CRYPTO '89 Proceedings on Advances in cryptology
Chord: A scalable peer-to-peer lookup service for internet applications
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
IPTPS '01 Revised Papers from the First International Workshop on Peer-to-Peer Systems
Pastry: Scalable, Decentralized Object Location, and Routing for Large-Scale Peer-to-Peer Systems
Middleware '01 Proceedings of the IFIP/ACM International Conference on Distributed Systems Platforms Heidelberg
TrustMe: Anonymous Management of Trust Relationships in Decentralized P2P Systems
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Low latency and cheat-proof event ordering for peer-to-peer games
NOSSDAV '04 Proceedings of the 14th international workshop on Network and operating systems support for digital audio and video
A Secure Event Agreement (SEA) protocol for peer-to-peer games
ARES '06 Proceedings of the First International Conference on Availability, Reliability and Security
Requirements of Peer-to-Peer-based Massively Multiplayer Online Gaming
CCGRID '07 Proceedings of the Seventh IEEE International Symposium on Cluster Computing and the Grid
A NAT Traversal Mechanism for Peer-To-Peer Networks
P2P '08 Proceedings of the 2008 Eighth International Conference on Peer-to-Peer Computing
Hi-index | 0.00 |
In this paper we propose a distributed authentication service for Peer-to-Peer (P2P) based massively multiuser virtual environments. Such a service is necessary to provide security, e.g., preventing a user's account being stolen or the user being impersonated. We describe two variants of our authentication service. The first uses certificates and a central certification authority to ensure the validity of user-generated public keys. These keys are then used to sign messages sent by the users' peers. The second variant distributes the users' public keys in the P2P network and uses quorums to verify them.