Modern operating systems
Journal of the ACM (JACM)
Communications of the ACM
Anonymous Web transactions with Crowds
Communications of the ACM
A prototype implementation of archival Intermemory
Proceedings of the fourth ACM conference on Digital libraries
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
The free haven project: distributed anonymous storage service
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Web MIXes: a system for anonymous and unobservable Internet access
International workshop on Designing privacy enhancing technologies: design issues in anonymity and unobservability
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
Looking up data in P2P systems
Communications of the ACM
Shock: Aggregating Information While Preserving Privacy
Information Systems Frontiers
The Evolving Field of Distributed Storage
IEEE Internet Computing
A Unified Peer-to-Peer Database Framework for Scalable Service and Resource Discovery
GRID '02 Proceedings of the Third International Workshop on Grid Computing
Open Problems in Data-Sharing Peer-to-Peer Systems
ICDT '03 Proceedings of the 9th International Conference on Database Theory
A Decentral Library for Scientific Articles
IICS '02 Proceedings of the Second International Workshop on Innovative Internet Computing Systems
Modeling and Evaluating Peer-to-Peer Storage Architectures
IPDPS '02 Proceedings of the 16th International Parallel and Distributed Processing Symposium
Programmable Resource Discovery Using Peer-to-Peer Networks
IWAN '02 Proceedings of the IFIP-TC6 4th International Working Conference on Active Networks
Efficient Peer-to-Peer Lookup Based on a Distributed Trie
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Introducing Tarzan, a Peer-to-Peer Anonymizing Network Layer
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Can Heterogeneity Make Gnutella Scalable?
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Anonymizing Censorship Resistant Systems
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Erasure Coding Vs. Replication: A Quantitative Comparison
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
Peer to Peer: Peering into the Future
Advanced Lectures on Networking, NETWORKING 2002 [This book presents the revised version of seven tutorials given at the NETWORKING 2002 Conference in Pisa, Italy in May 2002]
Transaction-Based Charging in Mnemosyne: A Peer-to-Peer Steganographic Storage System
Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing
Implementing a Reputation-Aware Gnutella Servent
Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing
Peer-to-Peer Programming with Teaq
Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing
Text-Based Content Search and Retrieval in Ad-hoc P2P Communities
Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing
PEPA Nets: A Structured Performance Modelling Formalism
TOOLS '02 Proceedings of the 12th International Conference on Computer Performance Evaluation, Modelling Techniques and Tools
A Framework for Resource Management in Peer-to-Peer Networks
NODe '02 Revised Papers from the International Conference NetObjectDays on Objects, Components, Architectures, Services, and Applications for a Networked World
Giggle: a framework for constructing scalable replica location services
Proceedings of the 2002 ACM/IEEE conference on Supercomputing
Secure routing for structured peer-to-peer overlay networks
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
An analysis of Internet content delivery systems
ACM SIGOPS Operating Systems Review - OSDI '02: Proceedings of the 5th symposium on Operating systems design and implementation
Manycast: exploring the space between anycast and multicast in ad hoc networks
Proceedings of the 9th annual international conference on Mobile computing and networking
FDNA '03 Proceedings of the ACM SIGCOMM workshop on Future directions in network architecture
Towards peer-to-peer content indexing
ACM SIGOPS Operating Systems Review
Middleware Support for Super Distributed Autonomic Services in Pervasive Networks
SAINT-W '04 Proceedings of the 2004 Symposium on Applications and the Internet-Workshops (SAINT 2004 Workshops)
Design, Implementation, and Evaluation of Differentiated Caching Services
IEEE Transactions on Parallel and Distributed Systems
A General Architecture for Wireless Sensor Networks: Fisrt Steps
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
Ant-Based Adaptive Trust Evidence Distribution in MANET
ICDCSW '04 Proceedings of the 24th International Conference on Distributed Computing Systems Workshops - W7: EC (ICDCSW'04) - Volume 7
An Efficient Anonymity Protocol for Grid Computing
