2008 the Third International Conference on Internet Monitoring and Protection 2008
DOI: 10.1109/icimp.2008.26
|View full text |Cite
|
Sign up to set email alerts
|

Peer-to-Peer Networks Security

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
3
1
1

Citation Types

0
5
0

Year Published

2008
2008
2023
2023

Publication Types

Select...
4
3
2

Relationship

0
9

Authors

Journals

citations
Cited by 12 publications
(5 citation statements)
references
References 5 publications
0
5
0
Order By: Relevance
“…The vulnerabilities and attacks found in the network layer can be divided into blockchain-or P2P-specific issues (for P2P, see, for example, Schäfer et al [146]) and general network issues. The blockchain-specific and network-related items can be applied to SSI.…”
Section: Network Layermentioning
confidence: 99%
“…The vulnerabilities and attacks found in the network layer can be divided into blockchain-or P2P-specific issues (for P2P, see, for example, Schäfer et al [146]) and general network issues. The blockchain-specific and network-related items can be applied to SSI.…”
Section: Network Layermentioning
confidence: 99%
“…They will be punished by some way. The trust information should only be provided by authenticated trusted peers [1].…”
Section: Related Workmentioning
confidence: 99%
“…Open and anonymous nature of P2P applications lead to complete lack of accountability of the contents that a peer may put in the network. The malicious peers often use these networks to do content poisoning and to distribute harmful programs such as Trojan Horses and viruses [12]. Distributed reputation based trust management systems have been proposed by researchers to provide protection against malicious content distribution [1].…”
Section: Introductionmentioning
confidence: 99%