• No results found

[PDF] Top 20 Design and feasibility of mobile peer to peer payment systems

Has 10000 "Design and feasibility of mobile peer to peer payment systems" found on our website. Below are the top 20 most common "Design and feasibility of mobile peer to peer payment systems".

Design and feasibility of mobile peer to peer payment systems

Design and feasibility of mobile peer to peer payment systems

... Group signatures were considered for this second version, but proved problematic as an extension of the previous singatures. Group signatures such as Boneh et al.’s scheme have a private key that is not merely an in- ... See full document

131

When Peer to Peer comes Face to Face: Collaborative Peer to Peer Computing in Mobile Ad hoc Networks

When Peer to Peer comes Face to Face: Collaborative Peer to Peer Computing in Mobile Ad hoc Networks

... and peer-to- peer computing deal with similar issues, namely discovery, routing and information dissemination, there is not much overlap in the ...current peer-to-peer systems are ... See full document

15

Dynamic verification and control of mobile peer-to-peer systems

Dynamic verification and control of mobile peer-to-peer systems

... The event broker (EBr) in DVF offers the infrastructure needed for transmitting events from peers to monitors and monitoring results from monitors to peers. The event broker manages the subscriptions to the “channels” ... See full document

11

Exploiting heterogeneity in peer to peer systems using gradient topologies

Exploiting heterogeneity in peer to peer systems using gradient topologies

... P2P systems are characterised by a very high diversity of participating ...basic peer characteristics, such as the processing power, storage space, bandwidth, or session duration, are highly skewed and ... See full document

218

Performance Study of Locality and Its Impact on Peer to Peer Systems

Performance Study of Locality and Its Impact on Peer to Peer Systems

... P2P systems are natural evolution in decentralized system architecture [1] in which peer is a node that can act as a client and server simultaneously in dynamic ...P2P systems generate massive amount ... See full document

10

Optimizing Technique to Reduce Traffic Load in Peer to Peer Systems

Optimizing Technique to Reduce Traffic Load in Peer to Peer Systems

... these peer-to-peer applications generate 60% of the internet traffic worldwide, which raises intolerable ISP ...the peer-to-peer traffic got ...diverse peer-to-peer system ... See full document

6

Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems

Privacy as Invisibility: Pervasive Surveillance and the Privatization of Peer-to-Peer Systems

... P2P systems “the economically and technologically opti- mal vehicles for digital content distribution” (Wood, 2010, ...sharing systems, this address has been used openly and directly exposed, thus raising ... See full document

15

A Semantic Search Algorithm for Peer to Peer Open Hypermedia Systems

A Semantic Search Algorithm for Peer to Peer Open Hypermedia Systems

... a peer modifies the relationship with its neighbours as more potentially discoverable resources are added to the ...a peer invalidates its rela- tionship with neighbouring ...the peer storing the ... See full document

12

DDLS: Extending Open Hypermedia Systems into Peer to Peer Environments

DDLS: Extending Open Hypermedia Systems into Peer to Peer Environments

... Suppose there is a research community in which people sharing similar knowledge background maintain network accessible resources, or documents, for resource sharing- based collaboration within the community. Upon the ... See full document

181

QUALITY OF SERVICE BASED TRUST MANAGEMENT SYSTEM-A REVIEW

QUALITY OF SERVICE BASED TRUST MANAGEMENT SYSTEM-A REVIEW

... reputation-based systems [Resnick et al (2000) ] is temporal adaptivity ; that is the ability to respond rapidly to changing behavioural ...rating design with binary vectors makes an efficient exponential ... See full document

15

Novel Design and Implementation of Self Organizing Trust Model for Peer – Peer Systems
E  Latha & T  Moulika

Novel Design and Implementation of Self Organizing Trust Model for Peer – Peer Systems E Latha & T Moulika

... a peer can develop a trust network in its proxim- ity. A peer can isolate malicious peers around itself as it develops trust relationships with good ...a peer changes its point of attachment to the ... See full document

5

NONTRIVIAL CHALLENGES IN PEER TO PEER APPLICATION WITHIN NETWORK AND DESIGN ISSUE

NONTRIVIAL CHALLENGES IN PEER TO PEER APPLICATION WITHIN NETWORK AND DESIGN ISSUE

... for peer-to-peer traffic, system administrators should ensure that each request complies with the corporate security policy and should only open a minimal set of firewall ports needed to fulfil P2P ...the ... See full document

7

PEER TO PEER COMPUTING

PEER TO PEER COMPUTING

... Peer-to-peer (abbreviated to P2P) refers to a computer network in which each computer in the network can act as a client or server for the other computers in the network, allowing shared access to files and ... See full document

8

Peer to Peer Grids

Peer to Peer Grids

... a peer-to-peer grid with peer groups managed locally arranged into a global system supported by core ...database systems; this dynamic federation can use either P2P or more robust Grid ... See full document

11

View pdf

View pdf

... Anonymous Peer-to-peer Communication Protocol (MAPCP), for peer to peer applications over mobile ad-hoc ...and peer to peer ... See full document

6

A Survey on Mobile Peer-to-Peer Video Streaming Over Wi-Fi Network

A Survey on Mobile Peer-to-Peer Video Streaming Over Wi-Fi Network

... the mobile operating ...the mobile space, Google purchased Android and took over its development work (as well as its development ...own mobile operating ... See full document

6

A Framework for Security Enhanced Peer to Peer Applications in Mobile Cellular Networks

A Framework for Security Enhanced Peer to Peer Applications in Mobile Cellular Networks

... Cellular networks have already provided security from Mobile Switching Centre (MSC) to base stations, and base station to handsets. GSM network access security uses A3/A8 (COMP128 actually used in GPRS) authen- ... See full document

8

Impact of Realistic Workload in Peer-to-Peer Systems a Case Study: Freenet

Impact of Realistic Workload in Peer-to-Peer Systems a Case Study: Freenet

... 3. Methodology of simulation. The simulation problem is difficult in the context of Peer-to-Peer sys- tems on account of the great number of nodes in those networks and the complexity of their behavior. ... See full document

12

IJCSMC, Vol. 2, Issue. 12, December 2013, pg.338 – 343 RESEARCH ARTICLE A Context Aware Framework at Transport Layer to Improve QoS in Mobile Applications

IJCSMC, Vol. 2, Issue. 12, December 2013, pg.338 – 343 RESEARCH ARTICLE A Context Aware Framework at Transport Layer to Improve QoS in Mobile Applications

... on mobile system, usually defined in multi-user settings, based on anonymisation to prevent such sensitive behaviours from being traced back to the user - a strategy which does not apply if user identity is ... See full document

6

Improving Performance of Peer-to-peer Systems by Caching

Improving Performance of Peer-to-peer Systems by Caching

... P2P systems, Gnutella-like P2P systems offer several advantages in simplicity of use, self-organization, robustness, fault-tolerance and no need of complex structure ...Gnutella-like systems ... See full document

60

Show all 10000 documents...