Sciweavers

163 search results - page 4 / 33
» Dependability Properties of P2P Architectures
Sort
View
ICDCS
2007
IEEE
15 years 8 months ago
Combating Double-Spending Using Cooperative P2P Systems
An electronic cash system allows users to withdraw coins, represented as bit strings, from a bank or broker, and spend those coins anonymously at participating merchants, so that ...
Ivan Osipkov, Eugene Y. Vasserman, Nicholas Hopper...
IPPS
2003
IEEE
15 years 7 months ago
Distributed P2P Computing within Triana: A Galaxy Visualization Test Case
We discuss here a parallel implementation of the visualisation of data from a galaxy formation simulation within the Triana problem-solving environment. The visualisation is a tes...
Ian J. Taylor, Matthew S. Shields, Ian Wang, Roger...
WECWIS
2003
IEEE
205views ECommerce» more  WECWIS 2003»
15 years 7 months ago
Beyond "web of trust": Enabling P2P E-commerce
The huge success of eBay has proven the demand for customer-to-customer (C2C) electronic commerce. eBay is a centralized infrastructure with all its scalability problems (network ...
Anwitaman Datta, Manfred Hauswirth, Karl Aberer
P2P
2003
IEEE
15 years 7 months ago
Secure and Resilient Peer-to-Peer E-Mail: Design and Implementation
E-mail is a mission-critical communication function for virtually all institutions. Modern e-mail employs a servercentric design, in which the user is critically dependent on her ...
Jussi Kangasharju, Keith W. Ross, David A. Turner
ESORICS
2010
Springer
15 years 3 months ago
Verifying Security Property of Peer-to-Peer Systems Using CSP
Due to their nature, Peer-to-Peer (P2P) systems are subject to a wide range of security issues. In this paper, we focus on a specific security property, called the root authenticit...
Tien Tuan Anh Dinh, Mark Ryan