Essays about: "attacks in P2P"

Found 5 essays containing the words attacks in P2P.

  1. 1. Towards Engineering Trustworthy Distributed Reputation Systems Over The Blockchain

    University essay from Malmö universitet/Fakulteten för teknik och samhälle (TS)

    Author : Georg Grankvist; Paul Moustakas; [2022]
    Keywords : Blockchain; Ethereum; Smart Contract; NFT; Bank-ID; Software Architecture; Reputation Systems; Sybil Attack; Re-entry Attack; P2P; Distributed;

    Abstract : Peer-to-peer (P2P) reputation systems, such as those used by eBay and Amazon, servean important role on the web, especially in E-commerce, as online reputation serves asa primary guiding factor for consumers in making informed decisions. The importanceof these systems, and also the increasing popularity of P2P and distributed systems, theissue of how to prevent and resist sybil and re-entry attacks becomes an important area ofresearch as they can impinge the integrity of those systems. READ MORE

  2. 2. BLOCKCHAIN TECHNOLOGY SECURITY CONCERNS:LITERATURE REVIEW

    University essay from Uppsala universitet/Informationssystem

    Author : Marie Jeanne Tuyisenge; [2021]
    Keywords : Blockchain technology;

    Abstract : Blockchain is a technology that allows the decentralization of data stored in a way that there is no single central actor to control or modify the data. Bitcoin is the first successful blockchain application implemented with the concept known as cryptocurrency that allows a transaction flow without any bank or government to control it. READ MORE

  3. 3. Distributed Client Driven Certificate Transparency Log

    University essay from Linköpings universitet/Institutionen för datavetenskap

    Author : Robin Ellgren; Tobias Löfgren; [2018]
    Keywords : ;

    Abstract : High profile cyber attacks such as the one on DigiNotar in 2011, where a Certificate Authority (CA) was compromised, has shed light on the vulnerabilities of the internet. In order to make the internet safer in terms of exposing fraudulent certificates, CertificateTransparency (CT) was introduced. READ MORE

  4. 4. Secure Routing in Structured P2P Overlay : Simulating Secure Routing on Chord DHT

    University essay from Mittuniversitetet/Avdelningen för informations- och kommunikationssystem

    Author : Mebratu Kassahun; [2015]
    Keywords : p2p; secure routing; DHT; Chord;

    Abstract : Fully distributed systems offer the highest level of freedom for the users. For this reason, in today’s Internet, it is recorded that more than 50% of the packets moving in and out belong to this type of network. READ MORE

  5. 5. Peer-to-peer : time to lock the door

    University essay from Blekinge Tekniska Högskola/Institutionen för programvaruteknik och datavetenskap

    Author : Linus Petersson; [2002]
    Keywords : peer-to-peer; p2p; network security; security policy;

    Abstract : Is a regulating policy concerning peer-to-peer applications required so that companies and institutions can better manage the security issues of internal peer-to-peer applications? There is high security and privacy risks involved when using p2p applications like KaZaA, Bearshare, Audiogalaxy and ICQ. With the high speed networks of today it is very important to really know what is going on in your network and which applications is doing what and with whom. READ MORE