Journal articles on the topic 'Peer-to-Peer Network Security'
Create a spot-on reference in APA, MLA, Chicago, Harvard, and other styles
Consult the top 50 journal articles for your research on the topic 'Peer-to-Peer Network Security.'
Next to every source in the list of references, there is an 'Add to bibliography' button. Press on it, and we will generate automatically the bibliographic reference to the chosen work in the citation style you need: APA, MLA, Harvard, Chicago, Vancouver, etc.
You can also download the full text of the academic publication as pdf and read online its abstract whenever available in the metadata.
Browse journal articles on a wide variety of disciplines and organise your bibliography correctly.
Mahmoud, Mostafa. "Bitcoin's Blockchain Peer-to-Peer Network Security Attacks and Countermeasures." Indian Journal of Science and Technology 13, no. 7 (2020): 767–86. https://doi.org/10.17485/ijst/2020/v13i07/149691.
Full textFeng, Liping, Hongbin Wang, Qi Han, Qingshan Zhao, and Lipeng Song. "Modeling Peer-to-Peer Botnet on Scale-Free Network." Abstract and Applied Analysis 2014 (2014): 1–8. http://dx.doi.org/10.1155/2014/212478.
Full textMostafa, Mahmoud. "Bitcoin’s Blockchain Peer-to-Peer Network Security Attacks and Countermeasures." Indian Journal of Science and Technology 13, no. 07 (2020): 767–86. http://dx.doi.org/10.17485/ijst/2020/v13i07/149691.
Full textWararkar, Pravin, Naman Kapil, Vyom Rehani, Yash Mehra, and Yashi Bhatnagar. "Resolving Problems Based on Peer to Peer Network Security Issue's." Procedia Computer Science 78 (2016): 652–59. http://dx.doi.org/10.1016/j.procs.2016.02.113.
Full textKe, Chih Kun, and Zheng Hua Lin. "Secure Data Synchronization over a Mobile Peer-to-Peer Network." Applied Mechanics and Materials 764-765 (May 2015): 950–54. http://dx.doi.org/10.4028/www.scientific.net/amm.764-765.950.
Full textS, Archana, Princy Mary, Sangami S, and Mahalakshmi V. "Peer-to-Peer Network Node Distribution Analysis Using Block chain." International Research Journal of Computer Science 11, no. 04 (2024): 309–13. http://dx.doi.org/10.26562/irjcs.2024.v1104.29.
Full textOsman, Dr Yassir S. K., Dr Rajalingam A., and Dr Jayakumar M.S. "A Novel Application Service Security Using Peer-to-Peer Trust Slicing Trust Model." International Innovative Research Journal of Engineering and Technology 8, no. 3 (2023): 25–32. http://dx.doi.org/10.32595/iirjet.org/v8i3.2023.171.
Full textLi, Gengxian, Chundong Wang, and Huaibin Wang. "Unreachable Peers Communication Scheme in Decentralized Networks Based on Peer-to-Peer Overlay Approaches." Future Internet 14, no. 10 (2022): 290. http://dx.doi.org/10.3390/fi14100290.
Full textVimal, S1 Vijayalakshmi V2. "SURVEY: COMPARISON OF PEER-TO-PEER OVERLAY NETWORK FOR FILE SEARCHING AND SHARING METHODS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 1 (2018): 338–43. https://doi.org/10.5281/zenodo.1147478.
Full textChen, Xin. "A Novel Security Architecture for Peer-to-Peer IMS System." Advanced Materials Research 664 (February 2013): 1076–81. http://dx.doi.org/10.4028/www.scientific.net/amr.664.1076.
Full textMikhav, Volodymyr, Serhii Semenov, Yelyzaveta Meleshko, Mykola Yakymenko, and Yaroslav Shulika. "Constructing the mathematical model of a recommender system for decentralized peer-to-peer computer networks." Eastern-European Journal of Enterprise Technologies 4, no. 9 (124) (2023): 24–35. http://dx.doi.org/10.15587/1729-4061.2023.286187.
Full textFranzoni, Federico, Xavier Salleras, and Vanesa Daza. "AToM: Active topology monitoring for the bitcoin peer-to-peer network." Peer-to-Peer Networking and Applications 15, no. 1 (2021): 408–25. http://dx.doi.org/10.1007/s12083-021-01201-7.
