CodeBus
www.codebus.net
Search
Sign in
Sign up
Hot Search :
Source
embeded
web
remote control
p2p
game
More...
Location :
Home
Search - hash
Main Category
SourceCode
Documents
Books
WEB Code
Develop Tools
Other resource
Sub Category
Web Server
Browser Client
Ftp Server
Ftp Client
Browser Plugins
Proxy Server
Email Server
Email Client
WEB Mail
Firewall-Security
Telnet Server
Telnet Client
ICQ-IM-Chat
Search Engine
Sniffer Package capture
xml-soap-webservice
Remote Control
P2P
TCP/IP stack
SNMP
Grid Computing
CloudComputing
Search - hash - List
[
P2P
]
176869120_sha
DL : 0
使用sha函数实现哈希查找,希望对于初学P2P的人有一定帮助-use Hash Function find hope for the peer-to-peer learning will definitely help
Date
: 2025-12-30
Size
: 3kb
User
:
[
P2P
]
176869120_HashAlgorithmTest
DL : 0
哈希算法测试。对我学习帮助挺大,上传共享。-Hash algorithm testing. I learn to help getting bigger, upload share.
Date
: 2025-12-30
Size
: 71kb
User
:
[
P2P
]
ANtsP2P_beta1.5.6_p0.9.3_src_nb
DL : 0
ANts P2P realizes a third generation P2P net. It protects your privacy while you are connected and makes you not trackable, hiding your identity (ip) and crypting everything you are sending/receiving from others. Features Open Source Java implementation (GNU-GPL license) Multiple sources download Swarming from partial files Automatic resume and sources research over the net Search by hash, string and structured query Completely Object-Oriented routing protocol Point to Point secured comunication: DH(512)-AES(128) EndPoint to EndPoint secured comunication: DH(512)-AES(128) Serverless GWebCache-based peer dicovery procedure IRC based peer discovery system IRC embeded chat system Full text search of indexed documents (pdf, html, txt, doc etc) -> QUERY REFERENCE. Distributed/Decentralized Search engine HTTP tunneling ANts allow P2P communications through any kind of HTTP Proxy ANts allow P2P communications through any kind of NAT or traffic filtering system -ANts P2P realizes a third generation P2P ne t. It protects your privacy while you are connec ted and makes you not trackable, hiding your identity (ip) and crypting everyth ing you are sending/receiving from others. Fea tures Open Source Java implementation (GNU-GP L license) Multiple sources download Fog from Automatic resume partial files and source 's research over the net Search by hash. and structured query string Completely Object- Oriented routing protocol Point to Point secu red comunication : DH (512)- AES (128) EndPoint to secure EndPoint d comunication : DH (512)- AES (128) Serverless GWebCache-base d peer dicovery procedure IRC based peer discov ery system IRC chat system embeded Full text sea rch of indexed documents (pdf, html, txt, doc etc)-
Date
: 2025-12-30
Size
: 7.38mb
User
:
谭朋柳
[
P2P
]
bloomie-1.0.tar
DL : 0
STORAGE AND LOCATION INFRASTRUCTURE BASED IN DISTRIBUTED HASH TABLES -STORAGE AND LOCATION INFRASTRUCTURE BASED IN DISTRIBUTED HASH TABLES
Date
: 2025-12-30
Size
: 608kb
User
:
Lili
[
P2P
]
p2pneting
DL : 0
:以Napster和Gnutella为代表的文件共享软件已经成为Internet上增长最迅速的应用。这种运行于多个对等结点(Peer)之上的网络被称为对等网络。随着对等网络规模的增长,可扩展性成为迫切需要解决的问题也成为了研究的热点。本文综述了对等网络领域的研究现状,首先介绍了Internet上常见的对等网络系统及其局限性,然后对最近提出的多种支持大规模对等网络的分布式哈希表查找系统进行了综述,介绍了基于这些查找系统的新一代的文件共享系统,讨论了对等网络中的安全问题并指出了进一步的研究方向。-The Napster and Gnutella file-sharing software represented has become the most rapidly growing Internet application. This runs on a number of peer nodes (Peer) over the network is known as peer networks. With the growth of network size, etc., scalability is an urgent need to address the issue has become a research hotspot. This paper reviews the research on the status of such networks, first introduced on the popular Internet peer network system and its limitations, and then a variety of recent large-scale peer networks to support distributed hash table lookup system was review, introduced a new generation of systems based on these to find the file sharing system, discussed on other network security issues and that further research directions.
