In the environment of the 3:rd generation Internet based on peer-to-peer architecture, well-trusted methods must exist to establish a secure environment. One main issue is the possibility to verify that a node actually is who it claims to be (authentication). Establishment of
As it can be noticed by the title of this report, this study concerns itself with the distribution of computing power in peer-to-peer networks. Concepts like peer-to-peer networks and distributed computing are not new. They have been available in different forms for
Project Reports, Final Year Projects for Students, Case Studies, Dissertation Ideas, Thesis Topics, Project Sample Downloads