JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE) ›› 2014, Vol. 49 ›› Issue (09): 97-102.doi: 10.6040/j.issn.1671-9352.2.2014.307
Previous Articles Next Articles
PENG Hao, ZHAO Dan-dan, HAN Jian-min, LU Jian-feng
CLC Number:
[1] GOOD N S, KREKELBERG A. Usability and privacy:a study of Kazaa P2P file-sharing[C]//Proceedings of the SIGCHI Conference on Human Factors in Computing Systems. New York: ACM Press, 2003: 137-144. [2] BOUKERCHE A, ZARRAD A, ARAUJO R B. A Cross-layer approach-based gnutella for collaborative virtual environments over Mobile Ad Hoc networks[J]. IEEE Transactions on Parallel and Distributed Systems, 2010, 21(7): 911-924. [3] 苗光胜,冯登国,苏璞睿.P2P信任模型中基于模糊逻辑的共谋团体识别方法[J].计算机研究与发展,2011, 48(12):2187-2200. MIAO Guangsheng, FENG Dengguo, SU Purui. A collusion detector based on fuzzy logic in P2P trust model[J]. Journal of Computer Research and Development, 2011, 48(12): 2187-2200. [4] 孙波,丁雪峰,司成祥,等.P2P环境下的具有隐私保护的信誉协议[J].计算机科学,2013, 40(z1):334-336, 371. SUN Bo, DING Xuefeng, SI Chengxiang, et al. Privacy preserving reputation protocol for P2P environment[J]. Computer Science, 2013, 40(z1):334-336, 371. [5] Van Der Heide B, JOHNSON B K, VANG M H.The effects of product photographs and reputation systems on consumer behavior and product cost on eBay[J]. Computers in Human Behavior, 2013, 29(3):570-576. [6] ZUO Fang, ZHANG Wei. An auction based distribute mechanism for P2P adaptive bandwidth allocation [J]. IEICE Transactions on Information and Systems, 2013, E96D(12):2704-2712. [7] 蒋越.P2P网络节点信息信任度计算模型仿真研究[J].计算机仿真,2014, 31(1):298-301. JIANG Yue. Research and simulation on information trust calculation model of P2P network nodes[J]. Computer Simulation, 2014, 31(1):298-301. [8] 周慎,祝跃飞.P2P环境下抗共谋攻击的自适应信任反馈聚合方法[J].计算机应用研究,2013, 30(2):494-496. ZHOU Shen, ZHU Yuefei. Adaptive P2P trust aggregation method for resisting collusion attack[J]. Application Research of Computers, 2013, 30(2):494-496. [9] WANG Haoyu, ZHAO Yunfeng, MENG Xiangde, et al. Achieving quick trust transmission in P2P network based on matrix operation [J]. Applied Mechanics and Materials, 2013, 325:1717-1721. [10] SONG Fei, WANG Xiaojing, CUI Zhe. A trust model of P2P in cloud computing environment [J]. Applied Mechanics and Materials, 2013, 278:1962-1965. [11] 韩磊磊,陈越,于丽莉.P2P网络的恶意节点检测模型[J].计算机工程与设计,2011, 32(2):484-488. HAN Leilei, CHEN Yue, YU Lili. Malicious node detecting model for P2P networks [J]. Computer Engineering and Design, 2011, 32(2):484-488. [12] LI Xiaoyong, ZHOU Feng, YANG Xudong. A multi-dimensional trust evaluation model for large-scale P2P computing[J]. Journal of Parallel and Distributed Computing, 2011, 71(6):837-847. [13] FAN Xinxin, LI Mingchu, REN Yizhi, et al. Dual-EigenRep: a reputation-based trust model for P2P File-Sharing networks[C]//Proceedings of the 7th International Conference on Ubiquitous Intelligence & Computing and the 7th International Conference on Autonomic & Trusted Computing (UIC/ATC 2010). Los Alamitos: IEEE Computer Society, 2010:358-363. [14] HSIAO H W, LIN C S, CHEN Kunyu. How the information and communications technology threaten our privacy:the case of email and P2P propagation models[J]. Computer Technology and Application, 2011, 2(10):765-773. [15] ZHANG Xiaohong, HANG Jian, LI Lou. Research of P2P searching technology based on distributed hash table [J]. Applied Mechanics and Materials, 2013, 263:2271-2276. [16] 孙苏,仲红,石润华,等.基于信任评估的Ad hoc网络安全路由协议[J].计算机工程,2012, 38(20):76-80. SUN Su, ZHONG Hong, SHI Runhua, et al. Secure routing protocol based on trust evaluation in Ad hoc network[J]. Computer Engineering, 2012, 38(20):76-80. [17] 王海晟,桂小林.基于不满意度的网络安全模型[J].计算机应用研究,2013, 30(2):566-569. WANG Haisheng, GUI Xiaolin. New network security model based on degree of dissatisfaction [J]. Application Research of Computers, 2013, 30(2):566-569. [18] 孙秋景,曾凡平,曹勇.基于可信推荐节点集合的P2P信誉模型[J].