Research in P2P-PKI trust model
Study of P2P instability, acts of random nodes and so on. P2P application process makes a large number of nodes in the phenomenon of cheating. Some security algorithm based on P2P in general difficult to solve the above problems. PKI-based digital signature algorithms can solute to the above problem...
Gespeichert in:
Hauptverfasser: | , |
---|---|
Format: | Tagungsbericht |
Sprache: | eng |
Schlagworte: | |
Online-Zugang: | Volltext bestellen |
Tags: |
Tag hinzufügen
Keine Tags, Fügen Sie den ersten Tag hinzu!
|
container_end_page | 117 |
---|---|
container_issue | |
container_start_page | 114 |
container_title | |
container_volume | 5 |
creator | Jiang Haowei Tan Yubo |
description | Study of P2P instability, acts of random nodes and so on. P2P application process makes a large number of nodes in the phenomenon of cheating. Some security algorithm based on P2P in general difficult to solve the above problems. PKI-based digital signature algorithms can solute to the above problems multi-well. In this basis, the introduction of the node behavior norms and behavior of a hierarchy of nodes, allowing for more objective evaluation of the node behavior-based and scientific, making the malicious behavior of nodes will have to pay more of the price, which contains a malicious well behavior, to some extent to improve the system security and reliability. |
doi_str_mv | 10.1109/ICCSIT.2010.5564425 |
format | Conference Proceeding |
fullrecord | <record><control><sourceid>ieee_6IE</sourceid><recordid>TN_cdi_ieee_primary_5564425</recordid><sourceformat>XML</sourceformat><sourcesystem>PC</sourcesystem><ieee_id>5564425</ieee_id><sourcerecordid>5564425</sourcerecordid><originalsourceid>FETCH-LOGICAL-i175t-e1fe78f5050099285049a7dc8dd1883279fd23739c5342829e1bf6691e6a9af23</originalsourceid><addsrcrecordid>eNpNT8tOwzAQNEKVgDZf0AP5gbT22ht7jyjiEbUSES3nysRrNVULKA4H_p4gemAuo5nDPISYK7lQStKyrqpNvV2AHA3E0hjAC5GRdcqAMYhG0uV_rS1NxA1ISaSdNnAlspQOcoRBQAfX4vaFE_u-3efde95AUzSrOh_6rzTkp4_Ax5mYRH9MnJ15Kl4f7rfVU7F-fqyru3XRKYtDwSqydREl_naBQ2nI29C6EJRzGizFANpqanGc4YBYvcWyJMWlJx9BT8X8L7dj5t1n3518_707f9Q_liU_cA</addsrcrecordid><sourcetype>Publisher</sourcetype><iscdi>true</iscdi><recordtype>conference_proceeding</recordtype></control><display><type>conference_proceeding</type><title>Research in P2P-PKI trust model</title><source>IEEE Electronic Library (IEL) Conference Proceedings</source><creator>Jiang Haowei ; Tan Yubo</creator><creatorcontrib>Jiang Haowei ; Tan Yubo</creatorcontrib><description>Study of P2P instability, acts of random nodes and so on. P2P application process makes a large number of nodes in the phenomenon of cheating. Some security algorithm based on P2P in general difficult to solve the above problems. PKI-based digital signature algorithms can solute to the above problems multi-well. In this basis, the introduction of the node behavior norms and behavior of a hierarchy of nodes, allowing for more objective evaluation of the node behavior-based and scientific, making the malicious behavior of nodes will have to pay more of the price, which contains a malicious well behavior, to some extent to improve the system security and reliability.