Authorised Secure Host Communication under Data Provenance Verification- A Signcryption Based Contract Signing Protocol

Bolladi Swathi, P.Vasanth Sena

Volume 12 Issue 15

Global Journal of Computer Science and Technology

The wide qualities of distributed (ex: P2P networks) network has given us many advantages and threats for enhancement of distributed computing. The best way to reduce threats is adding a reputation-based globally trusted model. Many present trust models are failing to restrain effectively some behaviors like collusive attacks, but pay no heed towards the security of this mechanism.