The quest for security in mobile ad hoc networks
MobiHoc '01 Proceedings of the 2nd ACM international symposium on Mobile ad hoc networking & computing
An evidential model of distributed reputation management
Proceedings of the first international joint conference on Autonomous agents and multiagent systems: part 1
A Distributed Light-Weight Authentication Model for Ad-hoc Networks
ICISC '01 Proceedings of the 4th International Conference Seoul on Information Security and Cryptology
Implementing a Reputation-Aware Gnutella Servent
Revised Papers from the NETWORKING 2002 Workshops on Web Engineering and Peer-to-Peer Computing
The Resurrecting Duckling: Security Issues for Ad-hoc Wireless Networks
Proceedings of the 7th International Workshop on Security Protocols
A reputation-based trust model for peer-to-peer ecommerce communities [Extended Abstract]
Proceedings of the 4th ACM conference on Electronic commerce
Trust and Reputation Model in Peer-to-Peer Networks
P2P '03 Proceedings of the 3rd International Conference on Peer-to-Peer Computing
Trust-Based Community Formation in Peer-to-Peer File Sharing Networks
WI '04 Proceedings of the 2004 IEEE/WIC/ACM International Conference on Web Intelligence
TrustGuard: countering vulnerabilities in reputation management for decentralized overlay networks
WWW '05 Proceedings of the 14th international conference on World Wide Web
Key agreement in ad hoc networks
Computer Communications
IEEE Network: The Magazine of Global Internetworking
Enhancing an Integer Challenge-Response Protocol
ICCSA '08 Proceedings of the international conference on Computational Science and Its Applications, Part II
Hi-index | 0.00 |
The correct identification of the various entities connected to a network is the first and most important step on top of which it is possible to create the chain of trust needed, for example, for authorization and encryption purposes. Unfortunately in fully decentralized systems, typical, for example, of Peer-to-peer scenarios, such identification results extremely difficult, mainly for the lack of a central authority. This paper presents the Green Card Protocol, a novel protocol that allows entities exchanging information to gain a sufficient level of trustworthiness on the other peers' real identity.