A scalable content-addressable network
Proceedings of the 2001 conference on Applications, technologies, architectures, and protocols for computer communications
Storage management and caching in PAST, a large-scale, persistent peer-to-peer storage utility
SOSP '01 Proceedings of the eighteenth ACM symposium on Operating systems principles
Looking up data in P2P systems
Communications of the ACM
Chord: a scalable peer-to-peer lookup protocol for internet applications
IEEE/ACM Transactions on Networking (TON)
PAST: A Large-Scale, Persistent Peer-to-Peer Storage Utility
HOTOS '01 Proceedings of the Eighth Workshop on Hot Topics in Operating Systems
[15] Peer-to-Peer Architecture Case Study: Gnutella Network
P2P '01 Proceedings of the First International Conference on Peer-to-Peer Computing
Free Riding on Gnutella Revisited: The Bell Tolls?
IEEE Distributed Systems Online
Exploiting Geographical and Temporal Locality to Boost Search Efficiency in Peer-to-Peer Systems
IEEE Transactions on Parallel and Distributed Systems
Analyzing the Characteristics of Gnutella Overlays
ITNG '07 Proceedings of the International Conference on Information Technology
An Effective P2P Search Scheme to Exploit File Sharing Heterogeneity
IEEE Transactions on Parallel and Distributed Systems
Public Key Management Framework for Two-tier Super Peer Architecture
ICDCSW '07 Proceedings of the 27th International Conference on Distributed Computing Systems Workshops
A Distributed Trust-based Reputation Model in P2P System
SNPD '07 Proceedings of the Eighth ACIS International Conference on Software Engineering, Artificial Intelligence, Networking, and Parallel/Distributed Computing - Volume 01
A Practical Certificateless Signature Scheme
ISDPE '07 Proceedings of the The First International Symposium on Data, Privacy, and E-Commerce
Building heterogeneous peer-to-peer networks: protocol and analysis
IEEE/ACM Transactions on Networking (TON)
A New Authentication Method with Distributed Hash Table for P2P Network
AINAW '08 Proceedings of the 22nd International Conference on Advanced Information Networking and Applications - Workshops
Message replication in unstructured peer-to-peer network
COLCOM '07 Proceedings of the 2007 International Conference on Collaborative Computing: Networking, Applications and Worksharing
Peer-to-Peer authentication with a distributed single sign-on service
IPTPS'04 Proceedings of the Third international conference on Peer-to-Peer Systems
Tapestry: a resilient global-scale overlay for service deployment
IEEE Journal on Selected Areas in Communications
A Fine-Grained Reputation System for Reliable Service Selection in Peer-to-Peer Networks
IEEE Transactions on Parallel and Distributed Systems
Hi-index | 0.00 |
This paper proposes a new authentication model based on CL-PKC technology (Certificateless public key cryptography) in peer-to-peer systems. With the progress in peer-to-peer technology, lots of things related to the security problems of peer-to-peer systems have been exposing. To solve these security problems, authentication must be settled firstly. So this paper develops an authentication method based on CL-PKC technology, considering the dynamic properties of hybrid peer-to-peer systems. This method simplifies the procedure of getting public keys and authentication procedure, so the efficiency is increased, and the mount of bandwidth required is lower. This method is very fit to the systems with limited resources.