2009 2nd International Conference on Computer Science and Its Applications 2009
DOI: 10.1109/csa.2009.5404307
|View full text |Cite
|
Sign up to set email alerts
|

Trusted P2P Group Interaction

Abstract: Abstract

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
1
1

Citation Types

0
2
0

Year Published

2012
2012
2016
2016

Publication Types

Select...
1
1

Relationship

1
1

Authors

Journals

citations
Cited by 2 publications
(2 citation statements)
references
References 21 publications
0
2
0
Order By: Relevance
“…This system is vulnerable to malicious peers and to denial of service (DOS). This situation can be remedied by the enhancement of the authentication process by a certificate-based scheme, and by incorporating a trust and reputation layer [5]. This additional layer can improve the quality of file dispersal and retrieval.…”
Section: Further Workmentioning
confidence: 99%
See 1 more Smart Citation
“…This system is vulnerable to malicious peers and to denial of service (DOS). This situation can be remedied by the enhancement of the authentication process by a certificate-based scheme, and by incorporating a trust and reputation layer [5]. This additional layer can improve the quality of file dispersal and retrieval.…”
Section: Further Workmentioning
confidence: 99%
“…In addition, the heterogeneity of P2P systems and the absence of a centralised authority give rise to information management as well as security and reliability concerns [4,5].…”
Section: P2p Systemsmentioning
confidence: 99%