GRID '04 Proceedings of the 5th IEEE/ACM International Workshop on Grid Computing
Using the small-world model to improve Freenet performance
Computer Networks: The International Journal of Computer and Telecommunications Networking
RPC-V: Toward Fault-Tolerant RPC for Internet Connected Desktop Grids with Volatile Nodes
Proceedings of the 2004 ACM/IEEE conference on Supercomputing
Enabling Flexible Queries with Guarantees in P2P Systems
IEEE Internet Computing
Adding structure to unstructured peer-to-peer networks: the use of small-world graphs
Journal of Parallel and Distributed Computing
The Anatomy of the Grid: Enabling Scalable Virtual Organizations
International Journal of High Performance Computing Applications
A comparative evaluation of agent location mechanisms in large scale MAS
Proceedings of the fourth international joint conference on Autonomous agents and multiagent systems
Awarded Best Student Paper! - Pond: The OceanStore Prototype
FAST '03 Proceedings of the 2nd USENIX Conference on File and Storage Technologies
Probabilistic file indexing and searching in unstructured peer-to-peer networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
APPOINT: an Approach for Peer-to-Peer Offloading the INTernet
dg.o '02 Proceedings of the 2002 annual national conference on Digital government research
P5: a protocol for scalable anonymous communication
Journal of Computer Security
Storage load balancing via local interactions among peers in unstructured P2P networks
InfoScale '06 Proceedings of the 1st international conference on Scalable information systems
XYZ: A Scalable, Partially Centralized Lookup Service for Large-Scale Peer-to-Peer Systems
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Distributed Coordination for Scalable Multi-source Multimedia Streaming Model
ICPADS '06 Proceedings of the 12th International Conference on Parallel and Distributed Systems - Volume 1
Survivable Monitoring in Dynamic Networks
IEEE Transactions on Mobile Computing
Long-term threats to secure archives
Proceedings of the second ACM workshop on Storage security and survivability
Distributed cache table: efficient query-driven processing of multi-term queries in P2P networks
P2PIR '06 Proceedings of the international workshop on Information retrieval in peer-to-peer networks
Incentive and service differentiation in P2P networks: a game theoretic approach
IEEE/ACM Transactions on Networking (TON)
HAMS: scalable peer-to-peer multimedia streaming model in heterogeneous networks
Journal of Computer and System Sciences - Special issue: Performance modelling and evaluation of computer systems
A cooperative internet backup scheme
ATEC '03 Proceedings of the annual conference on USENIX Annual Technical Conference
The Zombie roundup: understanding, detecting, and disrupting botnets
SRUTI'05 Proceedings of the Steps to Reducing Unwanted Traffic on the Internet on Steps to Reducing Unwanted Traffic on the Internet Workshop
SSL splitting: securely serving data from untrusted caches
SSYM'03 Proceedings of the 12th conference on USENIX Security Symposium - Volume 12
SkipNet: a scalable overlay network with practical locality properties
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
A study of the performance potential of DHT-based overlays
USITS'03 Proceedings of the 4th conference on USENIX Symposium on Internet Technologies and Systems - Volume 4
Proceedings of the international workshop on Workshop on multimedia information retrieval
Targeted local immunization in scale-free peer-to-peer networks
Journal of Computer Science and Technology
Foundations and Trends® in Networking
Management scheme of learning materials on a P2P web-based training system
SMO'07 Proceedings of the 7th WSEAS International Conference on Simulation, Modelling and Optimization
An analytical framework for evaluating peer-to-peer business models
Electronic Commerce Research and Applications
POTSHARDS: secure long-term storage without encryption
ATC'07 2007 USENIX Annual Technical Conference on Proceedings of the USENIX Annual Technical Conference
Improving networks using group-based topologies
Computer Communications
WSEAS TRANSACTIONS on COMMUNICATIONS
Sybil proof anonymous reputation management
Proceedings of the 4th international conference on Security and privacy in communication netowrks
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
Disappearing Cryptography: Information Hiding: Steganography & Watermarking
P2P Networking and Applications
P2P Networking and Applications
P2P case storage and retrieval with an unspecified ontology
Artificial Intelligence Review
