-
A Comparative Analysis of NAT Hole Punching

-
NAT Hole Punching Revisited

-
Analysis and Efficient Classification of P2P File Sharing Traffic

-
Replica Placement and Location using Distributed Hash Tables

-
Bringing Efficient Advanced Queries to Distributed Hash Tables

-
Establishing Trust in Distributed Storage Providers

-
Dynamic Replica Management in Distributed Hash Tables

-
Indra: A Peer-to-Peer Approach to Network Intrusion Detection and Prevention

-
Efficient Topology-Aware Overlay Network


