Academic literature on the topic 'Peer-to-Peer Network Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the lists of relevant articles, books, theses, conference reports, and other scholarly sources on the topic 'Peer-to-Peer Network Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Journal articles on the topic "Peer-to-Peer Network Security"
Mahmoud, Mostafa. "Bitcoin's Blockchain Peer-to-Peer Network Security Attacks and Countermeasures." Indian Journal of Science and Technology 13, no. 7 (2020): 767–86. https://doi.org/10.17485/ijst/2020/v13i07/149691.
Full textFeng, Liping, Hongbin Wang, Qi Han, Qingshan Zhao, and Lipeng Song. "Modeling Peer-to-Peer Botnet on Scale-Free Network." Abstract and Applied Analysis 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/212478.
Full textMostafa, Mahmoud. "Bitcoin’s Blockchain Peer-to-Peer Network Security Attacks and Countermeasures." Indian Journal of Science and Technology 13, no. 07 (2020): 767–86. http://dx.doi.org/10.17485/ijst/2020/v13i07/149691.
Full textWararkar, Pravin, Naman Kapil, Vyom Rehani, Yash Mehra, and Yashi Bhatnagar. "Resolving Problems Based on Peer to Peer Network Security Issue's." Procedia Computer Science 78 (2016): 652–59. http://dx.doi.org/10.1016/j.procs.2016.02.113.
Full textKe, Chih Kun, and Zheng Hua Lin. "Secure Data Synchronization over a Mobile Peer-to-Peer Network." Applied Mechanics and Materials 764-765 (May 2015): 950–54. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.950.
Full textS, Archana, Princy Mary, Sangami S, and Mahalakshmi V. "Peer-to-Peer Network Node Distribution Analysis Using Block chain." International Research Journal of Computer Science 11, no. 04 (2024): 309–13. http://dx.doi.org/10.26562/irjcs.2024.v1104.29.
Full textOsman, Dr Yassir S. K., Dr Rajalingam A., and Dr Jayakumar M.S. "A Novel Application Service Security Using Peer-to-Peer Trust Slicing Trust Model." International Innovative Research Journal of Engineering and Technology 8, no. 3 (2023): 25–32. http://dx.doi.org/10.32595/iirjet.org/v8i3.2023.171.
Full textLi, Gengxian, Chundong Wang, and Huaibin Wang. "Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches." Future Internet 14, no. 10 (2022): 290. http://dx.doi.org/10.3390/fi14100290.
Full textVimal, S1 Vijayalakshmi V2. "SURVEY: COMPARISON OF PEER-TO-PEER OVERLAY NETWORK FOR FILE SEARCHING AND SHARING METHODS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 1 (2018): 338–43. https://doi.org/10.5281/zenodo.1147478.
Full textChen, Xin. "A Novel Security Architecture for Peer-to-Peer IMS System." Advanced Materials Research 664 (February 2013): 1076–81. http://dx.doi.org/10.4028/www.scientific.net/amr.664.1076.
Full textDissertations / Theses on the topic "Peer-to-Peer Network Security"
Petersson, Linus. "Peer-to-peer : time to lock the door." Thesis, Blekinge Tekniska Högskola, Institutionen för programvaruteknik och datavetenskap, 2002. http://urn.kb.se/resolve?urn=urn:nbn:se:bth-1724.
Full textChen, Ta-wei. "Optimization of Transport Security for Securing Peer-to-Peer Communication in Heterogeneous Networks." Thesis, KTH, Mikroelektronik och Informationsteknik, IMIT, 2005. http://urn.kb.se/resolve?urn=urn:nbn:se:kth:diva-92298.
Full textAgbeko, Joseph. "Evaluation and application of bloom filters in computer network security /." Connect to resource online, 2009. http://rave.ohiolink.edu/etdc/view?acc_num=ysu1253733230.
Full textWANG, HONGHAO. "An Efficient and Secure Overlay Network for General Peer-to-Peer Systems." University of Cincinnati / OhioLINK, 2008. http://rave.ohiolink.edu/etdc/view?acc_num=ucin1204080675.
Full textZhao, Xiwei. "Foundational Forensic Techniques for Cellular and Ad Hoc Multi-hop Networks." FIU Digital Commons, 2008. http://digitalcommons.fiu.edu/etd/23.
Full textMERLANTI, Danilo. "MULTIMEDIA ON GEOGRAPHIC NETWORK." Doctoral thesis, Università degli studi di Ferrara, 2012. http://hdl.handle.net/11392/2389464.
