The platform will undergo maintenance on Sep 14 at about 7:45 AM EST and will be unavailable for approximately 2 hours.
2011
DOI: 10.1109/tie.2010.2050751
|View full text |Cite
|
Sign up to set email alerts
|

JXTA-Overlay: A P2P Platform for Distributed, Collaborative, and Ubiquitous Computing

Abstract: With the fast growth of Internet infrastructure and the use of large-scale complex applications from industries, transport, logistics, government, health and businesses, there is an increasing need to design and deploy multi-featured networking applications. Important features of such applications include the capability to be self-organized, decentralized, integrate different types of resources (PCs, laptops, mobile and sensor devices), and provide global, transparent and secure access to resources. Moreover, … Show more

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
4
1

Citation Types

0
28
0

Year Published

2012
2012
2019
2019

Publication Types

Select...
6
2
1

Relationship

2
7

Authors

Journals

citations
Cited by 76 publications
(28 citation statements)
references
References 17 publications
0
28
0
Order By: Relevance
“…S first checks the validity of h(ID i ) and T u , computes EID=ID i || m and 2 C ′ =h(h(EID ⊕ x) ⊕ T u ), and then compares the computed 2 C ′ with the received C 2 . If they are equal, S computes C 3 =h(h(EID ⊕ x) ⊕ h(T s )) and session key…”
Section: Verification Phasementioning
confidence: 99%
See 1 more Smart Citation
“…S first checks the validity of h(ID i ) and T u , computes EID=ID i || m and 2 C ′ =h(h(EID ⊕ x) ⊕ T u ), and then compares the computed 2 C ′ with the received C 2 . If they are equal, S computes C 3 =h(h(EID ⊕ x) ⊕ h(T s )) and session key…”
Section: Verification Phasementioning
confidence: 99%
“…With the development of distributed computer networks, it is easy for user terminals to share information and computing power with hosts [1,2]. The distributed locations of service providers make it efficient and convenient for subscribers to access the resources, and it is of great concern to protect the systems and the users' privacy and security from malicious adversaries.…”
Section: Introductionmentioning
confidence: 99%
“…Object placement is also determined by globally-agreed schemes highly related to overlay networks. Among these systems Distributed Hash Tables (DHTs) have emerged as the most popular scheme in this family [2,3]. CAN implements a distributed hash table, which provides basic operations such as insertion, lookup, and deletion of some objects [4].…”
Section: Introductionmentioning
confidence: 99%
“…With wide spreading of distributed computer networks, it has become popular to allow users accessing various network services offered by distributed service providers [1], [2]. Consequently, user authentication (also called user identification) [3], [4] plays a crucial role in distributed computer networks to verify if a user is legal and then can be granted to access the services requested.…”
Section: Introductionmentioning
confidence: 99%