You shall not join: A measurement study of cryptocurrency peer-to-peer bootstrap** techniques

AF Loe, EA Quaglia - Proceedings of the 2019 ACM SIGSAC …, 2019 - dl.acm.org
Cryptocurrencies are digital assets which depend upon the use of distributed peer-to-peer
networks. The method a new peer uses to initially join a peer-to-peer network is known as …

SoK: A stratified approach to blockchain decentralization

C Ovezik, D Karakostas, A Kiayias - arxiv preprint arxiv:2211.01291, 2022 - arxiv.org
Decentralization has been touted as the principal security advantage which propelled
blockchain systems at the forefront of developments in the financial technology space. Its …

Cloudy weather for P2P, with a chance of gossip

A Montresor, L Abeni - … international conference on peer-to-peer …, 2011 - ieeexplore.ieee.org
Peer-to-peer (P2P) and cloud computing, two of the Internet trends of the last decade, hold
similar promises: the (virtually) infinite availability of computing and storage resources. But …

Towards a peer-to-peer hydrogen economy framework

M Amoretti - International Journal of Hydrogen Energy, 2011 - Elsevier
The research community is seeking for novel technological/business models to speed up the
decarbonization process, ie a decreasing relative reliance on carbon. The completion of …

Geodemlia: A robust peer-to-peer overlay supporting location-based search

C Gross, D Stingl, B Richerzhagen… - 2012 IEEE 12th …, 2012 - ieeexplore.ieee.org
Existing peer-to-peer overlay approaches for location-based search have proven to be a
valid alternative to client-server-based schemes. One of the key issues of the peer-to-peer …

OverChain: Building a robust overlay with a blockchain

V Aradhya, S Gilbert, A Hobor - arxiv preprint arxiv:2201.12809, 2022 - arxiv.org
Blockchains use peer-to-peer networks for disseminating information among peers, but
these networks currently do not have any provable guarantees for desirable properties such …

The gnunet system

C Grothoff - 2017 - inria.hal.science
GNUnet is an alternative network stack for building secure, decentralized and privacy-
preserving distributed applications. Our goal is to replace the old insecure Internet protocol …

Addressing the P2P bootstrap problem for small overlay networks

DI Wolinsky, PS Juste, PO Boykin… - 2010 IEEE Tenth …, 2010 - ieeexplore.ieee.org
Peer-to-Peer (P2P) overlays provide a framework for building distributed applications
consisting of few to many resources with features including self-configuration, scalability …

Survey of attacks and defenses on P2PSIP communications

DS Touceda, JM Sierra, A Izquierdo… - … Surveys & Tutorials, 2011 - ieeexplore.ieee.org
As with any other emerging system, the analysis of the security of Peer-to-Peer Session
Initiation Protocol systems is of crucial importance for its secure development and future …

DiSCO: A distributed semantic cache overlay for location-based services

C Lubbe, A Brodt, N Cipriani… - 2011 IEEE 12th …, 2011 - ieeexplore.ieee.org
Location-based services (LBS) have gained tremendous popularity with millions of
simultaneous users daily. LBS handle very large data volumes and face enormous query …