Authorised Secure Host Communication under Data Provenance Verification- A Signcryption Based Contract Signing Protocol

Authors

  • Bolladi Swathi

Keywords:

Abstract

The wide qualities of distributed (ex: P2P networks) network has given us many advantages and threats for enhancement of distributed computing. The best way to reduce threats is adding a reputation-based globally trusted model. Many present trust models are failing to restrain effectively some behaviors like collusive attacks, but pay no heed towards the security of this mechanism.

How to Cite

Bolladi Swathi. (2012). Authorised Secure Host Communication under Data Provenance Verification- A Signcryption Based Contract Signing Protocol. Global Journal of Computer Science and Technology, 12(E15), 17–25. Retrieved from https://computerresearch.org/index.php/computer/article/view/300

Authorised Secure Host Communication under Data Provenance Verification- A Signcryption Based Contract Signing Protocol

Published

2012-03-15