AbstractReputation systems have been proposed to distinguish malicious peers and ensure the quality of services in P2P networks. How-ever, only relying on global reputation scores to assess the reliability of file providers can weaken the subjective opinions of file requesters, which is vulnerable to some malicious attacks, e.g., camouflage attack. To address this issue, in this paper, we propose a novel hybrid trust model, namely HTM, based on the EigenTrust reputation management system. In HTM, a file requester utilizes a two-phase reference method to take both the global reputation and the direct trust of a file provider into consideration when deciding whether to download from it or not. In particular, in the first phase, a requester se...
Abstract: For most peer-to-peer file-swapping applications, sharing is a volunteer action, and peers...
[[abstract]]Recently, Peer-to-Peer (P2P) networks have widely been used to file-sharing applications...
Much work has been done to address the need for reputation systems in real deployed peer-to-peer net...
AbstractReputation systems have been proposed to distinguish malicious peers and ensure the quality ...
Peer-to-peer file-sharing networks are currently receiving much at-tention as a means of sharing and...
The recent and unprecedented surge of public interest in peer-to-peer (P2P) file-sharing systems has...
AbstractIn peer-to-peer (P2P) file sharing networks, it is common practice to manage each peer using...
Free-riders and fake files are two important problems in P2P file sharing systems. Previous works ha...
AbstractTrust research has become a key issue in the last few years as a novel and valid solution to...
Abstract: Current reputation schemes, employed by an existing P2P file sharing network are faced wi...
AbstractThe visible success of the Peer to Peer (P2P) paradigm is associated with many challenges in...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread mali...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread mali...
Peer-to-Peer (P2P) file sharing networks are widely used by Internet users but because of their anon...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread mali...
Abstract: For most peer-to-peer file-swapping applications, sharing is a volunteer action, and peers...
[[abstract]]Recently, Peer-to-Peer (P2P) networks have widely been used to file-sharing applications...
Much work has been done to address the need for reputation systems in real deployed peer-to-peer net...
AbstractReputation systems have been proposed to distinguish malicious peers and ensure the quality ...
Peer-to-peer file-sharing networks are currently receiving much at-tention as a means of sharing and...
The recent and unprecedented surge of public interest in peer-to-peer (P2P) file-sharing systems has...
AbstractIn peer-to-peer (P2P) file sharing networks, it is common practice to manage each peer using...
Free-riders and fake files are two important problems in P2P file sharing systems. Previous works ha...
AbstractTrust research has become a key issue in the last few years as a novel and valid solution to...
Abstract: Current reputation schemes, employed by an existing P2P file sharing network are faced wi...
AbstractThe visible success of the Peer to Peer (P2P) paradigm is associated with many challenges in...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread mali...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread mali...
Peer-to-Peer (P2P) file sharing networks are widely used by Internet users but because of their anon...
The open and anonymous nature of a P2P network makes it an ideal medium for attackers to spread mali...
Abstract: For most peer-to-peer file-swapping applications, sharing is a volunteer action, and peers...
[[abstract]]Recently, Peer-to-Peer (P2P) networks have widely been used to file-sharing applications...
Much work has been done to address the need for reputation systems in real deployed peer-to-peer net...