|
Volumn , Issue , 2008, Pages 934-941
|
Bypass: Providing secure DHT routing through bypassing malicious peers
|
Author keywords
[No Author keywords available]
|
Indexed keywords
DISTRIBUTED COMPUTER SYSTEMS;
ROUTING PROTOCOLS;
DHT ROUTING;
DHT ROUTING PROTOCOLS;
DISTRIBUTED HASH TABLES;
FILTERING PROTOCOLS;
MALICIOUS NODES;
MALICIOUS PEERS;
ROUTE REQUESTS;
ROUTING ATTACKS;
SECURITY ISSUES;
COMPUTER NETWORKS;
|
EID: 55849135611
PISSN: 15301346
EISSN: None
Source Type: Conference Proceeding
DOI: 10.1109/ISCC.2008.4625618 Document Type: Conference Paper |
Times cited : (6)
|
References (7)
|