Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks.
Ruichuan ChenEng Keong LuaJon CrowcroftWenjia GuoLiyong TangZhong ChenPublished in: Peer-to-Peer Computing (2008)
Keyphrases
- content sharing
- peer to peer
- mobile services
- resource discovery
- mobile peer to peer
- distributed hash table
- content delivery
- social networking
- video on demand
- overlay network
- digital content
- file sharing
- rights management
- social media
- social networks
- streaming services
- information services
- service oriented
- case study
- database
- user generated content
- service discovery
- user experience
- web services