Sciweavers

92 search results - page 3 / 19
» Centralized Security Labels in Decentralized P2P Networks
Sort
View
KESAMSTA
2007
Springer
14 years 1 months ago
A Resource Discovery Method Based on Multi-agents in P2P Systems
A peer-to-peer (P2P) system consists of a number of decentralized distributed network nodes that are capable of sharing resources without centralized supervision. Many application...
Yasushi Kambayashi, Yoshikuni Harada
OTM
2007
Springer
14 years 1 months ago
Bayesian Analysis of Secure P2P Sharing Protocols
Ad hoc and peer-to-peer (P2P) computing paradigms pose a number of security challenges. The deployment of classic security protocols to provide services such as node authentication...
Esther Palomar, Almudena Alcaide, Juan M. Est&eacu...
WWW
2004
ACM
14 years 8 months ago
Spam attacks: p2p to the rescue
We propose a decentralized privacy-preserving approach to spam filtering. Our solution exploits robust digests to identify messages that are a slight variation of one another and ...
Ernesto Damiani, Sabrina De Capitani di Vimercati,...
AIMS
2008
Springer
13 years 9 months ago
A Distributed Certification System for Structured P2P Networks
In this paper, we present a novel distributed certification system in which signing a certificate needs the collaboration of a fixed ratio of the nodes, hence a varying number of n...
François Lesueur, Ludovic Mé, Val&ea...
IWDC
2005
Springer
117views Communications» more  IWDC 2005»
14 years 29 days ago
Oasis: A Hierarchical EMST Based P2P Network
Peer-to-peer systems and applications are distributed systems without any centralized control. P2P systems form the basis of several applications, such as file sharing systems and ...
Pankaj Ghanshani, Tarun Bansal