A secure DHT-based key distribution system for attribute-based encryption and decryption

D Thatmann, A Butyrtschik… - 2015 9th International …, 2015‏ - ieeexplore.ieee.org
Today, sharing information is ubiquitous in a connected world. However, several
disadvantages exist, such as the loss of control over data or unwanted data processing and …

XTRA—eXtended bit-Torrent pRotocol for Authenticated covert peer communication: Authenticated covert P2P communication

A Srinivasan, H Aldharrab - Peer-to-Peer Networking and Applications, 2019‏ - Springer
Abstract Today, peer-to-peer (P2P) networks have risen to the top echelon of information
sharing on the Internet. Consequently, it is a daunting task to prevent sharing of both …

[PDF][PDF] SURREAL: SecURe coveRt peEr communicAtion over BitTorrent protocoL

A Srinivasan, J Wu, R Joy, H Aldharrab - Proc. of the International …, 2016‏ - cis.temple.edu
Today, peer-to-peer (p2p) networks have risen to the top echelon of information sharing on
the Internet. It is a daunting task to prevent sharing of both legitimate and illegitimate …

Establishing Trust and Confidence Among Entities in Distributed Networks

FN Nwebonyi - 2019‏ - search.proquest.com
Distributed networks have gained popularity due to their openness, flexibility, cost and
performance advantages. Their importance has been renewed by emerging technologies …

[CITATION][C] Monitorovanie peerov BitTorrent na základe informácií z distribuovanej hašovacej tabuľky

M Vaško - 2018‏ - Bakalářská práce, Vysoké učení …