Login / Signup
A Secure Multicast Model for Peer-to-Peer and Access Networks Using the Host Identity Protocol.
Xueyong Zhu
J. William Atwood
Published in:
CCNC (2007)
Keyphrases
</>
peer to peer
computational model
statistical model
formal model
data sets
probabilistic model
security model
cost function
theoretical framework
optimization model
resource discovery