Welcome![Sign In][Sign Up]
Location:
Search - peer to peer security

Search list

[Firewall-Securityjxta

Description: jxta提供了你需要的技术来编写网络化的,互操作的P2P应用程序,可以容易地跨防火墙来动态发现网络上其它的对等成员,容易地跨网络和任何人共享文件,在你喜爱的站点发现每分钟更新的内容,创建一个对等成员组,成员可以容易地发现对方(在任何跨防火墙的设备上),远程监视成员的活动,在网络上和其它成员安全地通信。-jxta you need to provide the technology to prepare the network, peer-to-peer interoperability of applications, can easily cross-firewall to dynamically discover other network members such as the right, easily inter-network and any shared document, in your favorite site updates every minute found the content, the creation of a reciprocal membership, Members can easily find each other (in any cross-firewall equipment), the members of the long-range surveillance activities, on the Internet and other communications to the security of the members.
Platform: | Size: 1353617 | Author: | Hits:

[Other resourcep2pSecurity

Description: 几本java p2p 安全的电子书,A Survey of Peer-to-Peer Security Issues.pdf-several p2p security electronic book, A Survey of Peer-to-Peer Security Issues.pdf
Platform: | Size: 1251034 | Author: 李某 | Hits:

[JSP/Javapisces_1.3_src

Description: A distributed, peer-to-peer, server-less communication & messaging solution for JAVA (JMS), C++ and .NET applications, integrates with JBoss, WebLogic & WebSphere. Offers guaranteed delivery, security and transactions. Supports TCP, SSL & HTTP protocols
Platform: | Size: 89416 | Author: ehunter | Hits:

[Firewall-Securityjxta

Description: jxta提供了你需要的技术来编写网络化的,互操作的P2P应用程序,可以容易地跨防火墙来动态发现网络上其它的对等成员,容易地跨网络和任何人共享文件,在你喜爱的站点发现每分钟更新的内容,创建一个对等成员组,成员可以容易地发现对方(在任何跨防火墙的设备上),远程监视成员的活动,在网络上和其它成员安全地通信。-jxta you need to provide the technology to prepare the network, peer-to-peer interoperability of applications, can easily cross-firewall to dynamically discover other network members such as the right, easily inter-network and any shared document, in your favorite site updates every minute found the content, the creation of a reciprocal membership, Members can easily find each other (in any cross-firewall equipment), the members of the long-range surveillance activities, on the Internet and other communications to the security of the members.
Platform: | Size: 1353728 | Author: | Hits:

[JSPp2pSecurity

Description: 几本java p2p 安全的电子书,A Survey of Peer-to-Peer Security Issues.pdf-several p2p security electronic book, A Survey of Peer-to-Peer Security Issues.pdf
Platform: | Size: 1251328 | Author: 李某 | Hits:

[JSP/Javapisces_1.3_src

Description: A distributed, peer-to-peer, server-less communication & messaging solution for JAVA (JMS), C++ and .NET applications, integrates with JBoss, WebLogic & WebSphere. Offers guaranteed delivery, security and transactions. Supports TCP, SSL & HTTP protocols-A distributed, peer-to-peer, server-less communication
Platform: | Size: 89088 | Author: ehunter | Hits:

[Linux-UnixGNUnet-0.8.0b.tar

Description: GNUnet是一个安全的点对点网络框架,不采用任何集中或者说可信的服务。 在网络层上首先完成的服务是抗审查的匿名文件共享服务。 匿名是通过特殊的消息机制实现的:初始节点与路由经过节点的消息是不可区分的。 所有的节点都有路由功能,使用带宽稳定的加密连接进行相互交流。 GNUnet利用简单的、基于过剩的经济模型分配资源。 GNUnet中的节点相互监视其它节点的资源使用行为;对网络有贡献的节点会赢得更好的服务。 GNUNet是GNU工程的一部分。 官方站点在http://www.gnu.org/software/gnunet/。 -GNUnet is a peer-to-peer network security framework, do not use any centralized or credible service. Layer in the network service is the first anti-completed review of the anonymous file-sharing services. Anonymous messages through the special mechanisms: the initial node and routing node, after the news is not distinction. All the nodes have routing capabilities, the use of bandwidth and stable exchange encrypted connection. GNUnet use simple economic model based on the excess distribution of resources. GNUnet nodes in each node to monitor the use of resources of other acts contribute to the node on the network will win a better service. GNUnet is the GNU project. The official site in http://www.gnu.org/software/gnunet/.
Platform: | Size: 2362368 | Author: mxx | Hits:

[P2Psecurityp2p

Description: ppt for security in peer to peer network
Platform: | Size: 30720 | Author: sonam | Hits:

[P2Presearch_of_security_and_authentication_protocol_f

Description: 文章提出了一种在P2P网络中安全分发密钥和进行对等点身份认证的方法。这种方法采用的认证协议同时结合了公钥加密和密钥加密技术。我们还通过一种认证测试的方法证明了该方法使用的安全认证协议的正确性。-This paper presents a P2P network in the distribution of key security and authentication of the peer approach. This method of authentication protocol used in connection with a public key encryption and key encryption technology. We are also certified through a method of testing proved that the method used in the correctness of the security authentication protocol.
Platform: | Size: 185344 | Author: leilei | Hits:

