2014 Annual IEEE India Conference (INDICON) 2014
DOI: 10.1109/indicon.2014.7030482
|View full text |Cite
|
Sign up to set email alerts
|

Trust-based decentralized service discovery in structured Peer-to-Peer networks

Help me understand this report

Search citation statements

Order By: Relevance

Paper Sections

Select...
2

Citation Types

0
2
0

Year Published

2018
2018
2018
2018

Publication Types

Select...
1

Relationship

0
1

Authors

Journals

citations
Cited by 1 publication
(2 citation statements)
references
References 26 publications
0
2
0
Order By: Relevance
“…Concerning the application of trust and reputation directly to Chord, some ideas can be found in [30][31][32][33]. In [31] the authors apply some of the strategies proposed by Koyanagi in [30], extending them to security purposes and not limiting them to maintenance aims.…”
Section: Background and Related Workmentioning
confidence: 99%
See 1 more Smart Citation
“…Concerning the application of trust and reputation directly to Chord, some ideas can be found in [30][31][32][33]. In [31] the authors apply some of the strategies proposed by Koyanagi in [30], extending them to security purposes and not limiting them to maintenance aims.…”
Section: Background and Related Workmentioning
confidence: 99%
“…Concerning the application of trust and reputation directly to Chord, some ideas can be found in [30][31][32][33]. In [31] the authors apply some of the strategies proposed by Koyanagi in [30], extending them to security purposes and not limiting them to maintenance aims. More precisely, the authors of [31] exploit Bayesian networks in order to enrich Chord finger tables with a further column, called "trust," whose value will be used in order to finalize trustworthy lookups.…”
Section: Background and Related Workmentioning
confidence: 99%