Sciweavers

92 search results - page 3 / 19
» Centralized Security Labels in Decentralized P2P Networks
Sort
View
KESAMSTA
2007
Springer
14 years 12 days ago
A Resource Discovery Method Based on Multi-agents in P2P Systems
A peer-to-peer (P2P) system consists of a number of decentralized distributed network nodes that are capable of sharing resources without centralized supervision. Many application...
Yasushi Kambayashi, Yoshikuni Harada
OTM
2007
Springer
14 years 12 days ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
WWW
2004
ACM
14 years 7 months ago
Spam attacks: p2p to the rescue
We propose a decentralized privacy-preserving approach to spam filtering. Our solution exploits robust digests to identify messages that are a slight variation of one another and ...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
AIMS
2008
Springer
13 years 8 months ago
A Distributed Certification System for Structured P2P Networks
In this paper, we present a novel distributed certification system in which signing a certificate needs the collaboration of a fixed ratio of the nodes, hence a varying number of n...
François Lesueur, Ludovic Mé, Val&ea...
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
13 years 11 months ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal