![Loading...](https://link.springer.com/static/c4a417b97a76cc2980e3c25e2271af3129e08bbe/images/pdf-preview/spacer.gif)
-
Chapter and Conference Paper
Performance Prediction in Peer-to-Peer MultiAgent Networks
Building a good autonomous, self-organizing, and collaborating networks is an important research area for the design of large scale and high performance MultiAgent Systems on top of peer-to-peer (P2P) networks...
-
Chapter and Conference Paper
Security Clustering: A Network-Wide Secure Computing Mechanism in Pervasive Computing
In this paper, we introduce a new security paradigm, called security clustering, for pervasive computing environment that enables network-wide defend against increasing evolutionary attacks on the heterogeneou...
-
Chapter and Conference Paper
New Adaptive Trust Models against DDoS: Back-Up CA and Mesh PKI
Most of Public Key Infrastructures (PKIs) are based on the ITU-T X.509, and the top-down hierarchical structure is extensively employed for the PKI community. However, the prominent drawback of the hierarchica...
-
Chapter and Conference Paper
A PKI-Based Authentication Framework for Next Generation Mobile Internet
The next generation mobile Internet is expected to develop towards “Always Best Connected (ABC),” or “Any Time, Any Where, Any Service,” and provide completely open environments for interconnection with the ex...