A Secure Epidemic Based Update Protocol for P2P Systems
نویسندگان
چکیده
منابع مشابه
A Secure Epidemic Based Update Protocol for P2p Systems
Epidemic Based Update Protocols Are Designed To Address The Consistency Issues For Data Replication In P2p Systems. However, Update Protocols Also Raise Security Issues. An Epidemic Based Update Protocol May Be Exposed To Security Threats When It Is Operated In An Untrustworthy P2p Environment. To Address This Issue, Security Prevention And Detection Protocols Are Designed In The Epidemic Based...
متن کاملA Secure Quorum Based Membership Mechanism for P2P Systems
Closed user group based on a Peer-to-Peer system require a membership mechanism that is fully decentralized. Several suggestions have been made in the literature. However, the proposed mechanisms have some significant drawbacks since any peer can easily bypass the proposed membership mechanism. In this paper we present a new fully decentralized and secure membership mechanism for Peer-to-Peer s...
متن کاملA Genetic Programming-based trust model for P2P Networks
Abstract— Peer-to-Peer ( P2P ) systems have been the center of attention in recent years due to their advantage . Since each node in such networks can act both as a service provider and as a client , they are subject to different attacks . Therefore it is vital to manage confidence for these vulnerable environments in order to eliminate unsafe peers . This paper investigates the use of genetic ...
متن کاملa new type-ii fuzzy logic based controller for non-linear dynamical systems with application to 3-psp parallel robot
abstract type-ii fuzzy logic has shown its superiority over traditional fuzzy logic when dealing with uncertainty. type-ii fuzzy logic controllers are however newer and more promising approaches that have been recently applied to various fields due to their significant contribution especially when the noise (as an important instance of uncertainty) emerges. during the design of type- i fuz...
15 صفحه اولProvably secure and efficient identity-based key agreement protocol for independent PKGs using ECC
Key agreement protocols are essential for secure communications in open and distributed environments. Recently, identity-based key agreement protocols have been increasingly researched because of the simplicity of public key management. The basic idea behind an identity-based cryptosystem is that a public key is the identity (an arbitrary string) of a user, and the corresponding private key is ...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: International Journal of Peer to Peer Networks
سال: 2017
ISSN: 2229-5240,2229-3930
DOI: 10.5121/ijp2p.2017.8301