Probabilistic and nondeterministic aspects of anonymity
Theoretical Computer Science
Applying User Feedback and Query Learning Methods to Multiple Communities
PRIMA '09 Proceedings of the 12th International Conference on Principles of Practice in Multi-Agent Systems
A market-based approach to managing the risk of peer-to-peer transactions
Computer Networks: The International Journal of Computer and Telecommunications Networking
Communications of the ACM
Dissent: accountable anonymous group messaging
Proceedings of the 17th ACM conference on Computer and communications security
Rendezvous tunnel for anonymous publishing
Proceedings of the 17th ACM conference on Computer and communications security
A free-rider aware reputation system for peer-to-peer file-sharing networks
Expert Systems with Applications: An International Journal
Privacy amplification with social networks
Proceedings of the 15th international conference on Security protocols
A new and effective hierarchical overlay structure for Peer-to-Peer networks
Computer Communications
Enabling the archival storage of signed documents
FAST'02 Proceedings of the 1st USENIX conference on File and storage technologies
Pond: the oceanstore prototype
FAST'03 Proceedings of the 2nd USENIX conference on File and storage technologies
HD Tree: A novel data structure to support multi-dimensional range query for P2P networks
Journal of Parallel and Distributed Computing
Distance-constraint reachability computation in uncertain graphs
Proceedings of the VLDB Endowment
Journal of Mobile Multimedia
On the dimensioning of an aggregation service for P2P service overlay networks
AIMS'11 Proceedings of the 5th international conference on Autonomous infrastructure, management, and security: managing the dynamics of networks and services
A game theoretic framework for peer-to-peer market economy
International Journal of Grid and Utility Computing
Cirripede: circumvention infrastructure using router redirection with plausible deniability
Proceedings of the 18th ACM conference on Computer and communications security
Rendezvous tunnel for anonymous publishing: clean slate and tor based designs
SSS'11 Proceedings of the 13th international conference on Stabilization, safety, and security of distributed systems
Communications of the ACM
Error-Resilient Routing for Supporting Multi-dimensional Range Query in HD Tree
DS-RT '11 Proceedings of the 2011 IEEE/ACM 15th International Symposium on Distributed Simulation and Real Time Applications
Review: A survey on content-centric technologies for the current Internet: CDN and P2P solutions
Computer Communications
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
ACB-R: an adaptive clustering-based data replication algorithm on a p2p data-store
ASIAN'05 Proceedings of the 10th Asian Computing Science conference on Advances in computer science: data management on the web
Non-violative user profiling approach for website design improvement
CSCWD'04 Proceedings of the 8th international conference on Computer Supported Cooperative Work in Design I
SecureTorrent: a security framework for file swarming
ACSAC'06 Proceedings of the 11th Asia-Pacific conference on Advances in Computer Systems Architecture
Using group overlapping to protect server from attack in grid computing
SAFECOMP'06 Proceedings of the 25th international conference on Computer Safety, Reliability, and Security
Towards p2p information systems
IICS'05 Proceedings of the 5th international conference on Innovative Internet Community Systems
A solution for resource sharing in manufacturing grid
CSCWD'05 Proceedings of the 9th international conference on Computer Supported Cooperative Work in Design II
Design and evaluation of network-bandwidth-based parallel replication algorithm
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
A fault-tolerant content addressable network
ISPA'05 Proceedings of the Third international conference on Parallel and Distributed Processing and Applications
Performing efficient keyword search by keyword grouping in DHT peer-to-peer network
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
NDP2PSim: a NS2-Based platform for peer-to-peer network simulations
ISPA'05 Proceedings of the 2005 international conference on Parallel and Distributed Processing and Applications
Using data aggregation to prevent traffic analysis in wireless sensor networks
DCOSS'06 Proceedings of the Second IEEE international conference on Distributed Computing in Sensor Systems
An efficient distributed search method
HPCC'05 Proceedings of the First international conference on High Performance Computing and Communications
