2015 12th Annual IEEE Consumer Communications and Networking Conference (CCNC) 2015
DOI: 10.1109/ccnc.2015.7157949
|View full text |Cite
|
Sign up to set email alerts
|

Preserving receiver's anonymity for circular structured P2P networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2
1
1

Citation Types

0
4
0

Year Published

2015
2015
2022
2022

Publication Types

Select...
5
2

Relationship

1
6

Authors

Journals

citations
Cited by 10 publications
(4 citation statements)
references
References 21 publications
0
4
0
Order By: Relevance
“…Random walk [36] and Flooding are the most commonly used searching techniques in unstructured networks [3,15,12]. Unstructured networks are less scalable, produce high network overhead and have lower search precision (due to queries being directed to irrelevant peers) compared to their structured counterparts [17,35,28,29]. Search precision also depends upon the number of hops a query travels.…”
Section: Related Workmentioning
confidence: 99%
“…Random walk [36] and Flooding are the most commonly used searching techniques in unstructured networks [3,15,12]. Unstructured networks are less scalable, produce high network overhead and have lower search precision (due to queries being directed to irrelevant peers) compared to their structured counterparts [17,35,28,29]. Search precision also depends upon the number of hops a query travels.…”
Section: Related Workmentioning
confidence: 99%
“…In this way, no one knows which one of these nodes is the exact one that has requested X . This concept is presented in .…”
Section: Sbt: Structural‐based Tunnelingmentioning
confidence: 99%
“…In these networks, each node uses the resources of other users and also has the capability to provide resources for other nodes [1], [2]. These networks have many applications, including file sharing, distributed processing and messages passing to other nodes which can cause many security problems [3], [4]. P2P networks are highly dependent on resources of their own users [5].…”
Section: Introductionmentioning
confidence: 99%