</description><identifier>ISBN: 9781424455379</identifier><identifier>ISBN: 1424455375</identifier><identifier>EISBN: 9781424455409</identifier><identifier>EISBN: 9781424455393</identifier><identifier>EISBN: 1424455405</identifier><identifier>EISBN: 1424455391</identifier><identifier>DOI: 10.1109/ICCSIT.2010.5564425</identifier><identifier>LCCN: 2009938342</identifier><language>eng</language><publisher>IEEE</publisher><subject>behavior ; Electric breakdown ; P2P ; Reliability ; security</subject><ispartof>2010 3rd International Conference on Computer Science and Information Technology, 2010, Vol.5, p.114-117</ispartof><woscitedreferencessubscribed>false</woscitedreferencessubscribed></display><links><openurl>$$Topenurl_article</openurl><openurlfulltext>$$Topenurlfull_article</openurlfulltext><thumbnail>$$Tsyndetics_thumb_exl</thumbnail><linktohtml>$$Uhttps://ieeexplore.ieee.org/document/5564425$$EHTML$$P50$$Gieee$$H</linktohtml><link.rule.ids>309,310,778,782,787,788,2054,27908,54903</link.rule.ids><linktorsrc>$$Uhttps://ieeexplore.ieee.org/document/5564425$$EView_record_in_IEEE$$FView_record_in_$$GIEEE</linktorsrc></links><search><creatorcontrib>Jiang Haowei</creatorcontrib><creatorcontrib>Tan Yubo</creatorcontrib><title>Research in P2P-PKI trust model</title><title>2010 3rd International Conference on Computer Science and Information Technology</title><addtitle>ICCSIT</addtitle><description>Study of P2P instability, acts of random nodes and so on. P2P application process makes a large number of nodes in the phenomenon of cheating. Some security algorithm based on P2P in general difficult to solve the above problems. PKI-based digital signature algorithms can solute to the above problems multi-well. In this basis, the introduction of the node behavior norms and behavior of a hierarchy of nodes, allowing for more objective evaluation of the node behavior-based and scientific, making the malicious behavior of nodes will have to pay more of the price, which contains a malicious well behavior, to some extent to improve the system security and reliability.</description><subject>behavior</subject><subject>Electric breakdown</subject><subject>P2P</subject><subject>Reliability</subject><subject>security</subject><isbn>9781424455379</isbn><isbn>1424455375</isbn><isbn>9781424455409</isbn><isbn>9781424455393</isbn><isbn>1424455405</isbn><isbn>1424455391</isbn><fulltext>true</fulltext><rsrctype>conference_proceeding</rsrctype><creationdate>2010</creationdate><recordtype>conference_proceeding</recordtype><sourceid>6IE</sourceid><sourceid>RIE</sourceid><recordid>eNpNT8tOwzAQNEKVgDZf0AP5gbT22ht7jyjiEbUSES3nysRrNVULKA4H_p4gemAuo5nDPISYK7lQStKyrqpNvV2AHA3E0hjAC5GRdcqAMYhG0uV_rS1NxA1ISaSdNnAlspQOcoRBQAfX4vaFE_u-3efde95AUzSrOh_6rzTkp4_Ax5mYRH9MnJ15Kl4f7rfVU7F-fqyru3XRKYtDwSqydREl_naBQ2nI29C6EJRzGizFANpqanGc4YBYvcWyJMWlJx9BT8X8L7dj5t1n3518_707f9Q_liU_cA</recordid><startdate>201007</startdate><enddate>201007</enddate><creator>Jiang Haowei</creator><creator>Tan Yubo</creator><general>IEEE</general><scope>6IE</scope><scope>6IL</scope><scope>CBEJK</scope><scope>RIE</scope><scope>RIL</scope></search><sort><creationdate>201007</creationdate><title>Research in P2P-PKI trust model</title><author>Jiang Haowei ; Tan Yubo</author></sort><facets><frbrtype>5</frbrtype><frbrgroupid>cdi_FETCH-LOGICAL-i175t-e1fe78f5050099285049a7dc8dd1883279fd23739c5342829e1bf6691e6a9af23</frbrgroupid><rsrctype>conference_proceedings</rsrctype><prefilter>conference_proceedings</prefilter><language>eng</language><creationdate>2010</creationdate><topic>behavior</topic><topic>Electric