Author:Bidyut Gupta

Publications

Keyphrases

Anonymity, Anti-Censorship, Architecture, block, Broadcast, Capacity-constrained, censorship, Chinese Remainder Theorem, Classifier, Cloud, collaboration, Cryptography, Cybersecurity, Evasion Attack, Fog, Internet, LDEPTH, machine learning, Middle East, multicast protocol, non-dht, Overlay Multicast, P2P2, P2P network2, peer-to-peer networks, poisoning attack, Privacy, Proxy, Pyramid tree3, Residue class3, secured data transfer, Security2, Spam filter, structured P2P network3, tiered architecture, Tree diameter, trustworthy computing, Vehicular Networks, web development, zero-knowledge proof.