-
1
-
-
76549129767
-
-
May 2009
-
Abeni, L., Kiraly, C., Lo Cigno, R.: On the Optimal Scheduling of Streaming Applications in Unstructured Meshes, ifip Networking 2009 (May 2009)
-
(2009)
On the Optimal Scheduling of Streaming Applications in Unstructured Meshes, Ifip Networking
-
-
Abeni, L.1
Kiraly, C.2
Lo Cigno, R.3
-
2
-
-
84864171058
-
-
Babelgum, http://www.babelgum.com
-
-
-
-
5
-
-
33646909480
-
-
RFC 3711 (Draft Standard) (March)
-
Baugher, M., McGrew, D., Naslund, M., Carrara, E., Norrman, K.: The Secure Real-time Transport Protocol (SRTP), RFC 3711 (Draft Standard) (March 2004), http://www.ietf.org/rfc/rfc3711.txt
-
(2004)
The Secure Real-time Transport Protocol (SRTP)
-
-
Baugher, M.1
Mc Grew, D.2
Naslund, M.3
Carrara, E.4
Norrman, K.5
-
8
-
-
36949010279
-
Silver needle in the skype
-
March
-
Biondi, P., Desclaux, F.: Silver Needle in the Skype, BlackHat Europe 2006 (March 2006), http://www.blackhat.com/presentations/bh-europe-06/bh-eu-06- biondi/ bh-eu-06-biondi-up.pdf
-
(2006)
Black Hat Europe 2006
-
-
Biondi, P.1
Desclaux, F.2
-
9
-
-
57349185920
-
Epidemic live streaming: Optimal performance trade-offs
-
SIGMETRICS
-
Bonald, T., Massoulie, L., Mathieu, F., Perino, D., Twigg, A.: Epidemic live streaming: optimal performance trade-offs. In: International Conference on Measurement and Modeling of Computer Systems, SIGMETRICS (2008)
-
(2008)
International Conference on Measurement and Modeling of Computer Systems
-
-
Bonald, T.1
Massoulie, L.2
Mathieu, F.3
Perino, D.4
Twigg, A.5
-
10
-
-
36949009834
-
Revealing skype traffic: When randomness plays with you
-
Bonfiglio, D., Mellia, M., Meo, M., Rossi, D., Tofanelli, P.: Revealing skype traffic: when randomness plays with you. In: Proceedings of SIGCOMM 2007 (2007)
-
(2007)
Proceedings of SIGCOMM 2007
-
-
Bonfiglio, D.1
Mellia, M.2
Meo, M.3
Rossi, D.4
Tofanelli, P.5
-
11
-
-
0036802048
-
Scribe: A large-scale and decentralized application-level multicast infrastructure
-
October
-
Castro, M., Druschel, P., Kermarrec, A.-M., Rowstron, A.: Scribe: A large-scale and decentralized application-level multicast infrastructure. IEEE Journal on Selected Areas in Communications 20(8) (October 2002)
-
(2002)
IEEE Journal on Selected Areas in Communications
, vol.20
, Issue.8
-
-
Castro, M.1
Druschel, P.2
Kermarrec, A.-M.3
Rowstron, A.4
-
12
-
-
70449370459
-
Peer-to-peer overlays for real- time communication: Security issues and solutions
-
January
-
Chopra, D., Schulzrinne, H., Marocco, E., Ivov, E.: Peer-to-Peer Overlays for Real- Time Communication: Security Issues and Solutions. IEEE Communications Surveys & Tutorials 11(1) (January 2009)
-
(2009)
IEEE Communications Surveys & Tutorials
, vol.11
, Issue.1
-
-
Chopra, D.1
Schulzrinne, H.2
Marocco, E.3
Ivov, E.4
-
13
-
-
33749983891
-
-
University of California at Berkeley Technical Report No. UCB/EECS- 2005-2011 (November)
-
Condie, T., Kacholia, V., Sankararaman, S., Maniatis, P., Hellerstein, J.M.: Maelstrom: Churn as Shelter, University of California at Berkeley Technical Report No. UCB/EECS-2005-2011 (November 2005)
-
(2005)
