In a hybrid peer-to-peer (P2P) system, some operations are intentionally centralized, such as indexing of peers ’ files. We present several protocols to achieve mutual communi-cation anonymity between an information requester and a provider in a hybrid P2P information-sharing environment with trusted index servers such that neither the requester, nor the provider can identify each other, and no other peers can identify the two communicating parties with certainty. Some existing protocols provide solutions to achieve mutual anonymity in pure P2P systems without any trusted central controls. Compared with two representative protocols, our proposed mutual anonymity protocols improve efficiency by utilizing trusted third parties and aiming at b...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as...
Nowadays information systems are being shifted to distributed architectures to obtain the benefits l...
We addressed a problem of safe mutually anonymous communication in a P2P overlay. Any peer in the ov...
Abstract—We present several protocols to achieve mutual communication anonymity between an informati...
[[abstract]]In this paper, we present two types of protocols that can achieve mutual anonymity in pe...
Peer-to-Peer (P2P) computing has become a popular application model because of its easy resource sha...
P2P networks employ the resources available at peers to reduce the load at, or eliminate the need fo...
International audiencePeer-To-Peer networks have become increasingly common as a means of transferri...
Abstract — A mutually anonymous service hides the identity of a client from the service provider and...
A mutually anonymous service hides the identity of a client from the service provider and vice-versa...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as...
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communi...
Establishing trust in an unknown entity is difficult in malicious environments. In a peer-to-peer sy...
In an environment where privacy is an increasing concern to users that communicate through a public ...
A mutual anonymity system enables communication between a client and a service provider without reve...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as...
Nowadays information systems are being shifted to distributed architectures to obtain the benefits l...
We addressed a problem of safe mutually anonymous communication in a P2P overlay. Any peer in the ov...
Abstract—We present several protocols to achieve mutual communication anonymity between an informati...
[[abstract]]In this paper, we present two types of protocols that can achieve mutual anonymity in pe...
Peer-to-Peer (P2P) computing has become a popular application model because of its easy resource sha...
P2P networks employ the resources available at peers to reduce the load at, or eliminate the need fo...
International audiencePeer-To-Peer networks have become increasingly common as a means of transferri...
Abstract — A mutually anonymous service hides the identity of a client from the service provider and...
A mutually anonymous service hides the identity of a client from the service provider and vice-versa...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as...
Mobile Peer-to-Peer Networks (MOPNETs) have become popular applications due to their ease of communi...
Establishing trust in an unknown entity is difficult in malicious environments. In a peer-to-peer sy...
In an environment where privacy is an increasing concern to users that communicate through a public ...
A mutual anonymity system enables communication between a client and a service provider without reve...
Peer-to-peer information sharing environments are increasingly gaining acceptance on the Internet as...
Nowadays information systems are being shifted to distributed architectures to obtain the benefits l...
We addressed a problem of safe mutually anonymous communication in a P2P overlay. Any peer in the ov...