Basic notions for the analysis of large two-mode networks

M Latapy, C Magnien, N Del Vecchio - Social networks, 2008 - Elsevier
Many large real-world networks actually have a two-mode nature: their nodes may be
separated into two classes, the links being between nodes of different classes only. Despite …

[HTML][HTML] Survey of research towards robust peer-to-peer networks: Search methods

J Risson, T Moors - 2007 - rfc-editor.org
RFC 4981: Survey of Research towards Robust Peer-to-Peer Networks: Search Methods [RFC
Home] [TEXT|PDF|HTML] [Tracker] [IPR] [Info page] INFORMATIONAL Network Working Group …

A novel approach to improving search efficiency in unstructured peer-to-peer networks

M Yang, Z Fei - Journal of Parallel and Distributed Computing, 2009 - Elsevier
The decentralized peer-to-peer (P2P) technique has been widely used to implement
scalable file sharing systems. It organizes nodes in a system into a structured or …

[PDF][PDF] The Index Poisoning Attack in P2P File Sharing Systems.

J Liang, N Naoumov, KW Ross - INFOCOM, 2006 - Citeseer
P2P file-sharing systems have indexes, which users search to find locations of desired titles.
In the index poisoning attack, the attacker inserts massive numbers of bogus records into the …

Content availability, pollution and poisoning in file sharing peer-to-peer networks

N Christin, AS Weigend, J Chuang - … of the 6th ACM conference on …, 2005 - dl.acm.org
Copyright holders have been investigating technological solutions to prevent distribution of
copyrighted materials in peer-to-peer file sharing networks. A particularly popular technique …

The impact and implications of the growth in residential user-to-user traffic

K Cho, K Fukuda, H Esaki, A Kato - Proceedings of the 2006 conference …, 2006 - dl.acm.org
It has been reported worldwide that peer-to-peer traffic is taking up a significant portion of
backbone networks. In particular, it is prominent in Japan because of the high penetration …

[HTML][HTML] Security engineering of patient-centered health care information systems in peer-to-peer environments: systematic review

I Abdullahi Yari, T Dehling, F Kluge, J Geck… - Journal of medical …, 2021 - jmir.org
Background Patient-centered health care information systems (PHSs) enable patients to
take control and become knowledgeable about their own health, preferably in a secure …

Long Term Study of Peer Behavior in the kad DHT

M Steiner, T En-Najjary… - IEEE/ACM Transactions …, 2009 - ieeexplore.ieee.org
Distributed hash tables (DHTs) have been actively studied in literature and many different
proposals have been made on how to organize peers in a DHT. However, very few DHTs …

Epidemic-style management of semantic overlays for content-based searching

S Voulgaris, M Van Steen - Euro-Par 2005 Parallel Processing: 11th …, 2005 - Springer
A lot of recent research on content-based P2P searching for file-sharing applications has
focused on exploiting semantic relations between peers to facilitate searching. To the best of …

[PDF][PDF] Debunking some myths about structured and unstructured overlays

M Castro, M Costa, A Rowstron - Proceedings of the 2nd conference on …, 2005 - usenix.org
We present a comparison of structured and unstructured overlays that decouples overlay
topology maintenance from query mechanism. Structured overlays provide efficient support …