The wide qualities of distributed (ex: P2P networks) network has given us many advantages and threats for enhancement of distributed computing. The best way to reduce threats is adding a reputation-based globally trusted model. Many present trust models are failing to restrain effectively some behaviors like collusive attacks, but pay no heed towards the security of this mechanism.

How to Cite
SWATHI, P.VASANTH SENA, Bolladi. Authorised Secure Host Communication under Data Provenance Verification- A Signcryption Based Contract Signing Protocol. Global Journal of Computer Science and Technology, [S.l.], nov. 2012. ISSN 0975-4172. Available at: <https://computerresearch.org/index.php/computer/article/view/300>. Date accessed: 19 jan. 2021.