A survey of anonymous peer-to-peer file-sharing

34Citations
Citations of this article
40Readers
Mendeley users who have this article in their library.

This article is free to access.

Abstract

This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting, MIXes and UDP address spoofing. We then describe a number of implemented systems based on one, or a combination of, these methods. Finally, we discuss possible attacks on the anonymity of these systems and give examples of particular attacks and defences used by the systems we describe. © IFIP International Federation for Information Processing 2005.

Cite

CITATION STYLE

APA

Chothia, T., & Chatzikokolakis, K. (2005). A survey of anonymous peer-to-peer file-sharing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3823 LNCS, pp. 744–755). https://doi.org/10.1007/11596042_77

Register to see more suggestions

Mendeley helps you to discover research relevant for your work.

Already have an account?

Save time finding and organizing research with Mendeley

Sign up for free