Full textGonzalez, Elias, and Laszlo B. Kish. "Key Exchange Trust Evaluation in Peer-to-Peer Sensor Networks With Unconditionally Secure Key Exchange." Fluctuation and Noise Letters 15, no. 01 (2016): 1650008. http://dx.doi.org/10.1142/s0219477516500085.
Full textNick, Rahimi. "SECURITY CONSIDERATION IN PEER-TO-PEER NETWORKS WITH A CASE STUDY APPLICATION." International Journal of Network Security & Its Applications (IJNSA) 12, no. 02 (2020): 01–16. https://doi.org/10.5281/zenodo.3737916.
Full textKabla, Arkan Hammoodi Hasan, Achmad Husni Thamrin, Mohammed Anbar, Selvakumar Manickam, and Shankar Karuppayah. "PeerAmbush: Multi-Layer Perceptron to Detect Peer-to-Peer Botnet." Symmetry 14, no. 12 (2022): 2483. http://dx.doi.org/10.3390/sym14122483.
Full textVimal, S., and S. K. Srivatsa. "A Reliable Peer-to-Peer Platform for Adding New Node Using Trust Based Model." International Journal of Electrical and Computer Engineering (IJECE) 7, no. 6 (2017): 10.11591/ijece.v7i6.pp3515–3520. https://doi.org/10.11591/ijece.v7i6.pp3515-3520.
Full textAline, Z. TSAGUE, T. FUTE Elie, TONYE Emmanuel, and EL AMRAOUI Adnen. "Peer to Peer Authentication for Index-based Distributed Data Collection: A Zero-Knowledge-based Scheme to Security for Wireless Sensor Networks." American Journal of Advanced Research 3, no. 2 (2019): 1–6. https://doi.org/10.5281/zenodo.3368588.
Full textAlwan Hussein, Naseer. "Simulation of RC5 Algorithm to Provide Security for WLAN, Peer-to-Peer." Al-Kitab Journal for Pure Sciences 8, no. 02 (2024): 31–47. http://dx.doi.org/10.32441/kjps.08.02.p4.
Full textAbdullahi Yari, Imrana, Tobias Dehling, Felix Kluge, Juergen Geck, Ali Sunyaev, and Bjoern Eskofier. "Security Engineering of Patient-Centered Health Care Information Systems in Peer-to-Peer Environments: Systematic Review." Journal of Medical Internet Research 23, no. 11 (2021): e24460. http://dx.doi.org/10.2196/24460.
Full textMezquita, Yeray, Ana Belén Gil-González, Angel Martín del Rey, Javier Prieto, and Juan Manuel Corchado. "Towards a Blockchain-Based Peer-to-Peer Energy Marketplace." Energies 15, no. 9 (2022): 3046. http://dx.doi.org/10.3390/en15093046.
Full textHeerok, Banerjee, Murugaanandam S, and Ganapathy V. "A decentralized paradigm for resource-aware computing in wireless Ad hoc networks." TELKOMNIKA Telecommunication, Computing, Electronics and Control 17, no. 2 (2019): 676–82. https://doi.org/10.12928/TELKOMNIKA.v17i2. 9621.
Full textSmushkin, A. B. "Darknet in the Cyberspace Security System." Juridical science and practice 20, no. 4 (2025): 50–59. https://doi.org/10.25205/2542-0410-2024-20-4-50-59.
Full textO. E., Ojo, Kareem M. K., Ayilara-Adewale O. A., and Amahia C. N. "A secured channel for transmitting multimedia contents in peer-assisted networks." Journal of Applied Science, Information and Computing 5, no. 2 (2024): 41–51. http://dx.doi.org/10.59568/jasic-2024-5-2-06.
Full textBrooks, Richard R. "Sensor Network Self-Organization Using Random Graphs." International Journal of Distributed Sensor Networks 5, no. 3 (2009): 201–8. http://dx.doi.org/10.1080/15501320802498307.
