The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Trust and reputation management in peer-to-peer (P2P) networks is a current topic. Most of the works focus on unstructured networks. The existing work operating in structured networks concentrates on a “clean routing table” and aims to keep malicious nodes from it. We follow a different approach which we call “clean routing process”: There are no restrictions regarding the nodes that may be contained...
As the cost of massively broadband® semiconductors continue to be driven down at millimeter wave (mm-wave) frequencies, there is great potential to use LMDS spectrum (in the 28–38 GHz bands) and the 60 GHz band for cellular/mobile and peer-to-peer wireless networks. This work presents urban cellular and peer-to-peer RF wideband channel measurements using a broadband sliding correlator channel sounder...
In Peer-to-Peer (P2P) networks, nodes (peers) have symmetric roles. They are useful in a wide range of application scenarios, especially in relation to the Internet, such as file sharing and data retrieval. This work investigates the prospects for using self-organizing P2P networking in multiparty session applications such as presence and audio/video conferencing. The proposed architecture relies...
The security of the protocols involved in peer-to-peer communications is becoming a fundamental prerequisite for their widespread diffusion. In this paper, we propose a new protocol for establishing a security association between two peers willing to set up a VoIP or multimedia communication through the standard SIP protocol. Our proposal is based on the MIKEY protocol and the Diffie-Hellman algorithm...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.