Full textQuinellato, Douglas Gielo. "Um sistema de reputação para redes Peer-to-Peer estruturado baseado na reputação de arquivos, com verificação pela reputação dos nos." [s.n.], 2009. http://repositorio.unicamp.br/jspui/handle/REPOSIP/276196.
Full textMiller, John. "Distributed virtual environment scalability and security." Thesis, University of Cambridge, 2011. https://www.repository.cam.ac.uk/handle/1810/241109.
Full textHsiao, Chih-Wen, David Turner, and Keith Ross. "A secure lightweight currency service provider." CSUSB ScholarWorks, 2004. https://scholarworks.lib.csusb.edu/etd-project/2594.
Full textWerapun, Warodom. "Architectures de réseaux pour la délivrance de services à domicile." Thesis, Toulouse, INPT, 2012. http://www.theses.fr/2012INPT0081/document.
Full textBooks on the topic "Peer-to-Peer Network Security"
Proudler, Graeme J. Security for a connectionless peer-to-peer link. Hewlett-Packard Laboratories, Technical Publications Department, 1996.
Find full textKorzun, Dmitry. Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security. Springer New York, 2013.
Find full textOualha, Nouha. Peer-to-peer storage: Security and protocols. Nova Science Publishers, 2010.
Find full textJudiciary, United States Congress Senate Committee on the. The dark side of a bright idea: Could personal and national security risks compromise the potential of peer-to-peer file-sharing networks? : hearing before the Committee on the Judiciary, United States Senate, One Hundred Eighth Congress, first session, June 17, 2003. U.S. G.P.O., 2003.
Find full textUnited States. Federal Trade Commission. Office of Consumer and Business Education, ed. Uso compartido de archivos: Cómo evaluar los riesgos. Federal Trade Commission, Bureau of Consumer Protection, Office of Consumer and Business Education, 2005.
Find full textReform, United States Congress House Committee on Government. Overexposed: The threats to privacy and security on filesharing networks : hearing before the Committee on Government Reform, House of Representatives, One Hundred Eighth Congress, first session, May 15, 2003. U.S. G.P.O., 2003.
Find full textMalik, Zaki. Trust Management for Service-Oriented Environments. Springer-Verlag US, 2009.
Find full textOffice, General Accounting. File sharing: Selected universities report taking action to reduce copyright infringement : report to congressional requesters. U.S. General Accounting Office, 2004.
Find full textGurtov, Andrei, and Dmitry Korzun. Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security. Springer, 2014.
Find full textGurtov, Andrei, and Dmitry Korzun. Structured Peer-to-Peer Systems: Fundamentals of Hierarchical Organization, Routing, Scaling, and Security. Springer, 2012.
Find full textBook chapters on the topic "Peer-to-Peer Network Security"
Tsang, Patrick P., and Sean W. Smith. "PPAA: Peer-to-Peer Anonymous Authentication." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2008. http://dx.doi.org/10.1007/978-3-540-68914-0_4.
Full textCao, Tong, Jiangshan Yu, Jérémie Decouchant, Xiapu Luo, and Paulo Verissimo. "Exploring the Monero Peer-to-Peer Network." In Financial Cryptography and Data Security. Springer International Publishing, 2020. http://dx.doi.org/10.1007/978-3-030-51280-4_31.
Full textTamassia, Roberto, and Nikos Triandopoulos. "Efficient Content Authentication in Peer-to-Peer Networks." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2007. http://dx.doi.org/10.1007/978-3-540-72738-5_23.
Full textThai, Phuc D., Minh Doan, Wei Liu, et al. "Blockchain Peer-to-Peer Network: Performance and Security." In Handbook on Blockchain. Springer International Publishing, 2022. http://dx.doi.org/10.1007/978-3-031-07535-3_2.
Full textCollins, Michael P., and Michael K. Reiter. "Finding Peer-to-Peer File-Sharing Using Coarse Network Behaviors." In Computer Security – ESORICS 2006. Springer Berlin Heidelberg, 2006. http://dx.doi.org/10.1007/11863908_1.
Full textManulis, Mark. "Group Key Exchange Enabling On-Demand Derivation of Peer-to-Peer Keys." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2009. http://dx.doi.org/10.1007/978-3-642-01957-9_1.
Full textGarcia, Flavio D., and Jaap-Henk Hoepman. "Off-Line Karma: A Decentralized Currency for Peer-to-peer and Grid Applications." In Applied Cryptography and Network Security. Springer Berlin Heidelberg, 2005. http://dx.doi.org/10.1007/11496137_25.