Cooperating with free riders in unstructured P2P networks
Computer Networks: The International Journal of Computer and Telecommunications Networking
A scalable version control layer in p2p file system
GCC'05 Proceedings of the 4th international conference on Grid and Cooperative Computing
Analysing the MUTE anonymous file-sharing system using the pi-calculus
FORTE'06 Proceedings of the 26th IFIP WG 6.1 international conference on Formal Techniques for Networked and Distributed Systems
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
A survey of anonymous peer-to-peer file-sharing
EUC'05 Proceedings of the 2005 international conference on Embedded and Ubiquitous Computing
Bio-inspired replica density control in dynamic networks
BioADIT'06 Proceedings of the Second international conference on Biologically Inspired Approaches to Advanced Information Technology
An ECA rule rewriting mechanism for peer data management systems
EDBT'06 Proceedings of the 10th international conference on Advances in Database Technology
Safe and private data sharing with turtle: friends team-up and beat the system
SP'04 Proceedings of the 12th international conference on Security Protocols
Intelligent dependability services for overlay networks
DAIS'06 Proceedings of the 6th IFIP WG 6.1 international conference on Distributed Applications and Interoperable Systems
Protecting agent from attack in grid computing
CDVE'06 Proceedings of the Third international conference on Cooperative Design, Visualization, and Engineering
Enhanced search in peer-to-peer networks using fuzzy logic
ICDCIT'10 Proceedings of the 6th international conference on Distributed Computing and Internet Technology
Information Leaks in Structured Peer-to-Peer Anonymous Communication Systems
ACM Transactions on Information and System Security (TISSEC) - Special Issue on Computer and Communications Security
DAEDALUS: a peer-to-peer shared memory system for ubiquitous computing
Euro-Par'06 Proceedings of the 12th international conference on Parallel Processing
Attribute-Based access to distributed data over p2p networks
DNIS'05 Proceedings of the 4th international conference on Databases in Networked Information Systems
A peer-to-peer content distribution network
From Integrated Publication and Information Systems to Virtual Information and Knowledge Environments
Discovery and routing in the HEN heterogeneous peer-to-peer network
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
LQPD: an efficient long query path driven replication strategy in unstructured p2p network
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
An efficient anonymous scheme for mutual anonymous communications
ICN'05 Proceedings of the 4th international conference on Networking - Volume Part II
Efficient range queries and fast lookup services for scalable p2p networks
DBISP2P'04 Proceedings of the Second international conference on Databases, Information Systems, and Peer-to-Peer Computing
On constructing internet-scale p2p information retrieval systems
DBISP2P'04 Proceedings of the Second international conference on Databases, Information Systems, and Peer-to-Peer Computing
AESOP: altruism-endowed self-organizing peers
DBISP2P'04 Proceedings of the Second international conference on Databases, Information Systems, and Peer-to-Peer Computing
ACP2P: agent community based peer-to-peer information retrieval
AP2PC'04 Proceedings of the Third international conference on Agents and Peer-to-Peer Computing
Censorship resistance revisited
IH'05 Proceedings of the 7th international conference on Information Hiding
Semantic query routing and processing in p2p database systems: the ICS-FORTH SQPeer middleware
EDBT'04 Proceedings of the 2004 international conference on Current Trends in Database Technology
Hybrid-Chord: a peer-to-peer system based on chord
ICDCIT'04 Proceedings of the First international conference on Distributed Computing and Internet Technology
Client and server anonymity preserving in p2p networks
ASWC'06 Proceedings of the First Asian conference on The Semantic Web
A traffic identification method and evaluations for a pure p2p application
PAM'05 Proceedings of the 6th international conference on Passive and Active Network Measurement
Recard: using recommendation cards approach for building trust in peer-to-peer networks
ISPEC'05 Proceedings of the First international conference on Information Security Practice and Experience
iTrust'05 Proceedings of the Third international conference on Trust Management
AP2PC'03 Proceedings of the Second international conference on Agents and Peer-to-Peer Computing
