The Infona portal uses cookies, i.e. strings of text saved by a browser on the user's device. The portal can access those files and use them to remember the user's data, such as their chosen settings (screen view, interface language, etc.), or their login data. By using the Infona portal the user accepts automatic saving and using this information for portal operation purposes. More information on the subject can be found in the Privacy Policy and Terms of Service. By closing this window the user confirms that they have read the information on cookie usage, and they accept the privacy policy and the way cookies are used by the portal. You can change the cookie settings in your browser.
Recently, there has been significant research focus on Peer-to-Peer (P2P) Massively Multiplayer Online Games (MMOGs). A number of architectures have been presented in the literature to implement the P2P approach. One aspect that has not received sufficient attention in these architectures is state persistency in P2P MMOGs. This survey presents an overview of the current challenges present in P2P MMOGs,...
In order to effectively improve the success rate of transactions among nodes of p2p patch distribution system, this trust model was introduced to the p2p patch distribution system, the design of trust model was given and the specific implementation of each module was described in detail, finally the performance of trust model achieved were tested.
Over the last 10 years, the Internet has been the place of tremendous information security issues and vulnerabilities; in particular, the ability to patch systems very quickly has become a necessary requirement in order to provide a safe operating environment for all organizations. At the same time, the fast proliferation of systems and their respective vulnerabilities have become almost unmanageable...
P2P network has become an important branch of Internet recently, with the significant advantages of full resource utilization, dynamics, openness and high scalable, which helps it achieve wide applications. But security and trust have also become urgent problems for a P2P network due to its openness and anonymousness. Most of the current schemes rely on some trust models, but the research in systematic...
Educational resources is very rich, but the utilization rate is very low. There is a lot of redundancy and waste., To the whole education it would be a big step forward if We can integrate educational resources with the Internet to achieve the sharing of resources. peer-to-peer technology to share resources solves the problem. But some of the shortcomings of its own bring a number of other issues...
The peer-to-peer network has been widely used to share large files anonymously. Because of its open nature, nodes can join and leave peer-to-peer networks freely. But there are few limited methods to ensure their trust. Malicious nodes can expose great security threats to peer-to-peer networks such as spreading unauthentic data and viruses. But handling all the malicious nodes in the same way causes...
Trust and reputation models research and development for distributed systems such as P2P networks, wireless sensor networks (WSNs) or multi-agent systems has arisen and taken importance in the last recent years among the international research community. However it is not always easy to check the correctness and accuracy of a model and even more, to compare it against other trust and reputation models...
In this paper, we present a new service-based computing security model, which is combined with neural cryptography. Service-based computing is a new and hot research point for telecommunication and computer scientist. Neural cryptography is a new way to create shared secret key. The existed system architecture mentions little about security. The paper presents a new security model, and we discuss...
Set the date range to filter the displayed results. You can set a starting date, ending date or both. You can enter the dates manually or choose them from the calendar.