Challenges, design and analysis of a large-scale p2p-vod system
P2P file downloading and streaming have already become very popular Internet
applications. These systems dramatically reduce the server loading, and provide a platform …
applications. These systems dramatically reduce the server loading, and provide a platform …
Security and privacy issues in P2P streaming systems: A survey
Abstract Streaming applications over Peer-To-Peer (P2P) systems have gained an
enormous popularity. Success always implies increased concerns about security, protection …
enormous popularity. Success always implies increased concerns about security, protection …
IPTV over P2P streaming networks: the mesh-pull approach
IPTV, an emerging Internet application, would revolutionize the entertainment and media
industries; however, IPTV also has the potential to overwhelm the Internet backbone and …
industries; however, IPTV also has the potential to overwhelm the Internet backbone and …
Accounting and accountability in content distribution architectures: a survey
Many content distribution architectures offer desirable elements that lead to less bandwidth
usage, reduced network congestion, higher content availability, and reduced costs …
usage, reduced network congestion, higher content availability, and reduced costs …
Backdoor attacks in peer-to-peer federated learning
Most machine learning applications rely on centralized learning processes, opening up the
risk of exposure of their training datasets. While federated learning (FL) mitigates to some …
risk of exposure of their training datasets. While federated learning (FL) mitigates to some …
Sensing-enabled channels for hard-to-detect command and control of mobile devices
The proliferation of mobile computing devices has enabled immense opportunities for
everyday users. At the same time, however, this has opened up new, and perhaps more …
everyday users. At the same time, however, this has opened up new, and perhaps more …
Combining popularity and locality to enhance in-network caching performance and mitigate pollution attacks in content-centric networking
Content-centric networking (CCN) aims to improve network reliability, scalability, and
security by changing the way that information is organized and retrieved in the current …
security by changing the way that information is organized and retrieved in the current …
TESLA-based homomorphic MAC for authentication in P2P system for live streaming with network coding
Recently, the peer-to-peer (P2P) live streaming system has benefited from the advent of
network coding. However, it was demonstrated that malicious nodes could significantly …
network coding. However, it was demonstrated that malicious nodes could significantly …
OpenSky report 2018: Assessing the integrity of crowdsourced mode S and ADS-B data
Air traffic tracking platforms such as the OpenSky Network use crowdsourcing to track air
traffic world wide. While crowdsourcing allows for unprecedented coverage, it comes with …
traffic world wide. While crowdsourcing allows for unprecedented coverage, it comes with …
Byzantine fault tolerance of regenerating codes
Recent years have witnessed a slew of coding techniques custom designed for networked
storage systems. Network coding inspired regenerating codes are the most prolifically …
storage systems. Network coding inspired regenerating codes are the most prolifically …