Skip to search form
Skip to main content
Skip to account menu
Semantic Scholar
Semantic Scholar's Logo
Search 205,262,656 papers from all fields of science
Search
Sign In
Create Free Account
Kad network
Known as:
KAD
The Kad network is a peer-to-peer (P2P) network which implements the Kademlia P2P overlay protocol. The majority of users on the Kad Network are also…
Expand
Wikipedia
Create Alert
Alert
Related topics
Related topics
15 relations
Alureon
Botnet
Client (computing)
Distributed hash table
Expand
Papers overview
Semantic Scholar uses AI to extract papers important to this topic.
Highly Cited
2018
Highly Cited
2018
Allocation Problems in Ride-Sharing Platforms: Online Matching with Offline Reusable Resources
John P. Dickerson
,
Karthik Abinav Sankararaman
,
A. Srinivasan
,
Pan Xu
AAAI
2018
Corpus ID: 12667815
Bipartite matching markets pair agents on one side of a market with agents, items, or contracts on the opposing side. Prior…
Expand
Highly Cited
2014
Highly Cited
2014
Amplification Hell: Revisiting Network Protocols for DDoS Abuse
C. Rossow
NDSS
2014
Corpus ID: 10745702
In distributed reflective denial-of-service (DRDoS) attacks, adversaries send requests to public servers (e.g., open recursive…
Expand
2010
2010
Poisoning the Kad Network
Thomas Locher
,
David Mysicka
,
S. Schmid
,
Roger Wattenhofer
ICDCN
2010
Corpus ID: 365153
Since the demise of the Overnet network, the Kad network has become not only the most popular but also the only widely used peer…
Expand
Highly Cited
2008
Highly Cited
2008
Attacking the Kad network
Peng Wang
,
J. Tyra
,
+4 authors
Yongdae Kim
SecureComm
2008
Corpus ID: 1767558
The Kad network, an implementation of the Kademlia DHT protocol, supports the popular eDonkey peer-to-peer file sharing network…
Expand
Highly Cited
2007
Highly Cited
2007
A global view of kad
Moritz Steiner
,
T. En-Najjary
,
E. Biersack
IMC '07
2007
Corpus ID: 2125684
Distributed hash tables (DHTs) have been actively studied in literature and many different proposals have been made on how to…
Expand
Highly Cited
2007
Highly Cited
2007
Exploiting KAD: possible uses and misuses
Moritz Steiner
,
T. En-Najjary
,
E. Biersack
CCRV
2007
Corpus ID: 6896018
Peer-to-peer systems have seen a tremendous growth in the last few years and peer-to-peer traffic makes a major fraction of the…
Expand
Highly Cited
2007
Highly Cited
2007
Actively Monitoring Peers in KAD
Moritz Steiner
,
E. Biersack
,
T. En-Najjary
IPTPS
2007
Corpus ID: 16953773
In recent years, a large number of DHTs have been proposed. However, very few of them have been deployed in real-life large scale…
Expand
Highly Cited
2006
Highly Cited
2006
Kleene algebra with domain
J. Desharnais
,
B. Möller
,
G. Struth
TOCL
2006
Corpus ID: 2620240
We propose Kleene algebra with domain (KAD), an extension of Kleene algebra by simple equational axioms for a domain and a…
Expand
Highly Cited
2006
Highly Cited
2006
Improving Lookup Performance Over a Widely-Deployed DHT
D. Stutzbach
,
R. Rejaie
Proceedings IEEE INFOCOM . 25TH IEEE…
2006
Corpus ID: 206925298
During recent years, Distributed Hash Tables (DHTs) have been extensively studied through simulation and analysis. However, due…
Expand
Highly Cited
2006
Highly Cited
2006
Understanding churn in peer-to-peer networks
D. Stutzbach
,
R. Rejaie
IMC '06
2006
Corpus ID: 1616146
The dynamics of peer participation, or churn, are an inherent property of Peer-to-Peer (P2P) systems and critical for design and…
Expand
By clicking accept or continuing to use the site, you agree to the terms outlined in our
Privacy Policy
,
Terms of Service
, and
Dataset License
ACCEPT & CONTINUE