Articles with "p2p networks" as a keyword



Photo from wikipedia

Soft computing approach based malicious peers detection using geometric and trust features in P2P networks

Sign Up to like & get
recommendations!
Published in 2018 at "Cluster Computing"

DOI: 10.1007/s10586-017-1588-7

Abstract: The attacks in P2P networks can be classified into two types: passive and active attacks. Passive attacks refer to the attempts made by malicious nodes to perceive the activities, whereas the active attacks are attacks… read more here.

Keywords: malicious peer; detection; trust features; geometric trust ... See more keywords
Photo by thinkmagically from unsplash

GeTrust: A Guarantee-Based Trust Model in Chord-Based P2P Networks

Sign Up to like & get
recommendations!
Published in 2018 at "IEEE Transactions on Dependable and Secure Computing"

DOI: 10.1109/tdsc.2016.2530720

Abstract: More and more users are attracted by P2P networks characterized by decentralization, autonomy and anonymity. However, users’ unconstrained behavior makes it necessary to use a trust model when establishing trust relationships between peers. Most existing… read more here.

Keywords: guarantee; trust; trust model; service ... See more keywords