In the recent past we introduced two new security applications built on peer-to-peer systems and distributed hashtables (DHTs). First, we designed Adeona [18], which leverages DHTs to provide a privacy-preserving laptop tracking solution. Second, we designed the Vanish [10] self-destructing data system, which uses DHTs to protect against retroactive attacks on archived data in the cloud. Both systems exploit intuitive properties of DHTs that differentiate them from centralized solutions: e.g., complete or partial decentralization, giant scale, and geographic distribution. We implemented and made publicly available research prototypes of both Adeona and Vanish; the Adeona prototype uses OpenDHT as its underlying DHT and the Vanish prototype ...
In the modern era of ubiquitous computing, privacy is one of the most critical user concerns. To pre...
Distributed Hash Tables (DHTs) are a popular and natural choice when dealing with dynamic resource l...
International audienceBy decentralizing control, P2P systems provide efficient, scalable data sharin...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
Distributed Hash Table (DHT) protocols, such as Kademlia, provide a decentralized key-value lookup w...
ii iii Distributed Hash Tables (DHTs) have been used as a common building block in many distributed ...
Peer-to-peer networks based on Distributed Hash Tables (DHTs) have received considerable at-tention ...
Security has become a global problem in any field. Everyday millions of cyber crimes are being recor...
In a time where peer-to-peer networks, often with previously unconnected devices, are increasing in ...
Distributed architectures have emerged as a significant area of computing affecting the consumer dom...
Abstract. We consider the problem of designing scalable and robust information systems based on mult...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
This thesis describes a secure and reliable method for storing data in a distributed hash table (DHT...
Abstract—Many distributed applications, such as collaborative Web mapping, collaborative feedback an...
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has prev...
In the modern era of ubiquitous computing, privacy is one of the most critical user concerns. To pre...
Distributed Hash Tables (DHTs) are a popular and natural choice when dealing with dynamic resource l...
International audienceBy decentralizing control, P2P systems provide efficient, scalable data sharin...
Peer-to-peer networks based on distributed hash tables (DHTs) have received considerable attention e...
Distributed Hash Table (DHT) protocols, such as Kademlia, provide a decentralized key-value lookup w...
ii iii Distributed Hash Tables (DHTs) have been used as a common building block in many distributed ...
Peer-to-peer networks based on Distributed Hash Tables (DHTs) have received considerable at-tention ...
Security has become a global problem in any field. Everyday millions of cyber crimes are being recor...
In a time where peer-to-peer networks, often with previously unconnected devices, are increasing in ...
Distributed architectures have emerged as a significant area of computing affecting the consumer dom...
Abstract. We consider the problem of designing scalable and robust information systems based on mult...
Thesis (Ph. D.)--Massachusetts Institute of Technology, Dept. of Electrical Engineering and Computer...
This thesis describes a secure and reliable method for storing data in a distributed hash table (DHT...
Abstract—Many distributed applications, such as collaborative Web mapping, collaborative feedback an...
Most existing DHT algorithms assume that all nodes have equal capabilities. This assumption has prev...
In the modern era of ubiquitous computing, privacy is one of the most critical user concerns. To pre...
Distributed Hash Tables (DHTs) are a popular and natural choice when dealing with dynamic resource l...
International audienceBy decentralizing control, P2P systems provide efficient, scalable data sharin...