참고문헌
- M. K. Riaz, F. Yangyu, and I. Akhtar, "A multidimensional trust inference model for the mobile Ad-Hoc networks," in 2019 28th Wireless and Optical Communications Conference (WOCC), 2019: IEEE, pp. 1-5.
- N. Rahimi, "Security consideration in peer-to-peer networks with a case study application," International Journal of Network Security & Its Applications (IJNSA) Vol, vol. 12, 2020.
- S. K. Awasthi and Y. Singh, "Absolutetrust: algorithm for aggregation of trust in peer-to-peer networks," IEEE transactions on dependable and secure computing, 2020.
- M. D. Istin, A. Visan, F. Pop, and V. Cristea, "SOPSys: Self-Organizing Decentralized Peer-to-Peer System Based on Well Balanced Multi-Way Trees," in P2P, Parallel, Grid, Cloud and Internet Computing (3PGCIC), 2010 International Conference on, 4-6 Nov. 2010 2010, pp. 369-374, doi: 10.1109/3pgcic.2010.61.
- S. Balfe, A. D. Lakhani, and K. G. Paterson, "Trusted computing: providing security for peer-to-peer networks," in Peer-to-Peer Computing, 2005. P2P 2005. Fifth IEEE International Conference on, 31 Aug.-2 Sept. 2005 2005, pp. 117-124, doi: 10.1109/p2p.2005.40.
- S. Aameek and L. Ling, "TrustMe: anonymous management of trust relationships in decentralized P2P systems," in Peer-to-Peer Computing, 2003. (P2P 2003). Proceedings. Third International Conference on, 1-3 Sept. 2003 2003, pp. 142-149, doi: 10.1109/ptp.2003.1231514.
- Q. Shaojie, C. Xingshu, and T. Changjie, "Trust: Transaction History Based Peer-to-Peer Trust Model," in Data, Privacy, and E-Commerce, 2007. ISDPE 2007. The First International Symposium on, 1-3 Nov. 2007 2007, pp. 242-247, doi: 10.1109/isdpe.2007.34.
- A. Visan, F. Pop, and V. Cristea, "Decentralized Trust Management in Peer-to-Peer Systems," in Parallel and Distributed Computing (ISPDC), 2011 10th International Symposium on, 6-8 July 2011 2011, pp. 232-239, doi: 10.1109/ispdc.2011.41.
- V. Kumar, "Trust and Security in Peer-to-Peer System," in Database and Expert Systems Applications, 2006. DEXA '06. 17th International Workshop on, 0-0 0 2006, pp. 703-707, doi: 10.1109/dexa.2006.142.
- S. Marsh. Formalising trust as a computational concept. In Ph.D. Thesis, University of Stirling, 1994.
- J. Douceur. The sybil attack. In IPTPS02 Workshop, Cambridge,MA (USA), March 2002.
- E. Sit and R. Morris. Security considerations for peer-to-peer distributed hash tables. In IPTPS02 Workshop, Cambridge,MA (USA), March 2002.
- Jung-Tae Kim; Hae-Kyeong Park; Eui-Hyun Paik; , "Security issues in peer-to-peer systems," Advanced Communication Technology, 2005, ICACT 2005. The 7th International Conference on , vol.2, no., pp.1059-1063, 0-0 0.
- Yu Wang; Wang Yu; Zhao Yue-long; Hou Fang; , "A New Security Trust Model for Peer-to-Peer E-Commerce," Management of e-Commerce and e-Government, 2008.ICMECG '08. International Conference on , vol., no., pp.399-402, 17-19 Oct. 2008.
- Schafer, J.; Malinka, K.; Hanacek, P.; , "Peer-to-Peer Networks Security," Internet Monitoring and Protection, 2008. ICIMP '08.The Third International Conference on , vol., no., pp.74-79, June 29 2008-July 5 2008.