Maelstrom: Churn As Shelter
-
-
Condie, T.1
Kacholia, V.2
Sankararaman, S.3
Maniatis, P.4
Hellerstein, J.M.5
-
14
-
-
33646038920
-
Sybil resistant DHT routing
-
di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. Springer, Heidelberg
-
Danezis, G., Lesniewski-Laas, C., Kaashoek, M.F., Anderson, R.: Sybil resistant DHT routing. In: di Vimercati, S.d.C., Syverson, P.F., Gollmann, D. (eds.) ESORICS 2005. LNCS, vol.3679, pp. 305-318. Springer, Heidelberg (2005)
-
(2005)
LNCS
, vol.3679
, pp. 305-318
-
-
Danezis, G.1
Lesniewski-Laas, C.2
Kaashoek, M.F.3
Anderson, R.4
-
15
-
-
66649129942
-
The pollution attack in P2P live video streaming: Measurement results and defenses
-
Dhungel, P., Hei, X., Ross, K.W., Saxena, N.: The pollution attack in P2P live video streaming: measurement results and defenses. In: Proceedings of the 2007 Workshop on Peer-to-peer Streaming and IPTV 2007, pp. 323-328 (2007)
-
(2007)
Proceedings of the 2007 Workshop on Peer-to-peer Streaming and IPTV 2007
, pp. 323-328
-
-
Dhungel, P.1
Hei, X.2
Ross, K.W.3
Saxena, N.4
-
16
-
-
84947273682
-
The sybil attack
-
Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. Springer, Heidelberg
-
Douceur, J.R.: The sybil attack. In: Druschel, P., Kaashoek, M.F., Rowstron, A. (eds.) IPTPS 2002. LNCS, vol.2429, p. 251. Springer, Heidelberg (2002)
-
(2002)
LNCS
, vol.2429
, pp. 251
-
-
Douceur, J.R.1
-
17
-
-
70449578129
-
IPTV over P2P streaming networks: The mesh-pull approach
-
Hei, X., Liu, Y., Ross, K.: IPTV over P2P streaming networks: the mesh-pull approach. IEEE JCommunications Magazine 46(2), 86-92 (2008)
-
(2008)
IEEE JCommunications Magazine
, vol.46
, Issue.2
, pp. 86-92
-
-
Hei, X.1
Liu, Y.2
Ross, K.3
-
18
-
-
62649104662
-
-
draft-ietf-p2psip-base-02, internet draft (work in progress)
-
Jennings, C., Lowekamp, B., Rescorla, E., Baset, S., Schulzrinne, H.: REsource LOcation And Discovery (RELOAD) Base Protocol, draft-ietf-p2psip-base- 02, internet draft (work in progress), http://tools.ietf.org/html/draft-ietf- p2psip-base
-
REsource LOcation and Discovery (RELOAD) Base Protocol
-
-
Jennings, C.1
Lowekamp, B.2
Rescorla, E.3
Baset, S.4
Schulzrinne, H.5
-
19
-
-
77951157906
-
A survey and comparison of peer-to-peer overlay network schemes
-
Lua, E.K., Crowcroft, J., Pias, M., Sharma, R., Lim, S.: A Survey and Comparison of Peer-to-Peer Overlay Network Schemes. IEEE Communications Surveys and Tutorials 7(2), 72-93 (2005)
-
(2005)
IEEE Communications Surveys and Tutorials
, vol.7
, Issue.2
, pp. 72-93
-
-
Lua, E.K.1
Crowcroft, J.2
Pias, M.3
Sharma, R.4
Lim, S.5
-
21
-
-
84864169526
-
-
P2PSIP Status Pages: Peer-to-Peer Session Initiation Protocol (Active WG)
-
P2PSIP Status Pages: Peer-to-Peer Session Initiation Protocol (Active WG), http://tools.ietf.org/wg/p2psip/
-
-
-
-
22
-
-
84864164685
-
-
PPLive, http://www.pplive.com
-
-
-
-
23
-
-
50249102911
-
On spam over internet telephony (SPIT) prevention
-
Quittek, J., Niccolini, S., Tartarelli, S., Schlegel, R.: On Spam over Internet Telephony (SPIT) Prevention. IEEE Communications Magazine 22(5) (2008)
-
(2008)
