Article Fingerprint
ReserarchID
CSTNWS820LK
The wide qualities of distributed (ex: P2P networks) network has given us many advantages and threats for enhancement of distributed computing. The best way to reduce threats is adding a reputation-based globally trusted model. Many present trust models are failing to restrain effectively some behaviors like collusive attacks, but pay no heed towards the security of this mechanism.
Bolladi Swathi. 2012. \u201cAuthorised Secure Host Communication under Data Provenance Verification- A Signcryption Based Contract Signing Protocol\u201d. Global Journal of Computer Science and Technology - E: Network, Web & Security GJCST-E Volume 12 (GJCST Volume 12 Issue E15): .
Crossref Journal DOI 10.17406/gjcst
Print ISSN 0975-4350
e-ISSN 0975-4172
Explore published articles in an immersive Augmented Reality environment. Our platform converts research papers into interactive 3D books, allowing readers to view and interact with content using AR and VR compatible devices.
Your published article is automatically converted into a realistic 3D book. Flip through pages and read research papers in a more engaging and interactive format.
Total Score: 102
Country: India
Subject: Global Journal of Computer Science and Technology - E: Network, Web & Security
Authors: Bolladi Swathi, P.Vasanth Sena (PhD/Dr. count: 0)
View Count (all-time): 202
Total Views (Real + Logic): 9808
Total Downloads (simulated): 2629
Publish Date: 2012 11, Sat
Monthly Totals (Real + Logic):
This paper attempted to assess the attitudes of students in
Advances in technology have created the potential for a new
Inclusion has become a priority on the global educational agenda,
The wide qualities of distributed (ex: P2P networks) network has given us many advantages and threats for enhancement of distributed computing. The best way to reduce threats is adding a reputation-based globally trusted model. Many present trust models are failing to restrain effectively some behaviors like collusive attacks, but pay no heed towards the security of this mechanism.
Lorem ipsum dolor sit amet, consectetur adipiscing elit. Ut elit tellus, luctus nec ullamcorper mattis, pulvinar dapibus leo.