Abstract Peer-to-Peer (P2P) computing has emerged as a cost-effective approach for constructing large-scale wide-area Internet services. Many generic P2P middleware …
ALR Gómez-Arevalillo… - International workshop on …, 2017 - inria.hal.science
A gamut of secure inter-domain routing protocols has been proposed in the literature. They use traditional PGP-like and centralized Public Key Infrastructures for trust management. In …
L Deri, R Andrews - Resilient Networks and Services: Second International …, 2008 - Springer
The Internet was originally designed as a flat data network delivering a multitude of protocols and services between equal peers. Currently, after an explosive growth fostered …
A García-Martínez, S Angieri, B Liu, F Yang… - IEEE Systems …, 2020 - ieeexplore.ieee.org
The current mechanism to secure Border Gateway Protocol relies on the resource public key infrastructure (RPKI) for route origin authorization. The RPKI implements a hierarchical …
A reliable communication platform is essential in disaster relief scenarios. Otherwise, an efficient coordination of the participating first response units cannot be ensured. However …
Our goal in this paper is to provide authentication, encryption and non-repudiation services for nodes within Peer-to-Peer networks, in an efficient and scalable way. To accomplish this …
The computational Grid concept is gaining great popularity as the best way to deliver access to a wide range of distributed computing and data resources. But, as Grids move from an …
Structured peer-to-peer overlay networks provide a substrate for the construction of large- scale, decentralized applications, including distributed storage, group communication, and …