Exchange of Peer to Peer Identity Reputation Using Cryptology Conventions

The Peer-To-Peer architectures derives to a large extent from their ability to function, scale and self-organize in the presence of a highly transient population of nodes, network and computer failures, without the need of a central server, Peer-To-Peer networks are capable of being wounded to peers who cheat, propagate malicious code, leech on the network, or simply do not cooperate. The traditional security techniques developed for the centralized distributed systems like client-server networks are insufficient for P2P networks by the virtue of their centralized nature. The absence of a central authority in a P2P network poses unique challenges for identity management in the network.

Provided by: International Journal of Computer Science and Information Technologies Topic: Security Date Added: Mar 2012 Format: PDF

Find By Topic