1 |
L. Mekouar, Y. Iraqi, and R. Boutaba, 'Peer-to-Peer's most wanted: Malicious peers,' In International Computer Networks Journal, Special Issue on Management in Peer-to-Peer Systems:Trust, Reputation and Security, Vol.50, No.4, pp.545-562, 2006
DOI
ScienceOn
|
2 |
Y. Wand and J. Vassileva, 'Trust and Reputation Model in Peer-to-Peer Networks,' Proceedings of IEEE Conference on P2P Computing, pp.150-157, 2003
DOI
|
3 |
신정화, 이영경, 이경현, 'P2P 환경에서 SPKI 인증서를 이용한 접근 제어' , 정보처리학회논문지 C 제10-C권 제6호, pp.793-798, 2003
과학기술학회마을
DOI
|
4 |
A. Josang, R. Ismail, and C. Bboyd, 'A Survey of Trust and Reputation Systems for Online Service Provision,' Decision Support Systems, 2005
DOI
ScienceOn
|
5 |
이계완, 'P2P 비즈니스 모델과 관련 동향' , SKC&C R&D 부문 기술동향 보고서, 2001
|
6 |
J. Aslund, 'Authentication in Peer-to-Peer Systems', Undergraduate thesis, Linkoping University,2002
|
7 |
S. Saroiu, P.K. Gummadi, and S. D. Gribble, 'A Measurement Study of Peer-to-Peer File Sharing Systems,' Proceedings of Multimedia Computing and Networking 2002(MMCN'02), 2002
|
8 |
S. Y. Lee, O. H. Kwon, J. Kim, and S. J. Hong, 'A Trust Management Schemes in Structured P2P Systems,' Fourth International Workshop on Agents and Peer-to-Peer Computing(AP2PC 2005), pp.37-50, 2005
DOI
ScienceOn
|
9 |
D. S. Milojicic, V. Kalogeraki, R. Lukose, K. Nagaraja, J. Pruyne, B. Richard, S. Rollins, and Z. Xu, 'Peer-to-Peer Computing,' HPTechReport HPL-2002-57, 2002
|