• Documents
  • Authors
  • Tables
  • Log in
  • Sign up
  • MetaCart
  • DMCA
  • Donate

CiteSeerX logo

Advanced Search Include Citations

Tools

Sorted by:
Try your query at:
Semantic Scholar Scholar Academic
Google Bing DBLP
Results 1 - 10 of 16
Next 10 →

The EigenTrust Algorithm for Reputation Management in P2P Networks

by Sepandar D. Kamvar, Mario T. Schlosser, Hector Garcia-molina - in Proceedings of the 12th International World Wide Web Conference (WWW 2003 , 2003
"... Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self ..."
Abstract - Cited by 997 (23 self) - Add to MetaCart
of self-replicating inauthentic files.

The EigenTrust Algorithm for Reputation Management in

by Networks Sepandar Kamvar, Sepandar D. Kamvar
"... Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of sel ..."
Abstract - Cited by 301 (2 self) - Add to MetaCart
of self-replicating inauthentic files. We describe an algorithm to decrease the number of downloads of inauthentic files in a peer-to-peer file-sharing network that assigns each peer a unique global trust value, based on the peer's history of uploads. We present a distributed and secure method

General Terms

by Sepandar D. Kamvar
"... Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self-replicating inauthentic files. We ..."
Abstract - Add to MetaCart
Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self-replicating inauthentic files. We

Database Administration[Security, integrity and protection] General Terms

by Sepandar D. Kamvar
"... Peer-to-peer file-sharing networks are currently receiving much attention as a means of sharing and distributing information. However, as recent experience with P2P networks such as Gnutella shows, the anonymous, open nature of these networks offers an almost ideal environment for the spread of self ..."
Abstract - Add to MetaCart
of self-replicating inauthentic files. We describe an algorithm to decrease the number of downloads of inauthentic files in a peer-to-peer file-sharing network that assigns each peer a unique global reputation value, based on the peer’s history of uploads. We present a distributed and secure method

A Fuzzy Reputation Management System with Punishment Mechanism for P2P Network

by Zhengbing Hu, Huaiqing Lin, Yonghong Zhou
"... Abstract—One way to minimize threats in P2P system is to exploit reputation to help evaluate the trustworthiness and predict the future behaviors of peers. In this paper, a set of parameters are identified for describing the trust of a peer. And a trust model based on fuzzy techniques is presented. ..."
Abstract - Add to MetaCart
the efficiency of P2P system by significantly decreasing the number of inauthentic files on the network. Index Terms—trust; reputation; p2p; fuzzy logic I.

A Trust Management for Peer 2 Peer Information Systems

by Suraj Suryawanshi, Pavan Gujjar, Panduranga Rao
"... Abstract- Due to the open nature of P2P system exposes them to malicious activity. P2P system means computer in the system can act as both client and server. In a P2P network, the peers are computer systems which are connected to each other via the internet. Files can be shared directly between syst ..."
Abstract - Add to MetaCart
recommendations with service and recommendation contexts.A malicious peer performs both service and recommendation-based attacks. Uploading a virus infected (or) an inauthentic file is a service based attack. Self-Organizing Trust Model (SORT) detects the service based attack and recommendation based attack

Authenticating contrast and brightness adjusted images using distributed source coding and expectation maximization

by Yao-chung Lin, David Varodayan, Torsten Fink, Erwin Bellers, Bernd Girod - in Proc. IEEE International Conference on Multimedia and Expo, ICME 2008 , 2008
"... Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many dif-ferently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity of encoded ..."
Abstract - Cited by 3 (1 self) - Add to MetaCart
Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many dif-ferently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity

Spatial models for localization of image tampering using distributed source codes

by Yao-chung Lin, David Varodayan, Bernd Girod - in Proc. Picture Coding Symp , 2007
"... Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity of encoded ..."
Abstract - Cited by 10 (3 self) - Add to MetaCart
Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding not only to distinguish the legitimate diversity of encoded

Image authentication and tampering localization using distributed source coding

by Yao-chung Lin, David Varodayan, Bernd Girod - in IEEE Multimedia Signal Processing Workshop , 2007
"... Abstract — Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding to distinguish the legitimate diversity of encode ..."
Abstract - Cited by 10 (5 self) - Add to MetaCart
Abstract — Media authentication is important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding to distinguish the legitimate diversity

LOCALIZATION OF TAMPERING IN CONTRAST AND BRIGHTNESS ADJUSTED IMAGES USING DISTRIBUTED SOURCE CODING AND EXPECTATION MAXIMIZATION

by Yao-Chung Lin , David Varodayan , Torsten Fink , Erwin Bellers , Bernd Girod
"... ABSTRACT Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding to authenticate the le ..."
Abstract - Add to MetaCart
ABSTRACT Media authentication and tampering localization are important in content delivery via untrusted intermediaries, such as peer-to-peer (P2P) file sharing. Many differently encoded versions of a media file might exist. Our previous work applied distributed source coding to authenticate
Next 10 →
Results 1 - 10 of 16
Powered by: Apache Solr
  • About CiteSeerX
  • Submit and Index Documents
  • Privacy Policy
  • Help
  • Data
  • Source
  • Contact Us

Developed at and hosted by The College of Information Sciences and Technology

© 2007-2019 The Pennsylvania State University