Login / Signup
Mitigation of the Eclipse Attack in Chord Overlays.
Cristina Rottondi
Alessandro Panzeri
Constantin Yagne
Giacomo Verticale
Published in:
ANT/SEIT (2014)
Keyphrases
</>
open source
source code
peer to peer
countermeasures
development environments
scalable distributed
case study
overlay network
secret key
open source projects
attack graph
data corruption
attack graphs
abstract argumentation