Research Article
An Anonymity Scheme Based on Pseudonym in P2P Networks
529 downloads
@INPROCEEDINGS{10.1007/978-3-642-23602-0_28, author={Hao Peng and Songnian Lu and Jianhua Li and Aixin Zhang and Dandan Zhao}, title={An Anonymity Scheme Based on Pseudonym in P2P Networks}, proceedings={2nd International ICST Workshop on e-Forensics Law and Judicial}, proceedings_a={E-FORENSICSLAW}, year={2012}, month={10}, keywords={anonymous P2P networks pseudonym}, doi={10.1007/978-3-642-23602-0_28} }
- Hao Peng
Songnian Lu
Jianhua Li
Aixin Zhang
Dandan Zhao
Year: 2012
An Anonymity Scheme Based on Pseudonym in P2P Networks
E-FORENSICSLAW
Springer
DOI: 10.1007/978-3-642-23602-0_28
Abstract
One of the fundamental challenges in P2P (Peer to Peer) networks is to protect peers’ identity privacy. Adopting anonymity scheme is a good choice in most of networks such as the Internet, computer and communication networks. In this paper, we proposed an anonymity scheme based on pseudonym in which peers are motivated not to share their identity. Compared with precious anonymous scheme such as RuP (Reputation using Pseudonyms), our scheme can reduce the overhead and minimize the trusted center’s involvement.
Copyright © 2010–2024 ICST