LIANG Zhi-hong, HU Chao-hui, TAN Yi-ming, LIU Wen-juan. P2P Network Connect Control Based on Trusted Computing[J]. Microelectronics & Computer, 2014, 31(12): 38-42.
Citation: LIANG Zhi-hong, HU Chao-hui, TAN Yi-ming, LIU Wen-juan. P2P Network Connect Control Based on Trusted Computing[J]. Microelectronics & Computer, 2014, 31(12): 38-42.

P2P Network Connect Control Based on Trusted Computing

  • This paper proposes a P2 Pnetwork connection method based on trusted computing technology to prevent the malicious terminal from accessing to the P2 Pnetwork.We take into account the reliability,availability and security of a terminal,and the behavioral characteristics of the terminal which can protect the terminal is secure when it is running.The experiments prove that the method we presented is more accurate in trust certification of terminal,and the P2 Phas better reliability and stability.
  • loading

Catalog

    Turn off MathJax
    Article Contents

    /

    DownLoad:  Full-Size Img  PowerPoint
    Return
    Return