期刊文献+

混合式对等网络Kazaa模型结构及其分析研究 被引量:3

Research on Major model of Peer-to-Peer Network
下载PDF
导出
摘要 作为改变现有Internet应用模式的主要技术之一,计算机对等网络(P2P)是目前新一代互联网技术研究的热点之一,而P2P网络模型研究是对等网网络技术研究的重要环节。对等网络主要指计算机之间以对等的方式形成的网络连接,弱化或取消了服务器的作用。与传统的C/S模型相比,它在网络资源利用率,消除服务器瓶颈等方面有明显的优势。本文介绍了Kazaa的系统模型,并对它进行了分析研究,并介绍了对等网的应用以及给我们带来的影响。 As one of the major technology in changing existing Intemet application model, P2P network is one of the hotport in the new Intemet technology research at the present time,and p2p network model research is an important link of p2p network technology research. P2P network mainly indicates the network formed among computers in the Peer-to-Peer mode,and the function of server is weaked or canceled completely in this networking mode.Comparad with the traditional Client/Serverm modeI,P2P has many advantages,such as the higher utilization of network resources,the elimination of bottleneck caused by central servers, and then introduces the application of p2p as well as the influence to us.
作者 蒋成
出处 《信息安全与技术》 2013年第6期69-71,共3页
关键词 对等网(P2P) 网络模型 KAZAA 混合式 peer-to-peer(P2P) network model kazaa hybrid
  • 相关文献

参考文献5

二级参考文献27

  • 1盖凌云,黄树来.分布式拒绝服务攻击及防御机制研究[J].通信技术,2007,40(6):40-41. 被引量:6
  • 2黄大正 肖侬.P2P计算深入底层与边缘[J].计算机世界报,2002,(40).
  • 3吕向辰.P2P技术与应用.计算机世界,2001,(28).
  • 4Davi, L., Dmitrienko, A., Sadeghi, A.R. and Winandy, M.Privilege escalation attacks on android[J]. Information Security. 346-360.
  • 5Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y. and Dolev, S. Google Android: A state-of-the-art review of security mechanisms[J]. Arxiv preprmt arXiv:0912.5101.
  • 6ENCK, W., ONGTANG, M., AND MCDANIEL, P. 2009b. Understanding Android Security[J]. IEEE Security and Privacy, 7(01):50-57.
  • 7Shabtai, A., Fledel, Y., Kanonov, U., Elovici, Y., Dolev, S. and Glezer, C.Google Android: A comprehensive security assessment[J]. Security & Privacy, IEEE, 8 (02). 35-44.
  • 8Chandhuri, A. Language-based security on Android[C]. Proceedings of the ACM SIGPLAN Fourth Workshop on Progrmnming Languages and Analysis for Security, 2009, 1-7.
  • 9C .Enrique Ortiz.理解Android上的安全性:利用沙箱、应用程序签名和权限增强应用程序安全性[EB/OL]. http://www.ibm.com/developerworks/cn/xml/x-androidsecurity/index.html, 2010 -12 -13.
  • 10Jingzheng Wu, Yongji Wang, Liping Ding, Xiaofeng Liao. Improving Performance of Network Covert Timing Channel through Huffman Coding[C]. The 2010 FTRA International Symposium on Advances in Cryptography, Security and Applicafom for Future Computing (ACSA 2010). Gwangju, Korea. Dec 9-11, 2010.

共引文献194

同被引文献13

引证文献3

二级引证文献17

相关作者

内容加载中请稍等...

相关机构

内容加载中请稍等...

相关主题

内容加载中请稍等...

浏览历史

内容加载中请稍等...
;
使用帮助 返回顶部