Sciweavers

115 search results - page 3 / 23
» Privacy, Security and Trust in P2P environments: A Perspecti...
Sort
View
CISIS
2009
IEEE
13 years 11 months ago
A Security Layer for JXTA Core Protocols
— JXTA defines a set of six core protocols specifically suited for ad hoc, pervasive, multi-hop, peer-to-peer (P2P) computing. These protocols allow peers to cooperate and form...
Joan Arnedo-Moreno, Jordi Herrera-Joancomart&iacut...
IJNSEC
2007
157views more  IJNSEC 2007»
13 years 4 months ago
Balancing Trust and Incentive in Peer-to-Peer Collaborative System
In order to maximize resource utilization as well as providing trust management in P2P computing environments, we propose a novel framework - Trust-Incentive Service Management (T...
Yu Zhang, Li Lin, Jinpeng Huai
MOBISEC
2009
Springer
13 years 11 months ago
Filtering SPAM in P2PSIP Communities with Web of Trust
Spam is a dominant problem on email systems today. One of the reasons is the lack of infrastructure for security and trust. As Voice over IP (VoIP) communication becomes increasing...
Juho Heikkilä, Andrei Gurtov
IEEEARES
2006
IEEE
13 years 11 months ago
Fair Trading of Information: A Proposal for the Economics of Peer-to-Peer Systems
A P2P currency can be a powerful tool for promoting exchanges in a trusted way that make use of under-utilized resources both in computer networks and in real life. There are thre...
Kenji Saito, Eiichi Morino, Jun Murai
P2P
2008
IEEE
13 years 11 months ago
Proactive Role Discovery in Mediator-Free Environments
The rapid proliferation of Internet and related technologies has created tremendous possibilities for the interoperability between domains in distributed environments. Interoperab...
Mohamed Shehab, Elisa Bertino, Arif Ghafoor