Kademlia

Results: 220



#Item
11SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172  Attacking the Kad network---real world evaluation and high

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

Add to Reading List

Source URL: randombits.io

Language: English - Date: 2015-06-29 10:17:00
12Flexible Routing Tables: Designing Routing Algorithms for Overlays Based on a Total Order on a Routing Table Set Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology, Tokyo, Japan Email: {hiroya.nagao, shudo}@is.ti

Flexible Routing Tables: Designing Routing Algorithms for Overlays Based on a Total Order on a Routing Table Set Hiroya Nagao, Kazuyuki Shudo Tokyo Institute of Technology, Tokyo, Japan Email: {hiroya.nagao, shudo}@is.ti

Add to Reading List

Source URL: www.shudo.net

Language: English - Date: 2014-02-11 13:33:22
13SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172  Attacking the Kad network---real world evaluation and high

SECURITY AND COMMUNICATION NETWORKS Security Comm. NetworksPublished online in Wiley InterScience (www.interscience.wiley.com) DOI: sec.172 Attacking the Kad network---real world evaluation and high

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
14Microsoft PowerPoint - iscc2014_figs.pptx

Microsoft PowerPoint - iscc2014_figs.pptx

Add to Reading List

Source URL: www.shudo.net

Language: English
15IET Information Security Research Article Hijacking the Vuze BitTorrent network: all your hop are belong to us

IET Information Security Research Article Hijacking the Vuze BitTorrent network: all your hop are belong to us

Add to Reading List

Source URL: www-users.cs.umn.edu

Language: English - Date: 2016-06-28 22:06:38
16Why Kad Lookup Fails Hun J. Kang, Eric Chan-Tin, Nicholas J. Hopper, Yongdae Kim University of Minnesota - Twin Cities {hkang,dchantin,hopper,kyd}@cs.umn.edu Abstract

Why Kad Lookup Fails Hun J. Kang, Eric Chan-Tin, Nicholas J. Hopper, Yongdae Kim University of Minnesota - Twin Cities {hkang,dchantin,hopper,kyd}@cs.umn.edu Abstract

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
17Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim University of Minnesota - Twin Cities 200 Union Street SE Minneapolis, MN 55455

Attacking the Kad Network Peng Wang, James Tyra, Eric Chan-Tin, Tyson Malchow, Denis Foo Kune, Nicholas Hopper, Yongdae Kim University of Minnesota - Twin Cities 200 Union Street SE Minneapolis, MN 55455

Add to Reading List

Source URL: www.cs.okstate.edu

Language: English - Date: 2011-08-15 19:32:40
18Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols Nathan S. Evans Technische Universit¨at M¨unchen, Munich, Germany Email:  Christian Grothoff Technische Universit¨at M¨unchen,

Beyond Simulation: Large-Scale Distributed Emulation of P2P Protocols Nathan S. Evans Technische Universit¨at M¨unchen, Munich, Germany Email: Christian Grothoff Technische Universit¨at M¨unchen,

Add to Reading List

Source URL: static.usenix.org

Language: English - Date: 2011-07-08 13:42:24
19Lock-Free Decentralized Storage for Transactional Upgrade Rollback∗ Boris Mej´ıas, Gustavo Guti´errez, Peter Van Roy Universit´e catholique de Louvain   Abstract

Lock-Free Decentralized Storage for Transactional Upgrade Rollback∗ Boris Mej´ıas, Gustavo Guti´errez, Peter Van Roy Universit´e catholique de Louvain Abstract

Add to Reading List

Source URL: www.mancoosi.org

Language: English - Date: 2012-12-16 04:54:55