Learn More
The P2P networkpsilas open and anonymous nature offers an almost ideal environment for malicious activities. In this paper, we categorize current reputation management schemes which offer defenses against many attacks. Our goal is to survey the present reputation management methods and propose a classification which facilitates a system analysis. We(More)
Modern FPGAs can be used to build application-specific high-performance computing (HPC) machines at costs that are several orders of magnitude lower than standard HPC platforms. This has some important implications for those applications where the (un)availability of suitable computing resources is an essential underlying assumption. Cryptographic(More)
The P2P network's open and anonymous nature offers an almost ideal environment for malicious activities. One of the most effective methods, which should prevent malicious peers from subverting the system, is based on reputation. The reputation management offers possibility to detect malicious peers and avoid cooperation with them. The reputation management(More)
  • 1