计算机工程,2010, 36(20):142-144. SUN Qiujing, ZENG Fanping, CAO Yong. P2P reputation model based on credible recommendation node set[J]. Computer Engineering, 2010, 36(20):142-144. [19] LI Xiaoyong, FENG Zhou, YANG Xudong. Scalable feedback aggregating (SFA) overlay for Large-Scale P2P trust management[J]. IEEE Transactions on Parallel and Distributed Systems, 2012, 23(10):1944-1957. [20] FAN Xinxin, LI Mingchu, ZHAO Hui, et al. Peer cluster: a maximum flow-based trust mechanism in P2P file sharing networks [J]. Security and Communication Networks, 2013, 6(9):1126-1142. [21] 郝黎明,杨树堂,陆松年,等.基于可信度的传递模式信誉值计算改进算法[J].计算机工程,2008, 34(3):18-20. HAO Liming, YANG Shutang, LU Songnian, et al. Improved algorithm of transitive mode reputation value computing based on certain factor[J]. Computer Engineering, 2008, 34(3):18-20. [22] 郝黎明.P2P信誉系统中基于可信计算技术的匿名机制研究[D].上海:上海交通大学,2008. HAO Liming. Research on anonymous schemes in P2P reputation systems based on trusted computing technology[D]. Shanghai: Shanghai Jiaotong University, 2008. [23] 杨绪兵,王一雄,陈斌.马氏度量学习中的几个关键问题研究及几何解释[J].南京大学学报:自然科学版,2013, 49(2):133-141. YANG Xubing, WANG Yixiong, CHEN Bin. Research on several key problems of Mahalanobis metric learning and corresponding geometrical interpretaions[J]. Journal of Nanjing University: Natural Sciences, 2013, 49(2):133-141. |
[1] | LI Yan-ping, QI Yan-jiao, ZHANG Kai, WEI Xu-guang. Multi-authority and revocable attribute-based encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(7): 75-84. |
[2] | ZHANG Guang-zhi, CAI Shao-bin, MA Chun-hua, ZHANG Dong-qiu. Application of maximum distance separable codes in the error correction of the network coding [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 75-82. |
[3] | LI Yang, CHENG Xiong, TONG Yan, CHEN Wei, QIN Tao, ZHANG Jian, XU Ming-di. Method for threaten users mining based on traffic statistic characteristics [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2018, 53(1): 83-88. |
[4] | ZHAO Guang-yuan, QIN Feng-lin, GUO Xiao-dong. Design and implementation of P2P-based network measurement cloud platform [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(12): 104-110. |
[5] | HUANG Shu-qin, XU Yong, WANG Ping-shui. User similarity calculation method based on probabilistic matrix factorization and its recommendation application [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(11): 37-43. |
[6] | WANG Ya-qi, WANG Jing. Rumor spreading on dynamic complex networks with curious psychological mechanism [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(6): 99-104. |
[7] | CHEN Guang-rui, CHEN Xing-shu, WANG Yi-tong, GE Long. A software update mechanism for virtual machines in IaaS multi-tenant environment [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 60-67. |
[8] | ZHUANG Zheng-mao, CHEN Xing-shu, SHAO Guo-lin, YE Xiao-ming. A time-relevant network traffic anomaly detection approach [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 68-73. |
[9] | SONG Yuan-zhang, LI Hong-yu, CHEN Yuan, WANG Jun-jie. P2P botnet detection method based on fractal and adaptive data fusion [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2017, 52(3): 74-81. |
[10] | ZHU Sheng, ZHOU Bin, ZHU Xiang. EIP: discovering influential bloggers by user similarity and topic timeliness [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 113-120. |
[11] | . An approach of detecting LDoS attacks based on the euclidean distance of available bandwidth in cloud computing [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 92-100. |
[12] | LI Yu-xi, WANG Kai-xuan, LIN Mu-qing, ZHOU Fu-cai. A P2P network privacy protection system based on anonymous broadcast encryption scheme [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 84-91. |
[13] | SU Bin-ting, XU Li, FANG He, WANG Feng. Fast authentication mechanism based on Diffie-Hellman for wireless mesh networks [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 101-105. |
[14] | LIN Li. News event extraction based on kernel dependency graph [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(9): 121-126. |
[15] | . Construction of expert relationship network based on random walk strategy [J]. JOURNAL OF SHANDONG UNIVERSITY(NATURAL SCIENCE), 2016, 51(7): 30-34. |
|