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Friends troubleshooting network: towards privacy-preserving, automatic troubleshooting
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
A detailed examination of the overlay construction and maintenance mechanism in BitTorrent
Computer Communications
Service deployment in active networks based on a p2p system
MATA'05 Proceedings of the Second international conference on Mobility Aware Technologies and Applications
Achieving efficient conjunctive keyword searches over encrypted data
ICICS'05 Proceedings of the 7th international conference on Information and Communications Security
Improving sender anonymity in a structured overlay with imprecise routing
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Valet services: improving hidden servers with a personal touch
PET'06 Proceedings of the 6th international conference on Privacy Enhancing Technologies
Search support in data management systems
Data Management in a Connected World
Semantic data management in peer-to-peer e-commerce applications
Journal on Data Semantics VI
NGITS'06 Proceedings of the 6th international conference on Next Generation Information Technologies and Systems
ACP2P: agent-community-based peer-to-peer information retrieval – an evaluation
AP2PC'05 Proceedings of the 4th international conference on Agents and Peer-to-Peer Computing
Cost models and performance evaluation of similarity search in the HON p2p system
ISPA'06 Proceedings of the 4th international conference on Parallel and Distributed Processing and Applications
Evaluating the dynamic behaviour of PROSA P2P network
ISPA'06 Proceedings of the 4th international conference on Parallel and Distributed Processing and Applications
Privacy preserving web-based email
ICISS'06 Proceedings of the Second international conference on Information Systems Security
Managing critical infrastructures through virtual network communities
CRITIS'07 Proceedings of the Second international conference on Critical Information Infrastructures Security
Protecting agent from attack in grid computingII
IDEAL'06 Proceedings of the 7th international conference on Intelligent Data Engineering and Automated Learning
Improving search in unstructured P2P systems: intelligent walks (I-walks)
IDEAL'06 Proceedings of the 7th international conference on Intelligent Data Engineering and Automated Learning
Choosing appropriate peer-to-peer infrastructure for your digital libraries
ICADL'05 Proceedings of the 8th international conference on Asian Digital Libraries: implementing strategies and sharing experiences
FAST'05 Proceedings of the Third international conference on Formal Aspects in Security and Trust
Peer-to-Peer Information Retrieval: An Overview
ACM Transactions on Information Systems (TOIS)
iTrust: trustworthy information publication, search and retrieval
ICDCN'12 Proceedings of the 13th international conference on Distributed Computing and Networking
A new location layer for the TCP/IP protocol stack
ACM SIGCOMM Computer Communication Review
Building a network-aware and load-balanced peer-to-peer system for range queries
Computer Networks: The International Journal of Computer and Telecommunications Networking
Contextual Trust Aided Enhancement of Data Availability in Peer-to-Peer Backup Storage Systems
Journal of Network and Systems Management
Capacity and load-aware service discovery with service selection in peer-to-peer grids
Future Generation Computer Systems
Video streaming over P2P networks: Challenges and opportunities
Image Communication
Cost-effective broadcast for fully decentralized peer-to-peer networks
Computer Communications
Flood search under the California Split rule
Operations Research Letters
Self-organization and multiagent systems: I. Models of multiagent self-organization
Journal of Computer and Systems Sciences International
A deniable and efficient question and answer service over ad hoc social networks
Information Retrieval
A semantic searching scheme in heterogeneous unstructured P2P networks
Journal of Computer Science and Technology - Special issue on Natural Language Processing
A hierarchical approach to improve performance of unstructured peer-to-peer system
International Journal of Communication Networks and Distributed Systems
Data mobility in peer-to-peer systems to improve robustness
AP2PC'08 Proceedings of the 7th international conference on Agents and Peer-to-Peer Computing
A semi-structured overlay network for large-scale peer-to-peer systems
AP2PC'08 Proceedings of the 7th international conference on Agents and Peer-to-Peer Computing
How many eyes are spying on your shared folders?
