Mobility helps peer-to-peer security

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Peer-to-Peer Security

Peer-to-peer networks break the dominant network paradigm of client-server relationships in information exchange by allowing heterogeneous multipurpose machines to interact and share functionality. Like any architecture, different systems have different purposes and necessitate different security protections. This chapter will identify several key features of peer-to-peer networks and the secur...

متن کامل

Multimedia Security in Peer-to-Peer Networks

This Master thesis is a contribution to develope Multimedia security mechanisms for various P2P file sharing environments. Objective of this research thesis is to design a software tool for Multimedia business environments to fight against the copyright infringement in various P2P file sharing networks. In order to fulfil this objective, a combined implementation of two independent mechanisms d...

متن کامل

Security applications of peer-to-peer networks

Open networks are often insecure and provide an opportunity for viruses and DDOS activities to spread. To make such networks more resilient against these kind of threats, we propose the use of a peer-to-peer architecture whereby each peer is responsible for: (a) detecting whether a virus or worm is uncontrollably propagating through the network resulting in an epidemic; (b) automatically dispat...

متن کامل

Peer-to-peer Networks: Security Analysis

In this work we’re dealing with security in highly distributed systems, specifically peer-to-peer networks. We are describing some known theoretical attacks and defenses in these kinds of networks and comparing them with real world data. Classification of attacks realizable in peer-to-peer networks is given. We also discuss influences of their combinations. This could be useful for creating mod...

متن کامل

Peer-to-Peer Security and Intels Peer-to-Peer Trusted Library

The peer-to-peer computing model is not new, but has recently become a commonplace among the average computer user due to the introduction of applications like Napster and Gnutella. Along with the freedom of connecting peer-to-peer come security risks. In response to some of these security risks, Intel has released a code library that software developers can use to strengthen the security of, a...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: IEEE Transactions on Mobile Computing

سال: 2006

ISSN: 1536-1233

DOI: 10.1109/tmc.2006.12