IEEE Communications Magazine
, vol.22
, Issue.5
-
-
Quittek, J.1
Niccolini, S.2
Tartarelli, S.3
Schlegel, R.4
-
24
-
-
0037984544
-
-
RFC 3261
-
Rosenberg, J., Schulzrinne, H., Camarillo, G., Johnston, A., Peterson, J., Sparks, R., Handley, M., Schooler, E.: SIP: Session Initiation Protocol, RFC 3261 (2002)
-
(2002)
SIP: Session Initiation Protocol
-
-
Rosenberg, J.1
Schulzrinne, H.2
Camarillo, G.3
Johnston, A.4
Peterson, J.5
Sparks, R.6
Handley, M.7
Schooler, E.8
-
25
-
-
57349142855
-
Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems
-
Guerraoui, R. (ed.) Middleware 2001. Springer, Heidelberg
-
Rowstron, A., Druschel, P.: Pastry: Scalable, decentralized object location, and routing for large-scale peer-to-peer systems. In: Guerraoui, R. (ed.) Middleware 2001. LNCS, vol.2218, p. 329. Springer, Heidelberg (2001)
-
(2001)
LNCS
, vol.2218
, pp. 329
-
-
Rowstron, A.1
Druschel, P.2
-
26
-
-
57349182190
-
Using cryptographically generated SIP-URIs to protect the integrity of content in P2P-SIP
-
Berlin Germany (June)
-
Seedorf, J.: Using Cryptographically Generated SIP-URIs to Protect the Integrity of Content in P2P-SIP. In: 3rd Annual VoIP Security Wksp., Berlin, Germany (June 2006)
-
(2006)
3rd Annual VoIP Security Wksp
-
-
Seedorf, J.1
-
28
-
-
57349083222
-
Lawful interception in P2P-based VoIP systems
-
Schulzrinne, H., State, R., Niccolini, S. (eds.) IPTComm 2008. Springer, Heidelberg
-
Seedorf, J.: Lawful Interception in P2P-Based VoIP Systems. In: Schulzrinne, H., State, R., Niccolini, S. (eds.) IPTComm 2008. LNCS, vol.5310, pp. 217-235. Springer, Heidelberg (2008)
-
(2008)
LNCS
, vol.5310
, pp. 217-235
-
-
Seedorf, J.1
-
29
-
-
67249116907
-
Evaluating P2PSIP under attack: An emulative study
-
November
-
Seedorf, J., Ruwolt, F., Stiemerling, M., Niccolini, S.: Evaluating P2PSIP under Attack: An Emulative Study. In: IEEE Globecom 2008 (November 2008)
-
(2008)
IEEE Globecom 2008
-
-
Seedorf, J.1
Ruwolt, F.2
Stiemerling, M.3
Niccolini, S.4
-
31
-
-
84864171065
-
-
SIPDHT: http://sipdht.sourceforge.net
-
-
-
-
34
-
-
0037298256
-
Chord: A scalable peer-to-peer lookup protocol for internet applications
-
Febuary
-
Stoica, I., Morris, R., Liben-Nowell, D., Karger, D.R., Kaashoek, M.F., Dabek, F., Balakrishnan, H.: Chord: A Scalable Peer-to-Peer Lookup Protocol for Internet Applications. IEEE/ACM Transactions on Networking 11(1) (Febuary 2003)
-
(2003)
IEEE/ACM Transactions on Networking
, vol.11
, Issue.1
-
-
Stoica, I.1
Morris, R.2
Liben-Nowell, D.3
Karger, D.R.4
Kaashoek, M.F.5
Dabek, F.6
Balakrishnan, H.7
-
35
-
-
84864169523
-
-
TVANTS p2p, http://www.tvants.com
-
-
-
-
36
-
-
84864169524
-
-
TVU Networks, http://www.tvunetworks.com
-
-
-
-
37
-
-
84864164679
-
-
Zattoo: TV meets PC
-
Zattoo: TV meets PC, http://www.zattoo.com
-
-
-
-
38
-
-
74549168128
-
ZRTP: Media path key agreement for secure RTP
-
(work in progress) (February)
-
Zimmermann, P., Johnston, A., Callas, J.: ZRTP: Media Path Key Agreement for Secure RTP, Internet-Draft (work in progress) (February 2009)
-
(2009)
Internet-Draft
-
-
Zimmermann, P.1
Johnston, A.2
Callas, J.3
|