Security Framework Based on Reputation Mechanism for Peer-To-Peer Systems
Peer-to-peer networks have emerged over the past several years as a new and effective way for distributed resources to communicate and cooperate. Peer-to-peer computing is the sharing of computer resources and services by direct system exchange. These information sharing environments are increasi...
| Auteur principal: | Sinnanaidu, Subba Rao |
|---|---|
| Format: | Thèse |
| Langue: | anglais anglais |
| Publié: |
2004
|
| Sujets: | |
| Accès en ligne: | http://psasir.upm.edu.my/id/eprint/101/1/548981_FK_2004_12.pdf |
Documents similaires
Agent-Based Resource Discovery In Peer-To-Peer Networks
par: Sedaghat, Mina
Publié: (2010)
par: Sedaghat, Mina
Publié: (2010)
A Social Network-Based Peer-To-Peer Model For Resource Discovery
par: Modarresi, Amir
Publié: (2009)
par: Modarresi, Amir
Publié: (2009)
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
par: Barjini, Hassan
Publié: (2012)
par: Barjini, Hassan
Publié: (2012)
Antecedents and outcomes of emotions and satisfaction of guests in the Malaysian Peer-to-Peer accommodation sector
par: Ali, Laiba
Publié: (2018)
par: Ali, Laiba
Publié: (2018)
Impact of Peer Review on the ESL Composing Process
par: Salih Ahmed, Abdel Rahman Abdalla
Publié: (2003)
par: Salih Ahmed, Abdel Rahman Abdalla
Publié: (2003)
Effectiveness Of Face-To-Face, Online And Mixed Peer Review Formats On Undergraduates’ Writing In English In A Malaysian University
par: Moloudi, Mehrdad
Publié: (2010)
par: Moloudi, Mehrdad
Publié: (2010)
Impact of role assignment on tertiary distance education students’ participation in online discussions and its consequence on grade performance
par: Abadi, Hajar Ghadirian Najaf
Publié: (2015)
par: Abadi, Hajar Ghadirian Najaf
Publié: (2015)
Static and self-scalable filter range selection algorithms for peer-to-peer networks
par: Kweh, Yeah Lun
Publié: (2011)
par: Kweh, Yeah Lun
Publié: (2011)
A super-peer architecture to improve intrusion detection and scalability in collaborative intrusion detection network
par: Bakhdlaghi, Yousef Abdullah
Publié: (2020)
par: Bakhdlaghi, Yousef Abdullah
Publié: (2020)
Network security situation awareness based on indicators extracted
par: Xie, Zeqiang
Publié: (2016)
par: Xie, Zeqiang
Publié: (2016)
Proof-Carrying Code for Verifying Confidentiality of Mobile Code through Secure Information Flow Analysis
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
par: Abdu Muthana, Abdulrahman Ahmad
Publié: (2008)
Risk awareness model for security and privacy in social networking sites from the users’ perspective
par: Abiodun, Balogun Kamoru
Publié: (2021)
par: Abiodun, Balogun Kamoru
Publié: (2021)
Peer-to-peer application using Microsoft .Net Framework / Tan Boon Yin
par: Tan, Boon Yin
Publié: (2004)
par: Tan, Boon Yin
Publié: (2004)
Multiplatform patch management based on peer to peer network
par: Khansary , Kamran
Publié: (2010)
par: Khansary , Kamran
Publié: (2010)
Steganography in webpages using CSS color attributes enhanced by rule-based system
par: Nehzati, Seyedeh Sheida
Publié: (2016)
par: Nehzati, Seyedeh Sheida
Publié: (2016)
Design of a lightweight virtual honeynet based on linux container virtualization
par: Memari, Nogol
Publié: (2014)
par: Memari, Nogol
Publié: (2014)
Security Enhancement of Route Optimization in Mobile IPv6 Networks
par: Zare Anari, Abbas Mehdizadeh
Publié: (2008)
par: Zare Anari, Abbas Mehdizadeh
Publié: (2008)
Peer-to-peer data searching using relevant peer selection and local availability estimation
par: Ishak, Iskandar
Publié: (2011)
par: Ishak, Iskandar
Publié: (2011)
Security framework based multi agent system architecture to facilitate data fetching from cloud data storage
par: Mohamed, Amir Mohamed Talib
Publié: (2012)
par: Mohamed, Amir Mohamed Talib
Publié: (2012)
A new security framework to prevent denial of service and replay attacks for IEEE 802.11 wireless networks
par: Malekzadeh, Mina
Publié: (2011)
par: Malekzadeh, Mina
Publié: (2011)
An Analysis of Node/Peer Discovery Approach and Routing Algorithms in Mobile & Traditional Peer-to-Peer Networks
par: Abdullahi, Mohamed Omar
Publié: (2012)
par: Abdullahi, Mohamed Omar
Publié: (2012)
Mitigating malicious nodes using trust and reputation based model in wireless sensor networks
par: Abdullah, Muhammad Daniel Hafiz
Publié: (2018)
par: Abdullah, Muhammad Daniel Hafiz
Publié: (2018)
Efficient kerberos authentication scheme for cross-domain systems in industrial internet of things using ECC
par: Ismail, Haqi Khalid
Publié: (2021)
par: Ismail, Haqi Khalid
Publié: (2021)
Adaptable Topology For Peer-To-Peer Live Video
Streaming
par: Mahmood, Ammar Waysi
Publié: (2015)
par: Mahmood, Ammar Waysi
Publié: (2015)
Forecast Errors and the Effect of Underwriter Reputation and Auditor Influence During Listing on IPOs
par: Mahussin, Norlida
Publié: (2003)
par: Mahussin, Norlida
Publié: (2003)
Routing optimization using antella for peer-to-peer in an enterprise network
par: Puniran, Roime
Publié: (2010)
par: Puniran, Roime
Publié: (2010)
Secure communication in Vehicular ad hoc network using modified ad hoc on demand distance vector
par: Abdulkader, Zaid A.
