Sciweavers

58 search results - page 3 / 12
» Securing Your Data in Agent-Based P2P Systems
Sort
View
TKDE
2010
272views more  TKDE 2010»
13 years 3 months ago
P2P Reputation Management Using Distributed Identities and Decentralized Recommendation Chains
—Peer-to-peer (P2P) networks are vulnerable to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques de...
Prashant Dewan, Partha Dasgupta
IEEEARES
2006
IEEE
13 years 11 months ago
Censorship-Resistant and Anonymous P2P Filesharing
We present a P2P filesharing system that allows redundant storage of shared files in a way that no participating server ever stores data that could compromise its operator. Inst...
Regine Endsuleit, Thilo Mie
ISCAPDCS
2004
13 years 7 months ago
R-Chain: A Self-Maintained Reputation Management System in P2P Networks
Trust management is a critical component in P2P file sharing systems due to the free riding and security problem. In this paper, we propose a lightweight reputation management sys...
Lintao Liu, Shu Zhang, Kyung Dong Ryu, Partha Dasg...
IPPS
2006
IEEE
13 years 11 months ago
Trust overlay networks for global reputation aggregation in P2P grid computing
1 This paper presents a new approach to trusted Grid computing in a Peer-to-Peer (P2P) setting. Trust and security are essential to establish lasting working relationships among th...
Runfang Zhou, Kai Hwang
CCGRID
2003
IEEE
13 years 10 months ago
A-peer: An Agent Platform Integrating Peer-to-Peer Network
Peer-to-Peer (p2p), as an emerging technology, is exerting huge influence on various application scenarios. Meanwhile, agents, assisting applications in traditional paradigm with...
Tieyan Li, Zhi-Gang Zhao, Si-Zhen Yo