Author of the publication

Sorcery: Could We Make P2P Content Sharing Systems Robust to Deceivers?.

, , , , , , , , and . Peer-to-Peer Computing, page 11-20. IEEE, (2009)

Please choose a person to relate this publication to

To differ between persons with the same name, the academic degree and the title of an important publication will be displayed. You can also use the button next to the name to display some publications already assigned to the person.

 

Other publications of authors with the same name

Hybrid Overlay Structure Based on Virtual Node., , , , and . ISCC, page 1091-1098. IEEE Computer Society, (2007)Securing key issuing in peer-to-peer networks., , , , , , and . SAC, page 84-85. ACM, (2009)On key issuing privacy in distributed online social networks., , , and . FSKD, page 2497-2501. IEEE, (2012)TSearch: A Self-learning Vertical Search Spider for Travel., , , and . ICYCS, page 348-353. IEEE Computer Society, (2008)Enforcing Reactive Noninterference with Reachability Analysis., , and . ITNG, page 321-326. IEEE Computer Society, (2011)An Economical Model for the Risk Evaluation of DoS Vulnerabilities in Cryptography Protocols., , , , and . ISPEC, volume 4464 of Lecture Notes in Computer Science, page 129-144. Springer, (2007)Securing Peer-to-Peer Content Sharing Service from Poisoning Attacks., , , , , and . Peer-to-Peer Computing, page 22-29. IEEE Computer Society, (2008)Exploiting Consumer Reviews for Product Feature Ranking., , , and . J. Comput. Sci. Technol., 27 (3): 635-649 (2012)Scalable Byzantine Fault Tolerant Public Key Authentication for Peer-to-Peer Networks., , , , and . Euro-Par, volume 5168 of Lecture Notes in Computer Science, page 601-610. Springer, (2008)CuboidTrust: A Global Reputation-Based Trust Model in Peer-to-Peer Networks., , , , and . ATC, volume 4610 of Lecture Notes in Computer Science, page 203-215. Springer, (2007)