Publié: (2018)
par: Abdulkader, Zaid A.
Publié: (2018)
Evaluation of virtual private network employing secure on demand IP based connection (SeDIC) / Mohamed Sulaiman Sultan Suhaibuddeen
par: Sultan Suhaibuddeen, Mohamed Sulaiman
Publié: (2010)
par: Sultan Suhaibuddeen, Mohamed Sulaiman
Publié: (2010)
Fake review annotation model and classification through reviewers' writing style
par: Shojaee, Somayeh
Publié: (2019)
par: Shojaee, Somayeh
Publié: (2019)
Security alert framework using dynamic tweet-based features for phishing detection on twitter
par: Liew, Seow Wooi
Publié: (2019)
par: Liew, Seow Wooi
Publié: (2019)
Implementation and Evaluation of Large Rsa Encryption and Decryption Keys For Internet Security
par: H. Belgassem, Seddeq
Publié: (2004)
par: H. Belgassem, Seddeq
Publié: (2004)
Detecting coordinated distributed attacks using mobile agents with associated managers architecture
par: Javan, Ali
Publié: (2011)
par: Javan, Ali
Publié: (2011)
Practical training dataset generation and retraining mechanism for on-line peer-to-peer traffic classification
par: Zarei, Roozbeh
Publié: (2012)
par: Zarei, Roozbeh
Publié: (2012)
Implementing peer to peer technology for ISE virtual community knowledge sharing / Shafizol Bakhtiar Mokhtar
par: Mokhtar, Shafizol Bakhtiar
Publié: (2006)
par: Mokhtar, Shafizol Bakhtiar
Publié: (2006)
Modelling and simulation of improved scarani-acin-ribordy-GISIN-04 preprocessing technique
par: Mohd Nasir, Rinie Narinie
Publié: (2015)
par: Mohd Nasir, Rinie Narinie
Publié: (2015)
A scheme for efficient peer-to-peer live video streaming over wireless mesh networks
par: Barekatain, Behrang
Publié: (2014)
par: Barekatain, Behrang
Publié: (2014)
A Study of Security Limitations in Virtual Local Area Network Implementation
par: Balasundaram, Arumugam
Publié: (2003)
par: Balasundaram, Arumugam
Publié: (2003)
Quality of service for video packet over peer to peer network using active measurement
par: Joni, Muhammad Affan
Publié: (2008)
par: Joni, Muhammad Affan
Publié: (2008)
Implications of caching for JXTA peers
par: Rozlina, Mohamed
Publié: (2014)
par: Rozlina, Mohamed
Publié: (2014)
Network bandwidth utilization based on collaborative web caching using machine learning algorithms in peer-to-peer systems for media web objects
par: Mohammed, Waheed Yasin
Publié: (2018)
par: Mohammed, Waheed Yasin
Publié: (2018)
Documents similaires
-
Agent-Based Resource Discovery In Peer-To-Peer Networks
par: Sedaghat, Mina
Publié: (2010) -
A Social Network-Based Peer-To-Peer Model For Resource Discovery
par: Modarresi, Amir
Publié: (2009) -
Hybridflood algorithms minimizing redundant messages and maximizing efficiency of search in unstructured P2P networks
par: Barjini, Hassan
Publié: (2012) -
Antecedents and outcomes of emotions and satisfaction of guests in the Malaysian Peer-to-Peer accommodation sector
par: Ali, Laiba
Publié: (2018) -
Impact of Peer Review on the ESL Composing Process
par: Salih Ahmed, Abdel Rahman Abdalla
Publié: (2003)