Date
: 2025-12-30
Size
: 248kb
User
:
majie
[
P2P
]
Kademlia
DL : 0
Kademlia协议(以下简称Kad)是美国纽约大学的PetarP. Maymounkov和David Mazieres. 在2002年发布的一项研究结果《Kademlia: A peerto -peer information system based on the XOR metric》。 简单的说,Kad 是一种分布式哈希表(DHT)技术,不过和其他 DHT 实现技术比较,如 Chord、CAN、Pastry 等,Kad 通过独特的以异或算法(XOR)为距离度量基础,建立了一种 全新的 DHT 拓扑结构,相比于其他算法,大大提高了路由查询速度。-Kademlia Agreement (Kad) is a New York University' s PetarP. Maymounkov and David Mazieres. In 2002, a study released " Kademlia: A peerto-peer information system based on the XOR metric" . Simply put, Kad is a distributed hash table (DHT) technology, but compared with other DHT implementation technologies, such as Chord, CAN, Pastry, etc., Kad through a unique algorithm to different or (XOR) as a distance measure based on DHT established a new topology, compared to other algorithms, which greatly improves the speed of routing queries.
Date
: 2025-12-30
Size
: 216kb
User
:
MeterCai
[
P2P
]
kfs-0.5.tar
DL : 0
DHT 分布式hash P2P系统关键技术 斯坦福大学博士论文二年-DHT Distributed HASH
Date
: 2025-12-30
Size
: 625kb
User
:
zhoutai
[
P2P
]
HashFileCreator
DL : 0
此代码是BT哈希表爬虫器。用来爬取BT中哈希表的数据进行分析,高性能版。-This code is a BT hash table reptiles. Used to crawling BT hash table data analysis, high-performance version.
Date
: 2025-12-30
Size
: 45kb
User
:
王茹
[
P2P
]
m2t
DL : 0
抓取DHT网络上的信息,并解析出来到底hash 对应的内容是什么。-Find the dht network to get the hash info and get the tag of the hash
Date
: 2025-12-30
Size
: 103kb
User
:
liffey
[
P2P
]
cilixian
DL : 0
搭建磁力离线平台,请放在服务器WEB目录`磁力链接是一种特殊链接,但是它与传统基于文件的位置或名称的普通链接(如http://xxx)不一样,它只是通过不同文件内容的Hash结果生成一个纯文本的“数字指纹”,并用它来识别文件。它类似于生活消费品包装上常见的条码,不同的是这个“数字指纹”可以被任何人从任何文件上生成,这也就注定了磁力链接不需要任何“中心机构”的支持(例如:BT Tracker服务器),且识别准确度极高。因此任何人都可以生成一个Magnet 链接并确保通过该链接下载的文件准确无误--Magnetic link is a special link, but it with the traditional common links based on the location of the file or the name (such as http://xxx) are not the same, it is only through the different contents of the file Hash generate a pure text digital fingerprint , and use it to identify the file. It is similar to the consumer goods packaging common bar code, the difference is the digital fingerprint can be generated any file, this also was destined magnetic link does not need any central agency support (for example: BT Tracker server), and the recognition accuracy is high. So anyone can generate a Magnet link and ensure that through the link to download the file accurately.
Date
: 2025-12-30
Size
: 11kb
User
:
李家虫
CodeBus
is one of the largest source code repositories on the Internet!
Contact us :
1999-2046
CodeBus
All Rights Reserved.