![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
SoK: Securing Email—A Stakeholder-Based Analysis
While email is the most ubiquitous and interoperable form of online communication today, it was not conceived with strong security guarantees, and the ensuing security enhancements are, by contrast, lacking in...
-
Chapter and Conference Paper
Cluster Computing on the Fly: P2P Scheduling of Idle Cycles in the Internet
Peer-to-peer computing, the harnessing of idle compute cycles throughout the Internet, offers exciting new research challenges in the converging domains of networking and distributed computing. Our system, Cluste...
-
Chapter and Conference Paper
The Scalability of Swarming Peer-to-Peer Content Delivery
Most web sites are unable to serve content to a large number of users due to the inherent limitations of client-server file transfer. Recent peer-to-peer content delivery protocols have demonstrated the feasib...
-
Article
An Evaluation of Shared Multicast Trees with Multiple Cores
Native multicast routing protocols have been built and deployed using two basic types of trees: single-source, shortest-path trees and shared, core-based trees. Core-based multicast trees use less routing stat...
-
Chapter and Conference Paper
An Evaluation of Shared Multicast Trees with Multiple Active Cores
Core-based multicast trees use less router state, but have significant drawbacks when compared to shortest-path trees, namely higher delay and poor fault tolerance. We evaluate the feasibility of using multipl...