RIAPPA: a Robust Identity Assignment Protocol for P2P overlays
نویسندگان
چکیده
منابع مشابه
Securing Identity Assignment Using Implicit Certificates in P2P Overlays
The security of the Peer-to-Peer (P2P) overlays networks has been questioned for years. Many works have been proposed to provide secure routing, anonymity, reputation systems, confidentiality, etc. However, the identity assignment has been less considered. These networks are designed so that each user has a unique identifier (nodeID), but the most of identity assignment systems allow malicious ...
متن کاملA P2P Job Assignment Protocol for Volunteer Computing Systems
Complex applications often require the execution of a large number of jobs in a distributed environment. One highly successful and low cost mechanism for acquiring the necessary compute power is the “public resource computing” paradigm, which exploits the computational power of private computers. However, applications that are based on this paradigm currently rely upon centralized job assignmen...
متن کاملLatency Prediction for P2P Overlays
Peer-to-peer (P2P) applications have become countless since they were initially proposed about ten years ago. They became popular among the general public when being used as a platform for file sharing. However, their robustness and scalability sparked interest from industry and research. Today these concepts drive some of the main businesses as back ends or migrate intensive workload away from...
متن کاملImplementation of Adaptive Control for P2P Overlays
Peer-to-peer networking enjoys euphoric support and fierce resistance simultaneously, and for the same reasons. It presents a model where decentralization and lack of structure, hierarchy and control are promoted. Although significant research is carried out to tackle individual issues arising from that paradigm, there has been no obvious approach for evening out differences on a more general b...
متن کاملA Scalable and Robust DHT Protocol for Structured P2P Network
Distributed Hash Tables (DHTs) were originated from the design of structured peer-to-peer (P2P) systems. A DHT provides a key-based lookup service similar to a hash table. In this paper, we present the detailed design of a new DHT protocol, Tambour. The novelty of the protocol is that it uses parallel lookup to reduce retrive latency and bounds communication overhead to a dynamically adjusted r...
متن کاملذخیره در منابع من
با ذخیره ی این منبع در منابع من، دسترسی به آن را برای استفاده های بعدی آسان تر کنید
ژورنال
عنوان ژورنال: Security and Communication Networks
سال: 2014
ISSN: 1939-0114
DOI: 10.1002/sec.956