Research on P2P security overlay network model
To improve the security of software developing and the use of trust mechanism in P2P, a mathematical model of P2P security overlay network was proposed. As the core of the model, overlay network was divided into four parts, including data confirmation layer, data capture layer, trust mechanism layer...
Saved in:
Main Authors: | SUN Zhi-xin1, ZHANG Zhen-wei1, GONG Jing2 |
---|---|
Format: | Article |
Language: | zho |
Published: |
Editorial Department of Journal on Communications
2009-01-01
|
Series: | Tongxin xuebao |
Subjects: | |
Online Access: | http://www.joconline.com.cn/zh/article/74653260/ |
Tags: |
Add Tag
No Tags, Be the first to tag this record!
|
Similar Items
-
Review of next generation network architecture
by: SHEN Qing-guo1, et al.
Published: (2010-01-01) -
Reputation computation based on new metric in P2P network
by: BAO Yu1, et al.
Published: (2008-01-01) -
Novel model on self-organized P2P network using mobile agent
by: WANG Yang1, et al.
Published: (2008-01-01) -
Research on technology mechanism used in P2P network video surveillance system
by: Xinyan FANG, et al.
Published: (2022-12-01) -
Security on peer to peer networking in energy internet
by: Jianwei REN, et al.
Published: (2015-12-01)