Login / Signup

Stealth modification versus nuisance attacks in the LOCKSS peer-to-peer digital preservation system.

Mema RoussopoulosPrashanth P. Bungale
Published in: Peer-to-Peer Netw. Appl. (2010)
Keyphrases