peer-to-peer networks,
where a significant portion of the participating network nodes may act maliciously to subvert …

On hierarchical DHT systems–An analytical approach for optimal designs

S Zöls, Z Despotovic, W Kellerer - Computer Communications, 2008 - Elsevier
In this work, we study hierarchical DHT-based Peer-to-Peer (P2P) systems. We present an
analytical model for two-tier architectures deploying a DHT at the top-level overlay and …