Research on P2P security overlay network model

To improve the security of software developing and the use of trust mechanism in P2P, a mathematical model of P2P security overlay network was proposed. As the core of the model, overlay network was divided into four parts, including data confirmation layer, data capture layer, trust mechanism layer...

Full description

Saved in:
Bibliographic Details
Main Authors: SUN Zhi-xin1, ZHANG Zhen-wei1, GONG Jing2
Format: Article
Language:zho
Published: Editorial Department of Journal on Communications 2009-01-01
Series:Tongxin xuebao
Subjects:
Online Access:http://www.joconline.com.cn/zh/article/74653260/
Tags: Add Tag
No Tags, Be the first to tag this record!