Full textSusilo, Willy, Yang-Wai Chow, and Rungrat Wiangsripanawan. "Towards Formalizing a Reputation System for Cheating Detection in Peer-to-Peer-Based Massively Multiplayer Online Games." In Network and System Security. Springer Berlin Heidelberg, 2012. http://dx.doi.org/10.1007/978-3-642-34601-9_22.
Full textKumar, K., J. Nafeesa Begum, and V. Sumathy. "Efficient Region-Based Key Agreement for Peer -to - Peer Information Sharing in Mobile Ad Hoc Networks." In Recent Trends in Network Security and Applications. Springer Berlin Heidelberg, 2010. http://dx.doi.org/10.1007/978-3-642-14478-3_29.
Full textSen, Jaydip. "A Secure and Efficient Searching Scheme for Trusted Nodes in a Peer-to-Peer Network." In Computational Intelligence in Security for Information Systems. Springer Berlin Heidelberg, 2011. http://dx.doi.org/10.1007/978-3-642-21323-6_13.
Full textConference papers on the topic "Peer-to-Peer Network Security"
R, Rana Veer Samara Sihman Bharattej, Zaid Ajznblasm, E. G. Satish, Adlin Sylvia A, and M. Devi. "Enhancing Peer-to-Peer Network Security using 3D Convolutional Autoencoder based Anomaly Detection." In 2025 International Conference on Intelligent Systems and Computational Networks (ICISCN). IEEE, 2025. https://doi.org/10.1109/iciscn64258.2025.10934473.
Full textShi, Ruisheng, Zhiyuan Peng, Lina Lan, et al. "Eclipse Attacks on Monero's Peer-to-Peer Network." In Network and Distributed System Security Symposium. Internet Society, 2025. https://doi.org/10.14722/ndss.2025.240095.
Full textChen, Jinrui, and Jianping Li. "The Research of Peer-to-Peer Network Security." In Proceedings of the International Conference. World Scientific Publishing Company, 2008. http://dx.doi.org/10.1142/9789812799524_0150.
Full textScanlon, Mark, and M.-Tahar Kechadi. "Universal Peer-to-Peer Network Investigation Framework." In 2013 Eighth International Conference on Availability, Reliability and Security (ARES). IEEE, 2013. http://dx.doi.org/10.1109/ares.2013.91.
Full textGermanus, Daniel, Stefanie Roos, Thorsten Strufe, and Neeraj Suri. "Mitigating Eclipse attacks in Peer-To-Peer networks." In 2014 IEEE Conference on Communications and Network Security (CNS). IEEE, 2014. http://dx.doi.org/10.1109/cns.2014.6997509.
Full textFaycal, Marguerite, and Ahmed Serhrouchni. "NETPOPPS: A Network Provider Oriented Peer-to-Peer System." In 2008 New Technologies, Mobility and Security (NTMS). IEEE, 2008. http://dx.doi.org/10.1109/ntms.2008.ecp.70.
Full textKupershtein, Leonid M., Mykhailo D. Krentsin, and Andrii V. Prytula. "Use of peer-to-peer networks for secured communication." In 16th IC Measurement and Control in Complex Systems. VNTU, 2022. http://dx.doi.org/10.31649/mccs2022.20.
Full textHerwig, Stephen, Katura Harvey, George Hughey, Richard Roberts, and Dave Levin. "Measurement and Analysis of Hajime, a Peer-to-peer IoT Botnet." In Network and Distributed System Security Symposium. Internet Society, 2019. http://dx.doi.org/10.14722/ndss.2019.23488.
Full textHamai, Tatsuaki, Masahiro Fujii, and Yu Watanabe. "ITU-T recommendations on peer-to-peer (P2P) network security." In 2009 International Symposium on Autonomous Decentralized Systems (ISADS). IEEE, 2009. http://dx.doi.org/10.1109/isads.2009.5207377.
Full textMusa, Ahmad, Aliyu Abubakar, Usman Abdul Gimba, and Rasheed Abubakar Rasheed. "An Investigation into Peer-to-Peer Network Security Using Wireshark." In 2019 15th International Conference on Electronics, Computer and Computation (ICECCO). IEEE, 2019. http://dx.doi.org/10.1109/icecco48375.2019.9043236.
Full textReports on the topic "Peer-to-Peer Network Security"
Erol, Selman, and Michael Junho Lee. Financial System Architecture and Technological Vulnerability. Federal Reserve Bank of New York, 2024. http://dx.doi.org/10.59576/sr.1122.
Full text