This paper provides a survey of searchable, peer-to-peer file-sharing systems that offer the user some form of anonymity. We start this survey by giving a brief description of the most popular methods of providing anonymous communication. These include the Ants protocol, Onion routing, Multicasting, MIXes and UDP address spoofing. We then describe a number of implemented systems based on one, or a combination of, these methods. Finally, we discuss possible attacks on the anonymity of these systems and give examples of particular attacks and defences used by the systems we describe. © IFIP International Federation for Information Processing 2005.
CITATION STYLE
Chothia, T., & Chatzikokolakis, K. (2005). A survey of anonymous peer-to-peer file-sharing. In Lecture Notes in Computer Science (including subseries Lecture Notes in Artificial Intelligence and Lecture Notes in Bioinformatics) (Vol. 3823 LNCS, pp. 744–755). https://doi.org/10.1007/11596042_77
Mendeley helps you to discover research relevant for your work.