Login / Signup
Veracity: Practical Secure Network Coordinates via Vote-based Agreements.
Micah Sherr
Matt Blaze
Boon Thau Loo
Published in:
USENIX Annual Technical Conference (2009)
Keyphrases
</>
network structure
network model
real world
peer to peer
complex networks
computer networks
security requirements
security measures
data sets
mobile devices
network traffic
security issues
security analysis
security management