RIAPPA: a Robust Identity Assignment Protocol for P2P overlays

نویسندگان
چکیده

برای دانلود باید عضویت طلایی داشته باشید

برای دانلود متن کامل این مقاله و بیش از 32 میلیون مقاله دیگر ابتدا ثبت نام کنید

اگر عضو سایت هستید لطفا وارد حساب کاربری خود شوید

منابع مشابه

Securing Identity Assignment Using Implicit Certificates in P2P Overlays

The security of the Peer-to-Peer (P2P) overlays networks has been questioned for years. Many works have been proposed to provide secure routing, anonymity, reputation systems, confidentiality, etc. However, the identity assignment has been less considered. These networks are designed so that each user has a unique identifier (nodeID), but the most of identity assignment systems allow malicious ...

متن کامل

A P2P Job Assignment Protocol for Volunteer Computing Systems

Complex applications often require the execution of a large number of jobs in a distributed environment. One highly successful and low cost mechanism for acquiring the necessary compute power is the “public resource computing” paradigm, which exploits the computational power of private computers. However, applications that are based on this paradigm currently rely upon centralized job assignmen...

متن کامل

Latency Prediction for P2P Overlays

Peer-to-peer (P2P) applications have become countless since they were initially proposed about ten years ago. They became popular among the general public when being used as a platform for file sharing. However, their robustness and scalability sparked interest from industry and research. Today these concepts drive some of the main businesses as back ends or migrate intensive workload away from...

متن کامل

Implementation of Adaptive Control for P2P Overlays

Peer-to-peer networking enjoys euphoric support and fierce resistance simultaneously, and for the same reasons. It presents a model where decentralization and lack of structure, hierarchy and control are promoted. Although significant research is carried out to tackle individual issues arising from that paradigm, there has been no obvious approach for evening out differences on a more general b...

متن کامل

A Scalable and Robust DHT Protocol for Structured P2P Network

Distributed Hash Tables (DHTs) were originated from the design of structured peer-to-peer (P2P) systems. A DHT provides a key-based lookup service similar to a hash table. In this paper, we present the detailed design of a new DHT protocol, Tambour. The novelty of the protocol is that it uses parallel lookup to reduce retrive latency and bounds communication overhead to a dynamically adjusted r...

متن کامل

ذخیره در منابع من


  با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید

ژورنال

عنوان ژورنال: Security and Communication Networks

سال: 2014

ISSN: 1939-0114

DOI: 10.1002/sec.956