Recent Changes - Search:

peer-to-peer protocols

Rate this item

0 stars Not rated yet

InputLabel2($m[1], $m[2]) InputLabel2($m[1], $m[2]) InputLabel2($m[1], $m[2]) InputLabel2($m[1], $m[2]) InputLabel2($m[1], $m[2])
Author
arnaud.legout
URL
http://cel.archives-ouvertes.fr/cel-00544132/en/(approve sites)
Abstract
Course on peer-to-peer content replication protocols with a focus on BitTorrent. This course also address fundamental issues of distributed security and privacy.

The outline of the course is the following:

  • Overview
    • What is a P2P application?
    • Popularity of P2P applications?
  • Content replication
    • P2P performance
    • Parallel download
    • Piece and peer selection
  • BitTorrent
    • Protocol overview
    • Algorithm details
    • Evaluation
      • Torrent scale
        • Tracker log analysis
        • Large scale crawl
      • Algorithms
  • Advanced subjects
    • Defeating BitTorrent
    • BitTorrent locality
  • Security
    • Foundations
      • Shared secret
      • Chaum network
    • Privacy attacks

Tags: , , , ,



Comments


Post a comment on this page

Heading:
 Your Message
 
 Enter value Captcha <- Have you entered the code number?
Author:
Edit - History - Print - Recent Changes - Search
Page last modified on December 07, 2010, at 09:12 PM