Managing Trust and Detecting the Guilty Party in P2P Networks
Abstract
Keywords
Full Text:
PDFReferences
Karl Aberer and Zoran Despotovic. Managing trust in a peer-2-peer information system.
Frank Kargl,Alfred Geib, Stefan Schlott,Michael Weber .Secure dynamic source routing, University of Ulm, Germany.
Stefan Kraxberger and Udo Payer. Security concept for peer-to-peer systems, Graz University of Technology, Graz, Austria.
Emil Sit and Robert Morris. Security considerations for peer-to-peer distributed hash tables. Laboratory for Computer Science, MIT.
Dan S. Wallach. A survey of peer-to-peer security issues. Rice University, Houston,TX 77005,USA.
Honghao Wang, Yingwu Zhu, and Yiming Hu. An efficient and secure peer-to-peer overlay network. In LCN '05,Universitry of Cincinnati, IEEE Conference on Local Computer Networks.
Miguel Castro1,Peter Druschel2,Ayalvadi Ganesh1, Antony Rowstron1, and Dan S. Wallach2, Secure routing for structured peer-to-peer overlay networks. Microsoft Research Ltd,Cambridge,UK1,Rice University,Houston,USA2 .
Thibault Cholez, Isabelle Chrisment and Olivier Festor, A Distributed and Adaptive Revocation Mechanism for P2P networks, MADYNES-INRIA Nancy-Grand Est,France.
Stefan Kraxberger, Scalable Secure routing for Heterogenous Unstructured P2P Networks, Graz University of Technology, Austria.
Jun-Won Ho,Matthew Wright,Sajal K Das,Fast Detection of Replica Node Attacks in Mobile Sensor Networks Using Sequential Analysis, IEEE Transactions on Mobile Computing,2011.
Refbacks
- There are currently no refbacks.
This work is licensed under a Creative Commons Attribution 3.0 License.