[Windows Developpast

Description: 这篇文章描述了PAST的设计,past是一个大规模、基于internet的、全局存储实体。pats提供扩展性、高可用性、持久性以及安全性支持。PAST 是一个点对点的internet应用,并且完全是自组织的。- This paper sketches the design of PAST, a large-scale, Internet-base,global storage utility that provides seala- bility high availability persistence and security. PAST is a peer-to-peer Internet application and is entirely self- organizing. PAST nodes serve us access points for clients, participate in the routing of client requests, and contribute storage to the system. Nodes are not trusted, they may join the system at any time and may silently leave the system without warning. Yet, the system is able to provide strong assurances, efficient storage access, load balancing and scalability Among the most interesting aspects of PAST s design are (I) the Pastry location and routing scheme, which reliably and efficiently routes client requests among the PAST nodes, has good network locality properties and automatically re- solves node failures and node additions (2) the use of ran- domization to ensure diversity in the set of nodes that store a file s replicas and to
Platform: | Size: 559104 | Author: 刘东 | Hits:

[Program docSecurityinDistributedEmbeddedSystems

Description: Information security was first explored in the context of communication systems. When two entities send or receive sensitive data using public networks or communication channels that are easily accessible by could-be attackers, they should generally provide the basic security functions such as data confidentiality, data integrity, and peer authentication. Confidentiality, integrity, and authentication services are critical to preventing an adversary from compromising the security of a distributed sensor network. Key management is likewise critical to establishing the keys necessary to provide this protection.
Platform: | Size: 547840 | Author: A.H.M Shahparan | Hits:

[Software Engineeringqq

Description: 使用c++编写了对点 语音聊天软件,实现两台主机之间得语音通信,首先通过声音采集,然后利用ACM接口压缩音频数据,将数据发送到目标主机,主机接收数据后,解压缩音频数据,并播放,以此实现了点对点得语音通信。利用TCP/IP协议来确认连接状态(TCP/IP协议是可靠的协议,TCP负责发现传输的问题,一有问题就发出信号,要求重新传输,直到所有数据安全正确地传输到目的地,),UDP协议(UDP是一个无连接协议,传输数据之前源端和终端不建立连接,当它想传送时就简单地去抓取来自应用程序的数据,并尽可能快地把它扔到网络上)来实现数据的发送和接收。ACM WAVEX -Using c++ write software for peer to peer voice chat, to achieve voice communication between two host computers were first collected by the sound, and then use ACM compressed audio data interfaces, data sent to the target host, the host receives data, extract audio data, and play, to assert the point was voice communications. Using TCP/IP protocol to confirm the connection status (TCP/IP protocol is a reliable protocol, TCP is responsible for the problems found in transmission, a signal problem on the demand for re-transmission until all the data security and correctly transferred to the destination), UDP protocol (UDP is a connectionless protocol, transmission of data source and the terminal before the connection is not established, when it simply when you want to transfer to crawl from the application of data and throw it as quickly as possible on the network ) to achieve data transmission and reception.
Platform: | Size: 2726912 | Author: 里小号 | Hits:

[P2Pp2pneting

Description: :以Napster和Gnutella为代表的文件共享软件已经成为Internet上增长最迅速的应用。这种运行于多个对等结点(Peer)之上的网络被称为对等网络。随着对等网络规模的增长,可扩展性成为迫切需要解决的问题也成为了研究的热点。本文综述了对等网络领域的研究现状,首先介绍了Internet上常见的对等网络系统及其局限性,然后对最近提出的多种支持大规模对等网络的分布式哈希表查找系统进行了综述,介绍了基于这些查找系统的新一代的文件共享系统,讨论了对等网络中的安全问题并指出了进一步的研究方向。-The Napster and Gnutella file-sharing software represented has become the most rapidly growing Internet application. This runs on a number of peer nodes (Peer) over the network is known as peer networks. With the growth of network size, etc., scalability is an urgent need to address the issue has become a research hotspot. This paper reviews the research on the status of such networks, first introduced on the popular Internet peer network system and its limitations, and then a variety of recent large-scale peer networks to support distributed hash table lookup system was review, introduced a new generation of systems based on these to find the file sharing system, discussed on other network security issues and that further research directions.
Platform: | Size: 253952 | Author: majie | Hits:

[Windows DevelopSecurity-Issues-in-Ad-Hoc-Networks

Description: Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and is gradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with each other in a peer-to-peer manner and form a network on-the-fly, carrying out basic
Platform: | Size: 201728 | Author: badraac | Hits:

[Software Engineeringanquanduofangjisuan

Description: 本文调查的办法是给出了一个方法,即一个有效的协议,为双方使用不受信任的第三方,可用于构建一个高效率的同辈对同辈安全的多方协议。-This paper investigates ways to give a method, that is a valid agreement for both parties to use an untrusted third party can be used to build a high-efficiency multi-protocol peer-to-peer security.
Platform: | Size: 73728 | Author: wushan | Hits:

[Windows DevelopSecurity-Issues-in-Ad-Hoc-Networks

Description: Mobile wireless ad hoc network security issue. Mobile ad hoc network is an emerging area of mobile computing and isgradually becoming a new paradigm of wireless network. In mobile ad hoc networks, mobile nodes communicate directly with eachother in a peer-to-peer manner and form a network on-the-fly, carrying outbasic
Platform: | Size: 201728 | Author: movePr | Hits:

[Software Engineeringpeer-to-peer

Description: peer-to-peer的相关应用资料例如数据共享、安全研究,体系结构以及对等的实体模型。-Peer- to- peer related applications such as data sharing, information security research, system structure and peer entity model.
Platform: | Size: 1350656 | Author: bnmio | Hits:

CodeBus www.codebus.net