Full textPoonam, Gupta*1 Anupama Gupta2 &. Baldip Kaur3. "SECURE AUTHENTICATION IN IoT BASED WSNs FOR DATA PRIVACY PROTECTION." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 7, no. 4 (2018): 604–14. https://doi.org/10.5281/zenodo.1228639.
Full textBaig, Mirza Jabbar Aziz, Mohammad Tariq Iqbal, Mohsin Jamil, and Jahangir Khan. "Blockchain-Based Peer-to-Peer Energy Trading System Using Open-Source Angular Framework and Hypertext Transfer Protocol." Electronics 12, no. 2 (2023): 287. http://dx.doi.org/10.3390/electronics12020287.
Full textReddy, Annapureddy Venkata Sai Kumar, and Gourinath Banda. "ElasticPay: Instant Peer-to-Peer Offline Extended Digital Payment System." Sensors 24, no. 24 (2024): 8034. https://doi.org/10.3390/s24248034.
Full textBharath, Bhushan Yannam. "EFFECTIVE RECOMMENDATION CHAINS FOR LARGE SCALE DISTRIBUTED DECENTRALIZED P2P SYSTEMS." COMPUSOFT: An International Journal of Advanced Computer Technology 02, no. 09 (2013): 300–306. https://doi.org/10.5281/zenodo.14613399.
Full textSun, Zhixiang, Zhigang Li, Yixun Xue, Xinyue Chang, Huajian Li, and J. H. Zheng. "Price-function-free energy pricing in Bilevel peer-to-peer energy markets considering network security." Applied Energy 391 (August 2025): 125864. https://doi.org/10.1016/j.apenergy.2025.125864.
Full textEdussuriya, Chathurangi, Umar Marikkar, Subash Wickramasinghe, Upul Jayasinghe, and Janaka Alawatugoda. "Peer-to-Peer Energy Trading through Swarm Intelligent Stackelberg Game." Energies 16, no. 5 (2023): 2434. http://dx.doi.org/10.3390/en16052434.
Full textSuman, Mann, Chaudhary Harshit, khatri Aryan, Malik Ritik, and Gupta Yatin. "A Peer-to-Peer File Storage System Using Blockchain and Interplanetary File System." International Journal of Current Science Research and Review 05, no. 02 (2022): 582–89. https://doi.org/10.5281/zenodo.6298736.
Full textAbdelouahab, Mahdi, Abdelmadjid Bouabdallah, Mohamed Achemlal, and Sylvie Laniepce. "The Topology Change Attack: Threat and Impact." JUCS - Journal of Universal Computer Science 15, no. (2) (2009): 465–87. https://doi.org/10.3217/jucs-015-02-0465.
Full textRubasinghe, Iresha Dilhani. "Transaction Verification Model for Peer-to-Peer Service-Oriented Digital Currency Transactions Based on the Foundation of Blockchain Architecture." ABC Research Alert 4, no. 3 (2016): Lanka. http://dx.doi.org/10.18034/ra.v4i3.306.
Full textDanylov, Vitaliy. "PEER-TO-PEER AUDIO STREAMING USING THE TOR NETWORK: PROBLEMS, OPPORTUNITIES AND DEVELOPMENT PROSPECTS." Economics & Education 9, no. 1 (2024): 12–17. http://dx.doi.org/10.30525/2500-946x/2024-1-2.
Full textWang, Feng, and Chunqing Xuan. "A High-Feasibility Secure Routing against Malicious Peer in Structured P2P." Mathematical Problems in Engineering 2022 (September 28, 2022): 1–6. http://dx.doi.org/10.1155/2022/5293083.
Full textLiu, Cai Bin, Guo Hui Wu, Le He, and Xiao Wei Wang. "Study and Application on Wireless Sensor Networks in Counterterrorism Operations." Advanced Materials Research 926-930 (May 2014): 2102–5. http://dx.doi.org/10.4028/www.scientific.net/amr.926-930.2102.
Full textMontakhabi, Mehdi, Fairouz Zobiri, Shenja van der Graaf, et al. "An Ecosystem View of Peer-to-Peer Electricity Trading: Scenario Building by Business Model Matrix to Identify New Roles." Energies 14, no. 15 (2021): 4438. http://dx.doi.org/10.3390/en14154438.
