The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
This paper first points out that Kim et al's schemes will suffer from the Sybil attack and conspiracy attack, and then proposes a secure admission control scheme for P2P networks. The new scheme proposed not only can withstands Sybil attack and conspiracy attack, but also possesses all properties of Kim et al's schemes
For most P2P file-swapping applications, sharing is a volunteer action, and peers are not responsible for their irresponsible bartering history. It is necessary to establish a trust mechanism for the P2P network. Among the existing trust models based on recommendation, the Dempster-Shafer (D-S) evidence theory can solve uncertain problem. But in the existing researches on D-S evidence theory, no one...
In this paper, we point out Castelluccia's schemes suffer from the Sybil attack and conspiracy attack, and propose a secure key management scheme for P2P networks. The proposed new scheme cannot only withstand Sybil attack and conspiracy attack, but also is possessed of all properties of Castelluccia's schemes
Peer-to-peer network can be seen as truly distributed computing system. Each peer is both a client and a server in these networks. The trust between peers cannot be set up simply on the traditional trust mechanism. A reasonable trust construction approach comes from the social network analysis. Trust relations between individuals are set up upon recommendations of other individuals. In this paper,...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.