Applied Cryptography and Network Security
From MaRDI portal
Publication:4680937
DOI10.1007/B98360zbMATH Open1103.68511OpenAlexW4301861138MaRDI QIDQ4680937FDOQ4680937
Authors: Nathan Curtis, Willy Susilo, Reihaneh Safavi-Naini
Publication date: 13 June 2005
Published in: Lecture Notes in Computer Science (Search for Journal in Brave)
Full work available at URL: https://doi.org/10.1007/b98360
Recommendations
- Behavior-based reputation management in P2P file-sharing networks
- A trust model based on similarity-weighted recommendation for P2P environments
- Developing semantic business model for VO construction on semantic grid
- Peer-to-peer's most wanted: malicious peers
- P2P authenticity query and replica management algorithm based on trust
Data encryption (aspects in computer science) (68P25) Cryptography (94A60) Authentication, digital signatures and secret sharing (94A62)
Cited In (1)
This page was built for publication: Applied Cryptography and Network Security
Report a bug (only for logged in users!)Click here to report a bug for this page (MaRDI item Q4680937)