Computer simulation of decentralized network

Автор: Magzom Мирас Мухтарулы, Nyssanbayeva Сауле Epкебулановна, Kalimoldayev Maksat Nuradilovich

Журнал: Проблемы информатики @problem-info

Рубрика: Прикладные информационные технологии

Статья в выпуске: 3 (36), 2017 года.

Бесплатный доступ

This paperis dedicated to the development of a software system for computer modeling (simulation) of a decentralized network with the ability to perform calculations on distributed nodes.The results of the creation of a such simulation system for decentralized computer networks arc discussed. This system is used during research and implementation of different cryptographic algorithms based on modular arithmetic.

Decentralized networks, network simulation, information security, computer modeling

Короткий адрес: https://readera.ru/143165276

IDR: 143165276

Список литературы Computer simulation of decentralized network

  • Nakamoto S. Bitcoin: A peer-to-peer electronic cash system. 2009; 2017. , http://wot.bitcoin.org/bitcoin.pdf
  • Bocek T., Peric D., Hecht F., Hausheer D., Stiller B. PeerVote: A Decentralized Voting Mechanism for P2P Collaboration Systems. In: Sadre R., Pras A. (eds) Scalability of Networks and Services. AIMS 2009. Lecture Notes in Computer Science. Springer; Berlin; Heidelberg, 2009. Vol. 5637.
  • RlSSON J., MOORS T. Survey of Research Towards Robust Peer-to-Peer Networks: Search Methods. Technical Report, University of New South Wales. Sydney; Australia, 2004.
  • KUROSE J., Ross K. Computer Networking: A Top-Down Approach Featuring the Internet. Addison-Weslev, 2005.
  • Status of the UC-Berkelev SETI Efforts, Korpela, et al.//Instruments, Methods, and Missions for Astrobiologv XIV. Proc. SPIE 8152. 2011. Vol. 14. P. 1-8.
  • Ethereum: a platform for smart contracts. . https://wOT.ethereum.org/
  • Biyashev R. C. Nyssanbayeva S. E., Begimbayeva Ye. Ye., Magzom M. M. Modification of the Cryptographic Algorithms, Developed on the Basis of Nonpositional Polynomial Notations//Proceedings of the International Conference on Circuits, Systems, Signal Processing, Communications and Computers (CSSCC 2015). Vienna, 2015. P. 170-176.
  • Biyashev R. (!. Nyssanbayeva S. E., Begimbayeva Ye. Ye., Magzom M. M. Building modified modular cryptographic systems//International Journal of Applied Mathematics and Informatics. 2015. Vol. 9. P. 103-109.
  • Biyashev R., Kalimoldayev M., Nyssanbayeva S., Magzom M. Development of an encryption algorithm based on nonpositional polynomial notations//Proceedings of the International Conference on Advanced Materials Science and Environmental Engineering (AMSEE 2016). Chiang Mai; Thailand, 2016. P. 243-245.
  • Bailes J., Templeton G. Managing P2P security//Communications of the ACM 47. 2004. Vol. 47, N 9. P. 95-98.
  • Schoder D., Fischbach K. Core Concepts in Peer-to-Peer (P2P) Networking. , http://wot.idea-group.com/downloads/excerpts/SubramanianOl.pdf
  • Naoumov N., Ross К. Exploiting P2P Systems for DDoS Attacks. International Workshop on Peer-to-Peer Information Management. 2006. , http://cis.poly.edu/~ross/papers/p2pddos.pdf
Еще
Статья научная