Authentication in peer-to-peer systems

In the environment of the 3:rd generation Internet based on peer-to-peer architecture, well-trusted methods must exist to establish a secure environment. One main issue is the possibility to verify that a node actually is who it claims to be (authentication). Establishment of authentication between...

Full description

Bibliographic Details
Main Author: Åslund, Jonas
Format: Others
Language:English
Published: Linköpings universitet, Institutionen för systemteknik 2002
Subjects:
P2P
Online Access:http://urn.kb.se/resolve?urn=urn:nbn:se:liu:diva-1222