Full textKumar, Vinod, Amit Asthana, and Gaurav Tripathi. "Enhancing Data Security in IOT-based UAV Networks through Blockchain Integration." Engineering, Technology & Applied Science Research 15, no. 2 (2025): 21800–21804. https://doi.org/10.48084/etasr.9922.
Full textMerlec, Mpyana Mwamba, and Hoh Peter In. "DataMesh+: A Blockchain-Powered Peer-to-Peer Data Exchange Model for Self-Sovereign Data Marketplaces." Sensors 24, no. 6 (2024): 1896. http://dx.doi.org/10.3390/s24061896.
Full textWu, Honghu, Xiangrong Zhu, and Wei Hu. "A Blockchain System for Clustered Federated Learning with Peer-to-Peer Knowledge Transfer." Proceedings of the VLDB Endowment 17, no. 5 (2024): 966–79. http://dx.doi.org/10.14778/3641204.3641208.
Full textMuhammad, Qasim Habib, Usman Shoukat Muhammad, Irfan Muhammad, et al. "Smart Meter Development Using Digital Twin Technology for Green Energy Distribution Optimization." European Journal of Theoretical and Applied Sciences 1, no. 3 (2023): 181–90. https://doi.org/10.59324/ejtas.2023.1(3).20.
Full textNoor, Zuraidin Mohd Safar, Abdullah Noryusliza, Kamaludin Hazalila, Abd Ishak Suhaimi, and Rizal Mohd Isa Mohd. "Characterising and detection of botnet in P2P network for UDP protocol." Indonesian Journal of Electrical Engineering and Computer Science (IJEECS) 18, no. 3 (2020): 1584–95. https://doi.org/10.11591/ijeecs.v18.i3.pp1584-1595.
Full textKrentsin, Mykhailo, and Leonid Kupershtein. "NFC TECHNOLOGY AS A MEANS OF PROTECTED EXCHANGE OF IDENTIFICATION DATA BETWEEN PEER-TO-PEER NETWORK NODES." Cybersecurity: Education, Science, Technique 1, no. 25 (2024): 79–88. http://dx.doi.org/10.28925/2663-4023.2024.25.7988.
Full textGehlen, Guido, Fahad Aijaz, Yi Zhu, and Bernhard Walke. "Mobile P2P Web Services Using SIP." Mobile Information Systems 3, no. 3-4 (2007): 165–85. http://dx.doi.org/10.1155/2007/427831.
Full textAl-Enizi, Ziad Kh, and Muawya Naser. "The Law Applicable to P2P Networks on National and International Bases for Violating Intellectual Property Rights." International Journal of Cyber Warfare and Terrorism 12, no. 1 (2022): 1–10. http://dx.doi.org/10.4018/ijcwt.311419.
Full textGoncalves, Brian, and Atefeh Mashatan. "On the Security of the Dandelion Protocol." Mathematics 10, no. 7 (2022): 1054. http://dx.doi.org/10.3390/math10071054.
Full textWang, Chunzhi, Huili Zhang, and Zhiwei Ye. "A peer to peer traffic identification method based on wavelet and particle swarm optimization algorithm." International Journal of Wavelets, Multiresolution and Information Processing 13, no. 06 (2015): 1550048. http://dx.doi.org/10.1142/s0219691315500484.
Full textM., Supriya. "A SECURE PAYMENT SYSTEM FOR BANKING TRANSACTIONS." INTERNATIONAL JOURNAL OF ENGINEERING SCIENCES & RESEARCH TECHNOLOGY 6, no. 10 (2017): 278–83. https://doi.org/10.5281/zenodo.1012480.
Full textkumar, Abhinav. "IOT Security with Blockchain." YMER Digital 20, no. 11 (2021): 7–19. http://dx.doi.org/10.37896/ymer20.11/2.
Full textRajshree, Saxena*1 &. Dr. Raghav Mehra2. "A RESEARCH ON ROUTING PROTOCOLS AND SECURITY OF CHALLENGES IN MANETs." INTERNATIONAL JOURNAL OF RESEARCH SCIENCE & MANAGEMENT 4, no. 6 (2017): 22–26. https://doi.org/10.5281/zenodo.583650.
Full text