Kad network

Results: 43



#Item
1Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim University of Minnesota - Twin Cities 200 Union Street SE Minneapolis, MN 55455

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim University of Minnesota - Twin Cities 200 Union Street SE Minneapolis, MN 55455

Add to Reading List

Source URL: randombits.io

- Date: 2015-06-29 10:17:02
    2Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

    Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

    Add to Reading List

    Source URL: www.tik.ee.ethz.ch

    - Date: 2015-05-18 12:16:38
      3A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

      A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

      Add to Reading List

      Source URL: www.tik.ee.ethz.ch

      Language: English - Date: 2015-05-18 12:16:16
      4Poisoning the Kad Network

      Poisoning the Kad Network

      Add to Reading List

      Source URL: www.tik.ee.ethz.ch

      Language: English - Date: 2015-05-18 12:16:31
      5SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172  Attacking the Kad network---real world evaluation and high

      SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

      Add to Reading List

      Source URL: randombits.io

      Language: English - Date: 2015-06-29 10:17:00
      6SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172  Attacking the Kad network---real world evaluation and high

      SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

      Add to Reading List

      Source URL: www.cs.okstate.edu

      Language: English - Date: 2011-08-15 19:32:40
      7Why Kad Lookup Fails Hun J. Kang, Eric Chan-Tin, Nicholas J. Hopper, Yongdae Kim University of Minnesota - Twin Cities {hkang,dchantin,hopper,kyd}@cs.umn.edu Abstract

      Why Kad Lookup Fails Hun J. Kang, Eric Chan-Tin, Nicholas J. Hopper, Yongdae Kim University of Minnesota - Twin Cities {hkang,dchantin,hopper,kyd}@cs.umn.edu Abstract

      Add to Reading List

      Source URL: www.cs.okstate.edu

      Language: English - Date: 2011-08-15 19:32:40
      8Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim University of Minnesota - Twin Cities 200 Union Street SE Minneapolis, MN 55455

      Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim University of Minnesota - Twin Cities 200 Union Street SE Minneapolis, MN 55455

      Add to Reading List

      Source URL: www.cs.okstate.edu

      Language: English - Date: 2011-08-15 19:32:40
      9Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

      Poisoning the Kad Network Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , and Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, Zurich, Switzerland {lochert,wattenhofer}@tik.ee.ethz

      Add to Reading List

      Source URL: disco.ethz.ch

      Language: English - Date: 2014-09-26 08:36:29
      10A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

      A Peer Activity Study in eDonkey & Kad Thomas Locher1 , David Mysicka1 , Stefan Schmid2 , Roger Wattenhofer1 1 Computer Engineering and Networks Laboratory (TIK), ETH Zurich, CH-8092 Zurich, Switzerland. {.

      Add to Reading List

      Source URL: disco.ethz.ch

      Language: English - Date: 2014-09-26 08:36:30