breakdown</topic><topic>P2P</topic><topic>Reliability</topic><topic>security</topic><toplevel>online_resources</toplevel><creatorcontrib>Jiang Haowei</creatorcontrib><creatorcontrib>Tan Yubo</creatorcontrib><collection>IEEE Electronic Library (IEL) Conference Proceedings</collection><collection>IEEE Proceedings Order Plan All Online (POP All Online) 1998-present by volume</collection><collection>IEEE Xplore All Conference Proceedings</collection><collection>IEEE Electronic Library (IEL)</collection><collection>IEEE Proceedings Order Plans (POP All) 1998-Present</collection></facets><delivery><delcategory>Remote Search Resource</delcategory><fulltext>fulltext_linktorsrc</fulltext></delivery><addata><au>Jiang Haowei</au><au>Tan Yubo</au><format>book</format><genre>proceeding</genre><ristype>CONF</ristype><atitle>Research in P2P-PKI trust model</atitle><btitle>2010 3rd International Conference on Computer Science and Information Technology</btitle><stitle>ICCSIT</stitle><date>2010-07</date><risdate>2010</risdate><volume>5</volume><spage>114</spage><epage>117</epage><pages>114-117</pages><isbn>9781424455379</isbn><isbn>1424455375</isbn><eisbn>9781424455409</eisbn><eisbn>9781424455393</eisbn><eisbn>1424455405</eisbn><eisbn>1424455391</eisbn><abstract>Study of P2P instability, acts of random nodes and so on. P2P application process makes a large number of nodes in the phenomenon of cheating. Some security algorithm based on P2P in general difficult to solve the above problems. PKI-based digital signature algorithms can solute to the above problems multi-well. In this basis, the introduction of the node behavior norms and behavior of a hierarchy of nodes, allowing for more objective evaluation of the node behavior-based and scientific, making the malicious behavior of nodes will have to pay more of the price, which contains a malicious well behavior, to some extent to improve the system security and reliability.</abstract><pub>IEEE</pub><doi>10.1109/ICCSIT.2010.5564425</doi><tpages>4</tpages></addata></record> |
fulltext | fulltext_linktorsrc |
identifier | ISBN: 9781424455379 |
ispartof | 2010 3rd International Conference on Computer Science and Information Technology, 2010, Vol.5, p.114-117 |
issn | |
language | eng |
recordid | cdi_ieee_primary_5564425 |
source | IEEE Electronic Library (IEL) Conference Proceedings |
subjects | behavior Electric breakdown P2P Reliability security |
title | Research in P2P-PKI trust model |
url | https://sfx.bib-bvb.de/sfx_tum?ctx_ver=Z39.88-2004&ctx_enc=info:ofi/enc:UTF-8&ctx_tim=2025-01-16T20%3A44%3A33IST&url_ver=Z39.88-2004&url_ctx_fmt=infofi/fmt:kev:mtx:ctx&rfr_id=info:sid/primo.exlibrisgroup.com:primo3-Article-ieee_6IE&rft_val_fmt=info:ofi/fmt:kev:mtx:book&rft.genre=proceeding&rft.atitle=Research%20in%20P2P-PKI%20trust%20model&rft.btitle=2010%203rd%20International%20Conference%20on%20Computer%20Science%20and%20Information%20Technology&rft.au=Jiang%20Haowei&rft.date=2010-07&rft.volume=5&rft.spage=114&rft.epage=117&rft.pages=114-117&rft.isbn=9781424455379&rft.isbn_list=1424455375&rft_id=info:doi/10.1109/ICCSIT.2010.5564425&rft_dat=%3Cieee_6IE%3E5564425%3C/ieee_6IE%3E%3Curl%3E%3C/url%3E&rft.eisbn=9781424455409&rft.eisbn_list=9781424455393&rft.eisbn_list=1424455405&rft.eisbn_list=1424455391&disable_directlink=true&sfx.directlink=off&sfx.report_link=0&rft_id=info:oai/&rft_id=info:pmid/&rft_ieee_id=5564425&rfr_iscdi=true |