L'objectif de cette thèse est de concevoir et d'appliquer de nouvelles méthodes de supervision capables d'appréhender les problèmes de sécurité affectant les données au sein des réseaux P2P structurés (DHT). Ceux-ci sont de deux types. D'une part les réseaux P2P sont utilisés pour diffuser des contenus illégaux dont l'activité est difficile à superviser. D'autre part, l'indexation des contenus légitimes peut être corrompue (attaque Sybil). Nous proposons tout d'abord une méthode de supervision des contenus basée sur l'insertion de sondes et le contrôle du mécanisme d'indexation du réseau. Celle-ci permet d'attirer l'ensemble des requêtes des pairs pour un contenu donné, puis de vérifier leur intention en générant des appâts très attractifs....
A peer-to-peer (P2P) network is composed of a set of entities (called pairs) which share a set of re...
Machine To Machine (M2M) is a network paradigm, based on self organizing devices that automatically ...
In this work we’re dealing with security in highly distributed systems, specifically peer-to-peer ne...
L'objectif de cette thèse est de concevoir et d'appliquer de nouvelles méthodes de supervision capab...
The purpose of this thesis is to design and implement new monitoring solutions which are able to dea...
International audienceSeveral large scale P2P networks operating on the Internet are based on a Dist...
Peer-to-Peer (P2P) protocols increasingly underlie a growing diversity of net- worked applications (...
International audienceWe propose a new distributed architecture that aims to investigate and control...
Les communautés en ligne pair-a-pair (P2P), comme les communautés professionnelles (p. ex., médicale...
The architecture of P2P file-sharing applications have been developing to meet the needs of large sc...
International audiencePublic blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) ne...
Online peer-to-peer (P2P) communities such as professional ones (e.g., medical or research communiti...
Peer-to-peer (P2P) is a distributed system without any centralized control or hierarchical organizat...
TrustedKad – Application of Trust Mechanisms to a Kademlia-Based Peer-to-Peer Network III Peer-to-pe...
Structured Peer-to-Peer (P2P) networks were proposed to solve routing problems of big distributed in...
A peer-to-peer (P2P) network is composed of a set of entities (called pairs) which share a set of re...
Machine To Machine (M2M) is a network paradigm, based on self organizing devices that automatically ...
In this work we’re dealing with security in highly distributed systems, specifically peer-to-peer ne...
L'objectif de cette thèse est de concevoir et d'appliquer de nouvelles méthodes de supervision capab...
The purpose of this thesis is to design and implement new monitoring solutions which are able to dea...
International audienceSeveral large scale P2P networks operating on the Internet are based on a Dist...
Peer-to-Peer (P2P) protocols increasingly underlie a growing diversity of net- worked applications (...
International audienceWe propose a new distributed architecture that aims to investigate and control...
Les communautés en ligne pair-a-pair (P2P), comme les communautés professionnelles (p. ex., médicale...
The architecture of P2P file-sharing applications have been developing to meet the needs of large sc...
International audiencePublic blockchains, like Ethereum, rely on an underlying peer-to-peer (P2P) ne...
Online peer-to-peer (P2P) communities such as professional ones (e.g., medical or research communiti...
Peer-to-peer (P2P) is a distributed system without any centralized control or hierarchical organizat...
TrustedKad – Application of Trust Mechanisms to a Kademlia-Based Peer-to-Peer Network III Peer-to-pe...
Structured Peer-to-Peer (P2P) networks were proposed to solve routing problems of big distributed in...
A peer-to-peer (P2P) network is composed of a set of entities (called pairs) which share a set of re...
Machine To Machine (M2M) is a network paradigm, based on self organizing devices that automatically ...
In this work we’re dealing with security in highly distributed systems, specifically peer-to-peer ne...