共 50 条
- [1] Byzantine generals problem in the light of P2P computing 2006 THIRD ANNUAL INTERNATIONAL CONFERENCE ON MOBILE AND UBIQUITOUS SYSTEMS: NETWORKING & SERVICES, 2006, : 312 - +
- [4] UCSMssp: Ubiquitous Computing Service Model Based on SPKI/SDSI and P2P 2008 7TH WORLD CONGRESS ON INTELLIGENT CONTROL AND AUTOMATION, VOLS 1-23, 2008, : 2822 - 2827
- [5] Bayesian Network Based Trust Model with Time Window for Pure P2P Computing Systems 2014 IEEE GLOBAL CONFERENCE ON WIRELESS COMPUTING AND NETWORKING (GCWCN), 2014, : 219 - 223
- [7] Malicious Peers Eviction for P2P Overlays 2016 IEEE CONFERENCE ON COMMUNICATIONS AND NETWORK SECURITY (CNS), 2016, : 216 - 224
- [8] Hybrid P2P Architecture for Transaction Management 2013 IEEE 10TH INTERNATIONAL CONFERENCE ON E-BUSINESS ENGINEERING (ICEBE), 2013, : 192 - 198
- [9] Simulating trust overlay in P2P networks COMPUTATIONAL SCIENCE - ICCS 2007, PT 1, PROCEEDINGS, 2007, 4487 : 632 - +
- [10] Securing Structured P2P Overlay Networks 2013 EIGHTH INTERNATIONAL CONFERENCE ON P2P, PARALLEL, GRID, CLOUD AND INTERNET COMPUTING (3PGCIC 2013), 2013, : 37 - 43