Gawande et al., 2019 - Google Patents
Decentralized and secure multimedia sharing application over named data networkingGawande et al., 2019
View PDF- Document ID
- 14325826399620870791
- Author
- Gawande A
- Clark J
- Coomes D
- Wang L
- Publication year
- Publication venue
- Proceedings of the 6th ACM conference on information-centric networking
External Links
Snippet
Named Data Networking (NDN) thrives in peer-to-peer data sharing scenarios, through naming data and decoupling data from its containers. Meanwhile, social media applications have come under increased criticism for excessive centralization and opacity. We present …
- 238000011156 evaluation 0 abstract description 3
Classifications
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1087—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving cross functional networking aspects
- H04L67/1093—Some peer nodes performing special functions
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1061—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving node-based peer discovery mechanisms
- H04L67/1065—Discovery involving distributed pre-established resource-based relationships among peers, e.g. based on distributed hash tables [DHT]
-
- H—ELECTRICITY
- H04—ELECTRIC COMMUNICATION TECHNIQUE
- H04L—TRANSMISSION OF DIGITAL INFORMATION, e.g. TELEGRAPHIC COMMUNICATION
- H04L67/00—Network-specific arrangements or communication protocols supporting networked applications
- H04L67/10—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network
- H04L67/104—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks
- H04L67/1042—Network-specific arrangements or communication protocols supporting networked applications in which an application is distributed across nodes in the network for peer-to-peer [P2P] networking; Functionalities or architectural details of P2P networks involving topology management mechanisms
- H04L67/1044—Group management mechanisms
Similar Documents
Publication | Publication Date | Title |
---|---|---|
Paul et al. | A survey on decentralized online social networks | |
Tootoonchian et al. | Lockr: better privacy for social networks | |
Nilizadeh et al. | Cachet: a decentralized architecture for privacy preserving social networking with caching | |
US12267325B2 (en) | Localized machine learning of user behaviors in network operating system for enhanced secure services in secure data network | |
US11582241B1 (en) | Community server for secure hosting of community forums via network operating system in secure data network | |
US11792186B2 (en) | Secure peer-to-peer based communication sessions via network operating system in secure data network | |
Gawande et al. | Decentralized and secure multimedia sharing application over named data networking | |
US12160741B2 (en) | Device-specific selection between peer-to-peer connections and core-based hybrid peer-to-peer connections in a secure data network | |
US12069032B2 (en) | Autonomic distribution of hyperlinked hypercontent in a secure peer-to-peer data network | |
US12113785B2 (en) | Directory server providing tag enforcement and network entity attraction in a secure peer-to-peer data network | |
Graffi et al. | LibreSocial: A peer‐to‐peer framework for online social networks | |
Fotiou et al. | Capability-based access control for multi-tenant systems using OAuth 2.0 and Verifiable Credentials | |
Nagy et al. | Peershare: A system secure distribution of sensitive data among social contacts | |
US12052266B2 (en) | Secure streaming media based on updating hypercontent in a secure peer-to-peer data network | |
AlQallaf | Blockchain-based digital identity management scheme for field connected IoT devices | |
US11870899B2 (en) | Secure device access recovery based on validating encrypted target password from secure recovery container in trusted recovery device | |
Chen et al. | An open identity authentication scheme based on blockchain | |
Mallick et al. | Security aspects of social media applications | |
Chakrabarti et al. | iSecure: Imperceptible and secure peer-to-peer communication of post-disaster situational data over opportunistic DTN | |
Yu et al. | Pythonrepo: Persistent in-network storage for named data networking | |
Åslund | Authentication in peer-to-peer systems | |
Zhou et al. | An Approach for Multi-Level Visibility Scoping of IoT Services in Enterprise Environments | |
Zeidler et al. | Towards a framework for privacy-preserving data sharing in portable clouds | |
Kanjalkar et al. | CryptoComm: A Decentralized Chat System Using Blockchain | |
US20230125556A1 (en) | Secure autonomic recovery from unusable data structure via a trusted device in a secure peer-to-peer data network |