Proceedings. Fourth International Conference on Peer-to-Peer Computing, 2004. Proceedings.
DOI: 10.1109/ptp.2004.1334929
|View full text |Cite
|
Sign up to set email alerts
|

On the security of polling protocols in peer-to-peer systems

Abstract: The peer -to-peer (P2P)

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Publication Types

Select...
2
2
1

Relationship

0
5

Authors

Journals

citations
Cited by 5 publications
(2 citation statements)
references
References 18 publications
0
2
0
Order By: Relevance
“…Besides the studies for the reputation based trust model, some researchers have studied the security mechanism of the reputation information management related tightly with the trust model. Reference [8] provides an enhanced security transmission protocol for trust management. It uses random numbers to suppress the replay attack, and utilizes digital signature algorithm to assure the integrity and consistency of reputation information.…”
Section: Literature Reviewmentioning
confidence: 99%
“…Besides the studies for the reputation based trust model, some researchers have studied the security mechanism of the reputation information management related tightly with the trust model. Reference [8] provides an enhanced security transmission protocol for trust management. It uses random numbers to suppress the replay attack, and utilizes digital signature algorithm to assure the integrity and consistency of reputation information.…”
Section: Literature Reviewmentioning
confidence: 99%
“…However, most of them do not take security into consideration by design [1] and simply assume all peers act normally in the system according to the protocol. Due to open and anonymous characteristics, this assumption does not hold true.…”
Section: Introductionmentioning
confidence: 99%