Cart (Loading....) | Create Account
Close category search window

A P2P Network Authentication Method Based on CPK

Sign In

Cookies must be enabled to login.After enabling cookies , please use refresh or reload or ctrl+f5 on the browser for the login options.

Formats Non-Member Member
$31 $13
Learn how you can qualify for the best price for this item!
Become an IEEE Member or Subscribe to
IEEE Xplore for exclusive pricing!
close button

puzzle piece

IEEE membership options for an individual and IEEE Xplore subscriptions for an organization offer the most affordable access to essential journal articles, conference papers, standards, eBooks, and eLearning courses.

Learn more about:

IEEE membership

IEEE Xplore subscriptions

2 Author(s)
Zhuoming Jiang ; Comput. Center, Chinese Acad. of Sci., Beijing, China ; Rongsheng Xu

P2P network is short of authentication, so the CPK (Combined Public Key) authentication mechanism and DHT (Distributed Hash Table) algorithm in P2P network are researched, and CPK authentication is used in structure P2P network for its security. At point, the series-Hash method combines both DHT algorithm of structure P2P network and peers' authentication. Then base on cluster partition P2P network, a multi-field key manage method is brought forward, which combined public key and cluster extend public key. At last, security problems of this authentication system are discussed.

Published in:

Electronic Commerce and Security, 2009. ISECS '09. Second International Symposium on  (Volume:1 )

Date of Conference:

22-24 May 2009

Need Help?

IEEE Advancing Technology for Humanity About IEEE Xplore | Contact | Help | Terms of Use | Nondiscrimination Policy | Site Map | Privacy & Opting Out of Cookies

A not-for-profit organization, IEEE is the world's largest professional association for the advancement of technology.
© Copyright 2014 IEEE - All rights reserved. Use of this web site signifies your agreement to the terms and conditions.