![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Performance Prediction in Peer-to-Peer MultiAgent Networks
Building a good autonomous, self-organizing, and collaborating networks is an important research area for the design of large scale and high performance MultiAgent Systems on top of peer-to-peer (P2P) networks...
-
Chapter and Conference Paper
Random Visitor: A Defense Against Identity Attacks in P2P Overlay Networks
The characteristics of cooperative and trustworthy interaction in peer-to-peer overlay network are seriously challenged by the open nature of the network. The impact is particularly large when the identifiers ...
-
Chapter and Conference Paper
Security Clustering: A Network-Wide Secure Computing Mechanism in Pervasive Computing
In this paper, we introduce a new security paradigm, called security clustering, for pervasive computing environment that enables network-wide defend against increasing evolutionary attacks on the heterogeneou...
-
Chapter and Conference Paper
Mobile PKI: A PKI-Based Authentication Framework for the Next Generation Mobile Communications
The next generation mobile Internet is expected to develop towards “Always Best Connected (ABC)”, or “Any Time, Any Where, Any Service”, and provide completely open environments for interconnection with the ex...