Detecting malicious peers in a reputation-based peer-to-peer system.
Loubna MekouarYoussef IraqiRaouf BoutabaPublished in: CCNC (2005)
Keyphrases
- peer to peer
- detecting malicious
- detect malicious
- reputation mechanisms
- overlay network
- peer to peer networks
- peer to peer systems
- load balancing
- web pages
- data sharing
- fault tolerance
- file sharing
- distributed environment
- ad hoc networks
- digital libraries
- unstructured p p networks
- end hosts
- unstructured peer to peer systems