Client/server architecture (2nd ed.)
Client/server architecture (2nd ed.)
Untraceable electronic mail, return addresses, and digital pseudonyms
Communications of the ACM
Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design
Cracking DES: Secrets of Encryption Research, Wiretap Politics and Chip Design
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
Peer-to-Peer: Harnessing the Power of Disruptive Technologies
SETI@home: an experiment in public-resource computing
Communications of the ACM
Protecting Free Expression Online with Freenet
IEEE Internet Computing
Research Commentary: Information Systems and Conceptual Modeling--A Research Agenda
Information Systems Research
Deconstructing the Kazaa Network
WIAPP '03 Proceedings of the The Third IEEE Workshop on Internet Applications
Computer Networking: A Top-Down Approach Featuring the Internet
Computer Networking: A Top-Down Approach Featuring the Internet
FPN: A Distributed Hash Table for Commercial Applications
HPDC '04 Proceedings of the 13th IEEE International Symposium on High Performance Distributed Computing
A survey of peer-to-peer content distribution technologies
ACM Computing Surveys (CSUR)
Server Architectures: Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions
Server Architectures: Multiprocessors, Clusters, Parallel Systems, Web Servers, Storage Solutions
Legal and technical issues management framework for peer-to-peer networks
Journal of Theoretical and Applied Electronic Commerce Research
Publius: a robust, tamper-evident, censorship-resistant web publishing system
SSYM'00 Proceedings of the 9th conference on USENIX Security Symposium - Volume 9
The bittorrent p2p file-sharing system: measurements and analysis
IPTPS'05 Proceedings of the 4th international conference on Peer-to-Peer Systems
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Journal of Theoretical and Applied Electronic Commerce Research
Hi-index | 0.00 |
Applications running over peer-to-peer (P2P) networks have exploded since the late 1990s. Research is needed into many aspects of P2P. These include architecture, application functionality, and the categories of digital works that are shared using P2P facilities. A range of significant strategic, consumer and policy issues also arise, such as challenges to the operation of copyright, defamation and other censorship laws. Organisations affected by P2P are devising and deploying countermeasures, such as technological protections for digital works and attempts to identify devices and users. These too require study. This paper presents the landscape of research opportunities, indicating methods that might be appropriately applied to the various kinds of questions.