Proceedings of the 2012 ACM workshop on Privacy in the electronic society
Security and Communication Networks
FreeDOM: a new baseline for the web
Proceedings of the 11th ACM Workshop on Hot Topics in Networks
Path query routing in unstructured peer-to-peer networks
Euro-Par'07 Proceedings of the 13th international Euro-Par conference on Parallel Processing
Accelerate data sharing in a wide-area networked file storage system
Euro-Par'07 Proceedings of the 13th international Euro-Par conference on Parallel Processing
Generic emergent overlays in arbitrary peer identifier spaces
IWSOS'07 Proceedings of the Second international conference on Self-Organizing Systems
Countering statistical disclosure with receiver-bound cover traffic
ESORICS'07 Proceedings of the 12th European conference on Research in Computer Security
A prediction-based fair replication algorithm in structured P2P systems
ATC'07 Proceedings of the 4th international conference on Autonomic and Trusted Computing
Design of a P2P content recommendation system using affinity networks
Computer Communications
Towards Robust Routing in HD Tree
DS-RT '12 Proceedings of the 2012 IEEE/ACM 16th International Symposium on Distributed Simulation and Real Time Applications
StrU: a user behaviour-aware video-on-demand streaming service
Proceedings of the 10th International Conference on Advances in Mobile Computing & Multimedia
Improving content availability in the i2p anonymous file-sharing environment
CSS'12 Proceedings of the 4th international conference on Cyberspace Safety and Security
Applying mapreduce framework to peer-to-peer computing applications
ICCCI'12 Proceedings of the 4th international conference on Computational Collective Intelligence: technologies and applications - Volume Part II
International Journal of Information and Communication Technology
Social ant colony-inspired modelling approach for rapid response design
International Journal of Computer Applications in Technology
A security pattern for data integrity in P2P systems
Proceedings of the 17th Conference on Pattern Languages of Programs
Review: An overview of anonymity technology usage
Computer Communications
The state of peer-to-peer network simulators
ACM Computing Surveys (CSUR)
Message in a bottle: sailing past censorship
Proceedings of the 29th Annual Computer Security Applications Conference
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
Open Social Networking for Online Collaboration
International Journal of e-Collaboration
Supporting Social Networks With Agent-Based Services
International Journal of Virtual Communities and Social Networking
Mobile peer-to-peer approach for social computing services in distributed environment
Proceedings of the Fourth Symposium on Information and Communication Technology
Caching in information centric networking: A survey
Computer Networks: The International Journal of Computer and Telecommunications Networking
GTNA 2.0 - a framework for rapid prototyping and evaluation of routing algorithms
Proceedings of the 2013 Summer Computer Simulation Conference
An efficient resource discovery framework for pure unstructured peer-to-peer systems
Computer Networks: The International Journal of Computer and Telecommunications Networking
Real-time data dissemination in mobile peer-to-peer networks
Journal of Systems and Software
Large-scale cooperative task distribution on peer-to-peer networks
Web Intelligence and Agent Systems
Distributed caching in unstructured peer-to-peer file sharing networks
Computers and Electrical Engineering
Hi-index | 0.05 |
We describe Freenet, an adaptive peer-to-peer network application that permits the publication, replication, and retrieval of data while protecting the anonymity of both authors and readers. Freenet operates as a network of identical nodes that collectively pool their storage space to store data files and cooperate to route requests to the most likely physical location of data. No broadcast search or centralized location index is employed. Files are referred to in a location-independent manner, and are dynamically replicated in locations near requestors and deleted from locations where there is no interest. It is infeasible to discover the true origin or destination of a file passing through the network, and difficult for a node operator to determine or be held responsible for the actual physical contents of her own node.