This paper describes a new protocol for authentication in Peer-to-Peer systems. The protocol has been designed to meet specialized requirements of P2P systems, such as lack of dir...
Decentralized file-sharing systems like Napster [11] and Gnutella [23] have popularized the peer-to-peer approach [18,20,22], which emphasizes the use of distributed resources in ...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread malicious content. In this paper, we propose a reputation-based trust management sy...
P2P network is now widely pervasive and increase usability of Internet. However, with the difficulty of tracing flow of P2P traffic, security incident of P2P network is now ser...