Login / Signup
Avoiding Eclipse Attacks on Kad/Kademlia: An Identity Based Approach.
Romano Fantacci
Leonardo Maccari
Matteo Rosi
Luigi Chisci
Luca Maria Aiello
Marco Milanesio
Published in:
ICC (2009)
Keyphrases
</>
open source
countermeasures
source code
open source projects
case study
wireless sensor networks
digital images
security mechanisms
computer security
denial of service attacks
malicious attacks