A mechanism based on reputation in P2P networks to counter malicious packet dropping (English)
- New search for: Peng, H.
- New search for: Lu, S.
- New search for: Li, J.
- New search for: Zhang, A.
- New search for: Zhao, D.
- New search for: Peng, H.
- New search for: Lu, S.
- New search for: Li, J.
- New search for: Zhang, A.
- New search for: Zhao, D.
In:
WUHAN UNIVERSITY JOURNAL OF NATURAL SCIENCES
;
16
, 5
;
405-408
;
2011
-
ISSN:
- Article (Journal) / Print
-
Title:A mechanism based on reputation in P2P networks to counter malicious packet dropping
-
Contributors:
-
Published in:WUHAN UNIVERSITY JOURNAL OF NATURAL SCIENCES ; 16, 5 ; 405-408
-
Publisher:
-
Publication date:2011-01-01
-
Size:4 pages
-
ISSN:
-
Type of media:Article (Journal)
-
Type of material:Print
-
Language:English
- New search for: 500
- Further information on Dewey Decimal Classification
-
Classification:
DDC: 500 -
Source:
© Metadata Copyright the British Library Board and other contributors. All rights reserved.
Table of contents – Volume 16, Issue 5
The tables of contents are generated automatically and are based on the data records of the individual contributions available in the index of the TIB portal. The display of the Tables of Contents may therefore be incomplete.
- 369
-
A new process and framework for direct anonymous attestation based on symmetric bilinear mapsTan, L. / Zhou, M. et al. | 2011
- 376
-
Using new fusion operations to improve trust expressiveness of subjective logicZhou, H. / Shi, W. / Liang, Z. / Liang, B. et al. | 2011
- 383
-
A trusted environment construction method for security-sensitive softwareLi, J. / Zhang, H. / Zhao, B. / Fang, L. et al. | 2011
- 391
-
An approach of trustworthy software design with automatically adapting software updateLi, Z. / Tian, J. et al. | 2011
- 399
-
Improved verifiability scheme for data storage in cloud computingYang, X. / Zhu, S. / Pan, X. et al. | 2011
- 405
-
A mechanism based on reputation in P2P networks to counter malicious packet droppingPeng, H. / Lu, S. / Li, J. / Zhang, A. / Zhao, D. et al. | 2011
- 409
-
A novel intrusion detection method based on improved SVM by combining PCA and PSOWang, H. / Zhang, G. / Mingjie, E. / Sun, N. et al. | 2011
- 414
-
A nonparametric adaptive CUSUM method and its application in source-end defense against SYN flooding attacksYu, M. et al. | 2011
- 419
-
Research of session initial protocol security mechanism on public key techniqueHu, J. / Li, Y. / Feng, J. et al. | 2011
- 423
-
A broadcast signcryption protocol for ad hoc networksWang, X. / Yao, G. / Liao, Z. et al. | 2011
- 430
-
One-time rational secret sharing scheme based on bayesian gameTian, Y. / Ma, J. / Peng, C. / Chen, X. / Ji, W. et al. | 2011
- 435
-
A complete set of addition laws for twisted jacobi intersection curvesWu, H. / Feng, R. et al. | 2011
- 439
-
An ideal lattice based IBE scheme in the standard modelYang, X. / Wu, L. / Zhang, M. / Wei, P. / Wei, L. et al. | 2011
- 447
-
High-order bit independence criterion test for the s-boxesGao, S. / Ma, W. / Zhu, J. et al. | 2011
- 452
-
Construction of k-ary pseudorandom elliptic curve sequencesWu, C. / Weng, X. / Chen, Z. et al. | 2011
- 457
-
On the structure of cyclic codes over F q + uF q + vF q + uvF qXu, X. / Liu, X. et al. | 2011