본문 바로가기 주메뉴 바로가기
국회도서관 홈으로 정보검색 소장정보 검색

결과 내 검색

동의어 포함

초록보기

This paper aims to analyze vulnerability of overlay networks for the existing P2P service and suggest a secure and efficient ESCORT network. Encryption functions are used to provide encryption, explicit mutual authentication and session keys are provided to ensure secure communication, and a middle object is suggested to maintain efficiency. Moreover, Time stamps are used for each communication process to provide effective network security service. Thus, the proposed ESCORT network provides not only security for P2P users but also other advantages such as user privacy protection, secure communication and effective security management through centralized control.

권호기사

권호기사 목록 테이블로 기사명, 저자명, 페이지, 원문, 기사목차 순으로 되어있습니다.
기사명 저자명 페이지 원문 목차
The Development of SP Security Functional Requirements in CMVP 문길종, 고갑승, 류동주 pp.657-664

스마트폰에서의 콘텐츠 보안 연구 성정숙 pp.665-672

수배전반 시스템의 신뢰성 향상을 위한 오류 예측 시스템 조상영 pp.705-714

CC 3.1 기반 무선위협관리시스템(AIRTMS V1.0) 보안기능요구사항 개발 고갑승, 문길종, 류동주 pp.645-656

SW공학 표준 커리큘럼에 관한 연구 염희균, 황선명 pp.693-704

ESCORT : Secure P2P Protocol for Global Cooperation in Overlay Network Services 서대희, 안개일, 김종현, 조동섭, 백장미 pp.673-692

참고문헌 (15건) : 자료제공( 네이버학술정보 )

참고문헌 목록에 대한 테이블로 번호, 참고문헌, 국회도서관 소장유무로 구성되어 있습니다.
번호 참고문헌 국회도서관 소장유무
1 A. Rowstron and P. Druschel, “Pastry:Scalable, decentralized object location and routing for large-scale peer-to-peer systems,” Proc. of the Middle-ware 2001, 2001, pp. 329-350. 미소장
2 B.K Cha, D.Y. Han, Y.S Son and K.S. Kim, “TP2P: Topology-based Peer-to-Peer System Efficient Resources Lookup,” KIISE Journals, vol. 34, no. 2, 2008, pp. 88-98. 미소장
3 Overlay networks: A scalable alternative for P2P 네이버 미소장
4 GP Jesi, D. Gavidia, C. Gamage, and M. van Steen, “A Secure Peer Sampling Service as a “Hub attack” Countermeasure,” UBLCS-2006-17. 미소장
5 H.C Kwon, J.H. Hah, J.S. Jang, “DHT(Distributed Hash Table) P2P based overlay network security threat analysis,” The journal of KISC, vol. 15, no. 6, 2006, pp.60-67. 미소장
6 H.C Kwon, Y.H Moon, J.B. Gu, S.K. Kho, J.H. Hah and J.S. Jang, “Standardization and Technology Trend of Peer-to-Peer Communication,” ETRI Report, vol. 22, no. 1, 2007, pp.11-23. 미소장
7 I. Baumgart and S. Mies, “S/Kademlia: A practicable approach towards secure key-based routing,” ICPADS '07, 2007, pp. 1-8. 미소장
8 Chord: A Scalable Peer-to-peer Lookup Service for Internet Applications 네이버 미소장
9 K. Singh and H. Schulzrinne, “Data Format and Interface to an External Peer-to-Peer Network for SIP Location Service,” IETF, 2006. 미소장
10 Design and evaluation of a support service for mobile, wireless publish/subscribe applications 네이버 미소장
11 M. Castro, P. Drushel, A. Ganesh, A. Rowstron and D. Wallach, “Secure routing for structured peer-to-peer overlay networks,” OSDI, 2002, pp.299-314. 미소장
12 Mudhakar Srivatsa, “Security Architecture and Protocols for Overlay Network Services,” Georgia Institute of Technology, a thesis for a doctorate, 2007. 미소장
13 Mobility helps peer-to-peer security 네이버 미소장
14 S. Buchegger and A. Datta, “A case for P2P infrastructure for social networks: Opportunities and challenges,” Proc. of 6th International Conference on Wireless On-demand Network Systems and Services (WONS), 2009, pp.45-52. 미소장
15 IRTF P2P Research Group Website, (http://www.cs.umd.edu/projects/p2prg/) 미소장